Enterprise Architecture
- Buy Link or Shortcode: {j2store}43|cart{/j2store}
- Parent Category Name: Service Planning and Architecture
- Parent Category Link: service-planning-and-architecture
Attractive a target, I do not make, hmmm? Yoda-speak with a slightly inquisitive tone, indicating that he means the opposite. And many (small) business owners also feel they are no target. But 61% of SMBs were attacked already. And large corporations also still have a ways to go.
In the past two years, we've seen that we need quick technology solutions for acute issues. We quickly moved to homeworking and then to a hybrid form. We promptly moved many of our offline habits online.
That necessitated a boost in data collection from us towards our customers and employees, and business partners.
Are you sure how to approach this structurally? What is the right thing to do?
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin your proactive SAP licensing journey by understanding which information to gather and assessing the current state and gaps.
Review current licensing models and determine which licensing models will most appropriately fit your environment.
Review SAP’s contract types and assess which best fit the organization’s licensing needs.
Conduct negotiations, purchase licensing, and finalize a licensing management strategy.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read our executive brief to understand our approach to SDLC optimization and why we advocate a holistic approach for your company.
This phase helps you understand your business goals and priorities. You will document your current SDLC process and find where the challenges are.
Prioritize your initiatives and formalize them in a roll-out strategy and roadmap. Communicate your plan to all your stakeholders.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This project will help you define a sourcing strategy for your application development team by assessing key factors about your products and your organization, including critical business, technical, and organizational factors. Use this analysis to select the optimal sourcing strategy for each situation.
This workbook is designed to capture the results of the activities in the storyboard. Each worksheet corresponds with an activity from the deck. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

Firms today are under continuous pressure to innovate and deliver new features to market faster while at the same time controlling costs. This has increased the need for higher throughput in their development teams along with a broadening of skills and knowledge. In the face of these challenges, there is a new focus on how firms source their development function. Should they continue to hire internally, offshore, or outsource? How do they decide which strategy is the right fit?
Info-Tech’s research shows that the sourcing strategy considerations have evolved beyond technical skills and costs. Identifying the right strategy has become a function of the characteristics of the organization, its culture, its reliance on the business for knowledge, its strategic value of the application, its vendor management skills, and its ability to internalize external knowledge. By assessing these factors firms can identify the best sourcing mix for their development portfolios.
Dr. Suneel Ghei
Principal Research Director, Application Development
Info-Tech Research Group
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
|
Choosing the right sourcing strategy is not just a question of technical skills! Successful sourcing is based on matching your organization’s culture, knowledge, and experiences to the right choice of internal or external partnership.
Business
|
|
![]() |
Three Perspectives + |
Three Steps = |
Your Sourcing Strategy |
| Many firms across all industries are making use of different sourcing strategies to drive innovation and solve business issues. According to a report by ReportLinker the global IT services outsourcing market reached US$413.8 billion in 2021. In a recent study of Canadian software firms, it was found that almost all firms take advantage of outside knowledge in their application development process. In most cases these firms also use outside resources to do development work, and about half the time they use externally built software packages in their products (Ghei, 2020)! Info-Tech InsightIn today’s diverse global markets, firms that wish to stay competitive must have a defined ability to take advantage of external knowledge and to optimize their IT services spend. | Modeling Absorptive Capacity for Open Innovation in the Canadian Software Industry (Source: Ghei, 2020; n=54.) 56% of software development firms are sourcing applications instead of resources. 68% of firms are sourcing external resources to develop software products. 91% of firms are leveraging knowledge from external sources. |

Insourcing allows you to stay close to more strategic applications. But choosing the right model requires a strong look inside your organization and your ability to provide business knowledge support to developers who may have different skills and cultures and are in different geographies.
Outsource Roles
|
Outsource Teams (or Projects)
|
Outsource Products
|
Outsourcing represents one of the most popular ways for organizations to source external knowledge and skills. The choice of model is a function of the organization’s ability to support the external resources and to absorb the knowledge back into the organization.
| Review Your Current Situation
Review the issues and opportunities related to application development and categorize them based on the key factors. |
Assess Build Versus Buy
Before choosing a sourcing model you must assess whether a particular product or function should be bought as a package or developed. |
Choose the Right Sourcing Strategy
Based on the research, use the modeling tool to match the situation to the appropriate sourcing solution. |
Review your current delivery posture for challenges and impediments.
Define a Sourcing Strategy for Your Development Team| Step 1.1 | Step 1.2 | Step 1.3 |
Business Challenges
Technology Challenges
Market Challenges
| ![]() Info-Tech InsightSourcing is a key tool to solve business and technical challenges and enhance market competitiveness when coupled with a robust definition of objectives and a way to measure success. |
Output: List of the key challenges in your software lifecycle. Breakdown of the list into categories to identify opportunities for sourcing
Participants: Product management team, Software development leadership team, Key stakeholders
Document results in the Define a Sourcing Strategy Workbook

Outcomes of this step
Understand in your context the benefits and drawbacks of build versus buy, leveraging Info-Tech’s recommended definitions as a starting point.
Define a Sourcing Strategy for Your Development Team
| Step 1.1 | Step 1.2 | Step 1.3 |
![]() |
Regardless of the industry, a common and challenging dilemma facing technology teams is to determine when they should build software or systems in-house versus when they should rely wholly on an outside vendor for delivering on their technology needs. The answer is not as cut and dried as one would expect. Any build versus buy decision may have an impact on strategic and operational plans. It touches every part of the organization, starting with individual projects and rolling up to the enterprise strategy. |
Do not ignore the impact of a build or buy decision on the various management levels in an IT organization.
| BUILD | BUY | ||
Multi-Source Best of Breed Integrate various technologies that provide subset(s) of the features needed for supporting the business functions. |
Vendor Add-Ons & Integrations Enhance an existing vendor’s offerings by using their system add-ons either as upgrades, new add-ons, or integrations. |
||
Pros
|
Cons
|
Pros
|
Cons
|
Multi-Source Custom Integrate systems built in-house with technologies developed by external organizations. |
Single Source Buy an application/system from one vendor only. |
||
Pros
|
Cons
|
Pros
|
Cons
|
30 minutes
Output: A common understanding of the different approaches to build versus buy applied to your organizational context
Participants: Product management team, Software development leadership team, Key stakeholders
Document results in the Define a Sourcing Strategy Workbook
Outcomes of this step
Choose your desired sourcing strategy based on your current state and needs.
Define a Sourcing Strategy for Your Development Team
| Step 1.1 | Step 1.2 | Step 1.3 |
| Business
Technical
Organizational
|
Product Knowledge
|
![]() |

Built to Outsource Development Teams
|
Results
|
![]() |
Vendor Management
|

Trying to Find the Right Match
|
Info-Tech’s Recommended Approach
|
Environment Complexity
|
![]() |

Seeking to Outsource Innovation
|
Info-Tech’s Recommended Approach
|
Choosing the right model |
![]() |
||||||
| Determinant | Key Questions to Ask | Onshore | Nearshore | Offshore | Outsource Role(s) | Outsource Team | Outsource Product(s) |
| Business Dependence | How much do you rely on business resources during the development cycle? | ||||||
| Absorptive Capacity | How successful has the organization been at bringing outside knowledge back into the firm? | ||||||
| Integration Complexity | How many integrations are required for the product to function – fewer than 5, 5-10, or more than 10? | ||||||
| Product Ownership | Do you have full-time product owners in place for the products? Do product owners have control of their roadmaps? | ||||||
| Organization Culture Fit | What are your organization’s communication and conflict resolution strategies? Is your organization geographically dispersed? | ||||||
| Vendor Mgmt Skills | What is your skill level in vendor management? How long are your longest-standing vendor relationships? | ||||||
60 minutes
Output: A scored matrix of the key drivers of the sourcing strategy
Participants: Development leaders, Product management team, Key stakeholders
Choose one of your products or product families and assess the factors below on a scale of None, Low, Medium, High, and Full.
Document results in the Define a Sourcing Strategy Workbook
By now you understand what goes into an effective sourcing strategy. Before implementing one, there are a few key items you need to consider:
![]() |
Start with a pilot
|
Apfel, Isabella, et al. “IT Project Member Turnover and Outsourcing Relationship Success: An Inverted-U Effect.” Developments, Opportunities and Challenges of Digitization, 2020. Web.
Benamati, John, and Rajkumar, T.M. “The Application Development Outsourcing Decision: An Application of the Technology Acceptance Model.” Journal of Computer Information Systems, vol. 42, no. 4, 2008, pp. 35-43. Web.
Benamati, John, and Rajkumar, T.M. “An Outsourcing Acceptance Model: An Application of TAM to Application Development Outsourcing Decisions.” Information Resources Management Journal, vol. 21, no. 2, pp. 80-102, 2008. Web.
Broekhuizen, T. L. J., et al. “Digital Platform Openness: Drivers, Dimensions and Outcomes.” Journal of Business Research, vol. 122, July 2019, pp. 902-914. Web.
Brook, Jacques W., and Albert Plugge. “Strategic Sourcing of R&D: The Determinants of Success.” Business Information Processing, vol. 55, Aug. 2010, pp. 26-42. Web.
Delen, G. P A.J., et al. “Foundations for Measuring IT-Outsourcing Success and Failure.” Journal of Systems and Software, vol. 156, Oct. 2019, pp. 113-125. Web.
Elnakeep, Eman, et al. “Models and Frameworks for IS Outsourcing Structure and Dimensions: A Holistic Study.” Lecture notes in Networks and Systems, 2019. Web.
Ghei, Suneel. Modeling Absorptive Capacity for Open Innovation in the Software Industry. 2020. Faculty of Graduate Studies, Athabasca University, 2020. DBA Dissertation.
“IT Outsourcing Market Research Report by Service Model, Organization Sizes, Deployment, Industry, Region – Global Forecast to 2027 – Cumulative Impact of COVID-19.” ReportLinker, April 2022. Web.
Jeong, Jongkil Jay, et al. “Enhancing the Application and Measurement of Relationship Quality in Future IT Outsourcing Studies.” 26th European Conference on Information Systems: Beyond Digitization – Facets of Socio-Tehcnical Change: Proceedings of ECIS 2018, Portsmouth, UK, June 23-28, 2018. Edited by Peter Bednar, et al., 2018. Web.
Könning, Michael. “Conceptualizing the Effect of Cultural Distance on IT Outsourcing Success.” Proceedings of Australasian Conference on Information Systems 2018, Sydney, Australia, Dec. 3-5, 2018. Edited by Matthew Noble, UTS ePress, 2018. Web.
Lee, Jae-Nam, et al. “Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach.” MIS Quarterly, vol. 43, no. 4, Dec. 2019, pp. 1201-1225. Web.
Loukis, Euripidis, et al. “Determinants of Software-as-a-Service Benefits and Impact on Firm Performance.” Decision Support Systems, vol. 117, Feb. 2019, pp. 38-47. Web.
Martensson, Anders. “Patterns in Application Development Sourcing in the Financial Industry.” Proceedings of the 13th European Conference of Information Systems, 2004. Web.
Martínez-Sánchez, Angel, et al. “The Relationship Between R&D, the Absorptive Capacity of Knowledge, Human Resource Flexibility and Innovation: Mediator Effects on Industrial Firms.” Journal of Business Research, vol. 118, Sept. 2020, pp. 431-440. Web.
Moreno, Valter, et al. “Outsourcing of IT and Absorptive Capacity: A Multiple Case Study in the Brazilian Insurance Sector.” Brazilian Business Review, vol. 17, no. 1, Jan.-Feb. 2020, pp. 97-113. Web.
Ozturk, Ebru. “The Impact of R&D Sourcing Strategies on Basic and Developmental R&D in Emerging Economies.” European Journal of Innovation Management, vol. 21, no. 7, May 2018, pp. 522-542. Web.
Ribas, Imma, et al. “Multi-Step Process for Selecting Strategic Sourcing Options When Designing Supply Chains.” Journal of Industrial Engineering and Management, vol. 14, no. 3, 2021, pp. 477-495. Web.
Striteska, Michaela Kotkova, and Viktor Prokop. “Dynamic Innovation Strategy Model in Practice of Innovation Leaders and Followers in CEE Countries – A Prerequisite for Building Innovative Ecosystems.” Sustainability, vol. 12, no. 9, May 2020. Web.
Thakur-Wernz, Pooja, et al. “Antecedents and Relative Performance of Sourcing Choices for New Product Development Projects.” Technovation, 2020. Web.
Innovation is about people, not ideas or processes. Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and taking smart risks are most likely to see the benefits of innovation.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard includes three phases and nine activities that will help you define your purpose, align your people, and build your practice.
Use this template in conjunction with the activities in the main storyboard to create and communicate your innovation program. This template uses sample data from a fictional retailer, Acme Corp, to illustrate an ideal innovation program summary.
This job description can be used to hire your Chief Innovation Officer. There are many other job descriptions available on the Info-Tech website and referenced within the storyboard.
Use this framework to facilitate an ideation session with members of the business. Instructions for how to customize the information and facilitate each section is included within the deck.
This spreadsheet provides an analytical and transparent method to prioritize initiatives based on weighted criteria relevant to your business.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define your innovation ambitions.
Gain a better understanding of why you are innovating and what your organization will gain from an innovation program.
1.1 Understand your innovation mandate.
1.2 Define your innovation ambitions.
1.3 Determine value proposition & metrics.
Complete the "Our purpose" section of the Innovation Program Template
Complete "Vision and guiding principles" section
Complete "Scope and value proposition" section
Success metrics
Build a culture, operating model, and team that support innovation.
Develop a plan to address culture gaps and identify and implement your operating model.
2.1 Foster a culture of innovation.
2.2 Define your operating model.
Complete "Building an innovative culture" section
Complete "Operating model" section
Create the capability to facilitate innovation.
Create a resourcing plan and prioritization templates to make your innovation program successful.
3.1 Build core innovation capabilities.
3.2 Develop prioritization criteria.
Team structure and resourcing requirements
Prioritization spreadsheet template
Finalize your program and complete the final deliverable.
Walk away with a complete plan for your innovation program.
4.1 Define your methodology to pilot projects.
4.2 Conduct a program retrospective.
Complete "Operating model" section in the template
Notable wins and goals
Many organizations stumble when implementing innovation programs. Innovation is challenging to get right, and even more challenging to sustain over the long term.
One of the common stumbling blocks we see comes from organizations focusing more on the ideas and the process than on the culture and the people needed to make innovation a way of life. However, the most successful innovators are the ones which have adopted a culture of innovation and reinforce innovative behaviors across their organization. Organizational cultures which promote growth mindset, trust, collaboration, learning, and a willingness to fail are much more likely to produce successful innovators.
This research is not just about culture, but culture is the starting point for innovation. My hope is that organizations will go beyond the processes and methodologies laid out here and use this research to dramatically improve their organization's performance.
Kim Osborne Rodriguez
Research Director, CIO Advisory
Info-Tech Research Group
As a leader in your organization, you need to:
In the past, you might have experienced one or more of the following:
This blueprint will help you:
There is no single right way to approach innovation. Begin with an understanding of your innovation ambitions, your existing culture, and the resources available to you, then adopt the innovation operating model that is best suited to your situation.
Note: This research is written for the individual who is leading the development of the innovation. This role is referred to as the Chief Innovation Officer (CINO) throughout this research but could be the CIO, CTO, IT director, or another business leader.
|
75% |
Three-quarters of companies say innovation is a top-three priority. |
|---|---|
|
30% |
But only 30% of executives say their organizations are doing it well. |
Based on a survey of 270 business leaders.
Source: Harvard Business Review, 2018
The most common challenges business leaders experience relate to people and culture. Success is based on people, not ideas.
Politics, turf wars, and a lack of alignment: territorial departments, competition for resources, and unclear roles are holding back the innovation efforts of 55% of respondents.
FIX IT
Senior leadership needs to be clear on the innovation goals and how business units are expected to contribute to them.
Cultural issues: many large companies have a culture that rewards operational excellence and disincentivizes risk. A history of failed innovation attempts may result in significant resistance to new change efforts.
FIX IT
Cultural change takes time. Ensure you are rewarding collaboration and risk-taking, and hire people with fresh new perspectives.
Inability to act on signals crucial to the future of the business: only 18% of respondents indicated their organization was unaware of disruptions, but 42% said they struggled with acting on leading indicators of change.
FIX IT
Build the ability to quickly run pilots or partner with startups and incubators to test out new ideas without lengthy review and approval processes.
Source: Harvard Business Review, 2018

1 Source: Boston Consulting Group, 2021
2 Source: Boston Consulting Group, 2019
3 Source: Harvard Business Review, 2018
Innovators are defined as companies that were listed on Fast Company World's 50 Most Innovative Companies for 2+ years.
A 25-year study by Business Development Canada and Statistics Canada showed that innovation was more important to business success than management, human resources, marketing, or finance.
INDUSTRY: Healthcare
SOURCE: Interview
This Info-Tech member is a nonprofit, community-based mental health organization located in the US. It serves about 25,000 patients per year in community, school, and clinic settings.
This organization takes its innovation culture very seriously and has developed methodologies to assess individual and team innovation readiness as well as innovation types, which it uses to determine everyone's role in the innovation process. These assessments look at knowledge of and trust in the organization, its innovation profile, and its openness to change. Innovation enthusiasts are involved early in the process when it's important to dream big, while more pragmatic perspectives are incorporated later to improve the final solution.
The organization has developed many innovative approaches to delivering healthcare. Notably, they have reimagined patient scheduling and reduced wait times to the extent that some patients can be seen the same day. They are also working to improve access to mental health care despite a shortage of professionals.
|
1. Define Your Purpose |
2. Align Your People |
3. Build Your Practice |
|
|---|---|---|---|
|
Phase Steps |
|
|
|
|
Phase Outcomes |
Understand where the mandate for innovation comes from, and what the drivers are for pursuing innovation. Define what innovation means to your organization, and set the vision, mission, and guiding principles. Articulate the value proposition and key metrics for measuring success. |
Understand what it takes to build an innovative culture, and what types of innovation structure are most suited to your innovation goals. Define an innovation methodology and build your core innovation capabilities and team. |
Gather ideas and understand how to assess and prioritize initiatives based on standardized metrics. Develop criteria for tracking and measuring the success of pilot projects and conduct a program retrospective. |
Innovation Operating Model
The operating model describes how the innovation program delivers value to the organization, including how the program is structured, the steps from idea generation to enterprise launch, and the methodologies used.
Examples: Innovation Hub, Grassroots Innovation.
Innovation Methodology
Methodologies describe the ways the operating model is carried out, and the approaches used in the innovation practice.
Examples: Design Thinking, Weighted Criteria Scoring
Chief Innovation Officer
This research is written for the person or team leading the innovation program – this might be a CINO, CIO, or other leader in the organization.
Innovation Team
The innovation team may vary depending on the operating model, but generally consists of the individuals involved in facilitating innovation across the organization. This may be, but does not have to be, a dedicated innovation department.
Innovation Program
The program for generating ideas, running pilot projects, and building a business case to implement across the enterprise.
Pilot Project
A way of testing and validating a specific concept in the real world through a minimum viable product or small-scale implementation. The pilot projects are part of the overall pilot program.
Innovation is about people, not ideas or processes
Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and the ability to take smart risk are most likely to see the benefits of innovation.
Very few are doing innovation well
Only 30% of companies consider themselves innovative, and there's a good reason: innovation involves unknowns, risk, and failure – three situations that people and organizations typically do their best to avoid. Counter this by removing the barriers to innovation.
Culture is the greatest barrier to innovation
In a survey of 270 business leaders, the top three most common obstacles were politics, turf wars, and alignment; culture issues; and inability to act on signals crucial to the business (Harvard Business Review, 2018). If you don't have a supportive culture, your ability to innovate will be significantly reduced.
Innovation is a means to an end
It is not the end itself. Don't get caught up in innovation for the sake of innovation – make sure you are getting the benefits from your investments. Measurable success factors are critical for maintaining the long-term success of your innovation engine.
Tackle wicked problems
Innovative approaches are better at solving complex problems than traditional practices. Organizations that prioritize innovation during a crisis tend to outperform their peers by over 30% and improve their market position (McKinsey, 2020).
Innovate or die
Innovation is critical to business growth. A 25-year study showed that innovation was more important to business success than management, human resources, marketing, or finance (Statistics Canada, 2006).
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Sample Job Descriptions and Organization Charts
Determine the skills, knowledge, and structure you need to make innovation happen.
Facilitate an ideation session with your staff to identify areas for innovation.
Initiative Prioritization Workbook
Evaluate ideas to identify those which are most likely to provide value.
Communicate how you plan to innovate with a report summarizing the outputs from this research.
US businesses spend over half a trillion dollars on innovation annually. What are they getting for it?
(1) based on BCG's 50 Most Innovative Companies 2022
30% | The most innovative companies outperform the market by 30%. |
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 0 | Phase 1 | Phase 2 | Phase 3 | Finish |
|---|---|---|---|---|
|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #2: Understand your mandate. Call #3: Innovation vision, guiding principles, value proposition, and scope. |
Call #4: Foster a culture of innovation. (Activity 2.1) Call #5: Define your methodology. (Activity 2.2) Call #6: Build core innovation capabilities. (Activity 2.3) |
Call #7: Build your ideation and pilot programs. (Activities 3.1 and 3.2) Call #8: Identify success metrics and notable wins. (Activity 3.3) |
Call #9: Summarize results and plan next steps. |
A GI is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 8 to 12 calls over the course of three to six months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Session 1 | Session 2 | Session 3 | Session 4 |
Wrap Up |
|
|---|---|---|---|---|---|
|
Activities |
Define Your Ambitions |
Align Your People |
Develop Your Capabilities |
Build Your Program |
Next Steps and |
|
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
Purpose |
People |
Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
INDUSTRY: Transportation
SOURCE: Interview
ArcBest
ArcBest is a multibillion-dollar shipping and logistics company which leverages innovative technologies to provide reliable and integrated services to its customers.
An Innovative Culture Starts at the Top
ArcBest's innovative culture has buy-in and support from the highest level of the company. Michael Newcity, ArcBest's CEO, is dedicated to finding better ways of serving their customers and supports innovation across the company by dedicating funding and resources toward piloting and scaling new initiatives.
Having a clear purpose and mandate for innovation at all levels of the organization has resulted in extensive grassroots innovation and the development of a formalized innovation program.
Results
ArcBest has a legacy of innovation, going back to its early days when it developed a business intelligence solution before anything else existed on the market. It continues to innovate today and is now partnering with start-ups to further expand its innovation capabilities.
"We don't micromanage or process-manage incremental innovation. We hire really smart people who are inspired to create new things and we let them run – let them create – and we celebrate it.
Our dedication to innovation comes from the top – I am both the President and the Chief Innovation Officer, and innovation is one of my top priorities."
Michael Newcity
President and Chief Innovation Officer ArcBest
You can only influence what you can control.
Unless your mandate comes from the CEO or Board of Directors, driving enterprise-wide innovation is very difficult. If you do not have buy-in from senior business leaders, use lighthouse projects and a smaller innovation practice to prove the value of innovation before taking on enterprise innovation.
In order to execute on a mandate to build innovation, you don't just need buy-in. You need support in the form of resources and funding, as well as strong leadership who can influence culture and the authority to change policies and practices that inhibit innovation.
For more resources on building relationships in your organization, refer to Info-Tech's Become a Transformational CIO blueprint.
Innovation is often easier to recognize than define.
Align on a useful definition of innovation for your organization before you embark on a journey of becoming more innovative.
Innovation is the practice of developing new methods, products or services which provide value to an organization.
Practice
This does not have to be a formal process – innovation is a means to an end, not the end itself.
New
What does "new" mean to you?
Value
What does value mean to you? Look to your business strategy to understand what goals the organization is trying to achieve, then determine how "value" will be measured.
Some innovations are incremental, while some are radically transformative. Decide what kind of innovation you want to cultivate before developing your strategy.
Evaluate your goals with respect to innovation: focus, strategy, and potential to transform.
Focus: Where will you innovate?
Strategy: To what extent will you guide innovation efforts?
Potential: How radical will your innovations be?
Download the Innovation Program Template.
Input
Output
Materials
Participants
A strong vision statement:
Examples:
"Good business leaders create a vision, articulate the vision, passionately own the vision, and relentlessly drive it to completion." – Jack Welch, Former Chairman and CEO of GE
Strong guiding principles:
Encourage experimentation and risk-taking
Innovation often requires trying new things, even if they might fail. We encourage experimentation and learn from failure, so that new ideas can be tested and refined.
Foster collaboration and cross-functional teams
Innovation often comes from the intersection of different perspectives and skill sets.
Customer-centric
Focus on creating value for the end user. This means understanding their needs and pain points, and using that knowledge to develop new methods, products, or services.
Embrace diversity and inclusivity
Innovation comes from a variety of perspectives, backgrounds, and experiences. We actively seek out and encourage diversity and inclusivity among our team members.
Foster a culture of learning and continuous improvement
Innovation requires continuous learning, development, and growth. We facilitate a culture that encourages learning and development, and that seeks feedback and uses it to improve.
Flexible and adaptable
We adapt to changes in the market, customer needs, and new technologies, so that it can continue to innovate and create value over time.
Data-driven
We use performance metrics and data to guide our innovation efforts.
Transparency
We are open and transparent in our processes and let the business needs guide our innovation efforts. We do not lead innovation, we facilitate it.
Input
Output
Materials
Participants
A strong value proposition not only articulates the value that the business will derive from the innovation program but also provides a clear focus, helps to communicate the innovation goals, and ultimately drives the success of the program.
Focus
Prioritize and focus innovation efforts to create solutions that provide real value to the organization
Communicate
Communicate the mandate and benefits of innovation in a clear and compelling way and inspire people to think differently
Measure Success
Measure the success of your program by evaluating outcomes based on the value proposition
Your success metrics should link back to your organizational goals and your innovation program's value proposition.
Revenue Growth: Increase in revenue generated by new products or services.
Market Share: Percentage of total market that the business captures as a result of innovation.
Customer Satisfaction: Reviews, customer surveys, or willingness to recommend the company.
Employee Engagement: Engagement surveys, performance, employee retention, or turnover.
Innovation Output: The number of new products, services, or processes that have been developed.
Return on Investment: Financial return on the resources invested in the innovation process.
Social Impact: Number of people positively impacted, net reduction in emissions, etc.
Time to Launch: The time it takes for a new product or service to go from idea to launch.
The total impact of innovation is often intangible and extremely difficult to capture in performance metrics. Focus on developing a few key metrics rather than trying to capture the full value of innovation.
| Company | Industry | Revenue(2) (USD billions) |
R&D Spend (USD billions) |
R&D Spend (% of revenue) |
|---|---|---|---|---|
| Apple | Technology | $394.30 | $26.25 | 6.70% |
| Microsoft | Technology | $203.10 | $25.54 | 12.50% |
| Amazon.com | Retail | $502.20 | $67.71 | 13.40% |
| Alphabet | Technology | $282.10 | $37.94 | 13.40% |
| Tesla | Manufacturing | $74.90 | $3.01 | 4.00% |
| Samsung | Technology | $244.39 (2021)(3) | $19.0 (2021) | 7.90% |
| Moderna | Pharmaceuticals | $23.39 | $2.73 | 11.70% |
| Huawei | Technology | $99.9 (2021)4 | Not reported | - |
| Sony | Technology | $83.80 | Not reported | - |
| IBM | Technology | $60.50 | $1.61 | 2.70% |
| Meta | Software | $118.10 | $32.61 | 27.60% |
| Nike | Commercial goods | $49.10 | Not reported | - |
| Walmart | Retail | $600.10 | Not reported | - |
| Dell | Technology | $105.30 | $2.60 | 2.50% |
| Nvidia | Technology | $28.60 | $6.85 | 23.90% |
Innovation requires a dedicated investment of time, money, and resources in order to be successful. The most innovative companies, based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, spend significant portions of their revenue on research and development.
Note: This data uses research and development as a proxy for innovation spending, which may overestimate the total spend on what this research considers true innovation.
(1) Based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, 2022
(2) Macrotrends, based on the 12 months ending Sept 30, 2022
(3) Statista
(4) CNBC, 2022
Input
Output
Materials
Participants
Create a culture that fosters innovative behaviors and puts processes in place to support them.
Purpose | People | Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
Info-Tech's Fix Your IT Culture can help you promote innovative behaviors
Refer to Improve IT Team Effectiveness to address team challenges
The following behaviors and key indicators either stifle or foster innovation.
| Stifles Innovation | Key Indicators | Fosters Innovation | Key Indicators |
|---|---|---|---|
| Fixed mindset | "It is what it is" | Growth mindset | "I wonder if there's a better way" |
| Performance focused | "It's working fine" | Learning focused | "What can we learn from this?" |
| Fear of reprisal | "I'll get in trouble" | Psychological safety | "I can disagree" |
| Apathy | "We've always done it this way" | Curiosity | "I wonder what would happen if…" |
| Cynicism | "It will never work" | Trust | "You have good judgement" |
| Punishing failure | "Who did this?" | Willingness to fail | "It's okay to make mistakes" |
| Individualism | "How does this benefit me?" | Collaboration | "How does this benefit us?" |
| Homogeneity | "We never disagree" | Diversity and inclusion | "We appreciate different views" |
| Excessive bureaucracy | "We need approval" | Autonomy | "I can do this" |
| Risk avoidance | "We can't try that" | Appropriate risk-taking | "How can we do this safely?" |
Ensure you are not inadvertently stifling innovation.
Review the following to ensure that the desired behaviors are promoted:
INDUSTRY: Commercial Real Estate and Retail
SOURCE: Interview
This anonymous national organization owned commercial properties across the country and had the goal of becoming the most innovative real estate and retail company in the market.
The organization pursued innovation in the digital solutions space across its commercial and retail properties. Within this space, there were significant differences in risk tolerance across teams, which resulted in the more risk-tolerant teams excluding the risk-averse members from discussions in order to circumvent corporate policies on risk tolerance. This resulted in an adversarial and siloed culture where each group believed they knew better than the other, and the more risk-averse teams felt like they were policing the actions of the risk-tolerant group.
Morale plummeted, and many of the organization's top people left. Unfortunately, one of the solutions did not meet regulatory requirements, and the company faced negative media coverage and legal action. There was significant reputational damage as a result.
Considering differences in risk tolerance and risk appetite is critical when pursuing innovation. While everyone doesn't have to agree, leadership needs to understand the different perspectives and ensure that no one party is dominating the conversation over the others. An understanding of corporate risk tolerance and risk appetite is necessary to drive innovation.
All perspectives have a place in innovation. More risk tolerant perspectives should be involved early in the ideas-generation phase, and risk-averse perspectives should be considered later when ideas are being refined.
Speed should not override safety or circumvent corporate policies.
It is more important to match the level of risk tolerance to the degree of innovation required. Not all innovation needs to be (or can feasibly be) disruptive.
Many factors impact risk tolerance including:
Use Info-Tech's Security Risk Management research to better understand risk tolerance
Input
Output
Materials
Participants
There is no one right way to pursue innovation, but some methods are better than others for specific situations and goals. Consider your existing culture, your innovation goals, and your budget when selecting the right methodology for your innovation.
| Model | Description | Advantages | Disadvantages | Good when… |
|---|---|---|---|---|
| Grassroots Innovation | Innovation is the responsibility of everyone, and there is no centralized innovation team. Ideas are piloted and scaled by the person/team which produces it. |
|
|
|
| Community of Practice | Innovation is led by a cross-divisional Community of Practice (CoP) which includes representation from across the business. Champions consult with their practice areas and bring ideas forward. |
|
|
|
| Innovation Enablement *Most often recommended* |
A dedicated innovation team with funding set aside to support pilots with a high degree of autonomy, with the role of facilitating business-led innovation. |
|
|
|
| Center of Excellence | Dedicated team responsible for leading innovation on behalf of the organization. Generally, has business relationship managers who gather ideas and liaise with the business. |
|
|
|
| Innovation Hub | An arm's length innovation team is responsible for all or much of the innovation and may not interact much with the core business. |
|
|
|
| Outsourced Innovation | Innovation is outsourced to an external organization which is not linked to the primary organization. This can take the form of working with or investing in startups. |
|
|
|
Adapted from Niklaus Gerber via Medium, 2022
For example, design thinking tends to be excellent for earlier innovation planning, while Agile can allow for faster implementation and launch of initiatives later in the process.
Consider combining two or more methodologies to create a custom approach that best suits your organization's capabilities and goals.
A robust innovation methodology ensures that the process for developing, prioritizing, selecting, implementing, and measuring initiatives is aligned with the results you are hoping to achieve.
Different types of problems (drivers for innovation) may necessitate different methodologies, or a combination of methodologies.
Hackathon: An event which brings people together to solve a well-defined problem.
Design Thinking: Creative approach that focuses on understanding the needs of users.
Lean Startup: Emphasizes rapid experimentation in order to validate business hypotheses.
Design Sprint: Five-day process for answering business questions via design, prototyping, and testing.
Agile: Iterative design process that emphasizes project management and retrospectives.
Three Horizons: Framework that looks at opportunities on three different time horizons.
Innovation Ambition Matrix: Helps organizations categorize projects as part of the core offering, an adjacent offering, or completely new.
Global Innovation Management: A process of identifying, developing and implementing new ideas, products, services, or processes using alternative thinking.
Blue Ocean Strategy: A methodology that helps organizations identify untapped market space and create new markets via unique value propositions.
Input
Output
Materials
Participants
Types of roles will depend on the purpose and size of the innovation team.
You don't need to grow them all internally. Consider partnering with vendors and other organizations to build capabilities.
Visionaries who inspire, support, and facilitate innovation across the business. Their responsibilities are to drive the culture of innovation.
Key skills and knowledge:
Sample titles:
Translate ideas into tangible business initiatives, including assisting with business cases and developing performance metrics.
Key skills and knowledge:
Sample titles:
Provide expertise in product design, delivery and management, and responsible for supporting and executing on pilot projects.
Key skills and knowledge:
Sample titles:
Visualize the whole value delivery process end-to-end to help identify the types of roles, resources, and capabilities required. These capabilities can be sourced internally (i.e. grow and hire internally) or through collaboration with centers of excellence, commercial partners, etc.
Input
Output
Materials
Participants
Master Organizational Change Management Practices
Purpose | People | Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
INDUSTRY: Government
SOURCE: Interview
The business applications group at this government agency strongly believes that innovation is key to progress and has instituted a formal innovation program as part of their agile operations. The group uses a Scaled Agile Framework (SAFe) with 2-week sprints and a 12-week program cycle.
To support innovation across the business unit, the last sprint of each cycle is dedicated toward innovation and teams do not commit to any other during these two weeks. At the end of each innovation sprint, ideas are presented to leadership and the valuable ones were either implemented initially or were given time in the next cycle of sprints for further development. This has resulted in a more innovative culture across the practice.
There have been several successful innovations since this process began. Notably, the agency had previously purchased a robotic process automation platform which was only being used for a few specific applications. One team used their innovation sprint to expand the use cases for this solution and save nearly 10,000 hours of effort.

Your operating model should include several steps including ideation, validation, evaluation and prioritization, piloting, and a retrospective which follows the pilot. Use the example on this slide when designing your own innovation operating model.
Design Thinking
A structured approach that encourages participants to think creatively about the needs of the end user.
Ideation Workshop
A formal session that is used to understand a problem then generate potential solutions. Workshops can incorporate the other methodologies (such as brainstorming, design thinking, or mind mapping) to generate ideas.
Crowdsourcing
An informal method of gathering ideas from a large group of people. This can be a great way to generate many ideas but may lack focus.
Value Proposition Canvas
A visual tool which helps to identify customer (or user) needs and design products and services that meet those needs.
Evaluation should be transparent and use both quantitative and qualitative metrics. The exact metrics used will depend on your organization and goals.
It is important to include qualitative metrics as these dimensions are better suited to evaluating highly innovative ideas and can capture important criteria like alignment with overall strategy and feasibility.
Develop 5 to 10 criteria that you can use to evaluate and prioritize ideas. Some criteria may be a pass/fail (for example, minimum ROI) and some may be comparative.
Evaluate
The first step is to evaluate ideas to determine if they meet the minimum criteria. This might include quantitative criteria like ROI as well as qualitative criteria like strategic alignment and feasibility.
Prioritize
Ideas that pass the initial evaluation should be prioritized based on additional criteria which might include quantitative criteria such as potential market size and cost to implement, and qualitative criteria such as risk, impact, and creativity.
Quantitative metrics are objective and easily comparable between initiatives, providing a transparent and data-driven process for evaluation and prioritization.
Examples:
Qualitative metrics are less easily comparable but are equally important when it comes to evaluating ideas. These should be developed based on your organization strategy and innovation goals.
Examples:
Input
Output
Materials
Participants
Download the Initiative Prioritization Template
"Learning is as powerful as the outcome." – Brett Trelfa, CIO, Arkansas Blue Cross
Adoption: How many end users have adopted the pilot solution?
Utilization: Is the solution getting utilized?
Support Requests: How many support requests have there been since the pilot was initiated?
Value: Is the pilot delivering on the value that it proposed? For example, time savings.
Feasibility: Has the feasibility of the solution changed since it was first proposed?
Satisfaction: Focus groups or surveys can provide feedback on user/customer satisfaction.
A/B Testing: Compare different methods, products or services.
Ensure standard core metrics are used across all pilot projects so that outcomes can be compared. Additional metrics may be used to refine and test hypotheses through the pilot process.
Input
Output
Materials
Participants
A retrospective is a review of your innovation program with the aim of identifying lessons learned, areas for improvement, and opportunities for growth.
During a retrospective, the team will reflect on past experiences and use that information to inform future decision making and improve outcomes.
The goal of a retrospective is to learn from the past and use that knowledge to improve in the future.
Ensure that the retrospective is based on facts and objective data, rather than personal opinions or biases.
Ensure that the retrospective is a positive and constructive experience, with a focus on finding solutions rather than dwelling on problems.
The retrospective should result in a clear action plan with specific steps to improve future initiatives.
Input
Output
Materials
Participants
Adopt Design Thinking in Your Organization
Prototype With an Innovation Design Sprint
Fund Innovation With a Minimum Viable Business Case
You have now completed your innovation strategy, covering the following topics:
If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Accelerate Digital Transformation With a Digital Factory
Sustain and Grow the Maturity of Innovation in Your Enterprise
Define Your Digital Business Strategy
Kim Osborne Rodriguez
Research Director, CIO Advisory
Info-Tech Research Group
Kim is a professional engineer and Registered Communications Distribution Designer with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach, with a track record of supporting successful projects.
Kim holds a Bachelor's degree in Mechatronics Engineering from University of Waterloo.
Joanne Lee
Principal Research Director, CIO Advisory
Info-Tech Research Group
Joanne is an executive with over 25 years of experience in digital technology and management consulting across both public and private entities from solution delivery to organizational redesign across Canada and globally.
Prior to joining Info-Tech Research Group, Joanne was a management consultant within KPMG's CIO management consulting services and the Western Canadas Digital Health Practice lead. She has held several executive roles in the industry with the most recent position as Chief Program Officer for a large $450M EHR implementation. Her expertise spans cloud strategy, organizational design, data and analytics, governance, process redesign, transformation, and PPM. She is passionate about connecting people, concepts, and capital.
Joanne holds a Master's in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.
Jack Hakimian
Senior Vice President
Info-Tech Research Group
Jack has more than 25 years of technology and management consulting experience. He has served multi-billion-dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served a number of large public sector institutions.
He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master's degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.
Michael Tweedie
Practice Lead, CIO Strategy
Info-Tech Research Group
Mike Tweedie brings over 25 years as a technology executive. He's led several large transformation projects across core infrastructure, application, and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management.
Mike holds a Bachelor's degree in Architecture from Ryerson University.
Mike Schembri
Senior Executive Advisor
Info-Tech Research Group
Mike is the former CIO of Fuji Xerox Australia and has 20+ years' experience serving IT and wider business leadership roles. Mike has led technical and broader business service operations teams to value and growth successfully in organizations ranging from small tech startups through global IT vendors, professional service firms, and manufacturers.
Mike has passion for strategy and leadership and loves working with individuals/teams and seeing them grow.
John Leidl
Senior Director, Member Services
Info-Tech Research Group
With over 35 years of IT experience, including senior-level VP Technology and CTO leadership positions, John has a breadth of knowledge in technology innovation, business alignment, IT operations, and business transformation. John's experience extends from start-ups to corporate enterprise and spans higher education, financial services, digital marketing, and arts/entertainment.
Joe Riley
Senior Workshop Director
Info-Tech Research Group
Joe ensures our members get the most value out of their Info-Tech memberships by scoping client needs, current state and desired business outcomes, and then drawing upon his extensive experience, certifications, and degrees (MBA, MS Ops/Org Mgt, BS Eng/Sci, ITIL, PMP, Security+, etc.) to facilitate our client's achievement of desired and aspirational business outcomes. A true advocate of ITSM, Joe approaches technology and technology practices as a tool and enabler of people, core business, and competitive advantage activities.
Denis Goulet
Senior Workshop Director
Info-Tech Research Group
Denis is a transformational leader and experienced strategist who has worked with 100+ organizations to develop their digital, technology, and governance strategies.
He has held positions as CIO, Chief Administrative Office (City Manager), General Manager, Vice President of Engineering, and Management Consultant, specializing in enterprise and technology strategy.
Cole Cioran
Managing Partner
Info-Tech Research Group
I knew I wanted to build great applications that would delight their users. I did that over and over. Along the way I also discovered that it takes great teams to deliver great applications. Technology only solves problems when people, processes, and organizations change as well. This helped me go from writing software to advising some of the largest organizations in the world on how to how to build a digital delivery umbrella of Product, Agile, and DevOps and create exceptional products and services powered by technology.
Carlene McCubbin
Research Lead, CIO Practice
Info-Tech Research Group
During her tenure at Info-Tech, Carlene has led the development of Info-Tech's Organization and Leadership practice and worked with multiple clients to leverage the methodologies by creating custom programs to fit each organization's needs.
Before joining Info-Tech, Carlene received her Master of Communications Management from McGill University, where she studied development of internal and external communications, government relations, and change management.
Isabelle Hertanto
Principal Research Director
Info-Tech Research Group
Isabelle Hertanto has over 15 years of experience delivering specialized IT services to the security and intelligence community. As a former federal officer for Public Safety Canada, Isabelle trained and led teams on data exploitation and digital surveillance operations in support of Canadian national security investigations. Since transitioning into the private sector, Isabelle has held senior management and consulting roles across a variety of industry sectors, including retail, construction, energy, healthcare, and the broader Canadian public sector.
Hans Eckman
Principal Research Director
Info-Tech Research Group
Hans Eckman is a business transformation leader helping organizations connect business strategy and innovation to operational excellence. He supports Info-Tech members in SDLC optimization, Agile and DevOps implementation, CoE/CoP creation, innovation program development, application delivery, and leadership development. Hans is based out of Atlanta, Georgia.
Valence Howden
Principal Research Director
Info-Tech Research Group
With 30 years of IT experience in the public and private sector, Valence has developed experience in many Information Management and Technology domains, with a particular focus in the areas of Service Management, Enterprise and IT Governance, Development and Execution of Strategy, Risk Management, Metrics Design and Process Design, and Implementation and Improvement. Prior to joining Info-Tech, he served in technical and client-facing roles at Bell Canada and CGI Group Inc., as well as managing the design, integration, and implementation of services and processes in the Ontario Public Sector.
Clayton Gillett
Managing Partner
Info-Tech Research Group
Clayton Gillett is a Managing Partner for Info-Tech, providing technology management advisory services to healthcare clients. Clayton joined Info-Tech with more than 28 years of experience in health care information technology. He has held senior IT leadership roles at Group Health Cooperative of Puget Sound and OCHIN, as well as advisory or consulting roles at ECG Management Consultants and Gartner.
Donna Bales
Principal Research Director
Info-Tech Research Group
Donna Bales is a Principal Research Director in the CIO Practice at Info-Tech Research Group specializing in research and advisory services in IT risk, governance, and compliance. She brings over 25 years of experience in strategic consulting and product development and has a history of success in leading complex, multi-stakeholder industry initiatives.
Igor Ikonnikov
Research Director
Info-Tech Research Group
Igor Ikonnikov is a Research and Advisory Director in the Data and Analytics practice. Igor has extensive experience in strategy formation and execution in the information management domain, including master data management, data governance, knowledge management, enterprise content management, big data, and analytics.
Igor has an MBA from the Ted Rogers School of Management (Toronto, Canada) with a specialization in Management of Technology and Innovation.
Michael Newcity
Chief Innovation Officer
ArcBest
Kevin Yoder
Vice President, Innovation
ArcBest
Gary Boyd
Vice President, Information Systems & Digital Transformation
Arkansas Blue Cross and Blue Shield
Brett Trelfa
Chief Information Officer
Arkansas Blue Cross and Blue Shield
Kristen Wilson-Jones
Chief Technology & Product Officer
Medcurio
Note: additional contributors did not wish to be identified
Altringer, Beth. "A New Model for Innovation in Big Companies" Harvard Business Review. 19 Nov. 2013. Accessed 30 Jan. 2023. https://hbr.org/2013/11/a-new-model-for-innovation-in-big-companies
Arpajian, Scott. "Five Reasons Why Innovation Fails" Forbes Magazine. 4 June 2019. Accessed 31 Jan. 2023. https://www.forbes.com/sites/forbestechcouncil/2019/06/04/five-reasons-why-innovation-fails/?sh=234e618914c6
Baldwin, John & Gellatly, Guy. "Innovation Capabilities: The Knowledge Capital Behind the Survival and Growth of Firms" Statistics Canada. Sept. 2006. Accessed 30 Jan. 2023. https://www.bdc.ca/fr/documents/other/innovation_capabilities_en.pdf
Bar Am, Jordan et al. "Innovation in a Crisis: Why it is More Critical Than Ever" McKinsey & Company, 17 June 2020. Accessed 12 Jan. 2023. <https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/innovation-in-a-crisis-why-it-is-more-critical-than-ever >
Boston Consulting Group, "Most Innovative Companies 2021" BCG, April 2021. Accessed 30 Jan. 2023. https://web-assets.bcg.com/d5/ef/ea7099b64b89860fd1aa3ec4ff34/bcg-most-innovative-companies-2021-apr-2021-r.pdf
Boston Consulting Group, "Most Innovative Companies 2022" BGC, 15 Sept. 2022. Accessed 6 Feb. 2023. https://www.bcg.com/en-ca/publications/2022/innovation-in-climate-and-sustainability-will-lead-to-green-growth
Christensen, Clayton M. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business Review Press, 2016.
Gerber, Niklaus. "What is innovation? A beginner's guide into different models, terminologies and methodologies" Medium. 20 Sept 2022. Accessed 7 Feb. 2023. https://world.hey.com/niklaus/what-is-innovation-a-beginner-s-guide-into-different-models-terminologies-and-methodologies-dd4a3147
Google X, Homepage. Accessed 6 Feb. 2023. https://x.company/
Harnoss, Johann D. & Baeza, Ramón. "Overcoming the Four Big Barriers to Innovation Success" Boston Consulting Group, 24 Sept. 2019. Accessed 30 Jan 2023. https://www.bcg.com/en-ca/publications/2019/overcoming-four-big-barriers-to-innovation-success
Jaruzelski, Barry et al. "Global Innovation 1000 Study" Pricewaterhouse Cooper, 30 Oct. 2018. Accessed 13 Jan. 2023. <https://www.strategyand.pwc.com/gx/en/insights/innovation1000.html>
Kharpal, Arjun. "Huawei posts first-ever yearly revenue decline as U.S. sanctions continue to bite, but profit surges" CNBC. 28 March 2022. Accessed 7 Feb. 2023. https://www.cnbc.com/2022/03/28/huawei-annual-results-2021-revenue-declines-but-profit-surges.html
Kirsner, Scott. "The Biggest Obstacles to Innovation in Large Companies" Harvard Business Review, 30 July 2018. Accessed 12 Jan. 2023. <https://hbr.org/2018/07/the-biggest-obstacles-to-innovation-in-large-companies>
Macrotrends. "Apple Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AAPL/apple/revenue
Macrotrends. "Microsoft Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MSFT/microsoft/revenue
Macrotrends. "Amazon Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
Macrotrends. "Alphabet Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/GOOG/alphabet/revenue
Macrotrends. "Tesla Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/TSLA/tesla/revenue
Macrotrends. "Moderna Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MRNA/moderna/revenue
Macrotrends. "Sony Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/SONY/sony/revenue
Macrotrends. "IBM Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/IBM/ibm/revenue
Macrotrends. "Meta Platforms Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/META/meta-platforms/revenue
Macrotrends. "NIKE Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NKE/nike/revenue
Macrotrends. "Walmart Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/WMT/walmart/revenue
Macrotrends. "Dell Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/DELL/dell/revenue
Macrotrends. "NVIDIA Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NVDA/nvidia/revenue
Sloan, Paul. "How to Develop a Vision for Innovation" Innovation Management, 10 Aug. 2009. Accessed 7 Feb. 2023. https://innovationmanagement.se/2009/08/10/how-to-develop-a-vision-for-innovation/
Statista. "Samsung Electronics' global revenue from 2005 to 2021" Statista. Accessed 7 Feb. 2023. https://www.statista.com/statistics/236607/global-revenue-of-samsung-electronics-since-2005/
Tichy, Noel & Ram Charan. "Speed, Simplicity, Self-Confidence: An Interview with Jack Welch" Harvard Business Review, 2 March 2020. Accessed 7 Feb. 2023. https://hbr.org/1989/09/speed-simplicity-self-confidence-an-interview-with-jack-welch
Weick, Karl and Kathleen Sutcliffe. Managing the Unexpected: Sustained Performance in a Complex World, Third Edition. John Wiley & Sons, 2015.
Xuan Tian, Tracy Yue Wang, Tolerance for Failure and Corporate Innovation, The Review of Financial Studies, Volume 27, Issue 1, 2014, Pages 211–255, Accessed https://doi.org/10.1093/rfs/hhr130
Product, service, and process design should always start with an intimate understanding of what the business is trying to accomplish and why it is important.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify goals and objectives for experience design, establish targeted stakeholders, and conduct discovery interviews.
Create the journey map, design a research study to validate your hypotheses, and iterate and ideate around a refined, data-driven understanding of stakeholder problems.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the method and purpose of journey mapping.
Initial understanding of the journey mapping process and the concept of end-user empathy.
1.1 Introduce team and discuss workshop motivations and goals.
1.2 Discuss overview of journey mapping process.
1.3 Perform journey mapping case study activity.
Case Study Deliverables – Journey Map and Empathy Maps
Begin to understand the goals and motivations of your stakeholders using customer segmentation and an empathy mapping exercise.
Understand the demographic and psychographic factors driving stakeholder behavior.
2.1 Discuss psychographic stakeholder segmentation.
2.2 Create empathy maps for four segments.
2.3 Generate problem statements.
2.4 Identify target market.
Stakeholder personas
Target market of IT
Get first-hand knowledge of stakeholder needs and start to capture their perspective with a first-iteration journey map.
Capture the process stakeholders use to solve problems and empathize with their perspectives, pains, and gains.
3.1 Review discovery interviewing techniques.
3.2 Review and modify the discovery questionnaire
3.3 Demonstrate stakeholder interview.
3.4 Synthesize learnings and begin creating a journey map.
Customized discovery interview template
Results of discovery interviewing
Hypothesize the stakeholder journey, identify assumptions, plan a research study to validate your understanding, and ideate around critical junctures in the journey.
Understand the stakeholder journey and ideate solutions with the intention of improving their experience with IT.
4.1 Finish the journey map.
4.2 Identify assumptions and create hypotheses.
4.3 Discuss field research and hypothesis testing.
4.4 Design the research study.
4.5 Discuss concluding remarks and next steps.
Completed journey map for one IT process, product, or service
Research study design and action plan
Your newly hybrid workplace will include virtual, hybrid, and physical meetings, presenting several challenges:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the problem before you try to fix it. Before you can improve meetings, you need to understand what your norms and challenges currently are.
Document meeting roles, expectations, and how meetings should run. Decide what kind of meeting delivery model to use and develop a training program.
Always be consulting with users: early in the process to set a benchmark, during and after every meeting to address immediate concerns, and quarterly to identify trends and deeper issues.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the current state of meetings in your organization.
What you need to keep doing and what you need to change
1.1 Brainstorm meeting types.
1.2 Document meeting norms.
1.3 Document and categorize meeting challenges.
Documented challenges with meetings
Meeting norms
Desired changes to meeting norms
Review and implement meeting best practices.
Defined meeting best practices for your organization
2.1 Document meeting roles and expectations.
2.2 Review common meeting challenges and identify best practices.
2.3 Document when to use a hybrid meeting, virtual meeting, or an in-person meeting.
2.4 Develop a training program.
Meeting roles and expectations
List of meeting best practices
Guidelines to help workers choose between a hybrid, virtual, or in-person meeting
Training plan for meetings
Identify opportunities to improve meeting technology.
A strategy for improving the underlying technologies and meeting spaces
3.1 Empower virtual meeting attendees.
3.2 Optimize spaces for hybrid meetings.
3.3 Build a team of meeting champions.
3.4 Iterate to build and improve meeting technology.
3.5 Guide users toward each technology.
Desired improvements to meeting rooms and meeting technology
Charter for the team of meeting champions
Communications Guide Poster
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess whether you’re ready to optimize the service desk with a shift-left strategy, get buy-in for the initiative, and define metrics to measure success.
Build strategy and identify specific opportunities to shift service support left to Level 1 through knowledge sharing and other methods, to the end-user through self-service, and to automation and AI.
Identify, track, and implement specific shift-left opportunities and document a communications plan to increase adoption.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define how shift left would apply in your organization, get buy-in for the initiative, and define metrics to measure success.
Defined scope and objectives for the shift-left initiative
Buy-in for the program
Metrics to keep the project on track and evaluate success
1.1 Review current service desk structure
1.2 Discuss challenges
1.3 Review shift-left model and discuss how it would apply in your organization
1.4 Complete the Shift-Left Prerequisites Assessment
1.5 Complete a RACI chart for the project
1.6 Define and document objectives
1.7 Review the stakeholder buy-in presentation
1.8 Document critical success factors
1.9 Define KPIs and metrics
Shift-left scope
Completed shift-left prerequisites assessment
RACI chart
Defined objectives
Stakeholder buy-in presentation
Critical success factors
Metrics to measure success
Build strategy and identify specific opportunities to shift service support left to Level 1 through knowledge sharing and other methods.
Identified initiatives to shift work to Level 1
Documented knowledge management process workflows and strategy
2.1 Identify barriers to Level 1 resolution
2.2 Discuss knowledgebase challenges and areas for improvement
2.3 Optimize KB input process
2.4 Optimize KB usage process
2.5 Optimize KB review process
2.6 Discuss and document KCS strategy and roles
2.7 Document knowledge success metrics
2.8 Brainstorm additional methods of increasing FLR
KB input workflow
KB usage workflow
KB review workflow
KCS strategy and roles
Knowledge management metrics
Identified opportunities to shift to Level 1
Build strategy and identify specific opportunities to shift service support left to the end user through self-service and to automation and AI.
Identified initiatives to shift work to self-service and automation
Evaluation of self-service portal and identified opportunities for improvement
3.1 Review existing self-service portal and discuss vision
3.2 Identify opportunities to improve portal accessibility, UI, and features
3.3 Evaluate the user-facing knowledgebase
3.4 Optimize the ticket intake form
3.5 Document plan to improve, communicate, and evaluate portal
3.6 Map the user experience with a workflow
3.7 Document your AI strategy
3.8 Identify candidates for automation
Identified opportunities to improve portal
Improvements to knowledgebase
Improved ticket intake form
Strategy to communicate and measure success of portal
Self-service resolution workflow
Strategy to apply AI and automation
Identified opportunities to shift tasks to automation
Build an action plan to implement shift left, including a communications strategy.
Action plan to track and implement shift-left opportunities
Communications plan to increase adoption
4.1 Examine process workflows for shift-left opportunities
4.2 Document shift-left-specific responsibilities for each role
4.3 Identify and track shift-left opportunities in the action plan
4.4 Brainstorm objections and responses
4.5 Document communications plan
Incident management workflow with shift-left opportunities
Shift left responsibilities for key roles
Shift-left action plan
Objection handling responses
Communications plan
Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organizational value streams and their business capabilities with key data governance dimensions and initiatives. Info-Tech's approach will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Data governance is a strategic program that will help your organization control data by managing the people, processes, and information technology needed to ensure that accurate and consistent data policies exist across varying lines of the business, enabling data-driven insight. This research will provide an overview of data governance and its importance to your organization, assist in making the case and securing buy-in for data governance, identify data governance best practices and the challenges associated with them, and provide guidance on how to implement data governance best practices for a successful launch.
This workbook will help your organization understand the business and user context by leveraging your business capability map and value streams, develop data use cases using Info-Tech's framework for building data use cases, and gauge the current state of your organization's data culture.
This business needs gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization. This template provides a framework for data requirements and a mapping methodology for creating use cases.
This tool will help your organization plan the sequence of activities, capture start dates and expected completion dates, and create a roadmap that can be effectively communicated to the organization.
Use this template to document information about key data assets such as data definition, source system, possible values, data sensitivity, data steward, and usage of the data.
This template will help get the backing required to get a data governance project rolling. The program charter will help communicate the project purpose, define the scope, and identify the project team, roles, and responsibilities.
This policy establishes uniform data governance standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of your organization.
Use this exemplar to understand how to establish data governance in your organization. Follow along with the sections of the blueprint Establish Data Governance and complete the document as you progress.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify key business data assets that need to be governed.
Create a unifying vision for the data governance program.
Understand the value of data governance and how it can help the organization better leverage its data.
Gain knowledge of how data governance can benefit both IT and the business.
1.1 Establish business context, value, and scope of data governance at the organization
1.2 Introduction to Info-Tech’s data governance framework
1.3 Discuss vision and mission for data governance
1.4 Understand your business architecture, including your business capability map and value streams
1.5 Build use cases aligned to core business capabilities
Sample use cases (tied to the business capability map) and a repeatable use case framework
Vision and mission for data governance
Assess which data contains value and/or risk and determine metrics that will determine how valuable the data is to the organization.
Assess where the organization currently stands in data governance initiatives.
Determine gaps between the current and future states of the data governance program.
Gain a holistic understanding of organizational data and how it flows through business units and systems.
Identify which data should fall under the governance umbrella.
Determine a practical starting point for the program.
2.1 Understand your current data governance capabilities and maturity
2.2 Set target-state data governance capabilities
Current state of data governance maturity
Definition of target state
Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.
Determine timing of the initiatives.
Establish clear direction for the data governance program.
Step-by-step outline of how to create effective data governance, with true business-IT collaboration.
3.1 Evaluate and prioritize performance gaps
3.2 Develop and consolidate data governance target-state initiatives
3.3 Define the role of data governance: data domain to data governance role mapping
Target-state data governance initiatives
Data domain to data governance role mapping
Consolidate the roadmap and other strategies to determine the plan of action from Day One.
Create the required policies, procedures, and positions for data governance to be sustainable and effective.
Prioritized initiatives with dependencies mapped out.
A clearly communicated plan for data governance that will have full business backing.
4.1 Identify and prioritize next steps
4.2 Define roles and responsibilities and complete a high-level RACI
4.3 Wrap-up and discuss next steps and post-workshop support
Initialized roadmap
Initialized RACI
Data governance does not sit as an island on its own in the organization – it must align with and be driven by your enterprise governance. As you build out data governance in your organization, it’s important to keep in mind that this program is meant to be an enabling framework of oversight and accountabilities for managing, handling, and protecting your company’s data assets. It should never be perceived as bureaucratic or inhibiting to your data users. It should deliver agreed-upon models that are conducive to your organization’s operating culture, offering clarity on who can do what with the data and via what means. Data governance is the key enabler for bringing high-quality, trusted, secure, and discoverable data to the right users across your organization. Promote and drive the responsible and ethical use of data while helping to build and foster an organizational culture of data excellence.
Crystal Singh
Director, Research & Advisory, Data & Analytics Practice
Info-Tech Research Group
The amount of data within organizations is growing at an exponential rate, creating a need to adopt a formal approach to governing data. However, many organizations remain uninformed on how to effectively govern their data. Comprehensive data governance should define leadership, accountability, and responsibility related to data use and handling and be supported by a well-oiled operating model and relevant policies and procedures. This will help ensure the right data gets to the right people at the right time, using the right mechanisms.
Organizations are faced with challenges associated with changing data landscapes, evolving business models, industry disruptions, regulatory and compliance obligations, and changing and maturing user landscape and demand for data. Although the need for a data governance program is often evident, organizations miss the mark when their data governance efforts are not directly aligned to delivering measurable business value. Initiatives should support key strategic initiatives, as well as value streams and their underlying business capabilities.
Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organizational value streams and their business capabilities with key data governance dimensions and initiatives. Organizations should:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operating costs, missed opportunities, eroded stakeholder satisfaction, and increased business risk.
As you embark on establishing data governance in your organization, it’s vital to ensure from the get-go that you define the drivers and business context for the program. Data governance should never be attempted without direction on how the program will yield measurable business value.
“Data processing and cleanup can consume more than half of an analytics team’s time, including that of highly paid data scientists, which limits scalability and frustrates employees.” – Petzold, et al., 2020
“The productivity of employees across the organization can suffer.” – Petzold, et al., 2020
Respondents to McKinsey’s 2019 Global Data Transformation Survey reported that an average of 30% of their total enterprise time was spent on non-value-added tasks because of poor data quality and availability. – Petzold, et al., 2020
78% of companies (and 92% of top-tier companies) have a corporate initiative to become more data-driven. – Alation, 2020
But despite these ambitions, there appears to be a “data culture disconnect” – 58% of leaders overestimate the current data culture of their enterprises, giving a grade higher than the one produced by the study. – Fregoni, 2020
Respond to industry disruptors
Optimize the way you serve your stakeholders and customers
Develop products and services to meet ever-evolving needs
Manage operations and mitigate risk
Data Disengaged
You have a low appetite for data and rarely use data for decision making.
Data Enabled
Technology, data architecture, and people and processes are optimized and supported by data governance.
Data Driven
You are differentiating and competing on data and analytics; described as a “data first” organization. You’re collaborating through data. Data is an asset.
Data governance is an enabling framework of decision rights, responsibilities, and accountabilities for data assets across the enterprise.
Data governance is:
If done correctly, data governance is not:
Conformance: Establishing data governance to meet regulations and compliance requirements.
Performance: Establishing data governance to fuel data-driven decision making for driving business value and managing and mitigating business risk.
“Albert Einstein is said to have remarked, ‘The world cannot be changed without changing our thinking.’ What is clear is that the greatest barrier to data success today is business culture, not lagging technology. “– Randy Bean, 2020
“It is not enough for companies to embrace modern data architectures, agile methodologies, and integrated business-data teams, or to establish centers of excellence to accelerate data initiatives, when only about 1 in 4 executives reported that their organization has successfully forged a data culture.”– Randy Bean, 2020
Data-driven culture = “data matters to our company”
Data debt is “the accumulated cost that is associated with the sub-optimal governance of data assets in an enterprise, like technical debt.”
Data debt is a problem for 78% of organizations.
40% of organizations say individuals within the business do not trust data insights.
66% of organizations say a backlog of data debt is impacting new data management initiatives.
33% of organizations are not able to get value from a new system or technology investment.
30% of organizations are unable to become data-driven.
Source: Experian, 2020
Only 3% of companies’ data meets basic quality standards. (Source: Nagle, et al., 2017)
Organizations suspect 28% of their customer and prospect data is inaccurate in some way. (Source: Experian, 2020)
Only 51% of organizations consider the current state of their CRM or ERP data to be clean, allowing them to fully leverage it. (Source: Experian, 2020)
35% of organizations say they’re not able to see a ROI for data management initiatives. (Source: Experian, 2020)
Make the available data governance tools and technology work for you:
While data governance tools and technologies are no panacea, leverage their automated and AI-enabled capabilities to augment your data governance program.
Put data governance into the context of the business:
Start substantiating early on how you are going to measure success as your data governance program evolves.
Key considerations:
Data Governance Leadership & Org Structure Definition
Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.
Data Governance Charter and Policies
Create a charter for your program and build/refresh associated policies.
Data Culture Diagnostic
Understand the organization’s current data culture, perception of data, value of data, and knowledge gaps.
Use Case Build and Prioritization
Build a use case that is tied to business capabilities. Prioritize accordingly.
Business Data Glossary
Build and/or refresh the business’ glossary for addressing data definitions and standardization issues.
Tools & Technology
Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).
Data governance leadership and sponsorship is key.
Ensure strategic business alignment.
Build and foster a culture of data excellence.
Evolve along the data journey.
Make data governance an enabler, not a hindrance.
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face the impact of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Data governance should not sit as an island in your organization. It must continuously align with the organization’s enterprise governance function. It shouldn’t be perceived as a pet project of IT, but rather as an enterprise-wide, business-driven initiative.
Ensure your data governance program delivers measurable business value by aligning the associated data governance initiatives with the business architecture. Leverage the measures of success or KPIs of the underlying business capabilities to demonstrate the value data governance has yielded for the organization.
Data governance remains the foundation of all forms of reporting and analytics. Advanced capabilities such as AI and machine learning require effectively governed data to fuel their success.
Tailor your data literacy program to meet your organization’s needs, filling your range of knowledge gaps and catering to your different levels of stakeholders. When it comes to rolling out a data literacy program, there is no one-size-fits-all solution. Your data literacy program is intended to fill the knowledge gaps about data, as they exist in your organization. It should be targeted across the board – from your executive leadership and management through to the subject matter experts across different lines of the business in your organization.
| 1. Build Business and User Context | 2. Understand Your Current Data Governance Capabilities | 3. Build a Target State Roadmap and Plan | |
|---|---|---|---|
| Phase Steps |
|
|
|
| Phase Outcomes |
|
|
|
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Data Governance Planning and Roadmapping Workbook
Use the Data Governance Planning and Roadmapping Workbook as you plan, build, roll-out, and scale data governance in your organization.
Data Use Case Framework Template
This template takes you through a business needs gathering activity to highlight and create relevant use cases around the organization’s data-related problems and opportunities.
Business Data Glossary
Use this template to document the key data assets that are to be governed and create a data flow diagram for your organization.
Data Culture Diagnostic and Scorecard
Leverage Info-Tech’s Data Culture Diagnostic to understand how your organization scores across 10 areas relating to data culture.
Data Governance Planning and Roadmapping Workbook
In phases 1 and 2 of this blueprint, we will help you establish the business context, define your business drivers and KPIs, and understand your current data governance capabilities and strengths.
In phase 3, we will help you develop a plan and a roadmap for addressing any gaps and improving the relevant data governance capabilities so that data is well positioned to deliver on those defined business metrics.
"Our team, has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
| 1. Build Business and User context | 2. Understand Your Current Data Governance Capabilities | 3. Build a Target State Roadmap and Plan | |
|---|---|---|---|
| Best-Practice Toolkit |
|
|
|
| Guided Implementation |
|
|
|
| Phase Outcomes |
|
|
|
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.
| Day 1 | Day 2 | Day 3 | Day 4 | |
|---|---|---|---|---|
| Establish Business Context and Value | Understand Current Data Governance Capabilities and Plot Target-State Levels | Build Data Domain to Data Governance Role Mapping | Formulate a Plan to Get to Your Target State | |
| Activities |
|
|
|
|
| Deliverables |
|
|
|
|
“When business users are invited to participate in the conversation around data with data users and IT, it adds a fundamental dimension — business context. Without a real understanding of how data ties back to the business, the value of analysis and insights can get lost.” – Jason Lim, Alation
This phase will guide you through the following activities:
This phase involves the following participants:
Activities
1.1.1 Identify Your Business Capabilities
1.1.2 Categorize Your Organization’s Key Business Capabilities
1.1.3 Develop a Strategy Map Tied to Data Governance
This step will guide you through the following activities:
Outcomes of this step
Gaining a sound understanding of your business architecture (value streams and business capabilities) is a critical foundation for establishing and sustaining a data governance program that delivers measurable business value.
Confirm your organization's existing business capability map or initiate the formulation of a business capability map:
Note: A business capability defines what a business does to enable value creation. Business capabilities are business terms defined using descriptive nouns such as “Marketing” or “Research and Development.” They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome.
Input
Output
Materials
Participants
For more information, refer to Info-Tech’s Document Your Business Architecture.
Value streams connect business goals to the organization’s value realization activities. These value realization activities, in turn, depend on data.
If the organization does not have a business architecture function to conduct and guide Activity 1.1.1, you can leverage the following approach:
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face the possibilities of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, negative impact to reputation and brand, and/or increased exposure to business risk.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Info-Tech’s Industry Reference Architecture for Retail Banking.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Higher Education.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Local Government.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Manufacturing.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Retail.
A business capability defines what a business does to enable value creation. Business capabilities represent stable business functions and typically will have a defined business outcome.
Business capabilities can be thought of as business terms defined using descriptive nouns such as “Marketing” or “Research and Development.”
If your organization doesn’t already have a business capability map, you can leverage the following approach to build one. This initiative requires a good understanding of the business. By working with the right stakeholders, you can develop a business capability map that speaks a common language and accurately depicts your business.
Working with the stakeholders as described above:
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
For more information, refer to Info-Tech’s Document Your Business Architecture.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Retail Banking
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail Banking.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Higher Education
For this business capability map, download Info-Tech’s Industry Reference Architecture for Higher Education.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Local Government
For this business capability map, download Info-Tech’s Industry Reference Architecture for Local Government.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Manufacturing
For this business capability map, download Info-Tech’s Industry Reference Architecture for Manufacturing.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Retail
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail.
Determine which capabilities are considered high priority in your organization.
This categorization/prioritization exercise helps highlight prime areas of opportunity for building use cases, determining prioritization, and the overall optimization of data and data governance.
Input
Output
Materials
Participants
For more information, refer to Info-Tech’s Document Your Business Architecture.
This exercise is useful in ensuring the data governance program is focused and aligned to support the priorities and direction of the business.
Example: Retail
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail.
Identify the strategic objectives for the business. Knowing the key strategic objectives will drive business-data governance alignment. It’s important to make sure the right strategic objectives of the organization have been identified and are well understood.
Guide to creating your map: Starting with strategic objectives, map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance to initiatives that support those capabilities. This is one approach to help you prioritize the data initiatives that deliver the most value to the organization.
Input
Output
Materials
Participants
Download Info-Tech’s Data Governance Planning and Roadmapping Workbook
Start with the strategic objectives, then map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance initiatives that support those capabilities. This process will help you prioritize the data initiatives that deliver the most value to the organization.
Example: Retail
For this strategy map, download Info-Tech’s Industry Reference Architecture for Retail.
Activities
1.2.1 Build High-Value Use Cases
This step will guide you through the following activities:
Outcomes of this step
One of the most important aspects when building use cases is to ensure you include KPIs or measures of success. You have to be able to demonstrate how the use case ties back to the organizational priorities or delivers measurable business value. Leverage the KPIs and success factors of the business capabilities tied to each particular use case.
This business needs-gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization.
Tip: Don’t conclude these use case discussions without substantiating what measures of success will be used to demonstrate the business value of the effort to produce the desired future state, as relevant to each particular use case.
Input
Output
Materials
Participants
Download Info-Tech’s Data Use Case Framework Template
Leveraging your business capability map, build use cases that align with the organization’s key business capabilities.
Consider:
Info-Tech’s Data Requirements and Mapping Methodology for Creating Use Cases
The resulting use cases are to be prioritized and leveraged for informing the business case and the data governance capabilities optimization plan.
Taken from Info-Tech’s Data Use Case Framework Template
This phase will guide you through the following activities:
This phase involves the following participants:
This step will guide you through the following activities:
Outcomes of this step
A well-defined data governance program will deliver:
The key components of establishing sustainable enterprise data governance, taken from Info-Tech’s Data Governance Framework:
The office of the chief data officer (CDO):
“Compared to most of their C-suite colleagues, the CDO is faced with a unique set of problems. The role is still being defined. The chief data officer is bringing a new dimension and focus to the organization: ‘data.’ ”
– Carruthers and Jackson, 2020
“The title matters. In my opinion, you can’t have a CDO without executive authority. Otherwise no one will listen.”
– Anonymous European CDO
“The reporting structure depends on who’s the ‘glue’ that ties together all these uniquely skilled individuals.”
– John Kemp, Senior Director, Executive Services, Info-Tech Research Group
Who are best suited to be data owners?
Data owners are typically senior business leaders with the following characteristics:
Data governance working groups:
Traditionally, data stewards:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Enabling business capabilities with data governance role definitions
“Generate excitement for data: When people are excited and committed to the vision of data enablement, they’re more likely to help ensure that data is high quality and safe.” – Petzold, et al., 2020
Operating Model
Defining your data governance operating model will help create a well-oiled program that sustainably delivers value to the organization and manages risks while building and fostering a culture of data excellence along the way. Some organizations are able to establish a formal data governance office, whether independent or attached to the office of the chief data officer. Regardless of how you are organized, data governance requires a home, a leader, and an operating model to ensure its sustainability and evolution.
Examples of focus areas for your operating model:
The key is to determine what style will work best in your organization, taking into consideration your organizational culture, executive leadership support (present and ongoing), catalysts such as other enterprise-wide transformative and modernization initiatives, and/or regulatory and compliances drivers.
Furthermore, communication with the wider organization of data producers, users, and consumers is one of the core elements of the overall data governance communications plan.
Communication is vital for ensuring acceptance of new processes, rules, guidelines, and technologies by all data producers and users as well as for sharing success stories of the program.
“Leading organizations invest in change management to build data supporters and convert the skeptics. This can be the most difficult part of the program, as it requires motivating employees to use data and encouraging producers to share it (and ideally improve its quality at the source)[.]” – Petzold, et al., 2020
Examples of focus areas for your operating model (continued):
Preparing people for change well in advance will allow them to take the steps necessary to adapt and reduce potential confrontation. By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Aligning your data governance to the organization's value realization activities enables you to leverage the KPIs of those business capabilities to demonstrate tangible and measurable value. Use terms and language that will resonate with your senior business leadership.
Launching a data governance program will bring with it a level of disruption to the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
“Data standards are the rules by which data are described and recorded. In order to share, exchange, and understand data, we must standardize the format as well as the meaning.” – U.S. Geological Survey
Examples of data policies:
“Organizational culture can accelerate the application of analytics, amplify its power, and steer companies away from risky outcomes.” – Petzold, et al., 2020
What does a healthy data culture look like?
Building a culture of data excellence.
Leverage Info-Tech’s Data Culture Diagnostic to understand your organization’s culture around data.
Contact your Info-Tech Account Representative for more information on the Data Culture Diagnostic
“People are at the heart of every culture, and one of the biggest challenges to creating a data culture is bringing everyone into the fold.” – Lim, Alation
“Companies that have succeeded in their data-driven efforts understand that forging a data culture is a relentless pursuit, and magic bullets and bromides do not deliver results.” – Randy Bean, 2020
There is a trusted, single source of data the whole company can draw from.
There’s a business glossary and data catalog and users know what the data fields mean.
Users have access to data and analytics tools. Employees can leverage data immediately to resolve a situation, perform an activity, or make a decision – including frontline workers.
Data literacy, the ability to collect, manage, evaluate, and apply data in a critical manner, is high.
Data is used for decision making. The company encourages decisions based on objective data and the intelligent application of it.
Data governance will support your organization’s ethical use and handling of data by facilitating definition around important factors, such as:
Activities
2.2.1 Gauge Your Organization’s Current Data Culture
This step will guide you through the following activities:
Outcomes of this step
Conduct a Data Culture Survey or Diagnostic
The objectives of conducting a data culture survey are to increase the understanding of the organization's data culture, your users’ appetite for data, and their appreciation for data in terms of governance, quality, accessibility, ownership, and stewardship. To perform a data culture survey:
Input
Output
Materials
Participants
Contact your Info-Tech Account Representative for details on launching a Data Culture Diagnostic.
“Achieving data success is a journey, not a sprint.” Companies that set a clear course, with reasonable expectations and phased results over a period of time, get to the destination faster.” – Randy Bean, 2020
This phase will guide you through the following activities:
This phase involves the following participants:
This step will guide you through the following activities:
Outcomes of this step
Key considerations:
Sample milestones:
Data Governance Leadership & Org Structure Definition
Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.
Data Governance Charter and Policies
Create a charter for your program and build/refresh associated policies.
Data Culture Diagnostic
Understand the organization’s current data culture, perception of data, value of data, and knowledge gaps.
Use Case Build and Prioritization
Build a use case that is tied to business capabilities. Prioritize accordingly.
Business Data Glossary/Catalog
Build and/or refresh the business’ glossary for addressing data definitions and standardization issues.
Tools & Technology
Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).
Define key roles for getting started.
Start small and then scale – deliver early wins.
Start understanding data knowledge gaps, building the program, and delivering.
Make the available data governance tools and technology work for you.
Sample data governance roadmap milestones:
Key Considerations:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Enable business capabilities with data governance role definitions.
These are some of the data governance tools and technology players. Check out SoftwareReviews for help making better software decisions.
The data steward must be empowered and backed politically with decision-making authority, or the role becomes stale and powerless.
Ensuring compliance can be difficult. Data stewards may experience pushback from stakeholders who must deliver on the policies, procedures, and processes that the data steward enforces.
Because the data steward must enforce data processes and liaise with so many different people and departments within the organization, the data steward role should be their primary full-time job function – where possible.
However, in circumstances where budget doesn’t allow a full-time data steward role, develop these skills within the organization by adding data steward responsibilities to individuals who are already managing data sets for their department or line of business.
A stewardship role is generally more about managing the cultural change that data governance brings. This requires the steward to have exceptional interpersonal skills that will assist in building relationships across departmental boundaries and ensuring that all stakeholders within the organization believe in the initiative, understand the anticipated outcomes, and take some level of responsibility for its success.
Data governance initiatives must contain a strong organizational disruption component. A clear and concise communication strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.
By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organization’s culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.
Because a data governance initiative will involve data-driven business units across the organization, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.
Attempting to implement change without an effective communication plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Launching a data governance initiative is guaranteed to disrupt the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
To create a strong vision for data governance, there must be participation from the business and IT. A common vision will articulate the state the organization wishes to achieve and how it will reach that state. Visioning helps to develop long-term goals and direction.
Once the vision is established, it must be effectively communicated to everyone, especially those who are involved in creating, managing, disposing, or archiving data.
The data governance program should be periodically refined. This will ensure the organization continues to incorporate best methods and practices as the organization grows and data needs evolve.
A successful data governance communications plan involves making the initiative visible and promoting staff awareness. Educate the team on how data is collected, distributed, and used, what internal processes use data, and how that data is used across departmental boundaries.
By demonstrating how data governance will affect staff directly, you create a deeper level of understanding across lines of business, and ultimately, a higher level of acceptance for new processes, rules, and guidelines.
A clear and concise communications strategy will raise the profile of data governance within the organization, and staff will understand how the program will benefit them and how they can share in the success of the initiative. This will end up providing support for the initiative across the board.
Focus on literacy and communication: include training in the communication plan. Providing training for data users on the correct procedures for updating and verifying the accuracy of data, data quality, and standardized data policies will help validate how data governance will benefit them and the organization.
The data governance program is responsible for continuously promoting the value of data to the organization. The data governance program should seek a variety of ways to educate the organization and data stakeholders on the benefit of data management.
Even if data policies and procedures are created, they will be highly ineffective if they are not properly communicated to the data producers and users alike.
There needs to be a communication plan that highlights how the data producer and user will be affected, what their new responsibilities are, and the value of that change.
To learn how to manage organizational change, refer to Info-Tech’s Master Organizational Change Management Practices.
It can be difficult to understand what a policy is, and what it is not. Start by identifying the differences between a policy and standards, guidelines, and procedures.
The following are key elements of a good policy:
| Heading | Descriptions |
|---|---|
| Purpose | Describes the factors or circumstances that mandate the existence of the policy. Also states the policy’s basic objectives and what the policy is meant to achieve. |
| Scope | Defines to whom and to what systems this policy applies. Lists the employees required to comply or simply indicates “all” if all must comply. Also indicates any exclusions or exceptions, i.e. those people, elements, or situations that are not covered by this policy or where special consideration may be made. |
| Definitions | Define any key terms, acronyms, or concepts that will be used in the policy. A standard glossary approach is sufficient. |
| Policy Statements | Describe the rules that comprise the policy. This typically takes the form of a series of short prescriptive and proscriptive statements. Sub-dividing this section into sub-sections may be required depending on the length or complexity of the policy. |
| Non-Compliance | Clearly describe consequences (legal and/or disciplinary) for employee non-compliance with the policy. It may be pertinent to describe the escalation process for repeated non-compliance. |
| Agreement | Confirms understanding of the policy and provides a designated space to attest to the document. |
Most organizations have problems with policy management. These include:
Technology should be used as a means to solve these problems and effectively monitor, enforce, and communicate policies.
Product Overview
myPolicies is a web-based solution to create, distribute, and manage corporate policies, procedures, and forms. Our solution provides policy managers with the tools they need to mitigate the risk of sanctions and reduce the administrative burden of policy management. It also enables employees to find the documents relevant to them and build a culture of compliance.
Some key success factors for policy management include:
myPolicies
Data policies are short statements that seek to manage the creation, acquisition, integrity, security, compliance, and quality of data. These policies vary amongst organizations, depending on your specific data needs.
Trust
Availability
Security
Compliance
Info-Tech’s Data Management Policy:
This policy establishes uniform data management standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of the organization. This policy applies to all critical data and to all staff who may be creators and/or users of such data.
Info-Tech’s Data Entry Policy:
The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of an organization. It is essential that required data be sourced appropriately and entered into databases and applications in an accurate and complete manner to ensure the reliability and validity of the data and decisions made based on the data.
Info-Tech’s Data Provenance Policy:
Create policies to keep your data's value, such as:
Info-Tech’s Data Integration and Virtualization Policy:
This policy aims to assure the organization, staff, and other interested parties that data integration, replication, and virtualization risks are taken seriously. Staff must use the policy (and supporting guidelines) when deciding whether to integrate, replicate, or virtualize data sets.
Although they can be highly subjective, metrics are extremely important to data governance success.
Policies are great to have from a legal perspective, but unless they are followed, they will not benefit the organization.
Review metrics on an ongoing basis with those data owners/stewards who are accountable, the data governance steering committee, and the executive sponsors.
Examples include:
Have a fundamental data definition model for the entire business to adhere to. Those in the positions that generate and produce data must follow the common set of standards developed by the steering committee and be accountable for the creation of valid, clean data.
By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organization’s culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.
Because a data governance initiative will involve data-driven business units across the organization, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.
Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Data governance initiatives will very likely bring about a level of organizational disruption. A clear and concise communications strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.
Launching a data governance program will bring with it a level of disruption to the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Build Your Business and User Context
Work with your core team of stakeholders to build out your data governance strategy map, aligning data governance initiatives with business capabilities, value streams, and, ultimately, your strategic priorities.
Formulate a Plan to Get to Your Target State
Develop a data governance future state roadmap and plan based on an understanding of your current data governance capabilities, your operating environment, and the driving needs of your business.
Key to building and fostering a data-driven culture.
Streamline your data management program with our simplified framework.
Be the voice of data in a time of transformation.
| Name | Position | Company |
|---|---|---|
| David N. Weber | Executive Director - Planning, Research and Effectiveness | Palm Beach State College |
| Izabela Edmunds | Information Architect | Mott MacDonald |
| Andy Neill | Practice Lead, Data & Analytics | Info-Tech Research Group |
| Dirk Coetsee | Research Director, Data & Analytics | Info-Tech Research Group |
| Graham Price | Executive Advisor, Advisory Executive Services | Info-Tech Research Group |
| Igor Ikonnikov | Research Director, Data & Analytics | Info-Tech Research Group |
| Jean Bujold | Senior Workshop Delivery Director | Info-Tech Research Group |
| Rajesh Parab | Research Director, Data & Analytics | Info-Tech Research Group |
| Reddy Doddipalli | Senior Workshop Director | Info-Tech Research Group |
| Valence Howden | Principal Research Director, CIO | Info-Tech Research Group |
Alation. “The Alation State of Data Culture Report – Q3 2020.” Alation, 2020. Accessed 25 June 2021.
Allott, Joseph, et al. “Data: The next wave in forestry productivity.” McKinsey & Company, 27 Oct. 2020. Accessed 25 June 2021.
Bean, Randy. “Why Culture Is the Greatest Barrier to Data Success.” MIT Sloan Management Review, 30 Sept. 2020. Accessed 25 June 2021.
Brence, Thomas. “Overcoming the Operationalization Challenge with Data Governance at New York Life.” Informatica, 18 March 2020. Accessed 25 June 2021.
Bullmore, Simon, and Stuart Coleman. “ODI Inside Business – a checklist for leaders.” Open Data Institute, 19 Oct. 2020. Accessed 25 June 2021.
Canadian Institute for Health Information. “Developing and implementing accurate national standards for Canadian health care information.” Canadian Institute for Health Information. Accessed 25 June 2021.
Carruthers, Caroline, and Peter Jackson. “The Secret Ingredients of the Successful CDO.” IRM UK Connects, 23 Feb. 2017.
Dashboards. “Useful KPIs for Healthy Hospital Quality Management.” Dashboards. Accessed 25 June 2021.
Dashboards. “Why (and How) You Should Improve Data Literacy in Your Organization Today.” Dashboards. Accessed 25 June 2021.
Datapine. “Healthcare Key Performance Indicators and Metrics.” Datapine. Accessed 25 June 2021.
Datapine. “KPI Examples & Templates: Measure what matters the most and really impacts your success.” Datapine. Accessed 25 June 2021.
Diaz, Alejandro, et al. “Why data culture matters.” McKinsey Quarterly, Sept. 2018. Accessed 25 June 2021.
Everett, Dan. “Chief Data Officer (CDO): One Job, Four Roles.” Informatica, 9 Sept. 2020. Accessed 25 June 2021.
Experian. “10 signs you are sitting on a pile of data debt.” Experian. Accessed 25 June 2021.
Fregoni, Silvia. “New Research Reveals Why Some Business Leaders Still Ignore the Data.” Silicon Angle, 1 Oct. 2020.
Informatica. Holistic Data Governance: A Framework for Competitive Advantage. Informatica, 2017. Accessed 25 June 2021.
Knight, Michelle. “What Is a Data Catalog?” Dataversity, 28 Dec. 2017. Web.
Lim, Jason. “Alation 2020.3: Getting Business Users in the Game.” Alation, 2020. Accessed 25 June 2021.
McDonagh, Mariann. “Automating Data Governance.” Erwin, 29 Oct. 2020. Accessed 25 June 2021.
NewVantage Partners. Data-Driven Business Transformation: Connecting Data/AI Investment to Business Outcomes. NewVantage Partners, 2020. Accessed 25 June 2021.
Olavsrud, Thor. “What is data governance? A best practices framework for managing data assets.” CIO.com, 18 March 2021. Accessed 25 June 2021.
Open Data Institute. “Introduction to data ethics and the data ethics canvas.” Open Data Institute, 2020. Accessed 25 June 2021.
Open Data Institute. “The UK National Data Strategy 2020: doing data ethically.” Open Data Institute, 17 Nov. 2020. Accessed 25 June 2021.
Open Data Institute. “What is the Data Ethics Canvas?” Open Data Institute, 3 July 2019. Accessed 25 June 2021.
Pathak, Rahul. “Becoming a Data-Driven Enterprise: Meeting the Challenges, Changing the Culture.” MIT Sloan Management Review, 28 Sept. 2020. Accessed 25 June 2021.
Redman, Thomas, et al. “Only 3% of Companies’ Data Meets Basic Quality Standards.” Harvard Business Review. 11 Sept 2017.
Petzold, Bryan, et al. “Designing data governance that delivers value.” McKinsey & Company, 26 June 2020. Accessed 25 June 2021.
Smaje, Kate. “How six companies are using technology and data to transform themselves.” McKinsey & Company, 12 Aug. 2020. Accessed 25 June 2021.
Talend. “The Definitive Guide to Data Governance.” Talend. Accessed 25 June 2021.
“The Powerfully Simple Modern Data Catalog.” Atlan, 2021. Web.
U.S. Geological Survey. “Data Management: Data Standards.” U.S. Geological Survey. Accessed 25 June 2021.
Waller, David. “10 Steps to Creating a Data-Driven Culture.” Harvard Business Review, 6 Feb. 2020. Accessed 25 June 2021.
“What is the Difference Between A Business Glossary, A Data Dictionary, and A Data Catalog, and How Do They Play A Role In Modern Data Management?” Analytics8, 23 June 2021. Web.
Wikipedia. “RFM (market research).” Wikipedia. Accessed 25 June 2021.
Windheuser, Christoph, and Nina Wainwright. “Data in a Modern Digital Business.” Thoughtworks, 12 May 2020. Accessed 25 June 2021.
Wright, Tom. “Digital Marketing KPIs - The 12 Key Metrics You Should Be Tracking.” Cascade, 3 March 2021. Accessed 25 June 2021.
Business operations in high-risk areas of the world contend with complex threat environments and risk scenarios that often require a unique response. But traditional approaches to security strategy often miss these jurisdictional risks, leaving organizations vulnerable to threats that range from cybercrime and data breaches to fines and penalties.
Security leaders need to identify high-risk jurisdictions, inventory critical assets, identify vulnerabilities, assess risks, and identify security controls necessary to mitigate those risks.
Across risks that include insider threats and commercial surveillance, the two greatest vulnerabilities that organizations face in high-risk parts of the world are travel and compliance. Organizations can make small adjustments to their security program to address these risks:
Using these two prevalent risk scenarios in high-risk jurisdictions as examples, this research walks you through the steps to analyze the threat landscape, assess security risks, and execute a response to mitigate them.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Traditional approaches to security strategy often miss jurisdictional risks. Use this storyboard to make small adjustments to your security program to mitigate security risks in high-risk jurisdictions.
Use this tool to track jurisdictional risks, assess the exposure of critical assets, and identify mitigation controls. Use the geographic heatmap to communicate inherent jurisdictional risk with key stakeholders.
Use these two templates to develop help you develop your own guidelines for key jurisdictional risk scenarios. The guidelines address high-risk travel and compliance risk.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Assess business requirements and evaluate security pressures to set the context for the security risk assessment.
Understand the goals of the organization in high-risk jurisdictions.
Assess the threats to critical assets in these jurisdictions and capture stakeholder expectations for information security.
1.1 Determine assessment scope.
1.2 Determine business goals.
1.3 Determine compliance obligations.
1.4 Determine risk appetite.
1.5 Conduct pressure analysis.
Business requirements
Security pressure analysis
Build key risk scenarios for high-risk jurisdictions.
Identify critical assets in high-risk jurisdictions, their vulnerabilities to relevant threats, and the adverse impact should malicious agents exploit them.
Assess risk exposure of critical assets in high-risk jurisdictions.
2.1 Identify critical assets.
2.2 Identify threats.
2.3 Assess risk likelihood.
2.4 Assess risk impact.
Key risk scenarios
Jurisdictional risk exposure
Jurisdictional Risk Register and Heat Map
Prioritize and treat jurisdictional risks to critical assets.
Build an initiative roadmap to reduce residual risks in high-risk jurisdictions.
3.1 Identify and assess risk response.
3.2 Assess residual risks.
3.3 Identify security controls.
3.4 Build initiative roadmap.
Action plan to mitigate key risk scenarios
Michel Hébert
Research Director
Security and Privacy
Info-Tech Research Group
Alan Tang
Principal Research Director
Security and Privacy
Info-Tech Research Group
Traditional approaches to security strategies may miss key risk scenarios that critical assets face in high-risk jurisdictions. These include high-risk travel, heightened insider threats, advanced persistent threats, and complex compliance environments. Most organizations have security strategies and risk management practices in place, but securing global operations requires its own effort. Assess the security risk that global operations pose to critical assets. Consider the unique assets, threats, and vulnerabilities that come with operations in high-risk jurisdictions. Focus on the business activities you support and integrate your insights with existing risk management practices to ensure the controls you propose get the visibility they need. Your goal is to build a plan that mitigates the unique security risks that global operations pose and secures critical assets in high-risk areas. Don’t leave security to chance.
Info-Tech has developed an effective approach to protecting critical assets in high-risk jurisdictions.
This approach includes tools for:
Organizations with global operations must contend with a more diverse set of assets, threats, and vulnerabilities when they operate in high-risk jurisdictions. Security leaders need to take additional steps to secure operations and protect critical assets.
The 2022 Allianz Risk Barometer surveyed 2,650 business risk specialists in 89 countries to identify the most important risks to operations. The report identified cybercrime, IT failures, outages, data breaches, fines, and penalties as the most important global business risks in 2022, but their results varied widely by region. The standout finding of the 2022 Allianz Risk Barometer is the return of security risks as the most important threat to business operations. Security risks will continue to be acute beyond 2022, especially in Africa, the Middle East, Europe, and the Asia-Pacific region, where they will dwarf risks of supply chain interruptions, natural catastrophe, and climate change.
Global operations in high-risk jurisdictions contend with more diverse threats. These security risk scenarios are not captured in traditional security strategies.
Figures represent the number of cybersecurity risks business risk specialists selected as a percentage of all business risks (Allianz, 2022). Higher scores indicate jurisdictions with higher security-related business risks. Jurisdictions without data are in grey.
The index assesses a country’s legal framework to identify basic requirements that public and private stakeholders must uphold and the legal instruments prohibiting harmful actions.
The 2020 GCI results show overall improvement and strengthening of the cybersecurity agenda globally, but significant regional gaps persist. Of the 194 countries surveyed:
Not every jurisdiction has the same commitment to cybersecurity. Protecting critical assets in high-risk jurisdictions requires additional due diligence.
The diagram sets out the score and rank for each country that took part in the Global Cybersecurity Index (ITU, 2021)
Higher scores show jurisdictions with a lower rank on the CGI, which implies greater risk. Jurisdictions without data are in grey.
As a result, security leaders who support operations in many countries need to take additional steps to mitigate security risks to critical assets.
Guide stakeholders to make informed decisions about how to assess and treat the security risks and secure operations.
Work with your organization to analyze the threat landscape, assess security risks unique to high-risk jurisdictions, and execute a response to mitigate them.
This project blueprint works through this process using the two most prevalent risk scenarios in high-risk jurisdictions: high-risk travel and compliance risk.
Key Risk Scenarios
The project blueprint includes template guidance in Phase 3 to help you build and deploy your own travel guidelines to protect critical assets and support end users before they leave, during their trip, and when they return.
Before you leave
During your trip
When you return
The project blueprint includes template guidance in Phase 3 to help you deploy your own compliance governance controls as a risk mitigation measure.
|
1. Identify Context |
2. Assess Risks |
3. Execute Response |
|
|---|---|---|---|
|
Phase Steps |
|
|
|
|
Phase Outcomes |
|
|
|
Business Security Requirements
Identify the context for the global security risk assessment, including risk appetite and risk tolerance.
Jurisdictional Risk Register and Heatmap
Identify critical global assets and the threats they face in high-risk jurisdictions and assess exposure.
Mitigation Plan
Roadmap of initiatives and security controls to mitigate global risks to critical assets. Tools and templates to address key security risk scenarios.
Jurisdictional Risk Register and Heatmap
Use the Jurisdictional Risk Register and Heatmap Tool to capture information security risks to critical assets in high-risk jurisdictions. The tool generates a world chart that illustrates the risks global operations face to help you engage the business and execute a response.
IT Benefits
Assess and remediate information security risk to critical assets in high-risk jurisdictions.
Easily integrate your risk assessment with enterprise risk assessments to improve communication with the business.
Illustrate key information security risk scenarios to make the case for action in terms the business understands.
Business Benefits
Develop mitigation plans to protect staff, devices, and data in high-risk jurisdictions.
Support business growth in high-risk jurisdictions without compromising critical assets.
Mitigate compliance risk to protect your organization’s reputation, avoid fines, and ensure business continuity.
|
ID |
Metric |
Why is this metric valuable? |
How do I calculate it? |
|---|---|---|---|
|
1. |
Overall Exposure – High-Risk Jurisdictions |
Illustrates the overall exposure of critical assets in high-risk jurisdictions. |
Use the Jurisdictional Risk Register and Heatmap Tool. Calculate the impact times the probability rating for each risk. Take the average. |
|
2. |
# Risks Identified – High-Risk Jurisdictions |
Informs risk tolerance assessments. |
Use the Jurisdictional Risk Register and Heatmap Tool. |
|
3. |
# Risks Treated – High-Risk Jurisdictions |
Informs residual risk assessments. |
Use the Jurisdictional Risk Register and Heatmap Tool. |
|
4. |
Mitigation Cost – High-Risk Jurisdictions |
Informs cost-benefit analysis to determine program effectiveness. |
Use the Jurisdictional Risk Register and Heatmap Tool. |
|
5. |
# Security Incidents – High-Risk Jurisdictions |
Informs incident trend calculations to determine program effectiveness. |
Draw the information from your service desk or IT service management tool. |
| 6. |
Incident Remediation Cost – High-Risk Jurisdictions |
Informs cost-benefit analysis to determine program effectiveness. |
Estimate based on cost and effort, including direct and indirect cost such as business disruptions, administrative finds, reputational damage, etc. |
|
7. |
TRENDS: Program Effectiveness – High-Risk Jurisdictions |
# of security incidents over time. Remediation : Mitigation costs over time |
Calculate based on metrics 5 to 7. |
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Diagnostics and consistent frameworks are used throughout all four options.
Phase 1
Call #1: Scope project requirements, determine assessment scope, and discuss challenges.
Phase 2
Call #2: Conduct initial risk assessment and determine risk tolerance.
Call #3: Evaluate security pressures in high-risk jurisdictions.
Call #4: Identify risks in high-risk jurisdictions.
Call #5: Assess risk exposure.
Phase 3
Call #6: Treat security risks in high-risk jurisdictions.
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.
Contact your account representative for more information. workshops@infotech.com 1-888-670-8889
|
Days 1 |
Days 2-3 |
Day 4 |
Day 5 |
|
|---|---|---|---|---|
|
Identify Context |
Key Risk Scenarios |
Build Roadmap |
Next Steps and Wrap-Up (offsite) |
|
|
Activities |
1.1.1 Determine assessment scope. 1.1.2 Determine business goals. 1.1.3 Identify compliance obligations. 1.2.1 Determine risk appetite. 1.2.2 Conduct pressure analysis. |
2.1.1 Identify assets. 2.1.2 Identify threats. 2.2.1 Assess risk likelihood. 2.2.2 Assess risk impact. |
3.1.1 Identify and assess risk response. 3.1.2 Assess residual risks. 3.2.1 Identify security controls. 3.2.2 Build initiative roadmap. |
5.1 Complete in-progress deliverables from previous four days. 5.2 Set up review time for workshop deliverables and to discuss next steps. |
|
Deliverables |
|
|
|
|
Stakeholders sometimes ask information security and privacy leaders to produce a list of safe jurisdictions from which to operate. We need to help them see that there are no safe jurisdictions, only relatively risky ones. As you build your security program, deepen the scope of your risk assessments to include risk scenarios critical assets face in different jurisdictions. These risks do not need to rule out operations, but they may require additional mitigation measures to keep staff, data, and devices safe and reduce potential reputational harms.
Traditional approaches to security strategy often omit jurisdictional risks.
Global operations must contend with a more complex security landscape. Secure critical assets in high-risk jurisdictions with a targeted risk assessment.
The two greatest risks are high-risk travel and compliance risk.
You can mitigate them with small adjustments to your security program.
Support High-Risk Travel
When securing travel to high-risk jurisdictions, you must consider personnel safety as well as data and device security. Put measures and guidelines in place to protect them before, during, and after travel.
Mitigate Compliance Risk
Think through data residency requirements, data breach notification, cross-border data transfer, and third-party risks to support business growth and mitigate compliance risks in high-risk jurisdictions to protect your organization’s reputation and avoid hefty fines or business disruptions.
This phase will walk you through the following activities:
This phase involves the following participants:
Activities
1.1.1 Determine assessment scope
1.1.2 Identify enterprise goals in high-risk jurisdictions
1.1.3 Identify compliance obligations
This step involves the following participants:
Outcomes of this step
Focus your risk assessment on the business activities security supports in high-risk jurisdictions and the unique threats they face to bridge gaps in your security strategy.
Work closely with your enterprise risk management function.
Enterprise risk management functions are often tasked with developing risk assessments from composite sources. Work closely with them to complete your own assessment.
Countries at heightened risk of money laundering and terrorism financing are examples of high-risk jurisdictions. The Financial Action Task Force and the U.S. Treasury publish reports three times a year that identify Non-Cooperative Countries or Territories.
Strategic Intelligence
White papers, briefings, reports. Audience: C-Suite, board members
Tactical Intelligence
Internal reports, vendor reports. Audience: Security leaders
Operational intelligence
Indicators of compromise. Audience: IT Operations
Operational intelligence focuses on machine-readable data used to block attacks, triage and validate alerts, and eliminate threats from the network. It becomes outdated in a matter of hours and is less useful for this exercise.
Without a flexible system to account for the risk exposures of different jurisdictions, staff may perceive measures as a hindrance to operations.
|
Rating |
Description |
|---|---|
|
Low |
Generally secure with adequate physical security. Low violent crime rates. Some civil unrest during significant events. Acts of terrorism rare. Risks associated with natural disasters limited and health threats mainly preventable. |
|
Moderate |
Periodic civil unrest. Antigovernment, insurgent, or extremist groups active with sporadic acts of terrorism. Staff at risk from common and violent crime. Transport and communications services are unreliable and safety records are poor. Jurisdiction prone to natural disasters or disease epidemics. |
|
High |
Regular periods of civil unrest, which may target foreigners. Antigovernment, insurgent, or extremist groups very active and threaten political or economic stability. Violent crime rates high, often targeting foreigners. Infrastructure and emergency services poor. May be regular disruption to transportation or communications services. Certain areas off-limits to foreigners. Jurisdictions experiencing natural disasters or epidemics are considered high risk. |
|
Extreme |
Undergoing active conflict or persistent civil unrest. Risk of being caught up in a violent incident or attack is very high. Authorities may have lost control of significant portions of the country. Lines between criminality and political and insurgent violence are blurred. Foreigners are likely to be denied access to parts of the country. Transportation and communication services are severely degraded or nonexistent. Violence presents a direct threat to staff security. |
Ratings are formulated by assessing several types of risk, including conflict, political/civil unrest, terrorism, crime, and health and infrastructure risks.
1 – 2 hours
Pay close attention to elements of the assessment that are not in scope.
|
Input |
Output |
|
|
|
Materials |
Participants |
|
|
Download the Information Security Requirements Gathering Tool
Do you understand the unique business context of operations in high-risk jurisdictions?
Estimated Time: 1-2 hours
Input | Output |
|
|
Materials | Participants |
|
|
Download the Information Security Requirements Gathering Tool
Tab 3, Goals Cascade
Tab 6, Results
If the organization is considering a merger and acquisition project that will expand operations in jurisdictions with different travel risk profiles, the security organization needs to revise the security strategy to ensure the organization can support high-risk travel and mitigate risks to critical assets.
Security leaders are familiar with most conventional regulatory obligations that govern financial, personal, and healthcare data in North America and Europe.
Data privacy concerns, nationalism, and the economic value of data are all driving jurisdictions to adopt data residency and data localization and to shut down the cross-border transfer of data.
The next step requires you to consider the compliance obligations the organization needs to meet to support the business as it expands to other jurisdictions through natural growth, mergers, and acquisitions.
Estimated Time: 1-2 hours
Include:
Input | Output |
|
|
Materials | Participants |
|
|
Download the Information Security Requirements Gathering Tool
Activities
1.2.1 Conduct initial risk assessment
1.2.2 Conduct pressure analysis
1.2.3 Determine risk tolerance
This step involves the following participants:
Outcomes of this step
Identify threats to global assets and capture the security expectations of external stakeholders, including customers, regulators, legislators, and business partners, and determine risk tolerance.
Perform an initial assessment of high-risk jurisdictions to set the context.
Assess:
You should be able to find the information in your existing security strategy. If you don’t have the information, work through the next three steps of the project blueprint.
Jurisdictional risk is often reduced to countries where money laundering and terrorist activities are high. In this blueprint, the term refers to the broader set of information security risks that arise when operating in a foreign country or jurisdiction.
Security leaders who support operations in many countries need to take additional steps to mitigate security risks to critical assets. The goal of the next two exercises is to analyze the threat landscape and security pressures unique to high-risk jurisdictions, which will inform the construction of key scenarios in Phase 2. These five scenarios are most prevalent in high-risk jurisdictions. Keep them in mind as you go through the exercises in this section.
1-3 hours
Input | Output |
|
|
Materials | Participants |
|
|
For more information on how to complete the risk assessment questionnaire, see Step 1.2.1 of Build an Information Security Strategy.
1-3 hours
For more information on how to complete the pressure analysis questionnaire, see Step 1.3 of Build an Information Security Strategy.
Input | Output |
|
|
Materials | Participants |
|
|
A low security pressure means that your stakeholders do not assign high importance to information security. You may need to engage stakeholders with the right key risk scenarios to illustrate jurisdictional risk and generate support for new security controls.
Download the Information Security Pressure Analysis Tool
A formalized risk tolerance statement can help:
The role of security professionals is to identify and analyze key risk scenarios that may prevent the organization from reaching its goals.
1-3 hours
For more information on how to complete the risk tolerance questionnaire, see Step 1.4 of Build an Information Security Strategy.
Input | Output |
|
|
Materials | Participants |
|
|
Download the Information Security Pressure Analysis Tool
This phase will walk you through the following activities:
This phase involves the following participants:
Activities
2.1.1 Identify assets
2.1.2 Identify threats
This step involves the following participants:
Outcomes of this step
For a deeper dive into building a risk management program, see Info-Tech’s core project blueprints on risk management:
Build an IT Risk Management Program
Combine Security Risk Management Components Into One Program
Risk scenarios are further distilled into a single sentence or risk statement that communicates the essential elements from the scenario.
|
Threat |
Exploits an |
Asset |
Using a |
Method |
Creating an |
Effect |
|
An actor capable of harming an asset |
Anything of value that can be affected and results in loss |
Technique an actor uses to affect an asset |
How loss materializes |
|||
|
Examples: Malicious or untrained employees, cybercriminal groups, malicious state actors |
Examples: Systems, regulated data, intellectual property, people |
Examples: Credential compromise, privilege escalation, data exfiltration |
Examples: Loss of data confidentiality, integrity, or availability; impact on staff health & safety |
|||
Risk scenarios are concise, four to six sentence narratives that describe the core elements of forecasted adverse events. Use them to engage stakeholders with the right questions and guide them to make informed decisions about how to address and treat security risks in high-risk jurisdictions.
The next slides review five key risk scenarios prevalent in high-risk jurisdictions. Use them as examples to develop your own.
For instance, in the US, these lists might include countries that are:
When securing travel to high-risk jurisdictions, you must consider personnel safety as well as data and device security.
The diagram presents high-risk jurisdictions based on US governmental sources (2021) listed on this slide.
Likelihood: Medium
Impact: Medium
Malicious state actors, cybercriminals, and competitors can threaten staff, devices, and data during travel to high-risk jurisdictions. Device theft or compromise may occur while traveling through airports, accessing hotel computer and phone networks, or in internet cafés or other public areas. Threat actors can exploit data from compromised or stolen devices to undermine the organization’s strategic, economic, or competitive advantage. They can also infect compromised devices with malware that delivers malicious payloads once they reconnect with home networks.
Threat Actor:
Assets:
Effect:
Methods:
Data privacy concerns, nationalism, and the economic value of data are all driving jurisdictions to adopt data residency, breach notification, and cross-border data transfer regulations. As 2021 wound down to a close, nearly all the world’s 30 largest economies had some form of data regulation in place. The regulatory landscape is shifting rapidly, which complicates operations as organizations grow into new markets or engage in merger and acquisition activities.
Global operations require special attention to data-residency requirements, data breach notification requirements, and cross-border data transfer regulations to mitigate compliance risk.
Likelihood: Medium
Impact: High
Rapid changes in the privacy and security regulatory landscape threaten organizations’ ability to meet their compliance obligations from local legal and regulatory frameworks. Organizations risk reputational damage, administrative fines, criminal charges, and loss of market share. In extreme cases, organizations may lose their license to operate in high-risk jurisdictions. Shifts in the regulatory landscape can involve additional requirements for data residency, cross-border data transfer, data breach notification, and third-party risk management.
Threat Actor:
Asset:
Effect:
Methods:
The Ponemon Institute set out to understand the financial consequences that result from insider threats and gain insight into how well organizations are mitigating these risks.
In the context of this research, insider threat is defined as:
On average, the total cost to remediate insider threats in 2021 was US$15.4 million per incident.
In all regions, employee or contractor negligence occurred most frequently. Organizations in North America and in the Middle East and Africa were most likely to experience insider threat incidents in 2021.
The diagram represents the average number of insider incidents reported per organization in 2021. The results are analyzed in four regions (Ponemon Institute, 2022)
Likelihood: Low to Medium
Impact: High
Malicious insiders, negligent employees, and credential thieves can exploit inside access to information systems to commit fraud, steal confidential or commercially valuable information, or sabotage computer systems. Insider threats are difficult to identify, especially when security is geared toward external threats. They are often familiar with the organization’s data and intellectual property as well as the methods in place to protect them. An insider may steal information for personal gain or install malicious software on information systems. They may also be legitimate users who make errors and disregard policies, which places the organization at risk.
Threat Actor:
Asset:
Effects:
Methods:
The CISA Shields Up site, SANS Storm Center site, and MITRE ATT&CK group site provide helpful and timely information to understand APT risks in different jurisdictions.
The following threat actors are currently associated with cyberattacks affiliated with the Russian government.
|
Activity Group |
Risks |
|---|---|
|
Known as Fancy Bear, this threat group has been tied to espionage since 2004. They compromised the Hillary Clinton campaign, amid other major events. |
|
| APT29 (SVT) |
Tied to espionage since 2008. Reportedly compromised the Democratic National Committee in 2015. Cited in the 2021 SolarWinds compromise. |
| Buhtrap/RTM Group |
Group focused on financial targets since 2014. Currently known to target Russian and Ukrainian banks. |
| Gamaredon |
Operating in Crimea. Aligned with Russian interests. Has previously targeted Ukrainian government officials and organizations. |
| DEV-0586 |
Carried out wiper malware attacks on Ukrainian targets in January 2022. |
| UNC1151 |
Active since 2016. Linked to information operation campaigns and the distribution of anti-NATO material. |
| Conti |
Most successful ransomware gang of 2021, with US$188M revenue. Supported Russian invasion of Ukraine, threatening attacks on allied critical infrastructure. |
Likelihood: Low to Medium
Impact: High
Advanced persistent threats are state actors or state-sponsored affiliates with the means to avoid detection by anti-malware software and intrusion detection systems. These highly-skilled and persistent malicious agents have significant resources with which to bypass traditional security controls, establish a foothold in the information technology infrastructure, and exfiltrate data undetected. APTs have the resources to adapt to a defender’s efforts to resist them over time. The loss of system integrity and data confidentiality over time can lead to financial losses, business continuity disruptions, and the destruction of critical infrastructure.
Threat Actor:
Asset:
Effects:
Methods:
Countries where commercial surveillance tools have been deployed (“Global Spyware Market Index,” Top10VPN, 2021)
Adware
Software applications that display advertisements while the program is running.
Keyboard Loggers
Applications that monitor and record keystrokes. Malicious agents use them to steal credentials and sensitive enterprise data.
Trojans
Applications that appear harmless but inflict damage or data loss to a system.
Mobile Spyware
Surveillance applications that infect mobile devices via SMS or MMS channels, though the most advanced can infect devices without user input.
State actors and their affiliates use system monitors to track browsing habits, application usage, and keystrokes and capture information from devices’ GPS location data, microphone, and camera. The most advanced system monitor spyware, such as NSO Group’s Pegasus, can infect devices without user input and record conversations from end-to-end encrypted messaging systems.
Likelihood: Low to Medium
Impact: Medium
Malicious agents can deploy malware on end-user devices with commercial tools available off the shelf to secretly monitor the digital activity of users. Attacks exploit widespread vulnerabilities in telecommunications protocols. They occur through email and text phishing campaigns, malware embedded in untested applications, and sophisticated zero-click attacks that deliver payloads without requiring user interactions. Attacks target sensitive as well as mundane information. They can be used to track employee activities, investigate criminal activity, or steal credentials, credit card numbers, or other personally identifiable information.
Threat Actor:
Asset:
Effects:
Methods:
The risk register will capture a list of critical assets and their vulnerabilities, the threats that endanger them, and the adverse effect your organization may face.
Download the Jurisdictional Risk Register and Heatmap Tool
1 – 2 hours
Threat | Exploits an | Asset | Using a | Method | Creating an | Effect |
Inputs for risk scenario identification
Input | Output |
|
|
Materials | Participants |
|
|
Threat | Exploits an | Asset | Using a | Method | Creating an | Effect |
Inputs for risk scenario identification
|
Category |
Actions |
Motivation |
Sophistication |
|---|---|---|---|
|
Nation-states |
Cyberespionage, cyberattacks |
Geopolitical |
High. Dedicated resources and personnel, extensive planning and coordination. |
|
Proxy organizations |
Espionage, destructive attacks |
Geopolitical, Ideological, Profit |
Moderate. Some planning and support functions and technical expertise. |
|
Cybercrime |
Theft, fraud, extortion |
Profit |
Moderate. Some planning and support functions and technical expertise. |
|
Hacktivists |
Disrupt operations, attack brands, release sensitive data |
Ideological |
Low. Rely on widely available tools that require little skill to deploy. |
|
Insiders |
Destruction or release of sensitive data, theft, exposure through negligence |
Incompetence, Discontent |
Internal access. Acting on their own or in concert with any of the above. |
1 – 2 hours
Threat | Exploits an | Asset | Using a | Method | Creating an | Effect |
Inputs for risk scenario identification
Input | Output |
|
|
Materials | Participants |
|
|
1 – 2 hours
For example:
Threat | Exploits an | Asset | Using a | Method | Creating an | Effect |
Risk Scenario: High-Risk Travel
State actors and cybercriminals can threaten staff, devices, and data during travel to high-risk jurisdictions. Device theft or compromise may occur while traveling through airports, accessing hotel computer and phone networks, or in internet cafés or other public areas. Threat actors can exploit data from compromised or stolen devices to undermine the organization’s strategic, economic, or competitive advantage. They can also infect compromised devices with malware that delivers malicious payloads once they reconnect with home networks.
Risk Statement
Cybercriminals compromise end-user devices during travel to high-risk jurisdictions, jeopardizing staff safety and leading to loss of sensitive data.
Risk Scenario: Compliance Risk
Rapid changes in the privacy and security regulatory landscape threaten an organization’s ability to meet its compliance obligations from local legal and regulatory frameworks. Organizations that fail to do so risk reputational damage, administrative fines, criminal charges, and loss of market share. In extreme cases, organizations may lose their license to operate in high-risk jurisdictions. Shifts in the regulatory landscape can involve additional requirements for data residency, cross-border data transfer, data breach notification, and third-party risk management.
Risk Statement
Rapid changes in the privacy and security regulations landscape threaten our ability to remain compliant, leading to reputational and financial loss.
Download the Jurisdictional Risk Register and Heatmap Tool
Activities
2.2.1 Identify existing controls
2.2.2 Assess likelihood and impact
This step involves the following participants:
Outcomes of this step
Likelihood of Occurrence X Likelihood of Impact = Risk Severity
Likelihood of occurrence: How likely the risk is to occur.
Likelihood of impact: The likely impact of a risk event.
Risk severity: The significance of the risk.
Evaluate risk severity against the risk tolerance thresholds and the cost of risk response.
Existing controls were put in place to avoid, mitigate, or transfer key risks your organization faced in the past. Without considering existing controls, you run the risk of overestimating the likelihood and impact of the risk scenarios your organization faces in high-risk jurisdictions.
For instance, the ability to remote-wipe corporate-owned devices will reduce the potential impact of a device lost or compromised during travel to high-risk jurisdictions.
As you complete the risk assessment for each scenario, document existing controls that reduce their inherent likelihood and impact.
6-10 hours
Input | Output |
|
|
Materials | Participants |
|
|
Download the Jurisdictional Risk Register and Heatmap Tool.
Expected cost calculations may not be practical. Determining robust likelihood and impact values to produce cost estimates can be challenging and time consuming. Use severity-level assessments as a first pass to make the case for risk mitigation measures and take your lead from stakeholders.
Use the Jurisdictional Risk Register and Heatmap Tool to capture and analyze your data.
6-10 hours
Input | Output |
|
|
Materials | Participants |
|
|
Download the Jurisdictional Risk Register and Heatmap Tool.
Stakeholders will likely ask you to explain some of the numbers you assigned to likelihood and impact assessments. Pointing to an assessment methodology will give your estimates greater credibility.
The goal is to develop robust intersubjective estimates of the likelihood and impact of a risk scenario.
We assigned a 50% likelihood rating to a risk scenario. Were we correct?
Assess the truth of the following statements to test likelihood assessments. In this case, do these two statements seem true?
This phase will walk you through the following activities:
This phase involves the following participants:
Activities
3.1.1 Identify and assess risk response
This step involves the following participants:
Outcomes of this step
Identify
Identify risk responses.
Predict
Predict the effectiveness of the risk response, if implemented, by estimating the residual likelihood and impact of the risk.
Calculate
The tool will calculate the residual severity of the risk after applying the risk response.
The first part of the phase outlines project activities. The second part elaborates on high-risk travel and compliance risk, the two key risk scenarios we are following throughout the project. Use the Jurisdictional Risk Register and Heatmap Tool to capture your work.
Input | Output |
|
|
Materials | Participants |
|
|
Download the Jurisdictional Risk Register and Heatmap Tool
Activities
3.2.1 Develop a travel policy
3.2.2 Develop travel procedures
3.2.3 Design high-risk travel guidelines
This step involves the following participants:
Outcomes of this step
This section provides guidance on the most prevalent risk scenarios identified in Phase 2 and provides a more in-depth examination of the two most prevalent ones, high-risk travel and compliance risk. Determine the appropriate response to each risk scenario to keep global risks to critical assets aligned with the organization’s risk tolerance.
Before you leave
During your trip
When you return
Higher Education: Camosun College
Interview: Evan Garland
Situation
The director of the international department at Camosun College reached out to IT security for additional support. Department staff often traveled to hostile environments. They were concerned malicious agents would either steal end-user devices or compromise them and access sensitive data. The director asked IT security for options that would better protect traveling staff, their devices, and the information they contain.
Challenges
First, controls would need to admit both work and personal use of corporate devices. Staff relied exclusively on work devices for travel to mitigate the risk of personal device theft. Personal use of corporate devices during travel was common. Second, controls needed to strike the right balance between friction and effortless access. Traveling staff had only intermittent access to IT support. Restrictive controls could prevent them from accessing their devices and data altogether.
Solution
IT consulted staff to discuss light-touch solutions that would secure devices without introducing too much complexity or compromising functionality. They then planned security controls that involved user interaction and others that did not and identified training requirements.
Results
|
Controls with user interaction |
Controls without user interaction |
|
|
The most effective solution will take advantage of existing risk management policies, processes, and procedures at your organization.
Input | Output |
|
|
Materials | Participants |
|
|
Security plans are key country documents that outline the security measures and procedures in place and the responsibilities and resources required to implement them. Security plans should be established in high-risk jurisdictions where your organization has a regular, significant presence. Security plans must remain relevant and accessible documents that address the specific risks that exist in that location, and, if appropriate, are specific about where the measures apply and who they apply to. Plans should be updated regularly, especially following significant incidents or changes in the operating environment or activities.
Critical information – One-page summary of pertinent information for easy access and quick reference (e.g. curfew times, no-go areas, important contacts).
Overview – Purpose and scope of the document, responsibilities for security plan, organization’s risk attitude, date of completion and review date, and a summary of the security strategy and policy.
Current Context – Summary of current operating context and overall security situation; main risks to staff, assets, and operations; and existing threats and risk rating.
Procedures – Simple security procedures that staff should adhere to in order to prevent incidents and how to respond should problems arise. Standard operating procedures (SOPs) should address key risks identified in the assessment.
Security levels – The organization's security levels/phases, with situational indicators that reflect increasing risks to staff in that context and location and specific actions/measures required in response to increasing insecurity.
Incident reporting – The procedures and responsibilities for reporting security-related incidents; for example, the type of incidents to be reported, the reporting structure, and the format for incident reporting.
Ratings are formulated by assessing several types of risk, including conflict, political/civil unrest, terrorism, crime, and health and infrastructure risks.
Rating | Description (Examples) | Recommended Action |
Low | Generally secure with adequate physical security. Low violent crime rates. Some civil unrest during significant events. Acts of terrorism rare. Risks associated with natural disasters limited and health threats mainly preventable. | Basic personal security, travel, and health precautions required. |
Moderate | Periodic civil unrest. Antigovernment, insurgent, or extremist groups active with sporadic acts of terrorism. Staff at risk from common and violent crime. Transport and communications services are unreliable and safety records are poor. Jurisdiction prone to natural disasters or disease epidemics. | Increased vigilance and routine security procedures required. |
High | Regular periods of civil unrest, which may target foreigners. Antigovernment, insurgent, or extremist groups very active and threaten political or economic stability. Violent crime rates high and targeting of foreigners is common. Infrastructure and emergency services poor. May be regular disruption to transportation or communications services. Certain areas off-limits to foreigners. Jurisdictions experiencing a natural disaster or a disease epidemic are considered high risk. | High level of vigilance and effective, context-specific security precautions required. |
Extreme | Undergoing active conflict or persistent civil unrest. Risk of being caught up in a violent incident or attack is very high. Civil authorities may have lost control of significant portions of the country. Lines between criminality and political and insurgent violence are blurred. Foreigners are likely to be denied access to significant parts of the country. Transportation and communication services are severely degraded or non-existent. Violence presents a direct threat to staff security. | Stringent security precautions essential and may not be sufficient to prevent serious incidents. Program activities may be suspended and staff withdrawn at very short notice. |
Input | Output |
|
|
Materials | Participants |
|
|
Address all types of travel, detail security measures, and outline what the organization expects of travelers before, during, and after their trip
|
Introduction |
Clarifies who the procedures apply to. Highlights any differences in travel security requirements or support provided to staff, consultants, partners, and official visitors. |
|---|---|
|
Travel risk ratings |
Explains the travel or country risk rating system, how staff access the information, the different categories and indicators, and their implications. |
|
Roles and responsibilities |
Clarifies the responsibilities of travelers, their line managers or contact points, and senior management regarding travel security and how this changes for destinations with higher risk ratings. |
|
Travel authorization |
Stipulates who in the organization authorizes travel, the various compliance measures required, and how this changes for destinations with higher risk ratings. |
|
Travel risk assessment |
Explains when travel risk assessments are required, the template that should be used, and who approves the completed assessments. |
Travel security procedures should specify what happens when staff add personal travel to their work trip to cover issues such as insurance, check-in, actual travel times, etc.
|
Pre-travel briefings |
Outlines the information that must be provided to travelers prior to departure, the type of briefing required and who provides it, and how these requirements change as risk ratings increase. |
|---|---|
|
Security training |
Explain security training required prior to travel. This may vary depending on the country’s risk rating. Includes information on training waiver system, including justifications and authorization. |
|
Traveler profile forms |
Travelers should complete a profile form, which includes personal details, emergency contacts, medical details, social media footprint, and proof-of-life questions (in contexts where there are abduction risks). |
|
Check-in protocol |
Specifies who travelers must maintain contact with while traveling and how often, as well as the escalation process in case of loss of contact. The frequency of check-ins should reflect the increase in the risk rating for the destination. |
|
Emergency procedures |
Outlines the organization's emergency procedures for security and medical emergencies. |
Input | Output |
|
|
Materials | Participants |
|
|
Download the Digital Safety Guidelines for International Travel template
Activities
3.3.1 Identify data localization obligations
3.3.2 Integrate obligations into IT system design
3.3.3 Document data processing activities
3.3.4 Choose the right mechanism
3.3.5 Implement the appropriate controls
3.3.6 Identify data breach notification obligations
3.3.7 Integrate data breach notification into incident response
3.3.8 Identify vendor security and data protection requirements
3.3.9 Build due diligence questionnaire
3.3.10 Build appropriate data processing agreement
This step involves the following participants:
Outcomes of this step
Likelihood: Medium to High
Impact: High
Data Residency
Gap Controls
Heatmap of Global Data Residency Regulations
Examples of Data Residency Requirements
|
Country |
Data Type |
Local Storage Requirements |
|---|---|---|
|
Australia |
Personal data – heath record |
My Health Records Act 2012 |
|
China |
Personal information — critical information infrastructure operators |
Cybersecurity law |
|
Government cloud data |
Opinions of the Office of the Central Leading Group for Cyberspace Affairs on Strengthening Cybersecurity Administration of Cloud Computing Services for Communist Party and Government Agencies |
|
|
India |
Government email data |
The Public Records Act of 1993 |
|
Indonesia |
Data held by electronic system operator for the public service |
Regulation 82 concerning “Electronic System and Transaction Operation” |
|
Germany |
Government cloud service data |
Criteria for the procurement and use of cloud services by the federal German administration |
|
Russia |
Personal data |
The amendments of Data Protection Act No. 152 FZ |
|
Vietnam |
Data held by internet service providers |
The Decree on Management, Provision, and Use of Internet Services and Information Content Online (Decree 72) |
|
US |
Government cloud service data |
Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018) |
1-2 hours
|
Jurisdiction |
Relevant Regulations |
Local Storage Requirements |
Date Type |
|---|---|---|---|
Input | Output |
|
|
Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
1-2 hours
|
Item |
Consideration |
Answer |
Supporting Document |
|---|---|---|---|
| 1 |
Have you identified business services that process data that will be subject to localization requirements? |
||
| 2 |
Have you identified IT systems associated with the business services mentioned above? |
||
| 3 |
Have you established a data inventory (i.e. data types, business purposes) for the IT systems mentioned above? |
||
| 4 |
Have you established a data flow diagram for the data identified above? |
||
| 5 |
Have you identified the types of data that should be stored locally? |
||
| 6 |
Have you confirmed whether a copy of the data locally stored will satisfy the obligations? |
||
| 7 |
Have you confirmed whether an IT redesign is needed or whether modifications (e.g. adding a server) to the IT systems would satisfy the obligations? |
||
| 8 |
Have you confirmed whether access from another jurisdiction is allowed? |
||
| 9 |
Have you identified how long the data should be stored? |
Input | Output |
|
|
Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
Likelihood: Medium to High
Impact: High
Gap Controls
Which cross-border transfer mechanism should I choose?
|
Transfer Mechanism |
Advantages |
Disadvantages |
|---|---|---|
|
Standard Contractual Clauses (SCC) |
|
|
|
Binding Corporate Rules (BCRs) |
|
|
|
Code of Conduct |
|
|
|
Certification |
|
|
|
Consent |
|
|
1-2 hours
|
Input |
Output |
|
|
|
Materials |
Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
1-2 hours
Data Transfer Mechanism | Pros | Cons | Final Decision |
|---|---|---|---|
SCC | |||
BCR | |||
Code of Conduct | |||
Certification | |||
Consent |
Input | Output |
|
|
Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
1-3 hours
| # | Core Components | Status | Note |
|---|---|---|---|
| 1 | Purpose and scope | ||
| 2 | Effect and invariability of the Clauses | ||
| 3 | Description of the transfer(s) | ||
| 4 | Data protection safeguards | ||
| 5 | Purpose limitation | ||
| 6 | Transparency | ||
| 7 | Accuracy and data minimization | ||
| 8 | Duration of processing and erasure or return of data | ||
| 9 | Storage limitation | ||
| 10 | Security of processing | ||
| 11 | Sensitive data | ||
| 12 | Onward transfers | ||
| 13 | Processing under the authority of the data importer | ||
| 14 | Documentation and compliance | ||
| 15 | Use of subprocessors | ||
| 16 | Data subject rights | ||
| 17 | Redress | ||
| 18 | Liability | ||
| 19 | Local laws and practices affecting compliance with the Clauses | ||
| 20 | Noncompliance with the Clauses and termination | ||
| 21 | Description of data processing activities, such as list of parties, description of transfer, etc. | ||
| 22 | Technical and organizational measures |
| Input | Output |
|
|
| Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
Likelihood: High
Impact: Medium to High
Data Breach
Gap Controls
Examples of Data Breach Notification Obligations
|
Location |
Regulation/ Standard |
Reporting Obligation |
|---|---|---|
|
EU |
GDPR |
72 hours |
|
China |
PIPL |
Immediately |
|
US |
HIPAA |
No later than 60 days |
|
Canada |
PIPEDA |
As soon as feasible |
|
Global |
PCI DSS |
|
Summary of US State Data Breach Notification Statutes
1-2 hours
| Region | Regulation/Standard | Reporting Obligation |
|---|---|---|
Input | Output |
|
|
Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
1-2 hours
| # | Phase | Considerations | Status | Notes |
|---|---|---|---|---|
| 1 | Prepare | Ensure the appropriate resources are available to best handle an incident. | ||
| 2 | Detect | Leverage monitoring controls to actively detect threats. | ||
| 3 | Analyze | Distill real events from false positives. | ||
| 4 | Contain | Isolate the threat before it can cause additional damage. | ||
| 5 | Eradicate | Eliminate the threat from your operating environment. | ||
| 6 | Recover | Restore impacted systems to a normal state of operations. | ||
| 7 | Report | Report data breaches to relevant regulators and data subjects if required. | ||
| 8 | Post-Incident Activities | Conduct a lessons-learned post-mortem analysis. |
| Input | Output |
|
|
| Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
Likelihood: High
Impact: Medium to High
Third-Party Risk
End-to-End Third-Party Security and Privacy Risk Management
Examples of Vendor Security Management Requirements
|
Region |
Law/Standard |
Section |
|---|---|---|
|
EU |
General Data Protection Regulation (GDPR) |
Article 28 (1) |
|
Article 46 (1) |
||
| US |
Health Insurance Portability and Accountability Act (HIPAA) |
§164.308(b)(1) |
| US |
New York Department of Financial Services Cybersecurity Requirements |
500.11(a) |
|
Global |
ISO 27002:2013 |
15.1.1 |
|
15.1.2 |
||
|
15.1.3 |
||
|
15.2.1 |
||
|
15.2.2 |
||
| US |
NIST 800-53 |
SA-12 |
|
SA-12 (2) |
||
| US |
NIST Cybersecurity Framework |
ID-SC-1 |
|
ID-SC-2 |
||
|
ID-SC-3 |
||
|
ID-SC-4 |
||
| Canada |
OSFI Cybersecurity Guidelines |
4.25 |
|
4.26 |
1-2 hours
| Region | Law/Standard | Section | Requirements |
|---|---|---|---|
Input | Output |
|
|
Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
1-2 hours
Perform internal due diligence prior to selecting a service provider.
| # | Question | Vendor Request | Vendor Comments |
|---|---|---|---|
| 1 | Document Requests | ||
| 2 | Asset Management | ||
| 3 | Governance | ||
| 4 | Supply Chain Risk Management | ||
| 5 | Identify Management, Authentication, and Access Control |
| Input | Output |
|
|
| Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
1-2 hours
| # | Core Components | Status | Note |
|---|---|---|---|
| 1 | Processing of personal data | ||
| 2 | Scope of application and responsibilities | ||
| 3 | Processor's obligations | ||
| 4 |
Controller's obligations |
||
| 5 | Data subject requests | ||
| 6 | Right to audit and inspection | ||
| 7 | Subprocessing | ||
| 8 | Data breach management | ||
| 9 | Security controls | ||
| 10 | Transfer of personal data | ||
| 11 | Duty of confidentiality | ||
| 12 | Compliance with applicable laws | ||
| 13 | Service termination | ||
| 14 | Liability and damages |
| Input | Output |
|
|
| Materials | Participants |
|
|
Download the Guidelines for Compliance With Local Security and Privacy Laws Template
By following Info-Tech’s methodology for securing global operations, you have:
You have gone through a deeper analysis of two key risk scenarios that affect global operations:
If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.
Contact your account representative for more information.
workshop@infotech.com1-888-670-8889
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Identify High-Risk Jurisdictions
Develop requirements to identify high-risk jurisdictions.
Build Risk Scenarios
Build risk scenarios to capture assets, vulnerabilities, threats, and the potential effect of a compromise.
Ken Muir
CISO
LMC Security
Premchand Kurup
CEO
Paramount Computer Systems
Preeti Dhawan
Manager, Security Governance
Payments Canada
Scott Wiggins
Information Risk and Governance
CDPHP
Fritz Y. Jean Louis
CISO
Globe and Mail
Eric Gervais
CIO
Ovivo Water
David Morrish
CEO
MBS Techservices
Evan Garland
Manager, IT Security
Camosun College
Jacopo Fumagalli
CISO
Axpo
Dennis Leon
Governance and Security Manager
CPA Canada
Tero Lehtinen
CIO
Planmeca Oy
2022 Cost of Insider Threats Global Report.” Ponemon Institute, NOVIPRO, 9 Feb. 2022. Accessed 25 May 22.
“Allianz Risk Barometer 2022.” Allianz Global Corporate & Specialty, Jan. 2022. Accessed 25 May 22.
Bickley, Shaun. “Security Risk Management: a basic guide for smaller NGOs”. European Interagency Security Forum (EISF), 2017. Web.
“Biden Administration Warns against spyware targeting dissidents.” New York Times, 7 Jan 22. Accessed 20 Jan 2022.
Boehm, Jim, et al. “The risk-based approach to cybersecurity.” McKinsey & Company, October 2019. Web.
“Cost of a Data Breach Report 2021.” IBM Security, July 2021. Web.
“Cyber Risk in Asia-Pacific: The Case for Greater Transparency.” Marsh & McLennan Companies, 2017. Web.
“Cyber Risk Index.” NordVPN, 2020. Accessed 25 May 22
Dawson, Maurice. “Applying a holistic cybersecurity framework for global IT organizations.” Business Information Review, vol. 35, no. 2, 2018, pp. 60-67.
“Framework for improving critical infrastructure cybersecurity.” National Institute of Standards and Technology, 16 Apr 2018. Web.
“Global Cybersecurity Index 2020.” International Telecommunication Union (ITU), 2021. Accessed 25 May 22.
“Global Risk Survey 2022.” Control Risks, 2022. Accessed 25 May 22.
“International Travel Guidance for Government Mobile Devices.” Federal Mobility Group (FMG), Aug. 2021. Accessed 18 Nov 2021.
Kaffenberger, Lincoln, and Emanuel Kopp. “Cyber Risk Scenarios, the Financial System, and Systemic Risk Assessment.” Carnegie Endowment for International Peace, September 2019. Accessed 11 Jan 2022.
Koehler, Thomas R. Understanding Cyber Risk. Routledge, 2018.
Owens, Brian. “Cybersecurity for the travelling scientist.” Nature, vol. 548, 3 Aug 2017. Accessed 19 Jan. 2022.
Parsons, Fintan J., et al. “Cybersecurity risks and recommendations for international travellers.” Journal of Travel Medicine, vol. 1, no. 4, 2021. Accessed 19 Jan 2022.
Quinn, Stephen, et al. “Identifying and estimating cybersecurity risk for enterprise risk management.” National Institute of Standards and Technology (NIST), Interagency or Internal Report (IR) 8286A, Nov. 2021.
Quinn, Stephen, et al. “Prioritizing cybersecurity risk for enterprise risk management.” NIST, IR 8286B, Sept. 2021.
“Remaining cyber safe while travelling security recommendations.” Government of Canada, 27 April 2022. Accessed 31 Jan 2022.
Stine, Kevin, et al. “Integrating cybersecurity and enterprise risk management.” NIST, IR 8286, Oct. 2020.
Tammineedi, Rama. “Integrating KRIs and KPIs for effective technology risk management.” ISACA Journal, vol. 4, 1 July 2018.
Tikk, Eneken, and Mika Kerttunen, editors. Routledge Handbook of International Cybersecurity. Routledge, 2020.
Voo, Julia, et al. “National Cyber Power Index 2020.” Belfer Center for Science and International Affairs, Harvard Kennedy School, Sept. 2020. Web.
Zhang, Fang. “Navigating cybersecurity risks in international trade.” Harvard Business Review, Dec 2021. Accessed 31 Jan 22.
Likelihood: Medium to High
Impact: High
Gap Controls
For more holistic approach, you can leverage our Reduce and Manage Your Organization’s Insider Threat Risk blueprint.
You can’t just throw tools at a human problem. While organizations should monitor critical assets and groups with privileged access to defend against malicious behavior, good management and supervision can help detect attacks and prevent them from happening in the first place.
Industry | Actors | Risks | Tactics | Motives |
|---|---|---|---|---|
State and Local Government |
|
|
|
|
Information Technology |
|
|
|
|
Healthcare |
|
|
|
|
Finance and Insurance |
|
|
|
|
Source: Carnegie Mellon University Software Engineering Institute, 2019
Likelihood: Medium to High
Impact: High
Gap Controls
Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Effective anti-malware, diligent patching and vulnerability management, and strong human-centric security are essential.
Detect: There are two types of companies – those who have been breached and know it, and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs.
Analyze: Raw data without interpretation cannot improve security and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but also provides visibility into your threat landscape.
Respond: Organizations can’t rely on ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook to reduce incident remediation time and effort.
Lock down your organization. Among other tactics, control administrative privileges, leverage threat intelligence, use IP whitelisting, adopt endpoint protection and two-factor authentication, and formalize incident response measures.
Information alone is not actionable. A successful threat intelligence program contextualizes threat data, aligns intelligence with business objectives, and then builds processes to satisfy those objectives. Actively block indicators and act upon gathered intelligence.
Create organizational situational awareness around security initiatives to drive adoption of foundational security measures: network hardening, threat intelligence, red-teaming exercises, and zero-day mitigation, policies, and procedures.
Security extends beyond your organization. Ensure your organization has a comprehensive view of your organizational threat landscape and a clear understanding of the security posture of any managed service providers in your supply chain.
Conduct security awareness and training. Teach end users how to recognize current cyberattacks before they fall victim – this is a mandatory first line of defense.
As misinformation is a major attack vector for malicious actors, follow only reliable sources for cyberalerts and actionable intelligence. Aggregate information from these reliable sources.
The CISA Shields Up site provides the latest cyber risk updates on the Russia-Ukraine conflict and should provide the most value in staying informed.
The challenges posed by the virus are compounded by the fact that consumer expectations for strong service delivery remain high:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a consolidated, updated view of your current customer experience management strategy and identify which elements can be capitalized on to dampen the impact of COVID-19 and which elements are vulnerabilities that the pandemic may threaten to exacerbate.
Create a roadmap of business and technology initiatives through the lens of customer experience management that can be used to help your organization protect its revenue, maintain customer engagement, and enhance its brand integrity.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Define a digital product vision that takes into account your objectives, business value, stakeholders, customers, and metrics.
Build a structure for your backlog that supports your product vision.
Define standards, ownership for your backlog to effectively communicate your strategy in support of your digital product vision.
Understand what to consider when planning your next release.
Build a plan for communicating and updating your strategy and where to go next.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the elements of a good product vision and the pieces that back it up.
Provide a great foundation for an actionable vision and goals people can align to.
1.1 Build out the elements of an effective digital product vision
Completed product vision definition for a familiar product via the product canvas
Define the standards and approaches to populate your product backlog that support your vision and overall strategy.
A prioritized backlog with quality throughout that enables alignment and the operationalization of the overall strategy.
2.1 Introduction to key activities required to support your digital product vision
2.2 What do we mean by a quality backlog?
2.3 Explore backlog structure and standards
2.4 Define backlog data, content, and quality filters
Articulate the activities required to support the population and validation of your backlog
An understanding of what it means to create a quality backlog (quality filters)
Defining the structural elements of your backlog that need to be considered
Defining the content of your backlog and quality standards
Define standards and procedures for creating and updating your roadmap.
Enable your team to create a product roadmap to communicate your product strategy in support of your digital product vision.
3.1 Disambiguating backlogs vs. roadmaps
3.2 Defining audiences, accountability, and roadmap communications
3.3 Exploring roadmap visualizations
Understand the difference between a roadmap and a backlog
Roadmap standards and agreed-to accountability for roadmaps
Understand the different ways to visualize your roadmap and select what is relevant to your context
Build a release plan aligned to your roadmap.
Understand what goes into defining a release via the release canvas.
Considerations in communication of your strategy.
Understand how to frame your vision to enable the communication of your strategy (via an executive summary).
4.1 Lay out your release plan
4.2 How to introduce your product vision
4.3 Communicate changes to your strategy
4.4 Where do we get started?
Release canvas
An executive summary used to introduce other parties to your product vision
Specifics on communication of the changes to your roadmap
Your first step to getting started
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin your proactive audit management journey and leverage value from your software asset management program.
Prepare for an audit by effectively scoping and consolidating organizational response.
Execute the audit in a way that preserves valuable relationships while accounting for vendor specific criteria.
Conduct negotiations, settle on remuneration, and close out the audit.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Kick off the project
Identify challenges and red flags
Determine maturity and outline internal audit
Clarify stakeholder responsibilities
Build and structure audit team
Leverage value from your audit management program
Begin your proactive audit management journey
A documented consolidated licensing position, which ensures that you are not blindsided by a sudden audit request
1.1 Perform a maturity assessment of the current environment
1.2 Classify licensing contracts/vendors
1.3 Conduct a software inventory
1.4 Meter application usage
1.5 Manual checks
1.6 Gather software licensing data
1.7 Reconcile licenses
1.8 Create your audit team and assign accountability
Maturity assessment
Effective license position/license reconciliation
Audit team RACI chart
Create a strategy for audit response
Know the types of requests
Scope the engagement
Understand scheduling challenges
Know roles and responsibilities
Understand common audit pitfalls
Define audit goals
Take control of the situation and prepare a measured response
A dedicated team responsible for all audit-related activities
A formalized audit plan containing team responsibilities and audit conduct policies
2.1 Use Info-Tech’s readiness assessment template
2.2 Define the scope of the audit
Readiness assessment
Audit scoping email template
Overview of process conducted
Kick-off and self-assessment
Identify documentation requirements
Prepare required documentation
Data validation process
Provide resources to enable the auditor
Tailor audit management to vendor compliance position
Enforce best-practice audit behaviors
A successful audit with minimal impact on IT resources
Reduced severity of audit findings
3.1 Communicate audit commencement to staff
Audit launch email template
Clarify auditor findings and recommendations
Access severity of audit findings
Develop a plan for refuting unwarranted findings
Disclose findings to management
Analyze opportunities for remediation
Provide remediation options and present potential solutions
Ensure your audit was productive and beneficial
Improve your ability to manage audits
Come to a consensus on which findings truly necessitate organizational change
4.1 Don't accept the penalties; negotiate with vendors
4.2 Close the audit and assess the financial impact
A consensus on which findings truly necessitate organizational change
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use Info-Tech’s best practices for setting out a selection roadmap and evaluative criteria for narrowing down vendors – both enterprise and specialized providers.
Cut through Gen AI buzzwords to achieve market clarity.
The urge to be fast-moving to leverage the potential benefits of Gen AI is understandable. There are plenty of opportunities for Gen AI to enrich an organization’s use cases – from commercial to R&D to entertainment. However, there are requisites an organization needs to get right before Gen AI can be effectively applied. Part of this is ensuring data and AI governance is well established and mature within the organization. The other part is contextualizing Gen AI to know what components of this market the organization needs to invest in.
Owing to its popularity surge, OpenAI’s ChatGPT has become near synonymous with Gen AI. However, Gen AI is an umbrella concept that encompasses a variety of infrastructural architecture. Organizations need to ask themselves probing questions if they are looking to work with OpenAI: Does ChatGPT rest on the right foundational model for us? Does ChatGPT offer the right modalities to support our organization’s use cases? How much fine-tuning and prompt engineering will we need to perform? Do we require investment in on-premises infrastructure to support significant data processing and high-volume events? And do we require FTEs to enable all this infrastructure?
Use this market primer to quickly get up to speed on the elements your organization might need to make the most of Gen AI.
Advisory Director, Info-Tech Research Group
Your Challenge
|
Common Obstacles
|
Info-Tech's SolutionThis market primer for Gen AI will help you:
|
“We are entering the era of generative AI.
This is a unique time in our history where the benefits of AI are easily accessible and becoming pervasive with co-pilots emerging in the major business tools we use today. The disruptive capabilities that can potentially drive dramatic benefits also introduces risks that need to be planned for.”
Bill Wong, Principal Research Director – Data and BI, Info-Tech Research Group
Organizations with (1) FTEs devoted to making Gen AI work (including developers and business intelligence analysts), (2) trustworthy and regularly updated data, and (3) AI governance are just now reaching PoC testing.
Gen AI platforms will be built on different foundational models, be trained in different ways, and provide varying modalities. Do not expect to compare Gen AI platforms to the same parameters in a vendor quadrant.
While Gen AI success will be heavily reliant on the quality of data it is fine-tuned on, there are independent risks organizations must prepare for: from Gen AI hallucinations and output reliability to infrastructure feasibility to handle high-volume events.
If you plan to use Gen AI in a commercial setting, review your sales team’s KPIs. They are rewarded for sales velocity; if they are the human-in-the-loop to check for hallucinations, you must change incentives to ensure quality management.
If your organization is unsure about where to start with Gen AI, the secure route is to examine what your enterprise providers are offering. Use this as a learning platform to confidently navigate which specialized Gen AI provider will be viable for meeting your use cases.
The market trend has been for organizations to move to cloud-based products. Yet, for Gen AI, effective data processing and fine-tuning may call for organizations to invest in on-premises infrastructure (such as more GPUs) to enable their Gen AI to function effectively.
Phase Steps |
1. Contextualize the Gen AI marketplace
|
2. Prepare for and understand Gen AI platform offerings
|
Phase Outcomes |
|
|
Phase 1 |
Phase 2 |
|
|
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
The Gen AI market evaluation process should be broken into segments:
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful"
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Five advisory calls over a five-week period to accelerate your selection process
Click here to book your selection engagement.
40 hours of advisory assistance delivered online.
Select better software, faster.
Click here to book your workshop engagement.
Cyber-ransomware criminals need to make sure that you cannot simply recover your encrypted data via your backups. They must make it look like paying is your only option. And if you do not have a strategy that takes this into account, unfortunately, you may be up the creek without a paddle. because how do they make their case? Bylooking for ways to infect your backups, way before you find out you have been compromised.
That means your standard disaster recovery scenarios provide insufficient protection against this type of event. You need to think beyond DRP and give consideration to what John Beattie and Michael Shandrowski call "Cyber Incident Recovery Risk management" (CIR-RM).
incident, incident management, cybersecurity, cyber, disaster recovery, drp, business continuity, bcm, recovery
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build action-based metrics to measure the success of your chatbot proof of concept.
Put business value first to architect your chatbot before implementation.
Continue to grow your chatbot beyond the proof of concept.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Build your strategy.
Calculate your chatbot’s ROI to determine its success.
Organize your chatbot proof of concept (POC) metrics to keep the project on track.
Objectively choose chatbot ticket categories.
1.1 Customize your chatbot ROI calculator.
1.2 Choose your proof of concept ticket categories.
1.3 Design chatbot metrics to measure success.
Chatbot ROI Calculator
Chatbot POC Implementation Roadmap
Chatbot POC Metrics Tool
Architect your chatbot.
Design your integrations with business value in mind.
Begin building chatbot decision trees.
2.1 List and map your chatbot integrations.
2.2 Build your conversation tree library.
Chatbot Integration Map
Chatbot Conversation Tree Library
Architect your chatbot conversations.
Detail your chatbot conversations in the decision trees.
3.1 Build your conversation tree library.
Chatbot Conversation Tree Library
Continually grow your chatbot.
Identify talent for chatbot support.
Create an implementation plan.
4.1 Outline the support responsibilities for your chatbot.
4.2 Build a communication plan.
Chatbot POC RACI
Chatbot POC Communication Plan
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a light business case to gain buy-in and define goals, milestones, and use cases.
Create your list of requirements and shortlist vendors.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Any time a major IT outage occurs, it increases executive awareness and internal pressure to create an IT DRP. This blueprint will help you develop an actionable DRP by following our four-phase methodology to define scope, current status, and dependencies; conduct a business impact analysis; identify and address gaps in the recovery workflow; and complete, extend, and maintain your DRP.
These examples include a client who leveraged the DRP blueprint to create practical, concise, and easy-to-maintain DRP governance and incident response plans and a case study based on a hospital providing a wide range of healthcare services.
Use this tool to measure your current DRP maturity and identify gaps to address. It includes a comprehensive list of requirements for your DRP program, including core and industry requirements.
The project charter template includes details on the project overview (description, background, drivers, and objectives); governance and management (project stakeholders/roles, budget, and dependencies); and risks, assumptions, and constraints (known and potential risks and mitigation strategy).
This tool enables you to identify critical applications/systems; identify dependencies; define objective scoring criteria to evaluate the impact of application/system downtime; determine the impact of downtime and establish criticality tiers; set recovery objectives (RTO/RPO) based on the impact of downtime; record recovery actuals (RTA/RPA) and identify any gaps between objectives and actuals; and identify dependencies that regularly fail (and have a significant impact when they fail) to prioritize efforts to improve resiliency.
Use this tool to specifically record assumptions made about who and what are impacted by system downtime and record assumptions made about impact severity.
This simple format is ideal during crisis situations, easier to maintain, and often quicker to create. Use this template to document the Notify - Assess - Declare disaster workflow, document current and planned future state recovery workflows, including gaps and risks, and review an example recovery workflow.
Improving DR capabilities is a marathon, not a sprint. You likely can't fund and resource all the measures for risk mitigation at once. Instead, use this tool to create a roadmap for actions, tasks, projects, and initiatives to complete in the short, medium, and long term. Prioritize high-benefit, low-cost mitigations.
Use this template to present your results from the DRP Maturity Scorecard, BCP-DRP Fitness Assessment, DRP Business Impact Analysis Tool, tabletop planning exercises, DRP Recovery Workflow Template, and DRP Roadmap Tool.
Leverage this tool to document information regarding DRP resources (list the documents/information sources that support DR planning and where they are located) and DR teams and contacts (list the DR teams, SMEs critical to DR, and key contacts, including business continuity management team leads that would be involved in declaring a disaster and coordinating response at an organizational level).
The following tools and templates are also included as part of this blueprint to use as needed to supplement the core steps above:
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify key applications and dependencies based on business needs.
Understand the entire IT “footprint” that needs to be recovered for key applications.
1.1 Assess current DR maturity.
1.2 Determine critical business operations.
1.3 Identify key applications and dependencies.
Current challenges identified through a DRP Maturity Scorecard.
Key applications and dependencies documented in the Business Impact Analysis (BIA) Tool.
Quantify application criticality based on business impact.
Appropriate recovery time and recovery point objectives defined (RTOs/RPOs).
2.1 Define an objective scoring scale to indicate different levels of impact.
2.2 Estimate the impact of downtime.
2.3 Determine desired RTO/RPO targets for applications based on business impact.
Business impact analysis scoring criteria defined.
Application criticality validated.
RTOs/RPOs defined for applications and dependencies.
Determine your baseline DR capabilities (your current state).
Gaps between current and desired DR capability are quantified.
3.1 Conduct a tabletop exercise to determine current recovery procedures.
3.2 Identify gaps between current and desired capabilities.
3.3 Estimate likelihood and impact of failure of individual dependencies.
Current achievable recovery timeline defined (i.e. the current state).
RTO/RPO gaps identified.
Critical single points of failure identified.
Identify and prioritize projects to close DR gaps.
DRP project roadmap defined that will reduce downtime and data loss to acceptable levels.
4.1 Determine what projects are required to close the gap between current and desired DR capability.
4.2 Prioritize projects based on cost, effort, and impact on RTO/RPO reduction.
4.3 Validate that the suggested projects will achieve the desired DR capability.
Potential DR projects identified.
DRP project roadmap defined.
Desired-state incident response plan defined, and project roadmap validated.
Outline how to create concise, usable DRP documentation.
Summarize workshop results.
A realistic and practical approach to documenting your DRP.
Next steps documented.
5.1 Outline a strategy for using flowcharts and checklists to create concise, usable documentation.
5.2 Review Info-Tech’s DRP templates for creating system recovery procedures and a DRP summary document.
5.3 Summarize the workshop results, including current potential downtime and action items to close gaps.
Current-state and desired-state incident response plan flowcharts.
Templates to create more detailed documentation where necessary.
Executive communication deck that outlines current DR gaps, how to close those gaps, and recommended next steps.
"An effective DRP addresses common outages such as hardware and software failures, as well as regional events, to provide day-to-day service continuity. It’s not just insurance you might never cash in. Customers are also demanding evidence of an effective DRP, so organizations without a DRP risk business impact not only from extended outages but also from lost sales. If you are fortunate enough to have executive buy-in, whether it’s due to customer pressure or concern over potential downtime, you still have the challenge of limited time to dedicate to disaster recovery (DR) planning. Organizations need a practical but structured approach that enables IT leaders to create a DRP without it becoming their full-time job."
Frank Trovato,
Research Director, Infrastructure
Info-Tech Research Group
Potential Lost Revenue
The impact of downtime tends to increase exponentially as systems remain unavailable (graph at left). A current, tested DRP will significantly improve your ability to execute systems recovery, minimizing downtime and business impact. Without a DRP, IT is gambling on its ability to define and implement a recovery strategy during a time of crisis. At the very least, this means extended downtime – potentially weeks or months – and substantial business impact.
Adapted from: Philip Jan Rothstein, 2007
Cost of Downtime for the Fortune 1000
Cost of unplanned apps downtime per year: $1.25B to $2.5B.
Cost of critical apps failure per hour: $500,000 to $1M.
Cost of infrastructure failure per hour: $100,000.
35% reported to have recovered within 12 hours.
17% of infrastructure failures took more than 24 hours to recover.
13% of application failures took more than 24 hours to recover.
Source: Stephen Elliot, 2015
The cost of downtime is rising across the board, and not just for organizations that traditionally depend on IT (e.g. e-commerce). Downtime cost increase since 2010:
Hospitality: 129% increase
Transportation: 108% increase
Media organizations: 104% increase
DR planning is not your full-time job, so it can’t be a resource- and time-intensive process.
| The Traditional Approach | Info-Tech’s Approach |
|---|---|
|
Start with extensive risk and probability analysis. Challenge: You can’t predict every event that can occur, and this delays work on your actual recovery procedures. |
Focus on how to recover regardless of the incident. We know failure will happen. Focus on improving your ability to failover to a DR environment so you are protected regardless of what causes primary site failure. |
|
Build a plan for major events such as natural disasters. Challenge: Major destructive events only account for 12% of incidents while software/hardware issues account for 45%. The vast majority of incidents are isolated local events. |
An effective DRP improves day-to-day service continuity, and is not just for major events. Leverage DR planning to address both common (e.g. power/network outage or hardware failure) as well as major events. It must be documentation you can use, not shelfware. |
|
Create a DRP manual that provides step-by-step instructions that anyone could follow. Challenge: The result is lengthy, dense manuals that are difficult to maintain and hard to use in a crisis. The usability of DR documents has a direct impact on DR success. |
Create concise documentation written for technical experts. Use flowcharts, checklists, and diagrams. They are more usable in a crisis and easier to maintain. You aren’t going to ask a business user to recover your SQL Server databases, so you can afford to be concise. |
When a tornado takes out your data center, it’s an obvious DR scenario and the escalation towards declaring a disaster is straightforward.
The challenge is to be just as decisive in less-obvious (and more common) DR scenarios such as a critical system hardware/software failure, and knowing when to move from incident management to DR. Don’t get stuck troubleshooting for days when you could have failed over in hours.
Bridge the gap with clearly-defined escalation rules and criteria for when to treat an incident as a disaster.
Source: Info-Tech Research Group; N=92
Does this mean I don’t need to worry about natural disasters? No. It means DR planning needs to focus on overall service continuity, not just major disasters. If you ignore the more common but less dramatic causes of service interruptions, you are diminishing the business value of a DRP.
The traditional approach to DR starts with an in-depth exercise to identify risks to IT service continuity and the probability that those risks will occur.
Still, failure is inevitable – it’s been demonstrated multiple times1 through high-profile outages. When you surrender direct control of the systems themselves, it’s your responsibility to ensure the vendor can meet your DR requirements, including:
Sources: Kyle York, 2016; Shaun Nichols, 2017; Stephen Burke, 2017
IT DR is not an airplane disaster movie. You aren’t going to ask a business user to execute a system recovery, just like you wouldn’t really want a passenger with no flying experience to land a plane.
In reality, you write a DR plan for knowledgeable technical staff, which allows you to summarize key details your staff already know. Concise, visual documentation is:
"Without question, 300-page DRPs are not effective. I mean, auditors love them because of the detail, but give me a 10-page DRP with contact lists, process flows, diagrams, and recovery checklists that are easy to follow."
– Bernard Jones, MBCI, CBCP, CORP, Manager Disaster Recovery/BCP, ActiveHealth Management
Source: Info-Tech Research Group; N=95
*DR Success is based on stated ability to meet recovery time objectives (RTOs) and recovery point objectives (RPOs), and reported confidence in ability to consistently meet targets.
A DRP is the set of procedures and supporting documentation that enables an organization to restore its core IT services (i.e. applications and infrastructure) as part of an overall business continuity plan (BCP), as described below. Use the templates, tools, and activities in this blueprint to create your DRP.
| Overall BCP |
|---|
| IT DRP | BCP for Each Business Unit | Crisis Management Plan |
|---|---|---|
A plan to restore IT services (e.g. applications and infrastructure) following a disruption. This includes:
|
A set of plans to resume business processes for each business unit. Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization. | A set of processes to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage. This includes emergency response plans, crisis communication plans, and the steps to invoke BC/DR plans when applicable. Info-Tech’s Implement Crisis Management Best Practices blueprint provides a structured approach to develop a crisis management process. |
Note: For DRP, we focus on business-facing IT services (as opposed to the underlying infrastructure), and then identify required infrastructure as dependencies (e.g. servers, databases, network).
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Info-Tech members save an average of $22,983 and 22 days by working with an Info-Tech analyst on DRP (based on client response data from Info-Tech Research Group’s Measured Value Survey, following analyst advisory on this blueprint).
Define DRP scope (Call 1)
Scope requirements, objectives, and your specific challenges. Identify applications/ systems to focus on first.
Define current status and system dependencies (Calls 2-3)
Assess current DRP maturity. Identify system dependencies.
Conduct a BIA (Calls 4-6)
Create an impact scoring scale and conduct a BIA. Identify RTO and RPO for each system.
Recovery workflow (Calls 7-8)
Create a recovery workflow based on tabletop planning. Identify gaps in recovery capabilities.
Projects and action items (Calls 9-10)
Identify and prioritize improvements. Summarize results and plan next steps.
Your guided implementations will pair you with an advisor from our analyst team for the duration of your DRP project.
Contact your account representative or email Workshops@InfoTech.com for more information.
Industry: Manufacturing
Source: Info-Tech Research Group Client Engagement
A global manufacturer with annual sales over $1B worked with Info-Tech to improve DR capabilities.
DRP BIA
Conversations with the IT team and business units identified the following impact of downtime over 24 hours:
Tabletop Testing and Recovery Capabilities
Reviewing the organization’s current systems recovery workflow identified the following capabilities:
Findings
Because of end-user complaints, IT had invested heavily in email resiliency though email downtime had a relatively minimal impact on the business. After working through the methodology, it was clear that the business needed to provide additional support for critical systems.
Identify DR Maturity and System Dependencies
Conduct a BIA
Outline Incident Response and Recovery Workflow With Tabletop Exercises
Mitigate Gaps and Risks
This could be an annual review – but more likely, this is the first time you’ve reviewed the DR plan in years.* Maybe a failed audit might have provided a mandate for DR planning, or a real disaster might have highlighted gaps in DR capabilities. First, set appropriate expectations for what the project is and isn’t, in terms of scope, outputs, and resource commitments. Very few organizations can afford to hire a full-time DR planner, so it’s likely this won’t be your full-time job. Set objectives and timelines accordingly.
Gather a team
Find and review existing documentation
Set specific, realistic objectives
Estimated Time: 30 minutes
Identify the drivers and challenges to completing a functional DRP plan with the core DR team.
DRP Drivers
DRP Challenges
Write down insights from the meeting on flip-chart paper or a whiteboard and use the findings to inform your DRP project (e.g. challenges to address).
DRP Project Charter Template components:
Define project parameters, roles, and objectives, and clarify expectations with the executive team. Specific subsections are listed below and described in more detail in the remainder of this phase.
Note: Identify the initial team roles and responsibilities first so they can assist in defining the project charter.
Info-Tech’s DRP Maturity Scorecard evaluates completion status and process maturity for a comprehensive yet practical assessment across three aspects of an effective DRP program – Defining Requirements, Implementation, and Maintenance.
Completion Status: Reflects the progress made with each component of your DRP Program.
Process Maturity: Reflects the consistency and quality of the steps executed to achieve your completion status.
DRP Maturity Assessment: Each component (e.g. BIA) of your DRP Program is evaluated based on completion status and process maturity to provide an accurate holistic assessment. For example, if your BIA completion status is 4 out of 5, but process maturity is a 2, then requirements were not derived from a consistent defined process. The risk is inconsistent application prioritization and misalignment with actual business requirements.
Estimated Time: 30 minutes
Working through the planning process the first time can be challenging. If losing momentum is a concern, limit the BIA to a few critical systems to start.
Run this exercise if you need a structured exercise to decide where to focus first and identify the business users you should ask for input on the impact of system downtime.
| Application | Notes |
|---|---|
| CRM |
|
| Dialer |
|
Estimated Time: 1-2 hours
A high-level topology or architectural diagram is an effective way to identify dependencies, application ownership, outsourced services, hardware redundancies, and more.
Note:
In general, visual documentation is easier to use in a crisis and easier to maintain over time. Use Info-Tech’s research to help build your own visual SOPs.
Reviewing the entire ecosystem for applications identified key dependencies that were previously considered non-critical. For example, a system used to facilitate secure data transfers was identified as a key dependency for payroll and other critical business processes, and elevated to Tier 1.
Drawing a simple architectural diagram was an invaluable tool to identify key dependencies and critical systems, and to understand how systems and dependencies were interconnected. The drawing was an aha moment for IT and business stakeholders trying to make sense of their 1600-server environment.
A member of the S&P 500 used Info-Tech’s DRP Maturity Scorecard to provide a reliable objective assessment and make the case for improvements to the board of directors.
Info-Tech's DRP Project Charter enabled the CIO to clarify their DRP project scope and where it fit into their overall COOP. The project charter example provided much of the standard copy – objectives, scope, project roles, methodology, etc. – required to outline the project.
A BIA enables you to identify appropriate spend levels, maintain executive support, and prioritize DR planning for a more successful outcome. Info-Tech has found that a BIA has a measurable impact on the organization’s ability to set appropriate objectives and investment goals.
Business input is important, but don’t let a lack of it delay a draft BIA. Complete a draft based on your knowledge of the business. Create a draft within IT, and use it to get input from business leaders. It’s easier to edit estimates than to start from scratch; even weak estimates are far better than a blank sheet.
You don’t have to include every impact category in your BIA. Include categories that could affect your business. Defer or exclude other categories. For example, the bulk of revenue for governmental organizations comes from taxes, which won’t be permanently lost if IT systems fail.
Use the suggestions below as a guide as you modify scoring criteria in the DRP Business Impact Analysis Tool:
Estimated Time: 3 hours
On tab 3 of the DRP Business Impact Analysis Tool indicate the costs of downtime, as described below:
For example, if a core call center phone system was down:
Info-Tech suggests that IT leadership and staff identify the impact of downtime first to create a version that you can then validate with relevant business owners. As you work through the BIA as a team, have a notetaker record assumptions you make to help you explain the results and drive business engagement and feedback.
Some common assumptions:
Use Info-Tech’s DRP BIA Scoring Context Example as a note-taking template.
You can’t build a perfect scoring scale. It’s fine to make reasonable assumptions based on your judgment and knowledge of the business. Just write down your assumptions. If you don’t write them down, you’ll forget how you arrived at that conclusion.
Once you’ve finished estimating the impact of downtime, use the following rough guideline to create an initial sort of applications into Tiers 1, 2, and 3.
Example: Highest total score is 12
The business must validate acceptable and appropriate RTOs and RPOs, but IT can use the guidelines below to set an initial estimate.
A shorter RTO typically requires higher investment. If a short period of downtime has minimal impact, setting a low RTO may not be justifiable. As downtime continues, impact begins to increase exponentially to a point where downtime is intolerable – an acceptable RTO must be shorter than this. Apply the same thinking to RPOs – how much data loss is unnoticeable? How much is intolerable?
Estimated Time: 30 minutes
RTO and RPO tiers simplify management by setting similar recovery goals for systems and applications with similar criticality.
Use the “Debate Space” approach to set appropriate and acceptable targets.
In general, the more critical the system, the shorter the RPO. But that’s not always the case. For example, a service bus might be Tier 1, but if it doesn’t store any data, RPO might be longer than other Tier 1 systems. Some systems may have a different RPO than most other systems in that tier. As long as the targets are acceptable to the business and appropriate given the impact, that’s okay.
Most organizations discover something new about key applications, or the way stakeholders use them, when they work through the BIA and review the results with stakeholders. For example:
The DRP Business Impact Analysis Tool helped structure stakeholder consultations on DR requirements for a large university IT department. Past consultations had become an airing of grievances. Using objective impact scores helped stakeholders stay focused and make informed decisions around appropriate RTOs and RPOs.
Estimated the business impact of downtime
Set recovery targets
Up Next:Conduct a tabletop planning exercise to establish current recovery capabilities
In a tabletop planning exercise, the DRP team walks through a disaster scenario to map out what should happen at each stage, and effectively defines a high-level incident response plan (i.e. recovery workflow).
Tabletop planning had the greatest impact on meeting recovery objectives (RTOs/RPOs) among survey respondents.
*Note: Relative importance indicates the contribution an individual testing methodology, conducted at least annually, had on predicting success meeting recovery objectives, when controlling for all other types of tests in a regression model. The relative-importance values have been standardized to sum to 100%.
Success was based on the following items:
Why is tabletop planning so effective?
The goal is to define a plan to restore applications and systems following a disruption. For your first tabletop exercise, Info-Tech recommends you use a non-life-threatening scenario that requires at least a temporary relocation of your data center (i.e. failing over to a DR site/environment). Assume a gas leak or burst water pipe renders the data center inaccessible. Power is shut off and IT must failover systems to another location. Once you create the master procedure, review the plan to ensure it addresses other scenarios.
When systems fail, you are faced with two high-level options: failover or recover in place. If you document the plan to failover systems to another location, you’ll have documented the core of your DR procedures. This differs from traditional scenario planning where you define separate plans for different what-if scenarios. The goal is one plan that can be adapted to different scenarios, which reduces the effort to build and maintain your DRP.
Estimated Time: 2-3 hours
Why use flowcharts?
Use the completed tabletop planning exercise results to build this workflow.
"We use flowcharts for our declaration procedures. Flowcharts are more effective when you have to explain status and next steps to upper management." – Assistant Director, IT Operations, Healthcare Industry
Source: Info-Tech Research Group Interview
For a formatted template you can use to capture your plan, see Info-Tech’s DRP Recovery Workflow Template.
For a completed example of tabletop planning results, review Info-Tech’s Case Study: Practical, Right-Sized DRP.
What’s my RPA? Consider the following case:
When identifying RPA, remember the following:
You are planning for a disaster scenario, where on-site systems may be inaccessible and any copies of data taken during the disaster may fail, be corrupt, or never make it out of the data center (e.g. if the network fails before the backup file ships). In the scenario above, it seems likely that off-site incremental backups could be restored, leading to a 24-hour RPA. However, if there were serious concerns about the reliability of the daily incrementals, the RPA could arguably be based on the weekly full backups.
The RPA is a commitment to the maximum data you would lose in a DR scenario with current capabilities (people, process, and technology). Pick a number you can likely achieve. List any situations where you couldn’t meet this RPA, and identify those for a risk tolerance discussion. In the example above, complete loss of the primary SAN would also mean losing the snapshots, so the last good copy of the data could be up to 24-hours old.
On the “Impact Analysis” tab in the DRP Business Impact Analysis Tool, enter the estimated maximum downtime and data loss in the RTA and RPA columns.
It’s okay to round numbers to the nearest shift, day, or week for simplicity (e.g. 24 hours rather than 22.5 hours, or 8 hours rather than 7.25 hours).
Estimated Time: 1 hour
As you start to consider scenarios where injuries or loss of life are a possibility, remember that health and safety risks are the top priority in a crisis. If there’s a fire in the data center, evacuating the building is the first priority, even if that means foregoing a graceful shut down. For more details on emergency response and crisis management, see Implement Crisis Management Best Practices.
Walk through your recovery workflow in the context of additional, different scenarios to ensure there are no gaps. Collaborate with your DR team to identify changes that might be required, and incorporate these changes in the plan.
| Scenario Type | Considerations |
| Isolated hardware/software failure |
|
| Power outage or network outage |
|
| Local hazard (e.g. chemical leak, police incident) |
|
| Equipment/building damage (e.g. fire, roof collapse) |
|
| Regional natural disasters |
|
Estimated Time: 1.5 hours
It’s about finding ways to solve the problem, not about solving the problem. When you’re brainstorming solutions to problems, don’t stop with the first idea, even if the solution seems obvious. The first idea isn’t always the best or only solution; other ideas can expand on and improve that first idea.
Is it practical to invest in greater geo-redundancy that meets RTOs and RPOs during a widespread event?
Info-Tech suggests you consider events that impact both sites, and your risk tolerance for that impact. Outline the impact of downtime at a high level if both the primary and secondary site were affected. Research how often events severe enough to have impacted both your primary and secondary sites have occurred in the past. What’s the business tolerance for this type of event?
A common strategy: have a primary and DR site that are close enough to support low RPO/RTO, but far enough away to mitigate the impact of known regional events. Back up data to a remote third location as protection against a catastrophic event.
Approach site selection as a project. Leverage Select an Optimal Disaster Recovery Deployment Model to structure your own site-selection project.
Use the DRP Roadmap Tool to create a high-level roadmap to plan and communicate DR action items and initiatives. Determine the data you’ll use to define roadmap items.
Estimated Time: 30 minutes
Outline your expected future state recovery flow to demonstrate improvements once projects and action items have been completed.
Estimated Time: time required will vary
Tabletop planning is an effective way to discover gaps in recovery capabilities. Identify issues in the tabletop exercise so you can manage them before disaster strikes. For example:
A client started to back up application data offsite. To minimize data transfer and storage costs, the systems themselves weren’t backed up. Working through the restore process at the DR site, the DBA realized 30 years of COBOL and SQR code – critical business functionality – wasn’t backed up offsite.
A 500-employee professional services firm realized its internet connection could be a significant roadblock to recovery. Without internet, no one at head office could access critical cloud systems. The tabletop exercise identified this recovery bottleneck and helped prioritize the fix on the roadmap.
Hospitals rely on their phone systems for system downtime procedures. A tabletop exercise with a hospital client highlighted that if the data center were damaged, the phone system would likely be damaged as well. Identifying this provided more urgency to the ongoing VOIP migration.
A small municipality relied on a local MSP to perform systems restore, but realized it had never tested the restore procedure to identify RTA. Contacting the MSP to review capabilities became a roadmap item to address this risk.
Outlined the DRP response and risks to recovery
Brainstormed risk mitigation measures
Up Next: Leverage the core deliverables to complete, extend, and maintain your DRP
Congratulations! You’ve completed the core DRP deliverables and made the case for investment in DR capabilities. Take a moment to celebrate your accomplishments.
This milestone is an opportunity to look back and look forward.
Use the completed, updated DRP Maturity Scorecard to demonstrate the value of your continuity program, and to help you decide where to focus next.
Estimated Time: 2 hours
| Score | A: How significant are the risks this initiative will mitigate? | B: How easily can we complete this initiative? | C: How cost-effective is this initiative? |
|---|---|---|---|
| 3: High | Critical impact on +50% of stakeholders, or major impact to compliance posture, or significant health/safety risk. | One sprint, can be completed by a few individuals with minor supervision. | Within the IT discretionary budget. |
| 2: Medium | Impacts <50% of stakeholders, or minor impact on compliance, or degradation to health or safety controls. | One quarter, and/or some increased effort required, some risk to completion. | Requires budget approval from finance. |
| 1: Low | Impacts limited to <25% of stakeholders, no impact on compliance posture or health/safety. | One year, and/or major vendor or organizational challenges. | Requires budget approval from the board of directors. |
You can use a similar scoring exercise to prioritize and schedule high-benefit, low-effort, low-cost items identified in the roadmap in phase 3.
Write out the table on a whiteboard (record the results in a spreadsheet for reference). In the case below, IT might decide to work on repeating the core methodology first as they create the active testing plans, and tackle process changes later.
| Initiative | A: How significant are the risks this initiative will mitigate? | B: How easily can we complete this initiative? | C: How cost-effective is this initiative? | Aggregate score (A x B x C) |
|---|---|---|---|---|
| Repeat the core methodology for all systems | 2 – will impact some stakeholders, no compliance or safety impact. | 2 – will require about 3 months, no significant complications. | 3 – No cost. | 12 |
| Add DR to project mgmt. and change mgmt. | 1 – Mitigates some recovery risks over the long term. | 1 – Requires extensive consultation and process review. | 3 – No cost. | 3 |
| Active failover testing on plan | 2 – Mitigates some risks; documentation and cross training is already in place. | 2 – Requires 3-4 months of occasional effort to prepare for test. | 2 – May need to purchase some equipment before testing. | 8 |
Find a pace that allows you to keep momentum going, but also leaves enough time to act on the initial findings, projects, and action items identified in the DRP Roadmap Tool. Include these initiatives in the Roadmap tool to visualize how identified initiatives fit with other tasks identified to improve your recovery capabilities.
| Sample Outputs |
|---|
| Add Tier 2 & 3 systems to the BIA. |
| Complete another tabletop exercise for Tier 2 & 3 systems recovery, and add the results to the recovery workflow. |
| Identify projects to close additional gaps in the recovery process. Add projects to the project roadmap. |
Use this example of a complete, practical, right-size DR plan to drive and guide your efforts.
| Sample Outputs |
|---|
| Three to five detailed systems recovery flowcharts/checklists. |
| Documented team roles, succession plans, and contact information. |
| Notification, assessment, and disaster declaration plan. |
| DRP summary. |
| Layer 1, 2 & 3 network diagrams. |
Use this example of a complete, practical, right-size DR plan to drive and guide your efforts.
| Sample Outputs |
|---|
| Application assessment for cloud DR. |
| TCO tool for different environments. |
| Solution decision and executive presentation. |
Use Info-Tech’s blueprint, Select the Optimal Disaster Recovery Deployment Model, to help you make sense of a world of choice for your DR site.
Risks and Challenges Mitigated
| Sample Outputs |
|---|
| Business process-focused BIA for one business unit. |
| Recovery workflows for one business unit. |
| Provisioning list for one business unit. |
| BCP project roadmap. |
Use Info-Tech’s blueprint, Develop a Business Continuity Plan, to develop and deploy a repeatable BCP methodology.
| Sample Outputs |
|---|
| DR testing readiness assessment. |
| Testing handbooks. |
| Test plan summary template. |
| DR test issue log and analysis tool. |
Uncover deficiencies in your recovery procedures by using Info-Tech’s blueprint Reduce Costly Downtime Through DR Testing.
| Sample Outputs |
|---|
| Reviewed and updated change, project, and performance management processes. |
| Reviewed and updated internal SLAs. |
| Reviewed and updated data protection and backup procedures. |
| Sample Outputs |
|---|
| A customized vendor DRP questionnaire. |
| Reviewed vendor SLAs. |
| Choose to keep or change service levels or vendor offerings based on findings. |
Identified progress against targets
Prioritized further initiatives
Added initiatives to the roadmap
Myth #1: DRPs need to focus on major events such as natural disasters and other highly destructive incidents such as fire and flood.
Reality: The most common threats to service continuity are hardware and software failures, network outages, and power outages.
Myth #2: Effective DRPs start with identifying and evaluating potential risks.
Reality: DR isn’t about identifying risks; it’s about ensuring service continuity.
Myth #3: DRPs are separate from day-to-day operations and incident management.
Reality: DR must be integrated with service management to ensure service continuity.
Myth #4: I use a co-lo or cloud services so I don’t have to worry about DR. That’s my vendor’s responsibility.
Reality: You can’t outsource accountability. You can’t just assume your vendor’s DR capabilities will meet your needs.
Myth #5: A DRP must include every detail so anyone can execute the recovery.
Reality: IT DR is not an airplane disaster movie. You aren’t going to ask a business user to execute a system recovery, just like you wouldn’t really want a passenger with no flying experience to land a plane.
Select the Optimal Disaster Recovery Deployment Model Evaluate cloud, co-lo, and on-premises disaster recovery deployment models.
Develop a Business Continuity Plan Streamline the traditional approach to make BCP development manageable and repeatable.
Prepare for a DRP Audit Assess your current DRP maturity, identify required improvements, and complete an audit-ready DRP summary document.
Document and Maintain Your Disaster Recovery Plan Put your DRP on a diet: keep it fit, trim, and ready for action.
Reduce Costly Downtime Through DR Testing Improve your DR plan and your team’s ability to execute on it.
Implement Crisis Management Best Practices An effective crisis response minimizes the impact of a crisis on reputation, profitability, and continuity.
BCI Editor’s Note: In most countries “incident” and “crisis” are used interchangeably, but in the UK the term “crisis” has been generally reserved for dealing with wide-area incidents involving Emergency Services. The BCI prefers the use of “incident” for normal BCM purposes. (Source: The Business Continuity Institute)
BCMpedia. “Recovery Objectives: RTO, RPO, and MTPD.” BCMpedia, n.d. Web.
Burke, Stephen. “Public Cloud Pitfalls: Microsoft Azure Storage Cluster Loses Power, Puts Spotlight On Private, Hybrid Cloud Advantages.” CRN, 16 Mar. 2017. Web.
Elliot, Stephen. “DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified.” IDC, 2015. Web.
FEMA. Planning & Templates. FEMA, 2015. Web.
FINRA. “Business Continuity Plans and Emergency Contact Information.” FINRA, 2015. Web.
FINRA. “FINRA, the SEC and CFTC Issue Joint Advisory on Business Continuity Planning.” FINRA, 2013. Web.
Gosling, Mel, and Andrew Hiles. “Business Continuity Statistics: Where Myth Meets Fact.” Continuity Central, 2009. Web.
Hanwacker, Linda. “COOP Templates for Success Workbook.” The LSH Group, n.d. Web.
Homeland Security. Federal Information Security Management Act (FISMA). Homeland Security, 2015. Web.
Nichols, Shaun. “AWS's S3 Outage Was So Bad Amazon Couldn't Get Into Its Own Dashboard to Warn the World.” The Register, 1 Mar. 2017. Web.
Potter, Patrick. “BCM Regulatory Alphabet Soup.” RSA Archer Organization, 2012. Web.
Rothstein, Philip Jan. “Disaster Recovery Testing: Exercising Your Contingency Plan.” Rothstein Associates Inc., 2007. Web.
The Business Continuity Institute. “The Good Practice Guidelines.” The Business Continuity Institute, 2013. Web.
The Disaster Recovery Journal. “Disaster Resource Guide.” The Disaster Recovery Journal, 2015. Web.
The Disaster Recovery Journal. “DR Rules & Regulations.” The Disaster Recovery Journal, 2015. Web.
The Federal Financial Institution Examination Council (FFIEC). Business Continuity Planning. IT Examination Handbook InfoBase, 2015. Web.
York, Kyle. “Read Dyn’s Statement on the 10/21/2016 DNS DDoS Attack.” Oracle, 22 Oct. 2016. Web.
It is now 2020 and the GDPR has been in effect for almost 2 years. Many companies thought: been there, done that. And for a while the regulators let some time go by.
The first warnings appeared quickly enough. Eg; in September 2018, the French regulator warned a company that they needed to get consent of their customers for getting geolocation based data.
That same month, an airline was hacked and, on top of the reputational damage and costs to fix the IT systems, it faced the threat of a stiff fine.
Even though we not have really noticed, fines started being imposed as early as January 2019.
Wrong! The fines are levied in a number of cases. And to make it difficult to estimate, there are guidelines that will shape the decision making process, but no hard and fast rules!
The GDPR is very complex and consists of both articles and associated recitals that you need to be in compliance with. it is amuch about the letter as it is about the spirit.
We have a clear view on what most of those cases are.
And more importantly, when you follow our guidelines, you will be well placed to answer any questions by your clients and cooperate with the regulator in a proactive way.
They will never come after me. I'm too small.
And besides, I have my privacy policy and cookie notice in place
Company size has nothing to do with it.
While in the beginning, it seemed mostly a game for the big players (for names, you have to contact us) that is just perception.
As early as March 2018 a €10M revenue company was fined around €120,000. 2 days later another company with operating revenues of around €6.2M was fined close to €200.000 for failing to abide by the DSRR stipulatons.
Don't know what these are?
Fill out the form below and we'll let you in on the good stuff.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin your journey by understanding whether Salesforce is the right CRM. Also proactively approach Salesforce licensing by understanding which information to gather and assessing the current state and gaps.
Review current products and licensing models to determine which licensing models will most appropriately fit the organization's environment.
Review Salesforce’s contract types and assess which best fits the organization’s licensing needs.
Conduct negotiations, purchase licensing, finalize a licensing management strategy, and enhance your CRM with a Salesforce partner.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Assess current state and align goals; review business feedback.
Interview key stakeholders to define business objectives and drivers.
Have a baseline for whether Salesforce is the right solution.
Understand Salesforce as a solution.
Examine all CRM options.
1.1 Perform requirements gathering to review Salesforce as a potential solution.
1.2 Gather your documentation before buying or renewing.
1.3 Confirm or create your Salesforce licensing team.
1.4 Meet with stakeholders to discuss the licensing options and budget allocation.
Copy of your Salesforce Master Subscription Agreement
RASCI Chart
Salesforce Licensing Purchase Reference Guide
Review product editions and licensing options.
Review add-ons and licensing rules.
Understand how licensing works.
Discuss licensing rules and their application to your current environment.
Determine the product and license mix that is best for your requirements.
2.1 Determine the editions, licenses, and add-ons for your Salesforce CRM solution.
2.2 Calculate total cost of ownership.
2.3 Use the Salesforce Discount Calculator to ensure you are getting the discount you deserve.
2.4 Meet with stakeholders to discuss the licensing options and budget allocation.
Salesforce CRM Solution
Salesforce TCO Calculator
Salesforce Discount Calculator
Salesforce Licensing Purchase Reference Guide
Review terms and conditions of Salesforce contracts.
Review vendors.
Determine if MSA or term agreement is best.
Learn what specific terms to negotiate.
3.1 Perform a T&Cs review and identify key “deal breakers.”
3.2 Decide on an agreement that nets the maximum benefit.
Salesforce T&Cs Evaluation Tool
Salesforce Licensing Purchase Reference Guide
Finalize the contract.
Discuss negotiation points.
Discuss license management and future roadmap.
Discuss Salesforce partner and implementation strategy.
Discuss negotiation strategies.
Learn about licensing management best practices.
Review Salesforce partner options.
Create an implementation plan.
4.1 Know the what, when, and who to negotiate.
4.2 Control the flow of communication.
4.3 Assign the right people to manage the environment.
4.4 Discuss Salesforce partner options.
4.5 Discuss implementation strategy.
4.6 Meet with stakeholders to discuss licensing options and budget allocation.
Salesforce Negotiation Strategy
Vendor Communication Management Plan
RASCI Chart
Info-Tech’s Core CRM Project Plan
Salesforce Licensing Purchase Reference Guide
The saying goes, "as time goes by," but these days, we should say "as speed picks up." We're already in month two, so high time we take a look at the priorities you hopefully already set at the end of last year.
This is a story that should make you perk up.
I know of a department that was eager to launch their new product. The strain was severe. The board was breathing down their necks. Rivals were catching up (or so they thought).
"Let's get this thing live, prove the market wants it, then we'll circle back and handle all the security and stability backlog items." For the product owner, at the time, that seemed the right thing to do.
They were hacked 48 hours after going live.
Customer information was stolen. The brand's reputation suffered. The decision led to a months-long legal nightmare. And they still had to completely rebuild the system. Making stability and security bolt-on items is never a good idea.
See, I understand. When the product owner is pressing for user experience enhancements and you're running out of time for launch, it's easy to overlook those "non-functional requirements." Yet, we should avoid blaming the product owner. The PO is under pressure from many stakeholders, and a delayed launch may also come with significant costs.
Load balancing isn't visible to customers, after all. Penetration testing doesn't excite them. Failure mechanisms don't matter to them. This statement is true until a malfunction impacts a client. Then it suddenly becomes the most important thing in the world.
However, I know that ignoring non-functional requirements (NFRs) can lead to failed businesses (or business lines). This elevates these issues beyond mere technical inconveniences. NFRs are designed with the client in mind.
Look at it this way. When your system crashes during periods of high traffic, how does the user experience change? How satisfied are customers when their personal information is stolen? When it takes 30 seconds for your website to load, how does that conversion rate look?
Let me expose you to some consultant figures. The average cost of IT outages is $5,600 per minute, according to a 2014 Gartner study. That figure can rise to $300,000 per hour for larger businesses. The reality is that in your department, you will rarely reach these numbers. When we look at current (2020-2025) and expected (2026) trends, the typical operational loss numbers in international commercial banking or insurance are closer to 100K for high-impact incidents that are handled within 2–3 hours.
Obviously, your numbers will vary. And if you don't know what your costs are, now would be a good time to discover that. This does not imply that you should simply accept the risks associated with such situations. You must fix or mitigate such opportunities for hackers to get in. Do so at the appropriate cost for your business.
Data breaches are a unique phenomenon. According to IBM's Cost of a Data Breach Report 2025, a data breach typically costs $4.44 million, and detecting and containing it takes an average of 241 days. Some preview data from the 2025 report include that 97% of organizations that reported on the study indicated that they lacked access controls for their AI systems. That means that many companies don't even have the basics in order. And AI-related breaches are just going to accelerate. AI security defenses will help lower the cost of such breaches.
Despite the decreasing cost of these breaches, I anticipate an increase in their frequency in the upcoming years.
This means that non-functional requirements in terms of security and resilience should take a more prominent place in the prioritizations. Your client depends on your systems being safe, resilient, and performant.
And yet, this is where some leaders make mistakes. I have the impression they believe that client-focused design means more functionality and elegant interfaces. They prioritize user experience enhancements over system reliability.
I want to share a key fact that distinguishes successful businesses: customers desire more than just a good product. It must always function for them. And that means following certain procedures. They are not there to hamper you; they are there to retain customers.
88% of online shoppers are less likely to visit a website again after a negative experience, according to research from Forrester. Amazon found that they lose 1% of sales for every 100 ms of latency. That 100 milliseconds adds up to millions of lost profits when billions of dollars are at stake.
You run the risk of more than just technical difficulties when you deprioritize safety. Customer trust, revenue stability, competitive advantage, adherence to the law, costs, and team morale are all at stake.
Allow me to illustrate what I see happening during development cycles.
The team tests the happy flow. The user successfully logs in. The user navigates with ease. The user makes the purchase without any problems. The user logs off without incident.
"Excellent! Publish it!"
However, what occurs if 1000 users attempt to log in at once? What occurs if an attempt is made to insert malicious code into your contact form? During a transaction, what happens if your database connection fails?
These are not extreme situations. These are real-life occurrences.
Fifty percent of data center managers and operators reported having an impactful outage in the previous three years, according to the Uptime Institute's 2025 Global Data Center Survey. Note that this is at the infra level. The biggest contributor is power outages. What role does power play in ensuring a smooth flow? Power will not always flow as you want it, so plan for lack of power and for spikes.
With regard to software failures, the spread of possible causes widens. AI is a big contributor. AI is typically brought in to accelerate development and assist in coding. But it tends to introduce subtle bugs and vulnerabilities that a seasoned developer has to review and solve.
Another upcoming article will discuss how faster release cycles often lead to a rush in testing. This should not be the case; by spending some time automating your (non-)regression test bank, you will gain speed. But you have to invest time in building the test suite.
Can your system handle success? This question should keep every executive awake at night.
I've witnessed businesses invest millions in advertising campaigns to drive traffic to systems that fail due to their success. Consider describing to your board how your greatest marketing victory became your worst operational mishap.
Managing traffic spikes is only one aspect of load balancing. It is about ensuring that your business can handle opportunities without being overwhelmed.
Let's now address the most pressing issue: security.
The majority of leaders consider security to be like insurance, something you hope you never need. The fact that security is more than just protection, however, will alter the way you approach every project. It's approval to develop.
According to the Ponemon Institute's 2025 Cost of Insider Threats Global Report, the average annualized cost of insider threats, defined as employee negligence, criminal insiders, and credential thieves, has risen to $17.4 million per incident, up from $15.4 million in 2022. The number of discovered and analyzed incidents increased from 3,269 in 2018 to 7,868 in 2025 research studies.
Cybersecurity Ventures predicts that cybercrime will cost the global economy $10.5 trillion annually by 2025.
The most fascinating thing, though, is that companies that invest in proactive security see measurable outcomes. Organizations that allocate over 10% of their IT budget to cybersecurity have a 2.5-fold higher chance of experiencing no security incidents than those that allocate less than 1%, per Deloitte's Future of Cyber Survey.
By hardening your systems against common attack vectors, you can scale quickly without worrying about the future. You can handle sensitive data with confidence, enter new markets without fear, establish partnerships that require trust, and focus on innovation instead of crisis management.
Allow me to explain this in a way that will satisfy your CFO.
Retention is equal to reliability. Customers return when a system functions reliably (given you sell items they want). The Harvard Business Review claims that a 5% increase in customer retention rates boosts profits by 25% to 95%. It is five to twenty-five times less expensive to retain customers than to acquire new ones.
Scalability is equal to security. Secure systems can handle larger client volumes, more sensitive data, and higher-value transactions. 69% of board members and C-suite executives think that privacy and cyber risks could affect their company's ability to grow, according to PwC.
Profit is equal to performance. You lose conversions for every second of load time. Google discovered that the likelihood of a bounce rises by 32% as page load time increases from 1 to 3 seconds. It increases by 90% from 1 second to 5 seconds. Walmart discovered that every second improvement in page load time led to a 2% increase in conversions.
Reputation is equal to resilience. Guess which company benefits when your system works while your competitors' systems fail? Failures reduce trust. 71% of consumers will actively advocate against companies they don't trust, and 67% of consumers will stop purchasing from them, according to Edelman's 2023 Trust Barometer. While the 2025 report does not present comparative numbers, distrust impacting consumer behavior is likely to be even more prevalent.
Reframe this discussion with your executives and team
The numbers support this point. Businesses that invest in operational resilience see three times higher profit margins and 2.5 times higher revenue growth than their counterparts, according to McKinsey's 2023 State of Organizations report. In 2025 we see a focus on AI, but the point remains.
These metrics will grab the attention when you're presenting them.
Although the average cost of downtime varies by industry, it is always high.
The impact of a security breach on customer lifetime value is equally uncomfortable. Following a data breach, 78% of consumers will cease interacting with a brand online, and 36% will never do so again, according to Ping Identity's 2023 Consumer Identity Breach Report.
Every second that the system is unavailable results in a rapidly mounting loss of money. That's about $3,170 per minute of full downtime for a business that makes $100 million a year. We're talking about $31,700 per minute for billion-dollar businesses. Again, your experience may differ, but it's important to note that this cost is often unseen yet undeniable. If you want to calculate this more granularly, then I have a calculation method for you that is easy to implement.
There is a discernible trend in the cost of rebuilding versus building correctly the first time. Resolving a problem in production can cost four to five times as much as fixing it during design, and it can cost up to 100 times as much as fixing it during the requirements and design phase, according to IBM's Systems Sciences Institute.
This is what you should do right away.
Please begin by reviewing your current primary systems. When they're under stress, what happens? What occurs if they are attacked? What occurs if they don't work? 40% of businesses that suffer a significant system failure never reopen, although only 23% of organizations have tested their disaster recovery plans in the previous year, according to Gartner. Companies we work with test their systems at least once per year. If the results are unsatisfactory, we conduct a retest to ensure they meet our standards.
Next, please determine the actual cost of addressing issues at a later stage. Add in the costs of customer attrition, security breaches, downtime, and reconstruction. To lend credibility to your calculations, try to work out exact numbers for your company. Industry standards (like in this article) will give you indicators, but you need to know your figures.
Third, recast your non-functional needs as business needs. Consider focusing on strategies for managing success rather than solely discussing load balancing. Instead of discussing security testing, focus on revenue protection.
Fourth, consider safety when defining "done." Until a feature is dependable, secure, and scalable, it isn't considered complete. Projects that incorporate non-functional requirements from the outset have a threefold higher chance of success, per the Standish Group's 2023 Chaos Report.
Fifth, use system dependability as a differentiator in the marketplace. You're up when your rivals are down. You're safe when they're compromised.
I understand that resilience isn't sexy. I am aware that UI enhancements are more exciting than infrastructure resilience.
And yet, I know that businesses that prioritize safety will survive and lead after seeing others thrive and fail based on this one choice. Customers trust them. They are capable of scaling without breaking. Because they are confident that their systems can manage whatever comes next, they are the ones who get a good night's sleep.
Resilient organizations are twice as likely to surpass customer satisfaction goals and are 2.5 times more likely to achieve revenue growth of 10% or more.
Resilience represents the most significant competitive advantage. You have a choice. Just keep in mind that your clients are depending on you to do the job correctly.
Business and IT leaders aiming to recruit and select the best talent need to:
To create a great candidate experience, IT departments must be involved in the process at key points, recruitment and selection is not a job for HR alone!
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Train your IT department to get involved in the recruitment process to attract and select the best talent.
Use this tool in conjunction with the Improve you IT Recruitment Process to document your action plans
To get useful information from an interview, the interviewer should be focused on what candidates are saying and how they are saying it, not on what the next question will be, what probes to ask, or how they will score the responses. This Interview Guide Template will help interviewers stay focused and collect good information about candidates.
Hiring managers can choose from a comprehensive collection of core, functional, and leadership competency-based behavioral interview questions.
Use this template to develop a well-written job posting that will attract the star candidates and, in turn, deflect submission of irrelevant applications by those unqualified.
The most innovative technology isn’t necessarily the right solution. Review talent acquisition (TA) solutions and evaluate the purpose each option serves in addressing critical challenges and replacing critical in-person activities.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish the employee value proposition (EVP) and employer brand.
Have a well-defined EVP that you communicate through your employer brand.
1.1 Gather feedback.
1.2 Build key messages.
1.3 Assess employer brand.
Content and themes surrounding the EVP
Draft EVP and supporting statements
A clearer understanding of the current employer brand and how it could be improved
Develop job postings and build a strong sourcing program.
Create the framework for an effective job posting and analyze existing sourcing methods.
2.1 Review and update your job ads.
2.2 Review the effectiveness of existing sourcing programs.
2.3 Review job ads and sourcing methods for bias.
Updated job ad
Low usage sourcing methods identified for development
Minimize bias present in ads and sourcing methods
Create a high-quality interview process to improve candidate assessment.
Training on being an effective interviewer.
3.1 Create an ideal candidate scorecard.
3.2 Map out your interview process.
3.3 Practice behavioral interviews.
Ideal candidate persona
Finalized interview and assessment process
Practice interviews
Drive employee engagement and retention with a robust program that acclimates, guides, and develops new hires.
Evaluation of current onboarding practice.
4.1 Evaluate and redesign the onboarding program.
Determine new onboarding activities to fill identified gaps.
Follow this blueprint to:
|
|
Effective Interviewing |
Onboarding: Setting up New Hires For Success |
|||||||||
| Awareness | → | Research | → | Application | → | Screening | → | Interview and Assessment | → | Follow Up | → | Onboarding |
Talent is a priority for the entire organization:
Respondents rated “recruitment” as the top issue facing organizations today (McLean & Company 2022 HR Trends Report).
37% of IT departments are outsourcing roles to fill internal skill shortages (Info-Tech Talent Trends 2022 Survey).
Yet bad hires are alarmingly common:
Hiring is one of the least successful business processes, with three-quarters of managers reporting that they have made a bad hire (Robert Half, 2021).
48% of survey respondents stated improving the quality of hires was the top recruiting priority for 2021 (Jobvite, 2021).
Prework |
Day 1 |
Day 2 |
Day 3 |
Day 4 |
Post work |
|
|---|---|---|---|---|---|---|
Current Process and Job Descriptions Documented |
Establish the Employee Value Proposition (EVP) and Employer Brand |
Develop Job Postings and Build a Strong Sourcing Program |
Effective Interviewing |
Onboarding and Action Planning |
Putting the Action Plan Into Action! |
|
Activities |
|
1.1 Introduce the Concept of an EVP 1.2 Brainstorm Unique Benefits of Working at Your Organization 1.2 Employer Brand Introduction |
2.1 What Makes an Attractive Job Posting 2.2 Create the Framework for Job Posting 2.3 Improve the Sourcing Process 2.4 Review Process for Bias |
3.1 Creating an Interview Process 3.2 Selecting Interview Questions 3.3 Avoiding Bias During Interviews 3.4 Practice Interviews |
4.1 Why Onboarding Matters 4.2 Acclimatize New Hires and Set Them Up for Success 4.3 Action Plan |
5.1 Review Outputs and Select Priorities 5.2 Consult With HR and Senior Management to Get Buy-In 5.3 Plan to Avoid Relapse Behaviors |
Deliverables |
|
|
|
|
Develop a strong employee value proposition
The employee value proposition is your opportunity to showcase the unique benefits and opportunities of working at your organization, allowing you to attract a wider pool of candidates.
AN EMPLOYEE VALUE PROPOSITION IS: |
AN EMPLOYEE VALUE PROPOSITION IS NOT: |
||
|
|
||
THE FOUR KEY COMPONENTS OF AN EMPLOYEE VALUE PROPOSITION |
|||
Rewards |
Organizational Elements |
Working Conditions |
Day-to-Day Job Elements |
|
|
|
|
Creating a compelling EVP that presents a picture of your employee experience, with a focus on diversity, will attract a wide pool of diverse candidates to your team. This can lead to many internal and external benefits for your organization.
Existing Employee Value Proposition: If your organization or IT department has an existing employee value proposition, rather than starting from scratch, we recommend leveraging that and moving to the testing phase to see if the EVP still resonates with staff and external parties.
Employee Engagement Results: If your organization does an employee engagement survey, review the results to identify the areas in which the IT organization is performing well. Identify and document any key comment themes in the report around why employees enjoy working for the organization or what makes your IT department a great place to work.
Social Media Sites. Prepare for the good, the bad, and the ugly. Social media websites like Glassdoor and Indeed make it easier for employees to share their experiences at an organization honestly and candidly. While postings on these sites won’t relate exclusively to the IT department, they do invite participants to identify their department in the organization. You can search these to identify any positive things people are saying about working for the organization and potentially opportunities for improvement (which you can use as a starting point in the retention section of this report).
Download the Recruitment Workbook
Input |
Output |
|
|
Materials |
Participants |
|
|
Examples below.
Input | Output |
|
|
Materials | Participants |
|
|
Shopify |
“We’re Shopify. Our mission is to make commerce better for everyone – but we’re not the workplace for everyone. We thrive on change, operate on trust, and leverage the diverse perspectives of people on our team in everything we do. We solve problems at a rapid pace. In short, we get shit done.” |
|---|---|
Bettercloud |
“At Bettercloud, we have a smart, ambitious team dedicated to delighting our customers. Our culture of ownership and transparency empowers our team to achieve goals they didn’t think possible. For all those on board, it’s going to be a challenging and rewarding journey – and we’re just getting started.” |
Ellevest |
“As a team member at Ellevest, you can expect to make a difference through your work, to have a direct impact on the achievement of a very meaningful mission, to significantly advance your career trajectory, and to have room for fun and fulfillment in your daily life. We know that achieving a mission as critical as ours requires incredible talent and teamwork, and team is the most important thing to us.” |
INTERNAL TEST REVOLVES AROUND THE 3A’s |
EXTERNAL TEST REVOLVES AROUND THE 3C’s |
|---|---|
ALIGNED: The EVP is in line with the organization’s purpose, vision, values, and processes. Ensure policies and programs are aligned with the organization’s EVP. |
CLEAR: The EVP is straightforward, simple, and easy to understand. Without a clear message in the market, even the best intentioned EVPs can be lost in confusion. |
ACCURATE: The EVP is clear and compelling, supported by proof points. It captures the true employee experience, which matches the organization’s communication and message in the market. |
COMPELLING: The EVP emphasizes the value created for employees and is a strong motivator to join this organization. A strong EVP will be effective in drawing in external candidates. The message will resonate with them and attract them to your organization. |
ASPIRATIONAL: The EVP inspires both individuals and the IT organization as a whole. Identify and invest in the areas that are sure to generate the highest returns for employees. |
COMPREHENSIVE: The EVP provides enough information for the potential employee to understand the true employee experience and to self-assess whether they are a good fit for your organization. If the EVP lacks depth, the potential employee may have a hard time understanding the benefits and rewards of working for your organization. |
Market your EVP to potential candidates: Employer Brand
The employer brand is the perception internal and external stakeholders hold of the organization and exists whether it has been curated or not. Curating the employer brand involves marketing the organization and employee experience. Grounding your employer brand in your EVP enables you to communicate and market an accurate portrayal of your organization and employee experience and make you desirable to both current and potential employees.
![]() |
The unique offering an employer provides to employees in return for their effort, motivating them to join or remain at the organization. The perception internal and external stakeholders hold of the organization. |
Alignment between the EVP, employer brand, and corporate brand is the ideal branding package. An in-sync marketing strategy ensures stakeholders perceive and experience the brand the same way, creating brand ambassadors.
How you present your employer brand is just as important as the content. Ideally, you want the viewer to connect with and personalize the material for the message to have staying power. Use Marketing’s expertise to help craft impactful promotional materials to engage and excite the viewer.
Visuals
Images are often the first thing viewers notice. Use visuals that connect to your employer brand to engage the viewer’s attention and increase the likelihood that your message will resonate. However, if there are too many visuals this may detract from your content – balance is key!
Language
Wordsmithing is often the most difficult aspect of marketing. Your message should be accurate, informative, and engaging. Work with Marketing to ensure your wording is clever and succinct – the more concise, the better.
Composition
Integrate visuals and language to complete your marketing package. Ensure that the text and images are balanced to draw in the viewer.
This case study is happening in real time. Please check back to learn more as Goddard continues to recruit for the position.
Goddard Space Center is the largest of NASA’s space centers with approximately 11,000 employees. It is currently recruiting for a senior technical role for commercial launches. The position requires consulting and working with external partners and vendors.
NASA is a highly desirable employer due to its strong culture of inclusivity, belonging, teamwork, learning, and growth. Its culture is anchored by a compelling vision, “For the betterment of Humankind,” and amplified by a strong leadership team that actively lives their mission and vision daily.
Firsthand lists NASA as #1 on the 50 most prestigious internships for 2022.
The position is in a rural area of Eastern Shore Virginia with a population of approximately 60,000 people, which translates to a small pool of candidates. Any hire from outside the area will be expected to relocate as the senior technician must be onsite to support launches twice a month. Financial relocation support is not offered and the position is a two-year assignment with the option of extension that could eventually become permanent.
“Looking for a Talent Unicorn: a qualified, experienced candidate with both leadership skills and deep technical expertise that can grow and learn with emerging technologies.”
Steve Thornton
Acting Division Chief, Solutions Division, Goddard Space Flight Center, NASA
Culture takes the lead in NASA's job postings, which attract a high number of candidates. Postings begin with a link to a short video on working at NASA, its history, and how it lives its vision. The video highlights NASA's diversity of perspectives, career development, and learning opportunities.
NASA's company brand and employer brand are tightly intertwined, providing a consistent view of the organization.
The employer vision is presented in the best place to reach NASA's ideal candidate: usajobs.gov, the official website of the United States Government and the “go-to” for government job listings. NASA also extends its postings to other generic job sites as well as LinkedIn and professional associations.
Interview with Robert Leahy
Chief Information Officer, Goddard Space Flight Center, NASA
You can use sites like:
| Input | Output |
|
|
| Materials | Participants |
|
|
Create engaging job ads to attract talent to the organization
A job description is an internal document that includes sections such as general job information, major responsibilities, key relationships, qualifications, and competencies. It communicates job expectations to incumbents and key job data to HR programs.
A job ad is an externally facing document that advertises a position with the intent of attracting job applicants. It contains key elements from the job description as well as information on the organization and its EVP.
A job description informs a job ad, it doesn’t replace it. Don’t be lulled into using a job description as a posting when there’s a time crunch to fill a position. Refer to job postings as job advertisements to reinforce that their purpose is to attract attention and talent.
| Position Title |
|
|---|---|
| Company |
|
| Summary Description |
|
| Responsibilities |
|
| Position Characteristics |
|
| Position Requirements |
|
| Work Conditions |
|
| Process to Apply |
|
Bottom Line: A truly successful job posting ferrets out those hidden stars that may be over cautious and filters out hundreds of applications from the woefully under qualified.
DON’T overlook the power of words. Avoid phrases like “strong English language skills” as this may deter non-native English speakers from applying and a “clean-shaven” requirement can exclude candidates whose faith requires them to maintain facial hair. DON’T post a long requirements list. A study showed that the average jobseeker spends only 49.7 seconds reviewing a listing before deciding it's not a fit.* DON’T present a toxic work culture; phrases such as “work hard, play hard” can put off many candidates and play into the “bro- culture” stereotype in tech. |
Position Title: Senior Lorem Ipsum Salary Band: $XXX to $XXX Diversity is a core value at ACME Inc. We believe that diversity and inclusion is our strength, and we’re passionate about building an environment where all employees are valued and can perform at their best. As a … you will … Our ideal candidate …. Required Education and Experience
Required Skills
Preferred Skills
At ACME Inc. you will find … |
DO promote pay equity by being up front and honest about salary expectations. DO emphasize your organization’s commitment to diversity and an inclusive workplace by adding an equity statement. DO limit your requirements to “must haves” or at least showcase them first before the “nice-to-haves.” DO involve current employees or members of your employee resource groups when creating job descriptions to ensure that they ask for what you really need. DO focus on company values and criteria that are important to the job, not just what’s always been done. |
| ☑ | Does the job posting highlight your organization’s EVP |
| ☐ | Does the job posting avoid words that might discourage women, people of color, and other members of underrepresented groups from applying? |
| ☑ | Has the position description been carefully reviewed and revised to reflect current and future expectations for the position, rather than expectations informed by the persons who have previously held the job? |
| ☐ | Has the hiring committee eliminated any unnecessary job skills or requirements (college degree, years or type of previous experience, etc.) that might negatively impact recruitment of underrepresented groups? |
| ☑ | Has the hiring committee posted the job in places (job boards, websites, colleges, etc.) where applicants from underrepresented groups will be able to easily view or access it? |
| ☐ | Have members of the hiring committee attended job fairs or other events hosted by underrepresented groups? |
| ☐ | Has the hiring committee asked current employees from underrepresented groups to spread the word about the position? |
| ☐ | Has the hiring committee worked with the marketing team to ensure that people from diverse groups are featured in the organization’s website, publications, and social media? |
| ☐ | es the job description clearly demonstrate the organization’s and leadership’s commitment to DEI? |
| Input | Output |
|
|
| Materials | Participants |
|
|
Get involved with sourcing to get your job ad seen
Social Media |
Social media has trained candidates to expect:
|
While the focus on the candidate experience is important throughout the talent acquisition process, social media, technology, and values have made it a critical component of sourcing. |
Technology |
Candidates expect to be able to access job ads from all platforms.
Job ads must be clear, concise, and easily viewed on a mobile device. |
|
Candidate Values |
Job candidate’s values are changing.
Authenticity remains important.
|
Internal Talent Mobility (ITM) Program
Social Media Program
Employee Referral Program
Alumni Program
Campus Recruiting Program
Other Sourcing Tactics
What is it?
Positioning the right talent in the right place, at the right time, for the right reasons, and supporting them appropriately.
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | ITM program benefits:
Provide opportunities to develop professionally, whether in the current role or through promotions/lateral moves. Keep strong performers and high-potential employees committed to the organization. Address rapid change, knowledge drain due to retiring Baby Boomers, and frustration associated with time to hire or time to productivity. Reduce spend on talent acquisition, severance, time to productivity, and onboarding. Increase motivation and productivity by providing increased growth and development opportunities. Align with the organization’s offering and what is important to the employees from a development perspective. Support and develop employees from all levels and job functions. |
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | What is it? The widely accessible electronic tools that enable anyone to publish and access information, collaborate on common efforts, and build relationships. Learning to use social media effectively is key to sourcing the right talent.
(Ku, 2021) | |
Benefits of social media:
| Challenges of social media: With the proliferation of social media and use by most organizations, social media platforms have become overcrowded. As a result:
| |
“It is all about how we can get someone’s attention and get them to respond. People are becoming jaded.”
– Katrina Collier, Social Recruiting Expert, The Searchologist
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | What is it? Employees recommend qualified candidates. If the referral is hired, the referring employee typically receives some sort of reward. Benefits of an employee referral program:
55% of organizations report that hiring a referral is less expensive that a non-referred candidate (Clutch, 2020). The average recruiting lifecycle for an employee referral is 29 days, compared with 55 days for a non referral (Betterup, 2022). 46% percent of employees who were referred stay at their organization for a least one year, compared to 33% of career site hires (Betterup, 2022). High performers are more likely to refer other high performers to an organization (The University of Chicago Press, 2019). |
Avoid the Like Me Bias: Continually evaluate the diversity of candidates sourced from the employee referral program. Unless your workforce is already diverse, referrals can hinder diversity because employees tend to recommend people like themselves.
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | What is it? An alumni referral program is a formalized way to maintain ongoing relationships with former employees of the organization. Successful organizations use an alumni program:
Benefits of an alumni program:
|
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | What is it? A formalized means of attracting and hiring individuals who are about to graduate from schools, colleges, or universities. Almost 70% of companies are looking to employ new college graduates every year (HR Shelf, 2022). Campus recruitment benefits:
|
Target schools that align with your culture and needs. Do not just focus on the most prestigious schools: they are likely more costly, have more intense competition, and may not actually provide the right talent.
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | 1. Professional industry associations
| 5. Not-for-profit intermediaries
| American Expresscreated a boot camp for software engineers in partnership with Year Up and Gateway Community College to increase entry-level IT hires. Results:
(HBR, 2016) |
2. Special interest groups
| 6. Gamification
| ||
3. Customers
| PwC (Hungary) created Multiploy, a two-day game that allows students to virtually experience working in accounting or consulting at the organization. Results:
(Zielinski, 2015) | ||
4. Exit interviews
|
Use knowledge that already exists in the organization to improve talent sourcing capabilities.
Marketing |
HR |
|---|---|
Marketing knows how to:
|
HR knows how to:
|
To successfully partner with other departments in your organization:
Encourage your team to seek out, and learn from, employees in different divisions. Training sessions with the teams may not always be possible but one-on-one chats can be just as effective and may be better received.
| Input | Output |
|
|
| Materials | Participants |
|
|
Create a high-quality interview process to improve candidate assessment
If you…
…then stop. Use this research!
Step 5: Define decision rights
Establish decision-making authority and veto power to mitigate post-interview conflicts over who has final say over a candidate’s status.
Follow these steps to create a positive interview experience for all involved.
Define the attributes of the ideal candidate…
Ideal candidate = Ability to do the job + Motivation to do the job + Fit |
|||
Competencies
|
|
|
|
Experiences
|
Data for these come from:
|
||
Data for these come from:
|
|||
Caution: Evaluating for “organizational or cultural fit” can lead to interviewers falling into the trap of the “like me” bias, and excluding diverse candidates.
Non-negotiable = absolutely required for the job! Usually attributes that are hard to train, such as writing skills, or expensive to acquire after hire, such as higher education or specific technical skills. |
An Asset Usually attributes that can be trained, such as computer skills. It’s a bonus if the new hire has it. |
Nice-to-have Attributes that aren’t necessary for the job but beneficial. These could help in breaking final decision ties. |
Deal Breakers: Also discuss and decide on any deal breakers that would automatically exclude a candidate. |
“The hardest work is accurately defining what kind of person is going to best perform this job. What are their virtues? If you’ve all that defined, the rest is not so tough.”
– VP, Financial Services
| Input | Output |
|
|
| Materials | Participants |
|
|
The Screening Interview Template will help you develop a screening interview by providing:
Once completed, this template will help you or HR staff conduct candidate screening interviews with ease and consistency. Always do screening interviews over the phone or via video to save time and money.
Determine the goal of the screening interview – do you want to evaluate technical skills, communication skills, attitude, etc.? – and create questions based on this goal. If evaluating technical skill, have someone with technical competency conduct the interview.
Unstructured: A traditional method of interviewing that involves no constraints on the questions asked, no requirements for standardization, and a subjective assessment of the candidate. This format is the most prone to bias. |
Semi-Structured: A blend of structured and unstructured, where the interviewer will ask a small list of similar questions to all candidates along with some questions pertaining to the resume. |
Structured: An interview consisting of a standardized set of job-relevant questions and a scoring guide. The goal is to reduce interviewer bias and to help make an objective and valid decision about the best candidate. |
Components of a highly structured interview include:
The more of these components your interview has, the more structured it is, and the more valid it will be.
The purpose of interviewing is to assess, not just listen. Questions are what help you do this.
Use the Interview Question Planning Guide tab in the Candidate Interview Strategy and Planning Guide to prepare your interview questions.
Introduce yourself and ask if now is a good time to talk. (Before calling, prepare your sales pitch on the organization and the position.) |
You want to catch candidates off guard so that they don’t have time to prepare scripted answers; however, you must be courteous to their schedule. |
Provide an overview of the position, then start asking pre-set questions. Take a lot of notes. |
It is important to provide candidates with as much information as possible about the position – they are deciding whether they are interested in the role as much as you are deciding whether they are suitable. |
Listen to how the questions are answered. Ask follow-up questions when appropriate and especially if the candidate seems to be holding something back. |
If there are long pauses or the candidate’s voice changes, there may be something they aren’t telling you that you should know. |
Be alert to inconsistencies between the resume and answers to the questions and address them. |
It’s important to get to the bottom of issues before the in-person interview. If dates, titles, responsibilities, etc. seem to be inconsistent, ask more questions. |
Ask candidates about their salary expectations. |
It’s important to ensure alignment of the salary expectations early on. If the expectations are much higher than the range, and the candidate doesn’t seem to be open to the lower range, there is no point interviewing them. This would be a waste of everyone’s time. |
Answer the applicant’s questions and conclude the interview. |
|
Wait until after the interview to rate the applicant. |
Don’t allow yourself to judge throughout the interview, or it could skew questions. Rate the applicant once the interview is complete. |
When you have a shortlist of candidates to invite to an in-person interview, use the Candidate Communication Template to guide you through proper phone and email communications.
Question (traditional): “What would you identify as your greatest strength?” Answer: Ability to work on a team. |
Top-level interview questions set the stage for probing. Your interview script should contain the top two levels of questions in the pyramid and a few probes that you will likely need to ask. You can then drill down further depending on the candidate’s answers. |
|
Follow-Up Question: “Can you outline a particular example when you were able to exercise your teamwork skills to reach a team goal?” |
||
Probing questions start with asking what, when, who, why, and how, and gain insight into a candidate’s thought process, experiences, and successes. |
Probing Level 1: Probe around the what, how, who, when, and where. “How did you accomplish that?” |
How to develop probes? By anticipating the kinds of responses that candidates from different backgrounds or with different levels of experience are likely to give as a response to an interview question. Probes should provide a clear understanding of the situation, the behavior, and the outcome so that the response can be accurately scored. Common probes include:
|
Tailor probes to the candidate’s answers to evoke meaningful and insightful responses. |
Probing Level 2: Allow for some creativity. “What would you do differently if you were to do it again?” |
Consider leveraging behavioral interview questions in your interview to reduce bias.
Assessments are created by people that have biases. This often means that assessments can be biased, especially with preferences towards a Western perspective. Even if the same assessments are administered, the questions will be interpreted differently by candidates with varying cultural backgrounds and lived experiences. If assessments do not account for this, it ultimately leads to favoring the answers of certain demographic groups, often ones similar to those who developed the assessment.
Attribute you are evaluating Probing questions prepared Area to take notes |
![]() |
Exact question you will ask Place to record score Anchored scale with definitions of a poor, ok and great answer |
The must-haves:
“At the end of the day, it’s the supervisor that has to live with the person, so any decision that does not involve the supervisor is a very flawed process.” – VP, Financial Services
The nice-to-haves:
Record the interview team details in the Candidate Interview Strategy and Planning Guide template.
Who Should… Contact candidates to schedule interviews or communicate decisions?
Who Should… Be responsible for candidate welcomes, walk-outs, and hand-offs between interviews?
Who Should… Define and communicate each stakeholder’s role?
Who Should… Chair the preparation and debrief meetings and play the role of the referee when trying to reach a consensus?
“Unless you’ve got roles within the panel really detailed and agreed upon, for example, who is going to take the lead on what area of questions, you end up with a situation where nobody is in charge or accountable for the final interview assessment." – VP, Financial Services
Try a Two Lens Assessment: One interviewer assesses the candidate as a project leader while another assesses them as a people leader for a question such as “Give me an example of when you exercised your leadership skills with a junior team member.”
It is typical and acceptable that you, as the direct reporting manager, should have veto power, as do some executives. |
Veto Power Direct Supervisor or Manager |
Decision Makers: Must Have Consensus Other Stakeholders Direct Supervisor’s Boss Direct Supervisor |
Contributes Opinion HR Representative Peer |
After the preliminary interview, HR should not be involved in making the decision unless they have a solid understanding of the position. Peers can make an unfair assessment due to perceived competition with a candidate. Additionally, if a peer doesn’t want a candidate to be hired and the direct supervisor does hire the candidate, the peer may hold resentment against that candidate and set the team up for conflict. |
The decision should rest on those who will interact with the candidate on a daily basis and who manage the team or department that the candidate will be joining. |
The decisions being made can include whether or not to move a candidate onto the next phase of the hiring process or a final hiring decision. Deciding decision rights in advance defines accountability for an effective interview process.
Download the Behavioral Interview Question Library
| Input | Output |
|
|
| Materials | Participants |
|
|
Give candidates a warm, genuine greeting. Introduce them to other interviewers present. Offer a drink. Make small talk. |
“There are some real advantages to creating a comfortable climate for the candidate; the obvious respect for the individual, but people really let their guard down.” – HR Director, Financial Services |
Give the candidate an overview of the process, length, and what to expect of the interview. Indicate to the candidate that notes will be taken during the interview. |
If shorter than an hour, you probably aren’t probing enough or even asking the right questions. It also looks bad to candidates if the interview is over quickly. |
Start with the first question in the interview guide and make notes directly on the interview guide (written or typed) for each question. |
Take lots of notes! You think you’ll remember what was said, but you won’t. It also adds transparency and helps with documentation. |
Ask the questions in the order presented for interview consistency. Probe and clarify as needed (see next slide). |
Keep control of the interview by curtailing any irrelevant or long-winded responses. |
After all interview questions are complete, ask candidates if there was anything about their qualifications that was missed that they want to highlight. |
Lets you know they understand the job and gives them the feeling they’ve put everything on the table. |
Ask if the candidate has any questions. Respond to the questions asked. |
Answer candidate questions honestly because fit works both ways. Ensure candidates leave with a better sense of the job, expectations, and organizational culture. |
Review the compensation structure for the position and provide a realistic preview of the job and organization. |
Provide each candidate with a fair chance by maintaining a consistent interview process. |
Tell interviewees what happens next in the process, the expected time frame, and how they will be informed of the outcome. Escort them out and thank them for the interview. |
The subsequent slides provide additional detail on these eight steps to conducting an effective interview.
Like-me effect: An often-unconscious preference for, and unfairly positive evaluation of, a candidate based on shared interests, personalities, and experiences, etc.
Status effect: Overrating candidates based on the prestige of previously held positions, titles, or schools attended.
Recency bias: Placing greater emphasis on interviews held closer to the decision-making date.
Contrast effect: Rating candidates relative to those who precede or follow them during the interview process, rather than against previously determined data.
Solution
Assess candidates by using existing competency-based criteria.
Negative tone: Starting the interview on a negative or stressful note may derail an otherwise promising candidate.
Poor interview management: Letting the candidate digress may leave some questions unanswered and reduce the interview value.
Reliance of first impressions: Basing decisions on first impressions undermines the objectivity of competency-based selection.
Failure to ask probing questions: Accepting general answers without asking follow-up questions reduces the evidentiary value of the interview.
Solution
Follow the structured interview process you designed and practiced.
Do... |
Don’t… |
|---|---|
Take control of the interview by politely interrupting to clarify points or keep the interviewee on topic. Use probing to drill down on responses and ask for clarification. Ask who, what, when, why, and how. Be cognizant of confidentiality issues. Ask for a sample of work from a past position. Focus on knowledge or information gaps from previous interviews that need to be addressed in the interview. Ensure each member of a panel interview speaks in turn and the lead is given due respect to moderate. |
Be mean when probing. Intimidation actually works against you and is stressful for candidates. When you’re friendly, candidates will actually open up more. Interrupt or undermine other panel members. Their comments and questions are just as valid as yours are, and treating others unprofessionally gives a bad impression to the candidate. Ask illegal questions. Questions about things like religion, disability, and marital and family status are off limits. |
Do... |
While listening to responses, also watch out for red and yellow flags. |
|
Listen to how candidates talk about their previous bosses – you want it to be mainly positive. If their discussion of past bosses reflects a strong sense of self-entitlement or a consistent theme of victimization, this could be a theme in their behavior and make them hard to work with. |
Red Flag A concern about something that would keep you from hiring the person. |
Yellow Flag A concern that needs to be addressed, but wouldn’t keep you from hiring the person. |
Pay attention to body language and tone. They can tell you a lot about candidate motivation and interest. |
↓ |
|
Listen to what candidates want to improve. It’s an opportunity to talk about development and advancement opportunities in the organization. |
Not all candidates have red flags, but it is important to keep them in mind to identify potential issues with the candidate before they are hired. | |
Don’t… |
||
Talk too much! You are there to listen. Candidates should do about 80% of the talking so you can adequately evaluate them. Be friendly, but ensure to spend the time allotted assessing, not chatting. If you talk too much, you may end up hiring a weak candidate because you didn’t perceive weaknesses or not hire a strong candidate because you didn’t identify strengths. |
What if you think you sense a red or yellow flag? Following the interview, immediately discuss the situation with others involved in the recruitment process or those familiar with the position, such as HR, another hiring manager, or a current employee in the role. They can help evaluate if it’s truly a matter of concern. |
|
When the interviewer makes a positive impression on a candidate and provides a positive impression of the organization it carries forward after they are hired.
In addition, better candidates can be referred over the course of time due to higher quality networking.
As much as choosing the right candidate is important to you, make sure the right candidate wants to choose you and work for your organization.
Believe everything candidates say. Most candidates embellish and exaggerate to find the answers they think you want. Use probing to drill down to specifics and take them off their game. |
Ask gimmicky questions like “what color is your soul?” Responses to these questions won’t give you any information about the job. Candidates don’t like them either! |
Focus too much on the resume. If the candidate is smart, they’ve tailored it to match the job posting, so of course the person sounds perfect for the job. Read it in advance, highlight specific things you want to ask, then ignore it. |
Oversell the job or organization. Obviously you want to give candidates a positive impression, but don’t go overboard because this could lead to unhappy hires who don’t receive what you sold them. Candidates need to evaluate fit just as much as you. |
Get distracted by a candidate’s qualifications and focus only on their ability to do the job. Just because they are qualified does not mean they have the attitude or personality to fit the job or culture. |
Show emotion at any physical handicap. You can’t discriminate based on physical disability, so protect the organization by not drawing attention to it. Even if you don’t say anything, your facial expression may. |
Bring a bad day or excess baggage into the interview, or be abrupt, rushed, or uninterested in the interview. This is rude behavior and will leave a negative impression with candidates, which could impact your chances of hiring them. |
Submit to first impression bias because you’ll spend the rest of the interview trying to validate your first impression, wasting your time and the candidate’s. Remain as objective as possible and stick to the interview guide to stay focused on the task at hand. |
“To the candidate, if you are meeting person #3 and you’re hearing questions that person #1 and #2 asked, the company doesn’t look too hot or organized.” – President, Recruiting Firm
| Input | Output |
|
|
| Materials | Participants |
|
|
Download the Behavioral Interview Question Library
Strategic Planning
Professional Development
Onboarding should pick up where candidate experience leaves off
Onboarding ≠ Orientation
Onboarding is more than just orientation. Orientation is typically a few days of completing paperwork, reading manuals, and learning about the company’s history, strategic goals, and culture. By contrast, onboarding is three to twelve months dedicated to welcoming, acclimating, guiding, and developing new employees – with the ideal duration reflecting the time to productivity for the role.
A traditional orientation approach provides insufficient focus on the organizational identification, socialization, and job clarity that a new hire requires. This is a missed opportunity to build engagement, drive productivity, and increase organizational commitment. This can result in early disengagement and premature departure.
Over the long term, effective onboarding has a positive impact on revenue and decreases costs.
The benefits of onboarding:
Help new hires feel connected to the organization by clearly articulating the mission, vision, values, and what the company does. Help them understand the business model, the industry, and who their competitors are. Help them feel connected to their new team members by providing opportunities for socialization and a support network. |
Help put new hires on the path to high performance by clearly outlining their role in the organization and how their performance will be evaluated. |
Help new hires receive the experience and training they require to become high performers by helping them build needed competencies. |
We recommend a three-to-twelve-month onboarding program, with the performance management aspect of onboarding extending out to meet the standard organizational performance management cycle.
The length of the onboarding program should align with the average time to productivity for the role(s). Consider the complexity of the role, the industry, and the level of the new hire when determining program length.
For example, call center workers who are selling a straight-forward product may only require a three-month onboarding, while senior leaders may require a year-long program.
Our primary and secondary research identified the following as the most commonly stated reasons why employees leave organizations prematurely. These issues will be addressed throughout the next section.
Acclimate |
Guide |
Develop |
|
|
|
“Onboarding is often seen as an entry-level HR function. It needs to rise in importance because it’s the first impression of the organization and can be much more powerful than we sometimes give it credit for. It should be a culture building and branding program.” – Doris Sims, SPHR, The Succession Consultant, and Author, Creative Onboarding Programs
| Input | Output |
|
|
| Materials | Participants |
|
|
![]() |
Sample challenges |
Potential solutions |
|---|---|---|
Some paperwork cannot be completed digitally (e.g. I-9 form in the US). |
Where possible, complete forms with digital signatures (e.g. DocuSign). Where not possible, begin the process earlier and mail required forms to employees to sign and return, or scan and email for the employee to print and return. |
|
Required compliance training material is not available virtually. |
Seek online training options where possible. Determine the most-critical training needs and prioritize the replication of materials in audio/video format (e.g. recorded lecture) and distribute virtually. |
|
Employees may not have access to their equipment immediately due to shipping or supply issues. |
Delay employee start dates until you can set them up with the proper equipment and access needed to do their job. |
|
New hires can’t get answers to their questions about benefits information and setup. |
Schedule a meeting with an HR representative or benefits vendor to explain how benefits will work and how to navigate employee self-service or other tools and resources related to their benefits. |
One of the biggest challenges for remote new hires is the inability to casually ask questions or have conversations without feeling like they’re interrupting. Until they have a chance to get settled, providing formal opportunities for questions can help address this.
![]() | Sample challenges | Potential solutions |
|---|---|---|
Key company information such as organizational history, charts, or the vision, mission, and values cannot be clearly learned by employees on their own. | Have the new hire’s manager call to walk through the important company information to provide a personal touch and allow the new hire to ask questions and get to know their new manager. | |
Keeping new hires up to date on crisis communications is important, but too much information may overwhelm them or cause unnecessary stress. | Sharing the future of the organization is a critical part of the company information stage of onboarding and the ever-changing nature of the COVID-19 crisis is informing many organizations’ future right now. Be honest but avoid over-sharing plans that may change. | |
New hires can’t get answers to their questions about benefits information and setup. | Schedule a meeting with an HR representative or benefits vendor to explain how benefits will work and how to navigate employee self-service or other tools and resources related to their benefits. |
![]() | Sample challenges | Potential solutions |
|---|---|---|
Team introductions via a team lunch or welcome event are typically done in person. | Provide managers with a calendar of typical socialization events in the first few weeks of onboarding and provide instructions and ideas for how to schedule replacement events over videoconferencing. | |
New hires may not have a point of contact for informal questions or needs if their peers aren’t around them to help. | If it doesn’t already exist, create a virtual buddy program and provide instructions for managers to select a buddy from the new hire’s team. Explain that their role is to field informal questions about the company, team, and anything else and that they should book weekly meetings with the new hire to stay in touch. | |
New hires will not have an opportunity to learn or become a part of the informal decision-making networks at the organization. | Hiring managers should consider key network connections that new hires will need by going through their own internal network and asking other team members for recommendations. | |
New hires will not be able to casually meet people around the office. | Provide the employee with a list of key contacts for them to reach out to and book informal virtual coffee chats to introduce themselves. |
![]() | Sample challenges | Potential solutions |
|---|---|---|
Performance management (PM) processes have been paused given the current crisis. | Communicate to managers that new hires still need to be onboarded to the organization’s performance management process and that goals and feedback need to be introduced and the review process outlined even if it’s not currently happening. | |
Goals and expectations differ or have been reprioritized during the crisis. | Ask managers to explain the current situation at the organization and any temporary changes to goals and expectations as a result of new hires. | |
Remote workers often require more-frequent feedback than is mandated in current PM processes. | Revamp PM processes to include daily or bi-weekly touchpoints for managers to provide feedback and coaching for new hires for at least their first six months. | |
Managers will not be able to monitor new hire work as effectively as usual. | Ensure there is a formal approach for how employees will keep their managers updated on what they're working on and how it's going, for example, daily scrums or task-tracking software. |
For more information on adapting performance management to a virtual environment, see Info-Tech’s Performance Management for Emergency Work-From-Home research.
Categorize the different types of formal and informal training in the onboarding process into the following three categories. For departmental and individual training, speak to managers to understand what is required on a department and role basis:
Organizational |
Departmental |
Individual |
|---|---|---|
For example:
|
For example:
|
For example:
|
In a crisis, not every training can be translated to a virtual environment in the short term. It’s also important to focus on critical learning activities versus the non-critical. Prioritize the training activities by examining the learning outcomes of each and asking:
Lower priority or non-critical activities can be used to fill gaps in onboarding schedules or as extra activities to be completed if the new hire finds themselves with unexpected downtime to fill.
If there is a lack of resources, expertise, or time, outsource digital training to a content provider or through your LMS.
2021 Recruiter Nation Report. Survey Analysis, Jobvite, 2021. Web.
“5 Global Stats Shaping Recruiting Trends.” The Undercover Recruiter, 2022. Web.
Barr, Tavis, Raicho Bojilov, and Lalith Munasinghe. "Referrals and Search Efficiency: Who Learns What and When?" The University of Chicago Press, Journal of Labor Economics, vol. 37, no. 4, Oct. 2019. Web.
“How to grow your team better, faster with an employee referral program.” Betterup, 10 Jan. 2022. Web.
“Employee Value Proposition: How 25 Companies Define Their EVP.” Built In, 2021. Web.
Global Leadership Forecast 2021. Survey Report, DDI World, 2021. Web.
“Connecting Unemployed Youth with Organizations That Need Talent.” Harvard Business Review, 3 November 2016. Web.
Ku, Daniel. “Social Recruiting: Everything You Need To Know for 2022.” PostBeyond, 26 November 2021. Web.
Ladders Staff. “Shedding light on the job search.” Ladders, 20 May 2013. Web.
Merin. “Campus Recruitment – Meaning, Benefits & Challenges.” HR Shelf, 1 February 2022. Web.
Mobile Recruiting. Smart Recruiters, 2020. Accessed March 2022.
Roddy, Seamus. “5 Employee Referral Program Strategies to Hire Top Talent.” Clutch, 22 April 2020. Web.
Sinclair, James. “What The F*dge: That's Your Stranger Recruiting Budget?” LinkedIn, 11 November 2019. Web.
“Ten Employer Examples of EVPs.” Workology, 2022. Web
“The Higher Cost of a Bad Hire.” Robert Half, 15 March 2021. Accessed March 2022.
Trost, Katy. “Hiring with a 90% Success Rate.” Katy Trost, Medium, 8 August 2022. Web.
“Using Social Media for Talent Acquisition.” SHRM, 20 Sept. 2017. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify the KPIs that matter to your organization’s goals.
Use the IT Management Dashboard on the Info-Tech website to display your chosen KPIs.
Use the review of your KPIs to build an action plan to drive performance.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine the KPIs that matter to your organization.
Identify organizational goals
Identify IT goals and their organizational goal alignment
Identify business pain points
1.1 Identify organizational goals.
1.2 Identify IT goals and organizational alignment.
1.3 Identify business pain points.
List of goals and pain points to create KPIs for
Learn how to configure and use the IT Management Dashboard.
Configured IT dashboard
Initial IT scorecard report
2.1 Review metrics and KPI best practices.
2.2 Use the IT Metrics Library.
2.3 Select the KPIs for your organization.
2.4 Use the IT Management Dashboard.
Definition of KPIs to be used, data sources, and ownership
Configured IT dashboard
Learn how to review and plan actions based on the KPIs.
Lead KPI review to actions to improve performance
3.1 Create the scorecard report.
3.2 Interpret the results of the dashboard.
3.3 Use the IT Metrics Library to review suggested actions.
Initial IT scorecard report
Action plan with initial actions
Use your KPIs to drive performance.
Improve your metrics program to drive effectiveness
4.1 Develop your action plan.
4.2 Execute the plan and tracking progress.
4.3 Develop new KPIs as your practice matures.
Understanding of how to develop new KPIs using the IT Metrics Library
Ensure all documentation and plans are complete.
Documented next steps
5.1 Complete IT Metrics Library documentation.
5.2 Document decisions and next steps.
IT Metrics Library
Action plan
It’s difficult for CIOs and other top-level leaders of IT to know if everything within their mandate is being managed effectively. Gaining visibility into what’s happening on the front lines without micromanaging is a challenge most top leaders face.
Understanding Info-Tech’s Management and Governance Framework of processes that need to be managed and being able to measure what’s important to their organization's success can give leaders the ability to focus on their key responsibilities of ensuring service effectiveness, enabling increased productivity, and creating the ability for their teams to innovate.
Even if you know what to measure, the measurement alone will lead to minimal improvements. Having the right methods in place to systematically collect, review, and act on those measurements is the differentiator to driving up the maturity of your IT organization.
The tools in this blueprint can help you identify what to measure, how to review it, and how to create effective plans to improve performance.
Tony Denford
Research Director, Info-Tech Research Group
Info-Tech Insight
Mature your IT department by aligning your measures with your organizational goals. Acting early when your KPIs deviate from the goals leads to improved performance.
Build your dashboard quickly using the toolset in this research and move to improvement actions as soon as possible.

Productivity increased by 30%
Fire/smoke incidents decreased by 25% (high priority)
Average work request response time reduced by 64%
Savings of $1.6 million in the first year
(CFI, 2013)
Don’t get overwhelmed by the number of things you can measure. It can take some trial and error to find the measures that best indicate the health of the process.
35% - Only 35% of governing bodies review data at each meeting. (Committee of University Chairs, 2008)
Poor data can lead to incorrect conclusions, limit analysis, and undermine confidence in the value of your dashboard.
Achieving perfect data is extremely time consuming and may not add much value. It can also be an excuse to avoid getting started with metrics and analytics.
Data quality is a struggle for many organizations. Consider how much uncertainty you can tolerate in your analysis and what would be required to improve your data quality to an acceptable level. Consider cost, technological resources, people resources, and time required.
Info-Tech Insight
Analytics are only as good as the data that informs it. Aim for just enough data quality to make informed decisions without getting into analysis paralysis.
Tying KPIs and metrics to performance often leads to undesired behavior. An example of this is the now infamous Wells Fargo cross-selling scandal, in which 3.5 million credit card and savings accounts were opened without customers’ consent when the company incented sales staff to meet cross-selling targets.
Although this is an extreme example, it’s an all-too-common phenomenon.
A focus on the speed of closure of tickets often leads to shortcuts and lower-quality solutions.
Tying customer value to the measures can align the team on understanding the objective rather than focusing on the measure itself, and the team will no longer be able to ignore the impact of their actions.
Surrogation is a phenomenon in which a measure of a behavior replaces the intent of the measure itself. People focus on achieving the measure instead of the behavior the measure was intended to drive.
| The Threefold Role of the IT Executive | Core CIO Objectives |
|---|---|
| IT Organization - Manager | A - Optimize the Effectiveness of the IT Organization |
| Enterprise - Partner | B - Boost the Productivity of the Enterprise |
| Market - Innovator | C - Enable Business Growth Through Technology |
Low-Maturity Metrics Program
Trailing indicators measure the outcomes of the activities of your organization. Hopefully, the initiatives and activities are aligned with the organizational goals.
High-Maturity Metrics Program
The core CIO objectives align with the organizational goals, and teams define leading indicators that show progress toward those goals. KPIs are reviewed often and adjustments are made to improve performance based on the leading indicators. The results are improved outcomes, greater transparency, and increased predictability.

Periodically: As appropriate, review the effectiveness of the KPIs and adjust as needed.
Frequently: At least once per month, but the more frequent, the more agility your organization will have.

| 1. Choose the KPIs | 2. Build the Dashboard | 3. Create the Action Plan | |
|---|---|---|---|
| Phase Steps |
|
|
|
| Phase Outcomes | A defined and documented list of the KPIs that will be used to monitor each of the practice areas in your IT mandate | A configured dashboard covering all the practice areas and the ability to report performance in a consistent and visible way | An action plan for addressing low-performing indicators |
Don’t just measure things because you can. Change what you measure as your organization becomes more mature.
Measure things that will resolve pain points or drive you toward your goals.
Look for indicators that show the health of the practice, not just the results.
Ease of use will determine the success of your metrics program, so keep it simple to create and review the indicators.
If indicators are showing suboptimal performance, develop an action plan to drive the indicator in the right direction.
Act early and often.
Ensure you understand what’s valued and measure whether the value is being produced. Let front-line managers focus on tactical measures and understand how they are linked to value.
Determine what action will lead to the desired result and measure if the action is being performed. It’s better to predict outcomes than react to them.
Customize the KPIs for your organization using the IT Metrics Library
Keep track of the actions that are generated from your KPI review
The IT Overall Scorecard gives a holistic view of the performance of each IT function
Keeping track of the number of actions identified and completed is a low overhead measure. Tracking time or money saved is higher overhead but also higher value.

Industry: Government Services
Source: Info-Tech analyst experience
A newly formed application support team with service desk responsibilities was becoming burned out due to the sheer volume of work landing on their desks. The team was very reactive and was providing poor service due to multiple conflicting priorities.
To make matters worse, there was a plan to add a major new application to the team’s portfolio.
The team began to measure the types of work they were busy doing and then assessed the value of each type of work.
The team then problem solved how they could reduce or eliminate their low-value workload.
This led to tracking how many problems were being resolved and improved capabilities to problem solve effectively.
Upon initial data collection, the team was performing 100% reactive workload. Eighteen months later slightly more than 80% of workload was proactive high-value activities.
The team not only was able to absorb the additional workload of the new application but also identified efficiencies in their interactions with other teams that led to a 100% success rate in the change process and a 92% decrease in resource needs for major incidents.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Call #1: Scope dashboard and reporting needs.
Call #2: Learn how to use the IT Metrics Library to select your metrics.
Call #3: Set up the dashboard.
Call #4: Capture data and produce the report.
Phase 3 – Create the Action Plan
Call #5: Review the data and use the metrics library to determine actions.
Call #6: Improve the KPIs you measure.
A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 5 and 8 calls over the course of 2 to 3 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| Identify What to Measure | Configure the Dashboard Tool | Review and Develop the Action Plan | Improve Your KPIs | Compile Workshop Output | |
| Activities | 1.1 Identify organizational goals. 1.2 Identify IT goals and organizational alignment. 1.3 Identify business pain points. |
2.1 Determine metrics and KPI best practices. 2.2 Learn how to use the IT Metrics Library. 2.3 Select the KPIs for your organization. 2.4 Configure the IT Management Dashboard. |
3.1 Create the scorecard report. 3.2 Interpret the results of the dashboard. 3.3 Use the IT Metrics Library to review suggested actions. |
4.1 Develop your action plan. 4.2 Execute the plan and track progress. 4.3 Develop new KPIs as your practice matures. |
5.1 Complete the IT Metrics Library documentation. 5.2 Document decisions and next steps. |
| Outcomes | 1. List of goals and pain points that KPIs will measure | 1. Definition of KPIs to be used, data sources, and ownership 2. Configured IT dashboard |
1. Initial IT scorecard report 2. Action plan with initial actions |
1. Understanding of how to develop new KPIs using the IT Metrics Library | 1. IT Metrics Library documentation 2. Action plan |
Phase 1
1.1 Review Available KPIs
1.2 Select KPIs for Your Org.
1.3 Identify Data Sources and Owners
Phase 2
2.1 Understand the IT Management Dashboard
2.2 Build and Review the KPIs
Phase 3
3.1 Prioritize Low-Performing Indicators
3.2 Review Suggested Actions
3.3 Develop the Action Plan
This phase will walk you through the following activities:
Reviewing and selecting the KPIs suggested in the IT Metrics Library.
Identifying the data source for the selected KPI and the owner responsible for data collection.
This phase involves the following participants:
1.1.1 Download the IT Metrics Library and review the KPIs for each practice area.
Step 1.1 – Review Available KPIs
Step 1.2 – Select KPIs for Your Org.
Step 1.3 – Identify Data Sources and owners
This step will walk you through the following activities:
Downloading the IT Metrics Library
Understanding the content of the tool
Reviewing the intended goals for each practice area
This step involves the following participants:
Downloaded tool ready to select the KPIs for your organization
The “Practice” and “Process” columns relate to each of the boxes on the Info-Tech Management and Governance Framework. This ensures you are measuring each area that needs to be managed by a typical IT department.

KPI - The key performance indicator to review
CSF - What needs to happen to achieve success for each goal
Goal - The goal your organization is trying to achieve
Owner - Who will be accountable to collect and report the data
Data Source (typical) - Where you plan to get the data that will be used to calculate the KPI
Baseline/Target - The baseline and target for the KPI
Rank - Criticality of this goal to the organization's success
Action - Suggested action if KPI is underperforming
Blueprint - Available research to address typical underperformance of the KPI
Practice/Process - Which practice and process the KPI represents
1.2.1 Select the KPIs that will drive your organization forward
1.2.2 Remove unwanted KPIs from the IT Metrics Library
Step 1.1 – Review Available KPIs
Step 1.2 – Select KPIs for Your Org.
Step 1.3 – Identify Data Sources and Owners
This step will walk you through the following activities:
This step involves the following participants:
A shortlist of selected KPIs
1.3.1 Document the data source
1.3.2 Document the owner
1.3.3 Document baseline and target
Step 1.1 – Review Available KPIs
Step 1.2 – Select KPIs for Your Org.
Step 1.3 – Identify Data Sources and Owners
This step will walk you through the following activities:
Documenting for each KPI where you plan to get the data, who is accountable to collect and report the data, what the current baseline is (if available), and what the target is
This step involves the following participants:
A list of KPIs for your organization with appropriate attributes documented
Phase 1
1.1 Review Available KPIs
1.2 Select KPIs for Your Org.
1.3 Identify Data Sources and Owners
Phase 2
2.1 Understand the IT Management Dashboard
2.2 Build and Review the KPIs
Phase 3
3.1 Prioritize Low-Performing Indicators
3.2 Review Suggested Actions
3.3 Develop the Action Plan
This phase will walk you through the following activities:
Understanding the IT Management Dashboard
Configuring the IT Management Dashboard and entering initial measures
Produce thing IT Scorecard from the IT Management Dashboard
Interpreting the results
This phase involves the following participants:
2.1.1 Logging into the IT Management Dashboard
2.1.2 Understanding the “Overall Scorecard” tab
2.1.3 Understanding the “My Metrics” tab
Step 2.1 – Understand the IT Management Dashboard
Step 2.2 – Build and review the KPIs
This step will walk you through the following activities:
Accessing the IT Management Dashboard
Basic functionality of the tool
This step involves the following participants:
Understanding of how to administer the IT Management Dashboard

2.2.1 Entering the KPI descriptions
2.2.2 Entering the KPI actuals
2.2.3 Producing the IT Overall Scorecard
Step 2.1 – Understand the IT Management Dashboard
Step 2.2 – Build and review the KPIs
This step will walk you through the following activities:
Entering the KPI descriptions
Entering the actuals for each KPI
Producing the IT Overall Scorecard
This step involves the following participants:
An overall scorecard indicating the selected KPI performance
Example of a custom metric

Example of a standard metric


Phase 1
1.1 Review Available KPIs
1.2 Select KPIs for Your Org.
1.3 Identify Data Sources and Owners
Phase 2
2.1 Understand the IT Management Dashboard
2.2 Build and Review the KPIs
Phase 3
3.1 Prioritize Low-Performing Indicators
3.2 Review Suggested Actions
3.3 Develop the Action Plan
This phase will walk you through the following activities:
Prioritizing low-performing indicators
Using the IT Metrics Library to review suggested actions
Developing your team’s action plan to improve performance
This phase involves the following participants:
3.1.1 Determine criteria for prioritization
3.1.2 Identify low-performing indicators
3.1.3 Prioritize low-performing indicators
Step 3.1 – Prioritize low-performing indicators
Step 3.2 – Review suggested actions
Step 3.3 – Develop the action plan
This step will walk you through the following activities:
Determining the criteria for prioritization of low-performing indicators
Identifying low-performing indicators
Prioritizing the low-performing indicators
This step involves the following participants:
A prioritized list of low-performing indicators that need remediation
Often when metrics programs are established, there are multiple KPIs that are not performing at the desired level. It’s easy to expect the team to fix all the low-performing indicators, but often teams are stretched and have conflicting priorities.
Therefore it’s important to spend some time to prioritize which of your indicators are most critical to the success of your business.
Also consider, if one area is performing well and others have multiple poor indicators, how do you give the right support to optimize the results?
Lastly, is it better to score slightly lower on multiple measures or perfect on most but failing badly on one or two?
3.2.1 Review suggested actions in the IT Metrics Library
Step 3.1 – Prioritize low-performing indicators
Step 3.2 – Review suggested actions
Step 3.3 – Develop the action plan
This step will walk you through the following activities:
Reviewing the suggested actions in the IT Metrics Library
This step involves the following participants:
An idea of possible suggested actions
3.3.1 Document planned actions
3.3.2 Assign ownership of actions
3.3.3 Determine timeline of actions
3.3.4 Review past action status
Step 3.1 – Prioritize low- performing indicators
Step 3.2 – Review suggested actions
Step 3.3 – Develop the action plan
This step will walk you through the following activities:
Using the action plan tool to document the expected actions for low-performing indicators
Assigning an owner and expected due date for the action
Reviewing past action status for accountability
This step involves the following participants:
An action plan to invoke improved performance
Info-Tech Insight
For larger initiatives try to break the task down to what is likely manageable before the next review. Seeing progress can motivate continued action.
Info-Tech Insight
Assigning clear ownership can promote accountability for progress.
Info-Tech Insight
If the target completion date is too far in the future, break the task into manageable chunks.
Info-Tech Insight
Seek to understand the reasons that tasks are not being completed and problem solve for creative solutions to improve performance.
Keeping track of the number of actions identified and completed is a low overhead measure.
Tracking time or money saved is higher overhead but also higher value.

| Metric | Current | Goal |
|---|---|---|
| Number of actions identified per month as a result of KPI review | 0 | TBD |
| $ saved through actions taken due to KPI review | 0 | TBD |
| Time saved through actions taken due to KPI review | 0 | TBD |
Through this project we have identified typical key performance indicators that are important to your organization’s effective management of IT.
You’ve populated the IT Management Dashboard as a simple method to display the results of your selected KPIs.
You’ve also established a regular review process for your KPIs and have a method to track the actions that are needed to improve performance as a result of the KPI review. This should allow you to hold individuals accountable for improvement efforts.
You can also measure the effectiveness of your KPI program by tracking how many actions are identified as a result of the review. Ideally you can also track the money and time savings.
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
To accelerate this project, engage your IT team in an Info-Tech Workshop with an Info-Tech analyst team.
Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Select the KPIs for your organization
Examine the benefits of the KPIs suggested in the IT Metrics Library and help selecting those that will drive performance for your maturity level.
Build an action plan
Discuss options for identifying and executing actions that result from your KPI review. Determine how to set up the discipline needed to make the most of your KPI review program.
Principal Research Director, CIO – Service Management Info-Tech Research Group
Practice Lead, CIO – People & Leadership Info-Tech Research Group
Practice Lead, Infrastructure & Operations Info-Tech Research Group
Practice Lead, Security, Risk & Compliance Info-Tech Research Group
Practice Lead, Applications and Agile Development Info-Tech Research Group
Practice Lead, Applications – Project and Portfolio Mgmt. Info-Tech Research Group
Vice President, Applications Info-Tech Research Group
Research Director, CIO Info-Tech Research Group
Practice Lead, Enterprise Applications Info-Tech Research Group
Practice Lead, Enterprise Architecture, Data & BI Info-Tech Research Group
Executive Counselor Info-Tech Research Group
Develop Meaningful Service Metrics to Ensure Business and User Satisfaction
Use Applications Metrics That Matter
Take Control of Infrastructure Metrics
Bach, Nancy. “How Often Should You Measure Your Organization's KPIs?” EON, 26 June 2018. Accessed Jan. 2020.
“The Benefits of Tracking KPIs – Both Individually and for a Team.” Hoopla, 30 Jan. 2017. Accessed Jan. 2020.
Chepul, Tiffany. “Top 22 KPI Examples for Technology Companies.” Rhythm Systems, Jan. 2020. Accessed Jan. 2020.
Cooper, Larry. “CSF's, KPI's, Metrics, Outcomes and Benefits” itSM Solutions. 5 Feb. 2010. Accessed Jan 2020.
“CUC Report on the implementation of Key Performance Indicators: case study experience.” Committee of University Chairs, June 2008. Accessed Jan 2020.
Harris, Michael, and Bill Tayler. “Don’t Let Metrics Undermine Your Business.” HBR, Sep.–Oct 2019. Accessed Jan. 2020.
Hatari, Tim. “The Importance of a Strong KPI Dashboard.” TMD Coaching. 27 Dec. 2018. Accessed Jan. 2020.
Roy, Mayu, and Marian Carter. “The Right KPIs, Metrics for High-performing, Cost-saving Space Management.” CFI, 2013. Accessed Jan 2020.
Schrage, Michael, and David Kiron. “Leading With Next-Generation Key Performance Indicators.” MIT Sloan Management Review, 26 June 2018. Accessed Jan. 2020.
Setijono, Djoko, and Jens J. Dahlgaard. “Customer value as a key performance indicator (KPI) and a key improvement indicator (KII)” Emerald Insight, 5 June 2007. Accessed Jan 2020.
Skinner, Ted. “Balanced Scorecard KPI Examples: Comprehensive List of 183 KPI Examples for a Balanced Scorecard KPI Dashboard (Updated for 2020).” Rhythm Systems, Jan. 2020. Accessed Jan 2020.
Wishart, Jessica. “5 Reasons Why You Need The Right KPIs in 2020” Rhythm Systems, 1 Feb. 2020. Accessed Jan. 2020.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build a plan for governing an implementation.
Maximize the net benefit conferred by governance.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess current state and plan the scope of the SAM program, team, and budget.
Define processes for software requests, procurement, receiving, and deployment.
Define processes for software inventory, maintenance, harvest and redeployment, and retirement.
Build processes for audits and plan the implementation.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Assess current state and plan the scope of the SAM program, team, and budget.
Current state assessment
Defined roles and responsibilities
SAM budget plan
1.1 Outline SAM challenges and objectives.
1.2 Assess current state.
1.3 Identify roles and responsibilities for SAM team.
1.4 Identify metrics and reports.
1.5 Identify SAM functions to centralize vs. decentralize.
1.6 Plan SAM budget process.
Current State Assessment
RACI Chart
Defined metrics and reports
SAM Budget Workbook
Define processes for software requests, procurement, receiving, and deployment.
Defined standards for software procurement
Documented processes for software receiving and deployment
2.1 Determine software standards.
2.2 Define procurement process for new contracts.
2.3 Define process for contract renewals and additional procurement scenarios.
2.4 Design process for receiving software.
2.5 Design deployment workflow.
2.6 Define process for non-standard software requests.
Software standards
Standard Operating Procedures
SAM Process Workflows
Define processes for software inventory, maintenance, harvest and redeployment, and retirement.
Defined process for conducting software inventory
Maintenance and patch policy
Documented workflows for software harvest and redeployment as well as retirement
3.1 Define process for conducting software inventory.
3.2 Define policies for software maintenance and patches.
3.3 Map software license harvest and reallocation process.
3.4 Define policy for retiring software.
Standard Operating Procedures
Patch management policy
SAM Process Workflows
Build processes for audits, identify tool requirements, and plan the implementation.
Defined process for internal and external audits
Tool requirements
Communication and implementation plan
4.1 Define and document the internal audit process.
4.2 Define and document the external audit process.
4.3 Document tool requirements.
4.4 Develop a communication plan.
4.5 Prepare an FAQ list.
4.6 Identify SAM policies.
4.7 Develop a SAM roadmap to plan your implementation.
Audit response templates
Tool requirements
Communication plan
End-user FAQ list
Software Asset Management Policy
Implementation roadmap
“Organizations often conflate software asset management (SAM) with license tracking. SAM is not merely knowing how many licenses you require to be in compliance; it’s asking the deeper budgetary questions to right-size your software spend.
Software audits are a growing concern for businesses, but proactive reporting and decision making supported by quality data will mitigate audit risks. Value is left on the table through underused or poor-quality data, so active data management must be in play. A dedicated ITAM tool can assist with extracting value from your license data.
Achieving an optimized SAM program is a transformative effort, but the people, processes, and technology need to be in place before that can happen.” (Sandi Conrad, Senior Director, Infrastructure & Operations Practice, Info-Tech Research Group)
A strong SAM program will benefit all aspects of the business.
Data and reports gained through SAM will enable data-driven decision making for all areas of the business.
Don’t just track licenses; manage them to create value from data.
Gathering and monitoring license data is just the beginning. What you do with that data is the real test.
Win the audit battle without fighting.
Conduct internal audits to minimize surprises when external audits are requested.
You can estimate the return even without tools or data.
| Benefit | Calculate the return |
|---|---|
| Compliance
How many audits did you have in the past three years? How much time did you spend in audit response? |
Suppose you had two audits each year for the last three years, each with an average $250,000 in settlements.
A team of four with an average salary of $75,000 each took six months to respond each year, allocating 20% of their work time to the audit. You could argue annual audits cost on average $530,000. Increasing ITAM maturity stands to reduce that cost significantly. |
| Efficiency
How much do you spend on software and maintenance by supplier? |
Suppose you spent $1M on software last year. What if you could reduce the spend by just 10% through better practices?
SAM can help reduce the annual spend by simplifying support, renegotiating contracts based on asset data, reducing redundancy, and reducing spend. |
54% — A study by 1E found that only 54% of organizations believe they can identify all unused software in their organization.
28% — On average, 28% of deployed software is unused, with a wasted cost of $224 per PC on unused software (1E, 2014).
53% — Express Metrix found that 53% of organizations had been audited within the past two years. Of those, 72% had been audited within the last 12 months.
Manage risk. If licensing terms are not properly observed, the organization is at risk of legal and financial exposure, including illegal software installation, loss of proof of licenses purchased, or breached terms and conditions.
Control and predict spend. Unexpected problems related to software assets and licenses can significantly impact cash flow.
Less operational interruptions. Poor software asset management processes could lead to failed deployments, software update interruptions, viruses, or a shutdown of unlicensed applications.
Avoid security breaches. If data is not secure through software patches and security, confidential information may be disclosed.
More informed decisions. More accurate data on software assets improves transparency and informs decision making.
Improved contract management. Automated tools can alert you to when contracts are up for renewal to allow time to plan and negotiate, then purchase the right amount of licenses.
Avoid penalties. Conduct internal audits and track compliance to avoid fees or penalties if an external audit occurs.
Reduced IT support. Employees should require less support from the service desk with proper, up to date, licensed software, freeing up time for IT Operations to focus on other work.
Enhanced productivity. By rationalizing and standardizing software offerings, more staff should be using the same software with the same versioning, allowing for better communication and collaboration.
|
Configuration Management
76% more effective |
|
Service Catalog
74% more effective |
|
Quality Management
63% more effective |
|
Data Quality
62% more effective |
|
Performance Measurement
61% more effective |
|
Organizational Change Management
60% more effective |
|
Portfolio Management
59% more effective |
|
Enterprise Architecture
58% more effective |
Why? Good SAM processes are integral to both service management and configuration management
(Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=972 organizations) (High asset management effectiveness was defined as those organizations with an effectiveness score of 8 or above.)Focus on software asset management essentials
| Phase 1 Assess & Plan |
Phase 2 Procure, Receive & Deploy |
Phase 3 Manage, Redeploy & Retire |
Phase 4 Build supporting processes |
||||
1.1 |
Assess current state |
2.1 |
Request & procure |
3.1 |
Manage & maintain contracts |
4.1 |
Compliance & audits |
1.2 |
Build team and define metrics |
2.2 |
Receive & deploy |
3.2 |
Harvest or retire |
4.2 |
Communicate & build roadmap |
1.3 |
Plan & budget | ||||||
| Deliverables | |||||||
| Standard Operating Procedures (SOP) | |||||||
| SAM maturity assessment | Process workflows | Process workflows | Audit response templates | ||||
| RACI chart | Software standards | Patch management policy | Communication plan & FAQ template | ||||
| SAM metrics | SAM policies | ||||||
| SAM budget workbook | |||||||
Visa, Inc. is the largest payment processing company in the world, with a network that can handle over 40,000 transactions every minute.
In 2006, Visa launched a formal IT asset management program, but it was not until 2011 that it initiated a focus on SAM. Joe Birdsong, the SAM director, first addressed four major enterprise license agreements (ELAs) and compliance issues. The SAM team implemented a few dedicated SAM tools in conjunction with an aggressive approach to training.
The proactive approach taken by Visa used a three-pronged strategy: people, process, and tools. The process included ELA negotiations, audit responses, and software license rationalization exercises.
According to Birdsong, “In the past three years, SAM has been credited with saving Visa over $200 million.”
SAM Standard Operating Procedures (SOP) |
SAM Maturity Assessment |
SAM Visio Process Workflows |
SAM Budget Workbook |
Additional SAM Policy Templates |
Software Asset Management Policy |
SAM Communication Plan |
SAM FAQ Template |
| GI | Measured Value (Assuming 260 workdays in a year) |
|---|---|
| Phase 1: Assess & Plan |
|
| Phase 2: Procure, Receive & Deploy |
|
| Phase 3: Manage, Redeploy & Retire |
|
| Phase 4: Build Supporting Processes and Tools |
|
| Total savings | $330,325 |
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| Phase 1: Assess & plan | Phase 2: Procure, receive & deploy | Phase 3: Manage, redeploy & retire | Phase 4: Build supporting processes | |
|---|---|---|---|---|
Best-Practice Toolkit
|
Step 1.1: Assess current state Step 1.2: Build team and define metrics Step 1.3: Plan and budget |
Step 2.1: Request and procure Step 2.2: Receive and deploy |
Step 3.1: Manage and maintain contracts Step 3.2: Harvest, redeploy, or retire |
Step 4.1: Compliance and audits Step 4.2: Communicate and build roadmap |
| Guided Implementations |
|
|
|
|
Onsite Workshop
|
Module 1:
Assess & Plan |
Module 2:
Map Core Processes: Procure, Receive & Deploy |
Module 3:
Map Core Processes: Manage, Redeploy & Retire |
Module 4:
Prepare for audit, build roadmap and communications |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|
| Activities |
Assess & Plan1.1 Outline SAM challenges and objectives 1.2 Assess current state 1.3 Identify roles and responsibilities for SAM team 1.4 Identify metrics and reports 1.5 Identify SAM functions to centralize vs. decentralize 1.6 Plan SAM budget process |
Map Core Processes: Procure, Receive & Deploy2.1 Determine software standards 2.2 Define procurement process for new contracts 2.3 Define process for contract renewals and additional procurement scenarios 2.4 Design process for receiving software 2.5 Design deployment workflow 2.6 Define process for non-standard software requests |
Map Core Processes: Manage, Redeploy & Retire3.1 Define process for conducting software inventory 3.2 Define policies for software maintenance and patches 3.3 Map software license harvest and reallocation process 3.4 Define policy for retiring software |
Build Supporting Processes4.1 Define and document the internal audit process 4.2 Define and document the external audit process 4.3 Develop a communication plan 4.4 Prepare an FAQ list 4.5 Identify SAM policies 4.6 Develop a SAM roadmap to plan your implementation |
| Deliverables |
|
|
|
|
Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.
This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.
This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.
Visa implemented an IT asset management program in 2006. After years of software audit teams from large firms visiting and leaving expensive software compliance bills, the world’s leading payment processing company decided it was time for a change.
Upper management recognized that it needed to combat audits. It had the infrastructure in place and the budget to purchase SAM tools that could run discovery and tracking functions, but it was lacking the people and processes necessary for a mature SAM program.
Visa decided to fight fire with fire. It initially contracted the same third-party audit teams to help build out its SAM processes. Eventually, Visa formed a new SAM team that was led by a group of former auditors.
The former auditors recognized that their role was not technology based, so a group of technical individuals were hired to help roll out various SAM tools.
The team rolled out tools like BDNA Discover and Normalize, Flexera FlexNet Manager, and Microsoft SCCM.
To establish an effective SAM team, diverse talent is key. Visa focused on employees that were consultative but also technical. Their team needed to build relationships with teams within the organization and externally with vendors.
Most importantly, the leaders of the team needed to think like auditors to better prepare for audits. According to Joe Birdsong, SAM Director at Visa, “we want to be viewed as a team that can go in and help right-size their environment and better understand licensing to help teams make better decisions.”
The SAM team was only the beginning.
| Phase 1: Assess & Plan | This step will walk you through the following activities: | This step involves the following participants: | |
1.1 | Assess current state |
|
|
1.2 | Build team and define metrics | ||
1.3 | Plan & budget | ||
Participants: CIO/CFO, IT Director, Asset Manager, Purchasing, Service Desk Manager, Security (optional), Operations (optional)
| Drivers of effective SAM | Results of effective SAM | |
| Contracts and vendor licensing programs are complex and challenging to administer without data related to assets and their environment. | → | Improved access to accurate data on contracts, licensing, warranties, installed software for new contracts, renewals, and audit requests. |
| Increased need to meet compliance requires a formal approach to tracking and managing assets. | → | Encryption, software application controls, and change notifications all contribute to better asset controls and data security. |
| Cost cutting is on the agenda, and management is looking to reduce overall IT spend in the organization in any possible way. | → | Reduction of software spend through data for better forecasting, planning, and licensing rationalization and harvesting. |
| Audits are time consuming, disruptive to project timelines and productivity, and costly. | → | Respond to audits with a formalized process, accurate data, and minimal disruption using always-available reporting. |
Participants: CIO/CFO, IT Director, Asset Manager, Service Manager (optional)
Document: Document in the Standard Operating Procedures.
By improving how you manage your licenses and audit requests, you will not only provide benefits through a mature SAM program, you will also improve your service desk and disaster recovery functions.
| Maturity | People & Policies | Processes | Technology |
|---|---|---|---|
| Chaos |
|
|
|
| Reactive |
|
|
|
| Controlled |
|
|
|
| Proactive |
|
|
|
| Optimized |
|
|
|
| Phase 1: Assess & Plan | This step will walk you through the following activities: | This step involves the following participants: | |
1.1 | Assess current state |
|
|
1.2 | Build team and define metrics | ||
1.3 | Plan & budget | ||
Roles and responsibilities should be adapted to fit specific organizational requirements based on its size, structure, and distribution and the scope of the program. Not all roles are necessary and in small organizations, one or two people may fulfill multiple roles.
Senior Management Sponsor – Ensures visibility and support for the program.
IT Asset Manager – Responsible for management of all assets and maintaining asset database.
Software Asset Manager – Responsible for management of all software assets (a subset of the overall responsibility of the IT Asset Manager).
SAM Process Owner – Responsible for overall effectiveness and efficiency of SAM processes.
Asset Analyst – Maintains up-to-date records of all IT assets, including software version control.
Many organizations simply do not have a large enough staff to hire a full-time software asset manager. The role will need to be championed by an internal employee.
Avoid filling this position with a temporary contract; one of the most difficult operational factors in SAM implementation and continuity is constant turnover and organizational shifts. Hiring a software asset manager on contract might get the project going faster, but without the knowledge gained by doing the processes, the program won’t have enough momentum to sustain itself.
Make sure your SAM team is diverse. The SAM team will need to be skilled at achieving compliance, but there is also a need for technically skilled individuals to maximize the function of the SAM tool(s) at your organization.
1.2.1 Complete a RACI chart for your organization
Participants: CIO/CFO, IT Director, SAM Manager, SAM Team, Service Desk Manager
Document: Document in the Standard Operating Procedures.
Determine the roles and responsibilities for your SAM program. Record the results in a RACI (responsible, accountable, consulted, informed) chart such as the example below.
| SAM Processes and Tasks | CIO | CFO | SAM Manager | IT Director | Service Management Team | IT Ops | Security | Finance | Legal | Project Manager |
|---|---|---|---|---|---|---|---|---|---|---|
| Policies/Governance | A | C | R | R | I | I | C | I | R | I |
| Strategy | A | C | R | R | I | I | I | I | C | |
| Risk Management/Asset Security | A | C | R | R | C | R | C | C | C | |
| Data Entry/Quality | I | I | A | R | R | |||||
| Compliance Auditing | R | C | A | R | I | I | I | I | ||
| Education & Training | R | I | A | C | I | I | ||||
| Contract Lifecycle Management | R | R | A | R | C | C | C | C | R | C |
| Workflows | R | C | A | R | I | I | I | R | I | C/I |
| Budgeting | R | R | R | A | C | R | ||||
| Software Acquisition | R | I | A | R | I | C | R | C | C | |
| Controls/Reporting | R | I | A | R | I | I | C | I | ||
| Optimize License Harvesting | I | I | A | R | I | C | C |
Trying to achieve goals without metrics is like trying to cook without measuring your ingredients. You might succeed, but you’ll have no idea how to replicate it.
The metrics you track depend on your maturity level. As your organization shifts in maturity, the metrics you prioritize for tracking will shift to reflect that change. Example:
| Metric category | Low maturity metric | High maturity metric |
|---|---|---|
| Compliance | % of software installed that is unauthorized | % of vendors in effective licensing position (ELP) report |
| Quantity | % of licenses documented in ITAM tool | % of requests made through unauthorized channels |
CSF = Goal, or what success looks like
KPI = How achievement of goal will be defined
Metric = Numerical measure to determine if KPI has been achieved
| CSF/Goal | KPI | Metrics |
|---|---|---|
| Improve accuracy of software budget and forecasting |
|
|
| Avoid over purchasing software licenses and optimize use of existing licenses |
|
|
| Improve accuracy of data |
|
|
| Improved service delivery |
|
|
1.2.2 Brainstorm metrics and KPIs
Participants: CIO, IT Director, SAM Manager, SAM Team
Document: Document in the Standard Operating Procedures.
Use the table below as an example.
| Goal/CSF | KPI | Metric |
|---|---|---|
| Improve license visibility | Increase accuracy and completeness of SAM data |
|
| Reduce software costs | Reduce number of unused software licenses by 20% |
|
| Reduce shadow IT | Reduce number of unauthorized software purchases and installations by 10% |
|
Asset managers require data to manage how licenses are distributed throughout the organization. Are there multiple versions of the same application deployed? What proportion of licenses deployed are assigned to employees who are no longer at the organization? What are the usage patterns for applications?
Service desk technicians need real-time data on licenses currently available to deploy to machines that need to be imaged/updated, otherwise there is a risk of breaching a vendor agreement.
Business managers and executives need reports to make strategic decisions. The reports created for business stakeholders need to help them align business projects or business processes with SAM metrics. To determine which reports will provide the most value, start by looking at business goals and determining the tactical data that will help inform and support these goals and their progress.
1.2.3 Identify reports and metrics to track regularly
Participants: CIO, IT Director, SAM Manager, SAM Team
Document: Document in the Standard Operating Procedures.
Example:
| Stakeholder | Purpose | Report | Frequency |
|---|---|---|---|
| Asset Manager |
|
Operational budget spent to date | Monthly |
| Capital budget spent to date | Monthly | ||
| Contracts coming due for renewal | Quarterly | ||
| Software harvested for redeployment | Quarterly | ||
| Number of single applications being managed | Annually | ||
| CFO |
|
Software purchased, operational & capital | Monthly |
| Software accrued for future purchases | Monthly | ||
Contracts coming due for renewal
|
Quarterly | ||
| CIO |
|
Software deployments and redeployments | Monthly |
| Software rollouts planned | Quarterly | ||
| % of applications patched | Quarterly | ||
| Money saved | Annually | ||
| Number of contracts & apps managed | Quarterly |
| Phase 1: Assess & Plan | This step will walk you through the following activities: | This step involves the following participants: | |
1.1 | Assess current state |
|
|
1.2 | Build team and define metrics | ||
1.3 | Plan & budget | ||
Many infrastructure managers and business managers are unaware of how software licensing can impact projects. For example, changes in core infrastructure configuration can have big impacts from a software licensing perspective.
1.3.1 Identify functions for centralization
Participants: CIO, IT Director, SAM Manager, SAM Team
Document: Document in the Standard Operating Procedures.
Example:
Centralized Functions
|
Decentralized functions
|
After employee salaries (38%), the four next largest spend buckets have historically been infrastructure related. Adding salaries and external services, the average annual infrastructure and operations spend is over 50% of all IT spend.
The largest portion of that spend is on software license and maintenance. As of 2016, software accounted for the roughly the same budget total as voice communications, data communications, and hardware combined. Managing software contracts is a crucial part of any mature budgeting process.
A sophisticated software asset management program will be able to uncover hidden costs, identify opportunities for rationalization, save money through reharvesting unused licenses, and improve forecasting of software usage to help control IT spending.
While some asset managers may not have experience managing budgets, there are several advantages to the ITAM function owning the budget:
Finance needs to be involved. Their questions may cover:
The SAM Budget Workbook is designed to assist in developing and justifying the budget for software assets for the upcoming year.
|
|
1.1.3 |
|
Determine the maturity of your SAM program
Using the SAM Maturity Assessment Tool, fill out a series of questions in a survey to assess the maturity of your current SAM program. The survey assesses seven categories that will allow you to align your strategy to your results. |
1.2.3 |
|
Define SAM reports to track metrics
Identify key stakeholders with reporting needs, metrics to track to fulfill reporting requirements, and a frequency for producing reports. |
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 1.1: Assess current state | Step 1.2: Build team and define metrics | Step 1.3: Plan and budget |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
With these tools & templates:
|
Visa formed a SAM team in 2011 to combat costly software audits.
The team’s first task was to use the available SAM data and reconcile licenses deployed throughout the organization.
Organizations as large as Visa constantly run into issues where they are grossly over or under licensed, causing huge financial risk.
Data collection and analysis were used as part of the license rationalization process. Using a variety of tools combined with a strong team allowed Visa to perform the necessary steps to gather license data and analyze usage.
One of the key exercises was uniting procurement and deployment data and the teams responsible for each.
End-to-end visibility allowed the data to be uniform. As a result, better decisions about license rationalization can be made.
By improving its measurement of SAM data, Visa was able to dedicate more time to analyze and reconcile its licenses. This led to improved license management and negotiations that reflected actual usage.
By improving license usage through rationalization, Visa reduced the cost of supporting additional titles.
The SAM team also performed license reclamation to harvest and redistribute licenses to further improve usage. The team’s final task was to optimize audit responses.
| Phase 2: Procure, Receive & Deploy | This step will walk you through the following activities: | This step involves the following participants: | |
2.1 | Request & Procure |
|
|
2.2 | Receive & Deploy | ||
Procurement and SAM must collaborate on software purchases to ensure software purchases meet business requirements and take into account all data on existing software and licenses to optimize the purchase and contract. Failure to work together can lead to unnecessary software purchases, overspending on purchases, and undesirable contract terms.
SAM managers must collaborate with Procurement when purchasing software.
SAM managers should:
|
|
Procurement must commit to be involved in the asset management process.
Procurement should:
|
Centralized negotiation and purchasing of software can ensure that the SAM team has visibility and control over the procurement process to help prevent overspending and uncontrolled agreements.
It may be necessary to procure some software locally if organizations have multiple locations, but try to centrally procure and manage the biggest contracts from vendors that are likely to audit the organization. Even with a decentralized model, ensure all teams communicate and that contracts remain visible centrally even if managed locally.
One of the major challenges involved in implementing SAM is uniting multiple datasets and data sources across the enterprise. A conversation with each major business unit will help with the creation of software procurement standards that are acceptable to all.
2.1.1 Identify central standard enterprise offerings
Participants: CIO, IT Director, SAM Manager, SAM Team
Document: Document in the Standard Operating Procedures.
Standard enterprise offerings
|
Localized or non-standard software |
The more prestigious the asset tier, the higher the degree of data capture, support, and maintenance required.
E.g. An enterprise application that needs to be available 24/7, such as a learning management system, should be classified as a gold tier to ensure it has 24/7 support.
2.1.2 Identify standard software images for your organization
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Not everyone is ready to embrace the cloud for all solutions; make sure to align cloud strategy to business requirements. Work closely with IT executives to determine appropriate contract terms, licensing options, and tracking processes.
Vendors make changes to bundles and online services terms on a regular basis. Ensure you document your agreed upon terms to save your required functionality as vendor standard offerings change.
Download the Own the Cloud: Strategy and Action Plan blueprint for more guidance
| Licensed | Open Source | Shareware | |
|---|---|---|---|
| License Structure | A software supplier is paid for the permission to use their software. | The software is provided free of charge, but is still licensed. | The software is provided free of charge, but is still licensed. Usage may be on a trial basis, with full usage granted after purchase. |
| Source Code | The source code is still owned by the supplier. | Source code is provided, allowing users to change and share the software to suit their needs. | Source code is property of the original developer/supplier. |
| Technical Support | Technical support is included in the price of the contract. | Technical support may be provided, often in a community-based format from other developers of the open-source software in question. | Support may be limited during trial of software, but upgraded once a purchase is made. |
Open-source software should be managed in the same manner as commercial software to understand licensing requirements and be aware of any changes to these agreements, such as commercialization of such products, as well as any rules surrounding source code.
2.1.3 Define procurement policy
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Define and document policies that will apply to IT software purchases, including policies around:
Use the example below as guidance and document in the SOP.
2.1.4 Identify financial thresholds for approvals and requests
Participants: Asset Manager, Purchasing, CIO, CFO, IT Director
Document: Document in the Standard Operating Procedures.
Identify and classify financial thresholds for contracts requiring approval. For each category of contract value, identify who needs to authorize the request. Discuss and document any other approvals necessary. An example is provided below.
Example:
Requests for authorization will need to be directed based on the following financial thresholds:
| Contract value | Authorization |
|---|---|
| <$50,000 | IT Director |
| $50,000 to $250,000 | CIO |
| $250,000 to $500,000 | CIO and CFO |
| >$500,000 | Legal review |
A poorly defined software procurement workflow can result in overspending on unnecessary software licensing throughout the year. This can impact budgeting and any potential software refreshes, as businesses will often rely on purchasing what they can afford, not what they need.
The procurement workflow may involve the Service Desk, procurement team, and asset manager.
The following elements should be accounted for:
2.1.5 Build new contract procurement workflow
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Additionally, information regarding what licenses are being used for certain services may yield insight into potential redundancies. For example, two separate departments may have each have a different application deployed that supports the same service. This presents an opportunity for savings based on bulk licensing agreements, not to mention a simplified support environment by reducing the number of titles deployed in your environment.
Participants: IT Director/CIO, Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
2.1.6 Build additional procurement workflows
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Build procurement workflows and define policies and procedures for additional purchasing scenarios beyond new contracts.
This may include:
Use the sample workflows in the Standard Operating Procedures as a guide.
Contract negotiations too often come down to a question of price. While you want to avoid overpaying for licenses, a worse offense is getting a steep discount for a bundle of applications where the majority will go unused.
| Vendors will try to sell a full stack of software at a steep discount to give the illusion of value. Often organizations bite off more than they can chew. | → | When auditors come knocking, the business may be in compliance, but being over-licensed is a dangerous state to be in. | → | Organizations end up over-licensed and in possession of numerous “shelfware” apps that sit on the proverbial shelf collecting dust while drawing expensive maintenance and licensing fees from the business. |
Leverage Info-Tech’s research, Master Contract Review and Negotiation for Software Agreements, to review your software contracts to leverage your unique position during negotiations and find substantial cost savings.
| Phase 2: Procure, Receive & Deploy | This step will walk you through the following activities: | This step involves the following participants: | |
2.1 | Request & Procure |
|
|
2.2 | Receive & Deploy | ||
While most software will be received through email and download, in some cases physical software may be received through courier or mail. Ensure processes and procedures are defined for both cases.
All licenses, documentation, and digital media for authorized and supported software should be collected and stored in a central, secure location to minimize risk of theft, loss, or unauthorized installation or duplication of software.
The ITAM database should contain an up-to-date record of all software assets, including their associated:
The database allows you to view software that is installed and associated licenses.
A definitive media library (DML) is a single logical storage area, which may consist of one or more locations in which definitive authorized versions of all software configuration items are securely stored and protected.
The DML consists of file storage as well as physical storage of CDs and DVDs and must be continually updated to contain the latest information about each configuration item.
The DML is used to organize content and link to automated deployment to easily install software.
The DML will usually contain the most up-to-date versions to minimize errors created by having unauthorized, old, or problematic software releases being deployed into the live IT environment. The DML can be used for both full-packed product (FPP) software and in-house developed software, providing formalized data around releases of in-house software.
Your DML should have a way to separate archived, new, and current software to allow for optimal organization of files and code, to ensure the correct software is installed, and to prepare for automated deployment through the service catalog.
New software hasn’t been tested yet. Make it available for testing, but not widely available.
Keep a record for archived software, but do not make it available for install.
Current software is regularly used and should be available for install.
2.2.1 Identify software storage locations
Participants: Asset Manager, IT Director
Document: Document in the Standard Operating Procedures.
2.2.2 Design the workflow for receiving software
Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)
Document: Document in the Standard Operating Procedures.
Releases: A collection of authorized changes to an IT service. Releases are divided into:
Define the process for deploying software to users.
Include the following in your workflow:
Rollouts or upgrades of large quantities of software will likely be managed as projects.
These projects should include project plans, including resources, timelines, and detailed procedures.
Define the process for large-scale deployment if it will differ from the regular deployment process.
2.2.3 Document deployment workflows for desktop and large-scale deployment
Participants: Asset Manager, Service Desk Manager, Release & Deployment Manager
Document: Document in the Standard Operating Procedures.
Software should be approved and deployed based on approved standards to minimize over-deployed software and manage costs appropriately. A list of standard software improves the efficiency of the software approval process.
Additionally, create a list of unauthorized software including titles not to be installed under any circumstances. This list should be designed with feedback from your end users and technical support staff. Front-line knowledge is crucial to identifying which titles are causing major problems.
2.2.4 Determine software categories for deployment
Participants: IT Director, Asset Manager, Purchasing (optional), Service Desk Manager (optional), Release & Deployment Manager (optional)
Document: Document in the Standard Operating Procedures.
| Category | Definition | Software titles |
|---|---|---|
| Pre-approved/standard |
|
|
| Approved by role |
|
|
| Unapproved/requires review |
|
|
| Unauthorized |
|
|
Software requiring review will need to be managed on a case-by-case basis, with approval dependent on software evaluation and business need.
The evaluation and approval process may require input from several parties, including business analysts, Security, technical team, Finance, Procurement, and the manager of the requestor’s department.
2.2.5 Document process for non-standard software requests
Participants: Asset Manager, Service Desk Manager, Release & Deployment Manager
Document: Document in the Standard Operating Procedures.
Define the review and approval process for non-standard software requests.
Use the workflow on the previous slide as a guide to map your own workflow process and document the steps in the Standard Operating Procedures.
The following assessments may need to be included in the process:
BMW is a large German automotive manufacturer that employs over 100,000 people. It has over 7,000 software products deployed across 106,000 clients and servers in over 150 countries.
When the global recession hit in 2008, the threat of costly audits increased, so BMW decided to boost its SAM program to cut licensing costs. It sought to centralize inventory data from operations across the globe.
A new SAM office was established in 2009 in Germany. The SAM team at BMW began by processing all the accumulated license and installation data from operations in Germany, Austria, and the UK. Within six months, the team had full visibility of all licenses and software assets.
Compliance was also a priority. The team successfully identified where they could make substantial reductions in support and maintenance costs as well as remove surplus costs associated with duplicate licensing.
BMW overcame a massive data centralization project to achieve 100% visibility of its global licensing estate, an incredible achievement given the scope of the operation.
BMW experienced efficiency gains due to transparency and centralized management of licenses through the new SAM office.
Additionally, internal investment in training and technical knowledge has helped BMW continuously improve the program. This has resulted in ongoing cost reductions for the manufacturer.
|
|
2.1.5 |
|
Build software procurement workflow for new contracts
Use the sample workflow to document your own process for procurement of new software contracts. |
2.2.4 |
|
Create a list of pre-approved, approved, and unapproved software titles
Build definitions of software categories to inform software standards and brainstorm examples of each category. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 2.1: Request and procure | Step 2.2: Receive and deploy |
Start with an analyst kick-off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates:
| With these tools & templates:
|
| Phase 3: Manage, Redeploy & Retire | This step will walk you through the following activities: | This step involves the following participants: | |
3.1 | Manage & Maintain Software |
|
|
3.2 | Harvest, Redeploy, or Retire | ||
Many organizations fail to track their software inventory effectively; the focus often remains on hardware due to its more tangible nature. However, annual software purchases often account for a higher IT spend than annual hardware purchases, so it’s important to track both.
Have and maintain a list of supported software to guide what new software will be approved for purchase and what current software should be retained on the desktops, servers, and other processing devices.
A baseline inventory tells you exactly what software you have deployed and where it is being used. This can help to determine how to best optimize software and license usage.
A software inventory will allow you to:
Take preventive action to avoid unauthorized software usage through regular software inventory and license management:
3.1.1 Define process for regular software inventory
Participants: IT Director, Asset Manager
Document: Document in the Standard Operating Procedures.
While maintenance efforts are typically focused around hardware, software maintenance – including upgrades and patches – must be built into the software asset management process to ensure software remains compliant with security and regulatory requirements.
The integration between patch management and asset management is incredibly valuable from a technology point of view. IT asset management (ITAM) tools create reports on the characteristics of deployed software. By combining these reports with a generalized software updater, you can automate most simple patches to save your team’s efforts for more-critical incidents. Usage reports can also help determine which applications should be reviewed and removed from the environment.
3.1.2 Define software maintenance and patching policies
Participants: IT Director, Asset Manager, Release Manager (optional), Security (optional)
Document: Document in the Standard Operating Procedures.
Review the software maintenance guidelines in this section and in the SOP template. Discuss each policy and revise and document in accordance with your policies.
Discuss and document patch management policies:
The patch management policy helps to ensure company computers are properly patched with the latest appropriate updates to reduce system vulnerability and to enhance repair application functionality. The policy aids in establishing procedures for the identification of vulnerabilities and potential areas of functionality enhancements, as well as the safe and timely installation of patches. The patch management policy is key to identifying and mitigating any system vulnerabilities and establishing standard patch management practices.
Use Info-Tech’s Patch Management Policy template to get started.
| Phase 3: Manage, Redeploy & Retire | This step will walk you through the following activities: | This step involves the following participants: | |
3.1 | Manage & Maintain Software |
|
|
3.2 | Harvest, Redeploy, or Retire | ||
Unused software licenses are present in nearly every organization and result in wasted resources and software spend. Recycling and reharvesting licenses is a critical process within software asset management to save your organization money.
When computers are no longer in use and retired, the software licenses installed on the machines may be able to be reused.
License recycling involves reusing these licenses on machines that are still in use or for new employees.
License harvesting involves more actively identifying machines with licenses that are either not in use or under utilized, and recovering them to be used elsewhere, thus reducing overall software spend on new licenses.
Know the stipulations of your end-user license agreement (EULA) before harvesting and reallocating licenses. There may be restrictions on how often a license can be recycled in your agreement.
Define a standard reharvest timeline. For example, every 90 days, your SAM team can perform an internal audit using your SAM tool to gather data on software usage. If a user has not used a title in that time period, your team can remove that title from that user’s machine. Depending on the terms and conditions of the contract, the license can either be retired or harvested and reallocated.
Ensure you have exception rules built in for software that’s cyclical in its usage. For example, Finance may only use tax software during tax season, so there’s no reason to lump it under the same process as other titles.
It’s important to note that in addition to this process, you will need a software usage policy that supports your license harvest process.
3.2.1 Build license harvest and reallocation workflow
Participants: IT Director, Asset Manager, Service Desk Manager
Document: Document in the Standard Operating Procedures.
“Time and time again, I keep hearing stories from schools on how IT budgets are constantly being squeezed, but when I dig a little deeper, little or no effort is being made on accounting for software that might be on the kit we are taking away.” (Phil Goldsmith, Managing Director – ScrumpyMacs)
3.2.2 Document process for software retirement
Participants: IT Director, Asset Manager, Operations
Document: Document in the Standard Operating Procedures.
![]() |
|
3.1.2 |
|
Define policies for software maintenance and patches
Discuss best practices and define policies for conducting regular software maintenance and patching. |
3.2.1 |
|
Map your software license harvest and reallocation process
Build a process workflow for harvesting and reallocating unused software licenses. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 3.1: Manage and maintain software | Step 3.2: Harvest, redeploy, or retire |
Start with an analyst kick-off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates:
| With these tools & templates:
|
The overarching goal of any SAM program is compliance to prevent costly audit fines. The SAM team at Visa was made up of many individuals who were former auditors.
To deal with audit requests from vendors, “understand how auditors do things and understand their approach,” states Joe Birdsong, SAM Director at Visa.
Vendors are always on the lookout for telltale signs of a lucrative audit. For Visa, the key was to understand these processes and learn how to prepare for them.
Vendors typically look for the following when evaluating an organization for audit:
Ultimately, an audit is an attack on the relationship between the vendor and organization. According to Birdsong: “Maybe they haven’t really touched base with your teams and had good contact and relationship with them, and they don’t really know what’s going on in your enterprise.”
By understanding the motivations behind potential audits, Visa was able to form a strategy to increase transparency with the vendor.
Regular data collection, almost real-time reporting, and open, quick communication with the vendor surrounding audits made Visa a low-risk client for vendors.
Buy-in from management is also important, and the creation of an official SAM strategy helps maintain support. Thanks to its proactive SAM program, Visa saved $200 million in just three years.
| Phase 4: Build supporting processes & tools | This step will walk you through the following activities: | This step involves the following participants: | |
4.1 | Compliance & audits |
|
|
4.2 | Communicate & build roadmap | ||
By improving your software asset management program’s maturity, you will drive savings for the business that go beyond the negotiating table.
Recognize the classic signs of each stage of audit response maturity to identify where your organization currently stands and where it can go.
Being prepared for an audit is critical. Internal preparation will not only help your organization reduce the risk associated with an audit but will also improve daily operations through focusing on diligent documentation and data collection.
Conducting routine internal audits will help prepare your organization for the real deal and may even prevent the audit from happening altogether. Hundreds of thousands of dollars can be saved through a proactive audit strategy with routine documentation in place.
“You want to get [the] environment to a level where you’re comfortable sharing information with [a] vendor. Inviting them in to have a chat and exposing numbers means there’s no relationship there where they’re coming to audit you. They only come to audit you when they know there’s a gain to be had, otherwise what’s the point of auditing?
I want customers to get comfortable with licensing and what they’re spending, and then there’s no problem exposing that to vendors. Vendors actually appreciate that.” (Ben Brand, SAM Practice Manager, Insight)
“The supreme art of war is to subdue the enemy without fighting.” – Sun Tzu
Performing routine checks on your license compliance will drastically reduce the risk that your organization gets hit with a costly fine. Maintaining transparency and demonstrating compliance will fend off audit-hungry vendors.
4.1.1 Document process and procedures for internal audits
Participants: CIO and/or IT Director, Asset Manager, IT Managers
Document: Document in the Standard Operating Procedures.
Define and document a process for conducting internal software audits.
Include the following:
Example:
Being prepared for an audit is critical. Internal preparation will not only help your organization reduce the risk associated with an audit but will also improve daily operations through focusing on diligent documentation and data collection.
Certain triggers exist that indicate a higher risk of an audit occurring. It is important to recognize these warning signs so you can prepare accordingly.
Health of organization
If your organization is putting out fires and a vendor can sense it, they’ll see an audit as a highly lucrative exercise.
Decrease in customer spend
A decrease in spend means that an organization has a high chance of being under-licensed.
License complexity
The more complex the license, the harder it is to remain in compliance. Some vendors are infamous for their complex licensing agreements.
Taking these due diligence steps will pay dividends downstream, reducing the risk of negative results such as release of confidential information.
Even if you cannot get a third-party NDA signed, the negotiation process should delay the overall audit process by at least a month, buying your organization valuable time to gather license data.
4.1.2 Define external audit process
Participants: CIO and/or IT Director, Asset Manager, IT Managers
Document: Document in the Standard Operating Procedures.
Define and document a process for responding to external software audit requests.
Include the following:
Use the Software Audit Scoping Email Template to create an email directed at your external (or internal) auditors. Send the audit scoping email several weeks before an audit to determine the audit’s scope and objectives. The email should include:
The email will help focus your preparation efforts and initiate your relationship with the auditors.
Approximately a week before the audit, you should email the internal leadership to communicate information about the start of the audit. Use the Software Audit Launch Email Template to create this email, including:
For more guidance on preparing for a software audit, see Info-Tech’s blueprint: Prepare and Defend Against a Software Audit.
A large American financial institution with 1,300 banking centers in 12 states, 28,000 end users, and 108,000 assets needed to improve its asset management program.
The bank had employed numerous ITAM tools, but IT staff identified that its asset data was still fragmented. There was still incomplete insight into what assets the banked owned, the precise value of those assets, their location, and what they’re being used for.
The bank decided to establish an asset management program that involved internal audits to gather more-complete data sets.
With the help of a vendor, the bank implemented cradle-to-grave asset tracking and lifecycle management, which provided discovery of almost $80 million in assets.
The bank also assembled an ITAM team and a dedicated ITAM manager to ensure that routine internal audits were performed.
The team was instrumental in establishing standardization of IT policies, hardware configuration, and service requirements.
| Phase 4: Build supporting processes & tools | This step will walk you through the following activities: | This step involves the following participants: | |
4.1 | Compliance & audits |
|
|
4.2 | Communicate & build roadmap | ||
Communication is crucial to the integration and overall implementation of your SAM program. If staff and users do not understand the purpose of processes and policies, they will fail to provide the desired value.
An effective communication plan will:
Why:
|
|
When:
|
Participants: CIO, IT Director, Asset Manager, Service Desk Manager
Document: Document in the SAM Communication Plan.
| Group | Benefits | Impact | Method | Timeline |
|---|---|---|---|---|
| Executives |
|
|
||
| End Users |
|
|
||
| IT |
|
|
Document: Document FAQ questions and answers in the SAM FAQ Template.
ITAM imposes changes to end users throughout the business and it’s normal to expect questions about the new program. Prepare your team ahead of time by creating a list of FAQs.
Use policy templates to jumpstart your policy development and ensure policies are comprehensive, but be sure to modify and adapt policies to suit your corporate culture or they will not gain buy-in from employees. For a policy to be successful, it must be a living document and have participation and involvement from the committees and departments to whom it will pertain.
Use Info-Tech’s Software Asset Management Policy template to define and document the purpose, scope, objectives, and roles and responsibilities for your organization's software asset management program.
The template allows you to customize policy requirements for:
…as well as consequences for non-compliance.
|
Asset Security Policy
End-User Devices Acceptable Use Policy
Purchasing Policy
Release Management Policy
Internet Acceptable Use Policy
|
|
One of the most difficult decisions to make when implementing a SAM program is: “where do we start?”
It’s not necessary to deploy a comprehensive SAM program to start. Build on the essentials to become more mature as you grow.
To integrate SAM effectively, a clear implementation roadmap needs to be designed. Prioritize “quick wins” to demonstrate success to the business early and to gain buy-in from your team. Short-term gains should be designed to support long-term goals of your SAM program.
| Q1 | Q2 | Q3 | Q4 |
|
|
|
|
Advertising the increased revenue that is gained from good SAM practices is a powerful way to gain project buy-in.
Reflect on the outcomes of implementing SAM to target areas for improvement and share knowledge gained within and beyond the SAM team. Some questions to consider include:
|
|
4.2.1 |
|
Develop a communication plan to convey the right messages
Identify stakeholders requiring communication and formulate a message and delivery method for each. |
4.2.5 |
|
Develop a SAM roadmap to plan your implementation
Outline the tasks necessary for the implementation of this project and prioritize to build a project roadmap. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 4.1: Compliance & audits | Step 4.2: Communicate & build roadmap |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
2013 Software Audit Industry Report.” Express Metrix, 2013. Web.
7 Vital Trends Disrupting Today’s Workplace: Results and Data from 2013 TINYpulse Employee Engagement Survey.” TINYpulse, 2013. Web.
Beaupoil, Christof. “How to measure data quality and protect against software audits.” Network World, 6 June 2011.
Begg, Daniel. “Effective Licence Position (ELP) – What is it really worth?” LinkedIn, 19 January 2016.
Boehler, Bernhard. “Advanced License Optimization: Go Beyond Compliance for Maximum Cost Savings.” The ITAM Review, 24 November 2014.
Bruce, Warren. “SAM Baseline – process & best practice.” Microsoft. 2013 Australia Partner Conference.
Case Study Top 20 U.S. Bank Tackles Asset Management.” Pomeroy, 2012. Web.
Cherwell Software Software Audit Industry Report.” Cherwell Software, 2015. Web.
Conrad, Sandi. “SAM starter kit: everything you need to get started with software asset management. Conrad & Associates, 2010.
Corstens, Jan, and Diederik Van der Sijpe. “Contract risk & compliance software asset management (SAM).” Deloitte, 2012.
Deas, A., T. Markowitzm and E. Black. “Software asset management: high risk, high reward.” Deloitte, 2014.
Doig, Chris. “Why you should always estimate ROI before buying enterprise software” CIO, 13 August 2015.
Fried, Chuck. “America Needs An Education On Software Asset Management (SAM).” LinkedIn. 16 June 2015.
Lyons, Gwen. “Understanding the Drivers Behind Application Rationalization Critical to Success.” Flexera Software Blog, 31 October 2012.
Metrics to Measure SAM Success: eight ways to prove your SAM program is delivering business benefits.” Snow Software White Paper, 2015.
Microsoft. “The SAM Optimization Model.” Microsoft Corporation White Paper, 2010.
Miller, D. and M. Oliver. “Engaging Stakeholders for Project Success.” Project Management Institute White Paper, 2015.
Morrison, Dan. “5 Common Misconceptions of Software Asset Management.” SoftwareOne. 12 May 2015.
O’Neill, Leslie T. “Visa Case Study: SAM in the 21st Century.” International Business Software Managers Association (IBSMA), 30 July 2014.
Reducing Hidden Operating Costs Through IT Asset Discovery.” NetSupport Inc., 2011.
SAM Summit 2014, 23-25 June 2014, University of Chicago Gleacher Center Conference Facilities, Chicago, MI.
Saxby, Heather. “20 Things Every CIO Needs to Know about Software Asset Management.” Crayon Software Experts, 13 May 2015.
The 2016 State of IT: Managing the money monsters for the coming year.” Spiceworks, 2016.
The Hidden Cost of Unused Software.” A 1E Report, 1E.com: 2014. Web.
What does it take to achieve software license optimization?” Flexera White Paper, 2013.
|
Michael Dean
Director, User Support Services Des Moines University |
Simon Leuty
Co-Founder Livingstone Tech |
|
|
Clare Walsh
PR Consultant Adesso Tech Ltd. |
Alex Monaghan
Director, Presales EMEA Product Support Solutions |
|
|
Ben Brand
SAM Practice Manager Insight |
Michael Swanson
President ISAM |
|
|
Bruce Aboudara
SVP, Marketing & Business Development Scalable Software |
Will Degener
Senior Solutions Consultant Scalable Software |
|
|
Peter Gregorowicz
Associate Director, Network & Client Services Vancouver Community College |
Peter Schnitzler
Operations Team Lead Toyota Canada |
|
|
David Maughan
Head of Service Transition Mott MacDonald Ltd. |
Brian Bernard
Infrastructure & Operations Manager Lee County Clerk of Court |
|
|
Leticia Sobrado
IT Data Governance & Compliance Manager Intercept Pharmaceuticals |
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The focus of this phase is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will formally examine the many definitions of design thinking from experts in this field. At the core of this phase are several case studies that illuminate the various aspects of design thinking.
This phase will illustrate the relevance of design in strategy formulation and in service-design. At the core of this phase are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization and establish a baseline of user-experience with the journeys orchestrated by your organization.
The focus of this phase is to:
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
The focus of this module is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will also review the report on the design-centricity of your organization and subsequently, earmark the areas for improvement.
An intimate understanding of the design thinking
An assessment of design-centricity of your organization and identification of areas for improvement
1.1 Discuss case studies on how designers think and work
1.2 Define design thinking
1.3 Review report from Info-Tech’s diagnostic: How design-centric is your organization?
1.4 Earmark areas for improvement to raise the design-centricity of your organization
Report from Info-Tech’s diagnostic: ‘How design-centric is your organization?’ with identified areas for improvement.
In this module, we will discuss the relevance of design in strategy formulation and service design. At the core of this module are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization. We will establish a baseline of user experience with the journeys orchestrated by your organization.
An in-depth understanding of the relevance of design in strategy formulation and service design
An understanding of the trends that impact your organization
A taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those
2.1 Discuss relevance of design in strategy through case studies
2.2 Articulate trends that impact your organization
2.3 Discuss service design through case studies
2.4 Identify critical customer journeys and baseline customers’ satisfaction with those
2.5 Run a simulation of design in practice
Trends that impact your organization.
Taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those.
The focus of this module is to define an approach for a design program that suits your organization’s specific goals and culture.
An approach for the design program in your organization. This includes aspects of the design program such as its objectives and measures, its model (one of the five archetypes or a hybrid one), and its governance.
3.1 Identify objectives and key measures for your design thinking program
3.2 Structure your program after reviewing five main archetypes of a design program
3.3 Balance between incremental and disruptive innovation
3.4 Review best practices of a design organization
An approach for your design thinking program: objectives and key measures; structure of the program, etc.
Take the time to understand the various data storage formats, disk types, and associated technology, as well as the cloud-based and on-premises options. This will help you select the right tool for your needs.
Look to existing use cases based on actual Info-Tech analyst calls to help in your decision-making process.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Explore the building blocks of enterprise storage so you can select the best solution, narrow your focus with the correct product type, explore the features that should be considered when evaluating enterprise storage offerings, and examine use cases based on actual Info-Tech analyst calls to find a storage solution for your situation.
The first step in solving your enterprise storage challenge is identifying your data sources, data volumes, and growth rates. This information will give you insight into what data sources could be stored on premises or in the cloud, how much storage you will require for the coming five to ten years, and what to consider when exploring enterprise storage solutions. This tool can be a valuable asset for determining your current storage drivers and future storage needs, structuring a plan for future storage purchases, and determining timelines and total cost of ownership.
|
To say that the current enterprise storage landscape looks interesting would be an understatement. The solutions offered by vendors continue to grow and evolve. Flash and NVMe are increasing the speed of storage media and reducing latency. Software-defined storage is finding the most efficient use of media to store data where it is best served while managing a variety of vendor storage and older storage area networks and network-attached storage devices. Storage as a service is taking on a new meaning with creative solutions that let you keep the storage appliance on premises or in a colocated data center while administration, management, and support are performed by the vendor for a nominal monthly fee. We cannot discuss enterprise storage without mentioning the cloud. Bring a thermometer because you must understand the difference between hot, warm, and cold storage when discussing the cloud options. Very hot and very cold may also come into play. Storage hardware can assume a higher total cost of ownership with support options that replace the controllers on a regular basis. The options with this type of service are also varied, but the concept of not having to replace all disks and chassis nor go through a data migration is very appealing to many companies. The cloud is growing in popularity when it comes to enterprise storage, but on-premises solutions are still in demand, and whether you choose cloud or on premises, you can be guaranteed an array of features and options to add stability, security, and efficiency to your enterprise storage. P.J. Ryan |
|
The vendor landscape is continually evolving, as are the solutions they offer. |
Storage providers are getting acquired by bigger players, “outside the box” thinking is disrupting the storage support marketplace, “as a service” storage offerings are evolving, and what is a data lake and do I need one? The traditional storage vendors are not alone in the market, and the solutions they offer are no longer traditional either. Explore the landscape and understand your options before you make any enterprise storage solution purchases. |
|---|---|
|
Understand the building blocks of storage so you can select the best solution. |
There are multiple storage formats for data, along with multiple hardware form factors and disk types to hold those various data formats. Software plays a significant role in many of these storage solutions, and cloud offerings take advantage of all the various formats, form factors, and disks. The challenge is matching your data type with the correct storage format and solution. |
|
Look to existing use cases to help in your decision-making process. |
Explore previous experiences from others by reading use cases to determine what the best solution is for your challenge. You’re probably not the first to encounter the challenge you’re facing. Another organization may have previously reached out for assistance and found a viable solution that may be just what you also need. |
“By 2025, it’s estimated that 463 exabytes of data will be created each day globally – that’s the equivalent of 212,765,957 DVDs per day!” (Visual Capitalist)
“Modern criminal groups target not only endpoints and servers, but also central storage systems and their backup infrastructure.” (Continuity Software)
Cloud or on premises? Maybe a hybrid approach with both cloud and on premises is best for you. Do you want to remove the headaches of storage administration, management, and support with a fully managed storage-as-a-service solution? Would you like to upgrade your controllers every three or four years without a major service interruption? The options are increasing and appealing.
1. Understand Your Data
Understand how much data you have and where it is located. This will be crucial when evaluating enterprise storage solutions.
2. Plan for Growth
Your enterprise storage considerations should include your data needs now and in the future.
3. Understand the Mechanics
Take the time to understand the various data storage formats, disk types, and associated technology, as well as the cloud-based and on-premises options. This will help you select the right tool for your needs.
|
Format |
What it is |
Disk Drives and Technology |
|
|---|---|---|---|
|
File Storage |
File storage is hierarchical storage that uses files, folders, subfolders, and directories. You enter a specific filename and path to access the file, such as P:\users\johndoe\strategy\cloud.doc. If you ever saved a file on a server, you used file storage. File storage is usually managed by some type of file manager, such as File Explorer in Windows. Network-attached storage (NAS) devices use file storage. |
Hard Disk Drives (HDD) |
HDD use a platter of spinning disks to magnetically store data. The disks are thick enough to make them rigid and are referred to as hard disks. HDD is older technology but is still in demand and offered by vendors. |
|
Object Storage |
Object storage is when data is broken into distinct units, called objects. These objects are stored in a flat, non-hierarchical structure in a single location or repository. Each object is identified by its associated ID and metadata. Objects are accessed by an application programming interface (API). |
Flash |
Flash storage uses flash memory chips to store data. The flash memory chips are written with electricity and contain no moving parts. Flash storage is very fast, which is how the technology got its name (“Flash vs. SSD Storage,” Enterprise Storage Forum, 2018). |
|
Block Storage |
Block storage is when data is divided up into fixed-size blocks and stored with a unique identifier. Blocks can be stored in different environments, such as Windows or Linux. Storage area networks (SANs) use block storage. |
Solid-State Drive (SSD) |
SSD is a storage mechanism that also does not use any moving parts. Most SSD drives use flash storage, but other options are available for SSD. |
|
Nonvolatile Memory Express (NVMe) |
NVMe is a communications standard developed specially for SSDs by a consortium of vendors including Intel, Samsung, SanDisk, Dell, and Seagate. It operates across the PCIe bus (hence the “Express” in the name), which allows the drives to act more like the fast memory that they are rather than the hard disks they imitate (PCWorld). |
|
Network-Attached Storage |
Storage Area Network |
Software-Defined Storage |
Hyperconverged Infrastructure |
|---|---|---|---|
|
NAS refers to a storage device that is connected directly to your network. Any user or device with access to your network can access the available storage provided by the NAS. NAS storage is easily scalable and can add data redundancy through RAID technology. NAS uses the file storage format. NAS storage may or may not be the first choice in terms of enterprise storage, but it does have a solid market appeal as an on-premises primary backup storage solution. |
A SAN is a dedicated network of pooled storage devices. The dedicated network, separate from the regular network, provides high speed and scalability without concern for the regular network traffic. SANs use block storage format and can be divided into logical units that can be shared between servers or segregated from other servers. SANs can be accessed by multiple servers and systems at the same time. SANs are scalable and offer high availability and redundancy through RAID technology. SANs can use a variety of disk types and sizes and are quite common among on-premises storage solutions. |
“Software-defined storage (SDS) is a storage architecture that separates storage software from its hardware. Unlike traditional network-attached storage (NAS) or storage area network (SAN) systems, SDS is generally designed to perform on any industry-standard or x86 system, removing the software’s dependence on proprietary hardware.” (RedHat) SDS uses software-based policies and rules to grow and protect storage attached to applications. SDS allows you to use server-based storage products to add management, protection, and better usage. |
Hyperconverged storage uses virtualization and software-defined storage to combine the storage, compute, and network resources along with a hypervisor into one appliance. Hyperconverged storage can scale out by adding more nodes or appliances, but scaling up, or adding more resources to each appliance, can have limitations. There is flexibility as hyperconverged storage can work with most network and compute manufacturers. |
“Enterprise cloud storage offers nearly unlimited scalability. Enterprises can add storage quickly and easily as it is needed, eliminating the risk and cost of over-provisioning.”
– Spectrum Enterprise
“Hot data will operate on fresh data. Cold data will operate on less frequent data and [is] used mainly for reporting and planning. Warm data is a balance between the two.”
– TechBlost
|
|
“Because data lakes mostly consist of raw unprocessed data, a data scientist with specialized expertise is typically needed to manipulate and translate the data.”
– DevIQ
“A Lakehouse is also a type of centralized data repository, integrated from heterogeneous sources. As can be expected from its name, It shares features with both datawarehouses and data lakes.”
– Cesare
“Storage as a service (STaaS) eliminates Capex, simplifies management and offers extensive flexibility.”
– TechTarget
The current vendor landscape for enterprise storage solutions represents a range of industry veterans and the brands they’ve aggregated along the way, as well as some relative newcomers who have come to the forefront within the past ten years.
Vendors like Dell EMC and HPE are longstanding veterans of storage appliances with established offerings and a back catalogue of acquisitions fueling their growth. Others such as Pure Storage offer creative solutions like all-flash arrays, which are becoming more and more appealing as flash storage becomes more commoditized.
Cloud-based vendors have become popular options in recent years. Cloud storage provides many options and has attracted many other vendors to provide a cloud option in addition to their on-premises solutions. Some software and hardware vendors also partner with cloud vendors to offer a complete solution that includes storage.
Explore your current vendor’s solutions as a starting point, then use that understanding as a reference point to dive into other players in the market
Key Players
Block, object, or file storage? NAS, SAN, SDS, or HCI? Cloud or on prem? Hot, warm, or cold?
Which one do you choose?
The following use cases based on actual Info-Tech analyst calls may help you decide.
“Offsite” may make you think of geographical separation or even cloud-based storage, but what is the best option and why?
“Data retrieval from cold storage is harder and slower than it is from hot storage. … Because of the longer retrieval time, online cold storage plans are often much cheaper. … The downside is that you’d incur additional costs when retrieving the data.”
– Ben Stockton, Cloudwards
Hyperconverged infrastructure combines storage, virtual infrastructure, and associated management into one piece of equipment.
“HCI environments use a hypervisor, usually running on a server that uses direct-attached storage (DAS), to create a data center pool of systems and resources.”
– Samuel Greengard, Datamation
SAN providers offer a varied range of options for their products, and those options are constantly evolving.
“SAN-to-SAN replication is a low-cost, highly efficient way to manage mounting quantities of stored data.”
– Secure Infrastructure & Services
That old storage area network may still have some useful life left in it.
“Often enterprises have added storage on an ad hoc basis as they needed it for various applications. That can result in a mishmash of heterogenous storage hardware from a wide variety of vendors. SDS offers the ability to unify management of these different storage devices, allowing IT to be more efficient.”
– Cynthia Harvey, Enterprise Storage Forum (“What Is Software Defined Storage?”, 2018)
Many backup software solutions can provide backups to multiple locations, making two-location backups simple.
“Data protection demands that enterprises have multiple methods of keeping data safe and replicating it in case of disaster or loss.”
– Drew Robb, Enterprise Storage Forum, 2021
SAN solutions have come a long way with improvements in how data is stored and what is used to store the data.
“A rapidly growing portion of SAN deployments leverages all-flash storage to gain its high performance, consistent low latency, and lower total cost when compared to spinning disk.”
– NetApp
Cloud storage would not be sufficient if you were using a dial up connection, just as on-premises storage solutions would not suffice if they were using floppy disks.
“The captured video is stored for days, weeks, months and sometimes years and consumes a lot of space. Data storage plays a new and important role in these systems. Object storage is ideal to store the video data.”
– Object-Storage.Info
Some software products have storage options available as a result of agreements with other storage vendors. Several backup and archive software products fall into this category.
“Cold storage is perfect for archiving your data. Online backup providers offer low-cost, off-site data backups at the expense of fast speeds and easy access, even though data retrieval often comes at an added cost. If you need to keep your data long-term, but don’t need to access it often, this is the kind of storage you need.”
– Ben Stockton, Cloudwards
Activity
The first step in solving your enterprise storage challenge is identifying your data sources or drivers, data volume size, and growth rates. This information will give you insight into what data sources could be stored on premises or in the cloud, how much storage you will require for the coming five to ten years, and what to consider when exploring enterprise storage solutions.
Download the Modernize Enterprise Storage Workbook and take the first step toward understanding your data requirements.
Download the Modernize Enterprise Storage Workbook
Current and emerging storage technologies are disrupting the status quo – prepare your infrastructure for the exponential rise in data and its storage requirements.
Modernize Enterprise Storage Workbook
This workbook will complement the discussions and activities found in the Modernize Enterprise Storage blueprint. Use this workbook in conjunction with the blueprint to develop a strategy for storage modernization.
Bakkianathan, Raghunathan. “What is the difference between Hot Warm and Cold data storage?” TechBlost, n.d.. Accessed 14 July 2022.
Cesare. “Data warehouse vs Data lake vs Lakehouse… and DeltaLake?“ Medium, 14 June 2021. Accessed 26 July 2022.
Davison, Shawn and Ryan Sappenfield. “Data Lake Vs Lakehouse Vs Data Mesh: The Evolution of Data Transformation.” DevIQ, May 2022. Accessed 23 July 2022.
Desjardins, Jeff. “Infographic: How Much Data is Generated Each Day?” Visual Capitalist, 15 April 2019. Accessed 26 July 2022.
Greengard, Samuel. “Top 10 Hyperconverged Infrastructure (HCI) Solutions.” Datamation, 22 December 2020. Accessed 23 July 2022.
Harvey, Cynthia. “Flash vs. SSD Storage: Is there a Difference?” Enterprise Storage Forum, 10 July 2018. Accessed 23 July 2022.
Harvey, Cynthia. “What Is Software Defined Storage? Features & Benefits.” Enterprise Storage Forum, 22 February 2018. Accessed 23 July 2022.
Hecht, Gil. “4 Predictions for storage and backup security in 2022.” Continuity Software, 09 January 2022. Accessed 22 July 2022.
Jacobi, Jonl. “NVMe SSDs: Everything you need to know about this insanely fast storage.” PCWorld, 10 March 2019. Accessed 22 July 2022
Pritchard, Stephen. “Briefing: Cloud storage performance metrics.” Computer Weekly, 16 July 2021. Accessed 23 July 2022
Robb, Drew. “Best Enterprise Backup Software & Solutions 2022.” Enterprise Storage Forum, 09 April 2021. Accessed 23 July 2022.
Sheldon, Robert. “On-premises STaaS shifts storage buying to Opex model.” TechTarget, 10 August 2020. Accessed 22 July 2022.
“Simplify Your Storage Ownership, Forever.” PureStorage. Accessed 20 July 2022.
Stockton, Ben. “Hot Storage vs Cold Storage in 2022: Instant Access vs Long-Term Archives.” Cloudwards, 29 September 2021. Accessed 22 July 2022.
“The Cost Savings of SAN-to-SAN Replication.” Secure Infrastructure and Services, 31 March 2016. Accessed 16 July 2022.
“Video Surveillance.” Object-Storage.Info, 18 December 2019. Accessed 25 July 2022.
“What is a Data Lake?” Amazon Web Services, n.d. Accessed 17 July 2022.
“What is enterprise cloud storage?” Spectrum Enterprise, n.d. Accessed 28 July 2022.
“What is SAN (Storage Area Network).” NetApp, n.d. Accessed 25 July 2022.
“What is software-defined storage?” RedHat, 08 March 2018. Accessed 16 July 2022.
Learn to use metrics in the right way. Avoid staff (subconciously) gaming the numbers, as it is only natural to try to achieve the objective. This is really a case of be careful what you wish for, you may just get it.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate the infrastructure requirements and the ability to undergo modernization from legacy technology.
Build and document a formal set of business requirements using Info-Tech's pre-populated template after identifying stakeholders, aligning business and user needs, and evaluating deployment options.
Draft an RFP for a UC solution and gain project approval using Info-Tech’s executive presentation deck.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify pain points.
Build a skills inventory.
Define and rationalize template configuration needs.
Define standard service requests and map workflow.
Discuss/examine site type(s) and existing technology.
Determine network state and readiness.
IT skills & process understanding.
Documentation reflecting communications infrastructure.
Reviewed network readiness.
Completed current state analysis.
1.1 Build a skills inventory.
1.2 Document move, add, change, delete (MACD) processes.
1.3 List relevant communications and collaboration technologies.
1.4 Review network readiness checklist.
Clearly documented understanding of available skills
Documented process maps
Complete list of relevant communications and collaboration technologies
Completed readiness checklist
Hold focus group meeting.
Define business needs and goals.
Define solution options.
Evaluate options.
Discuss business value and readiness for each option.
Completed value and readiness assessment.
Current targets for service and deployment models.
2.1 Conduct internal focus group.
2.2 Align business needs and goals.
2.3 Evaluate deployment options.
Understanding of user needs, wants, and satisfaction with current solution
Assessment of business needs and goals
Understanding of potential future-state solution options
Identify gaps.
Examine and evaluate ways to remedy gaps.
Determine specific business requirements and introduce draft of business requirements document.
Completed description of future state.
Identification of gaps.
Identification of key business requirements.
3.1 Identify gaps and brainstorm gap remedies.
3.2 Complete business requirements document.
Well-defined gaps and remedies
List of specific business requirements
Introduce Unified Communications Solution RFP Template.
Develop statement of work (SOW).
Document technical requirements.
Complete cost-benefit analysis.
Unified Communications RFP.
Documented technical requirements.
4.1 Draft RFP (SOW, tech requirements, etc.).
4.2 Conduct cost-benefit analysis.
Ready to release RFP
Completed cost-benefit analysis
Don’t just settle for printer consolidation: Seek to eliminate print and enlist your managed print services vendor to help you achieve that goal.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you plan the project, assess your current state and requirements, build a managed print services RFP and scoring process, and build continuous improvement of business processes into your operations.
Use these templates and tools to plan the printer reduction project, document your inventory, assess current printer usage, and gather information on current and future requirements.
Use these templates and tools to create an RFP for managed print services that can easily score and compare vendors.
Update the printer policy to express the new focus on reducing unsupported printer use.
Initiatives to reduce printers are often met with end-user resistance. Don't focus on the idea of taking something away from end users. Instead, focus on how print reduction fits into larger goals of business process improvement, and on opportunities to turn the vendor into a partner who drives business process improvement through ongoing innovation and print reduction.
What are your true print use cases? Except in some legitimate use cases, printing often introduces friction and does not lead to efficiencies. Companies investing in digital transformation and document management initiatives must take a hard look at business processes still reliant on hard copies. Assess your current state to identify what the current print volume and costs are and where there are opportunities to consolidate and reduce.
Change your financial model. The managed print services industry allows you to use a pay-as-you-go approach and right-size your print spend to the organization's needs. However, in order to do printing-as-a-service right, you will need to develop a good RFP and RFP evaluation process to make sure your needs are covered by the vendor, while also baking in assurances the vendor will partner with you for continuous print reduction.
Emily Sugerman
Research Analyst, Infrastructure & Operations
Info-Tech Research Group
Darin Stahl
Principal Research Advisor, Infrastructure & Operations
Info-Tech Research Group
IT directors and business operations managers face several challenges:
Printer reduction initiatives are stymied by:
Follow these steps to excise superfluous, costly printing:
Don't settle for printer consolidation: seek to eliminate print and enlist your managed print services vendor to help you achieve that goal.
"There will be neither a V-shaped nor U-shaped recovery in demand for printing paper . . . We are braced for a long L-shaped decline."
–Toru Nozawa, President, Nippon Paper Industries (qtd. in Nikkei Asia, 2020).
*Comprises nondurable goods (including office paper), containers, and packaging.
**2020 data not available.
Source: EPA, 2020.
| 87% | → | 77% |
|---|
Quocirca, a printer industry market research firm, found that the number of organizations for whom paper is "fairly or very important to their business" has dropped 10 percentage points between 2019 and 2021.
Source: Quocirca, 2021.
| 1. Strategy & planning | 2. Vendor selection, evaluation, acquisition | 3. Implementation & operation | |
|---|---|---|---|
| Phase steps |
|
|
|
| Phase outcomes |
|
|
|
Don't settle for printer consolidation: seek to eliminate print and enlist your managed print services vendor to help you achieve that goal.
Good metrics and visible improvement are important to strengthen executive support for a long-term printer reduction strategy.
Achieve long-lasting reductions in print through document management and improved workflow processes.
Modifying and enforcing printing policies can help reduce use of printers.
Print management software should be vendor-agnostic and allow you to manage devices even if you change vendors or print services.
Simply changing your managed print services pay model to "pay-per-click" can result in large cost savings.
This blueprint's key deliverable is a completed RFP for enterprise managed print services, which feeds into a scoring tool that accelerates the requirements selection and vendor evaluation process.
Managed Print Services Vendor Assessment Questions
Managed Print Services RFP Template
Managed Print Services RFP Vendor Proposal Scoring Tool
Enterprise Printing Project Charter
Document the parameters of the print reduction project, your goals, desired business benefits, metrics.
Enterprise Printing Roles and Responsibilities RACI Guide
Assign key tasks for the project across strategy & planning, vendor selection, implementation, and operation.
Start with a policy template that emphasizes reduction in print usage and adjust as needed for your organization.
Track the printer inventory and calculate total printing costs.
End-User Print Requirements Survey
Base your requirements in end user needs and feedback.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #4: Review requirements. |
Call #6: Measure project success. |
|
Call #2: Review your printer inventory. |
Call #5: Review completed scoring tool and RFP. |
|
|
Call #5: Review vendor responses to RFP. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 8 to 12 calls over the course of 4 to 6 months.
|
Strategy & planning |
Vendor selection, evaluation, acquisition |
Implementation & Operation |
|---|---|---|
|
1.1 Create project charter and assign roles 1.2 Assess current state 1.3 Gather requirements |
2.1 Understand managed print services model 2.2 Create RFP materials 2.3 Leverage print management software |
3.1 Modify printer policies 3.2 Measure project success 3.3 Training & adoption 3.4 Plan communication 3.5 Prepare for continuous improvement |
Completed Project Charter with RACI chart
Enterprise Printing Project Charter
| Challenge | Resolution |
|---|---|
| Printer reduction is not typically high on the priority list of strategic IT initiatives. It is often a project that regularly gets deferred. The lack of an aggregate view of the total cost of printing in the environment could be one root cause, and what can't be measured usually isn't being managed. | Educate and communicate the benefits of printer reduction to executives. In particular, spend time getting buy-in from the COO and/or CFO. Use Info-Tech's Printer Reduction Tool to show executives the waste that is currently being generated. |
| Printers are a sensitive and therefore unpopular topic of discussion. Executives often see a trade-off: cost savings versus end-user satisfaction. | Make a strong financial and non-financial case for the project. Show examples of other organizations that have successfully consolidated their printers. |
If printer reduction is not driven and enforced from the top down, employees will find ways to work around your policies and changes. Do not attempt to undertake printer reduction initiatives without alerting executives. Ensure visible executive support to achieve higher cost savings.
Which business and organizational goals and drivers are supported by IT's intention to transform its printing ecosystem? For example,
Legislation: In 2009, the Washington House of Representatives passed a bill requiring state agencies to implement a plan to reduce paper consumption by 30% (State of Washington, 2009). The University of Washington cites this directive as one of the drivers for their plans to switch fully to electronic records by 2022 (University of Washington, n.d.).
Health care modernization: Implementing electronic health records; reducing paper charts.
Supply chain risk reduction: In 2021, an Ontario district school board experienced photocopier toner shortages and were forced to request schools to reduce printing and photocopying: "We have recommended to all locations that the use of printing be minimized as much as possible and priority given to the printing of sensitive and confidential documentation" (CBC, 2021).
Identify overall organizational goals in the following places:
Financial benefits: Printer reduction can reduce your printing costs and improve printing capabilities.
Non-financial benefits: Although the main motivation behind printer reduction is usually cost savings, there are also non-financial benefits to the project.
However, end users typically order printer devices and supplies through the supplies/facilities department, bypassing any budget approval process, or through IT, which does not have any authority or incentive to restrict requests (when they're not measured against the controlling of printer costs).
Organization-wide printer usage policies are rarely enforced with any strictness.
Without systematic policy enforcement, end-user print behavior becomes frivolous and generates massive printing costs.
Customize Info-Tech's Enterprise Printing Roles and Responsibilities RACI Guide RACI chart to designate project roles and responsibilities to participants both inside and outside IT.
These tasks fall under the categories of:
As a best practice, no more than one person should be responsible or accountable for any given process. The same person can be both responsible and accountable for a given process, or it could be two different people.
Avoid making someone accountable for a process if they do not have full visibility into the process for appropriate oversight, or do not have time to give the process sufficient attention.
The Enterprise Printing Roles and Responsibilities RACI Guide can be used to organize and manage these tasks.
Ensure your metrics relate both to business value and customer satisfaction. "Reduction of print" is a business metric, not an experience metric.
Frame metrics around experience level agreements (XLAs) and experience level objectives (XLOs): What are the outcomes the customer wants to achieve and the benefits they want to achieve? Tie the net promoter score into the reporting from the IT service management system, since SLAs are still needed to tactically manage the achievement of the XLOs.
Use the Metrics Development Workbook from Info-Tech's Develop Meaningful Service Metrics to define:
Good metrics and visible improvement are important to strengthen executive support for a long-term printer reduction strategy.
|
Input |
Output |
|---|---|
|
|
|
Materials |
Participants |
|
|
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Achieve long-lasting reductions in print through document management and improved workflow processes.
Leverage Info-Tech research to support your business' digital transformation
The "paperless office" has been discussed since the 1970s. The IT director alone does not have authority to change business processes. Ensure the print reduction effort is tied to other strategies and initiatives around digital transformation. Working on analog pieces of paper is not digital and may be eroding digital transformation process.
Leverage Info-Tech's Assert IT's Relevance During Digital Transformations to remind others that modernization of the enterprise print environment belongs to the discussion around increasing digitized support capabilities.
|
1. Digital Marketing |
2. Digital Channels |
3. Digitized Support Capabilities |
4. Digitally Enabled Products |
5. Business Model Innovation |
|---|---|---|---|---|
|
Manage Websites |
E-Channel Operations |
Workforce Management |
Product Design |
Innovation Lab Management |
|
Brand Management |
Product Inventory Management |
Digital Workplace Management |
Portfolio Product Administration |
Data Sandbox Management |
|
SEO |
Interactive Help |
Document Management |
Product Performance Measurement |
Innovation Compensation Management |
|
Campaign Execution |
Party Authentication |
One-time consolidation initiatives leave money on the table. The extra savings results from changes in printing culture and end-user behavior.
It's natural for printer usage and printing costs to vary based on office, department, and type of employee. Certain jobs simply require more printing than others.
However, the printing culture within your organization likely also varies based on
Examine the printing behaviors of your employees based on these factors and determine whether their printing behavior aligns with the nature of their job.
Excessive printing costs attributed to departments or groups of employees that don't require much printing for their jobs could indicate poor printing culture and potentially more employee pushback.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Understand end-user printing requirements and current printer performance through an end-user survey
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Download the End-User Print Requirements Survey
Use an end-user printer satisfaction survey before and after any reduction efforts or vendor implementation, both as a requirement-gathering user input and to measure/manage the vendor.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Prepare your printer fleet for future needs to avoid premature printer refreshes.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Strategy & planning | Vendor selection, evaluation, acquisition | Implementation & Operation |
|---|---|---|
1.1 Create project charter and assign roles 1.2 Assess current state 1.3 Gather requirements | 2.1 Understand managed print services model 2.2 Create RFP materials 2.3 Leverage print management software | 3.1 Modify printer policies 3.2 Measure project success 3.3 Training & adoption 3.4 Plan communication 3.5 Prepare for continuous improvement |
Avoid being locked into a long lease where the organization pays a fixed monthly fee whether the printer runs or not.
Instead, treat enterprise printing as a service, like the soda pop machine in the break room, where the vendor is paid when the device is used. If the vending machine is broken, the vendor is not paid until the technician restores it to operability. Printers can work the same way.
By moving to a per click/page financial model, the vendor installs and supports the devices and is paid whenever a user prints. Though the organization pays more on a per-click/page basis compared to a lease, the vendor is incentivized to right-size the printer footprint to the organization, and the organization saves on monthly recurring lease costs and maintenance costs.
Right-size commitments: If the organization remains on a lease instead of pay-per-click model, it should right-size the commitment if printing drops below a certain volume. In the agreement, include a business downturn clause that allows the organization to right-size and protect itself in the event of negative growth.
Outsourcing print services can monitor and balance your printers and optimize your fleet for efficiency. Managed print services are most appropriate for:
Vendors typically do not like the pay-per-click option and will steer businesses away from it. However, this option holds the vendor accountable for the availability and reliability of your printers, and Info-Tech generally recommends this option.
Your printing costs with a pay-per-click model are most reflective of your actual printer usage. Level pay tends to be more expensive, where you need to pay for overages but don't benefit from printing less than the maximum allocated.
See the below cost comparison example with level pay set at a maximum of 120,000 impressions per month. In the level pay model, the organization was paying for 120,000 sheets in the month it only used 60,000 impressions, whereas it would have been able to pay just for the 60,000 sheets in the pay-per-click model.
This organization compared estimated costs over a 36-month period for the base-plus-click and pay-per-page models for Toshiba E Studio 3515 AC Digital Color Systems.
|
Base-plus-click model |
Monthly recurring cost |
Avg. impressions per month |
Monthly cost |
Monthly cost |
"Net pay per click" |
Cost over 36-month period |
|---|---|---|---|---|---|---|
|
A fixed lease cost each month, with an additional per click/page charge |
$924.00 |
12,000 (B&W) |
$0.02 (B&W) |
$1,164.00 (B&W) |
$0.097 (B&W) |
$41,904 (B&W) |
|
5,500 (Color) |
$0.09 (Color) |
$495.00 (Color) |
$0.090 (Color) |
$17,820 (Color) |
|
Base-plus-click model |
Monthly recurring cost |
Avg. impressions per month |
Monthly cost |
Monthly cost |
"Net pay per click" |
Cost over 36-month period |
|---|---|---|---|---|---|---|
|
No monthly lease cost, only per-image charges |
0.00 |
12,000 (B&W) |
$0.06 (B&W) |
$720.00 (B&W) |
$0.060 (B&W) |
$25,920 (B&W) |
|
5,500 (Color) |
$0.12 (Color) |
$660.00 (Color) |
$0.120 (Color) |
$23,760 (Color) |
Though the per-image cost for each image is lower in the base-plus-click model, the added monthly recurring costs for the lease means the "net pay per click" is higher.
Overall, the pay-per-page estimate saved $10,044 over a 36-month period for this device.
Avoid a scenario where the vendor drops the printer in your environment and returns only for repairs. Engage the vendor in this continuous innovation work:
In the managed services agreement, include a proviso for continuous innovation where the vendor has a contractual obligation to continually look at the business process flow and bring yearly proposals to show innovation (e.g. cost reductions; opportunities to reduce print, which allows the vendor to propose document management services and record keeping services). Leverage vendors who are building up capabilities to transform business processes to help with the heavy lifting.
Establish a vision for the relationship that goes beyond devices and toner. The vendor can make a commitment to continuous management and constant improvement, instead of installing the devices and leaving. Ideally, this produces a mutually beneficial situation: The client asks the vendor to sell them ways to mature and innovate the business processes, while the vendor retains the business and potentially sells new services. In order to retain your business, the vendor must continue to learn and know about your business.
The metric of success for your organization is the simple reduction in printed copies overall. The vendor success metric would be proposals that may combine hardware, software, and services that provide cost-effective reductions in print through document management and workflow processes. The vendors should be keen to build this into the relationship since the services delivery has a higher margin for them.
"Continuing innovation: The contractor initiates at least one (1) project each year of the contract that shows leadership and innovation in solutions and services for print, document management, and electronic recordkeeping. Bidders must describe a sample project in their response, planning for an annual investment of approximately 50 consulting hours and $10,000 in hardware and/or software."
Problem: Printer downtime and poor service is causing friction with your managed service provider (MSP).
MSPs often offer clients credit requests (service credits) for their service failures, which are applied to the previous month's monthly recurring charge. They are applied to the last month's MRC (monthly reoccurring charges) at the end of term and then the vendor pays out the residual.
However, while common, service credits are not always perceived to be a strong incentive for the provider to continually focus on improvement of mean time to respond or mean time to repair.
Solution: Turn your vendor into a true partner by including an "earn back" condition in the contract.
Printers are commoditized and can come and go, but print management software enables the governance, compliance, savings and visibility necessary for the transformation
Ask respondents to describe their managed services capabilities and an optional on-premises, financed solution with these high-level capabilities.
|
Print Management Software Features |
|
|---|---|
| Hardware-neutral support of all major printer types and operating systems (e.g. direct IP to any IPP-enabled printer along with typical endpoint devices) | Tracking of all printing activity by user, client account, printer, and document metadata |
| Secure print on demand (Secure print controls: User Authenticated Print Release, Pull Printing) | Granular print cost/charging, allowing costs to be assigned on a per-printer basis with advanced options to charge different amounts based on document type (e.g. color, grayscale or duplex), page size, user or group |
| Managed and secured mobile printing (iOS/Android), BYOD, and guest printing | DaaS/VDI print support |
| Printer installation discovery/enablement, device inventory/management | Auditing/reporting, print audit trail using document attributes to manage costs/savings, enforce security and compliance with regulations and policies |
| Monitoring print devices, print queues, provide notification of conditions | Watermarking and/or timestamping to ensure integrity and confidentially/classification of printed documents some solutions support micro font adding print date, time, user id and other metadata values discreetly to a page preventing data leakage |
| Active Directory integration or synchronization with LDAP user accounts | Per-user quotas or group account budgets |
| Ability to govern default print settings policies (B&W, double-sided, no color, etc.) | |
Use Info-Tech's catalog of commonly used questions and requirements in successful acquisition processes for managed print services. Ask the right questions to secure an agreement that meets your needs. If you are already in a contract with managed print services, take the opportunity of contract renewal to improve the contract and service.
Add your finalized assessment questions into this table, which you will attach to your RFP. The vendor answers questions in this "Schedule 1" attachment and returns it to you.
Aggregate the RFP responses into this scoring tool to identify the frontrunners and candidates for elimination. Since the vendors are asked to respond in a standard format, it is easier to bring together all the responses to create a complete view of your options.
Include the right requirements for your organization, and avoid leaving out important requirements that might have been overlooked.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Download the Managed Print Services Vendor Assessment Questions tool
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Download the Managed Print Services RFP Vendor Proposal Scoring Tool
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
The responses from the low-scoring vendors still have value: these providers will likely provide ideas that you can then leverage with your frontrunner, even if their overall proposal did not score highly.
Strategy & planning | Vendor selection, evaluation, acquisition | Implementation & Operation |
|---|---|---|
1.1 Create project charter and assign roles 1.2 Assess current state 1.3 Gather requirements | 2.1 Understand managed print services model 2.2 Create RFP materials 2.3 Leverage print management software | 3.1 Modify printer policies 3.2 Measure project success 3.3 Training & adoption 3.4 Plan communication 3.5 Prepare for continuous improvement |
Consider that your goal is to achieve printer reduction. Discuss with your team how strict it needs to be to truly reset behavior with printers. Many organizations struggle with policy enforcement. Firm language in the policy may be required to achieve this goal. For example,
The survey was run once prior to the changes being implemented to establish a baseline of user satisfaction and to gain insights into additional requirements.
Several months after the initial rollout (90 days is typical to let the dust settle), resurvey the end users and publish or report to the administration success metrics (the current costs vs. the actual costs prior to the change).
User satisfaction survey can be used to manage the vendor, especially if the users are less happy after the vendor touched their environment. Use this feedback to hold the provider to account for improvement.
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Prepare troubleshooting guides and step-by-step visual aid posters for the print areas that guide users to print, release, and find their print jobs and fix common incidents on their own. These may include:
Ensure business leadership and end users remain committed to thinking before they print.
|
Solicit the input of end users through surveys and review comments. |
Common complaints | Response |
|---|---|---|
|
Consider the input of end users when making elimination and consolidation decisions and communicate IT's justification for each end user's argument to keep their desktop printers. |
"I don't trust network storage. I want physical copies." | Explain the security and benefits of content management systems. |
| "I use my desktop a lot. I need it." | Explain the cost benefits of printing on cheaper network MFPs, especially if they print in large quantities. | |
| "I don't use it a lot, so it's not costly." | It's a waste of money to maintain and power underused devices. | |
| "I need security and confidentiality." | MFPs have biometric and password-release functions, which add an increased layer of security. | |
| "I need to be able to print from home." | Print drivers and networked home printers can be insecure devices and attack vectors. | |
| "I don't have time to wait." | Print jobs in queue can be released when users are at the device. | |
| "I don't want to walk that far." | Tell the end user how many feet the device will be within (e.g. 50 feet). It is not usually very far. |
Implement a continual improvement plan for enterprise printing:
You have now re-envisioned your enterprise print environment by documenting your current printer inventory and current cost and usage. You also have hard inventory and usage data benchmarks that you can use to measure the success of future initiatives around digitalization, going paperless, and reducing print cost.
You have also developed a plan to go to market and become a consumer of managed print services, rather than a provider yourself. You have established a reusable RFP and requirements framework to engage a managed print services vendor who will work with you to support your continuous improvement plans.
Return to the deliverables and advice in this blueprint to reinforce the organization's message to end users on when, where, and how to print. Ideally, this project has helped you go beyond a printer refresh – but rather served as a means to change the printing culture at your organization.
Contact your account representative for more information
workshops@infotech.com
1-888-670-8889
Fernandes, Louella. "Quocirca Managed Services Print Market, 2021." Quocirca, 25 Mar. 2021. Accessed 12 Oct. 2021.
McInnes, Angela. "No More Photocopies, No More Ink: Thames Valley Schools Run Out of Toner." CBC, 21 Oct. 2021. Web.
"Paper and Paperboard: Material-Specific Data." EPA, 15 Dec. 2020. Accessed 15 Oct. 2021.
State of Washington, House of Representatives. "State Agencies – Paper Conservation and Recycling." 61st Legislature, Substitute House Bill 2287, Passed 20 April 2009.
Sugihara, Azusa. "Pandemic Shreds Office Paper Demand as Global Telework Unfolds." Nikkei Asia, 18 July 2020. Accessed 29 Sept. 2021.
"Paper Reduction." University of Washington, n.d. Accessed 28 Oct. 2021.
"What is MPS?" University of Washington, n.d. Accessed 16 Mar. 2022.
Jarrod Brumm
Senior Digital Transformation Consultant
Jacques Lirette
President, Ditech Testing
3 anonymous contributors
Info-Tech Research Group Experts
Allison Kinnaird, Research Director & Research Lead
Frank Trovato, Research Director
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you understand the spectrum of different Agile xOps working modes and how best to leverage them and build an architecture and toolset that support rapid continuous IT operations
IT Operations continue to be challenged by increasing needs for scale and speed, often in the face of constrained resources and time. For most, Agile methodologies have become a foundational part of tackling this problem. Since then, we've seen Agile evolve into DevOps, which started a trend into different categories of "xOps" that are too many to count. How does one make sense of the xOps spectrum? What is InfraOps and where does it fit in?
Ultimately, all these methodologies and approaches are there to serve the same purpose: increase effectiveness through automation and improve governance through visibility. The key is to understand what tools and methodologies will deliver actual benefits to your IT operation and to the organization as a whole.
By defining your end goals and framing solutions based on the type of visibility and features you need, you can enable speed and reliability without losing control of the work.
InfraOps, when applied well, should be the embodiment of the governance policies as expressed by standards in architecture and automation.
|
Understand the xOps spectrum |
There are as many different types of "xOps" as there are business models and IT teams. To pick the approaches that deliver the best value to your organization and that align to your way of operating, it's important to understand the different major categories in the spectrum and how they do or don't apply to your IT approach. |
|---|---|
|
How to optimize the Ops in DevOps |
InfraOps is one of the major methodologies to address a key problem in IT at cloud scale: eliminating friction and error from your deliveries and outputs. The good news is there are architectures, tools, and frameworks you can easily leverage to make adopting this approach easier. |
|
Evolve to integration and build a virtuous cycle |
Ultimately your DevOps and InfraOps approaches should embody your governance needs via architecture and process. As time goes on, however, both your IT footprint and your business environment will shift. Build your tools, telemetry, and governance to anticipate and adapt to change and build a virtuous cycle between development needs and IT Operations tools and governance. |
There is no definitive list of x's in the xOps spectrum. Different organizations and teams will divide and define these in different ways. In many cases, the definitions and domains of various xOps will overlap.
Some of the commonly adopted and defined xOps models are listed here.
Shifting left or right isn't an either/or choice. They're more like opposite sides of the same coin. Like the different xOps approaches, usually more than one shift approach will apply to your IT Operations.
With the shift from execution to governing and validating, the role of deployment falls downstream of IT Operations.
IT Operations needs to move to a mindset that focuses on creating the guardrails, enforced standards, and compliance rules that need to be used downstream, then apply those standards using automation and tooling to remove friction and error from the interstitia (the white spaces between chevrons) of the various phases.
Your tools can be broken into two categories:
Keep in mind that while your infrastructure architecture is usually an either/or choice, your automation approach should use any and all tooling that helps.
Hyperconvergence is the next phase of convergence, virtualizing servers, networks, and storage on a single server/storage appliance. Capacity scales as more appliances are added to a cluster or stack.
The disruptive departure:
HCI follows convergence trends of the past ten years but is also a departure from how IT infrastructure has traditionally been provisioned and managed.
HCI is at the same time a logical progression of infrastructure convergence and a disruptive departure.
HCI can be the foundation block for a fully software defined data center, a prerequisite for private cloud.
Key attributes of a cloud are automation, resource elasticity, and self-service. This kind of agility is impossible if physical infrastructure needs intervention.
Virtualization alone does not a private cloud make, but complete stack virtualization (software defined) running on a hands-off preconfigured HCI appliance (or group of appliances) provides a solid foundation for building cloud services.
Silo-busting and private cloud sound great, but are your people and processes able to manage the change?
In traditional infrastructure, performance and capacity are managed as distinct though complementary jobs. An all-in-one approach may not work.
Use Case Example: Composable AI flow
Data Ingestion > Data Cleaning/Tagging > Training > Conclusion
Where it's useful
Considerations
Many organizations using a traditional approach report resource stranding as having an impact of 20% or more on efficiency. When focusing specifically on the stranding of memory in workloads, the number can often approach 40%.
Infrastructure as code (IaC) is the process of managing and provisioning computer data centers through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.
Before IaC, IT personnel would have to manually change configurations to manage their infrastructure. Maybe they would use throwaway scripts to automate some tasks, but that was the extent of it.
With IaC, your infrastructure's configuration takes the form of a code file, making it easy to edit, copy, and distribute.
Orchestration describes the automated arrangement, coordination, and management of complex computer systems, middleware, and services.
This usage of orchestration is often discussed in the context of service-oriented architecture, virtualization, provisioning, converged infrastructure, and dynamic data center topics. Orchestration in this sense is about aligning the business request with the applications, data, and infrastructure.
It defines the policies and service levels through automated workflows,
provisioning, and change management. This creates an application-aligned infrastructure that can be scaled up or down based on the needs of each application.
As the requirement for more resources or a new application is triggered, automated tools now can perform tasks that previously could only be done by multiple administrators operating on their individual pieces of the physical stack.
Orchestration also provides centralized management of the resource pool, including billing, metering, and chargeback for consumption. For example, orchestration reduces the time and effort for deploying multiple instances of a single application.
Automation and orchestration tools can be key components of an effective governance toolkit too! Remember to understand what data can be pulled from your various tools and leveraged for other purposes such as cost management and portfolio roadmapping.
Configuration Management
|
Configuration Management |
|
|---|---|
|
CI/CD |
|
|
Container |
|
|
Cloud-Specific |
|
|
PaaS |
Automation and orchestration tools and software offerings are plentiful, and many of them have a different focus on where in the application delivery ecosystem they provide automation functionality.
Often there are different tools for different deployment and service models as well as for different functional phases for each service model.
Let the large ecosystem of tools be your ally. Leverage the right tools where needed and then address the complexity of tools using a master orchestration scheme.
Additionally, most tools do not cover all aspects required for most automation implementations, especially in hybrid cloud scenarios.
As such, often multiple tools must be deployed, which can lead to fragmentation and loss of unified controls.
Many enterprises address this fragmentation using a cloud management platform approach.
One method of achieving this is to establish a higher layer of orchestration – an "orchestrator of orchestrators," or metaorchestration.
In complex scenarios, this can be a challenge that requires customization and development.
| Toolkit | Pros | Cons | Tips |
|---|---|---|---|
| HCI | Easy scale out | Shift in skills required | Good for enabling automation and hybridization with current-gen public cloud services |
| CI | Maximal workload resource efficiency | Investment in new fabrics and technologies | Useful for very dynamic or highly scalable workloads like AI |
| IaC | Error reduction and standardization | Managing drift in standards and requirements | Leverage a standards and exception process to keep track of drift |
| A&O | Key enabler of DevOps automation within phases | Usually requires multiple toolsets/frameworks | Use the right tools and stitch together at the metaorchestration layer |
| Metaorchestration | Reduces the complexity of a diverse A&O and IaC toolkit | Requires understanding of the entire ecosystems of tools used | Key layer of visibility and control for governance |
Remember, the goal is to increase speed AND reliability. That's why we focus on removing friction from our delivery pipelines.
Remember that, especially in modern and rapid methodologies, your IT footprint can drift unexpectedly. This means you need a real feedback mechanism on where the friction moves to next.
This is particularly important in more Agile methodologies.
| Plan | Code | Test | Deploy | Monitor | |
|---|---|---|---|---|---|
| Incoming Friction | |||||
| In-Cycle Friction | |||||
| Outgoing Friction |
Map your ops groups to the delivery cycles in your pipeline. How many delivery cycles do you have or need?
Good InfraOps is a reflection of governance policies, expressed by standards in architecture and automation.
Evaluate Hyperconverged Infrastructure for Your Infrastructure Roadmap
Banks, Ethan, host. "Choosing Your Next Infrastructure." Datanauts, episode 094, Packet Pushers, 26 July 2017. Podcast.
"Composable Infrastructure Solutions." Hewlett Packard Canada, n.d. Web.
"Composable Infrastructure Technology." Liqid Inc., n.d. Web.
"DataOps architecture design." Azure Architecture Center, Microsoft Learn, n.d. Web.
Tan, Pei Send. "Differences: DevOps, ITOps, MLOps, DataOps, ModelOps, AIOps, SecOps, DevSecOps." Medium, 5 July 2021. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Determine a starting point for architecture and discuss pain points that will drive reusability.
Document a preliminary list of test requirements and create vendor RFP and scoring.
Create an implementation rollout plan.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand mobile testing pain points.
Evaluate current statistics and challenges around mobile testing and compare with your organization.
Realize the benefits of mobile testing.
Understand the differences of mobile testing.
Assess your readiness for optimizing testing to include mobile.
Preliminary understanding of how mobile testing is different from conventional approaches to testing apps.
Understanding of how mobile testing can optimize your current testing process.
1.1 Understand the pain points experienced with mobile testing
1.2 Evaluate current statistics and challenges of mobile testing and compare your organization
1.3 Realize the benefits that come from mobile testing
1.4 Understand the differences between mobile app testing and conventional app testing
1.5 Assess your readiness for optimizing the testing process to include mobile
Organizational state assessment for mobile testing
Identify stakeholders for testing requirements gathering.
Create a project charter to obtain project approval.
Present and obtain project charter sign-off.
Well documented project charter.
Approval to launch the project.
2.1 Identify stakeholders for testing requirements gathering
2.2 Create a project charter to obtain project approval
2.3 Present & obtain project charter sign-off
Project objectives and scope
Project roles and responsibilities
Document your current non-mobile testing processes.
Create a current testing visual SOP.
Determine current testing pain points.
Thorough understanding of current testing processes and pain points.
3.1 Document your current non-mobile testing processes
3.2 Create a current state visual SOP
3.3 Determine current testing pain points
Documented current testing processes in the form of a visual SOP
List of current testing pain points
Determine your target state for mobile testing.
Choose vendors for the RFP process.
Evaluate selected vendor(s) against testing requirements.
Design mobile testing visual SOP(s).
Prioritized list of testing requirements for mobile.
Vendor selection for mobile testing solutions through an RFP process.
New SOP designed to include both current testing and mobile testing processes.
4.1 Determine your target state for mobile testing by following Info-Tech’s framework as a starting point
4.2 Design new SOP to include testing for mobile apps
4.3 Translate all considered visual SOP mobile injections into requirements
4.4 Document the preliminary list of test requirements in the RFP
4.5 Determine which vendors to include for the RFP process
4.6 Reach out to vendors for a request for proposal
4.7 Objectively evaluate vendors against testing requirements
4.8 Identify and assess the expected costs and impacts from determining your target state
List of testing requirements for mobile
Request for Proposal
Develop an implementation roadmap to integrate new testing initiatives.
Anticipate potential roadblocks during implementation rollout.
Operationalize mobile testing and ensure a smooth hand-off to IT operations.
Creation of implementation project plan.
List of approaches to mitigate potential implementation roadblocks.
Achieving clean hand-off to IT ops team.
5.1 Develop a project plan to codify your current understanding of the scope of work
5.2 Anticipate potential roadblocks during your tool’s implementation
5.3 Operationalize your testing tools and ensure a smooth hand-off from the project team
Mobile testing metrics implementation plan
Conduct regular retrospectives to consider areas for improvement.
Adjust your processes, systems, and testing tools to improve performance and usability.
Revisit implementation metrics to communicate project benefits.
Leverage the lessons learned and apply them to other projects.
Project specific metrics.
Discovery of areas to improve.
6.1 Conduct regular retrospectives to consider areas for improvement
6.2 Revisit your implementation metrics to communicate project benefits to business stakeholders
6.3 Adjust your processes, systems, and testing tools to improve performance and usability
6.4 Leverage the lessons learned and apply them to other IT projects
Steps to improve your mobile testing
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read our concise Executive Brief to find out why you should automate testing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.
Develop and implement practices that mature your automated testing capabilities.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the goals of and your vision for your automated testing practice.
Develop your automated testing foundational practices.
Adopt good practices for each test type.
Level set automated testing expectations and objectives.
Learn the key practices needed to mature and streamline your automated testing across all test types.
1.1 Build a foundation.
1.2 Automate your test types.
Automated testing vision, expectations, and metrics
Current state of your automated testing practice
Ownership of the implementation and execution of automated testing foundations
List of practices to introduce automation to for each test type
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify and validate goals and collaboration tools that are used by your users, and the collaboration capabilities that must be supported by your desired ECS.
Map a path forward by creating a collaboration capability map and documenting your ECS requirements.
Effectively engage everyone to ensure the adoption of your new ECS. Engagement is crucial to the overall success of your project.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Create a vision for the future of your ECS.
Validate and bolster your strategy by involving your end users.
1.1 Prioritize Components of Your ECS Strategy to Improve
1.2 Create a Plan to Gather Requirements From End Users
1.3 Brainstorm the Collaboration Services That Are Used by Your Users
1.4 Focus Group
Defined vision and mission statements
Principles for your ECS
ECS goals
End-user engagement plan
Focus group results
ECS executive presentation
ECS strategy
Streamline your collaboration service portfolio.
Documented the business requirements for your collaboration services.
Reduced the number of supported tools.
Increased the effectiveness of training and enhancements.
2.1 Create a Current-State Collaboration Capability Map
2.2 Build a Roadmap for Desired Changes
2.3 Create a Future-State Capability Map
2.4 Identify Business Requirements
2.5 Identify Use Requirements and User Processes
2.6 Document Non-Functional Requirements
2.7 Document Functional Requirements
2.8 Build a Risk Register
Current-state collaboration capability map
ECS roadmap
Future-state collaboration capability map
ECS business requirements document
Ensure the system is supported effectively by IT and adopted widely by end users.
Unlock the potential of your ECS.
Stay on top of security and industry good practices.
Greater end-user awareness and adoption.
3.1 Develop an IT Training Plan
3.2 Develop a Communications Plan
3.3 Create Initial Marketing Material
IT training plan
Communications plan
App marketing one-pagers
COVID-19 has created new risks to physical encounters among workers and customers. New biosecurity processes and ways to effectively enforce them – in the least intrusive way possible – are required to resume these activities.
New biosecurity standards will be imposed on many industries, and the autonomous edge will be part of the solution to manage that new reality.
There are some key considerations for businesses considering new biosecurity measures:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
You are looking to lose your dependency on Active Directory (AD), and you need to tackle infrastructure technical debt, but there are challenges:
Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build all new systems with cloud integration in mind. Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code.
Understand what Active Directory is and why Azure Active Directory does not replace it.
It’s about Kerberos and New Technology LAN Manager (NTLM).
![]() |
Many organizations that want to innovate and migrate from on-premises applications to software as a service (SaaS) and cloud services are held hostage by their legacy Active Directory (AD). Microsoft did a good job taking over from Novell back in the late 90s, but its hooks into businesses are so deep that many have become dependent on AD services to manage devices and users, when in fact AD falls far short of needed capabilities, restricting innovation and progress. Despite Microsoft’s Azure becoming prominent in the world of cloud services, Azure AD is not a replacement for on-premises AD. While Azure AD is a secure authentication store that can contain users and groups, that is where the similarities end. In fact, Microsoft itself has an architecture to mitigate the shortcomings of Azure AD by recommending organizations migrate to a hybrid model, especially for businesses that have an in-house footprint of servers and applications. If you are a greenfield business and intend to take advantage of software, infrastructure, and platform as a service (SaaS, IaaS, and PaaS), as well as Microsoft 365 in Azure, then Azure AD is for you and you don’t have to worry about the need for AD. John Donovan |
Legacy AD was never built for modern infrastructure |
When Microsoft built AD as a free component for the Windows Server environment to replace Windows NT before the demise of Novell Directory Services in 2001, it never meant Active Directory to work outside the corporate network with Microsoft apps and devices. While it began as a central managing system for users and PCs on Microsoft operating systems, with one user per PC, the IT ecosystem has changed dramatically over the last 20 years, with cloud adoption, SaaS, IaaS, PaaS, and everything as a service. To make matters worse, work-from-anywhere has become a serious security challenge. |
|---|---|
Build all new systems with cloud integration in mind |
Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code. Ensure you are engaged when the business is assessing new apps. Stop the practice of the business purchasing apps without IT’s involvement; for example, if your marketing department is asking you for your Domain credentials for a vendor when you were not informed of this purchase. |
Hybrid AD is a solution but not a long-term goal |
Economically, Microsoft has no interest in replacing AD anytime soon. Microsoft wants that revenue and has built components like Azure AD Connect to mitigate the AD dependency issue, which is basically holding your organization hostage. In fact, Microsoft has advised that a hybrid solution will remain because, as we will investigate, Azure AD is not legacy AD. |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
You are looking to lose your dependency on Active Directory, and you need to tackle infrastructure technical debt, but there are challenges.
|
|
|
Info-Tech Insight
Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.
From NT to the cloud
| AD 2001 | Exchange Server 2003 | SharePoint 2007 | Server 2008 R2 | BYOD Security Risk | All in Cloud 2015 |
|---|---|---|---|---|---|
|
|
|
|
|
|
AD is the backbone of many organizations’ IT infrastructure
73% of organizations say their infrastructure is built on AD.
82% say their applications depend on AD data.
89% say AD enables authenticated access to file servers.
90% say AD is the main source for authentication.
Source: Dimensions research: Active Directory Modernization :
Info-Tech Insight
Organizations fail to move away from AD for many reasons, including:
Physical and logical structure
Authentication, authorization, and auditing

AD creates infrastructure technical debt and is difficult to migrate away from.

Info-Tech Insight
Due to the pervasive nature of Active Directory in the IT ecosystem, IT organizations are reluctant to migrate away from AD to modernize and innovate.
Migration to Microsoft 365 in Azure has forced IT departments’ hand, and now that they have dipped their toe in the proverbial cloud “lake,” they see a way out of the mounting technical debt.
Neglecting Active Directory security
98% of data breaches came from external sources.
85% of data breach took weeks or even longer to discover.
The biggest challenge for recovery after an Active Directory security breach is identifying the source of the breach, determining the extent of the breach, and creating a safe and secure environment.
Info-Tech Insight
Neglecting legacy Active Directory security will lead to cyberattacks. Malicious users can steal credentials and hijack data or corrupt your systems.
AD event logs
84% of organizations that had a breach had evidence of that breach in their event logs.
It’s widely estimated that Active Directory remains at the backbone of 90% of Global Fortune 1000 companies’ business infrastructure (Lepide, 2021), and with that comes risk. The risks include:
AD is dependent on Windows Server

"Azure Active Directory is not designed to be the cloud version of Active Directory. It is not a domain controller or a directory in the cloud that will provide the exact same capabilities with AD. It actually provides many more capabilities in a different way.
That’s why there is no actual ‘migration’ path from Active Directory to Azure Active Directory. You can synchronize your on-premises directories (Active Directory or other) to Azure Active Directory but not migrate your computer accounts, group policies, OU etc."
– Gregory Hall,
Brand Representative for Microsoft
(Source: Spiceworks)

Note: AD Federated Services (ADFS) is not a replacement for AD. It’s a bolt-on that requires maintenance, support, and it is not a liberating service.
Many companies are:
Given these trends, Active Directory is becoming obsolete in terms of identity management and permissions.
One of the core principles of Azure AD is that the user is the security boundary, not the network.
Kerberos is the default authentication and authorization protocol for AD. Kerberos is involved in nearly everything from the time you log on to accessing Sysvol, which is used to deliver policy and logon scripts to domain members from the Domain Controller.
Info-Tech Insight
If you are struggling to get away from AD, Kerberos and NTML are to blame. Working around them is difficult. Azure AD uses SAML2.0 OpenID Connect and OAuth2.0.
| Feature | Azure AD DS | Self-managed AD DS |
|---|---|---|
| Managed service | ✓ | ✕ |
| Secure deployments | ✓ | Administrator secures the deployment |
| DNS server | ✓ (managed service) | ✓ |
| Domain or Enterprise administrator privileges | ✕ | ✓ |
| Domain join | ✓ | ✓ |
| Domain authentication using NTLM and Kerberos | ✓ | ✓ |
| Kerberos-constrained delegation | Resource-based | Resource-based and account-based |
| Custom OU structure | ✓ | ✓ |
| Group Policy | ✓ | ✓ |
| Schema extensions | ✕ | ✓ |
| AD domain/forest trusts | ✓ (one-way outbound forest trusts only) | ✓ |
| Secure LDAP (LDAPS) | ✓ | ✓ |
| LDAP read | ✓ | ✓ |
| LDAP write | ✓ (within the managed domain) | ✓ |
| Geo-distributed deployments | ✓ | ✓ |
Source: “Compare self-managed Active Directory Domain Services...” Azure documentation, 2022
How AD poses issues that impact the user experience
IT organizations are under pressure to enable work-from-home/work-from-anywhere.
When considering retiring Active Directory from your environment, look at alternatives that can assist with those legacy application servers, handle Kerberos and NTML, and support LDAP.
What to look for
If you are embedded in Windows systems but looking for an alternative to AD, you need a similar solution but one that is capable of working in the cloud and on premises.
Aside from protocols and supporting utilities, also consider additional features that can help you retire your Active Directory while maintaining highly secure access control and a strong security posture.
These are just a few examples of the many alternatives available.
The business is now driving your Active Directory migration
What IT must deal with in the modern world of work:
Organizations are making decisions that impact Active Directory, from enabling work-from-anywhere to dealing with malicious threats such as ransomware. Mergers and acquisitions also bring complexity with multiple AD domains.
The business is putting pressure on IT to become creative with security strategies, alternative authentication and authorization, and migration to SaaS and cloud services.
Discovery |
Assessment |
Proof of Concept |
Migration |
Cloud Operations |
|---|---|---|---|---|
| ☐ Catalog your applications.
☐ Define your users, groups and usage. ☐ Identify network interdependencies and complexity. ☐ Know your security and compliance regulations. ☐ Document your disaster recovery plan and recovery point and time objectives (RPO/RTO). |
☐ Build a methodology for migrating apps to IaaS. ☐ Develop a migration team using internal resources and/or outsourcing. ☐ Use Microsoft resources for specific skill sets. ☐ Map on-premises third-party solutions to determine how easily they will migrate. ☐ Create a plan to retire and archive legacy data. |
☐ Test your workload: Start small and prove value with a phased approach. ☐ Estimate cloud costs. ☐ Determine the amount and size of your compute and storage requirements. ☐ Understand security requirements and the need for network and security controls. ☐ Assess network performance. ☐ Qualify and test the tools and solutions needed for the migration. |
☐ Create a blueprint of your desired cloud environment. ☐ Establish a rollback plan. ☐ Identify tools for automating migration and syncing data. ☐ Understand the implications of the production-day data move. |
☐ Keep up with the pace of innovation. ☐ Leverage 24/7 support via skilled Azure resources. ☐ Stay on top of system maintenance and upgrades. ☐ Consider service-level agreement requirements, governance, security, compliance, performance, and uptime. |
Manage the Active Directory in the Service Desk
SoftwareReviews: Microsoft Azure Active Directory
“2012 Data Breach Investigations Report.” Verizon, 2012. Web.
“2022 Data Breach Investigations Report.” Verizon, 2012. Web.
“22 Best Alternatives to Microsoft Active Directory.” The Geek Page, 16 Feb 2022. Accessed 12 Sept. 2022.
Altieri, Matt. “Infrastructure Technical Debt.” Device 42, 20 May 2019. Accessed Sept 2022.
“Are You Ready to Make the Move from ADFS to Azure AD?’” Steeves and Associates, 29 April 2021. Accessed 28 Sept. 2022.
Blanton, Sean. “Can I Replace Active Directory with Azure AD? No, Here’s Why.” JumpCloud, 9 Mar 2021. Accessed Sept. 2022.
Chai, Wesley, and Alexander S. Gillis. “What is Active Directory and how does it work?” TechTarget, June 2021. Accessed 10 Sept. 2022.
Cogan, Sam. “Azure Active Directory is not Active Directory!” SamCogan.com, Oct 2020. Accessed Sept. 2022.
“Compare Active Directory to Azure Active Directory.” Azure documentation, Microsoft Learn, 18 Aug. 2022. Accessed 12 Sept. 2022.
"Compare self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services." Azure documentation, Microsoft Learn, 23 Aug. 2022. Accessed Sept. 2022.
“Dimensional Research, Active Directory Modernization: A Survey of IT Professionals.” Quest, 2017. Accessed Sept 2022.
Grillenmeier, Guido. “Now’s the Time to Rethink Active Directory Security.“ Semperis, 4 Aug 2021. Accessed Oct. 2013.
“How does your Active Directory align to today’s business?” Quest Software, 2017, accessed Sept 2022
Lewis, Jack “On-Premises Active Directory: Can I remove it and go full cloud?” Softcat, Dec.2020. Accessed 15 Sept 2022.
Loshin, Peter. “What is Kerberos?” TechTarget, Sept 2021. Accessed Sept 2022.
Mann, Terry. “Why Cybersecurity Must Include Active Directory.” Lepide, 20 Sept. 2021. Accessed Sept. 2022.
Roberts, Travis. “Azure AD without on-prem Windows Active Directory?” 4sysops, 25 Oct. 2021. Accessed Sept. 2022.
“Understanding Active Directory® & its architecture.” ActiveReach, Jan 2022. Accessed Sept. 2022.
“What is Active Directory Migration?” Quest Software Inc, 2022. Accessed Sept 2022.
Aligning your business with applications through your strategy will not only increase business satisfaction but also help to ensure you’re delivering applications that enable the organization’s goals.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This review guide provides organizations with a detailed assessment of their application strategy, ensuring that the applications enable the business strategy so that the organization can be more effective.The assessment provides criteria and exercises to provide actionable outcomes.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Promote and get approval for the BI selection and implementation project.
Select the most suitable BI platform.
Build a sustainable BI program.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify the scope and objectives of the workshop.
Discuss the benefits and opportunities related to a BI investment.
Gain a high-level understanding of BI and the BI market definitions and details.
Outline a project plan and identify the resourcing requirements for the project.
Determine workshop scope.
Identify the business drivers and benefits behind a BI investment.
Outline the project plan for the organization’s BI selection project.
Determine project resourcing.
Identify and perform the steps to launch the organization’s selection project.
1.1 Identify business drivers for investing in process automation technology.
1.2 Identify the organization’s fit for a BI investment.
1.3 Create a project plan.
1.4 Identify project resourcing.
1.5 Outline the project’s timeline.
1.6 Determine key metrics.
1.7 Determine project oversight.
1.8 Complete a project charter.
Completion of a project charter
Launched BI selection project
Identify functional requirements for the organization’s BI suite.
Determine technical requirements for the organization’s BI suite.
Identify the organization’s alignment to the Vendor Landscape’s use-case scenarios.
Shortlist BI vendors.
Documented functional requirements.
Documented technical requirements.
Identified use-case scenarios for the future BI solution.
2.1 Interview business stakeholders.
2.2 Interview IT staff.
2.3 Consolidate interview findings.
2.4 Build the solution’s requirements package.
2.5 Identify use-case scenario alignment.
2.6 Review Info-Tech’s BI Vendor Landscape results.
2.7 Create custom shortlist.
Documented requirements for the future solution.
Identification of the organization’s BI functional use-case scenarios.
Shortlist of BI vendors.
Identify the steps for the organization’s implementation process.
Select the right BI environment.
Run a pilot project.
Measure the value of your implementation.
Install a BI solution and prepare the BI solution in a way that allows intuitive and interactive uses.
Keep track of and quantify BI success.
3.1 Select the right environment for the BI platform.
3.2 Configure the BI implementation.
3.3 Conduct a pilot to get started with BI and to demonstrate BI possibilities.
3.4 Promote BI development in production.
A successful BI implementation.
BI is architected with the right availability.
BI ROI is captured and quantified.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Explore the significant risks associated with metrics selection so that you can avoid them.
Learn about good practices related to metrics and how to apply them in your organization, then identify your team’s business-aligned goals to be used in SDLC metric selection.
Follow Info-Tech’s TAG approach to selecting effective SDLC metrics for your team, create a communication deck to inform your organization about your selected SDLC metrics, and plan to review and revise these metrics over time.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Learn that metrics are often misused and mismanaged.
Understand the four risk areas associated with metrics: Productivity loss Gaming behavior Ambivalence Unintended consequences
Productivity loss
Gaming behavior
Ambivalence
Unintended consequences
An appreciation of the dangers associated with metrics.
An understanding of the need to select and manage SDLC metrics carefully to avoid the associated risks.
Development of critical thinking skills related to metric selection and use.
1.1 Examine the dangers associated with metric use.
1.2 Share real-life examples of poor metrics and their impact.
1.3 Practice identifying and mitigating metrics-related risk.
Establish understanding and appreciation of metrics-related risks.
Solidify understanding of metrics-related risks and their impact on an organization.
Develop the skills needed to critically analyze a potential metric and reduce associated risk.
Develop an understanding of good practices related to metric selection and use.
Introduce Info-Tech’s TAG approach to metric selection and use.
Identify your team’s business-aligned goals for SDLC metrics.
Understanding of good practices for metric selection and use.
Document your team’s prioritized business-aligned goals.
2.1 Examine good practices and introduce Info-Tech’s TAG approach.
2.2 Identify and prioritize your team’s business-aligned goals.
Understanding of Info-Tech’s TAG approach.
Prioritized team goals (aligned to the business) that will inform your SDLC metric selection.
Apply Info-Tech’s TAG approach to rank and select your team’s SDLC metrics.
Identification of potential SDLC metrics for use by your team.
Collaborative scoring/ranking of potential SDLC metrics based on their specific pros and cons.
Finalize list of SDLC metrics that will support goals and minimize risk while maximizing impact.
3.1 Select your list of potential SDLC metrics.
3.2 Score each potential metric’s pros and cons against objectives using a five-point scale.
3.3 Collaboratively select your team’s first set of SDLC metrics.
A list of potential SDLC metrics to be scored.
A ranked list of potential SDLC metrics.
Your team’s first set of goal-aligned SDLC metrics.
Develop a rollout plan for your SDLC metrics.
Develop a communication plan.
SDLC metrics.
A plan to review and adjust your SDLC metrics periodically in the future.
Communication material to be shared with the organization.
4.1 Identify rollout dates and responsible individuals for each SDLC metric.
4.2 Identify your next SDLC metric review cycle.
4.3 Create a communication deck.
SDLC metrics rollout plan
SDLC metrics review plan
SDLC metrics communication deck
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Collect and review the required information for your security budget.
Take your requirements and build a risk-based security budget.
Gain approval from business stakeholders by presenting the budget.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand your organization’s security requirements.
Collect and review the requirements.
Requirements are gathered and understood, and they will provide priorities for the security budget.
1.1 Define the scope and boundaries of the security budget.
1.2 Review the security strategy.
1.3 Review other requirements as needed, such as the mitigation effectiveness assessment or risk tolerance level.
Defined scope and boundaries of the security budget
Map business capabilities to security controls.
Create a budget that represents how risk can affect the organization.
Finalized security budget that presents three different options to account for risk and mitigations.
2.1 Identify major business capabilities.
2.2 Map capabilities to IT systems and security controls.
2.3 Categorize security controls by bare minimum, standard practice, and ideal.
2.4 Input all security controls.
2.5 Input all other expenses related to security.
2.6 Review the different budget options.
2.7 Optimize the budget through defense-in-depth options.
2.8 Finalize the budget.
Identified major business capabilities, mapped to the IT systems and controls
Completed security budget providing three different options based on risk associated
Optimized security budget
Prepare a presentation to speak with stakeholders early and build support prior to budget approvals.
Present a pilot presentation and incorporate any feedback.
Prepare for the final budget presentation.
Final presentations in which to present the completed budget and gain stakeholder feedback.
3.1 Begin developing a communication strategy.
3.2 Build the preshopping report.
3.3 Practice the presentation.
3.4 Conduct preshopping discussions with stakeholders.
3.5 Collect initial feedback and incorporate into the budget.
3.6 Prepare for the final budget presentation.
Preshopping Report
Final Budget Presentation
COVID-19 is driving the need for quick technology solutions, including some that require personal data collection. Organizations are uncertain about the right thing to do.
Data equity approaches personal data like money, putting the owner in control and helping to protect against unethical systems.
There are some key considerations for businesses grappling with digital ethics:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Make sure to build a strong knowledge management strategy to identify, capture, and transfer knowledge from project delivery to the service desk.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you craft a project support plan to document information to streamline service support.
Use these two templates as a means of collaboration with the service desk to provide information on the application/product, and steps to take to make sure there are efficient service processes and knowledge is appropriately transferred to the service desk to support the service.
Analyst PerspectiveFormalize your project support plan to shift customer service to the service desk.
|
As a service support team member, you receive a ticket from an end user about an issue they’re facing with a new application. You are aware of the application release, but you don’t know how to handle the issue. So, you will need to either spend a long time investigating the issue via peer discussion and research or escalate it to the project team. Newly developed or improved services should be transitioned appropriately to the support team. Service transitioning should include planning, coordination, and communication. This helps project and support teams ensure that upon a service failure, affected end users receive timely and efficient customer support. At the first level, the project team and service desk should build a strategy around transitioning service support to the service desk by defining tasks, service levels, standards, and success criteria. In the second step, they should check the service readiness to shift support from the project team to the service desk. The next step is training on the new services via efficient communication and coordination between the two parties. The project team should allocate some time, according to the designed strategy, to train the service desk on the new/updated service. This will enable the service desk to provide independent service handling. This research walks you through the above steps in more detail and helps you build a checklist of action items to streamline shifting service support to the service desk. Mahmoud Ramin, PhDSenior Research Analyst
|
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
|
Make sure to build a strong knowledge management strategy to identify, capture, and transfer knowledge from project delivery to the service desk.
Service desk team:
|
Project delivery team:
|
A successful launch can still be a failure if the support team isn't fully informed and prepared.
|
Info-Tech InsightInvolve the service desk in the transition process via clear communication, knowledge transfer, and staff training. |
Service desk involvement in the development, testing, and maintenance/change activity steps of your project lifecycle will help you logically define the category and priority level of the service and enable service level improvement accordingly after the project goes live.

The project team is dedicated to projects, while the support team focuses on customer service for several products.Siloed responsibilities:
|
How to break the silos: Develop a tiered model for the service desk and include project delivery in the specialist tier.
|
At the project level, get a clear understanding of support capabilities and demands, and communicate them to the service desk to proactively bring them into the planning step.
|
The following questions help you with an efficient plan for support transition |
|
Why is stakeholder analysis essential?

| Task/Activity | Example |
Conduct administrative work in the application |
|
Update documentation |
|
| Service request fulfillment/incident management |
|
| Technical support for systems troubleshooting |
|
End-user training |
|
| Service desk training |
|
Support management (monitoring, meeting SLAs) |
|
Report on the service transitioning |
|
| Ensure all policies follow the transition activities |
|
|
|
|
|
|
|
Document project description and service priority in the Project Handover Template.
|
|
Document service level objectives and maintenance in the Project Handover Template.
Transition of a project to the service desk includes both knowledge transfer and execution transfer.
01
Provide training and mentoring to ensure technical knowledge is passed on.
02
Transfer leadership responsibilities by appointing the right people.
03
Transfer support by strategically assigning workers with the right technical and interpersonal skills.
04
Transfer admin rights to ensure technicians have access rights for troubleshooting.
05
Create support and a system to transfer work process. For example, using an online platform to store knowledge assets is a great way for support to access project information.
A communication plan and executive presentation will help project managers outline recommendations and communicate their benefits.
|
Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, that makes the change concrete and meaningful to staff. The message should:
|
|
The support team usually uses an ITSM solution, while the project team mostly uses a project management solution. End users’ support is done and documented in the ITSM tool.
Even terminologies used by these teams are different. For instance, service desk’s “incident” is equivalent to a project manager’s “defect.” Without proper integration of the development and support processes, the contents get siloed and outdated over time.
Potential ways to deal with this challenge:
This helps you document information in a single platform and provides better visibility of the project status to the support team as well. It also helps project team find out change-related incidents for a faster rollback.
Note: This is not always feasible because of the high costs incurred in purchasing a new application with both ITSM and PM capabilities and the long time it takes for implementing such a solution.
Note: Consider the processes that should be integrated. Don’t integrate unnecessary steps in the development stage, such as design, which will not be helpful for support transition.
Training the service desk has two-fold benefits:
Improve support:
Shift-left enablement:
|
For more information about shift-left enablement, refer to InfoTech’s blueprint Optimize the Service Desk With a Shift-Left Strategy. |
Use the following steps to ensure the service desk gets trained on the new project.
|
Info-Tech InsightAllocate knowledge transfer within ticket handling workflows. When incident is resolved by a specialist, they will assess if it is a good candidate for technician training and/or a knowledgebase article. If so, the knowledge manager will be notified of the opportunity to assign it to a SME for training and documentation of an article. For more information about knowledge transfer, refer to phase 3 of Info-Tech’s blueprint Standardize the Service Desk.
|
| Role | Training Function | Timeline |
Developer/Technical Support |
|
|
| Business Analysts |
|
|
Service Desk Agents |
|
|
| Vendor |
|
Document your knowledge transfer plan in the Project Handover Template.
| Info-Tech InsightNo matter how well training is done, specialists may need to work on critical incidents and handle emergency changes. With effective service support and transition planning, you can make an agreement between the incident manager, change manager, and project manager on a timeline to balance critical incident or emergency change management and project management and define your SLA. |
|
2-3 hours Document project support information and check off each support transition initiative as you shift service support to the service desk.
|
|
You won’t know if transitioning support processes are successful unless you measure their impact. Find out your objectives for project transition and then track metrics that will allow you to fulfill these goals.
|
Determine critical success factors to help you find out key metrics: High quality of the service Effectiveness of communication of the transition Manage risk of failure to help find out activities that will mitigate risk of service disruption Smooth and timely transition of support to the service desk Efficient utilization of the shared services and resources to mitigate conflicts and streamline service transitioning |
Suggested metrics:
|
Following the steps outlined in this research has helped you build a strategy to shift service support from the project team to the service desk, resulting in an improvement in customer service and agent satisfaction.
You have also developed a plan to break the silo between the service desk and specialists and enable knowledge transfer so the service desk will not need to unnecessarily escalate tickets to developers. In the meantime, specialists are also responsible for service desk training on the new application.
Efficient communication of service levels has helped the project team set clear expectations for managers to create a balance between their projects and service support.
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information
workshops@infotech.com
1-888-670-8889
Improve customer service by driving consistency in your support approach and meeting SLAs.
Optimize the Service Desk With a Shift-Left StrategyThe best type of service desk ticket is the one that doesn’t exist.
Tailor IT Project Management Processes to Fit Your ProjectsRight-size PMBOK for all of your IT projects.
Brown, Josh. “Knowledge Transfer: What it is & How to Use it Effectively.” Helpjuice, 2021. Accessed November 2022.
Magowan, Kirstie. “Top ITSM Metrics & KPIs: Measuring for Success, Aiming for Improvement.” BMC Blogs, 2020. Accessed November 2022.
“The Complete Blueprint for Aligning Your Service Desk and Development Teams (Process Integration and Best Practices).” Exalate, 2021. Accessed October 2022.
“The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify what skills are needed based on where the organization is going.
Ground skills acquisition decisions in the characteristics of need.
Get stakeholder buy-in; leverage the skills map in other processes.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify process and skills changes required by the future state of your environment.
Set foundation for alignment between strategy-defined technology initiatives and needed skills.
1.1 Review the list of initiatives and projects with the group.
1.2 Identify how key support, operational, and deployment processes will change through planned initiatives.
1.3 Identify skills-related risks and pain points.
Future State Playbook
Identify process and skills changes required by the future state of your environment.
Set foundation for alignment between strategy-defined technology initiatives and needed skills.
2.1 Identify skills required to support the new environment.
2.2 Map required skills to roles.
IT/Cloud Architect Role Description
IT/Cloud Engineer Role Description
IT/Cloud Administrator Role Description
Create a skills acquisition strategy based on the characteristics of need.
Optimal skills acquisition strategy defined.
3.1 Modify impact scoring scale for key skills decision factors.
3.2 Apply impact scoring scales to needed skills
3.3 Decide whether to train, hire, contract, or outsource to acquire needed skills.
Technical Skills Map
Create an effective communication plan for different stakeholders across the organization.
Identify opportunities to leverage the skills map elsewhere.
Create a concise, clear, consistent, and relevant change message for stakeholders across the organization.
4.1 Review skills decisions and decide how you will acquire skills in each role.
4.2 Update roles descriptions.
4.3 Create a change message.
4.4 Identify opportunities to leverage the skills map in other processes.
Technical Skills Map Communication Deck
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The TY advisory service is tailored to your needs. It combines the best of traditional IT consulting expertise with the analysis and remedial solutions of an expert bureau.
When you observe specific symptoms, TY analyses the exact areas that contribute to these symptoms.
TY specializes in IT Operations and goes really deep in that area. We define IT Operations as the core service you deliver to your clients:
When you see your operation running smoothly, it looks obvious and simple, but it is not. IT Operations is a concerto, under the leadership of a competent IT Ops Conductor-Manager. IT Ops keeps the lights on and ensures your reputation with your clients and the market as a whole as a predictable and dependable business partner. And we help you achieve this, based on more than 30 years of IT Ops experience.
As most companies' business services are linked at the hip with IT, your IT Operations, in other words, are your key to a successful business.
That is why we work via a simple value-based proposition. We discuss your wants and together discover your needs. Once we all agree, only then do we make our proposal. Anything you learned on the way, is yours to keep and use.
Gert has advised clients on what to do before issues happen. We have also worked to bring companies back from the brink after serious events. TY has brought services back after big incidents.
You need to get it done, not in theory, but via actionable advice and if required, via our actions and implementation prowess. It's really elementary. Anyone can create a spreadsheet with to-do lists and talk about how resilience laws like DORA and NIS2 need to be implemented.
It's not the talk that counts, it's the walk. Service delivery is in our DNA. Resilience is our life.
Good governance directly ensures happy clients because staff knows what to do when and allows them leeway in improving the service. And this governance will satisfy auditors.
Incidents erode client confidence in your service and company. You must get them fixed in accordance with their importance,
You don't want repeat incidents! Tackle the root causes and fix issues permanently. Save money by doing this right.
You must update your services to stay the best in your field. Do it in a controlled yet efficient way. Lose overhead where you can, add the right controls where you must.
The base for most of your processes. You gotta know what you have and how it works together to provide the services to your clients.
IT monitoring delivers business value by catching issues before they become problems. With real-time insights into system performance and security, you can minimize downtime, improve efficiency, and make better decisions that keep your operations strong and your customers happy.
Bring all the IT Operations services together and measure how they perform versus set business relevant KPI's
Disaster recovery is your company's safety net for getting critical systems and data back up and running after a major disruption, focusing on fast IT recovery and minimizing financial and operational losses, whereas business continuity ensures the entire business keeps functioning during and after the crisis.
Business continuity is keeping your company running smoothly during disruptions by having the right plans, processes, and backups in place to minimize downtime and protect your operations, customers, and reputation. We go beyond disaster recovery and make sure your critical processes can continue to function.
Hope for the best, but plan for the worst. When you embark on a new venture, know how to get out of it. Planning to exit is best done in the very beginning, but better late than when it is too late.
We base our analysis on over 30 years experience in corporate and large volume dynamic services. Unique to our service is that we take your company culture into account, while we adjust the mindset of the experts working in these areas.
Your people are what will make these processes work efficiently. We take their ideas, hard capabilities and leadership capabilities into account and improve upon where needed. That helps your company and the people themselves.
We look at the existing governance and analyse where they are best in class or how we can make them more efficient. We identify the gaps and propose remedial updates. Our updates are verified through earlier work, vetted by first and second line and sometimes even regulators
Next we decide with you on how to implement the updates to the areas that need them.
Please schedule your complimentary 30-minute discovery call below.
There is no financial commitment required from you. During this meeting we discus further in detail the issue at hand and the direction of the ideal solution and the way of working.
We take in the information of our talks and prepare the the roadmap to the individualized solution for you.
By now, TY has a good idea of how we can help you, and we have prepared a roadmap to solving the issue. In this meeting we present the way forward our way of working and what it will require from you.
If you decide this is not what you expected, you are free to take the information provided so far and work with it yourself.
After the previous meeting and agreement in principle, you will have by now received our offer.
When you decide to work together, we start our partnership and solve the issue. We work to ensure you are fully satisfied with the result.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Sponsor a mandate for innovation and assemble a small team to start sourcing ideas with IT staff.
Identify critical opportunities for innovation and brainstorm effective solutions.
Prototype ideas rapidly to gain user feedback, refine solutions, and make a compelling case for project investment.
Formalize the innovation process and implement a program to create a strong culture of innovation in IT.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Introduce innovation.
Assess overall IT maturity to understand what you want to achieve with innovation.
Define the innovation mandate.
Introduce ideation.
A set of shared objectives for innovation will be defined.
A mandate will be created to help focus innovation efforts on what is most critical to the advancement of IT's maturity.
The group will be introduced to ideation and prepared to begin addressing critical IT or business pains.
1.1 Define workshop goals and objectives.
1.2 Introduce innovation.
1.3 Assess IT maturity.
1.4 Define the innovation mandate.
1.5 Introduce ideation.
Workshop goals and objectives.
An understanding of innovation.
IT maturity assessment.
Sponsored innovation mandate.
An understanding of ideation.
Identify and prioritize opportunities for IT-led innovation.
Map critical processes to identify the pains that should be ideated around.
Brainstorm potential solutions.
Assess, pitch, and prioritize ideas that should be investigated further.
The team will learn best practices for ideation.
Critical pain points that might be addressed through innovation will be identified and well understood.
A number of ideas will be generated that can solve identified pains and potentially feed the project pipeline.
The team will prioritize the ideas that should be investigated further and prototyped after the workshop.
2.1 Identify processes that present opportunities for IT-led innovation.
2.2 Map selected processes.
2.3 Finalize problem statements.
2.4 Generate ideas.
2.5 Assess ideas.
2.6 Pitch and prioritize ideas.
A list of processes with high opportunity for IT-enablement.
Detailed process maps that highlight pain points and stakeholder needs.
Problem statements to ideate around.
A long list of ideas to address pain points.
Detailed idea documents.
A shortlist of prioritized ideas to investigate further.
Ideate around a more complex problem that presents opportunity for IT-led innovation.
Map the associated process to define pain points and stakeholder needs in detail.
Brainstorm potential solutions.
Assess, pitch, and prioritize ideas that should be investigated further.
Introduce prototyping.
Map the user journey for prioritized ideas.
The team will be ready to facilitate ideation independently with other staff after the workshop.
A critical problem that might be addressed through innovation will be defined and well understood.
A number of innovative ideas will be generated that can solve this problem and help IT position itself as a source of innovative projects.
Ideas will be assessed and prioritized for further investigation and prototyping after the workshop.
The team will learn best practices for prototyping.
The team will identify the assumptions that need to be tested when top ideas are prototyped.
3.1 Select an urgent opportunity for IT-led innovation.
3.2 Map the associated process.
3.3 Finalize the problem statement.
3.4 Generate ideas.
3.5 Assess ideas.
3.6 Pitch and prioritize ideas.
3.7 Introduce prototyping.
3.8 Map the user journey for top ideas.
Selection of a process which presents a critical opportunity for IT-enablement.
Detailed process map that highlights pain points and stakeholder needs.
Problem statement to ideate around.
A long list of ideas to solve the problem.
Detailed idea documents.
A shortlist of prioritized ideas to investigate further.
An understanding of effective prototyping techniques.
A user journey for at least one of the top ideas.
Establish a process for generating, managing, prototyping, prioritizing, and approving new ideas.
Create an action plan to operationalize your new process.
Develop a program to help support the innovation process and nurture your innovators.
Create an action plan to implement your innovation program.
Decide how innovation success will be measured.
The team will learn best practices for managing innovation.
The team will be ready to operationalize an effective process for IT-led innovation. You can start scheduling ideation sessions as soon as the workshop is complete.
The team will understand the current innovation ecosystem: drivers, barriers, and enablers.
The team will be ready to roll out an innovation program that will help generate wider engagement with IT-led innovation.
You will be ready to measure and report on the success of your program.
4.1 Design an IT-led innovation process.
4.2 Assign roles and responsibilities.
4.3 Generate an action plan to roll out the process.
4.4 Determine critical process metrics to track.
4.5 Identify innovation drivers, enablers, and barriers.
4.6 Develop a program to nurture a culture of innovation.
4.7 Create an action plan to jumpstart each of your program components.
4.8 Determine critical metrics to track.
4.9 Summarize findings and gather feedback.
A process for IT-led innovation.
Defined process roles and responsibilities.
An action plan for operationalizing the process.
Critical process metrics to measure success.
A list of innovation drivers, enablers, and barriers.
A program for innovation that will leverage enablers and minimize barriers.
An action plan to roll out your innovation program.
Critical program metrics to track.
Overview of workshop results and feedback.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the benefits of a robust CXM strategy.
Identify drivers and objectives for CXM using a persona-driven approach and deploy the right applications to meet those objectives.
Complete the initiatives roadmap for CXM.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish a consistent vision across IT, marketing, sales, and customer service for CXM technology enablement.
A clear understanding of key business and technology drivers for CXM.
1.1 CXM fireside chat
1.2 CXM business drivers
1.3 CXM vision statement
1.4 Project structure
CXM vision statement
CXM project charter
Create a set of strategic requirements for CXM based on a thorough external market scan and internal capabilities assessment.
Well-defined technology requirements based on rigorous, multi-faceted analysis.
2.1 PEST analysis
2.2 Competitive analysis
2.3 Market and trend analysis
2.4 SWOT analysis
2.5 VRIO analysis
2.6 Channel map
Completed external analysis
Strategic requirements (from external analysis)
Completed internal review
Channel interaction map
Augment strategic requirements through customer persona and scenario development.
Functional requirements aligned to supporting steps in customer interaction scenarios.
3.1 Persona development
3.2 Scenario development
3.3 Requirements definition for CXM
Personas and scenarios
Strategic requirements (based on personas)
Using the requirements identified in the preceding modules, build a future-state application inventory for CXM.
A cohesive, rationalized portfolio of customer interaction applications that aligns with identified requirements and allows investment (or rationalization) decisions to be made.
4.1 Build business process maps
4.2 Review application satisfaction
4.3 Create the CXM application portfolio
4.4 Prioritize applications
Business process maps
Application satisfaction diagnostic
Prioritized CXM application portfolio
Establish repeatable best practices for CXM applications in areas such as data management and end-user adoption.
Best practices for rollout of new CXM applications.
A prioritized initiatives roadmap.
5.1 Create data integration map
5.2 Define adoption best practices
5.3 Build initiatives roadmap
5.4 Confirm initiatives roadmap
Integration map for CXM
End-user adoption plan
Initiatives roadmap
"Customers want to interact with your organization on their own terms, and in the channels of their choice (including social media, mobile applications, and connected devices). Regardless of your industry, your customers expect a frictionless experience across the customer lifecycle. They desire personalized and well-targeted marketing messages, straightforward transactions, and effortless service. Research shows that customers value – and will pay more for! – well-designed experiences.
Strong technology enablement is critical for creating customer experiences that drive revenue. However, most organizations struggle with creating a cohesive technology strategy for customer experience management (CXM). IT leaders need to take a proactive approach to developing a strong portfolio of customer interaction applications that are in lockstep with the needs of their marketing, sales, and customer service teams. It is critical to incorporate the voice of the customer into this strategy.
When developing a technology strategy for CXM, don’t just “pave the cow path,” but instead move the needle forward by providing capabilities for customer intelligence, omnichannel interactions, and predictive analytics. This blueprint will help you build an integrated CXM technology roadmap that drives top-line revenue while rationalizing application spend."
Ben Dickie
Research Director, Customer Experience Strategy
Info-Tech Research Group
Info-Tech Insight
CXM - Customer Experience Management
CX - Customer Experience
CRM - Customer Relationship Management
CSM - Customer Service Management
MMS - Marketing Management System
SMMP - Social Media Management Platform
RFP - Request for Proposal
SaaS - Software as a Service
Today’s consumers expect speed, convenience, and tailored experiences at every stage of the customer lifecycle. Successful organizations strive to support these expectations.
67% of end consumers will pay more for a world-class customer experience. 74% of business buyers will pay more for strong B2B experiences. (Salesforce, 2018)
(Customer Experience Insight, 2016)
Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.
Providing a seamless customer experience increases the likelihood of cross-sell and up-sell opportunities and boosts customer loyalty and retention. IT can contribute to driving revenue and decreasing costs by providing the business with the right set of tools, applications, and technical support.
Cross-sell, up-sell, and drive customer acquisition.
67% of consumers are willing to pay more for an upgraded experience. (Salesforce, 2018)
80%: The margin by which CX leaders outperformer laggards in the S&P 500.(Qualtrics, 2017)
59% of customers say tailored engagement based on past interactions is very important to winning their business. (Salesforce, 2018)
Focus on customer retention as well as acquisition.
It is 6-7x more costly to attract a new customer than it is to retain an existing customer. (Salesforce Blog, 2019)
A 5% increase in customer retention has been found to increase profits by 25% to 95%. (Bain & Company, n.d.)
Organizations are prioritizing CXM capabilities (and associated technologies) as a strategic investment. Keep pace with the competition and gain a competitive advantage by creating a cohesive strategy that uses best practices to integrate marketing, sales, and customer support functions.
87% of customers share great experiences they’ve had with a company. (Zendesk, n.d.)
61% of organizations are investing in CXM. (CX Network, 2015)
53% of organizations believe CXM provides a competitive advantage. (Harvard Business Review, 2014)
Top Investment Priorities for Customer Experience
(CX Network 2015)
Get ahead of the competition by doing omnichannel right. Devise a CXM strategy that allows you to create and maintain a consistent, seamless customer experience by optimizing operations within an omnichannel framework. Customers want to interact with you on their own terms, and it falls to IT to ensure that applications are in place to support and manage a wide range of interaction channels.
Omnichannel is a “multi-channel approach to sales that seeks to provide the customer with a seamless transactional experience whether the customer is shopping online from a desktop or mobile device, by telephone, or in a bricks and mortar store.” (TechTarget, 2014)
97% of companies say that they are investing in omnichannel. (Huffington Post, 2015)
23% of companies are doing omnichannel well.
The success of your CXM strategy depends on the effective interaction of various marketing, sales, and customer support functions. To deliver on customer experience, organizations need to take a customer-centric approach to operations.
From an application perspective, a CRM platform generally serves as the unifying repository of customer information, supported by adjacent solutions as warranted by your CXM objectives.
CXM ECOSYSTEM
Customer Relationship Management Platform
CXM solutions are a broad range of tools that provide comprehensive feature sets for supporting customer interaction processes. These suites supplant more basic applications for customer interaction management. Popular solutions that fall under the umbrella of CXM include CRM suites, marketing automation tools, and customer service applications.
Microsoft Dynamics
Adobe
Marketo
sprinklr
Salesforce
SugarCRM
Strong CXM applications can improve:
Technology is the key enabler of building strong customer experiences: IT must stand shoulder-to-shoulder with the business to develop a technology framework for CXM.
(Harvard Business Review, 2014)
Only 19% of organizations have a customer experience team tasked with bridging gaps between departments. (Genesys, 2018)
IT and Marketing can only tackle CXM with the full support of each other. The cooperation of the departments is crucial when trying to improve CXM technology capabilities and customer interaction and drive a strong revenue mandate.
CASE STUDY
Industry Entertainment
Source Forbes, 2014
Blockbuster
As the leader of the video retail industry, Blockbuster had thousands of retail locations internationally and millions of customers. Blockbuster’s massive marketing budget and efficient operations allowed it to dominate the competition for years.
Situation
Trends in Blockbuster’s consumer market changed in terms of distribution channels and customer experience. As the digital age emerged and developed, consumers were looking for immediacy and convenience. This threatened Blockbuster’s traditional, brick-and-mortar B2C operating model.
The Competition
Netflix entered the video retail market, making itself accessible through non-traditional channels (direct mail, and eventually, the internet).
Results
Despite long-term relationships with customers and competitive standing in the market, Blockbuster’s inability to understand and respond to changing technology trends and customer demands led to its demise. The organization did not effectively leverage internal or external networks or technology to adapt to customer demands. Blockbuster went bankrupt in 2010.
Customer Relationship Management
Blockbuster did not leverage emerging technologies to effectively respond to trends in its consumer network. It did not optimize organizational effectiveness around customer experience.
CASE STUDY
Industry Entertainment
Source Forbes, 2014
Netflix
Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.
The Situation
In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.
The Competition
Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience.
Results
Netflix’s disruptive innovation is built on the foundation of great CXM. Netflix is now a $28 billion company, which is tenfold what Blockbuster was worth.
Customer Relationship Management Platform
Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time, video rental industry leader, Blockbuster.
Creating an end-to-end technology-enablement strategy for CXM requires a concerted, dedicated effort: Info-Tech can help with our proven approach.
Build the CXM Project Charter
Conduct a Thorough Environmental Scan
Build Customer Personas and Scenarios
Draft Strategic CXM Requirements
Build the CXM Application Portfolio
Implement Operational Best Practices
Info-Tech draws on best-practice research and the experiences of our global member base to develop a methodology for CXM that is driven by rigorous customer-centric analysis.
Our approach uses a unique combination of techniques to ensure that your team has done its due diligence in crafting a forward-thinking technology-enablement strategy for CXM that creates measurable value.
CASE STUDY
Industry Professionals Services
Source Info-Tech Workshop
The Situation
A global professional services firm in the B2B space was experiencing a fragmented approach to customer engagement, particularly in the pre-sales funnel. Legacy applications weren’t keeping pace with an increased demand for lead evaluation and routing technology. Web experience management was also an area of significant concern, with a lack of ongoing customer engagement through the existing web portal.
The Approach
Working with a team of Info-Tech facilitators, the company was able to develop several internal and external customer personas. These personas formed the basis of strategic requirements for a new CXM application stack, which involved dedicated platforms for core CRM, lead automation, web content management, and site analytics.
Results
Customer “stickiness” metrics increased, and Sales reported significantly higher turnaround times in lead evaluations, resulting in improved rep productivity and faster cycle times.
| Components of a persona | |
|---|---|
| Name | Name personas to reflect a key attribute such as the persona’s primary role or motivation. |
| Demographic | Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.) |
| Wants, needs, pain points | Identify surface-level motivations for buying habits. |
| Psychographic/behavioral traits | Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.). |
Create the Project Vision
Structure the Project
Scan the External Environment
Assess the Current State of CXM
Create an Application Portfolio
Develop Deployment Best Practices
Create an Initiative Rollout Plan
Confirm and Finalize the CXM Blueprint
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Diagnostics and consistent frameworks used throughout all four options
| 1. Drive Value With CXM | 2. Create the Framework | 3. Finalize the Framework | |
|---|---|---|---|
| Best-Practice Toolkit | 1.1 Create the Project Vision 1.2 Structure the CXM Project |
2.1 Scan the External Environment 2.2 Assess the Current State of CXM 2.3 Create an Application Portfolio 2.4 Develop Deployment Best Practices |
3.1 Create an Initiative Rollout Plan 3.2 Confirm and Finalize the CXM Blueprint |
| Guided Implementations |
|
|
|
| Onsite Workshop | Module 1: Drive Measurable Value with a World-Class CXM Program | Module 2: Create the Strategic Framework for CXM | Module 3: Finalize the CXM Framework |
Phase 1 Outcome:
|
Phase 2 Outcome:
|
Phase 3 Outcome:
|
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | Workshop Day 5 | |
|---|---|---|---|---|---|
| Activities | Create the Vision for CXM Enablement 1.1 CXM Fireside Chat 1.2 CXM Business Drivers 1.3 CXM Vision Statement 1.4 Project Structure |
Conduct the Environmental Scan and Internal Review 2.1 PEST Analysis 2.2 Competitive Analysis 2.3 Market and Trend Analysis 2.4 SWOT Analysis 2.5 VRIO Analysis 2.6 Channel Mapping |
Build Personas and Scenarios 3.1 Persona Development 3.2 Scenario Development 3.3 Requirements Definition for CXM |
Create the CXM Application Portfolio 4.1 Build Business Process Maps 4.2 Review Application Satisfaction 4.3 Create the CXM Application Portfolio 4.4 Prioritize Applications |
Review Best Practices and Confirm Initiatives 5.1 Create Data Integration Map 5.2 Define Adoption Best Practices 5.3 Build Initiatives Roadmap 5.4 Confirm Initiatives Roadmap |
| Deliverables |
|
|
|
|
|
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion: 2 weeks
Step 1.1: Create the Project Vision
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
Step 1.2: Structure the Project
Review findings with analyst:
Then complete these activities…
With these tools & templates:
Phase 1 Results & Insights:
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
An aligned, optimized CX strategy is:
Rapid: to intentionally and strategically respond to quickly-changing opportunities and issues.
Outcome-based: to make key decisions based on strong business cases, data, and analytics in addition to intuition and judgment.
Rigorous: to bring discipline and science to bear; to improve operations and results.
Collaborative: to conduct activities in a broader ecosystem of partners, suppliers, vendors, co-developers, and even competitors.
(The Wall Street Journal, 2013)
Info-Tech Insight
If IT fails to adequately support marketing, sales, and customer service teams, the organization’s revenue will be in direct jeopardy. As a result, CIOs and Applications Directors must work with their counterparts in these departments to craft a cohesive and comprehensive strategy for using technology to create meaningful (and profitable) customer experiences.
1.1.1 30 minutes
1.1.2 30 minutes
There’s no silver bullet for developing a strategy. You can encounter pitfalls at a myriad of different points including not involving the right stakeholders from the business, not staying abreast of recent trends in the external environment, and not aligning sales, marketing, and support initiatives with a focus on the delivery of value to prospects and customers.
Common Pitfalls When Creating a Technology-Enablement Strategy for CXM
Senior management is not involved in strategy development.
Not paying attention to the “art of the possible.”
“Paving the cow path” rather than focusing on revising core processes.
Misalignment between objectives and financial/personnel resources.
Inexperienced team on either the business or IT side.
Not paying attention to the actions of competitors.
Entrenched management preferences for legacy systems.
Sales culture that downplays the potential value of technology or new applications.
IT →Marketing, Sales, and Service →External Customers
Internal-Facing Applications
Customer-Facing Applications
Info-Tech Insight
IT often overlooks direct customer considerations when devising a technology strategy for CXM. Instead, IT leaders rely on other business stakeholders to simply pass on requirements. By sitting down with their counterparts in marketing and sales, and fully understanding business drivers and customer personas, IT will be much better positioned to roll out supporting applications that drive customer engagement.
1.1.3 30 minutes
| Business Driver Name | Driver Assumptions, Capabilities, and Constraints | Impact on CXM Strategy |
|---|---|---|
| High degree of customer-centric solution selling | A technically complex product means that solution selling approaches are employed – sales cycles are long. | There is a strong need for applications and data quality processes that support longer-term customer relationships rather than transactional selling. |
| High desire to increase scalability of sales processes | Although sales cycles are long, the organization wishes to increase the effectiveness of rep time via marketing automation where possible. | Sales is always looking for new ways to leverage their reps for face-to-face solution selling while leaving low-level tasks to automation. Marketing wants to support these tasks. |
| Highly remote sales team and unusual hours are the norm | Not based around core hours – significant overtime or remote working occurs frequently. | Misalignment between IT working only core hours and after-hours teams leads to lag times that can delay work. Scheduling of preventative sales maintenance must typically be done on weekends rather than weekday evenings. |
1.1.4 30 minutes
| IT Driver Name | Driver Assumptions, Capabilities, and Constraints | Impact on CXM Strategy |
|---|---|---|
| Sales Application Procurement Methodology | Strong preference for on-premise COTS deployments over homebrewed applications. | IT may not be able to support cloud-based sales applications due to security requirements for on premise. |
| Vendor Relations | Minimal vendor relationships; SLAs not drafted internally but used as part of standard agreement. | IT may want to investigate tightening up SLAs with vendors to ensure more timely support is available for their sales teams. |
| Development Methodology | Agile methodology employed, some pockets of Waterfall employed for large-scale deployments. | Agile development means more perfective maintenance requests come in, but it leads to greater responsiveness for making urgent corrective changes to non-COTS products. |
| Data Quality Approach | IT sees as Sales’ responsibility | IT is not standing as a strategic partner for helping to keep data clean, causing dissatisfaction from customer-facing departments. |
| Staffing Availability | Limited to 9–5 | Execution of sales support takes place during core hours only, limiting response times and access for on-the-road sales personnel. |
1.1.5 30 minutes
1. Based on the IT and business drivers identified, craft guiding principles for CXM technology enablement. Keep guiding principles in mind throughout the project and ensure they support (or reconcile) the business and IT drivers.
| Guiding Principle | Description |
|---|---|
| Sales processes must be scalable. | Our sales processes must be able to reach a high number of target customers in a short time without straining systems or personnel. |
| Marketing processes must be high touch. | Processes must be oriented to support technically sophisticated, solution-selling methodologies. |
2. Summarize the guiding principles above by creating a CXM mission statement. See below for an example.
Example: CXM Mission Statement
To ensure our marketing, sales and service team is equipped with tools that will allow them to reach out to a large volume of contacts while still providing a solution-selling approach. This will be done with secure, on-premise systems to safeguard customer data.
Determine if now is the right time to move forward with building (or overhauling) your technology-enablement strategy for CXM.
Not all organizations will be able to proceed immediately to optimize their CXM technology enablement. Determine if the organizational willingness, backbone, and resources are present to commit to overhauling the existing strategy. If you’re not ready to proceed, consider waiting to begin this project until you can procure the right resources.
1.1.3; 1.1.4; 1.1.5 - Identify business and IT drivers to create CXM guiding principles
The facilitator will work with stakeholders from both the business and IT to identify implicit or explicit strategic drivers that will support (or pose constraints on) the technology-enablement framework for the CXM strategy. In doing so, guiding principles will be established for the project.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
CXM Strategy Project Charter Template
1.2.1 CXM Strategy Project Charter Template
Having a project charter is the first step for any project: it specifies how the project will be resourced from a people, process, and technology perspective, and it clearly outlines major project milestones and timelines for strategy development. CXM technology enablement crosses many organizational boundaries, so a project charter is a very useful tool for ensuring everyone is on the same page.
Sections of the document:
INFO-TECH DELIVERABLE
CXM Strategy Project Charter Template
Populate the relevant sections of your project charter as you complete activities 1.2.2-1.2.8.
Understand the role of each player within your project structure. Look for listed participants on the activities slides to determine when each player should be involved.
| Title | Role Within Project Structure |
|---|---|
| Project Sponsor |
|
| Project Manager |
|
| Business Lead |
|
| Project Team |
|
| Steering Committee |
|
Info-Tech Insight
Do not limit project input or participation to the aforementioned roles. Include subject matter experts and internal stakeholders at particular stages within the project. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to creating your CXM technology-enablement strategy.
1.2.2 30 minutes
Hold a meeting with IT, Marketing, Sales, Service, Operations, and any other impacted business stakeholders that have input into CXM to accomplish the following:
Info-Tech Insight
Going forward, set up a quarterly review process to understand changing needs. It is rare that organizations never change their marketing and sales strategy. This will change the way the CXM will be utilized.
In order to gauge the effectiveness of CXM technology enablement, establish core metrics:
| Metric Description | Current Metric | Future Goal |
|---|---|---|
| Market Share | 25% | 35% |
| Share of Voice (All Channels) | 40% | 50% |
| Average Deal Size | $10,500 | $12,000 |
| Account Volume | 1,400 | 1,800 |
| Average Time to Resolution | 32 min | 25 min |
| First Contact Resolution | 15% | 35% |
| Web Traffic per Month (Unique Visitors) | 10,000 | 15,000 |
| End-User Satisfaction | 62% | 85%+ |
| Other metric | ||
| Other metric | ||
| Other metric |
Be sure to understand what is in scope for a CXM strategy project. Prevent too wide of a scope to avoid scope creep – for example, we aren’t tackling ERP or BI under CXM.
Establishing the parameters of the project in a scope statement helps define expectations and provides a baseline for resource allocation and planning. Future decisions about the strategic direction of CXM will be based on the scope statement.
Well-executed requirements gathering will help you avoid expanding project parameters, drawing on your resources, and contributing to cost overruns and project delays. Avoid scope creep by gathering high-level requirements that lead to the selection of category-level application solutions (e.g. CRM, MMS, SMMP, etc.), rather than granular requirements that would lead to vendor application selection (e.g. Salesforce, Marketo, Hootsuite, etc.).
Out-of-scope items should also be defined to alleviate ambiguity, reduce assumptions, and further clarify expectations for stakeholders. Out-of-scope items can be placed in a backlog for later consideration. For example, fulfilment and logistics management is out of scope as it pertains to CXM.
| In Scope | ||
|---|---|---|
| Strategy | ||
| High-Level CXM Application Requirements | CXM Strategic Direction | Category Level Application Solutions (e.g. CRM, MMS, etc.) |
| Out of Scope | ||
|---|---|---|
| Software Selection | ||
| Vendor Application Review | Vendor Application Selection | Granular Application System Requirements |
1.2.3 30 minutes
To form your scope statement, ask the following questions:
Consider the core team functions when composing the project team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned CXM strategy.
| Required Skills/Knowledge | Suggested Project Team Members |
|---|---|
| IT | |
|
|
| Business | |
|
|
| Other | |
|
|
Info-Tech Insight
Don’t let your project team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the project team will enable effective decision making while still including functional business units such as marketing, sales, service, and finance, as well as IT.
1.2.4 45 minutes
Build a list of the core CXM strategy team members, and then structure a RACI chart with the relevant categories and roles for the overall project.
Responsible - Conducts work to achieve the task
Accountable - Answerable for completeness of task
Consulted - Provides input for the task
Informed - Receives updates on the task
Info-Tech Insight
Avoid missed tasks between inter-functional communications by defining roles and responsibilities for the project as early as possible.
Benefits of Assigning RACI Early:
1.2.5 30 minutes
| Example: RACI Chart | Project Sponsor (e.g. CMO) | Project Manager (e.g. Applications Manager) | Business Lead (e.g. Marketing Director) | Steering Committee (e.g. PM, CMO, CFO…) | Project Team (e.g. PM, BL, SMEs…) |
|---|---|---|---|---|---|
| Assess Project Value | I | C | A | R | C |
| Conduct a Current State Assessment | I | I | A | C | R |
| Design Application Portfolio | I | C | A | R | I |
| Create CXM Roadmap | R | R | A | I | I |
| ... | ... | ... | ... | ... | ... |
1.2.6 30 minutes
| Key Activities | Start Date | End Date | Target | Status | Resource(s) |
|---|---|---|---|---|---|
| Structure the Project and Build the Project Team | |||||
| Articulate Business Objectives and Define Vision for Future State | |||||
| Document Current State and Assess Gaps | |||||
| Identify CXM Technology Solutions | |||||
| Build the Strategy for CXM | |||||
| Implement the Strategy |
| Management Support | Change Management | IT Readiness | |
|---|---|---|---|
| Definition | The degree of understanding and acceptance of CXM as a concept and necessary portfolio of technologies. | The degree to which employees are ready to accept change and the organization is ready to manage it. | The degree to which the organization is equipped with IT resources to handle new systems and processes. |
| Assessment Outcomes |
|
|
|
| Risk |
|
|
|
1.2.7 45 minutes
Likelihood:
1 - High/Needs Focus
2 - Can Be Mitigated
3 - Unlikely
Impact
1 - High Impact
2 - Moderate Impact
3 - Minimal Impact
Example: Risk Register and Mitigation Tactics
| Risk | Impact | Likelihood | Mitigation Effort |
|---|---|---|---|
| Cost of time and implementation: designing a robust portfolio of CXM applications can be a time consuming task, representing a heavy investment for the organization | 1 | 1 |
|
| Availability of resources: lack of in-house resources (e.g. infrastructure, CXM application developers) may result in the need to insource or outsource resources | 1 | 2 |
|
1.2.8 45 minutes
Before beginning to develop the CXM strategy, validate the project charter and metrics with senior sponsors or stakeholders and receive their approval to proceed.
Info-Tech Insight
In most circumstances, you should have your CXM strategy project charter validated with the following stakeholders:
1.2.2 Define project purpose, objectives, and business metrics
Through an in-depth discussion, an analyst will help you prioritize corporate objectives and organizational drivers to establish a distinct project purpose.
1.2.3 Define the scope of the CXM strategy
An analyst will facilitate a discussion to address critical questions to understand your distinct business needs. These questions include: What are the major coverage points? Who will be using the system?
1.2.4; 1.2.5; 1.2.6 Create the CXM project team, build a RACI chart, and establish a timeline
Our analysts will guide you through how to create a designated project team to ensure the success of your CXM strategy and suite selection initiative, including project milestones and team composition, as well as designated duties and responsibilities.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion: 4 weeks
Step 2.1: Scan the External Environment
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
CXM Strategy Stakeholder Presentation Template
Step 2.2: Assess the Current State for CRM
Review findings with analyst:
Then complete these activities…
With these tools & templates:
CXM Strategy Stakeholder Presentation Template
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion: 4 weeks
Step 2.3: Create an Application Portfolio
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
CXM Portfolio Designer
CXM Strategy Stakeholder Presentation Template
CXM Business Process Shortlisting Tool
Step 2.4: Develop Deployment Best Practices
Review findings with analyst:
Then complete these activities…
With these tools & templates:
CXM Strategy Stakeholder Presentation Template
Phase 2 Results & Insights:
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
Establish the drivers, enablers, and barriers to developing a CXM technology enablement strategy. In doing so, consider needs, environmental factors, organizational drivers, and technology drivers as inputs.
CXM Strategy
| Business Needs | Organizational Drivers | Technology Drivers | Environmental Factors | |
|---|---|---|---|---|
| Definition | A business need is a requirement associated with a particular business process (for example, Marketing needs customer insights from the website – the business need would therefore be web analytics capabilities). | Organizational drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as customer retention, operation excellence, and financial performance. | Technology drivers are technological changes that have created the need for a new CXM enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge. | External considerations are factors taking place outside of the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business. |
| Examples |
|
|
|
|
Info-Tech Insight
A common organizational driver is to provide adequate technology enablement across multiple channels, resulting in a consistent customer experience. This driver is a result of external considerations. Many industries today are highly competitive and rapidly changing. To succeed under these pressures, you must have a rationalized portfolio of enterprise applications for customer interaction.
2.1.1 30 minutes

Take stock of internal challenges and barriers to effective CXM strategy execution.
Example: Internal Challenges & Potential Barriers
| Understanding the Customer | Change Management | IT Readiness | |
|---|---|---|---|
| Definition | The degree to which a holistic understanding of the customer can be created, including customer demographic and psychographics. | The degree to which employees are ready to accept operational and cultural changes and the degree to which the organization is ready to manage it. | The degree to which IT is ready to support new technologies and processes associated with a portfolio of CXM applications. |
| Questions to Ask |
|
|
|
| Implications |
|
|
|
2.1.2 30 minutes

Existing internal conditions, capabilities, and resources can create opportunities to enable the CXM strategy. These opportunities are critical to overcoming challenges and barriers.
Example: Opportunities to Leverage for Strategy Enablement
| Management Buy-In | Customer Data Quality | Current Technology Portfolio | |
|---|---|---|---|
| Definition | The degree to which upper management understands and is willing to enable a CXM project, complete with sponsorship, funding, and resource allocation. | The degree to which customer data is accurate, consistent, complete, and reliable. Strong customer data quality is an opportunity – poor data quality is a barrier. | The degree to which the existing portfolio of CXM-supporting enterprise applications can be leveraged to enable the CXM strategy. |
| Questions to Ask |
|
|
|
| Implications |
|
|
|
2.1.3 30 minutes

A successful CXM strategy requires a comprehensive understanding of an organization’s overall corporate strategy and its effects on the interrelated departments of marketing, sales, and service, including subsequent technology implications. For example, a CXM strategy that emphasizes tools for omnichannel management and is at odds with a corporate strategy that focuses on only one or two channels will fail.
Corporate Strategy
CXM Strategy
Unified Strategy
Info-Tech Insight
Your organization’s corporate strategy is especially important in dictating the direction of the CXM strategy. Corporate strategies are often focused on customer-facing activity and will heavily influence the direction of marketing, sales, customer service, and consequentially, CXM. Corporate strategies will often dictate market targeting, sales tactics, service models, and more.
Identifying organizational objectives of high priority will assist in breaking down CXM objectives to better align with the overall corporate strategy and achieve buy-in from key stakeholders.
| Corporate Objectives | Aligned CXM Technology Objectives | ||
|---|---|---|---|
| Increase Revenue | Enable lead scoring | Deploy sales collateral management tools | Improve average cost per lead via a marketing automation tool |
| Enhance Market Share | Enhance targeting effectiveness with a CRM | Increase social media presence via an SMMP | Architect customer intelligence analysis |
| Improve Customer Satisfaction | Reduce time-to-resolution via better routing | Increase accessibility to customer service with live chat | Improve first contact resolution with customer KB |
| Increase Customer Retention | Use a loyalty management application | Improve channel options for existing customers | Use customer analytics to drive targeted offers |
| Create Customer-Centric Culture | Ensure strong training and user adoption programs | Use CRM to provide 360-degree view of all customer interaction | Incorporate the voice of the customer into product development |
2.1.4 30 minutes
Industry E-Commerce
Source Pardot, 2012
Amazon.com, Inc. is an American electronic commerce and cloud computing company. It is the largest e-commerce retailer in the US.
Amazon originated as an online book store, later diversifying to sell various forms of media, software, games, electronics, apparel, furniture, food, toys, and more.
By taking a data-driven approach to marketing and sales, Amazon was able to understand its customers’ needs and wants, penetrate different product markets, and create a consistently personalized online-shopping customer experience that keeps customers coming back.
Use Browsing Data Effectively
Amazon leverages marketing automation suites to view recent activities of prospects on its website. In doing so, a more complete view of the customer is achieved, including insights into purchasing interests and site navigation behaviors.
Optimize Based on Interactions
Using customer intelligence, Amazon surveys and studies standard engagement metrics like open rate, click-through rate, and unsubscribes to ensure the optimal degree of marketing is being targeted to existing and prospective customers, depending on level of engagement.
Insights gained from having a complete understanding of the customer (from basic demographic characteristics provided in customer account profiles to observed psychographic behaviors captured by customer intelligence applications) are used to personalize Amazon’s sales and marketing approaches. This is represented through targeted suggestions in the “recommended for you” section of the browsing experience and tailored email marketing.
It is this capability, partnered with the technological ability to observe and measure customer engagement, that allows Amazon to create individual customer experiences.
Do not develop your CXM technology strategy in isolation. Work with Marketing to understand your STP strategy (segmentation, targeting, positioning): this will inform persona development and technology requirements downstream.
Market Segmentation
Market Targeting
Product Positioning
Info-Tech Insight
It is at this point that you should consider the need for and viability of an omnichannel approach to CXM. Through which channels do you target your customers? Are your customers present and active on a wide variety of channels? Consider how you can position your products, services, and brand through the use of omnichannel methodologies.
2.1.5 1 hour
2.1.5 30 minutes
Example: Competitive Implications
| Competitor Organization | Recent Initiative | Associated Technology | Direction of Impact | Competitive Implication |
|---|---|---|---|---|
| Organization X | Multichannel E-Commerce Integration | WEM – hybrid integration | Positive |
|
| Organization Y | Web Social Analytics | WEM | Positive |
|
A PEST analysis is a structured planning method that identifies external environmental factors that could influence the corporate and IT strategy.
Political - Examine political factors, such as relevant data protection laws and government regulations.
Economic - Examine economic factors, such as funding, cost of web access, and labor shortages for maintaining the site(s).
Technological - Examine technological factors, such as new channels, networks, software and software frameworks, database technologies, wireless capabilities, and availability of software as a service.
Social - Examine social factors, such as gender, race, age, income, and religion.
Info-Tech Insight
When looking at opportunities and threats, PEST analysis can help to ensure that you do not overlook external factors, such as technological changes in your industry. When conducting your PEST analysis specifically for CXM, pay particular attention to the rapid rate of change in the technology bucket. New channels and applications are constantly emerging and evolving, and seeing differential adoption by potential customers.
2.1.6 30 minutes
Example: PEST Analysis
Political
Economic
Technological
Social
2.1.7 30 minutes
For each PEST quadrant:
Example: Parsing Requirements from PEST Analysis
Technological Trend: There has been a sharp increase in popularity of mobile self-service models for buying habits and customer service access.
Goal: Streamline mobile application to be compatible with all mobile devices. Create consistent branding across all service delivery applications (e.g. website, etc.).
Strategic Requirement: Develop a native mobile application while also ensuring that resources through our web presence are built with responsive design interface.
Creating a customer-centric CXM technology strategy requires archetypal customer personas. Creating customer personas will enable you to talk concretely about them as consumers of your customer experience and allow you to build buyer scenarios around them.
A persona (or archetypal user) is an invented person that represents a type of user in a particular use-case scenario. In this case, personas can be based on real customers.
| Components of a persona | Example – Organization: Grocery Store | |
|---|---|---|
| Name | Name personas to reflect a key attribute such as the persona’s primary role or motivation | Brand Loyal Linda: A stay-at-home mother dedicated to maintaining and caring for a household of 5 people |
| Demographic | Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.) | Age: 42 years old Geographic location: London Suburbia Language: English Education: Post-secondary Job: Stay-at-home mother Annual Household Income: $100,000+ |
| Wants, needs, pain points | Identify surface-level motivations for buying habits | Wants: Local products Needs: Health products; child-safe products Pain points: Fragmented shopping experience |
| Psychographic/behavioral traits | Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.) | Psychographic: Detail-oriented, creature of habit Behavioral: Shops at large grocery store twice a week, visits farmers market on Saturdays, buys organic products online |
2.1.8 2 hours
Project Team
Info-Tech Insight
For CXM, persona building is typically used for understanding the external customer; however, if you need to gain a better understanding of the organization’s internal customers (those who will be interacting with CXM applications), personas can also be built for this purpose. Examples of useful internal personas are sales managers, brand managers, customer service directors, etc.
Post-secondary educated, white-collar professional, three children
Goals & Objectives
Behaviors
Services of Interest
Traits
General Literacy - High
Digital Literacy - Mid-High
Detail-Oriented - High
Willing to Try New Things - Mid-High
Motivated and Persistent - Mid-High
Time Flexible - Mid-High
Familiar With [Red.] - Mid
Access to [Red.] Offices - High
Access to Internet - High
Single, college educated, planning vacation in [redacted], interested in [redacted] job opportunities
Goals & Objectives
Behaviors
Services of Interest
Traits
General Literacy - Mid
Digital Literacy - High
Detail-Oriented - Mid
Willing to Try New Things - High
Motivated and Persistent - Mid
Time Flexible - Mid-High
Familiar With [Red.] - Low
Access to [Red.] Offices - Low
Access to Internet - High
15-year resident of [redacted], high school education, waiter, recently divorced, two children
Goals & Objectives
Behaviors
Services of Interest
Traits
General Literacy - Mid
Digital Literacy - Mid-Low
Detail-Oriented - Mid-Low
Willing to Try New Things - Mid
Motivated and Persistent - High
Time Flexible - Mid
Familiar With [Red.] - Mid-High
Access to [Red.] Offices - High
Access to Internet - High
Single, [redacted] resident, high school graduate
Goals & Objectives
Behaviors
Services of Interest
Traits
General Literacy - Mid
Digital Literacy - Mid
Detail-Oriented - Mid-Low
Willing to Try New Things - Mid-High
Motivated and Persistent - Mid-Low
Time Flexible - High
Familiar With [Red.] - Mid-Low
Access to [Red.] Offices - Mid-Low
Access to Internet - Mid
A scenario is a story or narrative that helps explore the set of interactions that a customer has with an organization. Scenario mapping will help parse requirements used to design the CXM application portfolio.
A Good Scenario…
Scenarios Are Used To…
To Create Good Scenarios…
2.1.9 1.5 hours
Example: Scenario Map
Persona Name: Brand Loyal Linda
Scenario Goal: File a complaint about in-store customer service
Look up “[Store Name] customer service” on public web. →Reach customer support landing page. →Receive proactive notification prompt for online chat with CSR. →Initiate conversation: provide order #. →CSR receives order context and information. →Customer articulates problem, CSR consults knowledgebase. →Discount on next purchase offered. →Send email with discount code to Brand Loyal Linda.
2.1.1; 2.1.2; 2.1.3; 2.1.4 - Create a CXM operating model
An analyst will facilitate a discussion to identify what impacts your CXM strategy and how to align it to your corporate strategy. The discussion will take different perspectives into consideration and look at organizational drivers, external environmental factors, as well as internal barriers and enablers.
2.1.5 Conduct a competitive analysis
Calling on their depth of expertise in working with a broad spectrum of organizations, our facilitator will help you work through a structured, systematic evaluation of competitors’ actions when it comes to CXM.
2.1.6; 2.1.7 - Conduct a PEST analysis
The facilitator will use guided conversation to target each quadrant of the PEST analysis and help your organization fully enumerate political, economic, social, and technological trends that will influence your CXM strategy. Our analysts are deeply familiar with macroenvironmental trends and can provide expert advice in identifying areas of concern in the PEST and drawing strategic requirements as implications.
2.1.8; 2.1.9 - Build customer personas and subsequent persona scenarios
Drawing on the preceding exercises as inputs, the facilitator will help the team create and refine personas, create respective customer interaction scenarios, and parse strategic requirements to support your technology portfolio for CXM.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
A SWOT analysis is a structured planning method that evaluates the strengths, weaknesses, opportunities, and threats involved in a project.
Strengths - Strengths describe the positive attributes that are within your control and internal to your organization (i.e. what do you do better than anyone else?)
Weaknesses - Weaknesses are internal aspects of your business that place you at a competitive disadvantage; think of what you need to enhance to compete with your top competitor.
Opportunities - Opportunities are external factors the project can capitalize on. Think of them as factors that represent reasons your business is likely to prosper.
Threats - Threats are external factors that could jeopardize the project. While you may not have control over these, you will benefit from having contingency plans to address them if they occur.
Info-Tech Insight
When evaluating weaknesses of your current CXM strategy, ensure that you’re taking into account not just existing applications and business processes, but also potential deficits in your organization’s channel strategy and go-to-market messaging.
2.2.1 30 minutes
Example: SWOT Analysis
Strengths
Weaknesses
Opportunities
Threats
2.2.2 30 minutes
For each SWOT quadrant:
Example: Parsing Requirements from SWOT Analysis
Weakness: Customer service inaccessible in real-time through website or mobile application.
Goal: Increase the ubiquity of access to customer service knowledgebase and agents through a web portal or mobile application.
Strategic Requirement: Provide a live chat portal that matches the customer with the next available and qualified agent.
Applications are the bedrock of technology enablement for CXM. Review your current application portfolio to identify what is working well and what isn’t.
Build the CXM Application Inventory →Assess Usage and Satisfaction →Map to Business Processes and Determine Dependencies →Determine Grow/Maintain/ Retire for Each Application
When assessing the CXM applications portfolio, do not cast your net too narrowly; while CRM and MMS applications are often top of mind, applications for digital asset management and social media management are also instrumental for ensuring a well-integrated CX.
Identify dependencies (either technical or licensing) between applications. This dependency tracing will come into play when deciding which applications should be grown (invested in), which applications should be maintained (held static), and which applications should be retired (divested).
Info-Tech Insight
Shadow IT is prominent here! When building your application inventory, ensure you involve Marketing, Sales, and Service to identify any “unofficial” SaaS applications that are being used for CXM. Many organizations fail to take a systematic view of their CXM application portfolio beyond maintaining a rough inventory. To assess the current state of alignment, you must build the application inventory and assess satisfaction metrics.
Review the major enterprise applications in your organization that enable CXM and align your requirements to these applications (net-new or existing). Identify points of integration to capture the big picture.

Info-Tech Insight
When assessing the current application portfolio that supports CXM, the tendency will be to focus on the applications under the CXM umbrella, relating mostly to marketing, sales, and customer service. Be sure to include systems that act as input to, or benefit due to outputs from, CRM or similar applications. Examples of these systems are ERP systems, ECM (e.g. SharePoint) applications, and more.
Having a portfolio but no contextual data will not give you a full understanding of the current state. The next step is to thoroughly assess usage patterns as well as IT, management, and end-user satisfaction with each application.
Example: Application Usage & Satisfaction Assessment
| Application Name | Level of Usage | IT Satisfaction | Management Satisfaction | End-User Satisfaction | Potential Business Impact |
|---|---|---|---|---|---|
| CRM (e.g. Salesforce) | Medium | High | Medium | Medium | High |
| CRM (e.g. Salesforce) | Low | Medium | Medium | High | Medium |
| ... | ... | ... | ... | ... | ... |
Info-Tech Insight
When evaluating satisfaction with any application, be sure to consult all stakeholders who come into contact with the application or depend on its output. Consider criteria such as ease of use, completeness of information, operational efficiency, data accuracy, etc.
2.2.3 Application Portfolio Assessment: End-User Feedback
Info-Tech’s Application Portfolio Assessment: End-User Feedback diagnostic is a low-effort, high-impact program that will give you detailed report cards on end-user satisfaction with an application. Use these insights to identify problems, develop action plans for improvement, and determine key participants.
Application Portfolio Assessment: End-User Feedback is an 18-question survey that provides valuable insights on user satisfaction with an application by:
INFO-TECH DIAGNOSTIC
2.2.4 1 hour
Example: CXM Application Inventory
| Application Name | Deployed Date | Processes Supported | Technical and Licensing Dependencies |
|---|---|---|---|
| Salesforce | June 2018 | Customer relationship management | XXX |
| Hootsuite | April 2019 | Social media listening | XXX |
| ... | ... | ... | ... |
A VRIO analysis evaluates the ability of internal resources and capabilities to sustain a competitive advantage by evaluating dimensions of value, rarity, imitability, and organization. For critical applications like your CRM platform, use a VRIO analysis to determine their value.
| Is the resource or capability valuable in exploiting an opportunity or neutralizing a threat? | Is the resource or capability rare in the sense that few of your competitors have a similar capability? | Is the resource or capability costly to imitate or replicate? | Is the organization organized enough to leverage and capture value from the resource or capability? | |
| NO | → | → | → | COMPETITIVE DISADVANTAGE |
| YES | NO→ | → | → | COMPETITIVE EQUALITY/PARITY |
| YES | YES | NO→ | → | TEMPORARY COMPETITIVE ADVANTAGE |
| YES | YES | YES | NO→ | UNUSED COMPETITIVE ADVANTAGE |
| YES | YES | YES | YES | LONG-TERM COMPETITIVE ADVANTAGE |
(Strategic Management Insight, 2013)
2.2.5 30 minutes
2.2.1; 2.2.2 Conduct a SWOT Analysis
Our facilitator will use a small-team approach to delve deeply into each area, identifying enablers (strengths and opportunities) and challenges (weaknesses and threats) relating to the CXM strategy.
2.2.3; 2.2.4 Inventory your CXM applications, and assess usage and satisfaction
Working with your core team, the facilitator will assist with building a comprehensive inventory of CXM applications that are currently in use and with identifying adjacent systems that need to be identified for integration purposes. The facilitator will work to identify high and low performing applications and analyze this data with the team during the workshop exercise.
2.2.5 Conduct a VRIO analysis
The facilitator will take you through a VRIO analysis to identify which of your internal technological competencies ensure, or can be leveraged to ensure, your competitiveness in the CXM market.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
CXM application portfolio map
The interaction between sales, marketing, and customer service is very process-centric. Rethink sales and customer-centric workflows and map the desired workflow, imbedding the improved/reengineered process into the requirements.
Business process modeling facilitates the collaboration between the business and IT, recording the sequence of events, tasks performed, who performed them, and the levels of interaction with the various supporting applications.
By identifying the events and decision points in the process and overlaying the people that perform the functions, the data being interacted with, and the technologies that support them, organizations are better positioned to identify gaps that need to be bridged.
Encourage the analysis by compiling an inventory of business processes that support customer-facing operations that are relevant to achieving the overall organizational strategies.
Outcomes
INFO-TECH OPPORTUNITY
Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.
APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.
| OPERATING PROCESSES | ||||
|---|---|---|---|---|
| 1.0 Develop Vision and Strategy | 2.0 Develop and Manage Products and Services | 3.0 Market and Sell Products and Services | 4.0 Deliver Products and Services | 5.0 Manage Customer Service |
| 6.0 Develop and Manage Human Capital | ||||
| 7.0 Manage Information Technology | ||||
| 8.0 Manage Financial Resources | ||||
| 9.0 Acquire, Construct, and Manage Assets | ||||
| 10.0 Manage Enterprise Risk, Compliance, and Resiliency | ||||
| 11.0 Manage External Relationships | ||||
| 12.0 Develop and Manage Business Capabilities | ||||
(APQC, 2011)
MORE ABOUT APQC
3.1 Understand markets, customers, and capabilities
3.2 Develop marketing strategy
3.3 Develop sales strategy
3.4 Develop and manage marketing plans
3.5 Develop and manage sales plans
5.1 Develop customer care/customer service strategy
5.2 Plan and manage customer service operations
5.2 Plan and 5.2.3.1 Receive customer complaints 5.2.3.2 Route customer complaints 5.2.3.3 Resolve customer complaints 5.2.3.4 Respond to customer complaints manage customer service operations
The APQC framework provides levels 1 through 3 for the “Market and Sell Products and Services” framework. Level 4 processes and beyond will need to be defined by your organization as they are more granular (represent the task level) and are often industry-specific.
Level 1 – Category - 1.0 Develop vision and strategy (10002)
Represents the highest level of process in the enterprise, such as manage customer service, supply chain, financial organization, and human resources.
Level 2 – Process Group - 1.1 Define the business concept and long-term vision (10014)
Indicates the next level of processes and represents a group of processes. Examples include perform after sales repairs, procurement, accounts payable, recruit/source, and develop sales strategy.
Level 3 – Process - 1.1.1 Assess the external environment (10017)
A series of interrelated activities that convert input into results (outputs); processes consume resources and require standards for repeatable performance; and processes respond to control systems that direct quality, rate, and cost of performance.
Level 4 – Activity - 1.1.1.1 Analyze and evaluate competition (10021)
Indicates key events performed when executing a process. Examples of activities include receive customer requests, resolve customer complaints, and negotiate purchasing contracts.
Level 5 – Task - 12.2.3.1.1 Identify project requirements and objectives (11117)
Tasks represent the next level of hierarchical decomposition after activities. Tasks are generally much more fine grained and may vary widely across industries. Examples include create business case and obtain funding, and design recognition and reward approaches.
Info-Tech Insight
Define the Level 3 processes in the context of your organization. When creating a CXM strategy, concern yourself with the interrelatedness of processes across existing departmental silos (e.g. marketing, sales, customer service). Reserve the analysis of activities (Level 4) and tasks (Level 3) for granular work initiatives involved in the implementation of applications.
2.3.1 CXM Business Process Shortlisting Tool
The CXM Business Process Shortlisting Tool can help you define which marketing, sales, and service processes you should focus on.
Working in concert with stakeholders from the appropriate departments, complete the short questionnaire.
Based on validated responses, the tool will highlight processes of strategic importance to your organization.
These processes can then be mapped, with requirements extracted and used to build the CXM application portfolio.
INFO-TECH DELIVERABLE

2.3.2 1 hour


Current legend for Weights and Scores
F – Finance
H – Human Resources
I – IT
L – Legal
M – Marketing
BU1 – Business Unit 1
BU2 – Business Unit 2
2.3.3 45 minutes
INFO-TECH OPPORTUNITY
Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.
Info-Tech Insight
Analysis of the current state is important in the context of gap analysis. It aids in understanding the discrepancies between your baseline and the future state vision, and ensures that these gaps are documented as part of the overall requirements.

2.3.4 30 minutes
- What is the input?
- What is the output?
- What are the underlying risks and how can they be mitigated?
- What conditions should be met to mitigate or eliminate each risk?
- What are the improvement opportunities?
- What conditions should be met to enable these opportunities?
Info-Tech Insight
The business and IT should work together to evaluate the current state of business processes and the business requirements necessary to support these processes. Develop a full view of organizational needs while still obtaining the level of detail required to make informed decisions about technology.
Identify the owners of the business processes being evaluated to extract requirements. Process owners will be able to inform business process improvement and assume accountability for reengineered or net-new processes going forward.
Process ownership ensures support, accountability, and governance for CXM and its supporting processes. Process owners must be able to negotiate with business users and other key stakeholders to drive efficiencies within their own process. The process owner must execute tactical process changes and continually optimize the process.
Responsibilities include the following:
Info-Tech Insight
Identify the owners of existing processes early so you understand who needs to be involved in process improvement and reengineering. Once implemented, CXM applications are likely to undergo a series of changes. Unstructured data will multiply, the number of users may increase, administrators may change, and functionality could become obsolete. Should business processes be merged or drastically changed, process ownership can be reallocated during CXM implementation. Make sure you have the right roles in place to avoid inefficient processes and poor data quality.
2.3.5 Process Owner Assignment Guide
The Process Owner Assignment Guide will ensure you are taking the appropriate steps to identify process owners for existing and net-new processes created within the scope of the CXM strategy.
The steps in the document will help with important considerations such as key requirements and responsibilities.
INFO-TECH DELIVERABLE
2.3.6 30 minutes
Face-to-Face is efficient and has a positive personalized aspect that many customers desire, be it for sales or customer service.
Telephony (or IVR) has been a mainstay of customer interaction for decades. While not fading, it must be used alongside newer channels.
Postal used to be employed extensively for all domains, but is now used predominantly for e-commerce order fulfillment.
Email is an asynchronous interaction channel still preferred by many customers. Email gives organizations flexibility with queuing.
Live Chat is a way for clients to avoid long call center wait times and receive a solution from a quick chat with a service rep.
Web Portals permit transactions for sales and customer service from a central interface. They are a must-have for any large company.
Social Media consists of many individual services (like Facebook or Twitter). Social channels are exploding in consumer popularity.
HTML5 Mobile Access allows customers to access resources from their personal device through its integrated web browser.
Dedicated Mobile Apps allow customers to access resources through a dedicated mobile application (e.g. iOS, Android).
Info-Tech Insight
Your channel selections should be driven by customer personas and scenarios. For example, social media may be extensively employed by some persona types (i.e. Millennials) but see limited adoption in other demographics or use cases (i.e. B2B).
2.3.7 30 minutes
Example: Business Unit Channel Use Survey
| Marketing | Sales | Customer Service | ||||
|---|---|---|---|---|---|---|
| Current Used? | Future Use? | Current Used? | Future Use? | Current Used? | Future Use? | |
| Yes | Yes | No | No | No | No | |
| Direct Mail | Yes | No | No | No | No | No |
| Phone | No | No | Yes | Yes | Yes | Yes |
| In-Person | No | No | Yes | Yes | Yes | No |
| Website | Yes | Yes | Yes | Yes | Yes | Yes |
| Social Channels | No | Yes | Yes | Yes | No | Yes |
Discovering your organizational requirements is vital for choosing the right business-enabling initiative, technology, and success metrics. Sorting the requirements by marketing, sales, and service is a prudent mechanism for clarification.
Definition: High-level requirements that will support marketing functions within CXM.
Examples
Definition: High-level requirements that will support sales functions within CXM.
Examples
Definition: High-level requirements that will support customer service functions within CXM.
Examples
2.3.8 30 minutes
Info-Tech Insight
Strategic CXM requirements will be used to prioritize specific initiatives for CXM technology enablement and application rollout. Ensure that IT, the business, and executive management are all aligned on a consistent and agreed upon set of initiatives.
Industry Consumer Goods, Clothing
Source Retail Congress, 2017
Burberry London
Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.
Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.
RFID tags were attached to products to trigger interactive videos on the store’s screens in the common areas or in a fitting room. Consumers are to have instant access to relevant product combinations, ranging from craftsmanship information to catwalk looks. This is equivalent to the rich, immediate information consumers have grown to expect from the online shopping experience.
Another layer of Burberry’s added capabilities includes in-memory-based analytics to gather and analyze data in real-time to better understand customers’ desires. Burberry builds customer profiles based on what items the shoppers try on from the RFID-tagged garments. Although this requires customer privacy consent, customers are willing to provide personal information to trusted brands.
This program, called “Customer 360,” assisted sales associates in providing data-driven shopping experiences that invite customers to digitally share their buying history and preferences via their tablet devices. As the data is stored in Burberry’s customer data warehouse and accessed through an application such as CRM, it is able to arm sales associates with personal fashion advice on the spot.
Lastly, the customer data warehouse/CRM application is linked to Burberry’s ERP system and other custom applications in a cloud environment to achieve real-time inventory visibility and fulfillment.
Industry Consumer Goods, Clothing
Source Retail Congress, 2017
Burberry London
Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.
Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.
Burberry achieved one of the most personalized retail shopping experiences. Immediate personal fashion advice using customer data is only one component of the experience. Not only are historic purchases and preference data analyzed, a customer’s social media posts and fashion industry trend data is proactively incorporated into the interactions between the sales associate and the customer.
Burberry achieved CEO Angela Ahrendts’ vision of “Burberry World,” in which the brand experience is seamlessly integrated across channels, devices, retail locations, products, and services.
The organizational alignment between Sales, Marketing, and IT empowered employees to bring the Burberry brand to life in unique ways that customers appreciated and were willing to advocate.
Burberry is now one of the most beloved and valuable luxury brands in the world. The brand tripled sales in five years, became one of the leading voices on trends, fashion, music, and beauty while redefining what top-tier customer experience should be both digitally and physically.
The debate between best-of-breed point solutions versus comprehensive CRM suites is ongoing. There is no single best answer. In most cases, an effective portfolio will include both types of solutions.
Customer Relationship Management (CRM)
Social Media Management Platform (SMMP)
Field Sales/Service Automation (FSA)
Marketing Management Suites
Sales Force Automation
Email Marketing Tools
Lead Management Automation (LMA)
Customer Service Management Suites
Customer Intelligence Systems
Some may find that the capabilities of a CRM suite are not enough to meet their specific requirements: supplementing a CRM suite with a targeted point solution can get the job done. A variety of CXM point solutions are designed to enhance your business processes and improve productivity.
Sales Force Automation: Automatically generates, qualifies, tracks, and contacts leads for sales representatives, minimizing time wasted on administrative duties.
Field Sales: Allows field reps to go through the entire sales cycle (from quote to invoice) while offsite.
Sales Compensation Management: Models, analyzes, and dispenses payouts to sales representatives.
Social Media Management Platforms (SMMP): Manage and track multiple social media services, with extensive social data analysis and insight capabilities.
Email Marketing Bureaus: Conduct email marketing campaigns and mine results to effectively target customers.
Marketing Intelligence Systems: Perform in-depth searches on various data sources to create predictive models.
Customer Service Management (CSM): Manages the customer support lifecycle with a comprehensive array of tools, usually above and beyond what’s in a CRM suite.
Customer Service Knowledge Management (CSKM): Advanced knowledgebase and resolution tools.
Field Service Automation (FSA): Manages customer support tickets, schedules work orders, tracks inventory and fleets, all on the go.
Info-Tech Insight
CRM and point solution integration is critical. A best-of-breed product that poorly integrates with your CRM suite compromises the value generated by the combined solution, such as a 360-degree customer view. Challenge point solution vendors to demonstrate integration capabilities with CRM packages.
Standalone CRM Suite
Sales Conditions: Need selling and lead management capabilities for agents to perform the sales process, along with sales dashboards and statistics.
Marketing or Communication Conditions: Need basic campaign management and ability to refresh contact records with information from social networks.
Member Service Conditions: Need to keep basic customer records with multiple fields per record and basic channels such as email and telephony.
Add a Best-of-Breed or Point Solution
Environmental Conditions: An extensive customer base with many different interactions per customer along with industry specific or “niche” needs. Point solutions will benefit firms with deep needs in specific feature areas (e.g. social media or field service).
Sales Conditions: Lengthy sales process and account management requirements for assessing and managing opportunities – in a technically complex sales process.
Marketing Conditions: Need social media functionality for monitoring and social property management.
Customer Service Conditions: Need complex multi-channel service processes and/or need for best-of-breed knowledgebase and service content management.
Info-Tech Insight
The volume and complexity of both customers and interactions have a direct effect on when to employ just a CRM suite and when to supplement with a point solution. Check to see if your CRM suite can perform a specific business requirement before deciding to evaluate potential point solutions.
2.3.9 CXM Portfolio Designer
The CXM Portfolio Designer features a set of questions geared toward understanding your needs for marketing, sales, and customer service enablement.
These results are scored and used to suggest a comprehensive solution-level set of enterprise applications for CXM that can drive your application portfolio and help you make investment decisions in different areas such as CRM, marketing management, and customer intelligence.
INFO-TECH DELIVERABLE

(Social Centered Learning, n.d.)

Use the two-by-two matrix below to structure your optimal CXM application portfolio. For more help, refer to Info-Tech’s blueprint, Use Agile Application Rationalization Instead of Going Big Bang.
0 Richness of Functionality |
INTEGRATE | RETAIN | |
| REPLACE | REPLACE OR ENHANCE | ||
0 Degree of Integration |
|||
Integrate: The application is functionally rich, so spend time and effort integrating it with other modules by building or enhancing interfaces.
Retain: The application satisfies both functionality and integration requirements, so it should be considered for retention.
Replace/Enhance: The module offers poor functionality but is well integrated with other modules. If enhancing for functionality is easy (e.g. through configuration or custom development), consider enhancement or replace it.
Replace: The application neither offers the functionality sought nor is it integrated with other modules, and thus should be considered for replacement.
2.3.10 1-2 hours
Example: Brainstorming the Art of the Possible
| Application | Gap Satisfied | Related Process | Number of Linked Requirements | Do we have the system? | Priority |
|---|---|---|---|---|---|
| LMA |
|
Sales | 8 | No | Business Critical |
| Customer Intelligence |
|
Customer Service | 6 | Yes | Business Enabling |
| ... | ... | ... | ... | ... | ... |
Now that you have developed the CXM application portfolio and identified areas of new investment, you’re well positioned to execute specific vendor selection projects. After you have built out your initiatives roadmap in phase 3, the following reports provide in-depth vendor reviews, feature guides, and tools and templates to assist with selection and implementation.
Info-Tech Insight
Not all applications are created equally well for each use case. The vendor reports help you make informed procurement decisions by segmenting vendor capabilities among major use cases. The strategic requirements identified as part of this project should be used to select the use case that best fits your needs.
2.3.2; 2.3.3 Shortlist and map the key top-level business processes
Based on experience working with organizations in similar verticals, the facilitator will help your team map out key sample workflows for marketing, sales, and customer service.
2.3.6 Create your strategic requirements for CXM
Drawing on the preceding exercises, the facilitator will work with the team to create a comprehensive list of strategic requirements that will be used to drive technology decisions and roadmap initiatives.
2.3.10 Create and finalize the CXM application portfolio
Using the strategic requirements gathered through internal, external, and technology analysis up to this point, a facilitator will assist you in assembling a categorical technology application portfolio to support CXM.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
Integration is paramount: your CXM application portfolio must work as a unified face to the customer. Create an integration map to reflect a system of record and the exchange of data.
The points of integration that you’ll need to establish must be based on the objectives and requirements that have informed the creation of the CXM application portfolio. For instance, achieving improved customer insights would necessitate a well-integrated portfolio with customer interaction point solutions, business intelligence tools, and customer data warehouses in order to draw the information necessary to build insight. To increase customer engagement, channel integration is a must (i.e. with robust links to unified communications solutions, email, and VoIP telephony systems).
Info-Tech Insight
If the CXM application portfolio is fragmented, it will be nearly impossible to build a cohesive view of the customer and deliver a consistent customer experience. Points of integration (POIs) are the junctions between the applications that make up the CXM portfolio. They are essential to creating value, particularly in customer insight-focused and omnichannel-focused deployments. Be sure to include enterprise applications that are not included in the CXM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

"Find the absolute minimum number of ‘quick wins’ – the POIs you need from day one that are necessary to keep end users happy and deliver value." – Maria Cindric, Australian Catholic University Source: Interview
2.4.1 1 hour
Example: Mapping the Integration of CXM Applications

Data quality is king: if your customer data is garbage in, it will be garbage out. Enable strategic CXM decision making with effective planning of data quality initiatives.
Identify and Eliminate Dead Weight
Poor data can originate in the firm’s system of record, which is typically the CRM system. Custom queries, stored procedures, or profiling tools can be used to assess the key problem areas.
Loose rules in the CRM system lead to records of no significant value in the database. Those rules need to be fixed, but if changes are made before the data is fixed, users could encounter database or application errors, which will reduce user confidence in the system.
Create and Enforce Standards & Policies
Now that the data has been cleaned, protect the system from relapsing.
Work with business users to find out what types of data require validation and which fields should have changes audited. Whenever possible, implement drop-down lists to standardize values and make programming changes to ensure that truncation ceases.
Applications are a critical component of how IT supports Sales, but IT also needs to help Sales keep its data current and accurate. Conducting a sales data audit is critical to ensure Sales has the right information at the right time.
Info-Tech Insight
Data is king. More than ever, having accurate data is essential for your organization to win in hyper-competitive marketplaces. Prudent current state analysis looks at both the overall data model and data architecture, as well as assessing data quality within critical sales-related repositories. As the amount of customer data grows exponentially due to the rise of mobility and the Internet of Things, you must have a forward-looking data model and data marts/customer data warehouse to support sales-relevant decisions.
Refer to Info-Tech’s Develop a Master Data Management Strategy and Roadmap blueprint for further reference and assistance in data management for your sales-IT alignment.
2.4.2 30 minutes
Example: Data Steward Structure
Department A
Department B
Department C
A customer data warehouse (CDW) “is a subject-oriented, integrated, time-variant, non-volatile collection of data used to support the strategic decision-making process across marketing, sales, and service. It is the central point of data integration for customer intelligence and is the source of data for the data marts, delivering a common view of customer data” (Corporate Information Factory, n.d.).
Analogy
CDWs are like a buffet. All the food items are in the buffet. Likewise, your corporate data sources are centralized into one repository. There are so many food items in a buffet that you may need to organize them into separate food stations (data marts) for easier access.
Examples/Use Cases
Pros
Cons
2.4.3. 30 minutes
INFO-TECH OPPORTUNITY
Refer to Info-Tech’s Build an Agile Data Warehouse blueprint for more information on building a centralized and integrated data warehouse.
All training modules will be different, but some will have overlapping areas of interest.
– Assign Project Evangelists – Analytics Training – Mobile Training
Application Training
Info-Tech Insight
Train customers too. Keep the customer-facing sales portals simple and intuitive, have clear explanations/instructions under important functions (e.g. brief directions on how to initiate service inquiries), and provide examples of proper uses (e.g. effective searches). Make sure customers are aware of escalation options available to them if self-service falls short.
The team leading the rollout of new initiatives (be they applications, new governance structures, or data quality procedures) should establish a communication process to ensure management and users are well informed.
CXM-related department groups or designated trainers should take the lead and implement a process for:
The overall objective for inter-departmental kick-off meetings is to confirm that all parties agree on certain key points and understand alignment rationale and new sales app or process functionality.
The kick-off process will significantly improve internal communications by inviting all affected internal IT groups, including business units, to work together to address significant issues before the application process is formally activated.
The kick-off meeting(s) should encompass:
Info-Tech Insight
Determine who in each department will send out a message about initiative implementation, the tone of the message, the medium, and the delivery date.
Info-Tech Insight
Every piece of information that you give to a stakeholder that is not directly relevant to their interests is a distraction from your core message. Always remember to tailor the message, medium, and timing accordingly.
Once the sales-IT alignment committees have been formed, create organizational cadence through a variety of formal and informal gatherings between the two business functions.
Isolation

Collaboration

Synergy

2.4.1 Develop a CXM application integration map
Using the inventory of existing CXM-supporting applications and the newly formed CXM application portfolio as inputs, your facilitator will assist you in creating an integration map of applications to establish a system of record and flow of data.
2.4.2 Develop a mitigation plan for poor quality customer data
Our facilitator will educate your stakeholders on the importance of quality data and guide you through the creation of a mitigation plan for data preservation.
2.4.3 Assess the need for a customer data warehouse
Addressing important factors such as data volume, complexity, and flow, a facilitator will help you assess whether or not a customer data warehouse for CXM is the right fit for your organization.
Build a Strong Technology Foundation for Customer Experience Management
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion: 1 week
Step 3.1: Create an Initiative Rollout Plan
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
Step 3.2: Confirm and Finalize the CXM Blueprint
Review findings with analyst:
Then complete these activities…
With these tools & templates:
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
Creating a comprehensive CXM strategy roadmap reduces the risk of rework, misallocation of resources, and project delays or abandonment.
Optimize the Change Management Process
You need to design a process that is flexible enough to meet demand for change and strict enough to protect the live environment from change-related incidents.
Create Project Management Success
Investing time up front to plan the project and implementing best practices during project execution to ensure the project is delivered with the planned outcome and quality is critical to project success.
3.1.1 45 minutes
Example: Constructing a Risk Management Plan
| Risk | Impact | Likelihood | Mitigation Effort | |
|---|---|---|---|---|
| Strategy Risks | Project over budget |
|
||
| Inadequate content governance | ||||
| System Risks | Integration with additional systems |
|
||
| .... | ... | ... | ... |
Likelihood
1 – High/ Needs Focus
2 – Can Be Mitigated
3 - Unlikely
Impact
1 - High Risk
2 - Moderate Risk
3 - Minimal Risk
Understanding technical and strategic risks can help you establish contingency measures to reduce the likelihood that risks will occur. Devise mitigation strategies to help offset the impact of risks if contingency measures are not enough.
Remember
The biggest sources of risk in a CXM strategy are lack of planning, poorly defined requirements, and lack of governance.
Apply the following mitigation tips to avoid pitfalls and delays.
Risk Mitigation Tips
Completion of initiatives for your CXM project will be contingent upon multiple variables.
Initiative complexity will define the need for enabling projects. Create a process to define dependencies:
Complex....Initiative
Simple....Initiative
3.1.2 45 minutes
Example: Importance-Capability Matrix

Pinpoint quick wins: high importance, low effort initiatives.
| The size of each plotted initiative must indicate the effort or the complexity and time required to complete. | |
|---|---|
| Top Right Quadrant | Strategic Projects |
| Top Left Quadrant | Quick Wins |
| Bottom Right Quadrant | Risky Bets |
| Bottom Left Quadrant | Discretionary Projects |
3.1.3 1 hour
Example: Project Dependencies
Initiative: Omnichannel E-Commerce
Dependency: WEM Suite Deployment; CRM Suite Deployment; Order Fulfillment Capabilities
3.1.4 30 minutes
Example: Importance-Capability Matrix
| Importance | Initiative | Owner | Completion Date | |
|---|---|---|---|---|
| Example Projects | High | Gather business requirements. | Project Manager | MM/DD/YYYY |
| Quick Wins | ||||
| Long Term | Medium | Implement e-commerce across all sites. | CFO & Web Manager | MM/DD/YYYY |
Importance
3.1.1 Create a risk management plan
Based on the workshop exercises, the facilitator will work with the core team to design a priority-based risk mitigation plan that enumerates the most salient risks to the CXM project and addresses them.
3.1.2; 3.1.3; 3.1.4 Identify initiative dependencies and create the CXM roadmap
After identifying dependencies, our facilitators will work with your IT SMEs and business stakeholders to create a comprehensive roadmap, outlining the initiatives needed to carry out your CXM strategy roadmap.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
Key performance indicators (KPIs) are quantifiable measures that demonstrate the effectiveness of a process and its ability to meet business objectives.
Specific
Measurable
Achievable
Realistic
Time-bound
Follow the SMART methodology when developing KPIs for each process.
Adhering to this methodology is a key component of the Lean management methodology. This framework will help you avoid establishing general metrics that aren’t relevant.
Info-Tech Insight
Metrics are essential to your ability to measure and communicate the success of the CXM strategy to the business. Speak the same language as the business and choose metrics that relate to marketing, sales, and customer service objectives.
3.2.1 1 hour
Example: Metrics for Marketing, Sales, and Customer Service Functions
| Metric | Example | |
|---|---|---|
| Marketing | Customer acquisition cost | X% decrease in costs relating to advertising spend |
| Ratio of lifetime customer value | X% decrease in customer churn | |
| Marketing originated customer % | X% increase in % of customer acquisition driven by marketing | |
| Sales | Conversion rate | X% increase conversion of lead to sale |
| Lead response time | X% decrease in response time per lead | |
| Opportunity-to-win ratio | X% increase in monthly/annual opportunity-to-win ratio | |
| Customer Service | First response time | X% decreased time it takes for customer to receive first response |
| Time-to-resolution | X% decrease of average time-to-resolution | |
| Customer satisfaction | X% improvement of customer satisfaction ratings on immediate feedback survey |
3.2.2 Stakeholder Power Map Template
Use this template and its power map to help visualize the importance of various stakeholders and their concerns. Prioritize your time according to the most powerful and most impacted stakeholders.
Answer questions about each stakeholder:
Focus on key players: relevant stakeholders who have high power, should have high involvement, and are highly impacted.
INFO-TECH DELIVERABLE
3.2.3 Stakeholder Communication Planning Template
Use the Stakeholder Communication Planning Template to document your list of initiative stakeholders so you can track them and plan communication throughout the initiative.
Track the communication methods needed to convey information regarding CXM initiatives. Communicate how a specific initiative will impact the way employees work and the work they do.
INFO-TECH DELIVERABLE
3.2.4 1 hour
3.2.5 CXM Strategy Stakeholder Presentation Template
Complete the presentation template as indicated when you see the green icon throughout this deck. Include the outputs of all activities that are marked with this icon.
Info-Tech has designed the CXM Strategy Stakeholder Presentation Template to capture the most critical aspects of the CXM strategy. Customize it to best convey your message to project stakeholders and to suit your organization.
The presentation should be no longer than one hour. However, additional slides can be added at the discretion of the presenter. Make sure there is adequate time for a question and answer period.
INFO-TECH DELIVERABLE
After the presentation, email the deck to stakeholders to ensure they have it available for their own reference.
3.2.6 30 minutes
3.2.4 Create a stakeholder power map and communication plan
An analyst will walk the project team through the creation of a communication plan, inclusive of project metrics and their respective goals. If you are planning a variety of CXM initiatives, track how the change will be communicated and to whom. Determine the employees who will be impacted by the change.
Accenture Digital. “Growing the Digital Business: Accenture Mobility Research 2015.” Accenture. 2015. Web.
Afshar, Vala. “50 Important Customer Experience Stats for Business Leaders.” Huffington Post. 15 Oct. 2015. Web.
APQC. “Marketing and Sales Definitions and Key Measures.” APQC’s Process Classification Framework, Version 1.0.0. APQC. Mar. 2011. Web.
CX Network. “The Evolution of Customer Experience in 2015.” Customer Experience Network. 2015. Web.
Genesys. “State of Customer Experience Research”. Genesys. 2018. Web.
Harvard Business Review and SAS. “Lessons From the Leading Edge of Customer Experience Management.” Harvard Business School Publishing. 2014. Web.
Help Scout. “75 Customer Service Facts, Quotes & Statistics.” Help Scout. n.d. Web.
Inmon Consulting Services. “Corporate Information Factory (CIF) Overview.” Corporate Information Factory. n.d. Web
Jurevicius, Ovidijus. “VRIO Framework.” Strategic Management Insight. 21 Oct. 2013. Web.
Keenan, Jim, and Barbara Giamanco. “Social Media and Sales Quota.” A Sales Guy Consulting and Social Centered Selling. n.d. Web.
Malik, Om. “Internet of Things Will Have 24 Billion Devices by 2020.” Gigaom. 13 Oct. 2011. Web.
McGovern, Michele. “Customers Want More: 5 New Expectations You Must Meet Now.” Customer Experience Insight. 30 July 2015. Web.
McGinnis, Devon. “40 Customer Service Statistics to Move Your Business Forward.” Salesforce Blog. 1 May 2019. Web.
Reichheld, Fred. “Prescription for Cutting Costs”. Bain & Company. n.d. Web.
Retail Congress Asia Pacific. “SAP – Burberry Makes Shopping Personal.” Retail Congress Asia Pacific. 2017. Web.
Rouse, Margaret. “Omnichannel Definition.” TechTarget. Feb. 2014. Web.
Salesforce Research. “Customer Expectations Hit All-Time High.” Salesforce Research. 2018. Web.
Satell, Greg. “A Look Back at Why Blockbuster Really Failed and Why It Didn’t Have To.” Forbes. 5 Sept. 2014. Web.
Social Centered Learning. “Social Media and Sales Quota: The Impact of Social Media on Sales Quota and Corporate Review.” Social Centered Learning. n.d. Web.
Varner, Scott. “Economic Impact of Experience Management”. Qualtrics/Forrester. 16 Aug. 2017. Web.
Wesson, Matt. “How to Use Your Customer Data Like Amazon.” Salesforce Pardot Blog. 27 Aug. 2012. Web.
Winterberry Group. “Taking Cues From the Customer: ‘Omnichannel’ and the Drive For Audience Engagement.” Winterberry Group LLC. June 2013. Web.
Wollan, Robert, and Saideep Raj. “How CIOs Can Support a More Agile Sales Organization.” The Wall Street Journal: The CIO Report. 25 July 2013. Web.
Zendesk. “The Impact of Customer Service on Customer Lifetime Value 2013.” Z Library. n.d. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
From choosing the right data for the right problem to evaluating your progress toward data-driven people decisions, follow these steps to build your foundation to people analytics.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate the business, user, and infrastructure requirements to ensure that all needs are clearly defined and the best fit-for-purpose migration plan can be decided on.
Expose key cloud risks across five major areas and build mitigation strategies to counter risk and gain foresight for migration.
Outline major milestones of migration and build the communication plan to transition users smoothly. Complete the Office 365 migration plan report to present to business stakeholders.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Review corporate and project goals.
Review and prioritize relevant services and applications to shape the migration path.
Review Office 365 license models.
Profile end users to rightsize licensing.
Estimate dollar impact of new licensing model.
Corporate goals for Office 365.
Prioritized migration path of applications.
Decision on user licensing structure.
Projected cost of licensing.
1.1 Outline corporate and project goals to paint the starting line.
1.2 Review and prioritize services.
1.3 Rightsize licensing.
Clear goals and metrics for migration
Prioritized list of applications
Effective licensing structure
Conduct value and readiness assessment of current on-premises services.
Identify and evaluate risks and challenges.
Assess IT’s readiness to own and manage Office 365.
Completed value and readiness assessment.
Current targets for service and deployment models.
List of perceived risks according to five major risk areas.
Assessed IT’s readiness to own and manage Office 365.
Established go/caution/stop for elected Office 365 services.
2.1 Assess value and readiness.
2.2 Identify key risks.
2.3 Identify changes in IT skills and roles.
Cloud service appropriateness assessment
Completed risk register
Reorganization of IT roles
Review Office 365 risks and discuss mitigation strategies.
Completed risks and mitigation strategies report.
3.1 Build mitigation strategies.
3.2 Identify key service requests.
3.3 Build workflows.
Defined roles and responsibilities
Assigned decision rights
List of staffing gaps
Build a timeline of major milestones.
Plan and prioritize projects to bridge gaps.
Build a communication plan.
Review Office 365 strategy and roadmap.
Milestone roadmap.
Critical path of milestone actions.
Communication plan.
Executive report.
4.1 Outline major milestones.
4.2 Finalize roadmap.
4.3 Build and refine the communication plan.
Roadmap plotted projects, decisions, mitigations, and user engagements
Finalized roadmap across timeline
Communication and training plan
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Analyze strategic CIO competencies and assess business stakeholder satisfaction with IT using Info-Tech's CIO Business Vision Diagnostic and CXO-CIO Alignment Program.
Evaluate strategic CIO competencies and business stakeholder relationships.
Create a personal development plan and stakeholder management strategy.
Develop a scorecard to track personal development initiatives.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Gather and review information from business stakeholders.
Assess strategic CIO competencies and business stakeholder relationships.
Gathered information to create a personal development plan and stakeholder management strategy.
Analyzed the information from diagnostics and determined the appropriate next steps.
Identified and prioritized strategic CIO competency gaps.
Evaluated the power, impact, and support of key business stakeholders.
1.1 Conduct CIO Business Vision diagnostic
1.2 Conduct CXO-CIO Alignment program
1.3 Assess CIO competencies
1.4 Assess business stakeholder relationships
CIO Business Vision results
CXO-CIO Alignment Program results
CIO competency gaps
Executive Stakeholder Power Map
Create a personal development plan and stakeholder management strategy.
Track your personal development and establish checkpoints to revise initiatives.
Identified personal development and stakeholder engagement initiatives to bridge high priority competency gaps.
Identified key performance indicators and benchmarks/targets to track competency development.
2.1 Create a personal development plan
2.2 Create a stakeholder management strategy
2.3 Establish key performance indicators and benchmarks/targets
Personal Development Plan
Stakeholder Management Strategy
Strategic CIO Competency Scorecard
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Confirm the list of Agile skills that you wish to measure.
Define what it means to attain specific agile skills through a defined ascension path of proficiency levels, and standardized skill expectations.
Determine the roll-out and communication plan that suits your organization.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Learn about and define the Agile skills that are important to your organization.
Define the different levels of attainment when it comes to your Agile skills.
Define the standards on a per-role basis.
Get a clear view of the Agile skills important into meet your Agile transformation goals in alignment with organizational objectives.
Set a clear standard for what it means to meet your organizational standards for Agile skills.
1.1 Review and update the Agile skills relevant to your organization.
1.2 Define your Agile proficiency levels to evaluate attainment of each skill.
1.3 Define your Agile team roles.
1.4 Define common experience levels for your Agile roles.
1.5 Define the skill expectations for each Agile role.
A list of Agile skills that are consistent with your Agile transformation
A list of proficiency levels to be used during your Agile skills assessment
A confirmed list of roles that you wish to measure on your Agile teams
A list of experience levels common to Agile team roles (example: Junior, Intermediate, Senior)
Define the skill expectations for each Agile role
Windows 11 is a step forward in security, which is one of the primary reasons for the release of the new operating system. Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.
Windows 11 hardware requirements will result in devices that are not eligible for the upgrade. Companies will be left to spend money on replacement devices. Following the Info-Tech guidance will help clients properly budget for hardware replacements before Windows 10 is no longer supported by Microsoft. Eligible devices can be upgraded, but Info-Tech guidance can help clients properly plan the upgrade using the upgrade ring approach.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Discover the reason for the release of Windows 11, what you require to be eligible for the upgrade, what features were added or updated, and what features were removed. Our guidance will assist you with a planned and controlled rollout of the Windows 11 upgrade. We also provide guidance on how to approach a device refresh plan if some devices are not eligible for Windows 11. The upgrade is inevitable, but you have time, and you have options.
This tool will help you budget for a hardware asset refresh and to adjust the budget as necessary to accommodate any unexpected changes. The tool can easily be modified to assist in developing and justifying the budget for hardware assets for a Windows 11 project. Follow the instructions on each tab and feel free to play with the HAM budgeting tool to fit your needs.
“You hear that Mr. Anderson? That is the sound of inevitability.” ("The Matrix Quotes" )
The fictitious Agent Smith uttered those words to Keanu Reeves’ character, Neo, in The Matrix in 1999, and while Agent Smith was using them in a very sinister and figurative context, the words could just as easily be applied to the concept of upgrading to the Windows 11 operating system from Microsoft in 2022.
There have been two common, recurring themes in the media since late 2019. One is the global pandemic and the other is cyber-related crime. Microsoft is not in a position to make an impact on a novel coronavirus, but it does have the global market reach to influence end-user technology and it appears that it has done just that. Windows 11 is a step forward in endpoint security and functionality. It also solidifies the foundation for future innovations in end-user operating systems and how they are delivered. Windows-as-a-Service (WAAS) is the way forward for Microsoft. Windows 10 is living on borrowed time, with a defined end of support date of October 14, 2025. Upgrading to Windows 11 is easy, and while it should be properly investigated and planned, it should absolutely be an activity you undertake.
It is inevitable!
P.J. Ryan
Research Director, Infrastructure & Operations
Info-Tech Research Group
Info-Tech Insight
There is a lot of talk about Windows 11, but this is only an operating system upgrade, and it is not a major one. Understand what is new, what is added, and what is missing. Check your devices to determine how many are eligible and ineligible. Many organizations will have to spend capital on endpoint upgrades. Solid asset management practices will help.
Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.
The hardware requirements for Windows 11 enable security features such as password-less logon, disk encryption, increased startup protection with secure boot, and virtualization-based security.
Microsoft now insists that modern hardware is required for Windows 11 for not only security but also for improved stability. That same hardware requirement will mean that many devices that are only three or four years old (as well as older ones) may not be eligible for Windows 11.
The hardware requirements for physical devices are also required for virtual devices. The TPM module appears to be the biggest challenge. Oracle VirtualBox and Citrix Hypervisor as well as AWS and Google are unable to support Windows 11 virtual devices as of the time of writing.
That will remove some of the pressure felt due to the ineligibility of many devices and the need to refresh them. Take your time and plan it out, keeping within budget constraints. Use the upgrade ring approach for systems that are eligible for the Windows 11 upgrade.
Corners are rounded, some controls look a little different, but overall Windows 11 is not a dramatic shift from Windows 10. It is easier to navigate and find features. Oh, and yes, the taskbar (and start button) is shifted to the center of the screen, but you can move them back to the left if desired.
Windows 11 comes with multiple subscription-based education offerings, but it also now includes a new lightweight SE edition that is intended for the K-8 age group. Microsoft also released a Windows 11 Education SE specific laptop, at a very attractive price point. Other manufacturers also offer Windows 11 SE focused devices.
Jerry Nixon, a Microsoft developer evangelist, gained notoriety when he uttered these words while at a Microsoft presentation as part of Microsoft Ignite in 2015: “Right now we’re releasing Windows 10, and because Windows 10 is the last version of Windows, we’re all still working on Windows 10,” (Hachman). Microsoft never officially made that statement. Interestingly enough, it never denied the comments made by Jerry Nixon either.
Windows 11 is a free upgrade or is included with any new computer purchase.
It’s true that Microsoft's market share of desktop operating systems is dropping while Apple OS X and Google Chrome OS are rising.
In fact, Microsoft has relinquished over 13% of the market share since 2012 and Apple has almost doubled its market share. BUT:
Microsoft is still holding 75.12% of the market while Apple is in the number 2 spot with 14.93% (gs.statcounter.com).
The market share is worth noting for Microsoft but it hardly warrants a new operating system.
New start button and taskbar orientation, new search window, rounded corners, new visual look on some controls like the volume bar, new startup sound, new Windows logo, – all minor changes. Updates could achieve the same result.
Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.
The hardware requirements for Windows 11 enable security features such as password-less logon, disk encryption, increased startup protection with secure boot, and virtualization-based security.
The features are available on all Windows 11 physical devices, due to the common hardware requirements.
| Feature | What it is | How it works |
|---|---|---|
| TPM 2.0 (Trusted Platform Module) Chip | TPM is a chip on the motherboard of the computer. It is used to store encryption keys, certificates, and passwords. TPM does this securely with tamper-proof prevention. It can also generate encryption keys and it includes its own unique encryption key that cannot be altered (helpdeskgeek.com). | You do not need to enter your password once you setup Windows Hello, so the password is no longer easy to capture and steal. It is set up on a device per device basis, meaning if you go to a different device to sign in, your Windows Hello authentication will not follow you and you must set up your Hello pin or facial recognition again on that particular device. TPM (Trusted Platform Module) can store the credentials used by Windows Hello and encrypt them on the module. |
| Windows Hello | Windows Hello is an alternative to using a password for authentication. Users can use a pin, a fingerprint, or facial recognition to authenticate. | |
| Device Encryption | Device encryption is only on when your device is off. It scrambles the data on your disk to make it unreadable unless you have the key to unscramble it. | If your endpoint is stolen, the contents of the hard drive will remain encrypted and cannot be accessed by anyone unless they can properly authenticate on the device and allow the system to unscramble the encrypted data. |
| UEFI Secure Boot Capable | UEFI is an acronym for Unified Extensible Firmware Interface. It is an interface between the operating system and the computer firmware. Secure Boot, as part of the firmware interface, ensures that only unchangeable and approved software and drivers are loaded at startup and not any malware that may have infiltrated the system (Lumunge). | UEFI, with Secure Boot, references a database containing keys and signatures of drivers and runtime code that is approved as well as forbidden. It will not let the system boot up unless the signature of the driver or run-time code that is trying to execute is approved. This UEFI Secure boot recognition process continues until control is handed over to the operating system. |
| Virtualization Based Security (VBS) and Hypervisor-Protected Code Integrity (HVCI) | VBS is security based on virtualization capabilities. It uses the virtualization features of the Windows operating system, specifically the Hyper-V hypervisor, to create and isolate a small chunk of memory that is isolated from the operating system. HVCI checks the integrity of code for violations. The Code Integrity check happens in the isolated virtual area of memory protected by the hypervisor, hence the acronym HVCI (Hypervisor Protected Code Integrity) (Murtaza). | In the secure, isolated region of memory created by VBS with the hypervisor, Windows will run checks on the integrity of the code that runs various processes. The isolation protects the stored item from tampering by malware and similar threats. If they run incident free, they are released to the operating system and can run in the standard memory space. If issues are detected, the code will not be released, nor will it run in the standard memory space of the operating system, and damage or compromise will be prevented. |
You turn on your computer. Secure Boot authorizes the processes and UEFI hands over control to the operating system. Windows Hello works with TPM and uses a pin to authenticate the user and the operating systems gives you access to the Windows environment.
You turn on your computer. Secure Boot does not recognize the signature presented to it by the second process in the boot sequence. You will be presented with a “Secure Boot Violation” message and an option to reboot. Your computer remains protected.
You boot up and get past the secure boot process and UEFI passes control over to the Windows 11 operating system. Windows Hello asks for your pin, but you cannot remember the pin and incorrectly enter it three times before admitting temporary defeat. Windows Hello did not find a matching pin on the TPM and will not let you proceed. You cannot log in but in the eyes of the operating system, it has prevented an unauthorized login attempt.
You power up your computer, log in without issue, and go about your morning routine of checking email, etc. You are not aware that malware has infiltrated your system and modified a page in system memory to run code and access the operating system kernel. VBS and HVCI check the integrity of that code and detect that it is malicious. The code remains isolated and prevented from running, protecting your system.
TPM, Hello, UEFI with Secure Boot, VBS and HVCI all work together like a well-oiled machine.
“Microsoft's rationale for Windows 11's strict official support requirements – including Secure Boot, a TPM 2.0 module, and virtualization support – has always been centered on security rather than raw performance.” – Andrew Cunningham, arstechnica.com
“Windows 11 raises the bar for security by requiring hardware that can enable protections like Windows Hello, Device Encryption, virtualization-based security (VBS), hypervisor-protected code integrity (HVCI), and Secure Boot. These features in combination have been shown to reduce malware by 60% on tested devices.” – Steven J. Vaughan-Nichols, Computerworld
Windows 7 and Windows 10 were publicized as being backward compatible and almost any hardware would be able to run those operating systems. That changed with Windows 11. Microsoft now insists that modern hardware is required for Windows 11 for not only security but also improved stability.
You must be running Windows 10 version 2004 or greater to be eligible for a Windows 11 upgrade (“Windows 11 Requirements”).
(“Windows 11 Requirements”)
The issues appeared to be centered around the Windows 11 hardware requirements, which must be detected by the Windows 11 pre-install check before the operating system will install.
The TPM 2.0 chip requirement was indeed a challenge and not offered as a configuration option with Citrix Hypervisor, the free VMware Workstation Player or Oracle VM VirtualBox when Windows 11 was released in October 2021, although it is on the roadmap for Oracle and Citrix Hypervisor. VMware provides alternative products to the free Workstation Player that do support a virtual TPM. Oracle and Citrix reported that the feature would be available in the future and Windows 11 would work on their platforms.
VMware and Microsoft users can add a vTPM hardware type when configuring a virtual Windows 11 machine. Microsoft Azure does offer Windows 11 as an option as a virtual desktop. Citrix Desktop-As-A-Service (DAAS) will connect to Azure, AWS, or Google Cloud and is only limited by the features of the hosting cloud service provider.
According to Microsoft, any VM running Windows 11 must meet the following requirements (“Virtual Machine Support”):
The most important change with Windows 11 is what you cannot see – the security. Windows 11 adds requirements and controls to make the user and device more secure, as described in previous slides.
The most prominent change in relation to the look and feel of Windows 11 is the shifting of the taskbar (and Start button) to the center of the screen. Some users may find this more convenient but if you do not and prefer the taskbar and start button back on the left of your screen, you can change it in taskbar settings.
Paint, Photos, Notepad, Media Player, Mail, and other standard Windows apps have been updated with a new look and in some cases minor enhancements.
The first change users will notice after logging in to Windows 11 is the new user interface – the look and feel. You may not notice the additional colors added to the Windows palette, but you may have thought that the startup sound was different, and the logo also looks different. You would be correct. Other look-and-feel items that changed include the rounded corners on windows, slightly different icons, new wallpapers, and controls for volume and brightness are now a slide bar. File explorer and the settings app also have a new look.
Microsoft Teams is now installed on the taskbar by default. Note that this is for a personal Microsoft account only. Teams for Work or School will have to be installed separately if you are using a work or school account.
Snap layouts have been enhanced and snap group functionality has been added. This will allow you to quickly snap one window to the side of the screen and open other Windows in the other side. This feature can be accessed by dragging the window you wish to snap to the left or right edge of the screen. The window should then automatically resize to occupy that half of the screen and allow you to select other Windows that are already open to occupy the remaining space on the screen. You can also hover your mouse over the maximize button in the upper right-hand corner of the window. A small screen with multiple snap layouts will appear for your selection. Multiple snapped Windows can be saved as a “Snap Group” that will open together if one of the group windows are snapped in the future.
Widgets are expanding. Microsoft started the re-introduction of widgets in Windows 10, specifically focusing on the weather. Widgets now include other services such as news, sports, stock prices, and others.
Android apps can now run in Windows 11. You will have to use the Amazon store to access and install Android apps, but if it is available in the Amazon store, you can install it on Windows 11.
Docking has improved with Windows 11. Windows knows when you are docked and will minimize apps when you undock so they are not lost. They will appear automatically when you dock again.
Microsoft included a complete list of features that have been removed or deprecated with Windows 11, which can be found here Windows 11 Specs and System Requirements.
Below you can find some actual initial reactions to Windows 11.
Initial reactions are mixed, as is to be expected with any new release of an operating system. The look and feel is new, but it is not a huge departure from the Windows 10 look and feel. Some new features are well received such as the snap feature.
The shift of the taskbar (and start button) is the most popular topic of discussion online when it comes to Windows 11 reactions. Some love it and some do not. The best part about the shift of the taskbar is that you can adjust it in settings and move it back to its original location.
The best thing about reactions is that they garner attention, and thanks in part to all the online reactions and comments, Microsoft is continually improving Windows 11 through quality updates and annual feature releases.
“My 91-year-old Mum has found it easy!” Binns, Paul ITRG
“It mostly looks quite nice and runs well.” Jmbpiano, Reddit user
“It makes me feel more like a Mac user.” Chang, Ben Info-Tech
“At its core, Windows 11 appears to be just Windows 10 with a fresh coat of paint splashed all over it.” Rouse, Rick RicksDailyTips.com
“Love that I can snap between different page orientations.” Roberts, Jeremy Info-Tech
“I finally feel like Microsoft is back on track again.” Jawed, Usama Neowin
“A few of the things that seemed like issues at first have either turned out not to be or have been fixed with patches.” Jmbpiano, Reddit user
“The new interface is genuinely intuitive, well-designed, and colorful.” House, Brett AnandTech
“No issues. Have it out on about 50 stations.” Sandrews1313, Reddit User
“The most striking change is to the Start menu.” Grabham, Dan pocket-lint.com
Info-Tech Insight
The upgrade itself may be a simple process but be prepared for the end-user reactions that will follow. Some will love it but others will despise it. It is not an optional upgrade in the long run, so everyone will have to learn to accept it.
Deployment Ring Example
Pilot Ring - Individuals from all departments - 10 users
Ring #1 - Dev, Finance - 20 Users
Ring #2 - Research - 100 Users
Ring #3 - Sales, IT, Marketing - 500 Users
Instructions:
| Ring | Department or Group | Total Users | Delay Time Before Next Group |
|---|---|---|---|
| Pilot Ring | Individuals from all departments | 10 | Three weeks |
| Ring 1 | Dev Finance | 20 | Two weeks |
| Ring 2 | Research | 100 | One week |
| Ring 3 | Sales, IT Marketing | 500 | N/A |
Use asset management strategies and budget techniques in your Windows 11 upgrade approach:
Leverage Info-Tech research to improve your end-user computing strategy and hardware asset management processes:
New to End User Computing Strategies? Start with Modernize and Transform Your End-User Computing Strategy.
New to IT asset management? Use Info-Tech’s Implement Hardware Asset Management blueprint.
Build a Windows 11 Device Replacement Budget
The link below will open up a hardware asset management (HAM) budgeting tool. This tool can easily be modified to assist in developing and justifying the budget for hardware assets for the Windows 11 project. The tool will allow you to budget for hardware asset refresh and to adjust the budget as needed to accommodate any changes. Follow the instructions on each tab to complete the tool.
A sample of a possible Windows 11 budgeting spreadsheet is shown on the right, but feel free to play with the HAM budgeting tool to fit your needs.
| Windows 11 Replacement Schedule | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2022 | 2023 | 2024 | 2025 | ||||||||||||
| Department | Total to replace | Q3 | Q4 | Q1 | Q2 | Q3 | Q4 | Q1 | Q2 | Q3 | Q4 | Q1 | Q2 | Q3 | Left to allocate |
| Finance | 120 | 20 | 20 | 20 | 10 | 10 | 20 | 20 | 0 | ||||||
| HR | 28 | 15 | 13 | 0 | |||||||||||
| IT | 30 | 15 | 15 | 0 | |||||||||||
| Research | 58 | 8 | 15 | 5 | 20 | 5 | 5 | 0 | |||||||
| Planning | 80 | 10 | 15 | 15 | 10 | 15 | 15 | 0 | |||||||
| Other | 160 | 5 | 30 | 5 | 15 | 15 | 30 | 30 | 30 | 0 | |||||
| Totals | 476 | 35 | 38 | 35 | 35 | 35 | 35 | 38 | 35 | 50 | 35 | 35 | 35 | 35 | 0 |
Modernize and Transform Your End-User Computing Strategy
This project helps support the workforce of the future by answering the following questions: What types of computing devices, provisioning models, and operating systems should be offered to end users? How will IT support devices? What are the policies and governance surrounding how devices are used? What actions are we taking and when? How do end-user devices support larger corporate priorities and strategies?
Implement Hardware Asset Management
This project will help you analyze the current state of your HAM program, define assets that will need to be managed, and build and involve the ITAM team from the beginning to help embed the change. It will also help you define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.
aczechowski, et al. “Windows 11 Requirements.” Microsoft, 3 June 2022. Accessed 13 June 2022.
Binns, Paul. Personal interview. 07 June 2022.
Butler, Sydney. “What Is Trusted Platform Module (TPM) and How Does It Work?” Help Desk Geek, 5 August 2021. Accessed 18 May 2022.
Carklin, Nicolette. “The Unprecedented Growth of the Chromebook Education Market Share.” Parallels International GmbH, 26 October 2021. Accessed 19 May 2022.
Chang, Ben. Personal interview. 26 May 2022.
Cunningham, Andrew. “Why Windows 11 has such strict hardware requirements, according to Microsoft.” Ars Technica, 27 August 2021. Accessed 19 May 2022.
Dealnd-Han, et al. “Windows Processor Requirements.” Microsoft, 9 May 2022. Accessed 18 May 2022.
“Desktop Operating Systems Market Share Worldwide.” Statcounter Globalstats, June 2021–June 2022. Accessed 17 May 2022.
“Devices for education.” Microsoft, 2022. Accessed 13 June 2022.
Duke, Kent. “Chromebook sales skyrocketed in Q3 2020 with online education fueling demand.” Android Police, 16 November 2020. Accessed 18 May 2022.
Grabham, Dan. “Windows 11 first impressions: Our initial thoughts on using Microsoft's new OS.” Pocket-Lint, 24 June 2021. Accessed 3 June 2022.
Hachman, Mark. “Why is there a Windows 11 if Windows 10 is the last Windows?” PCWorld, 18 June 2021. Accessed 17 May 2022.
Howse, Brett. “What to Expect with Windows 11: A Day One Hands-On.” Anandtech, 16 November 2020. Accessed 3 June 2022.
Hruska, Joel. “Chromebooks Gain Market Share as Education Goes Online.” Extremetech, 26 October 2020. Accessed 19 May 2022.
Jawed, Usama. “I am finally excited about Windows 11 again.” Neowin, 26 February 2022. Accessed 3 June 2022.
Jmbpiano. “Windows 11 - What are our initial thoughts and feelings?” Reddit, 22 November 2021. Accessed 3 June 2022.
Lumunge, Erick. “UEFI and Legacy boot.” OpenGenus, n.d. Accessed 18 May 2022.
Mandaro, Laura. “Chromebooks Gain Share of Education Market Despite Shortages.” The Information, 9 September 2020. Accessed 19 May 2022.
Murtaza, Fawad. “What Is Virtualization Based Security in Windows?” Valnet Inc, 24 October 2021. Accessed 17 May 2022.
Roberts, Jeremy. Personal interview. 27 May 2022.
Rouse, Rick. “My initial thoughts about Windows 11 (likes and dislikes).” RicksDailyTips.com, 5 September 2021. Accessed 3 June 2022.
Sandrews1313. “Windows 11 - What are our initial thoughts and feelings?” Reddit, 22 November 2021. Accessed 3 June 2022.
“The Matrix Quotes." Quotes.net, n.d. Accessed 18 May 2022.
Thurrott, Paul.” Google: 40 Million Chromebooks in Use in Education.” Thurrott, 21 January 2020. Accessed 18 May 2022.
Vaughan-Nichols, Steven J. “The real reason for Windows 11.” Computerworld, 6 July 2021, Accessed 19 May 2022.
“Virtual Machine Support.” Microsoft,3 June 2022. Accessed 13 June 2022.
“What are DirectX 12 compatible graphics and WDDM 2.x.” Wisecleaner, 20 August 2021. Accessed 19 May 2022.
“Windows 11 Specs and System Requirements.” Microsoft, 2022. Accessed 13 June 2022.
“Windows Display Driver Model.” MiniTool, n.d. Accessed 13 June 2022.
The technical side of IT security demands the best security possible, but the business side of running IT demands that you determine what is cost-effective and can still do the job. You likely shrugged off the early iterations of Microsoft’s security efforts, but you may have heard that things have changed. Where do you start in evaluating Microsoft’s security products in terms of effectiveness? The value proposition sounds tremendous to the CFO, “free” security as part of your corporate license, but how does it truly measure up and how do you articulate your findings to the business?
Microsoft’s security products have improved to the point where they are often ranked competitively with mainstream security products. Depending on your organization’s licensing of Office 365/Microsoft 365, some of these products are included in what you’re already paying for. That value proposition is hard to deny.
Determine what is important to the business, and in what order of priority.
Take a close look at your current solution and determine what are table stakes, what features you would like to have in its replacement, and what your current solution is missing.
Consider Microsoft’s security solutions using an objective methodology. Sentiment will still be a factor, but it shouldn’t dictate the decision you make for the good of the business.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Examine what you are licensed for, what you are paying, what you need, and what your constraints are.
Determine what is “good enough” security and assess the needs of your organization.
Decide what you will go with and start planning your next steps.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use Info-Tech’s licensing best practices to avoid overspending on Adobe licensing and to remain compliant in case of audit.
"Adobe has designed and executed the most comprehensive evolution to the subscription model of pre-cloud software publishers with Creative Cloud. Adobe's release of Document Cloud (replacement for the Acrobat series of software) is the final nail in the coffin for legacy licensing for Adobe. Technology procurement functions have run out of time in which to act while they still retain leverage, with the exception of some late adopter organizations that were able to run on legacy versions (e.g. CS6) for the past five years. Procuring Adobe software is not the same game as it was just a few years ago. Adopt a comprehensive approach to understanding Adobe licensing, contract, and delivery models in order to accurately forecast your software needs, transact against the optimal purchase plan, and maximize negotiation leverage. "
Scott Bickley
Research Lead, Vendor Practice
Info-Tech Research Group
In 2011 Adobe took the strategic but radical move toward converting its legacy on-premises licensing to a cloud-based subscription model, in spite of material pushback from its customer base. While revenues initially dipped, Adobe’s resolve paid off; the transition is mostly complete and revenues have doubled. This was the first enterprise software offering to effect the transition to the cloud in a holistic manner. It now serves as a case study for those following suit, such as Microsoft, Autodesk, and Oracle.
Adobe elected to make this market pivot in a dramatic fashion, foregoing a gradual transition process. Enterprise clients were temporarily allowed to survive on legacy on-premises editions of Adobe software; however, as the Adobe Creative Cloud functionality was quickly enhanced and new applications were launched, customer capitulation to the new subscription model was assured.
Adobe is now leveraging the power of connected customers, the availability of massive data streams, and the ongoing digitalization trend globally to supplement the core Creative Cloud products with online services and analytics in the areas of Creative Cloud for content, Marketing Cloud for marketers, and Document Cloud for document management and workflows. This blueprint focuses on Adobe's Creative Cloud and Document Cloud solutions and the enterprise term license agreement (ETLA).
Beware of your contract being auto-renewed and getting locked into the quantities and product subset that you have in your current agreement. Determining the number of licenses you need is critical. If you overestimate, you're locked in for three years. If you underestimate, you have to pay a big premium in the true-up process.
Adobe estimates the total addressable market for creative and document cloud to be $21 billion. With no sign of growth slowing down, Adobe customers must learn how to work within the current design monopoly.
Source: Adobe, 2017
"Adobe is not only witnessing a steady increase in Creative Cloud subscriptions, but it also gained more visibility into customers’ product usage, which enables it to consistently push out software updates relevant to user needs. The company also successfully transformed its sales organization to support the recurring revenue model."
– Omid Razavi, Global Head of Success, ServiceNow
☑ Implement a user profile to assign licenses by version and limit expenditures. Alternatives can include existing legacy perpetual and Acrobat classic versions that may already be owned by the organization.
☑ Examine the suitability and/or dependency on Document Cloud functions, such as existing business workflows and e-signature integration.
☑ Involve stakeholders in the evaluation of alternate products for use cases where dependency on Acrobat-specific functionality is limited.
☑ Identify not just the installs and active use of the applications but also the depth and breadth of use across the various features so that the appropriate products can be selected.
Use Info-Tech’s Adobe toolkit to prepare for your new purchases or contract renewal
Info-Tech Insight
IT asset management (ITAM) and software asset management (SAM) are critical! An error made in a true-up can cost the organization for the remaining years of the ETLA. Info-Tech worked with one client that incurred a $600k error in the true-up that they were not able to recoup from Adobe.
Time and resource disruption to business if audited
Lost estimated synergies in M&A
Cost of new licensing
Cost of software audit, penalties, and back support
Lost resource allocation and time
Third party, legal/SAM partners
Cost of poor negotiation tactics
Lost discount percentage
Terms and conditions improved
Establish Licensing Requirements |
Evaluate Licensing Options |
Evaluate Agreement Options |
Purchase and Manage Licenses |
|
|---|---|---|---|---|
Best-Practice Toolkit |
|
|
|
|
Guided Implementations |
|
|
|
|
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
|
Guided Implementation 1: Managing Adobe Contracts Proposed Time to Completion: 3-6 weeks |
||
|---|---|---|
|
Step 1.1: Establish Licensing Requirements Start with a kick-off call:
Then complete these activities…
With these tools & templates: Adobe ETLA Deployment Forecast |
Step 1.2: Determine Licensing Options Review findings with analyst:
Then complete these activities…
With these tools & templates: Adobe ETLA vs. VIP Pricing Table Adobe ETLA Forecasted Costs and Benefits |
Step 1.3: Purchase and Manage Licenses Review findings with analyst:
Then complete these activities…
With these tools & templates: Adobe ETLA Deployment Forecast |
Adobe’s move from a perpetual license to a per-user subscription model can be positive in some scenarios for organizations that experienced challenges with deployment, management of named users vs. devices, and license tracking.
Adobe has been systematically reducing discounts on ETLAs as they enter the second renewal cycle of the original three-year terms.
Adobe cloud services are being bundled with ETLAs with a mandate that companies that do not accept the services at the proposed cost have Adobe management’s approval to unbundle the deal, generally with no price relief.
The option for custom bundling of legacy Creative Suite component applications has been removed, effectively raising the price across the board for licensees that require more than two Adobe applications who must now purchase the full Creative Cloud suite.
Higher education/public education agreements have been revamped over the past couple of years, increasing prices for campus-wide agreements by double-digit percentages (~10-30%+). While they still receive an 80% discount over list price, IT departments in this industry are not prepared to absorb the budget increase.
Adobe has moved to an all-or-one bundle model. If you need more than two application products, you will likely need to purchase the full Creative Cloud suite. Therefore, it is important to focus on creating accurate user profiles to identify usage needs.
Use Info-Tech’s Adobe ETLA vs. VIP Pricing Table tool to compare ETLA costs against VIP costs.
Use Info-Tech’s ETLA Forecasted Costs and Benefits tool to forecast your ETLA costs and document benefits.
The subscription model forces customers to an annuity-based pricing model, so Adobe has recurring revenue from a subscription-based product. This increases customer lifetime value (CLTV) for Adobe while providing ongoing functionality updates that are not version/edition dependent.
Key Characteristics:
Adobe Digital Publishing Suite, Single Edition
Bundle Name |
Target Customer |
Included Applications |
Features |
|---|---|---|---|
CC (for Individuals) |
Individual users |
The individual chooses |
|
CC for Teams (CCT) |
Small to midsize organizations with a small number of Adobe users who are all within the same team |
Depends on your team’s requirements. You can select all applications or specific applications. |
Everything that CC (for individuals) does, plus
|
CC for Enterprise (CCE) |
Large organizations with users who regularly use multiple Adobe products on multiple machines |
All applications including Adobe Stock for images and Adobe Enterprise Dashboard for managing user accounts |
Everything that CCT does, plus
|
For further information on specific functionality differences, reference Adobe’s comparison table.
☑ True cloud products are typically service-based, scalable and elastic, shared resources, have usage metering, and rely upon internet technologies. Currently, Adobe’s Creative Cloud and Document Cloud products lack these characteristics. In fact, the core products are still downloaded and physically installed on endpoint devices, then anchored to the cloud provisioning system, where the software can be automatically updated and continuously verified for compliance by ensuring the subscription is active.
☑ Adobe Cloud allows Adobe to increase end-user productivity by releasing new features and products to market faster, but the customer will increase lock-in to the Adobe product suite. The fast-release approach poses a different challenge for IT departments, as they must prepare to test and support new functionality and ensure compatibility with endpoint devices.
☑ There are options at the enterprise level that enable IT to exert more granular control over new feature releases, but these are tied to the ETLA and the provided enterprise portal and are not available on other subscription plans. This is another mechanism by which Adobe has been able to spur ETLA adoption.
☑ Not all CIOs consider SaaS/subscription applications their first choice, but the Adobe’s dominant position in the content and document management marketplace is forcing the shift regardless. It is significant that Adobe bypassed the typical hybrid transition model by effectively disrupting the ability to continue with perpetual licensing without falling behind the functionality curve.
☑ VIP plans do allow for annual terms and payment, but you lose the price elasticity that comes with multi-year terms.
Download Info-Tech’s Adobe ETLA vs. VIP Pricing Table tool to compare ETLA costs against VIP costs.
Step 1: Make sure you have a software asset management (SAM) tool to determine Adobe installs and usage within your environment.
Step 2: Look at the current Adobe install base and usage. We recommend reviewing three months’ worth of reliable usage data to decide which users should have which licenses going forward.
Step 3: Understand the changes in Adobe packages for Creative Cloud (CC). Also, take into account that the license types are based on users, not devices.
Step 4: Identify those users who only need a single license for a single application (e.g. Photoshop, InDesign, Muse).
Step 5: Identify the users who require CC suites. Look at their usage of previous Adobe suites to get an idea of which CC suite they require. Did they have Design Suite Standard installed but only use one or two elements? This is a good way to ensure you do not overspend on Adobe licenses.
Download Info-Tech’s Adobe ETLA Deployment Forecast tool to track Adobe installs within your environment and to determine usage needs.
Most common purchasing models |
Points for consideration |
|---|---|
|
|
"Customers are not even obliged to manage all the licenses themselves. The reseller partners have access to the cloud console and can manage licenses on behalf of their customers. Even better, they can seize cross and upsell opportunities and provide good insight into the environment. Additionally, Adobe itself provides optimization services."
– B-lay
The CLP and TLP are transactional agreements generally used for the purchase of perpetual licenses. For example, they could be used for making Acrobat purchases if Creative Suite products are purchased on the ETLA.
Source: “Adobe Buying Programs Comparison Guide for Commercial and Government Organizations”
The Value Incentive Plan is aimed at small- to medium-sized organizations with no minimum quantity required. However, there is limited flexibility to reduce licenses and limited price protection for future purchases. The ETLA is aimed at large organizations who wish to have new functionality as it comes out, license management portal, services, and security/IT control aspects.
Source: “Adobe Buying Programs Comparison Guide for Commercial and Government Organizations”
The Adobe ETLA’s rigid contract parameters, true-up process, and unique deployment/provisioning mechanisms give technology/IT procurement leaders fewer options to maximize cost-usage alignment and to streamline opex costs.
☑ No ETLA price book is publicly published; pricing is controlled by the Adobe enterprise sales team.
☑ Adobe's retail pricing is a good starting point for negotiating discounted pricing.
☑ ETLA commitments are usually for three years, and the lack of a true-down option increases the risk involved in overbuying licenses should the organization encounter a business downturn or adverse event.
☑ Pricing discounts are the highest at the initial ETLA signing for the upfront volume commitment. The true-up pricing is discounted from retail but still higher than the signing cost per license.
☑ Technical support is included in the ETLA.
☑ While purchases typically go through value-added resellers (VARs), procurement can negotiate directly with Adobe.
"For cloud products, it is less complex when it comes to purchasing and pricing. If larger quantities are purchased on a longer term, the discount may reach up to 15%. As soon as you enroll in the VIP program, you can control all your licenses from an ‘admin console’. Any updates or new functionalities are included in the original price. When the licenses expire, you may choose to renew your subscriptions or remove them. Partial renewal is also accepted. Of course, you can also re-negotiate your price if more subscriptions are added to your console."
– B-lay
INFO-TECH TIP: For further guidance on ETLAs and pricing, contact your Info-Tech representative to set up a call with an analyst.
Use Info-Tech’s Adobe ETLA Deployment Forecast tool to match licensees with Adobe product SKUs.
When adding a license, the true-up price will be prorated to 50% of the license cost for previous year’s usage plus 100% of the license cost for the next year. This back-charging adds up to 150% of the overall true-up license cost. In some rare cases, Adobe has provided an “unlimited” quantity for certain SKUs; these Unlimited ETLAs generally align with FTE counts and limit FTE increases to about 5%. Procurement must monitor and work with SAM/ITAM and stakeholder groups to restrain unnecessary growth during the term of an Unlimited ETLA to avoid the risk of cost escalation at renewal time.
Higher-education clients can license under the ETLA based on a prescribed number of user and classroom/lab devices and/or on a FTE basis. In these cases, the combination of Creative Cloud and Acrobat Pro volume must equal the FTE total, creating an enterprise footprint. FTE calculations establish the full-time faculty plus one-third of part-time faculty plus one-half of part-time staff.
Compliance takes a different form in terms of the ETLA true-up process. The completion of Adobe's transition to cloud-based licensing and verification has improved compliance rates via phone home telemetry such that pirated software is less available and more easily detected. Adobe has actually decommissioned its audit arm in the Americas and EMEA.
Determine License Entitlements
Obtain documentation from internal records and Adobe to track licenses and upgrades to determine what licenses you own and have the right to use.
Gather Deployment Information
Leverage a software asset management tool or process to determine what software is deployed and what is/is not being used.
Determine Effective License Position
Compare license entitlements with deployment data to uncover surpluses and deficits in licensing. Look for opportunities.
Plan Changes to License Position
Meet with IT stakeholders to discuss the enterprise license program (ELP), short- and long-term project plans, and budget allocation. Plan and document licensing requirements.
Option |
What is it? |
What’s included? |
For |
Term |
|---|---|---|---|---|
CLP (Cumulative Licensing Program) |
10,000 plus points, support and maintenance optional |
Select Adobe perpetual desktop products |
Business |
2 years |
EA (Adobe Enterprise Agreement) |
100 licenses plus maintenance and support for eligible Adobe products |
All applications |
100+ users requirement |
3 years |
EEA (Adobe Enterprise Education Agreement) |
Creative Cloud enterprise agreement for education establishments |
Creative Cloud applications without services |
Education |
1 or 2 years |
ETLA (Enterprise Term License Agreement) |
Licensing program designed for Adobe’s top commercial, government, and education customers |
All Creative Cloud applications |
Large enterprise companies |
3 years |
K-12 – Enterprise Agreement |
Enterprise agreement for primary and secondary schools |
Creative Cloud applications without services |
Education |
1 year |
K-12 – School Site License |
Allows a school to install a Creative Cloud on up to 500 school-owned computers regardless of school size |
Creative Cloud applications without services |
Education |
1 year |
TLP (Transactional Licensing Program) |
Agreement for SMBs that want volume licensing bonuses |
Perpetual desktop products only |
Aimed at SMBs, but Enterprise customers can use the TLP for smaller requirements |
N/A |
Upgrade Plan |
Insurance program for software purchased under a perpetual license program such as CLP or TLP for Creative Cloud upgrade |
Dependent on the existing perpetual estate |
Anyone |
N/A |
VIP (Value Incentive Plan) |
VIP allows customers to purchase, deploy, and manage software through a term-based subscription license model |
Creative Cloud of teams |
Business, government, and education |
Adobe operates in its own niche in the creative space, and Adobe users have grown accustomed to their products, making switching very difficult.
Adobe has transitioned the vast majority of its software offerings to the cloud-based subscription model. Active management of licenses, software provisioning, and consumption of cloud services is now an ongoing job.
With the vendor lock-in process nearly complete via the transition to a SaaS subscription model, Adobe is raising prices on an annual basis. Advance planning and strategic use of the ETLA is key to avoid budget-breaking surprises.
Take Control of Microsoft Licensing and Optimize Spend
Create an Effective Plan to Implement IT Asset Management
Establish an Effective System of Internal IT Controls to Mitigate Risks
Optimize Software Asset Management
Take Control of Compliance Improvement to Conquer Every Audit
“Adobe Buying Programs: At-a-glance comparison guide for Commercial and government organizations.” Adobe Systems Incorporated, 2014. Web. 1 Feb. 2018.
“Adobe Buying Programs Comparison Guide for Commercial and Government Organizations.” Adobe Systems Incorporated, 2018. Web.
“Adobe Buying Programs Comparison Guide for Education.” Adobe Systems Incorporated, 2018. Web. 1 Feb 2018.
“Adobe Education Enterprise Agreement: Give your school access to the latest industry-leading creative tools.” Adobe Systems Incorporated, 2014. Web. 1 Feb. 2018.
“Adobe Enterprise Term License Agreement for commercial and government organizations.” Adobe Systems Incorporated, 2016. Web. 1 Feb. 2018.
Adobe Investor Presentation – October 2017. Adobe Systems Incorporated, 2017. Web. 1 Feb. 2018.
Cabral, Amanda. “Students react to end of UConn-Adobe contract.” The Daily Campus (Uconn), 5 April 2017. Web. 1 Feb. 2018.
de Veer, Patrick and Alecsandra Vintilescu. “Quick Guide to Adobe Licensing.” B-lay, Web. 1 Feb. 2018.
“Find the best program for your organization.” Adobe, Web. 1 Feb 2018.
Foxen, David. “Adobe Upgrade Simplified.” Snow Software, 7 Oct. 2016. Web.
Frazer, Bryant. “Adobe Stops Reporting Subscription Figures for Creative Cloud.” Studio Daily. Access Intelligence, LLC. 17 March 2016. Web.
“Give your students the power to create bright futures.” Adobe, Web. 1 Feb 2018.
Jones, Noah. “Adobe changes subscription prices, colleges forced to pay more.” BG Falcon Media. Bowling Green State University, 18 Feb. 2015. Web. 1 Feb. 2018.
Mansfield, Adam. “Is Your Organization Prepared for Adobe’s Enterprise Term License Agreements (ETLA)?” UpperEdge,30 April 2013. Web. 1 Feb. 2018.
Murray, Corey. “6 Things Every School Should Know About Adobe’s Move to Creative Cloud.” EdTech: Focus on K-12. CDW LLC, 10 June 2013. Web.
“Navigating an Adobe Software Audit: Tips for Emerging Unscathed.” Nitro, Web. 1 Feb. 2018.
Razavi, Omid. “Challenges of Traditional Software Companies Transitioning to SaaS.” Sand Hill, 12 May 2015. Web. 1 Feb. 2018.
Rivard, Ry. “Confusion in the Cloud.” Inside Higher Ed. 22 May 2013. Web. 1 Feb. 2018.
Sharwood, Simon. “Adobe stops software licence audits in Americas, Europe.” The Register. Situation Publishing. 12 Aug. 2016. Web. 1 Feb. 2018.
“Software Licensing Challenges Faced In The Cloud: How Can The Cloud Benefit You?” The ITAM Review. Enterprise Opinions Limited. 20 Nov. 2015. Web.
White, Stephen. “Understanding the Impacts of Adobe’s Cloud Strategy and Subscriptions Before Negotiating an ETLA.” Gartner, 22 Feb. 2016. Web.
Most organizations go through an organizational redesign to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The purpose of this storyboard is to provide a four-phased approach to organizational redesign.
Use this templated Communication Deck to ensure impacted stakeholders have a clear understanding of why the new organizational structure is needed and what that structure will look like.
This template provides IT leaders with an opportunity to present their case for a change in organizational structure and roles to secure the funding and buy-in required to operate in the new structure.
This Workbook allows IT and business leadership to work through the steps required to complete the organizational redesign process and document key rationale for those decisions.
Refer to this tool when working through the redesign process to better understand the operating model sketches and the capability definitions. Each capability has been tied back to core frameworks that exist within the information and technology space.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.
Clearly articulate why this organizational redesign is needed and the implications the strategies and context will have on your structure.
1.1 Define the org design drivers.
1.2 Document and define the implications of the business context.
1.3 Align the structure to support the strategy.
1.4 Establish guidelines to direct the organizational design process.
Clear definition of the need to redesign the organizational structure
Understanding of the business context implications on the organizational structure creation.
Strategic impact of strategies on organizational design.
Customized Design Principles to rationalize and guide the organizational design process.
Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.
A customized operating model sketch that informs what capabilities will make up your IT organization and how those capabilities will align to deliver value to your organization.
2.1 Augmented list of IT capabilities.
2.2 Capability gap analysis
2.3 Identified capabilities for outsourcing.
2.4 Select a base operating model sketch.
2.5 Customize the IT operating model sketch.
Customized list of IT processes that make up your organization.
Analysis of which capabilities require dedicated focus in order to meet goals.
Definition of why capabilities will be outsourced and the method of outsourcing used to deliver the most value.
Customized IT operating model reflecting sourcing, centralization, and intended delivery of value.
Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.
A detailed organizational chart reflecting team structures, reporting structures, and role responsibilities.
3.1 Categorize your IT capabilities within your defined functional work units.
3.2 Create a mandate statement for each work unit.
3.3 Define roles inside the work units and assign accountability and responsibility.
3.4 Finalize your organizational structure.
Capabilities Organized Into Functional Groups
Functional Work Unit Mandates
Organizational Chart
Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.
A clear plan of action on how to transition to the new structure, communicate the new organizational structure, and measure the effectiveness of the new structure.
4.1 Identify and mitigate key org design risks.
4.2 Define the transition plan.
4.3 Create the change communication message.
4.4 Create a standard set of FAQs.
4.5 Align sustainment metrics back to core drivers.
Risk Mitigation Plan
Change Communication Message
Standard FAQs
Implementation and sustainment metrics.
Allison Straker
Research Director,
Organizational Transformation
Brittany Lutes
Senior Research Analyst,
Organizational Transformation
An organizational structure is much more than a chart with titles and names. It defines the way that the organization operates on a day-to-day basis to enable the successful delivery of the organization’s information and technology objectives. Moreover, organizational design sees beyond the people that might be performing a specific role. People and role titles will and often do change frequently. Those are the dynamic elements of organizational design that allow your organization to scale and meet specific objectives at defined points of time. Capabilities, on the other hand, are focused and related to specific IT processes.
Redesigning an IT organizational structure can be a small or large change transformation for your organization. Create a structure that is equally mindful of the opportunities and the constraints that might exist and ensure it will drive the organization towards its vision with a successful implementation. If everyone understands why the IT organization needs to be structured that way, they are more likely to support and adopt the behaviors required to operate in the new structure.
Your organization needs to reorganize itself because:
Many organizations struggle when it comes redesigning their IT organizational structure because they:
Successful IT organization redesign includes:
A successful redesign requires a strong foundation and a plan to ensure successful adoption. Without these, the organizational chart has little meaning or value.
Organizational design is a challenge for many IT and digital executives
69% of digital executives surveyed indicated challenges related to structure, team silos, business-IT alignment, and required roles when executing on a digital strategy.
To overcome these barriers:
75% The percentage of change efforts that fail.
55% The percentage of practitioners who identify how information flows between work units as a challenge for their organization.
IT organizational design refers to the process of aligning the organization’s structure, processes, metrics, and talent to the organization’s strategic plan to drive efficiency and effectiveness.
Why is the right IT organizational design so critical to success? |
||
Adaptability is at the core of staying competitive today |
Structure is not just an organizational chart |
Organizational design is a never-ending process |
Digital technology and information transparency are driving organizations to reorganize around customer responsiveness. To remain relevant and competitive, your organizational design must be forward looking and ready to adapt to rapid pivots in technology or customer demand. |
The design of your organization dictates how roles function. If not aligned to the strategic direction, the structure will act as a bungee cord and pull the organization back toward its old strategic direction (ResearchGate.net, 2014). Structure supports strategy, but strategy also follows structure. |
Organization design is not a one-time project but a continuous, dynamic process of organizational self-learning and continuous improvement. Landing on the right operating model will provide a solid foundation to build upon as the organization adapts to new challenges and opportunities. |
Organizational design the process in which you intentionally align the organizational structure to the strategy. It considers the way in which the organization should operate and purposely aligns to the enterprise vision. This process often considers centralization, sourcing, span of control, specialization, authority, and how those all impact or are impacted by the strategic goals.
Operating models provide an architectural blueprint of how IT capabilities are organized to deliver value. The placement of the capabilities can alter the culture, delivery of the strategic vision, governance model, team focus, role responsibility, and more. Operating model sketches should be foundational to the organizational design process, providing consistency through org chart changes.
The organizational structure is the chosen way of aligning the core processes to deliver. This can be strategic, or it can be ad hoc. We recommend you take a strategic approach unless ad hoc aligns to your culture and delivery method. A good organizational structure will include: “someone with authority to make the decisions, a division of labor and a set of rules by which the organization operates” (Bizfluent, 2019).
The capstone of this change initiative is an easy-to-read chart that visualizes the roles and reporting structure. Most organizations use this to depict where individuals fit into the organization and if there are vacancies. While this should be informed by the structure it does not necessarily depict workflows that will take place. Moreover, this is the output of the organizational design process.
All three elements of the Technology Value Trinity work in harmony to delivery business value and achieve strategic needs. As one changes, the others need to change as well.
How do these three elements relate?
Too often strategy, organizational design, and governance are considered separate practices – strategies are defined without teams and resources to support. Structure must follow strategy.
Like a story, a strategy without a structure to deliver on it is simply words on paper.
Books begin by setting the foundation of the story.
Introduce your story by:
The plot cannot thicken without the foundation. Your organizational structure and chart should not exist without one either.
The steps to establish your organizational chart - with functional teams, reporting structure, roles, and responsibilities defined – cannot occur without a clear definition of goals, need, and context. An organizational chart alone won’t provide the insight required to obtain buy-in or realize the necessary changes.
Conclude your story through change management and communication.
Good stories don’t end without referencing what happened before. Use the literary technique of foreshadowing – your change management must be embedded throughout the organizational redesign process. This will increase the likelihood that the organizational structure can be communicated, implemented, and reinforced by stakeholders.
Once your IT strategy is defined, it is critical to identify the capabilities that are required to deliver on those strategic initiatives. Each initiative will require a combination of these capabilities that are only supported through the appropriate organization of roles, skills, and team structures.
For each phase of this blueprint, its important to consider change management. These are the points when you need to communicate the structure changes:
Do not undertake an organizational redesign initiative if you will not engage in change management practices that are required to ensure its successful adoption.
Given that the organizational redesign is intended to align with the overall vision and objectives of the business, many of the metrics that support its success will be tied to the business. Adapt the key performance indicators (KPIs) that the business is using to track its success and demonstrate how IT can enable the business and improve its ability to reach those targets.
The percentage of resources dedicated to strategic priorities and initiatives supported by IT operating model. While operational resources are necessary, ensuring people are allocating time to strategic initiatives as well will drive the business towards its goal state. Leverage Info-Tech’s IT Staffing Assessment diagnostic to benchmark your IT resource allocation.
Assess the improvement in business satisfaction overall with IT year over year to ensure the new structure continues to drive satisfaction across all business functions. Leverage Info-Tech’s CIO Business Vision diagnostic to see how your IT organization is perceived.
The degree of clarity that IT employees have around their role and its core responsibilities can lead to employee engagement and retention. Consider measuring this core job driver by leveraging Info-Tech’s Employee Engagement Program.
Measure customer satisfaction with technology-enabled business services or products and improvements in technology-enabled client acquisition or retention processes. Assess the percentage of users satisfied with the quality of IT service delivery and leverage Info-Tech’s End-User Satisfaction Survey to determine improvements.
Phase |
1. Establish the Organizational Design Foundation |
2. Create the Operating Model Sketch |
3. Formalize the Organizational Structure |
4. Plan for Implementation and Change |
|---|---|---|---|---|
Phase Outcomes |
Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process. |
Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment. |
Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities. |
Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders. |
Organizational redesign processes focus on defining the ways in which you want to operate and deliver on your strategy – something an organizational chart will never be able to convey.
Focus on your organization, not someone else's’. Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context.
An operating model sketch that is customized to your organization’s specific situation and objectives will significantly increase the chances of creating a purposeful organizational structure.
If you follow the steps outlined in the first three phases, creating your new organizational chart should be one of the fastest activities.
Throughout the creation of a new organizational design structure, it is critical to involve the individuals and teams that will be impacted.
You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Communication Deck
Communicate the changes to other key stakeholders such as peers, managers, and staff.
Workbook
As you work through each of the activities, use this workbook as a place to document decisions and rationale.
Reference Deck
Definitions for every capability, base operating model sketches, and sample organizational charts aligned to those operating models.
Job Descriptions
Key deliverable:
Executive Presentation
Leverage this presentation deck to gain executive buy-in for your new organizational structure.
INDUSTRY: Government
SOURCE: Analyst Interviews and Working Sessions
IT was tasked with providing equality to the different business functions through the delivery of shared IT services. The government created a new IT organizational structure with a focus on two areas in particular: strategic and operational support capabilities.
When creating the new IT structure, an understanding of the complex and differing needs of the business functions was not reflected in the shared services model.
As a result, the new organizational structure for IT did not ensure adequate meeting of business needs. Only the operational support structure was successfully adopted by the organization as it aligned to the individual business objectives. The strategic capabilities aspect was not aligned to how the various business lines viewed themselves and their objectives, causing some partners to feel neglected.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Diagnostics and consistent frameworks are used throughout all four options.
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 8 to 12 calls over the course of 4 to 6 months.
Phase 1
Call #1: Define the process, understand the need, and create a plan of action.
Phase 2
Call #2: Define org. design drivers and business context.
Call #3: Understand strategic influences and create customized design principles.
Call #4: Customize, analyze gaps, and define sourcing strategy for IT capabilities.
Call #5: Select and customize the IT operating model sketch.
Phase 3
Call #6: Establish functional work units and their mandates.
Call #7: Translate the functional organizational chart to an operational organizational chart with defined roles.
Phase 4
Call #8: Consider risks and mitigation tactics associated with the new structure and select a transition plan.
Call #9: Create your change message, FAQs, and metrics to support the implementation plan.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Day 1 |
Day 2 |
Day 3 |
Day 4 |
Day 5 |
|
|---|---|---|---|---|---|
Establish the Organizational Redesign Foundation |
Create the Operating Model Sketch |
Formalize the Organizational Structure |
Plan for Implementation and Change |
Next Steps and |
|
Activities |
1.1 Define the org. design drivers. 1.2 Document and define the implications of the business context. 1.3 Align the structure to support the strategy. 1.4 Establish guidelines to direct the organizational design process. |
2.1 Augment list of IT capabilities. 2.2 Analyze capability gaps. 2.3 Identify capabilities for outsourcing. 2.4 Select a base operating model sketch. 2.5 Customize the IT operating model sketch. |
3.1 Categorize your IT capabilities within your defined functional work units. 3.2 Create a mandate statement for each work unit. 3.3 Define roles inside the work units and assign accountability and responsibility. 3.4 Finalize your organizational structure. |
4.1 Identify and mitigate key org. design risks. 4.2 Define the transition plan. 4.3 Create the change communication message. 4.4 Create a standard set of FAQs. 4.5 Align sustainment metrics back to core drivers. |
5.1 Complete in-progress deliverables from previous four days. 5.2 Set up review time for workshop deliverables and to discuss next steps. |
Deliverables |
|
|
|
|
|
PART 1: DESIGN |
PART 2: STRUCTURE |
PART 3: IMPLEMENT |
|||
|---|---|---|---|---|---|
IT Organizational Architecture |
Organizational Sketch |
Organizational Structure |
Organizational Chart |
Transition Strategy |
Implement Structure |
|
1. Define the organizational design drivers, business context, and strategic alignment. 2. Create customized design principles. 3. Develop and customize a strategically aligned operating model sketch. 4. Define the future-state work units. 5. Create future-state work unit mandates. |
6. Define roles by work unit. 7. Turn roles into jobs with clear capability accountabilities and responsibilities. 8. Define reporting relationships between jobs. 9. Assess options and select go-forward organizational sketch. |
11. Validate organizational sketch. 12. Analyze workforce utilization. 13. Define competency framework. 14. Identify competencies required for jobs. |
15. Determine number of positions per job 16. Conduct competency assessment. 17. Assign staff to jobs. 18. Build a workforce and staffing plan. |
19. Form an OD implementation team. 20. Develop change vision. 21. Build communication presentation. 22. Identify and plan change projects. 23. Develop organizational transition plan. |
24. Train managers to lead through change. 25. Define and implement stakeholder engagement plan. 26. Develop individual transition plans. 27. Implement transition plans. |
Risk Management: Create, implement, and monitor risk management plan.
HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.
Monitor and Sustain Stakeholder Engagement
This phase will walk you through the following activities:
1.1 Define the organizational redesign driver(s)
1.2 Create design principles based on the business context
1.3a (Optional Exercise) Identify the capabilities from your value stream
1.3b Identify the capabilities required to deliver on your strategies
1.4 Finalize your list of design principles
This phase involves the following participants:
Changes are most successful when leaders clearly articulate the reason for the change – the rationale for the organizational redesign of the IT function. Providing both staff and executive leaders with an understanding for this change is imperative to its success. Despite the potential benefits to a redesign, they can be disruptive. If you are unable to answer the reason why, a redesign might not be the right initiative for your organization.
Employees who understand the rationale behind decisions made by executive leaders are 3.6 times more likely to be engaged.
Successful adoption of the new organizational design requires change management from the beginning. Start considering how you will convey the need for organizational change within your IT organization.
All aspects of your IT organization’s structure should be designed with the business’ context and strategic direction in mind.
Use the following set of slides to extract the key components of your drivers, business context, and strategic direction to land on a future structure that aligns with the larger strategic direction.
Driver(s) can originate from within the IT organization or externally. Ensuring the driver(s) are easy to understand and articulate will increase the successful adoption of the new organizational structure.
Defines the interactions that occur throughout the organization and between the organization and external stakeholders. The context provides insight into the environment by both defining the purpose of the organization and the values that frame how it operates.
The IT strategy should be aligned to the overall business strategy, providing insight into the types of capabilities required to deliver on key IT initiatives.
Where are we today?
Determine the current overall maturity level of the IT organization.
Where do we want to be as an organization?
Use the inputs from Info-Tech’s diagnostic data to determine where the organization should be after its reorganization.
How can you leverage these results?
The result of these diagnostics will inform the design principles that you’ll create in this phase.
CIO Business Vision Diagnostic
Management & Governance Diagnostic
Effectiveness is a concern:
New capabilities are needed:
Lack of business understanding
Workforce challenges
Avoid change for change’s sake. Restructuring could completely miss the root cause of the problem and merely create a series of new ones.
1-2 hours
Input |
Output |
|
|
Materials |
Participants |
|
|
Record the results in the Organizational Design Communications Deck
Workforce Considerations:
Business Context Consideration |
IT Org. Design Implication |
|
Culture: Culture, "the way we do things here,” has huge implications for executing strategy, driving engagement, and providing a guiding force that ensures organizations can work together toward common goals.
|
Consider whether your organization’s culture can accept the operating model and organizational structure changes that make sense on paper. Certain cultures may lean toward particular operating models. For example, the demand-develop-service operating model may be supported by a cooperative culture. A traditional organization may lean towards the plan-build-run operating model. Ensure you have considered your current culture and added exercises to support it. If more capacity is required to accomplish the goals of the organization, you’ll want to prepare the leaders and explain the need in your design principles (to reflect training, upskilling, or outsourcing). Unionized environments require additional consideration. They may necessitate less structural changes, and so your principles will need to reflect other alternatives (hiring additional resources, creative options) to support organizational needs. Hybrid or fully remote workforces may impact how your organization interacts. |
Business Context Consideration | IT Org. Design Implication |
Control & Governance: It is important to consider how your organization is governed, how decisions are made, and who has authority to make decisions. Strategy tells what you do, governance validates you’re doing the right things, and structure is how you execute on what’s been approved.
| Organizations that require more controls may lean toward more centralized governance. Organizations that are looking to better enable and empower their divisions (products, groups, regions, etc.) may look to embed governance in these parts of the organization. For enterprise organizations, consider where IT has authority to make decisions (at the global, local, or system level). Appropriate governance needs to be built into the appropriate levels. |
Business Context Consideration | IT Org. Design Implication |
Financial Constraints: Follow the money: You may need to align your IT organization according to the funding model.
| Determine if you can move forward with a new model or if you can adjust your existing one to suit the financial constraints. If you have no say over your funding, pre-work may be required to build a business case to change your funding model before you look at your organizational structure – without this, you might have to rule out centralized and focus on hybrid/centralized. If you don’t control the budget (funding comes from your partners), it will be difficult to move to a more centralized model. A federated business organization may require additional IT governance to help prioritize across the different areas. Budgets for digital transformation might come from specific areas of the business, so resources may need to be aligned to support that. You’ll have to consider how you will work with those areas. This may also impact the roles that are going to exist within your IT organization – product owners or division owners might have more say. |
Business Context Consideration | IT Org. Design Implication |
Business Perspective of IT: How the business perceives IT and how IT perceives itself are sometimes not aligned. Make sure the business’ goals for IT are well understood.
Business Organization Structure and Growth:
| If IT needs to become more of a business partner, you’ll want to define what that means to your organization and focus on the capabilities to enable this. Educating your partners might also be required if you’re not aligned. For many organizations, this will include stakeholder management, innovation, and product/project management. If IT and its business partners are satisfied with an order-taker relationship, be prepared for the consequences of that. A global organization will require different IT needs than a single location. Specifically, site reliability engineering (SRE) or IT support services might be deployed in each region. Organizations growing through mergers and acquisitions can be structured differently depending on what the organization needs from the transaction. A more centralized organization may be appropriate if the driver is reuse for a more holistic approach, or the organization may need a more decentralized organization if the acquisitions need to be handled uniquely. |
Business Context Consideration | IT Org. Design Implication |
Sourcing Strategy:
Change Tolerance:
| Your sourcing strategy affects your organizational structure, including what capabilities you group together. Since managing outsourced capabilities also includes the need for vendor management, you’ll need to ensure there aren’t too many capabilities required per leader. Look closely at what can be achieved through your operating model if IT is done through other groups. Even though these groups may not be in scope of your organization changes, you need to ensure your IT team works with them effectively. If your organization is going to push back if there are big structural changes, consider whether the changes are truly necessary. It may be preferred to take baby steps – use an incremental versus big-bang approach. A need for incremental change might mean not making a major operating model change. |
Business Context Consideration | IT Org Design. Implication |
Stakeholder Engagement & Focus: Identify who your customers and stakeholders are; clarify their needs and engagement model.
Business Vision, Services, and Products: Articulate what your organization was built to do.
| For a customer or user focus, ensure capabilities related to understanding needs (stakeholder, UX, etc.) are prioritized. Hybrid, decentralized, or demand-develop-service models often have more of a focus on customer needs. Outsourcing the service desk might be a consideration if there’s a high demand for the service. A differentiation between these users might mean there’s a different demand for services. Think broadly in terms of your organizational vision, not just the tactical (widget creation). You might need to choose an operating model that supports vision. Do you need to align your organization with your value stream? Do you need to decentralize specific capabilities to enable prioritization of the key capabilities? |
1-3 hours
| Input | Output |
|
|
Materials | Participants |
|
|
Record the results in the Organizational Design Communications Deck
Designing your IT organization requires an assessment of what it needs to be built to do:
The IT organization must reflect your business needs:
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Communications Deck
Ensure that you have a clear view of the goals and initiatives that are needed in your organization. Your IT, digital, business, and/or other strategies will surface the IT capabilities your organization needs to develop. Identify the goals of your organization and the initiatives that are required to deliver on them. What capabilities are required to enable these? These capabilities will need to be reflected in your design principles.
Sample initiatives and capabilities from an organization’s strategies
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Communications Deck
Your organizational design principles should define a set of loose rules that can be used to design your organizational structure to the specific needs of the work that needs to be done. These rules will guide you through the selection of the appropriate operating model that will meet your business needs. There are multiple ways you can hypothetically organize yourself to meet these needs, and the design principles will point you in the direction of which solution is the most appropriate as well as explain to your stakeholders the rationale behind organizing in a specific way. This foundational step is critical: one of the key reasons for organizational design failure is a lack of requisite time spent on the front-end understanding what is the best fit.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Communications Deck
Design Principle |
Description |
Decision making |
We will centralize decision making around the prioritization of projects to ensure that the initiatives driving the most value for the organization as a whole are executed. |
Fit for purpose |
We will build and maintain fit-for-purpose solutions based on business units’ unique needs. |
Reduction of duplication |
We will reduce role and application duplication through centralized management of assets and clearly differentiated roles that allow individuals to focus within key capability areas. |
Managed security |
We will manage security enterprise-wide and implement compliance and security governance policies. |
Reuse > buy > build |
We will maximize reuse of existing assets by developing a centralized application portfolio management function and approach. |
Managed data |
We will create a specialized data office to provide data initiatives with the focus they need to enable our strategy. |
Design Principle |
Description |
Controlled technical diversity |
We will control the variety of technology platforms we use to allow for increased operability and reduction of costs. |
Innovation |
R&D and innovation are critical – we will build an innovation team into our structure to help us meet our digital agenda. |
Resourcing |
We will separate our project and maintenance activities to ensure each are given the dedicated support they need for success and to reduce the firefighting mentality. |
Customer centricity |
The new structure will be directly aligned with customer needs – we will have dedicated roles around relationship management, requirements, and strategic roadmapping for business units. |
Interoperability |
We will strengthen our enterprise architecture practices to best prepare for future mergers and acquisitions. |
Cloud services |
We will move toward hosted versus on-premises infrastructure solutions, retrain our data center team in cloud best practices, and build roles around effective vendor management, cloud provisioning, and architecture. |
This phase will walk you through the following activities:
2.1 Augment the capability list
2.2 Heatmap capabilities to determine gaps in service
2.3 Identify the target state of sourcing for your IT capabilities
2.4 Review and select a base operating model sketch
2.5 Customize the selected overlay to reflect the desired future state
This phase involves the following participants:
Obtain desire from stakeholders to move forward with organizational redesign initiative by involving them in the process to gain interest. This will provide the stakeholders with assurance that their concerns are being heard and will help them to understand the benefits that can be anticipated from the new organizational structure.
“You’re more likely to get buy-in if you have good reason for the proposed changes – and the key is to emphasize the benefits of an organizational redesign.”
Just because people are aware does not mean they agree. Help different stakeholders understand how the change in the organizational structure is a benefit by specifically stating the benefit to them.
Capabilities
Competencies
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Assess the gaps between where you currently are and where you need to be. Evaluate how critical and how effective your capabilities are:
Remember to identify what allows the highly effective capabilities to perform at the capacity they are. Leverage this when increasing effectiveness elsewhere.
High Gap
There is little to no effectiveness (high gap) and the capability is highly important to your organization.
Medium Gap
Current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.
Low Gap
Current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
There are a few different “types” of outsourcing:
Insourcing |
Staff Augmentation |
Managed Service |
Competitive Advantage |
|
|---|---|---|---|---|
Description |
The organization maintains full responsibility for the management and delivery of the IT capability or service. |
Vendor provides specialized skills and enables the IT capability or service together with the organization to meet demand. |
Vendor completely manages the delivery of value for the IT capability, product or service. |
Vendor has unique skills, insights, and best practices that can be taught to staff to enable insourced capability and competency. |
Benefits |
|
|
|
|
Drawbacks |
|
|
|
|
Capability |
Capacity |
Outsourcing Model |
|---|---|---|
Low |
Low |
Your solutions may be with you for a long time, so it doesn’t matter whether it is a strategic decision to outsource development or if you are not able to attract the talent required to deliver in your market. Look for a studio, agency, or development shop that has a proven reputation for long-term partnership with its clients. |
Low |
High |
Your team has capacity but needs to develop new skills to be successful. Look for a studio, agency, or development shop that has a track record of developing its customers and delivering solutions. |
High |
Low |
Your organization knows what it is doing but is strapped for people. Look at “body shops” and recruiting agencies that will support short-term development contracts that can be converted to full-time staff or even a wholesale development shop acquisition. |
High |
High |
You have capability and capacity for delivering on your everyday demands but need to rise to the challenge of a significant, short-term rise in demand on a critical initiative. Look for a major system integrator or development shop with the specific expertise in the appropriate technology. |
Sourcing Criteria | Description | |
|---|---|---|
Determine whether you’ll outsource using these criteria | 1. Critical or commodity | Determine whether the component to be sourced is critical to your organization or if it is a commodity. Commodity components, which are either not strategic in nature or related to planning functions, are likely candidates for outsourcing. Will you need to own the intellectual property created by the third party? Are you ok if they reuse that for their other clients? |
2. Readiness to outsource | Identify how easy it would be to outsource a particular IT component. Consider factors such as knowledge transfer, workforce reassignment or reduction, and level of integration with other components. Vendor management readiness – ensuring that you have sufficient capabilities to manage vendors – should also be considered here. | |
3. In-house capabilities | Determine if you have the capability to deliver the IT solutions in-house. This will help you establish how easy it would be to insource an IT component. | |
4. Ability to attract resources (internal vs. outsourced) | Determine if the capability is one that is easily sourced with full-time, internal staff or if it is a specialty skill that is best left for a third-party to source. | |
Determine your sourcing model using these criteria | 5. Cost | Consider the total cost (investment and ongoing costs) of the delivery of the IT component for each of the potential sourcing models for a component. |
| 6. Quality | Define the potential impact on the quality of the IT component being sourced by the possible sourcing models. | |
| 7. Compliance | Determine whether the sourcing model would fit with regulations in your industry. For example, a healthcare provider would only go for a cloud option if that provider is HIPAA compliant. | |
| 8. Security | Identify the extent to which each sourcing option would leave your organization open to security threats. | |
| 9. Flexibility | Determine the extent to which the sourcing model will allow your organization to scale up or down as demand changes. |
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
An IT operating model sketch is a visual representation of the way your IT organization needs to be designed and the capabilities it requires to deliver on the business mission, strategic objectives, and technological ambitions. It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint.
The visual should be the optimization and alignment of the IT organization’s structure to deliver the capabilities required to achieve business goals. Additionally, it should clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization. Investing time in the front end getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and your model to change as the business changes.
Every structure decision you make should be based on an identified need, not on a trend.Build your IT organization to enable the priorities of the organization.
Centralized |
Hybrid |
Decentralized |
|
|---|---|---|---|
| Advantages |
|
|
|
Disadvantages |
|
|
|
Decentralization can take a number of different forms depending on the products the organization supports and how the organization is geographically distributed. Use the following set of explanations to understand the different types of decentralization possible and when they may make sense for supporting your organizational objectives.
Decentralization by lines of business (LoB) aligns decision making with business operating units based on related functions or value streams. Localized priorities focus the decision making from the CIO or IT leadership team. This form of decentralization is beneficial in settings where each line of business has a unique set of products or services that require specific expertise or flexible resourcing staffing between the teams.
Decentralization by product line organizes your team into operationally aligned product families to improve delivery throughput, quality, and resource flexibility within the family. By adopting this approach, you create stable product teams with the right balance between flexibility and resource sharing. This reinforces value delivery and alignment to enterprise goals within the product lines.
Geographical decentralization reflects a shift from centralized to regional influences. When teams are in different locations, they can experience a number of roadblocks to effective communication (e.g. time zones, regulatory differences in different countries) that may necessitate separating those groups in the organizational structure, so they have the autonomy needed to make critical decisions.
Functional decentralization allows the IT organization to be separated by specialty areas. Organizations structured by functional specialization can often be organized into shared service teams or centers of excellence whereby people are grouped based on their technical, domain, or functional area within IT (Applications, Data, Infrastructure, Security, etc.). This allows people to develop specialized knowledge and skills but can also reinforce silos between teams.
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
The following bridges might be necessary to augment your divisions:
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Document the final operating model sketch in the Communications Deck
This phase will walk you through the following activities:
3.1 Create work units
3.2 Create work unit mandates
3.3 Define roles inside the work units
3.4 Finalize the organizational chart
3.5 Identify and mitigate key risks
This phase involves the following participants:
You don’t have to make the change in one big bang. You can adopt alternative transition plans such as increments or pilots. This allows people to see the benefits of why you are undergoing the change, allows the change message to be repeated and applied to the individuals impacted, and provides people with time to understand their role in making the new organizational structure successful.
“Transformational change can be invigorating for some employees but also highly disruptive and stressful for others.”
Without considering the individual impact of the new organizational structure on each of your employees, the change will undoubtedly fail in meeting its intended goals and your organization will likely fall back into old structured habits.
The organizational sketch is the outline of the organization that encompasses the work units and depicts the relationships among them. It’s important that you create the structure that’s right for your organization, not one that simply fits with your current staff’s skills and knowledge. This is why Info-Tech encourages you to use your operating model as a mode of guidance for structuring your future-state organizational sketch.
The organizational sketch is made up of unique work units. Work units are the foundational building blocks on which you will define the work that IT needs to get done. The number of work units you require and their names will not match your operating model one to one. Certain functional areas will need to be broken down into smaller work units to ensure appropriate leadership and span of control.
A work unit is a functional group or division that has a discrete set of processes or capabilities that it is responsible for, which don’t overlap with any others. Your customized list of IT capabilities will form the building blocks of your work units. Step one in the process of building your structure is grouping IT capabilities together that are similar or that need to be done in concert in the case of more complex work products. The second step is to iterate on these work units based on the organizational design principles from Phase 1 to ensure that the future-state structure is aligned with enablement of the organization’s objectives.
Here is a list of example work units you can use to brainstorm what your organization’s could look like. Some of these overlap in functionality but should provide a strong starting point and hint at some potential alternatives to your current way of organizing.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
A group consists of two or more individuals who are working toward a common goal. Group formation is how those individuals are organized to deliver on that common goal. It should take into consideration the levels of hierarchy in your structure, the level of focus you give to processes, and where power is dispersed within your organizational design.
Importance: Balance highly important capabilities with lower priority capabilities
Specialization: The scope of each role will be influenced by specialized knowledge and a dedicated leader
Effectiveness: Group capabilities that increase their efficacy
Span of Control: Identify the right number of employees reporting to a single leader
Smaller organizations will require less specialization simply out of necessity. To function and deliver on critical processes, some people might be asked to wear several hats.
When you say you are looking for a team that is a “jack of all trades,” you are likely exceeding appropriate cognitive loads for your staff and losing productivity to task switching.
Complexity: More complex work should have fewer direct reports. This often means the leader will need to provide lots of support, even engaging in the work directly at times.
Demand: Dynamic shifts in demand require more managerial involvement and therefore should have a smaller span of control. Especially if this demand is to support a 24/7 operation.
Competency Level: Skilled employees should require less hands-on assistance and will be in a better position to support the business as a member of a larger team than those who are new to the role.
Purpose: Strategic leaders are less involved in the day-to-day operations of their teams, while operational leaders tend to provide hands-on support, specifically when short-staffed.
Pick your poison…
It’s important to understand the impacts that team design has on your services and products. The solutions that a team is capable of producing is highly dependent on how teams are structured. For example, Conway’s Law tells us that small distributed software delivery teams are more likely to produce modular service architecture, where large collocated teams are better able to create monolithic architecture. This doesn’t just apply to software delivery but also other products and services that IT creates. Note that small distributed teams are not the only way to produce quality products as they can create their own silos.
The work unit mandate should provide a quick overview of the work unit and be clear enough that any reader can understand why the work unit exists, what it does, and what it is accountable for.
Each work unit will have a unique mandate. Each mandate should be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option. The mandate will vary by organization based on the agreed upon work units, design archetype, and priorities.
Don’t just adopt an example mandate from another organization or continue use of the organization’s pre-existing mandate – take the time to ensure it accurately depicts what that group is doing so that its value-added activities are clear to the larger organization.
The Office of the CIO will be a strategic enabler of the IT organization, driving IT organizational performance through improved IT management and governance. A central priority of the Office of the CIO is to ensure that IT is able to respond to evolving environments and challenges through strategic foresight and a centralized view of what is best for the organization.
The Project Management Office will provide standardized and effective project management practices across the IT landscape, including an identified project management methodology, tools and resources, project prioritization, and all steps from project initiation through to evaluation, as well as education and development for project managers across IT.
The Solutions Development Group will be responsible for the high-quality development and delivery of new solutions and improvements and the production of customized business reports. Through this function, IT will have improved agility to respond to new initiatives and will be able to deliver high-quality services and insights in a consistent manner.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Now that you have identified the main units of work in the target IT organization, it is time to identify the roles that will perform that work. At the end of this step, the key roles will be identified, the purpose statement will be built, and accountability and responsibility for roles will be clearly defined. Make sure that accountability for each task is assigned to one role only. If there are challenges with a role, change the role to address them (e.g. split roles or shift responsibilities).
Do not bias your role design by focusing on your existing staff’s competencies. If you begin to focus on your existing team members, you run the risk of artificially narrowing the scope of work or skewing the responsibilities of individuals based on the way it is, rather than the way it should be.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Despite popular belief, there is no such thing as the Spotify model, and organizations that structured themselves based on the original Spotify drawing might be missing out on key opportunities to obtain productivity from employees.
The primary goal of any product delivery team is to improve the delivery of value for customers and the business based on your product definition and each product’s demand. Each organization will have different priorities and constraints, so your team structure may take on a combination of patterns or may take on one pattern and then transform into another.
Delivery Team Structure Patterns |
How Are Resources and Work Allocated? |
|
|---|---|---|
Functional Roles |
Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC). |
Completed work is handed off from team to team sequentially as outlined in the organization’s SDLC. |
Shared Service and Resource Pools |
Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk). |
Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high. |
Product or System |
Teams are dedicated to the development, support, and management of specific products or systems. |
Work is directly sent to the teams who are directly managing the product or directly supporting the requester. |
Skills and Competencies |
Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, Finance). |
Work is directly sent to the teams who have the IT and business skills and competencies to complete the work. |
Functional Roles | Shared Service and Resource Pools | Product or System | Skills and Competencies |
|---|---|---|---|
When your people are specialists versus having cross-functional skills | Leveraged when specialists such as Security or Operations will not have full-time work on the product | When you have people with cross-functional skills who can self-organize around a product’s needs | When you have a significant investment in a specific technology stack |
![]() | ![]() | ![]() | ![]() |
For more information about delivering in a product operating model, refer to our Deliver Digital Products at Scale blueprint.
1-3 hours
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Record the results in the Organizational Design Workbook & Executive Communications Deck
Every organizational structure will include certain risks that should have been considered and accepted when choosing the base operating model sketch. Now that the final organizational structure has been created, consider if those risks were mitigated by the final organizational structure that was created. For those risks that weren’t mitigated, have a tactic to control risks that remain present.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
This phase will walk you through the following activities:
4.1 Select a transition plan
4.2 Establish the change communication messages
4.3 Be consistent with a standard set of FAQs
4.4 Define org. redesign resistors
4.5 Create a sustainment plan
This phase involves the following participants:
Change management is: |
Managing a change that requires replanning and reorganizing and that causes people to feel like they have lost control over aspects of their jobs. – Padar et al., 2017 |
| People Process Technology |
| PREPARE | A | Awareness: Establish the need for organizational redesign and ensure this is communicated well. |
This blueprint is mostly focused on the prepare and transition components. |
| D | Desire: Ensure the new structure is something people are seeking and will lead to individual benefits for all. |
||
| TRANSITION | K | Knowledge: Provide stakeholders with the tools and resources to function in their new roles and reporting structure. |
|
| A | Ability: Support employees through the implementation and into new roles or teams. |
||
| FUTURE | R | Reinforcement: Emphasize and reward positive behaviors and attitudes related to the new organizational structure. |
Implementation Plan |
Transition Plan: Identify the appropriate approach to making the transition, and ensure the transition plan works within the context of the business. |
Communication Strategy: Create a method to ensure consistent, clear, and concise information can be provided to all relevant stakeholders. |
|
Plan to Address Resistance: Given that not everyone will be happy to move forward with the new organizational changes, ensure you have a method to hear feedback and demonstrate concerns have been heard. |
|
Employee Development Plan: Provide employees with tools, resources, and the ability to demonstrate these new competencies as they adjust to their new roles. |
|
Monitor and Sustain the Change: Establish metrics that inform if the implementation of the new organizational structure was successful and reinforce positive behaviors. |
As a result, your organization must adopt OCM practices to better support the acceptance and longevity of the changes being pursued.
Incremental Change |
Transformational Change |
Organizational change management is highly recommended and beneficial for projects that require people to:
|
Organizational change management is required for projects that require people to:
|
How you transition to the new organizational structure can be heavily influenced by HR. This is the time to be including them and leveraging their expertise to support the transition “how.”
Description | Pros | Cons | Example | |
Big Bang Change | Change that needs to happen immediately – “ripping the bandage off.” |
|
| A tsunami in Japan stopped all imports and exports. Auto manufacturers were unable to get parts shipped and had to immediately find an alternative supplier. |
Incremental Change | The change can be rolled out slower, in phases. |
|
| A change in technology, such as HRIS, might be rolled out one application at a time to ensure that people have time to learn and adjust to the new system. |
Pilot Change | The change is rolled out for only a select group, to test and determine if it is suitable to roll out to all impacted stakeholders. |
|
| A retail store is implementing a new incentive plan to increase product sales. They will pilot the new incentive plan at select stores, before rolling it out broadly. |
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Success of your new organizational structure hinges on adequate preparation and effective communication.
The top challenge facing organizations in completing the organizational redesign is their organizational culture and acceptance of change. Effective planning for the implementation and communication throughout the change is pivotal. Make sure you understand how the change will impact staff and create tailored plans for communication.
65% of managers believe the organizational change is effective when provided with frequent and clear communication.
Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.
The organizational change message should:
2 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Be Clear |
|
Be Consistent |
|
Be Concise |
|
Be Relevant |
|
As a starting point for building an IT organizational design implementation, look at implementing an FAQ that will address the following:
Questions to consider answering:
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
People resist changes for many reasons. When it comes to organizational redesign changes, some of the most common reasons people resist change include a lack of understanding, a lack of involvement in the process, and fear.
Assess employee to determine competency levels and interests.
Employee drafts development goals; manager reviews.
Manager helps with selection of development activities.
Manager provides ongoing check-ins, coaching, and feedback.
Sustain the change by following through with stakeholders, gathering feedback, and ensuring that the change rationale and impacts are clearly understood. Failure to so increases the potential that the change initiative will fail or be a painful experience and cost the organization in terms of loss of productivity or increase in turnover rates.
Obtaining qualitative feedback from employees, customers, and business partners can provide insight into where the new organizational structure is operating optimally versus where there are further adjustments that could be made to support the change.
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Jardena London
Transformation Catalyst, Rosetta Technology Group
Jodie Goulden
Consultant | Founder, OrgDesign Works
Shan Pretheshan
Director, SUPA-IT Consulting
Chris Briley
CIO, Manning & Napier
Dean Meyer
President N. Dean Meyer and Associates Inc.
Jimmy Williams
CIO, Chocktaw Nation of Oklahoma
Cole Cioran, Managing Partner
Dana Daher, Research Director
Hans Eckman, Principal Research Director
Ugbad Farah, Research Director
Ari Glaizel, Practice Lead
Valence Howden, Principal Research Director
Youssef Kamar, Senior Manager, Consulting
Carlene McCubbin, Practice Lead
Baird Miller, Executive Counsellor
Josh Mori, Research Director
Rajesh Parab, Research Director
Gary Rietz, Executive Counsellor
“A Cheat Sheet for HR Professionals: The Organizational Development Process.” AIHR, 2021. Web.
Acharya, Ashwin, Roni Lieber, Lissa Seem, and Tom Welchman. “How to identify the right ‘spans of control’ for your organization.” McKinsey, 21 December 2017. Web.
Anand. N., and Jean-Louis Barsoux. “What everyone gets wrong about change management. Harvard Business Review, December 2017. Web.
Atiken, Chris. “Operating model design-first principles.” From Here On, 24 August 2018. Web.
“Avoid common digital transformation challenges: Address your IT Operating Model Now.” Sofigate, 5 May 2020. Web.
Baumann, Oliver, and Brian Wu. “The many dimensions of research on designing flat firms.” Journal of Organizational Design, no. 3, vol. 4. 09 May 2022.Web.
Bertha, Michael. “Cross the project to product chasm.” CIO, 1 May 2020. Web.
Blenko, Marcia, and James Root. “Design Principles for a Robust Operating Model.” Bain & Company, 8 April 2015. Web.
Blenko, Marcia, Leslie Mackrell, and Kevin Rosenberg. “Operating models: How non-profits get from strategy to results.” The Bridge Span Group, 15 August 2019. Web.
Boulton, Clint. “PVH finds perfect fit in hybrid IT operating model amid pandemic.” CIO, 19 July 2021. Web.
Boulton, Clint. “Why digital disruption leaves no room for bimodal IT.” CIO, 11 May 2017. Web.
Bright, David, et al. “Chapter 10: Organizational Structure & Change.” Principles of Management, OpenStax, Rice University, 20 March 2019. Book.
Campbell, Andrew. “Design Principles: How to manage them.” Ashridge Operating Models. 1 January 2022. Web.
D., Maria. “3 Types of IT Outsourcing Models and How to Choose Between Them.” Cleveroad, 29 April 2022. Web.
Devaney, Eric. “9 Types of Organizational Structure Every Company Should Consider.” HubSpot, 11 February 2022. Web.
Devaney, Erik. “The six building blocks of organizational structure.” Hubspot, 3 June 2020. Web.
Eisenman, M., S. Paruchuri, and P. Puranam. “The design of emergence in organizations.” Journal of Organization Design, vol. 9, 2020. Web.
Forbes Business Development Council. “15 Clear Signs It’s Time to Restructure the Business.” Forbes, 10 February 2020. Web.
Freed, Joseph. “Why Cognitive Load Could Be The Most Important Employee Experience Metric In The Next 10 Years.” Forbes, 30 June 2020. Web.
Galibraith, Jay. “The Star Model.” JayGalbraith.com, n.d. Web.
Girod, Stéphane, and Samina Karim. “Restructure or reconfigure?” Harvard Business Review, April 2017. Web.
Goldman, Sharon. “The need for a new IT Operating Model: Why now?” CIO, 27 August 2019. Web.
Halapeth, Milind. “New age IT Operating Model: Creating harmony between the old and the new.” Wirpo, n.d. Web.
Harvey, Michelle. “Why a common operating model is efficient for business productivity.” CMC, 10 May 2020. Web.
Helfand, Heidi. “Dynamic Reteaming.” O’Reilly Media, 7 July 2020. Book.
JHeller, Martha. “How Microsoft CIO Jim DuBois changed the IT Operating Model.” CIO, 2 February 2016. Web.
Heller, Martha. “How Stryker IT Shifted to a global operating model.” CIO, 19 May 2021. Web.
Heller, Michelle. “Inside blue Shields of California’s IT operating model overhaul.” CIO, 24 February 2021. Web.
Hessing, Ted. “Value Stream Mapping.” Six Sigma Study Guide, 11 April 2014. Web.
Huber, George, P. “What is Organization Design.” Organizational Design Community, n.d. Web.
Indeed Editorial Team. “5 Advantages and Disadvantages of the Matrix Organizational Structure.” Indeed, 23 November 2020. Web.
Indeed Editorial Team. “How to plan an effective organization restructure.” Indeed, 10 June 2021. Web.
“Insourcing vs Outsourcing vs Co-Sourcing.” YML Group, n.d. Web.
“Investing in more strategic roles.” CAPS Research, 3 February 2022. Web.
Jain, Gagan. “Product IT Operating Model: The next-gen model for a digital work.” DevOps, 22 July 2019. Web.
Kane, Gerald, D. Plamer, and Anh Phillips. “Accelerating Digital Innovation Inside and Out.” Deloitte Insights, 4 June 2019. Web.
Krush, Alesia. “IT companies with ‘flat’ structures: utopia or innovative approach?” Object Style, 18 October 2018. Web.
Law, Michael. “Adaptive Design: Increasing Customer Value in Your Organisation.” Business Agility Institute, 5 October 2020. Web.
LucidContent Team. “How to get buy-in for changes to your organizational structure.” Lucid Chart, n.d. Web.
Matthews, Paul. “Do you know the difference between competence and capability?” The People Development Magazine, 25 September 2020. Web.
Meyer, Dean N. “Analysis: Common symptoms of organizational structure problems.” NDMA, n.d. Web.
Meyer, N. Dean. “Principle-based Organizational Structure.” NDMA Publishing, 2020. Web.
Morales Pedraza, Jorge. Answer to posting, “What is the relationship between structure and strategy?” ResearchGate.net, 5 March 2014. Web.
Nanjad, Len. “Five non-negotiables for effective organization design change.” MNP, 01 October 2021. Web.
Neilson, Gary, Jaime Estupiñán, and Bhushan Sethi. “10 Principles of Organizational Design.” Strategy & Business, 23 March 2015. Web.
Nicastro, Dom. “Understanding the Foundational Concepts of Organizational Design.” Reworked, 24 September 2020. Web.
Obwegeser, Nikolaus, Tomoko Yokoi, Michael Wade, and Tom Voskes. “7 Key Principles to Govern Digital Initiatives.” MIT Sloan, 1 April 2020. Web.
“Operating Models and Tools.” Business Technology Standard, 23 February 2021. Web.
“Organizational Design Agility: Journey to a combined community.” ODF-BAI How Space, Organizational Design Forum, 2022. Web.
“Organizational Design: Understanding and getting started.” Ingentis, 20 January 2021. Web.
Padar, Katalin, et al. “Bringing project and change management roles into sync.” Journal of Change Management, 2017. Web.
Partridge, Chris. “Evolve your Operating Model- It will drive everything.” CIO, 30 July 2021. Web.
Pijnacker, Lieke. “HR Analytics: role clarity impacts performance.” Effectory, 25 September 2019. Web.
Pressgrove, Jed. “Centralized vs. Federated: Breaking down IT Structures.” Government Technology, March 2020. Web.
Sherman, Fraser. “Differences between Organizational Structure and Design.” Bizfluent, 20 September 2019. Web.
Skelton, Matthew, and Manual Pais. “Team Cognitive Load.” IT Revolution, 19 January 2021. Web.
Skelton, Matthew, and Manual Pais. Team Topologies. IT Revolution Press, 19 September 2019. Book
Spencer, Janet, and Michael Watkins. “Why organizational change fails.” TLNT, 26 November 2019. Web.
Storbakken, Mandy. “The Cloud Operating Model.” VMware, 27 January 2020. Web.
"The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.
“Understanding Organizational Structures.” SHRM, 31 August 2021. Web.
"unfix Pattern: Base.” AgilityScales, n.d. Web.
Walker, Alex. “Half-Life: Alyx helped change Valve’s Approach to Development.” Kotaku, 10 July 2020. Web.
"Why Change Management.” Prosci, n.d. Web.
Wittig, Cynthia. “Employees' Reactions to Organizational Change.” OD Practioner, vol. 44, no. 2, 2012. Web.
Woods, Dan. “How Platforms are neutralizing Conway’s Law.” Forbes, 15 August 2017. Web.
Worren, Nicolay, Jeroen van Bree, and William Zybach. “Organization Design Challenges. Results from a practitioner survey.” Journal of Organizational Design, vol. 8, 25 July 2019. Web.
This 2023-Q1 research agenda slide deck provides you with a comprehensive overview of our most up-to-date published research. Each piece offers you valuable insights, allowing you to take effective decisions and informed actions. All TY|Info-tech research is backed by our team of expert analysts who share decades of IT and industry experience.
Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you assess your cloud maturity, understand relevant ways of working, and create a meaningful design of your cloud operations that helps align team members and stakeholders.
Use these templates and tools to assess your current state, design the cloud operations organizing framework, and create a roadmap.
Use these templates and tools to plan how you will communicate changes to key stakeholders and communicate the new cloud operations organizing framework in an executive presentation.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish Context
Alignment on target state
1.1 Assess current cloud maturity and areas in need of improvement
1.2 Identify the drivers for organizational redesign
1.3 Review cloud objectives and obstacles
1.4 Develop organization design principles
Cloud maturity assessment
Project drivers
Cloud challenges and objectives
Organization design principles
Establish Context
Understanding of cloud workstreams
2.1 Evaluate new ways of working
2.2 Develop a workstream target statement
2.3 Identify cloud work
Workstream target statement
Cloud operations workflow diagrams
Design the Organization
Visualization of the cloud operations future state
3.1 Design a future-state cloud operations diagram
3.2 Create a current-state cloud operations diagram
3.3 Define success indicators
Future-state cloud operations diagram
Current-state cloud operations diagram
Success indicators
Communicate the Changes
Alignment and buy-in from stakeholders
4.1 Create a roadmap
4.2 Create a communication plan
Roadmap
Communication plan
EXECUTIVE BRIEF
![]() | Andrew Sharp Research Director Infrastructure & Operations Practice | It’s “day two” in the cloud. Now what? Just because you’re in the cloud doesn’t mean everyone is on the same page about how cloud operations work – or should work. You have an opportunity to implement new ways of working. But if people can’t see the bigger picture – the organizing framework of your cloud operations – it will be harder to get buy-in to realize value from your cloud services. Use Info-Tech’s methodology to build out and visualize a cloud operations organizing framework that defines cloud work and aligns it to the right areas. |
![]() | Nabeel Sherif Principal Research Director Infrastructure & Operations Practice | |
![]() | Emily Sugerman Research Analyst Infrastructure & Operations Practice | |
![]() | Scott Young Principal Research Director Infrastructure & Operations Practice |
Your Challenge | Common Obstacles | Info-Tech’s Approach |
|---|---|---|
Widespread cloud adoption has created new opportunities and challenges:
|
| Clearly communicate the need for operations changes:
|
Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds.
Traditional IT capabilities, activities, organizational structures, and culture need to adjust to leverage the value of cloud, optimize spend, and manage risk.
Obstacles, by the numbers:
85% of respondents reported security in the cloud was a serious concern.
73% reported balancing responsibilities between a central cloud team and business units was a top concern.
The average organization spent 13% more than they’d budgeted on cloud – even when budgets were expected to increase by 29% in the next year.
32% of all cloud spend was estimated to be wasted spend.
56% of operations professionals said their primary focus is cloud services.
81% of security professionals thought it was difficult to get developers to prioritize bug fixes.
42% of security professionals felt bugs were being caught too late in the development process.
1. Ensure alignment with the risks and drivers of the business and understand your organization’s strengths and gaps for a cloud operations world.
2. Understand the balance of different types of deliveries you’re responsible for in the cloud.
3. Reduce risk by reinforcing the key operational pillars of cloud operations to your workstreams.
4. Identify “work areas,” decide which area is responsible for what tasks and how work areas should interact in order to best facilitate desired business outcomes.
Start by designing operations around the main workflow you have for cloud services; i.e. If you mostly build or host in cloud, build the diagram to maximize value for that workflow.
Proper design of roles and responsibilities for each cloud workflow category will help reduce risk by reinforcing the key operational pillars of cloud operations.
We base this on a composite of the well-architected frameworks established by the top global cloud providers today.
Workflow Categories
Key Pillars
Risks to Mitigate
Assess Maturity and Ways of Working | Define Cloud Work | Design Cloud Operations | Communicate and Secure Buy-in |
|---|---|---|---|
Assess your key workflows’ maturity for “life in the cloud,” related to Key Operational Pillars. Evaluate your readiness and need for new ways of working. | Identify the work that must be done to deliver value in cloud services. | Define key cloud work areas, the work they do, and how they should share information and interact. | Outline the change you recommend to a range of stakeholders. Gain buy-in for the plan. |
Assess the intensity and cloud maturity of your IT operations for each of the key cloud workstreams: Consume, Host, and Build | ![]() | Identify stakeholders, what’s in it for them, what the impact will be, and how you will communicate over the course of the change. | ![]() |
Cloud Operations Design Sketchbook Capture the diagram as you build it. | ![]() | Build a roadmap to put the design into action. | ![]() |
Cloud Operations Organizing Framework
The Cloud Operations Organizing Framework is a communication tool that introduces the cloud operations diagram and establishes its context and justification.

Phase 1: Establish Context 1.1: Identify challenges, opportunities, and cloud maturity 1.2: Evaluate new ways of working 1.3: Define cloud work | Phase 2: Design the organization and communicate changes 2.1: Design a draft cloud operations diagram 2.2: Communicate changes |
Outputs | |
Cloud Services Objectives and Obstacles Cloud Operations Workflow Diagrams Cloud Maturity Assessment | Draft Cloud Operations Diagram Communication Plan Roadmap Tool Cloud Operations Organizing Framework |
Benefits for IT | Benefits for the business |
|---|---|
|
|
Example Goal | How this blueprint can help | How you might measure success/value |
|---|---|---|
Streamline Responsibilities The operations team is spending too much time fighting applications fires, which is distracting it from needed platform improvements. |
|
|
Improve Cost Visibility The teams responsible for cost management today don’t have the authority, visibility, or time to effectively find wasted spend. The teams responsible for cost management today don’t have the authority, visibility, or time to effectively find wasted spend. |
|
|
Cloud Vision | ![]() | Cloud Strategy |
|---|---|---|
It is difficult to get or maintain buy-in for changes to operations without everyone on the same page about the basic value proposition cloud offers your organization. Do the workload and risk analysis to create a defensible cloud vision statement that boils down into a single statement: “This is how we want to use the cloud.” | Once you have your basic cloud vision, take the next step by documenting a cloud strategy. Establish your steering committee with stakeholders from IT, business, and leadership to work through the essential decisions around vision and alignment, people, governance, and technology. Your cloud operations design should align to a cloud strategy document that provides guidelines on establishing a cloud council, preparing staff for changing skills, mitigating risks through proper governance, and setting a direction for migration, provisioning, and monitoring decisions. |
Focus on the future, not the present | ||
Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds. | ||
Responsibilities change in the cloud | Understand what you mean by cloud work | Focus where it matters |
Cloud is a different way of consuming IT resources and applications and it requires a different operational approach than traditional IT. In most cases, cloud operations involves less direct execution and more service validation and monitoring | Work that is invisible to the customer can still be essential to delivering customer value. A lot of operations work is invisible to your organization’s customers but is required to deliver stability, security, efficiency, and more. Cloud work is not just applications that have been approved by IT. Consider how unsanctioned software purchased by the business will be integrated and managed. | Start by designing operations around the main workflow you have for cloud services. If you mostly build or host in the cloud, build the diagram to maximize value for that workflow. Design principles will often change over time as the organization’s strategy evolves. Identify skills requirements and gaps as early as possible to avoid skills gaps later. Whether you plan to acquire skills via training or cross-training, hiring, contracting, or outsourcing, effectively building skills takes time. |
DIY Toolkit | Guided Implementation | Workshop | Consulting |
|---|---|---|---|
| “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” | “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” | “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” | “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.” |
Phase 1 | Phase 2 |
|---|---|
Call #1: Scope requirements, objectives, and your specific challenges Calls #2&3: Assess cloud maturity and drivers for org. redesign Call #4: Review cloud objectives and obstacles Call #5: Evaluate new ways of working and identify cloud work | Calls #6&7: Create your Cloud Operations diagram Call #8: Create your communication plan and build roadmap |
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
Establish Context | Design the Organization and Communicate Changes | Next Steps and | |||
Activities | 1.1 Assess current cloud maturity and areas in need of improvement 1.2 Identify the drivers for organizational redesign 1.3 Review cloud objectives and obstacles 1.4 Develop organization design principles | 2.1 Evaluate new ways of working 2.2 Develop a workstream target statement 2.3 Identify cloud work | 3.1 Design a future-state cloud operations diagram 3.2 Create a current state cloud operations diagram 3.3 Define success indicators | 4.1 Create a roadmap 4.2 Create a communication plan | 5.1 Complete in-progress deliverables from previous four days. 5.2 Set up review time for workshop deliverables and to discuss next steps. |
Deliverables |
|
|
|
| Cloud Operations Organizing Framework. |
Phase 1 | Phase 2 |
|---|---|
1.1 Establish operating model design principals by identifying goals & challenges, workstreams, and cloud maturity 1.2 Evaluate new ways of working 1.3 Identify cloud work | 2.1 Draft an operating model 2.2 Communicate proposed changes |
Define current maturity and which workstreams are important to your organization.
Understand new operating approaches and which apply to your workstream balance.
Identify a new target state for IT operations.
1. Identify an operations design working group | 2. Review cloud vision and strategy | 3. Create a working folder |
|---|---|---|
This should be a group with insight into current cloud challenges, and with the authority to drive change. This group is the main audience for the activities in this blueprint. | Review your established planning work and documentation. | Create a repository to house your notes and any work in progress. |
15 minutes
Create a central repository to support transparency and collaboration. It’s an obvious step, but one that’s often forgotten.
“Start small: Begin with a couple services. Then, based on the feedback you receive from Operations and the business, modify your approach and keep increasing your footprint.” – Nenad Begovic
As you adopt cloud services, the operations core mission remains . . .
. . . but operational activities are evolving.
“As operating models shift to the cloud, you still need the same people and processes. However, the shift is focused on a higher level of operations. If your people no longer focus on server uptime, then their success metrics will change. When security is no longer protected by the four walls of a datacenter, your threat profile changes.”
(Microsoft, “Understand Cloud Operating Models,” 2022)
When using a vendor-operated public cloud, IT exists in a shared responsibility model with the cloud service provider, one that is further differentiated by the type of cloud service model in use: broadly, software-as a service (SaaS), platform-as-a-service (PaaS), or infrastructure-as-a-service (IaaS).
Your IT operations organization may still reflect a structure where IT retains control over the entire infrastructure stack from facilities to application and defines their operational roles and processes accordingly.
If the organization chooses a co-location facility, they outsource facility responsibility to a third-party provider, but much of the rest of the traditional IT operating model remains the same. The operations model that worked for an entirely premises-based environment is very different from one that is made up of, for instance, a portfolio of SaaS applications, where your control is limited to the top of the infrastructure stack at the application layer.
Once an organization migrates workloads to the cloud, IT gives up an increasing amount of control to the vendor, and its traditional operational roles & responsibilities necessarily change.


Work that is invisible to the customer can still be essential to delivering customer value. A lot of operations work is invisible to your organization’s customers but required to deliver stability, security, efficiency, and more.
Evolving to cloud-optimal operations also means re-assessing and adapting your team’s approach to achieving cloud maturity, especially with respect to how automation and standardization can be leveraged to best achieve optimization in cloud.
| Traditional IT | Design | Execute | Validate | Support | Monitor |
| Cloud | Design | Execute | Validate | Support | Monitor |
Cloud is a different way of consuming IT resources and applications and requires a different operational approach than traditional IT.
In most cases, cloud operations involves less direct execution and more service validation and monitoring.
Service Model | Example | Function |
|---|---|---|
Software-as-a-Service (SaaS) | Salesforce.com Office 365 Workday | Consume |
Platform-as-a-Service (PaaS) | Azure Stack AWS SageMaker WordPress | Build |
Infrastructure-as-a-Service (IaaS) | Microsoft Azure Amazon EC2 Google Cloud Platform | Host |
Function | Business Need | Service Model | Example Tasks |
|---|---|---|---|
Consume | “I need a commodity, off-the-shelf service that we can configure to our organization’s needs. | Software-as-a-Service (SaaS) | Onboard and add users to a new SaaS offering. Vendor management of SaaS providers. Configure/integrate the SaaS offering to meet business needs. |
Build | “I need to create significantly customized or net-new products and services.” | Platform-as-a-Service (PaaS) & Infrastructure as-a-Service (IaaS) | Create custom applications. Build and maintain a container platform. Manage CI/CD pipelines and tools. Share infrastructure and applications patterns. |
Host | “I need compute, storage, and networking components that reflect key cloud characteristics (on-demand self-service, metered usage, etc.).” | Infrastructure-as-a-Service (IaaS) | Stand up compute, networking, and storage resources to host a COTS application. Plan to increase storage capacity to support future demand. |
“In order to accelerate public cloud adoption, you need to focus on infrastructure-as-code and script everything you can. Unlike traditional operations, CloudOps focuses on creating scripts: a script for task A, a script for task B, etc.”
– Nenad Begovic
Pillars
General Best Practice Capability Areas
2 hours
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download theCloud Maturity Assessment Tool
Whiteboard Activity
An absolute must-have in any successful redesign is a shared understanding and commitment to changing the status quo.
Without a clear and urgent call to action, the design changes will be seen as change for the sake of change and therefore entirely safe to ignore.
Take up the following questions as a group:
Record your answers so you can reference and use them in the communication materials you’ll create in Phase 2.
| Input | Output |
|
|
| Materials | Participants |
|
|
“We know, for example, that 70 percent of change programs fail to achieve their goals, largely due to employee resistance and lack of management support. We also know that when people are truly invested in change it is 30 percent more likely to stick.”
– Ewenstein, Smith, Sologar
McKinsey (2015)
Consider what you intend to achieve and the obstacles to overcome to help identify the changes required to achieve your desired future state.
Advantage Perspective | Ideas for Change | Obstacle Perspective |
What advantages do cloud services offer us as an organization? For example:
| What obstacles prevent us from realizing value in cloud services? For example:
|
Whiteboard Activity
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Cloud Advantages/Objectives
| Obstacles Need to speed up provisioning of PaaS/IaaS/data resources to development and project teams. No time to develop and improve platform services and standards due to other responsibilities. We constantly run up unexpected cloud costs. Not enough time for continuous learning and development. The business will buy SaaS apps and only let us know after they’ve been purchased, leading to overlapping functionality; gaps in compliance, security, or data protection requirements; integration challenges; cost inefficiencies; and more. Role descriptions haven’t kept up with tech changes. Obvious opportunities to rationalize costs aren’t surfaced (e.g. failing to make use of existing volume licensing agreements). Skills needed to properly operate cloud solutions aren’t identified until breakdowns happen. |
Design principles are concise, direct statements that describe how you will design your organization to achieve key objectives and address key challenges.
This is a critically important step for several reasons:
Examples of design principles:
Design principles will often change as the organization’s strategy evolves.
Developing design principles starts with your key objectives. What do we absolutely have to get right to deliver value through cloud services?
Once you have your direction set, work through the points in the star model to establish how you will meet your objectives and deliver value. Each point in the star is an important element in your design – taken together, it paints a holistic picture of your future-state organization.
The changes you choose to implement that affect capabilities, structure, processes, rewards, and people should be self-reinforcing. Each point in the star is connected to, and should support, the other points.
“There is no one-size-fits-all organization design that all companies – regardless of their particular strategy needs – should subscribe to.”
– Jay Galbraith, “The Star Model”
Track your findings in the table on the next slide.
| Input | Output |
|
|
| Materials | Participants |
|
|
What is our key objective? |
|
What capabilities or technologies do we need to adopt or leverage differently? |
|
How must our structure change? How will power shift in the new structure? |
|
Will our new structure require changes to processes or information sharing? |
|
How must we change how we motivate or reward employees? |
|
What new skills or knowledge is required, and how will we acquire it? |
|
Participants
Cloud Operations Design Working Group
Outcomes
Shared understanding of the horizon of work possibilities:
Consider the different approaches on the following slides, how they change operational work, and decide which approaches are the right fit for you.
| “DevOps is a set of practices, tools, and a cultural philosophy that automates and integrates the processes between software development and IT teams. It emphasizes team empowerment, cross-team communication and collaboration, and technology automation.” – Atlassian, “DevOps” “ITIL 4 brings ITIL up to date by…embracing new ways of working, such as Lean, Agile, and DevOps.” – ITIL Foundation: ITIL 4 Edition “Over time, left to their own devices, the SRE team should end up with very little operational load and almost entirely engage in development tasks, because the service basically runs and repairs itself.” – Ben Treynor Sloss, “Site Reliability Engineering” |
The more things change, the more they stay the same:
|
Ways to work
Ways to govern and learn
Ways to work | Ways to govern and learn |
1. DevOps 2. Site Reliability Engineering 3. Platform Engineering | 4. Cloud Centre of Excellence 5. Cloud Community of Practice |
What it is NOT | What it IS | Why Use It |
|---|---|---|
| An operational philosophy that seeks to:
|
|
What it is NOT | What it IS | Why Use It |
|---|---|---|
|
|
|
What it is NOT | What it IS | Why Use It |
|---|---|---|
|
|
|
What it is NOT | What it IS | Why Use It |
|---|---|---|
|
|
|
What it is NOT | What it IS | Why Use It |
|---|---|---|
|
|
|
Patterns are . . . | Ways of Working
|
Patterns are also . . . | Ways to Govern and Learn
|
Ways of Working | |
|---|---|
DevOps | Development teams take on operational work to support the services they create after they are launched to production. Some DevOps teams may be aligned around a particular function or product rather than a technology – there are individuals with skills on a number of technologies that are part of the same team. |
Site Reliability Engineering (SRE) | In the beginning, you can start to adopt SRE practices within existing teams. As demand grows for SRE skills and services, you may decide to create focused SRE roles or teams. SRE teams may work across applications or be aligned to just infrastructure services or a particular application, or they may focus on tools that help developers manage reliability. SREs may also be embedded long-term with other teams or take on an internal consulting roles with multiple teams.1 |
Platform Engineering | Platform engineering will often, though not always, be the responsibility of a dedicated team. This team must work very closely with, and tuned into the needs of, its internal customers. There is a constant need to find ways to add value that aren’t already part and parcel of the platform – or its external roadmap. This team will take on responsibility for the platform, in terms of feature development, automation, availability and reliability, security, and more. They may also be internal consultants or advisors on the platform to developers. |
Ways to Govern and Learn | |
|---|---|
Cloud Center of Excellence |
|
Cloud Community of Practice |
|
| Least Adoption | Greatest Adoption |
Initial Adoption | Early Centralization | Scaling Up | Full Steam Ahead |
|
|
|
|
1 hour
Consider if, and how, the approaches to management and governance you’ve just reviewed can offer value to your organization.
Why it’s for us (drivers) | Risks or challenges to adoption | Next steps to build/adopt it | |
|---|---|---|---|
CCoE | |||
DevOps | |||
| Input | Output |
|
|
| Materials | Participants |
|
|
“At first, for many people, the cloud seems vast. But what you actually do is carve out space.”
Before you can identify roles and responsibilities, you have to confirm what work you do as an organization and how that work enables you to meet your goals.
Defining work can be a lot of … work! We recommend you start by identifying work for the workstream you do most – Build, Consume, or Host – to focus your efforts. You can repeat the exercise as needed.

The five Well-Architected Framework pillars. These are principles/directions/guideposts that should inform all cloud work.
The work being done to achieve the workstream target. These are roughly aligned with the three streams on the right.
Workstream Target: A concise statement of the value you aim to achieve through this workstream. All work should help deliver value (directly or indirectly).
Whiteboard Activity
20 minutes
Over the next few exercises, you’ll do a deep dive into the work you do in one specific workstream. In this exercise, we’ll decide on a workstream to focus on first.
| Input | Output |
|
|
| Materials | Participants |
|
|
Whiteboard Activity
30 minutes
In this activity, come up with a short sentence to describe what all this work you do is building toward. The target statement helps align participants on why work is being done and helps focus the activity on work that is most important to achieving the target statement.
Start with this common workstream target statement:
“Deliver valuable, secure, available, reliable, and efficient cloud services.”
Now, review and adjust the target statement by working through the questions below:
| Input | Output |
|
|
| Materials | Participants |
|
|
1-2 hours
Activity instructions continue on the next slide.
Some notes to the facilitator:
| Input | Output |
|
|
| Materials | Participants |
|
|
4. Work together to identify work, documenting one work item per box. This should focus on future state, so record work whether it’s actually done today or not. Your space is limited on the sheet, so focus on work that is indispensable to delivering the value statement. Use the lists on the right as a reminder of key IT practice areas.
5. As much as possible, align the work items to the appropriate row (Govern & Align, Design & Execute, or Validate, Support & Monitor). You can overlap boxes between rows if needed.
ITIL practices, such as:
Security-aligned practices, such as:
Financial practices, such as:
| Data-aligned practices, such as:
Technology-specific tasks, such as:
Other key practices:
|
Cloud work is not just applications that have been approved by IT. Consider how unsanctioned software purchased by the business will be integrated and managed.
6. If you have decided to adopt any of the new ways of working outlined in Step 1.2 (e.g. DevOps, SRE, etc.) review the next slide for examples of the type of work that frequently needs to be done in each of those work models. Add any additional work items as needed.
7. Consolidate boxes and clean up the diagram (e.g. remove duplicate work items, align boxes, clarify language).
8. Do a final review. Is all the work in the diagram truly aligned with the value statement? Is the work identified aligned with the design principles from Step 1.1?
If you used a whiteboard for this exercise, transcribe the output to a copy of the Cloud Operations Design Sketchbook, and repeat the exercise for other key workstreams. You will use this diagram in Phase 2.
Examples of work in the "Consume" workstream:
Phase 1 | Phase 2 |
|---|---|
1.1 Establish operating model design principals by identifying goals & challenges, workstreams, and cloud maturity 1.2 Evaluate new ways of working 1.3 Identify cloud work | 2.1 Draft an operating model 2.2 Communicate proposed changes |
Draft your cloud operations diagram, identify key messages and impacts to communicate to your stakeholders, and build out the Cloud Operations Organizing Framework communication deck.
“No-one ever solved a problem by restructuring.”
Create a visual to help you abstract, analyze, and clarify your vision for the future state of your organization in order to align and instruct stakeholders.
Create a visual, high-level view of your organization to help you answer questions such as:

Specialization & Focus: A group or work unit developing a focused concentration of skills, expertise, and activities aligned with an area of focus (such as the ones at right).
Decentralization: Operational teams that report to a decentralized IT or business function, either directly or via a “dotted line” relationship.
Decentralization and Specialization can:
Examples: Areas of Focus | Business unit |
| |
Region | |
| |
Service | |
| |
Technology | |
| |
Operational process focus | |
|
“The concept of organization design is simple in theory but highly complex in practice. Like any strategic decision, it involves making multiple trade-offs before choosing what is best suited to a business context.”
– Nitin Razdan & Arvind Pandit
Why don’t we just use teams, groups, squads, or departments, or some other more common term for groups of people working together?
That’s not the goal of this exercise. If the conversation gets stuck on what you do today, it can get in the way of thinking about what you need to do in the future.
1-3 hours
Activity instructions continue on the next slide.
| Input | Output |
|
|
| Materials | Participants |
|
|
1-3 hours
4. As a group, move the work boxes from the workstream diagram into the appropriate work area.
5. Use the space between work areas to describe how work areas must interact to achieve organizational goals. For example:
1 -2 hours
This exercise can be done by one person, then reviewed with the working group at a later time.
This current state diagram helps clarify the changes that may need to happen to get to your future state.
| Input | Output |
|
|
| Materials | Participants |
|
|
Biases | What’s the risk? | Mitigation strategies |
|---|---|---|
Is the team making mistakes due to self-interest, love of a single idea, or groupthink? | Important information may be ignored or left unspoken. | Rigorously check for the other biases, below. Tactfully seek dissenting opinions. |
Do recommendations use unreasonable analogies to other successes or failures? | Opportunities or challenges in the current situation may not be sufficiently understood. | Ask for other examples, and check whether the analogies are still valid. |
Is the team blinkered by the weight of past decisions? | Doubling-down on bad decisions (sunk costs) or ignoring new opportunities. | Ask yourself what you'd do if you were new to the position or organization. |
Does the data support the recommendations? | Data used to make the case isn't a good fit for the challenge, is based on faulty assumptions, or is incomplete. | If you had a year to make the decision, what data would you want? How much can you get? |
Are there realistic alternative recommendations? | Alternatives don't exist or are "strawman" options. | Ask for additional options. |
Is the recommendation too risk averse or cautious? | Recommendations that may be too risky are ignored, leading to missed opportunities. | Review options to accept, transfer, distribute, or mitigate the risk of the decision. |
Framework above adapted from Kahneman, Lovallo, and Sibony (2011)
Thinking of ways you could measure success can help uncover what success actually means to you.
Work collectively to generate success indicators for each key cloud initiative. Success indicators are metrics, with targets, aligned to goals, and if you are able to measure them accurately, they should help you report your progress toward your objectives.
For example, if your driver is “faster access to resources” you might consider indicators like developer satisfaction, project completion time, average time to provision, etc.
There are several reasons you may not publicize these metrics. They may be difficult to calculate or misconstrued as targets, warping behavior in unexpected ways. But managed properly, they have value in measuring operational success!
Examples: Operations redesign project metrics | |
Key stakeholder satisfaction scores | |
IT staff engagement scores | |
Support Delivery of New Functionality | Double number of accepted releases per cycle |
80% of key cloud initiatives completed on time, on budget, and in scope | |
Improve Operational Effectiveness | <1% of servers have more than two major versions out of date |
No more than one capacity-related incident per Q | |
Whiteboard Activity
45 minutes
| Input | Output |
|
|
| Materials | Participants |
|
|
45 minutes
| Input | Output |
|
|
| Materials | Participants |
|
|
Download the Roadmap Tool
“Words, words, words.”
Decision makers: Who do you ultimately need to convince to proceed with any changes you’ve outlined?
Peers: How will managers of other areas be affected by the changes you’re proposing? If you are you suggesting changes to the way that they, or their teams, do their work, you will have to present a compelling case that there’s value in it for them.
Staff: Are you dictating changes or looking for feedback on the path forward?

Be relevant
| Be clear
| Be consistent
| Be concise
|
“We tend to use a lot of jargon in our discussions, and that is a sure fire way to turn people away. We realized the message wasn’t getting out because the audience wasn’t speaking the same language. You have to take it down to the next level and help them understand where the needs are.”
– Jeremy Clement, Director of Finance, College of Charleston
1 hour
Fill out the table below.
Stakeholder group: Identify key stakeholders who may be impacted by changes to the operations team. This might include IT leadership, management, and staff.
Benefits: What’s in it for them?
Impact: What are we asking in return?
How: What mechanisms or channels will you use to communicate?
When: When (and how often) will you get the message out?
Benefits | Impact | How | When | |
|---|---|---|---|---|
IT Mgrs. |
|
|
|
|
Ops Staff |
|
|
|
|
| Input | Output |
|
|
| Materials | Participants |
|
|
Download the Communication Plan Template

Identify skills requirements and gaps as early as possible to avoid skills gaps later. Whether you plan to acquire skills via training or cross-training, hiring, contracting, or outsourcing, effectively building skills takes time. Use Info-Tech’s methodology to address skills gaps in a prioritized and rational way.
Role changes will result in job description changes. |
|
|---|---|
You anticipate changes to the reporting structure. |
|
You anticipate redundancies. |
|
You anticipate new positions. |
|
Training and development budget is required. |
|
Define your cloud vision before it defines you. |
Drive consensus by outlining how your organization will use the cloud. |
Map Technical Skills for a Changing Infrastructure & Operations Organization Be practical and proactive – identify needed technical skills for your future-state environment and the most efficient way to acquire them. |
“2021 GitLab DevSecOps Survey.” Gitlab, 2021.
“2022 State of the Cloud Report.” Flexera, 2022.
“DevOps.” Atlassian, ND. Web. 21 July 2022.
Atwood, Jeff. “The 2030 Self-Driving Car Bet.” Coding Horror, 4 Mar 2022. Web. 5 Aug 2022.
Campbell, Andrew. “What is an operating model?” Operational Excellence Society, 12 May 2016. Web. 13 July 2022.
“DevOps.” Atlassian, ND. Web. 21 July 2022.
Ewenstein, Boris, Wesley Smith, Ashvin Sologar. “Changing change management” McKinsey, 1 July 2015. Web. 8 April 2022.
Franco, Gustavo and Matt Brown. “How SRE teams are organized, and how to get started.” Google Cloud Blog, 26 June 2019. Web. July 13 2022.
“Get started: Build a cloud operations team.” Microsoft, 10 May 2021.
ITIL Foundation: ITIL 4 Edition. Axelos, 2019.
Humble, Jez, Joanne Molesky, and Barry O’Reilly. Lean Enterprise: How High Performance Organizations Innovate at Scale. O’Reilly Media, 2015.
Franco, Gustavo and Matt Brown. “How SRE teams are organized and how to get started.” 26 June 2019. Web. 21 July 2022.
Galbraith, Jay. “The Star Model”. ND. Web. 21 July 2022.
Kahnemanm Daniel, Dan Lovallo, and Olivier Sibony. “Before you make that big decision.” Harv Bus Rev. 2011 Jun; 89(6): 50-60, 137. PMID: 21714386.
Kesler, Greg. “Star Model of Organizational Design.” YouTube, 1 Oct 2018. Web Video. 21 Jul 2022.
Lakhani, Usman. “Site Reliability Engineering: What Is It? Why Is It Important for Online Businesses?” Info-Tech. Web. 25 May 2020.
Mansour, Sherif. “Product Management: The role and best practices for beginners.” Atlassian Agile Coach, n.d.
Murphy, Annie, Jamie Kirwin, Khalid Abdul Razak. “Operating Models: Delivering on strategy and optimizing processes.” EY, 2016.
Shults, Carlos. “What is Platform Engineering? The Concept Behind the Term.” liatrio, 3 Aug 2021. Web. 5 Aug 2022.
Sloss, Benjamin Treynor. Site Reliability Engineering – Part I: Introduction. O’Reilly Media, 2017.
“SRE vs. Platform Engineering.” Ambassador Labs, 8 Feb 2021.
“The Qualities of Leadership: Leading Change.” Cornelius & Associates, n.d. Web.
“Understand cloud operating models.” Microsoft, 02 Sept. 2022.
Velichko, Ivan. “DevOps, SRE, and Platform Engineering.” 15 Mar 2022.
Nenad Begovic Executive Director, Head of IT Operations MUFG Investor Services |
Desmond Durham Manager, ICT Planning & Infrastructure Trinidad & Tobago Unit Trust Corporation |
Virginia Roberts Director, Enterprise IT Denver Water |
Denis Sharp IT/LEAN Consultant |
Three anonymous contributors |
Hybrid work is here, but there is no consensus among industry leaders on how to do it right. IT faces the dual challenge of supporting its own employees while enabling the success of the broader organization. In the absence of a single best practice to adopt, how can IT departments make the right decisions when it comes to the new world of hybrid?
Read this concise report to learn:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read this report to learn how IT departments are using the latest trends in hybrid work for greater IT effectiveness. Understand what work models are best for IT, how IT can support a remote organization, and how hybrid work changes team dynamics.
The pandemic has catapulted hybrid work to the forefront of strategic decisions an organization needs to make. According to our State of Hybrid Work in IT survey conducted in July of 2022, nearly all organizations across all industries are continuing some form of hybrid or remote work long-term (n=518). Flexible work location options are the single greatest concern for employees seeking a new job. IT departments are tasked with not only solving hybrid work questions for their own personnel but also supporting a hybrid-first organization, which means significant changes to technology and operations.
Faced with decisions that alter the very foundation of how an organization functions, IT leaders are looking for best practices and coming up empty. The world of work has changed quickly and unexpectedly. If you feel you are “winging it” in the new normal, you are not alone.
95% of organizations are continuing some form of hybrid or remote work.
n=518
47% of respondents look at hybrid work options when evaluating a new employer, vs. 46% who look at salary.
n=518
Your organization, your employees, your goals – your hybrid work
The days of a “typical” workplace have passed. When it comes to the new world of hybrid work, there is no best-of-breed example to follow.
Among the flood of contradictory decisions made by industry leaders, your IT organization must forge its own path, informed by the needs of your employees and your organizational goals.
All IT work models can support the broader organization. However, IT is more effective in a hybrid work mode.
Stay informed on where your industry is headed, but learn from, rather than follow, industry leaders.
All industries reported primarily using partial, balanced & full hybrid work models.
All industries reported some fully remote work, ranging from 2-10% of organizations surveyed.
Construction and healthcare & life sciences did not require any fully in-office work. Other industries, between 1-12% required fully in-office work.
The uncomfortable truth about hybrid work is that there are many viable models, and the “best of breed” depends on who you ask. In the post-pandemic workspace, for every work location model there is an industry leader that has made it functional. And yet this doesn’t mean that every model will be viable for your organization.
In the absence of a single best practice, rely on an individualized cost-benefit assessment rooted in objective feasibility criteria. Every work model – whether it continues your status quo or overhauls the working environment – introduces risk. Only in the context of your particular organization does that risk become quantifiable.
Don’t make the mistake of emulating the tech giants, unless they are your direct competition. Instead, look to organizations that have walked your path in terms of scope, organizational goals, industry, and organizational structure.
|
External |
Internal |
|---|---|
|
Political Economic Social Technological Legal Environmental |
Operations Culture Resources Risk Benefit Employee Preferences |
Comparative
Your competitors
Info-Tech Insight
Remember, your competitors are not just those who compete for the same customers but also those who compete for your employees.
IT has two roles: to effectively support the broader organization and to function effectively within the department. It therefore has two main stakeholder relationships: the organization it supports and the employees it houses. Hybrid work impacts both. Don't make the mistake of overweighting one relationship at the expense of the other. IT will only function effectively when it addresses both.
|
IT and the organization
|
Diagnostic tool: Business Vision |
|
IT and its employees
|
Diagnostic tool: |
|
|
|
Small <100 |
Medium 101-5,000 |
Large >5,000 |
|
Employees |
100% of industries, organizational sizes, and position levels reported some form of hybrid or remote work.
| 5% | 21% | 30% | 39% | 5% |
|
No Remote |
Partial Hybrid |
Balanced Hybrid |
Full Hybrid |
Full Remote Work |
| 28% | 27% | 22% | 26% | 13% | 4% |
|
None |
Internet/home phone |
Just internet |
Home office setup |
Home utilities |
Other |
n=518
Home office setup: One-time lump-sum payment
Home utilities: Gas, electricity, lights, etc.
Other: Office supplies, portion of home rent/mortgage payments, etc.
Section 1
The promise of hybrid work for IT department effectiveness and the costs of making it happen
In this section:
IT’s effectiveness, meaning its ability to enable organizational goal attainment, is its ultimate success metric. In the post-pandemic world, this indicator is intimately tied to IT’s work location model, as well as IT’s ability to support the work location model used by the broader organization.
In 2022, 90% of organizations have embraced some form of hybrid work (n=516). And only a small contingent of IT departments have more than 90% of roles still working completely in office, with no remote work offered (n=515).
This outcome was not unexpected, given the unprecedented success of remote work during the pandemic. However, the implications of this work model were far less certain. Would productivity remain once the threat of layoffs had passed? Would hybrid work be viable in the long term, once the novelty wore off? Would teams be able to function collaboratively without meeting face to face? Would hybrid allow a great culture
to continue?
All signs point to yes. For most IT departments, the benefits of hybrid work outweigh its costs. IT is significantly more effective when some degree of remote or hybrid work is present.
Remote Work Effectiveness Paradox
When IT itself works fully onsite, lower effectiveness is reported (6.2). When IT is tasked with supporting fully, 100% remote organizations (as opposed to being fully remote only within IT), lower effectiveness is reported then as well (5.9). A fully remote organization means 100% virtual communication, so the expectations placed on IT increase, as do the stakes of any errors. Of note, hybrid work models yield consistent effectiveness scores when implemented at both the IT and organizational levels.
Despite the challenges initially posed by hybrid and remote organizations, IT has thrived through the pandemic and into this newly common workplace.
Most organizations have experienced an unchanged or increased level of service requests and incidents. However, for the majority of organizations, service desk support has maintained (58%) or improved (35%). Only 7% of IT organizations report decreased service desk support.
Is your service desk able to offer the same level of support compared to the pre-pandemic/pre-hybrid work model?
How has the volume of your service requests/incidents changed?
Has hybrid work impacted your customer satisfaction scores?
It is interesting to note that service request volumes have evolved similarly across industries, mirroring the remarkable consistency with which hybrid work has been adopted across disparate fields, from construction to government.
Of note are two industries where the volume of service requests mostly increased: government and media, information, telecom & technology.
With the global expansion of digital products and services through the pandemic, it’s no surprise to see volumes increase for media, information, telecom & technology. With government, the shift from on premises to rapid and large-scale hybrid or remote work for administrative and knowledge worker roles likely meant additional support from IT to equip employees and end users with the necessary tools to carry out work offsite.
How has the volume of your service requests/incidents changed?
Hybrid and remote work have been associated with greater productivity and organizational benefits since before the pandemic. During emergency remote work, doubts arose about whether productivity would be maintained under such extreme circumstances and were quickly dispelled. The promise of remote productivity held up.
Now, cautiously entering a “new normal,” the question has emerged again. Will long-term hybrid work bring the same benefits?
The expectations have held up, with hybrid work benefits ranging from reduced facilities costs to greater employee performance.
Organizational hybrid work may place additional strain on IT,
but it is clear IT can handle the challenge. And when it does,
the organizational benefits are tremendous.
88% of respondents reported increased or consistent Infrastructure & Operations customer satisfaction scores.
What benefits has the organization achieved as a result of moving to a hybrid work model?
Of the organizations surveyed, the vast majority reported significant changes to both the process and the technology side of IT operations. Four key processes affected by the move to hybrid were:
Within Infrastructure & Operations, the area with the greatest degree
of change was network architecture (reported by 44% of respondents), followed closely by service desk (41%) and recovery workspaces and mitigations (40%).
63% of respondents reported changes to conference room technology to support hybrid meetings.
IT Infrastructure & Operations changes, upgrades, and modernization
What process(es) had the highest degree of change in response to supporting hybrid work?
Forty-five percent of respondents reported significant changes to deployment as a result of hybrid work, with an additional 42% reporting minor changes. Only 13% of respondents stated that their deployment processes remained unchanged following the shift to hybrid work.
With the ever-increasing globalization of business, deployment modernization practices such as the shift to zero touch are no longer optional or a bonus. They are a critical part of business operation that bring efficiency benefits beyond just supporting hybrid work.
The deployment changes brought on by hybrid span across industries. Even in manufacturing, with the greatest proportion of respondents reporting “no change” to deployment practices (33%), most organizations experienced some degree of change.
Has a hybrid work model led you to make any changes to your deployment, such as zero touch, to get equipment to end users?
Over half of respondents reported significantly decreased reliance on printed copies as a result of hybrid. While these changes were on the horizon for many organizations even before the pandemic, the necessity of keeping business operations running during lockdowns meant that critical resources could be invested in these processes. As a result, digitization has leapt forward.
This represents an opportunity for businesses to re-evaluate their relationships with printing vendors. Resources spent on printing can be reduced or reallocated, representing additional savings as a result of moving to hybrid. Additionally, many respondents report a willingness – and ability – from vendors to partner with organizations in driving innovation and enabling digitization.
With respect to changes pertaining to hard copies/printers as a result of your hybrid work model:
The majority (63%) of respondents reported making significant changes to conference room technology as a result of hybrid work. A significant proportion (30%) report that such changes were not needed, but this includes organizations who had already set up remote communication.
An important group is the remaining 8% of respondents, who cite budgetary restrictions as a key barrier in making the necessary technology upgrades. Ensure the business case for communication technology appropriately reflects the impact of these upgrades, and reduce the impact of legacy technology where possible:
Have you made changes/upgrades
to the conference room technology to support hybrid meetings?
(E.g. Some participants joining remotely, some participants present in a conference room)
|
Metrics
|
Resources Create a Work-From-Anywhere IT Strategy Stabilize Infrastructure & Operations During Work-From-Anywhere Sustain Work-From-Home in the New Normal |
For a comprehensive list of resources, visit
Info-Tech’s Hybrid Workplace Research Center
Section 2
Cultivate the dream team in a newly hybrid world
In this section:
Since before the pandemic, the intangibles of having a job that works with your lifestyle have been steadily growing in importance. Considerations like flexible work options, work-life balance, and culture are more important to employees now than they were two years ago, and employers must adapt.
Salary alone is no longer enough to recruit the best talent, nor is it the key to keeping employees engaged and productive. Hybrid work options are the single biggest concern for IT professionals seeking new employment, just edging out salary. This means employers must not offer just some work flexibility but truly embrace a hybrid environment.
What are you considering when looking at a potential employer?
Declining economic conditions suggest that a talent market shift may be imminent. Moving toward a recession may mean less competition for top talent, but this doesn't mean hybrid will be left behind as a recruitment tactic.
Just over half of IT organizations surveyed are considering expanding hybrid work or moving to fully remote work even in a recession. Hybrid work is a critical enabler of organizational success when resources are scarce, due to the productivity benefits and cost savings it has demonstrated. Organizations that recognize this and adequately invest in hybrid tools now will have equipped themselves with an invaluable tool for weathering a recession storm, should one come.
What impact could a potential recession in the coming year have on your decisions around your work location?
The potential for a recession has a greater impact on the workforce decisions of small organizations. They likely face greater financial pressures than medium and large-sized organizations, pressures that could necessitate halting recruitment efforts or holding firm on current salaries and health benefits.
A reliance on intangible benefits, like the continuation of hybrid work, may help offset some of negative effects of such freezes, including the risk of lower employee engagement and productivity. Survey respondents indicated that hybrid work options (47%) were slightly more important to them than salary/compensation (46%) and significantly more important than benefits (29%), which could work in favor of small organizations in keeping the critical employees needed to survive an economic downturn.
|
Small |
Medium | Large |
| 90% | 82% | 66% |
Currently considering some form of hiring/salary freeze or cutbacks, if a recession occurs
NOTES
n=520
Small: <101 employees
Medium: 101-5000 employees
Large: >5,000 employees
One advantage of hybrid over remote work is the ability to maintain an in-office presence, which provides a failsafe should technology or other barriers stand in the way of effective distance communication. To take full advantage of this, teams should coordinate tasks with location, so that employees get the most out of the unique benefits of working in office and remotely.
Activities to prioritize for in-office work:
Activities to prioritize for remote work:
As a leader, what are your greatest concerns with hybrid work?
When it comes to leading a hybrid team, there is no ignoring the impact of distance on communication and team cohesion. Among leaders’ top concerns are employee wellbeing and the ability to pick up on signs of demotivation among team members.
The top two tactics used by managers to mitigate these concerns center on increasing communication:
Tactics most used by highly effective IT departments
The most effective hybrid team management tools focus on overcoming the greatest obstacle introduced by remote work: barriers to communication and connection.
The most effective IT organizations use a variety of tactics. For managers looking to improve hybrid team effectiveness, the critical factor is less the tactic used and more the ability to adapt their approach to their team’s needs and incorporate team feedback. As such, IT effectiveness is linked to the total number of tactics used by managers.
IT department effectiveness
Not all hybrid work models are created equal. IT leaders working with hybrid teams have many decisions to make, from how many days will be spent in and out of office to how much control employees get over which days they work remotely.
Employee and manager preferences are largely aligned regarding the number of days spent working remotely or onsite: Two to three days in office is the most selected option for both groups, although overall manager preferences lean slightly toward more time spent in office.
Comparison of leader and employee preference for days in-office
Do employees have a choice in the days they work in office/offsite?
For most organizations, employees get a choice of which days they spend working remotely. This autonomy can range from complete freedom to a choice between several pre-approved days depending on team scheduling needs.
Organizations’ success in establishing hybrid team autonomy varies greatly post pandemic. Responses are roughly equally split between staff feeling more, less, or the same level of autonomy as before the pandemic. Evaluated in the context of most organizations continuing a hybrid approach, this leads to the conclusion that not all hybrid implementations are being conducted equally effectively when it comes to employee empowerment.
As an employee, how much control do you have over the decisions related to where, when, and how you work currently?
A strong case can be made for fostering autonomy and empowerment on hybrid teams. Employees who report lower levels of control than before the pandemic also report lower engagement indicators, such as trust in senior leadership, motivation, and intention to stay with the organization. On the other hand, employees experiencing increased levels of control report gains in these areas.
The only exception to these gains is the sense of team connectedness, which employees experiencing more control report as lower than before the pandemic. A greater sense of connectedness among employees reporting decreased control may be related to more mandatory in-office time or a sense of connection over shared team-level disengagement.
These findings reinforce the need for hybrid teams to invest in team building and communication practices and confirm that significant benefits are to be had when a sense of autonomy can be successfully instilled.
Employees who experience less control than before the pandemic report lowered engagement indicators ... except sense of connectedness
Employees who experience more control than before the pandemic report increased engagement indicators ... except sense of connectedness
|
The Power of Intentionality When the pandemic hit, technology was not in question. Flexible work options had been available and widely used, and the technology to support them was in place. The leadership team turned their focus to ensuring their culture survived and thrived. They developed a laser-focused approach for engaging their employees by giving their leaders tools to hold conversations. The dialogue was ongoing to allow the organization to adapt to the fast pace of changing conditions. Every tactic, plan, and communication started with the question, “What outcome are we striving for?” With a clear outcome, tools were created and leaders supported to drive the desired outcome. |
“We knew we had the technology in place. Our concern was around maintaining our strong culture and ensuring continued engagement and connection with our employees.” – Lisa Gibson, Chief of Staff, Microsoft Canada |
Metrics
| Resources Webinar: Effectively Manage Remote Teams Build a Better Manager: Manage Your People |
For a comprehensive list of resources, visit
Info-Tech’s Hybrid Workplace Research Center
|
BE INTENTIONAL
|
|
INVOLVE EMPLOYEES
|
|
ALLOW CHOICE
|
|
BE TRANSPARENT
|
Info-Tech Insight
Hybrid and remote teams require more attention, connection, and leadership from managers. The shift from doing the day-to-day to effectively leading is critical for the success of nontraditional work models. As hybrid and remote work become engrained in society, organizations must ensure that the concept of the “working manager” is as obsolete as the rotary telephone.
“8 Unexpected Benefits of Online Learning for Development.” Center for Creative Leadership (CCL), 14 Oct. 2020. Accessed 5 Nov. 2021.
“2021 Global Workplace Report.” NTT, 2021. Accessed 6 July 2022.
“Advantages of Online Learning for Leadership Development: What Our Research Says.” CCL, 8 Dec. 2020. 5 Nov. 2021.
“Annual Work Trend Index Report – Great Expectations: Making Hybrid Work Work.” Microsoft WorkLab, 2022. Accessed 6 July 2022.
Aten, Jason. “Google’s Employees Return to the Office Today. This Former Exec Says Hybrid Work Won’t Last.” Inc.Com, 4 April 2022. Web.
Bariso, Justin. “Google Spent 2 Years Researching What Makes a Great Remote Team. It Came Up With These 3 Things.” Inc.Com, 8 April 2019. Web.
Berger, Chloe. “What Is ‘Hybrid Guilt’? Going to Office Part-Time May Be Worst Option.” Fortune, 22 Aug. 2022. Web.
Brodkin, Jon. “After Remote-Work Ultimatum, Musk Reveals Plan to Cut 10% of Tesla Jobs.” Ars Technica, 3 June 2022. Web.
Brown, Brené, host. “Brené with Scott Sonenshein on Why We’ll Never Be the Same Again (and Why It’s Time to Talk About It).” Dare to Lead with Brené Brown, 11 April 2022. Brené Brown, https://brenebrown.com/podcast/why-well-never-be-the-same-again-and-why-its-time-to-talk-about-it/.
Burgess, Mark. “Most Asset Managers Operating Under Hybrid Work Model: Survey.” Advisor’s Edge, 13 Sept. 2022. Web.
Caminiti, Susan. “Workers Want Hybrid but Say It’s Exhausting Them. Here’s How Companies Can Fix That.” CNBC, 8 Feb. 2022. Web.
Capossela, Chris. “The next Chapter of Our Hybrid Workplace: Update on Our Washington State Work Sites.” The Official Microsoft Blog, 14 Feb. 2022. Web.
Carrigan, John. “Meta Embraces ‘Work From Anywhere’ Ahead of Return to Office.” Human Resources Director, 25 March 2022. Web.
Chaturvedi, H., and Ajoy Kumar Dey. The New Normal: Reinventing Professional Life and Familial Bonding in the Post COVID 19 Era. Bloomsbury Publishing, 2021.
Commonwealth of Massachusetts. “Alternative Work Options.” Mass.Gov, n.d. Accessed 17 Sept. 2022.
Commonwealth of Massachusetts. “Hybrid Work for Commonwealth Employees.” Mass.Gov, n.d. Accessed 17 Sept. 2022.
“COVID-19 and the Future of Business.” IBM, 21 Sept. 2020. Web.
Daniel, Will. “The Layoffs at Tesla Show That White-Collar Workers Are Screwed, Hedge Funder Famous from ‘The Big Short’ Predicts.” Fortune, 29 June 2022. Web.
D’Auria, Gemma, and Aaron De Smet. “Leadership in a Crisis: Responding to Coronavirus.” McKinsey, 16 March 2020. Web.
Dave, Paresh. “Google Mandates Workers Back to Silicon Valley, Other Offices from April 4.” Reuters, 3 March. 2022. Web.
Delaney, Kevin. “What We Know Now About the Business Impact of Hybrid Work.” Time, 6 Sept. 2022. Web.
Dobson, Sarah. “Legal Considerations for Hybrid Work.” Canadian HR Reporter, 15 Sept. 2022. Web.
Dondo, Jean. “Hybrid Work Is the Way for More Than a Quarter of Canadian Investment Firms.” Wealth Professional, 14 Sept. 2022. Web.
Elias, Jennifer. “Twitter to Reopen Offices March 15, Though Remote Work Remains an Option.” CNBC, 3 March 2022. Web.
Esade Business & Law School. “Leadership After Covid-19: Learning To Navigate The Unknown Unknowns.” Forbes, 30 March 2021. Web.
“Famous Companies Without Offices.” The Hoxton Mix, 19 Oct. 2021. Web.
Gerdeman, Dina. “COVID Killed the Traditional Workplace. What Should Companies Do Now?” HBS Working Knowledge, 8 March 2021. Web.
Gleason, Mike. “Apple’s Hybrid Work Plans Draw Worker Pushback.” SearchUnifiedCommunications, TechTarget, 24 Aug. 2022. Web.
Gleeson, Brent. “13 Tips For Leading And Managing Remote Teams.” Forbes, 26 Aug. 2020. Web.
Gratton, Lynda. “How to Do Hybrid Right.” Harvard Business Review, 1 May 2021. Web.
“Guide: Understand team effectiveness.” re:Work, Google, n.d. Accessed 5 Nov. 2021.
Hardy, Karen. “Your Business Has Decided on Hybrid Work… Now What?” CIO, 12 Sept. 2022. Web.
Hirsch, Arlene S. “How to Boost Employee Performance in a Hybrid Work Environment.” SHRM, 6 Sept. 2022. Web.
“How to Get Hybrid Work Right.” CBRE Canada, 14 June 2022. Web.
“Hybrid Work: When Freedom Benefits from Rules.” Audi, 12 Sept. 2022. Accessed 18 Sept. 2022.
“Hybrid Workplace | Global Culture Report.” O.C. Tanner, 2022, Web.
“Intel Is Hiring for Various Roles with Temporary Remote Work Benefits.” SightsIn Plus, 11 June 2022. Web.
Iyer, Viswanathan. “Council Post: Hybrid Work: Beyond The Point Of No Return.” Forbes, 14 Sept. 2022. Web.
Johnson, Ricardo. “Securing Hybrid Work All Starts with Zero-Trust.” SC Media, 29 Aug. 2022. Web.
Jones, Jada. “The Rules of Work Are Changing, and Hybrid Work Is Winning.” ZDNET, 1 Sept. 2022. Web.
Kowitt, Beth. “Inside Google’s Push to Nail Hybrid Work and Bring Its 165,000-Person Workforce Back to the Office Part-Time.” Fortune, 17 May 2022. Web.
Kumra, Gautam, and Diaan-Yi Lin. “The Future of (Hybrid) Work.” McKinsey, 2 Sept. 2022. Web.
Lagowska, Urszula, et al. “Leadership under Crises: A Research Agenda for the Post-COVID-19 Era.” Brazilian Administration Review, vol. 17, no. 2, Aug. 2020. Web.
Larson, Barbara Z., et al. “A Guide to Managing Your (Newly) Remote Workers.” Harvard Business Review, 18 March 2020. Web.
“Leadership During COVID-19: Resources for Times of Uncertainty.” CCL, n.d. Accessed 5 Nov. 2021.
“Managing Remote Employees: How to Lead From a Distance.” CCL, 7 April 2020. Accessed 5 Nov. 2021.
“Managing Remote Teams.” Know Your Team, n.d. Web. Accessed 5 Nov. 2021.
Mayhem, Julian. “Virtual Leadership - Essential Skills for Managing Remote Teams.” VirtualSpeech, 4 Nov. 2020. Web.
McKendrick, Joe. “Keeping Hybrid Workers In Sync, Digitally And In-Person.” Forbes, 22 Aug. 2022. Web.
McKenna, Karissa, et al. “Webinar: Build Leadership Skills for the New World of Work.” CCL, 15 June 2020. Accessed 5 Nov. 2021.
Mearian, Lucas. “Microsoft Edges Back to ‘Normal’ with Workplace Reopening Plan.” Computerworld, 14 Feb. 2022. Web.
“Meta Careers.” Meta, n.d. Accessed 17 Sept. 2022.
Miller, Mark. “5 Tips to Make Your Hybrid Work Model More Effective.” Entrepreneur, 25 Aug. 2022. Web.
Nica, Irina. “How to Manage a Remote Team: 14 Effective Tips for Your Business.” Business 2 Community, 8 July 2021. Web.
O’Halloran, Joe. “Organisations Struggle to Support IT in a Hybrid Work Model.” ComputerWeekly.com, 17 June 2022. Web.
Ong, Ivan. “Council Post: Why Hybrid Work Is The Way To Go.” Forbes, 12 Sept. 2022. Web.
Osborne, Charlie. “The End of Fully Remote Work? Google Begins Shift to the Hybrid Office.” ZDNet. 3 March 2022. Web.
Pazzanese, Christina. “Back to Office? Stay Remote? Go Hybrid?” Harvard Gazette, 24 Aug. 2022. Web.
“PinFlex.” Pinterest Careers, n.d. Accessed 17 Sept. 2022.
Rand, Ben. “Does Hybrid Work Actually Work? Insights from 30,000 Emails.” Harvard Business School – Working Knowledge, 6 Sept. 2022. Web.
“Remote Locations, Working with Flexibility.” Amazon.jobs, n.d. Accessed 17 Sept. 2022.
Renjen, Punit. “The Heart of Resilient Leadership: Responding to COVID-19.” Deloitte Insights, 16 March 2020. Web.
Shih, Clara. “Keeping Hybrid Employees Engaged.” Harvard Business Review, 11 Aug. 2022. Web.
Singerman, Michelle. “Is the Hybrid Work Model Working? CPAs Spill the Beans.” Chartered Professional Accountants Canada, 24 Aug. 2022. Web.
Stern, Stefan. “Hybrid Working: Why the Office-Home Balance Is Still a Challenge.” Financial Times, 4 Sept. 2022.
Subramaniam, Vanmala, et al. “Ready to Go Back to the Office? Employers and Workers Are Divided over the Fate of Remote Work.” The Globe and Mail, 1 Sept. 2022. Web.
Tong, Goh Chiew. “Inflation and Hybrid Work ‘skyrocketed’ Demand for Flexible Workspace, WeWork Says.” CNBC, 6 Sept. 2022. Web.
Tsipursky, Gleb. “Commentary: The Psychology behind Why Some Leaders Are Resisting a Hybrid Work Model.” Fortune, 8 June 2021. Web.
Turner, Jack. “Tesla Doubles Down on Remote Working Ban, Tracks Office Attendance.” Tech.Co, 3 July 2022. Web.
“Virtual Leadership Styles for Remote Businesses.” Maryville Online, 4 Feb. 2021. Web.
“Webinar: How Leaders Can Build Organizational Resilience.” CCL, 15 June 2020. Accessed 5 Nov. 2021.
“Why GitLab Uses the Term All-Remote to Describe Its 100% Remote Workforce.” GitLab, 2022. Accessed 17 Sept. 2022.
Wigert, Ben, and Sangeeta Agrawal. “Returning to the Office: The Current, Preferred and Future State of Remote Work.” Gallup, 31 Aug. 2022. Web.
Wingard, Jason. “Elon Musk’s Big Bet Against Remote Work: Will Tesla Win?” Forbes, 4 June 2022. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build a foundational understanding of the current big data landscape.
Appraise current capabilities for handling a big data initiative and revisit the key data management practices that will enable big data success.
Armed with Info-Tech’s variety dimension framework, identify the top use cases and the data sources/elements that will power the initiative.
Leverage a repeatable framework to detail the core components of the pilot project.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the basic elements of big data and its relationship to traditional business intelligence.
Common, foundational knowledge of what big data entails.
1.1 Determine which of the four Vs is most important to your organization.
1.2 Explore new data through a social lens.
1.3 Brainstorm new opportunities for enhancing current reporting assets with big data sources.
Relative importance of the four Vs from IT and business perspectives
High-level improvement ideas to report artifacts using new data sources
Establish an understanding of current maturity for taking on big data, as well as revisiting essential data management practices.
Concrete idea of current capabilities.
Recommended actions for developing big data maturity.
2.1 Determine your organization’s current big data maturity level.
2.2 Plan for big data management.
Established current state maturity
Foundational understanding of data management practices in the context of a big data initiative
Explore a plethora of potential use cases at the industry and business unit level, followed by using the variety element of big data to identify the highest value initiative(s) within your organization.
In-depth characterization of a pilot big data initiative that is thoroughly informed by the business context.
3.1 Identify big data use cases at the industry and/or departmental levels.
3.2 Conduct big data brainstorming sessions in collaboration with business stakeholders to refine use cases.
3.3 Revisit the variety dimension framework to scope your big data initiative in further detail.
3.4 Create an organizational 4-column data flow model with your big data sources/elements.
3.5 Evaluate data sources by considering business value and risk.
3.6 Perform a value-effort assessment to prioritize your initiatives.
Potential big data use cases
Potential initiatives rooted in the business context and identification of valuable data sources
Identification of specific data sources and data elements
Characterization of data sources/elements by value and risk
Prioritization of big data use cases
Put together the core components of the pilot project and set the stage for enterprise-wide support.
A repeatable framework for implementing subsequent big data initiatives.
4.1 Construct a work breakdown structure for the pilot project.
4.2 Determine your project’s need for a data scientist.
4.3 Establish the staffing model for your pilot project.
4.4 Perform a detailed cost/benefit analysis.
4.5 Make architectural considerations for supporting the big data initiative.
Comprehensive list of tasks for implementing the pilot project
Decision on whether or not a data scientist is needed, and where data science capabilities will be sourced
RACI chart for the project
Big data pilot cost/benefit summary
Customized, high-level architectural model that incorporates technologies that support big data
Your challenge:
Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This Executive Brief will build your skills on how to price new products or adjust pricing for existing products.
This blueprint will build your skills on how to price new products or adjust pricing for existing products with documented key steps to complete the pricing project and use the Excel workbook and customer presentation.
These five organizational workbooks for product pricing priorities, interview tracking, sample questions, and critical competitive information will enable the price team to validate price change data through researching the three pricing schemes (competitor, customer, and cost-based).
This template includes the business case to justify product repricing, contract modifications, and packaging rebuild or removal for launch. This template calls for the critical summarized results from the Optimize Software Pricing in a Volatile Competitive Market blueprint and the Optimize Software Pricing in a Volatile Competitive Market Workbook to complete.
SoftwareReviews — A Division of INFO~TECH RESEARCH GROUP
Product managers without well-documented and repeatable pricing management processes often experience pressure from “Agile” management to make gut-feel pricing decisions, resulting in poor product revenue results. When combined with a lack of customer, competitor, and internal cost understanding, these process and timing limitations drive most product managers into suboptimal software pricing decisions. And, adding insult to injury, the poor financial results from bad pricing decisions aren’t fully measured for months, which further compounds the negative effects of poor decision making.
A successful product pricing strategy aligns finance, marketing, product management, and sales to optimize pricing using a solid understanding of the customer perception of price/value, competitive pricing, and software production costs.
Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and data. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.
This blueprint will build your skills on how to price new products or adjust pricing for existing products. The discipline you build using our pricing strategy methodology will strengthen your team’s ability to develop repeatable pricing and will build credibility with senior management and colleagues in marketing and sales.
|
Joanne Morin Correia
|
Organizations struggle to build repeatable pricing processes:
|
Obstacles add friction to the pricing management process:
|
Use SoftwareReviews’ approach for more successful pricing:
|
Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and they will make ongoing adjustments based on an ability to monitor buyers, competitors, and product cost changes.
| “Customer discovery interviews help reduce the chance of failure by testing your hypotheses. Quality customer interviews go beyond answering product development and pricing questions.” (Pricing Strategies, Growth Ramp, March 2022)
Most product managers just research their direct competitors when launching a new SaaS product. While this is essential, competitive pricing intel is insufficient to create a long-term optimized pricing strategy. Leaders will also understand buyer TCO. Your customers are constantly comparing prices and weighing the total cost of ownership as they consider your competition. Why? Implementing a SaaS solution creates a significant time burden as buyers spend days learning new software, making sure tools communicate with each other, configuring settings, contacting support, etc. It is not just the cost of the product or service. |
Optimized Price Strategy Is…
|
Price Strategy Is Not…
|
An optimized pricing strategy establishes the “best” price for a product or service that maximizes profits and shareholder value while considering customer business value vs. the cost to purchase and implement – the total cost of ownership (TCO).
Product managers are currently experiencing the following:
|
Doing nothing is NOT an option!
|
| Among product managers, limited pricing skills are big obstacles that make pricing difficult and under-optimized.
|
The top three weakest product management skills have remained constant over the past five years:
|
Pricing teams can improve software product profitability by:
|
Software pricing leaders will regularly assess:
Has it been over a year since prices were updated? Have customers told you to raise your prices? Do you have the right mix of customers in each pricing plan? Do 40% of your customers say they would be very disappointed if your product disappeared? (Adapted from Growth Ramp, 2021) |
Case StudyMiddleware Vendor |
INDUSTRY
|
SOURCE
|
| A large middleware vendor, who is running on Microsoft Azure, known for quality development and website tools, needed to react strategically to the March 2022 Microsoft price increase.
Key Initiative: Optimize New Pricing Strategy The program’s core objective was to determine if the vendor should implement a price increase and how the product should be packaged within the new pricing model. For this initiative, the company interviewed buyers using three key questions: What are the core capabilities to focus on building/selling? What are the optimal features and capabilities valued by customers that should be sold together? And should they be charging more for their products?Results
|
The Optimize New Pricing Strategy included the following components:
|
| As a collaborative team across product management, marketing, and finance, we see leaders taking a simple yet well-researched approach when setting product pricing.
Iterating to a final price point is best done with research into how product pricing:
|
To arrive at our new product price, we suggest iterating among 3 different views:
New Target Price:
|
Who should care about optimized pricing?Product managers and marketers who:
Finance, sales, and marketing professionals who are pricing stakeholders in:
|
How will they benefit from this research?
|
Is Your Pricing Strategy Optimized?With the right pricing strategy, you can invest more money into your product, service, or growth. A 1% price increase will improv revenues by:
Price monetization will almost double the revenue increases over customer acquisition and retention. (Pricing Strategies, Growth Ramp, March 2022) |
DIAGNOSE PRICE CHALLENGESPrices of today's cloud-based services/products are often misaligned against competition and customers' perceived value, leaving more revenues on the table.
|
|||
OPTIMIZE THESE STEPS
|
||||
|
||||
Steps |
1.1 Establish the Team and Responsibilities
1.2 Educate/Align Team on Pricing Strategy 1.2 Document Portfolio & Target Product(s) for Pricing Updates 1.3 Clarify Product Target Margins 1.4 Establish Customer Price/Value 1.5 Identify Competitive Pricing 1.6 Establish New Price and Gain Buy-In |
Outcomes |
|
Ground pricing against financialsMeet and align with financial stakeholders.
|
Align on pricing strategyLead stakeholders in SaaS product pricing decisions to optimize pricing based on four drivers:
|
Decrease time for approvalDrive price decisions, with the support of the CFO, to the business value of the suggested change:
|
| Develop the skill of pricing products
Increase product revenues and margins by enhancing modern processes and data monetization. Shift from intuitive to information-based pricing decisions. |
Look at other options for revenue
Adjust product design, features, packaging, and contract terms while maintaining the functionality customers find valuable to their business. |
Key deliverable:
New Pricing Strategy Presentation TemplateCapture key findings for your price strategy with the Optimize Your Pricing in a Volatile Competitive Market Strategy Presentation Template
|
Optimize Software Pricing in a Volatile Competitive Market Executive BriefThis executive brief will build your knowledge on how to price new products or adjust pricing for existing products.
|
Optimize Software Pricing in a Volatile Competitive Market WorkbookThis workbook will help you prioritize which products require repricing, hold customer interviews, and capture competitive insights.
|
A Guided Implementation (GI) is a series of calls with a SoftwareReviews analyst to help implement our best practices in your organization.
A typical GI is 4 to 8 calls over the course of 2 to 4 months.
What does a typical GI on optimizing software pricing look like?
Alignment |
Research & Reprice |
Buy-in |
| Call #1: Share the pricing team vision and outline activities for the pricing strategy process. Plan next call – 1 week.
Call #2: Outline products that require a new pricing approach and steps with finance. Plan next call – 1 week. Call #3: Discuss the customer interview process. Plan next call – 1 week. Call #4 Outline competitive analysis. Plan next call – 1 week. |
Call #5: Review customer and competitive results for initial new pricing business case with finance for alignment. Plan next call – 3 weeks.
Call #6: Review the initial business case against financial plans across marketing, sales, and product development. Plan next call – 1 week. |
Call #7 Review the draft executive pricing presentation. Plan next call – 1 week.
Call #8: Discuss gaps in executive presentation. Plan next call – 3 days. |
| Included in Advisory Membership | Optional add-ons | ||
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Workshop overview |
Contact your account representative for more information.
|
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
Align Team, Identify Customers, and Document Current Knowledge |
Validate Initial Insights and Identify Competitors and Market View |
Schedule and Hold Buyer Interviews |
Summarize Findings and Provide Actionable Guidance to Stakeholders |
Present, Go Forward, and Measure Impact and Results |
|
| Activities |
1.1 Identify Team Members, roles, and responsibilities 1.2 Establish timelines and project workflow 1.3 Gather current product and future financial margin expectations 1.4 Review the Optimize Software Executive Brief and Workbook Templates 1.4 Build prioritized pricing candidates hypothesis |
2.1 Identify customer interviewee types by segment, region, etc. 2.2 Hear from industry analysts their perspectives on the competitors, buyer expectations, and price trends 2.3 Research competitors for pricing, contract type, and product attributes |
3.2 Review pricing and attributes survey and interview questionnaires 3.2 Hold interviews and use interview guides (over four weeks) A gap of up to 4 weeks for scheduling of interviews. 3.3 Hold review session after initial 3-4 interviews to make adjustments |
4.1 Review all draft price findings against the market view 4.2 Review Draft Executive Presentation |
5.1 Review finalized pricing strategy plan with analyst for market view 5.2 Review for comments on the final implementation plan |
| Deliverables |
|
|
|
|
|
Our processAlign team, perform research, and gain executive buy-in on updated price points
Optimize Software Pricing in a Volatile Competitive Market |
Our process will help you deliver the following outcomes:
This project involves the following participants:
|
Input: Steering committee roles and responsibilities, Steering committee interest and role
Output: List of new pricing strategy steering committee and workstream members, roles, and timelines, Updated Software Pricing Strategy presentation
Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: CFO, sponsoring executive, Functional leads – development, product marketing, product management, marketing, sales, customer success/support
1-2 hoursDownload the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Pricing steering committees are needed to steer overall product, pricing, and packaging decisions. Some companies include the CEO and CFO on this committee and designate it as a permanent body that meets monthly to give go/no-go decisions to “all things product and pricing related” across all products and business units.
Input: Typically, a joint recognition that pricing strategies need upgrading and have not been fully documented, Steering committee and working team members
Output: Communication of team members involved and the makeup of the steering committee and working team, Alignment of team members on a shared vision of “why a new price strategy is critical” and what key attributes define both the need and impact on business
Materials: Optimize Your Software Strategy Executive Brief PowerPoint presentation
Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales, SoftwareReviews marketing analyst (optional)
Download the Optimize Software Pricing in a Volatile Competitive Market Executive Brief
Input: List of entire product portfolio
Output: Prioritized list of product candidates that should be repriced
Materials: Optimize Software Pricing in a Volatile Competitive Market Executive Brief presentation, Optimize Software Pricing in a Volatile Competitive Market Workbook
Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales
Download the Optimize Software Pricing in a Volatile Competitive Market Workbook
2-3 sessions of 1 Hour each
Input: Finance partner/CFO knowledge of target product current and future margins, Finance partner/CFO who has information on underlying costs with details that illustrate supplier contributions
Output: Product finance markup target percentage margins and revenues
Materials: Finance data on the product family, Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: Initiative manager, Finance partner/CFO
Download the Optimize Software Pricing in a Volatile Competitive Market Workbook
Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
1-4 weeks
Input: Identify segments within which you require price-to-value information, Understand your persona insight gaps, Review Sample Interview Guide using the Optimize Software Pricing in a Volatile, Competitive Market Workbook, Tab 4. Interview Guide.
Output: List of interviewees, Updated Interview Guide
Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: Initiative manager, Customer success to help identify interviewees, Customers, prospects
Download the Optimize Software Pricing in a Volatile Competitive Market Workbook
Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
1-2 weeks
Input: Identify price candidate competitors, Your product pricing, contract type, and product attribute information to compare against, Knowledge of existing competitor information, websites, and technology research sites to guide questions
Output: Competitive product average pricing
Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: Initiative manager, Customers, prospects
Download the Optimize Software Pricing in a Volatile Competitive Market Workbook
Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
2-3 hours
Input: Findings from competitive, cost-plus, and customer price/value analysis
Output: Approvals for price change
Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: Initiative manager, Steering committee, Working team – typically representatives in product marketing, product management, sales
Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Summary of AccomplishmentProblem SolvedWith the help of this blueprint, you have deepened your and your company’s understanding of how to look at new pricing opportunities and what the market and the buyer will pay for your product. You are among the minority of product and marketing leaders that have thoroughly documented their new pricing strategy and processes – congratulations!The benefits of having led your team through the process are significant and include the following:
|
If you would like additional support, contact us and we’ll make sure you get the professional expertise you need. Contact your account representative for more information. info@softwarereviews.com |
“Chapter 4 Reasons for Project Failure.” Kissflow's Guide to Project Management. Kissflow, n.d. Web.
Edie, Naomi. “Microsoft Is Raising SaaS Prices, and Other Vendors Will, Too.” CIO Dive, 8 December 2021. Web.
Gruman, Galen, Alan S. Morrison, and Terril A. Retter. “Software Pricing Trends.” PricewaterhouseCoopers, 2018. Web.
Hargrave, Marshall. “Example of Economic Exposure.” Investopedia, 12 April 2022. Web.
Heaslip, Emily. “7 Smart Pricing Strategies to Attract Customers.” CO—, 17 November 2021. Web.
Higgins, Sean. “How to Price a Product That Your Sales Team Can Sell.” HubSpot, 4 April 2022. Web.
“Pricing Strategies.” Growth Ramp, March 2022. Web.
“Product Management Skills Benchmark Report 2021.” 280 Group, 9 November 2021. Web.
Quey, Jason. “Price Increase: How to Do a SaaS Pricing Change in 8 Steps.” Growth Ramp, 22 March 2021. Web.
Steenburg, Thomas, and Jill Avery. “Marketing Analysis Toolkit: Pricing and Profitability Analysis.” Harvard Business School, 16 July 2010. Web.
“2021 State of Competitive Intelligence.” Crayon and SCIO, n.d. Web.
Valchev, Konstantin. “Cost of Goods Sold (COGS) for Software-as-a-Service (SaaS) Business.” OpenView Venture Partners, OV Blog, 20 April 2020. Web.
“What Is Price Elasticity?” Market Business News, n.d. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Educate managers on the impact they have on engagement.
Learn the 3 I’s of engagement and understand IT leaders as role models for engagement.
Determine the logistics of the training session: the who, what, and where.
Determine ways to track the impact the training has on employee engagement.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Educate managers on the impact they have on engagement and the relationship between employee trust and engagement.
Identify reasons why managers fail to positively impact employee engagement.
Inform managers of their responsibility for employee engagement.
Increased awareness of managers regarding their impact on employee engagement.
Improved understanding of manager role.
Creation of plan to increase employee trust and engagement.
1.1 Describe relationship between trust and engagement.
1.2 Review data on manager’s impact on engagement.
Gain an understanding of the 3 I’s of building trust.
Address key objections managers might have.
Understand key concepts for engagement, such as inform, interact, and involve.
Use McLean & Company’s advice to get past pain points with managers.
Understand the key principles and activities in the manager training deck.
Gain advice for dealing with pushback from managers.
Learn about actions that you can take to adopt the 3 I’s principle and act as a role model.
2.1 Practice manager training exercises on informing, interacting with, and involving employees.
Become familiar with and prepared to take managers through key training exercises.
Determine who will participate in the manager training session.
Become familiar with the content in the training deck and ensure the provided examples are appropriate.
Logistics planned for your own training session.
Your own case made more powerful by adding your engagement data to the training deck slides.
Improved delivery of training, making it more effective and engaging for participants.
3.1 Consider your audience for delivering the training.
3.2 Plan out logistics for the training session—the who, where, and when.
Ensure that your training sessions include the appropriate participants.
Deliver a smooth and successful training session.
Determine ways to track the impact the training has on employee engagement.
Understand how to apply the 3 I’s principle across HR functions.
Measure the value of engagement training.
Gain immediate feedback on employee engagement with the McLean Leadership Index.
Determine how HR can support managers in building stronger relationships with employees.
4.1 Determine how HR can support management in strengthening employee relationships.
Create a culture of trust throughout the organization.
Well, your clients demand it. And it makes business sense; it is much cheaper to retain a client than to acquire new ones. By all means, always expand your client base; just don't make it a zero-sum game by losing clients because you cannot provide decent service.
Although the term has existed since the 17th century, it has only received legal attention since 2020. Now, several years later, the EU and the US require companies to prove their resilience.
To understand what resilience is, please read our article on resilience.
IT resilience is a mindset, a collection of techniques, and people management focused on providing consistent service to clients, all rolled into one discipline. While we discuss IT resilience, it takes more than IT staff or IT processes to become a truly resilient business.
Here are 10 themes relevant to the (IT) resilient organization:
A transparent company culture empowers its people to act confidently, respond swiftly to challenges, and continuously learn and improve. This builds a strong foundation for resilience, enabling the organization to navigate disruption or adversity much more easily.
At its core, transparency is about open communication, sharing information, and fostering a culture of honesty and trust. These traits directly influence the various aspects of resilience.
A client service focus isn't just about customer satisfaction; it's an integral part of a company's resilience strategy. Service stability and continuous value delivery are the elements that retain existing clients and attract new ones through reputation. System outages, slowdowns, and errors lead to client frustration and erode confidence. In other words, client service focuses on making sure you are available. Once you have that, then you can look at enhancing and expanding services and products.
Resilient systems and processes often also include tools and capabilities for proactive communication with clients. This can include automated notifications during system maintenance or updates, providing transparency and minimizing inconvenience. A proactive approach to communication creates a sense of partnership, and it demonstrates that you value your clients' time and business.
Adaptable systems and processes give you the flexibility for rapid incident response and easy workarounds, bringing your service back to the level it is supposed to be at.
In the bigger picture, when you design your systems for flexibility and modification, you can rapidly adjust to new market conditions, evolving customer demands, and technological advancements. This agility allows you to pivot swiftly, seizing opportunities while mitigating risks.
In the same vein, adaptable processes, fostered by a culture of continuous improvement and open communication, empower teams to innovate and refine workflows in response to challenges. This constant evolution ensures the company remains competitive and aligned with its ever-changing environment.
When you establish standardized procedures for planning, testing, and implementing changes, IT change management ensures that every modification, no matter how seemingly small, is carefully considered and assessed for its impact on the broader IT ecosystem. This structured approach significantly reduces the risk of unexpected side effects, unforeseen conflicts, and costly downtime, protecting the company's operations and its reputation.
It does not have to be a burdensome bureaucratic process. Modern processes and tools take the sting out of these controls. Many actions within change management can be automated without losing oversight by both the IT custodians and the business process owners.
By having duplicates of essential components or systems in place, you ensure that even if one part fails, another is ready to take over. This helps you minimize the impact of unexpected events like hardware issues, software glitches, or other unforeseen problems. This might mean replicating critical policy data across multiple servers or data centers in different locations.
Fault tolerance is all about your systems and processes being able to keep working even when facing challenges. By designing your software and systems architecture with fault tolerance in mind, you are sure it can gracefully handle errors and failures, preventing those small problems from causing bigger issues, outages, and unhappy clients.
Clients entrust you with valuable information. Demonstrating a commitment to data security through resilient systems builds trust and provides reassurance that their data is safeguarded against breaches and unauthorized access.
Trusting that all working is good. making sure is better. When you observe your systems and receive timely notifications when something seems off, you'll be able to address issues before they snowball into real problems.
In any industry, monitoring helps you keep an eye on crucial performance metrics, resource usage, and system health. You'll get insights into how your systems behave, allowing you to identify bottlenecks or potential points of failure before they cause serious problems. And with a well-tuned alerting system, you'll get those critical notifications when something requires immediate attention. This gives you the chance to respond quickly, minimize downtime, and keep things running smoothly for your customers.
Monitoring is also all about business metrics. Keep your service chains running smoothly and understand the ebb and flow of when clients access your services. Then update and enhance in line with what you see happening.
Well-thought-out plans and processes are key. Work with your incident managers, developers, suppliers, business staff and product owners and build an embedded method for reacting to incidents.
The key is to limit the time of the service interruption. Not everything needs to be handled immediately, so your plan must be clear on how to react to important vs lower-priority incidents. Making the plan and process well-known in the company helps everybody and keeps the calm.
Business continuity planning anticipates and prepares for various scenarios, allowing your company to adapt and maintain essential functions even in the face of unexpected disruptions.
When you proactively address these non-IT aspects of recovery, you build resilience that goes beyond simply restoring technology. It enables you to maintain customer relationships, meet contractual obligations, and safeguard your reputation, even in the face of significant challenges.
Business continuity is not about prevention; it is about knowing what to do when bad things happen that may threaten your company in a more existential way or when you face issues like a power outage in your building, a pandemic, major road works rendering your business unreachable and such events.
Disaster recovery is your lifeline when the worst happens. Whether it's a major cyberattack, a natural disaster, or a catastrophic hardware failure, a solid disaster recovery plan ensures your business doesn't sink. It's your strategy to get those critical systems back online and your data restored as quickly as possible.
Think of it this way: disaster recovery, just like business continuity, isn't about preventing bad things from happening; it's about being prepared to bounce back when they do. It's like having a spare tire in your car, you hope you never need it, but if you get a flat, you're not stranded. With a well-tested disaster recovery plan, you can minimize downtime, reduce data loss, and keep your operations running even in the face of the unexpected. That translates to happier customers, protected revenue, and a reputation for reliability even amidst chaos.
Resilience is the result of a well-conducted orchestra. Many disciplines come together to help you service your clients in a consistent way.
The operational lifeline of your company and the reason it exists in the first place is to provide your clients with what they need, when they need it, and be able to command a good price for it. And that will keep your shareholders happy as well.
Having shifted operations almost overnight to a remote work environment, and with the crisis management phase of the COVID-19 pandemic winding down, IT leaders and organizations are faced with the following issues:
An organization’s shift back toward the pre-pandemic state cannot be carried out in isolation. Things have changed. Budgets, resource availability, priorities, etc., will not be the same as they were in early March. Organizations must ensure that all departments work collaboratively to support office repatriation. IT must quickly identify the must-dos to allow safe return to the office, while prioritizing tasks relating to the repopulation of employees, technical assets, and operational workloads via an informed and streamlined roadmap.
As employees return to the office, PMO and portfolio leaders must sift through unclear requirements and come up with a game plan to resume project activities mid-pandemic. You need to develop an approach, and fast.
Responsibly resume IT operations in the office:
Quickly restart the engine of your PPM:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify the new risk landscape and risk tolerance for your organization post-pandemic. Determine how this may impact the second wave of pandemic transition tasks.
Prepare to return your employees to the office. Ensure that IT takes into account the health and safety of employees, while creating an efficient and sustainable working environment
Prepare the organization's assets for return to the office. Ensure that IT takes into account the off-license purchases and new additions to the hardware family that took place during the pandemic response and facilitates a secure reintegration to the workplace.
Prepare and position IT to support workloads in order to streamline office reintegration. This may include leveraging pre-existing solutions in different ways and providing additional workstreams to support employee processes.
Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business, and security risk reduction weightings. The result is an operational action plan for resuming office life.
Restarting the engine of the project portfolio mid-pandemic won’t be as simple as turning a key and hitting the gas. Use this concise research to find the right path forward for your organization.
Consistent, high-quality disclosure of ESG practices is the means by which organizations can demonstrate they are acting responsibly and in the best interest of their customers and society. Organizations may struggle with these challenges when implementing an ESG reporting program:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard provides a three-phased approach to establishing a comprehensive ESG reporting framework to drive sustainable corporate performance. It will help you identify what to report, understand how to implement your reporting program, and review in-house and external software and tooling options.
The workbook allows IT and business leaders to document decisions as they work through the steps to establish a comprehensive ESG reporting framework.
This planning tool guides IT and business leaders in planning, prioritizing, and addressing gaps to build an ESG reporting program.
Use this template to create a presentation that explains the drivers behind the strategy, communicates metrics, demonstrates gaps and costs, and lays out the timeline for the implementation plan.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine material ESG factors.
Learn how to identify your key stakeholders and material ESG risks.
1.1 Create a list of stakeholders and applicable ESG factors.
1.2 Create a materiality map.
List of stakeholders and applicable ESG factors
Materiality map
Define performance and reporting metrics.
Align your ESG strategy with key performance metrics.
2.1 Create a list of SMART metrics.
2.2 Create a list of reporting obligations.
SMART metrics
List of reporting obligations
Assess data and implementation gaps.
Surface data and technology gaps.
3.1 Create a list of high-priority data gaps.
3.2 Summarize high-level implementation considerations.
List of high-priority data gaps
Summary of high-level implementation considerations
Select software and tooling options and develop implementation plan.
Complete your roadmap and internal communication document.
4.1 Review tooling and technology options.
4.2 Prepare ESG reporting implementation plan.
4.3 Prepare the ESG reporting program presentation.
Selected tooling and technology
ESG reporting implementation plan
ESG reporting strategy presentation
The shift toward stakeholder capitalism cannot be pinned on one thing; rather, it is a convergence of forces that has reshaped attitudes toward the corporation. Investor attention on responsible investing has pushed corporations to give greater weight to the achievement of corporate goals beyond financial performance.
Reacting to the new investor paradigm and to the wider systemic risk to the financial system of climate change, global regulators have rapidly mobilized toward mandatory climate-related disclosure.
IT will be instrumental in meeting the immediate regulatory mandate, but their role is much more far-reaching. IT has a role to play at the leadership table shaping strategy and assisting the organization to deliver on purpose-driven goals.
Delivering high-quality, relevant, and consistent disclosure is the key to unlocking and driving sustainable corporate performance. IT leaders should not underestimate the influence they have in selecting the right technology and data model to support ESG reporting and ultimately support top-line growth.
Yaz Palanichamy
Senior Research Analyst
Info-Tech Research Group
Donna Bales
Principal Research Director
Info-Tech Research Group
Your ChallengeYour organization needs to define a ESG reporting strategy that is driven by corporate purpose. Climate-related disclosure mandates are imminent; you need to prepare for them by building a sustainable reporting program now. There are many technologies available to support your ESG program plans. How do you choose the one that is right for your organization? |
Common ObstaclesKnowing how to narrow down ESG efforts to material ESG issues for your organization. Understanding the key steps to build a sustainable ESG reporting program. Assessing and solving for data gaps and data quality issues. Being aware of the tools and best practices available to support regulatory and performance reporting. |
Info-Tech’s ApproachLearn best-practice approaches to develop and adopt an ESG reporting program approach to suit your organization’s unique needs. Understand the key features, tooling options, and vendors in the ESG software market. Learn through analyst insights, case studies, and software reviews on best-practice approaches and tool options. |
Implementing a robust reporting program takes time. Start early, remain focused, and plan to continually improve data quality and collection and performance metrics
Environmental, social, and governance are the components of a sustainability framework that is used to understand and measure how an organization impacts or is affected by society as a whole.
Human activities, particularly fossil fuel burning since the middle of the twentieth century, have increased greenhouse gas concentration, resulting in observable changes to the atmosphere, ocean, cryosphere, and biosphere. The “E” in ESG relates to the positive and negative impacts an organization may have on the environment, such as the energy it takes in and the waste it discharges.
The “S” in ESG is the most ambiguous component in the framework, as social impact relates not only to risks but also to prosocial behavior. It’s the most difficult to measure but can have significant financial and reputational impact on corporations if material and poorly managed.
The “G” in ESG is foundational to the realization of “S” and “E.” It encompasses how well an organization integrates these considerations into the business and how well the organization engages with key stakeholders, receives feedback, and is transparent with its intentions.
Organizational Reputation: Seventy-four percent of those surveyed were concerned that failing to improve their corporate ESG performance would negatively impact their organization’s branding and overall reputation in the market (Intelex, 2022).
Ethical Business Compliance: Adherence to well-defined codes of business conduct and implementation of anti-corruption and anti-bribery practices is a great way to distinguish between organizations with good/poor governance intentions.
Shifting Consumer Preferences: ESG metrics can also largely influence consumer preferences in buying behavior intentions. Research from McKinsey shows that “upward of 70 percent” of consumers surveyed on purchases in multiple industries said they would pay an additional 5 percent for a green product if it met the same performance standards as a nongreen alternative (McKinsey, 2019).
Responsible Supply Chain Management: The successful alignment of ESG criteria with supply chain operations can lead to several benefits (e.g. producing more sustainable product offerings, maintaining constructive relationships with more sustainability-focused suppliers).
Environmental Stewardship: The growing climate crisis has forced companies of all sizes to rethink how they plan their corporate environmental sustainability practices.
Compliance With Regulatory Guidelines: An increasing emphasis on regulations surrounding ESG disclosure rates may result in some institutional investors taking a more proactive stance toward ESG-related initiatives.
Sustaining Competitive Advantage: Given today’s globalized economy, many businesses are constantly confronted with environmental issues (e.g. water scarcity, air pollution) as well as social problems (e.g. workplace wellness issues). Thus, investment in ESG factors is simply a part of maintaining competitive advantage.
The perceived importance of ESG has dramatically increased from 2020 to 2023
In a survey commissioned by Schneider Electric, researchers categorized the relative importance of ESG planning initiatives for global IT business leaders. ESG was largely identified as a critical factor in sustaining competitive advantage against competitors and maintaining positive investor/public relations.
Source: S&P Market Intelligence, 2020; N=825 IT decision makers
“74% of finance leaders say investors increasingly use nonfinancial information in their decision-making.”
Source: EY, 2020
The Evolving Regulatory Landscape
Canada
United States
Europe
New Zealand
ESG reporting is the disclosure of environmental, social, and governance (ESG) data via qualitative and quantitative reports.
It is how organizations make their sustainability commitments and strategies transparent to stakeholders.
For investors it provides visibility into a company's ESG activities, enabling them to align investments to their values and avoid companies that cause damage to the environment or are offside on social and governance issues.
Despite the growing practice of ESG reporting, reporting standards and frameworks are still evolving and the regulatory approach for climate-related disclosure is inconsistent across jurisdictions, making it challenging for organizations to develop a robust reporting program.
|
“Environmental, social and governance (ESG) commitments are at the core a data problem.” Source: EY, 2022 |
Despite the commitment to support an ESG Initiative, less than a quarter of IT professionals say their organization can accurately report on the impact of its ESG initiatives, and 44% say their reporting on impacts is not accurate.
Reporting accuracy was even worse for reporting on carbon footprint with 46% saying their organization could not report on its carbon footprint accurately. This despite most IT professionals saying they are working to support environmental mandates.
Country Sustainability Scores (CSR) as of October 2021
Scores range from 1 (poor) to 10 (best)
Source: Robeco, 2021
Finland has ranked consistently as a leading sustainability performer in recent years. Finland's strongest ESG pillar is the environment, and its environmental ranking of 9.63/10 is the highest out of all 150 countries.
Brazil, France, and India are among the countries whose ESG score rankings have deteriorated significantly in the past three years.
Increasing political tensions and risks as well as aftershock effects of the COVID-19 pandemic (e.g. high inequality and insufficient access to healthcare and education) have severely impacted Brazil’s performance across the governance and social pillars of the ESG framework, ultimately causing its overall ESG score to drop to a CSR value of 5.31.
Canada has received worse scores for corruption, political risk, income inequality, and poverty over the past three years.
Taiwan has seen its rankings improve in terms of overall ESG scores. Government effectiveness, innovation, a strong semiconductor manufacturing market presence, and stronger governance initiatives have been sufficient to compensate for a setback in income and economic inequality.
Source: Robeco, 2021
Business Benefits
IT Benefits
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
|
Key deliverable: Executive PresentationLeverage this presentation deck to improve corporate performance by implementing a holistic and proactive ESG reporting program. |
|
WorkbookAs you work through the activities, use this workbook to document decisions and rationale and to sketch your materiality map. |
|
Implementation PlanUse this implementation plan to address organizational, technology, and tooling gaps. |
|
RFP TemplateLeverage Info-Tech’s RFP Template to source vendors to fill technology gaps. |
DIY Toolkit
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
Guided Implementation
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
Workshop
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
Consulting
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 8 to 12 calls over the course of 4 to 6 months.
Day 1 |
Day 2 |
Day 3 |
Day 4 |
Day 5 |
|
Activities |
Determine Material ESG Factors 1.1 Review ESG drivers. |
Define Performance and Reporting Metrics 2.1 Understand common program metrics for each ESG component. |
Assess Data and Implementation Gaps 3.1 Assess magnitude and prioritize data gaps. |
Software and Tooling Options 4.1 Review technology options. |
Next Steps and Wrap-Up (offsite) 5.1 Complete in-progress deliverables from previous four days. |
Deliverables |
1. Customized list of key stakeholders and material ESG risks
|
1. SMART metrics
|
1. High-priority data gaps
|
1. Technology and tooling opportunities
|
1. ESG Reporting Workbook
|
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
This phase will walk you through the following:
This phase involves the following participants: CIO, CCO, CSO, business leaders, legal, marketing and communications, head of ESG reporting, and any dedicated ESG team members
Measuring and tracking incremental change among dimensions such as carbon emissions reporting, governance, and diversity, equity, and inclusion (DEI) requires organizations to acquire, analyze, and synthesize data from beyond their internal organizational ecosystems
This section will walk you through some key considerations for establishing your ESG reporting strategy. The first step in this process is to identify the scope of your reporting program.
Evaluate your stakeholder landscape
Consider each of these areas of the ESG Stakeholder Wheel and identify your stakeholders. Once stakeholders are identified, consider how the ESG factors might be perceived by delving into the ESG factors that matter to each stakeholder and what drives their behavior.
Determine ESG impact on stakeholders
Review materiality assessment frameworks for your industry to surface ESG factors for your segment and stakeholder group(s).
Perform research and analysis of the competition and stakeholder trends, patterns, and behavior
Support your findings with stakeholder interviews.
27%: Support for social and environmental proposals at shareholder meetings of US companies rose to 27% in 2020 (up from 21% in 2017).
Source: Sustainable Investments Institute, 2020.
79%: of investors consider ESG risks and opportunities an important factor in investment decision making.
Source: “Global Investor Survey,” PwC, 2021.
33%: of survey respondents cited that a lack of attention or support from senior leadership was one of the major barriers preventing their companies from making any progress on ESG issues.
Source: “Consumer Intelligence Survey,” PwC, 2021.
To succeed with ESG reporting it is essential to understand who we hold ourselves accountable to and to focus ESG efforts in areas with the optimal balance between people, the planet, and profits
Input: Internal documentation (e.g. strategy, annual reports), ESG Stakeholder Wheel
Output: List of key stakeholders and applicable ESG factors
Materials: Whiteboard/flip charts, ESG Reporting Workbook
Participants: Chief Sustainability Officer, Chief Compliance Officer, Head of ESG Reporting, Business leaders
Download the ESG Reporting Workbook
The concept of materiality as it relates to ESG is the process of gaining different perspectives on ESG issues and risks that may have significant impact (both positive and negative) on or relevance to company performance.
The objective of a materiality assessment is to identify material ESG issues most critical to your organization by looking at a broad range of social and environmental factors. Its purpose is to narrow strategic focus and enable an organization to assess the impact of financial and non-financial risks aggregately.
It helps to make the case for ESG action and strategy, assess financial impact, get ahead of long-term risks, and inform communication strategies.
Organizations can use assessment tools from Sustainalytics or GRI, SASB Standards, or guidance and benchmarking information from industry associations to help assess ESG risks .
The materiality assessment informs your risk management approach. Material ESG risks identified should be integrated into your organization’s risk reporting framework.
|
How you communicate the results of your ESG assessment may vary depending on whether you’re communicating to internal or external stakeholders and their communication delivery preferences. |
Using the results from your materiality assessment, narrow down your key stakeholders list. Enhance your strategy for disclosure and performance measurement through direct and indirect stakeholder engagement. Decide on the most suitable format to reach out to these stakeholders. Smaller groups lend themselves to interviews and forums, while surveys and questionnaires work well for larger groups. Develop relevant questions tailored to your company and the industry and geography you are in. Once you receive the results, decide how and when you will communicate them. Determine how they will be used to inform your strategy. |
Step 1Select framework
Review reporting frameworks and any industry guidance and select a baseline reporting framework to begin your materiality assessment. |
Step 2Begin to narrow down
Work with stakeholders to narrow down your list to a shortlist of high-priority material ESG issues. |
Step 3Consolidate and group
Group ESG issues under ESG components, your company’s strategic goals, or the UN’s Sustainable Development Goals. |
Step 4Rate the risks of ESG factors
Assign an impact and likelihood scale for each risk and assign your risk threshold. |
Step 5Map
Use a material map framework such as GRI or SASB or Info-Tech’s materiality map to visualize your material ESG risks. |
The materiality assessment is a strategic tool used to help identify, refine, and assess the numerous ESG issues in the context of your organization.
There is no universally accepted approach to materiality assessments. Although the concept of materiality is often embedded within a reporting standard, your approach to conducting the materiality assessment does not need to link to a specific reporting standard. Rather, it can be used as a baseline to develop your own.
To arrive at the appropriate outcome for your organization, careful consideration is needed to tailor the materiality assessment to meet your organization’s objectives.
When defining the scope of your materiality assessment consider:
Consider your stakeholders and your industry when selecting your materiality assessment tool – this will ensure you provide relevant disclosure information to the stakeholders that need it.
Double materiality is an extension of the financial concept of materiality and considers the broader impact of an organization on the world at large – particularly to people and climate.
Using internal information (e.g. strategy, surveys) and external information (e.g. competitors, industry best practices), create a longlist of ESG issues.
Discuss and narrow down the list. Be sure to consider opportunities – not just material risks!
Group the issues under ESG components or defined strategic goals for your organization. Another option is to use the UN’s Sustainable Development Goals to categorize.
Differentiate ESG factors that you already measure and report.
The benefit of clustering is that it shows related topics and how they may positively or negatively influence one another.
ESG risks are good predictors of future risks and are therefore key inputs to ensure long-term corporate success.
Regardless of the size of your organization, it’s important to build resilience against ESG risks.
To protect an organization against an ESG incident and potential liability risk, ESG risks should be treated like any other risk type and incorporated into risk management and internal reporting practices, including climate scenario analysis.
Some regulated entities will be required to meet climate-related financial disclosure expectations, and sound risk management practices will be prescribed through regulatory guidance. However, all organizations should instill sound risk practices.
ESG risk management done right will help protect against ESG mishaps that can be expensive and damaging while demonstrating commitment to stakeholders that have influence over all corporate performance.
Source: GreenBiz, 2022.
IT has a role to play to provide the underlying data and technology to support good risk decisions.
|
GRI’s Materiality Matrix
|
SASB’s Materiality Map
|
Info-Tech’s Materiality Map
|
Input: ESG corporate purpose or any current ESG metrics; Customer satisfaction or employee engagement surveys; Materiality assessment tools from SASB, Sustainalytics, GRI, or industry frameworks; Outputs from stakeholder outreach/surveys
Output: Materiality map, a list of material ESG issues
Materials: Whiteboard/flip charts, ESG Reporting Workbook
Participants: Chief Sustainability Officer, Chief Compliance Officer, Head of ESG Reporting, Business leaders, Participants from marketing and communications
Download the ESG Reporting Workbook
Novartis, a leading global healthcare company based in Switzerland, stands out as a leader in providing medical consultancy services to address the evolving needs of patients worldwide. As such, its purpose is to use science and technologically innovative solutions to address some of society’s most debilitating, challenging, and ethically significant healthcare issues.
The application of Novartis’ materiality assessment process in understanding critical ESG topics important to their shareholders, stakeholder groups, and society at large enables the company to better quantify references to its ESG sustainability metrics.
Novartis applies its materiality assessment process to better understand relevant issues affecting its underlying business operations across its entire value chain. Overall, employing Novartis’s materiality assessment process helps the company to better manage its societal, environmental, and economic impacts, thus engaging in more socially responsible governance practices.
In 2021, Novartis had completed its most recent materiality assessment. From this engagement, both internal and external stakeholders had ranked as important eight clusters that Novartis is impacting on from an economic, societal, and environmental standpoint. The top four clusters were patient health and safety, access to healthcare, innovation, and ethical business practices.
Another benefit of the materiality assessment is that it helps to make the case for ESG action and provides key information for developing a purpose-led strategy.
An internal ESG strategy should drive toward company-specific goals such as green-house gas emission targets, use of carbon neutral technologies, focus on reusable products, or investment in DEI programs.
Most organizations focus on incremental goals of reducing negative impacts to existing operations or improving the value to existing stakeholders rather than transformative goals.
Yet, a strategy that is authentic and aligned with key stakeholders and long-term goals will bring sustainable value.
The strategy must be supported by an accountability and performance measurement framework such as SMART metrics.
Input: ESG corporate purpose or any current ESG metrics, Outputs from activities 1 and 2, Internally defined metrics (i.e. risk metrics or internal reporting requirements)
Output: SMART metrics
Materials: Whiteboard/flip charts, ESG Reporting Workbook
Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Risk officer/Risk leaders, Head of ESG Reporting, Business leaders, Participants from marketing and communications
Download the ESG Reporting Workbook
Environmental
Social
Governance
Attach metrics to your goals to gauge the success of the ESG program.
Sample Metrics
High-level overview of reporting requirements:
Refer to your legal and compliance team for the most up-to-date and comprehensive requirements.
The focus of regulators is to move to mandatory reporting of material climate-related financial information.
There is some alignment to the TCFD* framework, but there is a lack of standardization in terms of scope across jurisdictions.
*TCFD is the Task Force on Climate-Related Financial Disclosures.
Input: Corporate strategy documents; Compliance registry or internal governance, risk, and compliance (GRC) tool
Output: A list of regulatory obligations
Materials: Whiteboard/flip charts, ESG Reporting Workbook
Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Legal Officer, Head of ESG Reporting, Business leaders
Download the ESG Reporting Workbook
Once the scope of your ESG reporting framework has been identified, further assessment is needed to determine program direction and to understand and respond to organizational impact.
Reporting standards are available to enable relevant, high-quality, and comparable information. It’s the job of the reporting entity to decide on the most suitable framework for their organization.
The most established standard for sustainability reporting is the Global Reporting Initiative (GRI), which has supported sustainability reporting for over 20 years.
The Task Force on Climate-Related Financial Disclosures (TCFD) was created by the Financial Stability Board to align ESG disclosure with financial reporting. Many global regulators support this framework.
The International Sustainability Standards Board (ISSB) is developing high-quality, understandable, and enforceable global standards using the Sustainability Accounting Standards Board (SASB) as a baseline. It is good practice to use SASB Standards until the ISSB standards are available.
ESG ratings are provided by third-party agencies and are increasingly being used for financing and transparency to investors. ESG ratings provide both qualitative and quantitative information.
However, there are multiple providers, so organizations need to consider which ones are the most important and how many they want to use.
Some of the most popular rating agencies include Sustainalytics, MSCI, Bloomberg, Moody's, S&P Global, and CDP.
Reference Appendix Below
To meet ESG objectives, corporations are challenged with collecting non-financial data from across functional business and geographical locations and from their supplier base and supply chains.
One of the biggest impediments to ESG implementation is the lack of high-quality data and of mature processes and tools to support data collection.
An important step for delivering reporting requirements is to perform a gap analysis early on to surface gaps in the primary data needed to deliver your reporting strategy.
The output of this exercise will also inform and help prioritize implementation, as it may show that new data sets need to be sourced or tools purchased to collect and aggregate data.
Conduct a gap analysis to determine gaps in primary data
Input: Business (ESG) strategy, Data inventory (if exists), Output from Activity 1: Key stakeholders, Output from Activity 2: Materiality map, Output of Activity 3: SMART metrics, Output of Activity 4: Regulatory obligations
Output: List of high-priority data gaps
Materials: Whiteboard/flip charts, ESG Reporting Workbook
Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Legal Officer, Head of ESG Reporting, Business leaders, Data analysts
Download the ESG Reporting Workbook
Source: “2023 Canadian ESG Reporting Insights,” PwC.
When implementing an ESG reporting framework, it is important not to implement in silos but to take a strategic approach that considers the evolving nature of ESG and the link to value creation and sound decision making.
“The future of sustainability reporting is digital – and tagged.”
Source: “XBRL Is Coming,” Novisto, 2022.
In the last few years, global regulators have proposed or effected legislation requiring public companies to disclose climate-related information.
Yet according to Info-Tech’s 2023 Trends and Priorities survey, most IT professionals expect to support environmental mandates but are not prepared to accurately report on their organization’s carbon footprint.
IT groups have a critical role to play in helping organizations develop strategic plans to meet ESG goals, measure performance, monitor risks, and deliver on disclosure requirements.
To future-proof your reporting structure, your data should be readable by humans and machines.
eXtensible Business Reporting Language (XBRL) tagging is mandated in several jurisdictions for financial reporting, and several reporting frameworks are adopting XBRL for sustainability reporting so that non-financial and financial disclosure frameworks are aligned.
Example environmental metrics
“59% of businesses only talk about their positive performance, missing opportunities to build trust with stakeholders through balanced and verifiable ESG reporting.”
Source: “2023 Canadian ESG Reporting Insights,” PwC.
To date, regulatory focus has been on climate-related disclosure, although we are beginning to see signals in Europe and the UK that they are turning their attention to social issues.
Social reporting focuses on the socioeconomic impacts of an organization’s initiatives or activities on society (indirect or direct).
The “social” component of ESG can be the most difficult to quantify, but if left unmonitored it can leave your organization open to litigation from consumers, employees, and activists.
Although organizations have been disclosing mandated metrics such as occupational health and safety and non-mandated activities such as community involvement for years, the scope of reporting is typically narrow and hard to measure in financial terms.
This is now changing with the recognition by companies of the value of social reporting to brand image, traceability, and overall corporate performance.
Example social metrics
McDonald’s Corporation is the leading global food service retailer. Its purpose is not only providing burgers to dinner tables around the world but also serving its communities, customers, crew, farmers, franchisees, and suppliers alike. As such, not only is the company committed to having a positive impact on communities and in maintaining the growth and success of the McDonald's system, but it is also committed to conducting its business operations in a way that is mindful of its ESG commitments.
McDonald’s Better Together: Gender Balance & Diversity strategy and Women in Tech initiative
In 2019, MCD launched its Better Together: Gender Balance & Diversity strategy as part of a commitment to improving the representation and visibility of women at all levels of the corporate structure by 2023.
In conjunction with the Better Together strategy, MCD piloted a “Women in Tech” initiative through its education and tuition assistance program, Archways to Opportunity. The initiative enabled women from company-owned restaurants and participating franchisee restaurants to learn skills in areas such as data science, cybersecurity, artificial intelligence. MCD partnered with Microsoft and Colorado Technical University to carry out the initiative (McDonald’s, 2019).
Both initiatives directly correlate to the “S” of the ESG framework, as the benefits of gender-diverse leadership continue to be paramount in assessing the core strengths of a company’s overreaching ESG portfolio. Hence, public companies will continue to face pressure from investors to act in accordance with these social initiatives.
MCD’s Better Together and Women in Tech programs ultimately helped improve recruitment and retention rates among its female employee base. After the initialization of the gender balance and diversification strategy, McDonald’s signed on to the UN Women’s Empowerment Principles to help accelerate global efforts in addressing the gender disparity problem.
Strong governance is foundational element of a ESG program, yet governance reporting is nascent and is often embedded in umbrella legislation pertaining to a particular risk factor.
A good example of this is the recent proposal by the Securities and Exchange Commission in the US (CFR Parts 229, 232, 239, 240, and 249, Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure), which will require public companies to:
The "G” component includes more than traditional governance factors and acts as a catch-all for other important ESG factors such as fraud, cybersecurity, and data hygiene. Make sure you understand how risk may manifest in your organization and put safeguards in place.
Example governance metrics
The "G" in ESG may not be capturing the limelight under ESG legislation yet, but there are key governance factors that are that are under regulatory radar, including data, cybersecurity, fraud, and DEI. Be sure you stay on top of these issues and include performance metrics into your internal and external reporting frameworks.
48% of investment decision makers, including 58% of institutional investors, say companies’ self-reported ESG performance data is “much more important” than companies’ conventional financial data when informing their investment decisions (Benchmark ESG, 2021). |
Due to the nascent nature of climate-related reporting, data challenges such as the availability, usability, comparability, and workflow integration surface early in the ESG program journey when sourcing and organizing data:
In addition to good, reliable inputs, organizations need to have the infrastructure to access new data sets and convert raw data into actionable insights.
The establishment of data model and workflow processes to track data lineage is essential to support an ESG program. To be successful, it is critical that flexibility, scalability, and transparency exist in the architectural design. Data architecture must scale to capture rapidly growing volumes of unstructured raw data with the associated file formats.
Download Info-Tech’s Create and Manage Enterprise Data Models blueprint
Building and operating an ESG program requires the execution of a large number of complex tasks.
IT leaders have an important role to play in selecting the right technology approach to support a long-term strategy that will sustain and grow corporate performance.
The decision to buy a vendor solution or build capabilities in-house will largely depend on your organization’s ESG ambitions and the maturity of in-house business and IT capabilities.
For large, heavily regulated entities an integrated platform for ESG reporting can provide organizations with improved risk management and internal controls.
Example considerations when deciding to meet ESG reporting obligations in-house
Executive leadership should take a more holistic and proactive stance to not only accurately reporting upon baseline corporate financial metrics but also capturing and disclosing relevant ESG performance metrics to drive alternative streams of valuation across their respective organizational environments.
Input: Business (ESG) strategy, Data inventory (if exists), Asset inventory (if exists), Output from Activity 5
Output: Summary of high-level implementation considerations
Materials: Whiteboard/flip charts, ESG Reporting Workbook
Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, Data and IT architect/leaders,
Download the ESG Reporting Workbook
Communication: Teams must have some type of communication strategy. This can be broken into:
Proximity: Distributed teams create complexity as communication can break down. This can be mitigated by:
Trust: Members should trust other members are contributing to the project and completing their required tasks on time. Trust can be developed and maintained by:
Your communication of ESG performance is intricately linked to corporate value creation. When designing your communications strategy, consider:
A recent BDC survey of 121 large companies and public-sector buyers found that 82% require some disclosure from their suppliers on ESG, and that's expected to grow to 92% by 2024.
Source: BDC, 2023
ESG's link to corporate performance means that organizations must stay on top of ESG issues that may impact the long-term sustainability of their business.
ESG components will continue to evolve, and as they do so will stakeholder views. It is important to continually survey your stakeholders to ensure you are optimally managing ESG risks and opportunities.
To keep ESG on the strategy agenda, we recommend that organizations:
Download The ESG Imperative and Its Impact on Organizations
This phase will walk you through the following activities:
This phase involves the following participants: CIO, CCO, CSO, EA, IT application and data leaders, procurement, business leaders, marketing and communications, head of ESG reporting, and any dedicated ESG team members
Before sourcing any technology, it’s important to have a good understanding of your requirements.
Key elements to consider:
The importance of ESG is something that will need to be considered for most, if not every decision in the future, and having reliable and available information is essential. While the industry will continue to see investment and innovation that drives operational efficiency and productivity, we will also see strong ESG themes in these emerging technologies to ensure they support both sustainable and socially responsible operations.
With the breadth of technology Datamine already has addressing the ESG needs for the mining industry combined with our new technology, our customers can make effective and timely decisions through incorporating ESG data into their planning and scheduling activities to meet customer demands, while staying within the confines of their chosen ESG targets.
Chris Parry
VP of ESG, Datamine
Technological Solutions Feature Bucket |
Basic Feature Description |
Advanced Feature Description |
Natural language processing (NLP) tools |
Ability to use NLP tools to track and monitor sentiment data from news and social media outlets. |
Leveraging NLP toolsets can provide organizations granular insights into workplace sentiment levels, which is a core component of any ESG strategy. A recent study by MarketPsych, a company that uses NLP technologies to analyze sentiment data from news and social media feeds, linked stock price performance to workplace sentiment levels. |
Distributed ledger technologies (DLTs) |
DLTs can help ensure greater reporting transparency, in line with stringent regulatory reporting requirements. |
DLT as an ESG enabler, with advanced capabilities such as an option to provide demand response services linked to electricity usage and supply forecasting. |
Cloud-based data management and reporting systems |
Cloud-based data management and reporting can support ESG initiatives by providing increased reporting transparency and a better understanding of diverse social and environmental risks. |
Leverage newfound toolsets such as Microsoft Cloud for Sustainability – a SaaS offering that enables organizations to seamlessly record, report, and reduce their emissions on a path toward net zero. |
IoT technologies |
Integration of IoT devices can help enhance the integrity of ESG reporting through the collection of descriptive and accurate ESG metrics (e.g. energy efficiency, indoor air quality, water quality and usage). |
Advanced management of real-time occupancy monitoring: for example, the ability to reduce energy consumption rates by ensuring energy is only used when spaces and individual cubicles are occupied. |
In a recent survey of over 1,000 global public- and private-sector leaders, 87% said they see AI as a helpful tool to fight climate change.
Source: Boston Consulting Group
Technology providers are part of the solution and can be leveraged to collect, analyze, disclose, track, and report on the vast amount of data.
Increasingly organizations are using artificial intelligence to build climate resiliency:
And protect organizations from vulnerabilities:
Our definition: ESG reporting software helps organizations improve the transparency and accountability of their ESG program and track, measure, and report their sustainability efforts.
Key considerations for reporting software selection:
Adoption of ESG reporting software has historically been low, but these tools will become critical as organizations strive to meet increasing ESG reporting requirements.
In a recent ESG planning and performance survey conducted by ESG SaaS company Diligent Corporation, it was found that over half of all organizations surveyed do not publish ESG metrics of any kind, and only 9% of participants are actively using software that supports ESG data collection, analysis, and reporting.
Source: Diligent, 2021.
Understanding business needs through requirements gathering is the key to defining everything about what is being purchased. However, it is an area where people often make critical mistakes.
Poorly scoped requirementsFail to be comprehensive and miss certain areas of scope. Focus on how the solution should work instead of what it must accomplish. Have multiple levels of detail within the requirements that are inconsistent and confusing. Drill all the way down into system-level detail. Add unnecessary constraints based on what is done today rather than focusing on what is needed for tomorrow. Omit constraints or preferences that buyers think are obvious. |
Best practicesGet a clear understanding of what the system needs to do and what it is expected to produce. Test against the principle of MECE – requirements should be “mutually exclusive and collectively exhaustive.” Explicitly state the obvious and assume nothing. Investigate what is sold on the market and how it is sold. Use language that is consistent with that of the market and focus on key differentiators – not table stakes. Contain the appropriate level of detail – the level should be suitable for procurement and sufficient for differentiating vendors. |
Download Info-Tech's Improve Requirements Gathering blueprint
Central Data Repository: Collection of stored data from existing databases merged into one location that can then be shared, analyzed, or updated.
Automatic Data Collection: Ability to automate data flows, collect responses from multiple sources at specified intervals, and check them against acceptance criteria.
Automatic KPI Calculations, Conversions, and Updates: Company-specific metrics can be automatically calculated, converted, and tracked.
Built-In Indicator Catalogs and Benchmarking: Provides common recognized frameworks or can integrate a catalog of ESG indicators.
Custom Reporting: Ability to create reports on company emissions, energy, and asset data in company-branded templates.
User-Based Access and Permissions: Ability to control access to specific content or data sets based on the end user’s roles.
Real-Time Capabilities: Ability to analyze and visualize data as soon as it becomes available in underlying systems.
Version Control: Tracking of document versions with each iteration of document changes.
Intelligent Alerts and Notifications: Ability to create, manage, send, and receive notifications, enhancing efficiency and productivity.
Audit Trail: View all previous activity including any recent edits and user access.
Encrypted File Storage and Transfer: Ability to encrypt a file before transmitting it over the network to hide content from being viewed or extracted.
Input: Business (ESG) strategy, Data inventory (if exists), Asset inventory (if exists), Output from Activity 5, Output from Activity 6,
Output: List of tooling options
Materials: Whiteboard/flip charts, ESG Reporting Workbook
Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, Data and IT architect/leaders
Download the ESG Reporting Workbook
Input: Business (ESG) strategy, Output from Activity 5, Output from Activity 6, Output from Activity 7
Output: ESG Reporting Implementation Plan
Materials: Whiteboard/flip charts, ESG Reporting Implementation Plan Template
Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, PMO, Data and IT architect/leaders
Download the ESG Reporting Implementation Plan Template
Input: Business (ESG) strategy, ESG Reporting Workbook, ESG reporting implementation plan
Output: ESG Reporting Presentation Template
Materials: Whiteboard/flip charts, ESG Reporting Presentation Template, Internal communication templates
Participants: Chief Sustainability Officer, Head of Marketing/ Communications, Business leaders, PMO
Since a purpose-driven ESG program presents a significant change in how organizations operate, the goals and intentions need to be understood throughout the organization. Once you have developed your ESG reporting strategy it is important that it is communicated, understood, and accepted. Use the ESG Reporting Presentation Template as a guide to deliver your story.
Download the ESG Reporting Presentation Template
This phase will provide additional material on Info-Tech’s expertise in the following areas:
Review Info-Tech’s process and understand how you can prevent your organization from leaking negotiation leverage while preventing vendors from taking control of your RFP.
Expert Analyst Guidance over5 weeks on average to select and negotiate software.
Save Money, Align Stakeholders, Speed Up the Process & make better decisions.
Use a Repeatable, Formal Methodology to improve your application selection process.
Better, Faster Results, guaranteed, included in membership.
You may be faced with multiple products, services, master service agreements, licensing models, service agreements, and more.
Use the Contract Review Service to gain insights on your agreements.
Consider the aspects of a contract review:
Validate that a contract meets IT’s and the business’ needs by looking beyond the legal terminology. Use a practical set of questions, rules, and guidance to improve your value for dollar spent.
Click here to book The Contract Review Service
Download blueprint Master Contract Review and Negotiation for Software Agreements
The purpose of this section is to showcase various vendors and companies that provide software solutions to help users manage and prioritize their ESG reporting initiatives.
This section showcases the core capabilities of each software platform to provide Info-Tech members with industry insights regarding some of the key service providers that operate within the ESG vendor market landscape.
Info-Tech members who are concerned with risks stemming from the inability to sort and disseminate unstructured ESG data reporting metrics or interested in learning more about software offerings that can help automate the data collection, processing, and management of ESG metrics will find high-level insights into the ESG vendor market space.
The establishment of the Datamine ESG unit comes at the same time the mining sector is showing an increased interest in managing ESG and its component systems as part of a single scope.
With miners collecting and dealing with ever-increasing quantities of data and looking for ways to leverage it to make data-driven decisions that enhance risk management and increase profitability, integrated software solutions are – now more than ever – essential in supporting continuous improvement and maintaining data fidelity and data integrity across the entire mining value chain.
Key Features:
Benchmark ESG provides industry-leading ESG data management and reporting software that can assist organizations in managing operational risk and compliance, sustainability, product stewardship, and ensuring responsible sourcing across complex global operations.
Key Features:
PwC’s ESG Management Solution provides quick insights into ways to improve reporting transparency surrounding your organization’s ESG commitments.
According to PwC’s most recent CEO survey, the number one motivator for CEOs in mitigating climate change risks is their own desire to help solve this global problem and drive transparency with stakeholders.
Source: “Annual Global CEO Survey,” PwC, 2022.
Key Features:
ServiceNow ESG Management (ESGM) and reporting platform helps organizations transform the way they manage, visualize, and report on issues across the ESG spectrum.
The platform automates the data collection process and the organization and storage of information in an easy-to-use system. ServiceNow’s ESGM solution also develops dashboards and reports for internal user groups and ensures that external disclosure reports are aligned with mainstream ESG standards and frameworks.
We know that doing well as a business is about more than profits. One workflow at a time, we believe we can change the world – to be more sustainable, equitable, and ethical.
Source: ServiceNow, 2021.
Key Features:
|
The ESG Imperative and Its Impact on OrganizationsUse this blueprint to educate yourself on ESG factors and the broader concept of sustainability. Identify changes that may be needed in your organizational operating model, strategy, governance, and risk management approach. Learn about Info-Tech’s ESG program approach and use it as a framework to begin your ESG program journey. |
|
Private Equity and Venture Capital Growing Impact of ESG ReportIncreasingly, new capital has a social mandate attached to it due to the rise of ESG investment principles. Learn about how the growing impact of ESG affects both your organization and IT specifically, including challenges and opportunities, with expert assistance. |
Terms |
Definition |
Corporate Social Responsibility |
Management concept whereby organizations integrate social and environmental concerns in their operations and interactions with their stakeholders. |
Chief Sustainability Officer |
Steers sustainability commitments, helps with compliance, and helps ensure internal commitments are met. Responsibilities may extend to acting as a liaison with government and public affairs, fostering an internal culture, acting as a change agent, and leading delivery. |
ESG |
An acronym that stands for environment, social, and governance. These are the three components of a sustainability program. |
ESG Standard |
Contains detailed disclosure criteria including performance measures or metrics. Standards provide clear, consistent criteria and specifications for reporting. Typically created through consultation process. |
ESG Framework |
A broad contextual model for information that provides guidance and shapes the understanding of a certain topic. It sets direction but does not typically delve into the methodology. Frameworks are often used in conjunction with standards. |
ESG Factors |
The factors or issues that fall under the three ESG components. Measures the sustainability performance of an organization. |
ESG Rating |
An aggregated score based on the magnitude of an organization’s unmanaged ESG risk. Ratings are provided by third-party rating agencies and are increasingly being used for financing, transparency to investors, etc. |
ESG Questionnaire |
ESG surveys or questionnaires are administered by third parties and used to assess an organization’s sustainability performance. Participation is voluntary. |
Key Risk Indicator (KRI) |
A measure to indicate the potential presence, level, or trend of a risk. |
Key Performance Indicator (KPI) |
A measure of deviation from expected outcomes to help a firm see how it is performing. |
Materiality |
Material topics are topics that have a direct or indirect impact on an organization's ability to create, preserve, or erode economic, environmental, and social impact for itself and its stakeholder and society as a whole. |
Materiality Assessment |
A tool to identify and prioritize the ESG issues most critical to the organization. |
Risk Sensing |
The range of activities carried out to identify and understand evolving sources of risk that could have a significant impact on the organization (e.g. social listening). |
Sustainability |
The ability of an organization and broader society to endure and survive over the long term by managing adverse impacts well and promoting positive opportunities. |
Sustainalytics |
Now part of Morningstar. Sustainalytics provides ESG research, ratings, and data to institutional investors and companies. |
UN Guiding Principles on Business and Human Rights (UNGPs) |
An essential methodological foundation for how impacts across all dimensions should be assessed. |
Standard |
Definition and focus |
|
CDP |
CDP has created standards and metrics for comparing sustainability impact. Focuses on environmental data (e.g. carbon, water, and forests) and on data disclosure and benchmarking. Audience: All stakeholders |
|
Dow Jones Sustainability Indices (DJSI) |
Heavy on corporate governance and company performance. Equal balance of economic, environmental, and social. Audience: All stakeholders |
|
Global Reporting Initiative (GRI) |
International standards organization that has a set of standards to help organizations understand and communicate their impacts on climate change and social responsibility. The standard has a strong emphasis on transparency and materiality, especially on social issues. Audience: All stakeholders |
|
International Sustainability Standards Board (ISSB) |
Standard-setting board that sits within the International Financial Reporting Standards (IFRS) Foundation. The IFRS Foundation is a not-for-profit, public-interest organization established to develop high-quality, understandable, enforceable, and globally accepted accounting and sustainability disclosure standards. Audience: Investor-focused |
|
United Nations Sustainable Development Goals (SDGs) |
Global partnership across sectors and industries that sets out 17 goals to achieve sustainable development for all. Audience: All stakeholders |
|
Sustainability Accounting Standards Board (SASB) |
Industry-specific standards to help corporations select topics that may impact their financial performance. Focus on material impacts on financial condition or operating performance. Audience: Investor-focused |
|
Task Force on Climate-Related Financial Disclosures (TCFD; created by the Financial Stability Board) |
Standards framework focused on the impact of climate risk on financial and operating performance. More broadly the disclosures inform investors of positive and negative measures taken to build climate resilience and make transparent the exposure to climate-related risk. Audience: Investors, financial stakeholders |
"2021 Global Investor Survey: The Economic Realities of ESG." PwC, Dec. 2021. Accessed May 2022.
"2023 Canadian ESG Reporting Insights." PwC, Nov. 2022. Accessed Dec. 2022.
Althoff, Judson. "Microsoft Cloud for Sustainability: Empowering Organizations On Their Path To Net Zero." Microsoft Blog, 14 July 2021. Accessed May 2022.
"Balancing Sustainability and Profitability." IBM, Feb. 2022. Accessed June. 2022.
"Beyond Compliance: Consumers and Employees Want Business to Do More on ESG." PwC, Nov. 2021. Accessed July 2022.
Bizo, Daniel. "Multi-Tenant Datacenters and Sustainability: Ambitions and Reality." S&P Market Intelligence, Sept. 2020. Web.
Bolden, Kyle. "Aligning nonfinancial reporting with your ESG strategy to communicate long-term value." EY, 18 Dec. 2020. Web.
Carril, Christopher, et al. "Looking at Restaurants Through an ESG Lens: ESG Stratify – Equity Research Report." RBC Capital Markets, 5 Jan. 2021. Accessed Jun. 2022.
"Celebrating and Advancing Women." McDonald’s, 8 March 2019. Web.
Clark, Anna. "Get your ESG story straight: A sustainability communication starter kit." GreenBiz, 20 Dec. 2022, Accessed Dec. 2022.
Courtnell, Jane. “ESG Reporting Framework, Standards, and Requirements.” Corporate Compliance Insights, Sept. 2022. Accessed Dec. 2022.
“Country Sustainability Ranking. Country Sustainability: Visibly Harmed by Covid-19.” Robeco, Oct. 2021. Accessed June 2022.
“Defining the “G” in ESG Governance Factors at the Heart of Sustainable Business.” World Economic Forum, June 2022. Web.
“Digital Assets: Laying ESG Foundations.” Global Digital Finance, Nov. 2021. Accessed April 2022.
“Dow Jones Sustainability Indices (DJCI) Index Family.” S&P Global Intelligence, n.d. Accessed June 2022.
"ESG in Your Business: The Edge You Need to Land Large Contracts." BDC, March 2023, Accessed April 2023.
“ESG Performance and Its Impact on Corporate Reputation.” Intelex Technologies, May 2022. Accessed July 2022.
“ESG Use Cases. IoT – Real-Time Occupancy Monitoring.” Metrikus, March 2021. Accessed April 2022.
Fanter, Tom, et al. “The History & Evolution of ESG.” RMB Capital, Dec. 2021. Accessed May 2022.
Flynn, Hillary, et al. “A guide to ESG materiality assessments.” Wellington Management, June 2022, Accessed September 2022
“From ‘Disclose’ to ‘Disclose What Matters.’” Global Reporting Initiative, Dec. 2018. Accessed July 2022.
“Getting Started with ESG.” Sustainalytics, 2022. Web.
“Global Impact ESG Fact Sheet.” ServiceNow, Dec. 2021. Accessed June 2022.
Gorley, Adam. “What is ESG and Why It’s Important for Risk Management.” Sustainalytics, March 2022. Accessed May 2022.
Hall, Lindsey. “You Need Near-Term Accountability to Meet Long-Term Climate Goals.” S&P Global Sustainable1, Oct. 2021. Accessed April 2022.
Henisz, Witold, et al. “Five Ways That ESG Creates Value.” McKinsey, Nov. 2019. Accessed July 2022.
“Integrating ESG Factors in the Investment Decision-Making Process of Institutional Investors.” OECD iLibrary, n.d. Accessed July 2022.
“Investor Survey.” Benchmark ESG, Nov. 2021. Accessed July 2022.
Jackson, Brian. Tech Trends 2023, Info-Tech Research Group, Dec. 2022, Accessed Dec. 2022.
Keet, Lior. “What Is the CIO’s Role in the ESG Equation?” EY, 2 Feb. 2022. Accessed May 2022.
Lev, Helee, “Understanding ESG risks and why they matter” GreenBiz, June 2022. Accessed Dec 2022.
Marsh, Chris, and Simon Robinson. “ESG and Technology: Impacts and Implications.” S&P Global Market Intelligence, March 2021. Accessed April 2022.
Martini, A. “Socially Responsible Investing: From the Ethical Origins to the Sustainable Development Framework of the European Union.” Environment, Development and Sustainability, vol. 23, Nov. 2021. Web.
Maher, Hamid, et al. “AI Is Essential for Solving the Climate Crisis.” Boston Consulting Group, 7 July 2022. Web.
“Materiality Assessment. Identifying and Taking Action on What Matters Most.” Novartis, n.d. Accessed June. 2022.
Morrow, Doug, et al. “Understanding ESG Incidents: Key Lessons for Investors.” Sustainalytics, July 2017. Accessed May 2022.
“Navigating Climate Data Disclosure.” Novisto, July 2022. Accessed Nov. 2022.
Nuttall, Robin, et al. “Why ESG Scores Are Here to Stay.” McKinsey & Company, May 2020. Accessed July 2022.
“Opportunities in Sustainability – 451 Research’s Analysis of Sustainability Perspectives in the Data Center Industry.” Schneider Electric, Sept. 2020. Accessed May 2022.
Peterson, Richard. “How Can NLP Be Used to Quantify ESG Analytics?” Refinitiv, Feb. 2021. Accessed June 2022.
“PwC’s 25th Annual Global CEO Survey: Reimagining the Outcomes That Matter.” PwC, Jan. 2022. Accessed June 2022.
“SEC Proposes Rules on Cybersecurity, Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies.” Securities and Exchange Commission, 9 May 2022. Press release.
Serafeim, George. “Social-Impact Efforts That Create Real Value.” Harvard Business Review, Sept. 2020. Accessed May 2022.
Sherrie, Gonzalez. “ESG Planning and Performance Survey.” Diligent, 24 Sept. 2021. Accessed July 2022.
“Special Reports Showcase, Special Report: Mid-Year Report on Proposed SEC Rule 14-8 Change.” Sustainable Investments Institute, July 2020. Accessed April 2022.
“State of European Tech. Executive Summary Report.” Atomico, Nov. 2021. Accessed June 2022.
“Top Challenges in ESG Reporting, and How ESG Management Solution Can Help.” Novisto, Sept. 2022. Accessed Nov. 2022.
Vaughan-Smith, Gary. “Navigating ESG data sets and ‘scores’.” Silverstreet Capital, 23 March 2022. Accessed Dec. 2022.
Waters, Lorraine. “ESG is not an environmental issue, it’s a data one.” The Stack, 20 May 2021. Web.
Wells, Todd. “Why ESG, and Why Now? New Data Reveals How Companies Can Meet ESG Demands – And Innovate Supply Chain Management.” Diginomica, April 2022. Accessed July 2022.
“XBRL is coming to corporate sustainability Reporting.” Novisto, Aug. 2022. Accessed Dec. 2022.
Chris Parry
VP of ESG, Datamine
Chris Parry has recently been appointed as the VP of ESG at Datamine Software. Datamine’s dedicated ESG division provides specialized ESG technology for sustainability management by supporting key business processes necessary to drive sustainable outcomes.
Chris has 15 years of experience building and developing business for enterprise applications and solutions in both domestic and international markets.
Chris has a true passion for business-led sustainable development and is focused on helping organizations achieve their sustainable business outcomes through business transformation and digital software solutions.
Datamine’s comprehensive ESG capability supports ESG issues such as the environment, occupational health and safety, and medical health and wellbeing. The tool assists with risk management, stakeholder management and business intelligence.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate and understand your current SQA capabilities, as well as the degree to which metric objectives are being met.
Identify and define SQA processes and metrics needed to meet quality objectives set by development teams and the business.
Build your SQA plan and optimization roadmap.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
To help you assess and understand your current SQA capabilities as well as the degree to which metric objectives are being met.
An analysis of current SQA practices to provide insight into potential inefficiencies, opportunities, and to provide the business with sufficient rationale for improving current quality assurance initiatives.
1.1 Conduct a high-level assessment of where to focus your current state analysis.
1.2 Document your high-level development process.
1.3 Create a RACI chart to understand roles and responsibilities.
1.4 Perform a SIPOC-MC analysis for problem areas identified in your SDLC.
1.5 Identify the individual control points involved with passing software artifacts through SDLC stages being assessed.
1.6 Identify problem areas within your SDLC as they relate to SQA.
Understanding of current overall development process and where it is most weak in the context of quality assurance
Understanding of assigned roles and responsibilities across development teams, including individuals who are involved with making quality-related decisions for artifact hand-off
Identification of problem areas within SQA process for further analysis
To help you identify and define SQA processes and metrics needed to meet quality objectives set out by development teams and the business.
A revised list of key SQA tasks along with metrics and associated tolerance limits used universally for all development projects.
2.1 Establish SQA metrics and tolerance limits across your SDLC.
2.2 Determine your target state for SQA processes within the define/design stage of the SDLC.
2.3 Determine your target state for SQA processes within the development stage of the SDLC.
2.4 Determine your target state for SQA processes within the testing stage of the SDLC.
2.5 Determine your target state for SQA processes within the deploy/release stage of the SDLC.
Identification of the appropriate metrics and their associated tolerance limits to provide insights into meeting quality goals and objectives during process execution
Identification of target state SQA processes that are required for ensuring quality across all development projects
Based on discovered inefficiencies, define optimization initiatives required to improve your SQA practice.
Optimization initiatives and associated tasks required to address gaps and improve SQA capabilities.
3.1 Determine optimization initiatives for improving your SQA process.
3.2 Gain the full scope of effort required to implement your SQA optimization initiatives.
3.3 Identify the enablers and blockers of your SQA optimization.
3.4 Define your SQA optimization roadmap.
Prioritized list of optimization initiatives for SQA
Assessment of level of effort for each SQA optimization initiative
Identification of enablers and blockers for optimization initiatives
Identification of roadmap timeline for implementing optimization initiatives
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess the current situation by identifying technology service consumers in the organization, their interfaces with IT, the level of service they require, and their sentiment toward IT.
Categorize the technology consumer groups into four business profiles based on their characteristics to identify implications based on technology consumption patterns for the target IT operating model.
Select implementation models for the four core elements of the IT operating model and optimize governance, sourcing, process, and organizational structure to create the target IT operating model.
Create, assess, and prioritize initiatives to reach the target IT operating model. Construct a roadmap to show initiative execution.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify the IT and business strategies, so that the target IT operating model can be constructed to support them.
Identify the implications for the IT operating model and understand how to optimally construct it.
Create consumer groups for consumer experience mapping and consumer profile classification.
1.1 Review business and IT strategies.
1.2 Identify implications for the IT operating model.
1.3 Identify internal technology consumer groups.
1.4 Identify external technology consumer groups.
Implications for the IT operating model
List of internal and external technology service consumer groups
Identify the interfaces with IT for the consumer group, its level of technology service requirement, its sentiment toward IT, and its needs from IT.
Consumer group needs from IT and feelings toward IT are identified.
2.1 Identify interview candidates for the consumer groups.
2.2 Complete consumer group questionnaire.
2.3 Complete consumer experience map.
2.4 Classify the consumer group into a business profile.
Consumer experience map for first group
Business profile classification
Continue mapping the experience of consumer groups and classify them into profiles based on their needs to draw implications for the target IT operating model.
Consumption patterns from the consumer groups are defined and implications for the target IT operating model are drawn.
3.1 Continue interviews for consumer groups.
3.2 Complete consumer experience map.
3.3 Classify the consumer group into a business profile.
3.4 Aggregate the consumption patterns for the business profile and document implications.
Consumer experience map for second group
Business profile classification
Aggregated consumption patterns
Implications for consumption patterns
Map the target operating model to show how each element of the IT operating model supports the delivery of IT services to the consumer groups.
Identify whether the current IT operating model is optimally supporting the delivery of IT services to consumer groups from the four core IT operating model elements.
4.1 Determine the approach to IT governance.
4.2 Select the optimal mix of sourcing models.
4.3 Customize the approach to process implementation.
4.4 Identify the target organizational structure.
Target IT operating model
Create initiatives and communicate them with a roadmap to show how the organization will arrive at the target IT operating model.
The steps to reach the IT operating model are created, assessed, and prioritized.
Steps are ordered for presentation.
5.1 Identify initiatives to reach the target IT operating model.
5.2 Create initiative profiles to assess initiative quality.
5.3 Prioritize initiatives based on business conditions.
5.4 Create a roadmap to communicate initiative execution.
Initiative profiles
Sunshine diagram
There is no one-size-fits-all approach to product delivery. For many organizations product delivery requires detailed project management practices, while for others it requires much less. Taking an outcome-first approach when planning your product transformation is critical to make the right decision on the balance between project and product management.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The activities in this research will guide you through clarifying how you want to talk about projects and products, aligning project management and agility, specifying the different activities for project management, and identifying key differences with funding of products instead of projects.
7 Step 1.1: Clarify How You Want to Talk About Projects and Products
13 Step 1.2: Align Project Management and Agility
16 Step 1.3: Specify the Different Activities for Project Management
20 Step 1.4: Identify Key Differences in Funding of Products Instead of Projects
26 Bibliography
When moving to more product-centric delivery practices, many assume that projects are no longer necessary. That isn’t necessarily the case!
Product delivery can mean different things to different organizations, and in many cases it can involve the need to maintain both projects and project delivery.
Projects are a necessary vehicle in many organizations to drive value delivery, and the activities performed by project managers still need to be done by someone. It is the form and who is involved that will change the most.
|
Ari Glaizel
|
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
|
There is no one-size-fits-all approach to product delivery. For many organizations product delivery requires detailed project management practices, while for others it requires much less. Taking an outcome-first approach when planning your product transformation is critical to make the right decision on the balance between project and product management.
Project“A temporary endeavor undertaken to create a unique product, service, or result. The temporary nature of projects indicates a beginning and an end to the project work or a phase of the project work. Projects can stand alone or be part of a program or portfolio.” (PMBOK, PMI) |
|
Product“A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.” (Deliver on Your Digital Product Vision, Info-Tech Research Group) |
Output: Your enterprise/organizational definition of products and projects
Participants: Executives, Product/project managers, Applications teams
Regardless of whether you recognize yourself as a “product-based” or “project-based” shop, the same basic principles should apply.
You go through a period or periods of project-like development to build or implement a version of an application or product.
You also have parallel services along with your project development that encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.
As your product transformation continues, projects can become optional and needed only as part of your organization’s overall delivery processes
| Project | Product | |
| Fund projects | — Funding –› | Fund teams |
| Line-of-business sponsor | — Prioritization –› | Product owner |
| Project owner | — Accountability –› | Product owner |
| Makes specific changes to a product | —Product management –› | Improves product maturity and support of the product |
| Assignment of people to work | — Work allocation –› | Assignment of work to product teams |
| Project manager manages | — Capacity management –› | Team manages |
Product delivery requires significant shifts in the way you complete development and implementation work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.
5-10 minutes
Output: Increased appreciation of the relationship between project and product delivery
Participants: Executives, Product/project managers, Applications teams
In product-centric, Agile teams, many roles that a project manager previously performed are now taken care of to different degrees by the product owner, delivery team, and process manager.
The overall change alters the role of project management from one that orchestrates all activities to one that supports, monitors, and escalates.
5-10 minutes
Output: An assessment of what is in the way to effectively deliver on Agile and product-focused projects
Participants: Executives, Product/project managers, Applications teams
|
|
||||
|
|
5-10 minutes
Output: Current understanding of the role of project management in Agile/product delivery
Participants: Executives, Product/project managers, Applications teams
Project managers still have a role to play in Agile projects and products. Agreeing to what they should be doing is critical to successfully moving to a product-centric approach to delivery.
| Autonomy
Fund what delivers value Fund long-lived delivery of value through products (not projects). Give autonomy to the team to decide exactly what to build. | Flexibility
Allocate iteratively Allocate to a pool based on higher-level business case. Provide funds in smaller amounts to different product teams and initiatives based on need. |
| Accountability
Measure and adjust Product teams define metrics that contribute to given outcomes. Track progress and allocate more (or less) funds as appropriate. | ![]() Info-Tech InsightChanges to funding require changes to product and Agile practices to ensure product ownership and accountability. |
(Adapted from Bain & Company)
| TRADITIONAL PROJECTS WITH WATERFALL DELIVERY | TRADITIONAL PROJECTS WITH AGILE DELIVERY | PRODUCTS WITH AGILE PROJECT DELIVERY | PRODUCTS WITH AGILE DELIVERY | |
WHEN IS THE BUDGET TRACKED? |
Budget tracked by major phases | Budget tracked by sprint and project | Budget tracked by sprint and project | Budget tracked by sprint and release |
HOW ARE CHANGES HANDLED? |
All change is by exception | Scope change is routine; budget change is by exception | Scope change is routine; budget change is by exception | Budget change is expected on roadmap cadence |
WHEN ARE BENEFITS REALIZED? |
Benefits realization post project completion | Benefits realization ongoing throughout the life of the project | Benefits realization ongoing throughout the life of the product | Benefits realization ongoing throughout life of the product |
WHO DRIVES? |
Project Manager
|
Product Owner
|
Product Manager
|
Product Manager
|
| ˆ ˆ
Hybrid Operating Environments |
||||
As you evolve your approach to product delivery, you will be decoupling the expected benefits, forecast, and budget. Managing them independently will improve your ability adapt to change and drive the right outcomes!
Output: Understanding of funding principles and challenges
Participants: Executives, Product owners, Product managers, Project managers, Delivery managers
| Global Digital Financial Services Company
This financial services company looked to drive better results by adopting more product-centric practices.
Results
|
|
|
Deliver on Your Digital Product Vision
Implement Agile Practices That Work
Implement DevOps Practices That Work
Prepare an Actionable Roadmap for Your PMO
|
Deliver Digital Products at Scale
Extend Agile Practices Beyond IT
Spread Best Practices With an Agile Center of Excellence
Tailor IT Project Management Processes to Fit Your Projects
|
Cobb, Chuck. “Are there Project Managers in Agile?” High Impact Project Management, n.d. Web.
Cohn, Mike. “What Is a Product?” Mountain Goat Software, 6 Sept. 2016. Web.
Cobb, Chuck. “Agile Project Manager Job Description.” High Impact Project Management, n.d. Web.
“How do you define a product?” Scrum.org, 4 April 2017. Web.
Johnson, Darren, et al. “How to Plan and Budget for Agile at Scale.” Bain & Company, 8 Oct. 2019. Web.
“Product Definition.” SlideShare, uploaded by Mark Curphey, 25 Feb. 2007. Web.
Project Management Institute. A Guide to the Project Management Body of Knowledge (PMBOK Guide). 7th ed., Project Management Institute, 2021.
Schuurman, Robbin. “Scrum Master vs Project Manager – An Overview of the Differences.” Scrum.org, 11 Feb 2020. Web.
Schuurman, Robbin. “Product Owner vs Project Manager.” Scrum.org, 12 March 2020. Web.
Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management.” Academia.edu, 2010. Web.
“What is a Developer in Scrum?” Scrum.org, n.d. Web.
“What is a Scrum Master?” Scrum.org, n.d. Web.
“What is a Product Owner?” Scrum.org, n.d. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand what AI really is in the modern world and how AI technologies impact the business functions.
Develop a good understanding of where AI is delivering value in your industry and other verticals. Determine the top three business goals to get value from your AI and give your AI a purpose.
Brainstorm your AI PoC projects, prioritize and sequence your AI ideas, select your first AI PoC, and create a minimum viable business case for this use case.
Effective service metrics will provide the following service gains:
Which will translate into the following relationship gains:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify the appropriate service metrics based on stakeholder needs.
Present the right metrics in the most interesting and stakeholder-centric way possible.
Run a pilot with a smaller sample of defined service metrics, then continuously validate your approach and make refinements to the processes.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define stakeholder needs for IT based on their success criteria and identify IT services that are tied to the delivery of business outcomes.
Derive meaningful service metrics based on identified IT services and validate that metrics can be collected and measured.
Design meaningful service metrics from stakeholder needs.
Validate that metrics can be collected and measured.
1.1 Determine stakeholder needs, goals, and pain points.
1.2 Determine the success criteria and related IT services.
1.3 Derive the service metrics.
1.4 Validate the data collection process.
1.5 Validate metrics with stakeholders.
Understand stakeholder priorities
Adopt a business-centric perspective to align IT and business views
Derive meaningful business metrics that are relevant to the stakeholders
Determine if and how the identified metrics can be collected and measured
Establish a feedback mechanism to have business stakeholders validate the meaningfulness of the metrics
Determine the most appropriate presentation format based on stakeholder needs.
Ensure the metrics are presented in the most interesting and stakeholder-centric way possible to guarantee that they are read and used.
2.1 Understand the different presentation options.
2.2 Assess stakeholder needs for information.
2.3 Select and design the metric report.
Learn about infographic, scorecard, formal report, and dashboard presentation options
Determine how stakeholders would like to view information and how the metrics can be presented to aid decision making
Select the most appropriate presentation format and create a rough draft of how the report should look
Run a pilot with a smaller sample of defined service metrics to validate your approach.
Make refinements to the implementation and maintenance processes prior to activating all service metrics.
High user acceptance and usability of the metrics.
Processes of identifying and presenting metrics are continuously validated and improved.
3.1 Select the pilot metrics.
3.2 Gather data and set initial targets.
3.3 Generate the reports and validate with stakeholders.
3.4 Implement the service metrics program.
3.5 Track and maintain the metrics program.
Select the metrics that should be first implemented based on urgency and impact
Complete the service intake form for a specific initiative
Create a process to gather data, measure baselines, and set initial targets
Establish a process to receive feedback from the business stakeholders once the report is generated
Identify the approach to implement the metrics program across the organization
Set up mechanism to ensure the success of the metrics program by assessing process adherence and process validity
“Service metrics are one of the key tools at IT’s disposal in articulating and ensuring its value to the business, yet metrics are rarely designed and used for that purpose.
Creating IT service metrics directly from business and stakeholder outcomes and goals, written from the business perspective and using business language, is critical to ensuring that the services that IT provides are meeting business needs.
The ability to measure, manage, and improve IT service performance in relation to critical business success factors, with properly designed metrics, embeds IT in the value chain of the business and ensures IT’s focus on where and how it enables business outcomes.”
Valence Howden,
Senior Manager, CIO Advisory
Info-Tech Research Group
This Research Is Designed For:
|
This Research Will Help You:
|
This Research Will Also Assist:
|
This Research Will Help Them
|
What are service metrics?Service metrics measure IT services in a way that relates to a business outcome. IT needs to measure performance from the business perspective using business language. |
Why do we need service metrics?
To ensure the business cares about the metrics that IT produces, start with business needs to make sure you’re measuring the right things. This will give IT the opportunity talk to the right stakeholders and develop metrics that will meet their business needs. Service metrics are designed with the business perspective in mind, so they are fully aligned with business objectives. |
| Perspectives Matter
Different stakeholders will require different types of metrics. A CEO may require metrics that provide a snapshot of the critical success of the company while a business manager is more concerned about the performance metrics of their department. |
What are the benefits of implementing service metrics?
Service metrics help IT communicate with the business in business terms and enables IT to articulate how and where they provide business value. Business stakeholders can also easily understand how IT services contribute to their success. |
| A significantly higher proportion of CIOs than CEOs feel that there is significant improvement necessary for business value metrics and stakeholder satisfaction reporting. | N=364
|
|
When considering only CEOs who said that stakeholder satisfaction reporting needed significant improvement, the average satisfaction score goes down to 61.6%, which is a drop in satisfaction of 12%.
|
| When the CIOs believe business value metrics weren’t required, 50% of their CEOs said that significant improvements were necessary.
|
|
A business process consists of multiple business activities. In many cases, these business activities require one or more supporting IT services.
|
For each business process, business stakeholders and their goals and objectives should be identified.
For each business activity that supports the completion of a business process, define the success criteria that must be met in order to produce the desirable outcome. Identify the IT services that are used by business stakeholders for each business activity. Measure the performance of these services from a business perspective to arrive at the appropriate service metrics. |
Stakeholders have different goals and objectives; therefore, it is critical to identify what type of metrics should be presented to each stakeholder.
Business Metrics
Determine Business SuccessBusiness metrics are derived from a pure business perspective. These are the metrics that the business stakeholders will measure themselves on, and business success is determined using these metrics. |
|
Service Metrics
Manage Service Value to the BusinessService metrics are used to measure IT service performance against business outcomes. These metrics, while relating to IT services, are presented in business terms and are tied to business goals. |
|
IT Metrics
Enable Operational ExcellenceIT metrics are internal to the IT organization and used to manage IT service delivery. These metrics are technical, IT-specific, and drive action for IT. They are not presented to the business, and are not written in business language. |
At the very least, IT needs to have a service-oriented view and understand the specific needs and objectives associated with each stakeholder.
Once IT can present service metrics that the business cares about, it can continue on the service provider journey by managing the performance of services based on business needs, determine and influence service demand, and assess service value to maximize benefits to the business.
|
Business Relationship ManagementBRM works to understand the goals and objectives of the business and inputs them into the design of the service metrics. Service MetricsBRM leverages service metrics to help IT organizations manage the relationship with the business. BRM articulates and manages expectations and ensures IT services are meeting business requirements. |
![]() | Service Level ManagementSLM works with the business to understand service requirements, which are key inputs in designing the service metrics. Service MetricsSLM leverages service metrics in overseeing the day-to-day delivery of IT services. It ensures they are provided to meet expected service level targets and objectives. |
Effective service metrics will provide the following service gains:
Conventional Wisdom |
Info-Tech Perspective |
| Metrics are measured from an application or technology perspective | Metrics need to be derived from a service and business outcome perspective. |
| The business doesn’t care about metrics | Metrics are not usually designed to speak in business terms about business outcomes. Linking metrics to business objectives creates metrics that the business cares about. |
| It is difficult to have a metrics discussion with the business | It is not a metrics/number discussion, it is a discussion on goals and outcomes. |
| Metrics are only presented for the implementation of the service, not the ongoing outcome of the service | IT needs to focus on service outcome and not project outcome. |
| Quality can’t be measured | Quality must be measured in order to properly manage services. |
1 |
2 |
3 |
| Design Your Metrics | Develop and Validate Reporting | Implement, Track, and Maintain |
|
|
|
| Start the development and creation of your service metrics by keeping business perspectives in mind, so they are fully aligned with business objectives. | Identify the most appropriate presentation format based on stakeholder preference and need for metrics. | Track goals and success metrics for your service metrics programs. It allows you to set long-term goals and track your results over time. |
The CIO must actively demonstrate support for the service metrics program and lead the initial discussions to determine what matters to business leaders.
It is critical to determine if the designed service metrics are fulfilling their intended purpose. The process of maintaining the service metrics program and the outcomes of implementing service metrics need to be monitored and tracked.
| Validating Service Metrics Design | |
Target Outcome |
Related Metrics |
| The business is enabled to identify and improve service performance to their end customer | # of improvement initiatives created based on service metrics $ cost savings/revenue generated due to actions derived from service metrics |
|
Procedure to validate the usefulness of IT metrics |
# / % of service metrics added/removed per year |
| Alignment between IT and business objectives and processes | Business’ satisfaction with IT |
It is critical to determine if the designed service metrics are fulfilling their intended purpose. The process of maintaining the service metrics program and the outcomes of implementing service metrics need to be monitored and tracked.
| Validating Service Metrics Process | |
Target Outcome | Related Metrics |
| Properly defined service metrics aligned with business goals/outcomes Easy understood measurement methodologies | % of services with (or without) defined service metrics % of service metrics tied to business goals |
| Consistent approach to review and adjust metrics | # of service metrics adjusted based on service reviews % of service metrics reviewed on schedule |
In a study done by the Aberdeen Group, organizations engaged in the use of metrics benchmarking and measurement have:
|
A service metric is defined for: “Response time for Business Application A”
The expected response time has not been achieved and this is visible in the service metrics. The reduced performance has been identified as having an impact of $250,000 per month in lost revenue potential. The service metric drove an action to perform a root-cause analysis, which identified a network switch issue and drove a resolution action to fix the technology and architect redundancy to ensure continuity. The fix eliminated the performance impact, allowing for recovery of the $250K per month in revenue, improved end-user confidence in the organization, and increased use of the application, creating additional revenue. |
| CASE STUDY |
Industry: Manufacturing | Source: CIO interview and case material |
| Situation
The manufacturing business operates within numerous countries and requires a lot of coordination of functions and governance oversight. The company has monthly meetings, both regional and national, and key management and executives travel to attend and participate in the meetings. ComplicationWhile the meetings provide a lot of organizational value, the business has grown significantly and the cost of business travel has started to become prohibitive. ActionIt was decided that only a few core meetings would require onsite face-to-face meetings, and for all other meetings, the company would look at alternative means. The face-to-face aspect of the meetings was still considered critical so they focused on options to retain that aspect. The IT organization identified that they could provide a video conferencing service to meet the business need. The initiative was approved and rolled out in the organization. |
Result:IT service metrics needed to be designed to confirm that the expected value outcome of the implementation of video conferencing was achieved. Under the direction of the CIO, the business goals and needs driving use of the service (i.e. reduction in travel costs, efficiency, no loss of positive outcome) were used to identify success criteria and key questions to confirm success. With this information, the service manager was able to implement relevant service metrics in business language and confirmed an 80% adoption rate and a 95% success rate in term meetings running as expected and achieving core outcomes. |
Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.
This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.
This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| 1. Design the Metrics | 2. Design Reports and Dashboards | 3. Implement, Track, and Maintain | |
Best-Practice Toolkit |
|
|
|
Guided Implementations |
|
|
|
Onsite Workshop |
Module 1: Derive Service Metrics From Business Goals |
Module 2: Select and Design Reports and Dashboards |
Module 3: Implement, Track, and Maintain Your Metrics to Ensure Success |
Phase 1 Outcome:
|
Phase 2 Outcome:
|
Phase 3 Outcome:
|
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
Design the Metrics |
Determine Presentation Format and Implement Metrics |
Gather Service Level Requirements |
Monitor and Improve Service Levels |
|
Activities |
|
|
|
|
Deliverables |
|
|
|
|
| PHASE 1 | PHASE 2 | PHASE 3 | ||
1.1Derive the Service Metrics |
1.2Validate the Metrics |
2.1Determine Reporting Format |
3.1Select Pilot Metrics |
3.2Activate and Maintain Metrics |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 1.1: Design Metrics | Step 1.2: Validate the Metrics |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
|
Step 1 Derive your service metrics Metrics Worksheet |
|
Step 2 Validate your metrics Metrics Worksheet |
|
Step 3 Confirm with stakeholders Metrics Tracking Sheet |
Defined IT Service Metrics |
| Service metrics must be designed with the business perspective in mind so they are fully aligned with business objectives.
Thus, IT must start by identifying specific stakeholder needs. The more IT understands about the business, the more relevant the metrics will be to the business stakeholders. |
|
1.1 Metrics Development Workbook
This workbook guides the development and creation of service metrics that are directly tied to stakeholder needs.
This process will ensure that your service metrics are designed with the business perspective in mind so they are fully aligned with business objectives.
Download the Metrics Development Workbook. |
|
1.1 0.5 Hour
Who are your stakeholders?
|
Video Conferencing Case Study For this phase, we will demonstrate how to derive the service metrics by going through the steps in the methodology. At a manufacturing company, the CIO’s main stakeholder is the CEO, whose chief concern is to improve the financial position of the company. |
1.2 0.5 Hour
What are their goals and pain points?
|
VC Case Study One of the top initiatives identified by the company to improve financial performance was to reduce expense. Because the company has several key locations in different states, company executives used to travel extensively to carry out meetings at each location. Therefore, travel expenses represent a significant proportion of operational expenses and reducing travel costs is a key goal for the company’s executives. |
1.3 0.5 HourWhat do the stakeholders need to know?
| VC Case Study The CEO needs to have assurance that without executives traveling to each location, remote meetings can be as effective as in-person meetings. These meetings must provide the same outcome and allow executives to collaborate and make similar strategic decisions without the onsite, physical presence. Therefore, the success criteria are:
|
1.4 1 HourWhat does IT need to measure?
| VC Case Study The IT department decides to implement the video conferencing service to reduce the number of onsite meetings. This technology would allow executives to meet remotely with both audio and video and is the best option to replicate a physical meeting. The service is initially available to senior executives and will be rolled out to all internal users once the initial implementation is deemed successful. To determine the success of the service, the following needs to be measured:
|
1.5 0.5 HourDerive your service metrics
| VC Case Study In the previous step, IT identified that it must measure the outcomes of VC meetings, quality of the VC meetings, and the reduction in travel expenses. From these, the appropriate service metrics can be derived to answer the needs of the CEO. IT needs to measure:
IT also identified the following business metrics:
|
| Can you measure it? | The first question IT must answer is whether the metric is measurable. IT must identify the data source, validate its ability to collect the data, and specify the data requirement. Not all metrics can be measured! |
| How will you measure it? | If the metric is measurable, the next step is to create a way to measure the actual data. In most cases, simple formulas that can be easily understood are the best approach. |
| Define your actions | Metrics must be used to drive or reinforce desirable outcomes and behaviors. Thus, IT must predetermine the necessary actions associated with the different metric levels, thresholds, or trends. |
1.6 0.5 HourINSTRUCTIONS
| VC Case Study Using the metric derived from the video conferencing service example, IT wants to measure the % of VC meetings successfully delivered. What are the data sources?
|
1.6 0.5 HourINSTRUCTIONS
| VC Case Study Data requirement for percent of successful VC meetings:
|
1.7 0.5 HourINSTRUCTIONS
| VC Case Study Metric: Percent of VC meetings delivered successfully IT is able to determine the total number of VC meetings that took place and the number of VC service requests to the help desk. That makes it possible to use the following formula to determine the success percentage of the VC service: ((total # VC) – (# of VC with identified incidents)) / (total # VC) * 100 |
1.7 1.5 HourINSTRUCTIONSCentered on the defined metrics and their calculations, IT can decide on the actions that should be driven out of each metric based on one of the following scenarios:
| VC Case Study If the success rate of the VC meetings is below 90%, IT needs to focus on determining if there is a common cause and identify if this is a consistent downward trend. A root-cause analysis is performed that identifies that network issues are causing difficulties, impacting the connection quality and usability of the VC service. |
1.8 1 Hour
INPUT: Selected service metrics, Discussion with the business
OUTPUT: Validated metrics with the business
Materials: Metrics with calculation methodology
Participants: IT and business stakeholders, Service owners
| Service Metric | Corresponding Business Goal |
Measurement Method |
Defined Actions |
| Who are IT’s stakeholders? | The financial institution provides various banking solutions to its customers. Retail banking is a core service offered by the bank and the VP of retail banking is a major stakeholder of IT. |
| What are their goals and pain points? | The VP of retail banking’s highest priorities are to increase revenue, increase market share, and maintain the bank’s brand and reputation amongst its customers. |
| What do they need to know? | In order to measure success, the VP of retail banking needs to determine performance in attracting new clients, retaining clients, expanding into new territory, and whether they have increased the number of services provided to existing clients. |
| What does IT need to measure? | The recent implementation of an online banking service is a key initiative that will keep the bank competitive and help retail banking meet its goals. The key indicators of this service are: the total number of clients, the number of products per client, percent of clients using online banking, number of clients by segment, service, territory. |
| Derive the service metrics | Based on the key indicators, IT can derive the following service metrics: 1. Number of product applications originated from online banking 2. Customer satisfaction/complaints As part of the process, IT also identified some business metrics, such as the number of online banking users per month or the number of times a client accesses online banking per month. |
| CASE STUDY |
Industry: Manufacturing | Source: CIO |
| Challenge | Solution | Results |
| The IT organization needed to generate metrics to show the business whether the video conferencing service was being adopted and if it was providing the expected outcome and value.
Standard IT metrics were technical and did not provide a business context that allowed for easy understanding of performance and decision making. |
The IT organization, working through the CIO and service managers, sat down with the key business stakeholders of the video conferencing service.
They discussed the goals for the meeting and defined the success criteria for those goals in the context of video conference meeting outcomes. The success criteria that were discussed were then translated into a set of questions (key performance indicators) that if answered, would show that the success criteria were achieved. |
The service manager identified what could be measured to answer the defined questions and eliminated any metrics that were either business metrics or non-IT related.
The remaining metrics were identified as the possible service metrics, and the ability to gather the information and produce the metric was confirmed. Service metrics were defined for:
|

|
|
1.1 |
|
Determine stakeholder needs, goals, and pain points
The onsite analyst will help you select key stakeholders and analyze their business objectives and current pain points. |
1.2 |
|
Determine the success criteria and related IT services
The analyst will facilitate a discussion to uncover the information that these stakeholders care about. The group will also identify the IT services that are supporting these objectives. |

1.5 |
|
Derive the service metrics
Based on the key performance indicators obtained in the previous page, derive meaningful business metrics that are relevant to the stakeholders. |
1.6 |
|
Validate the data collection process
The analyst will help the workshop group determine whether the identified metrics can be collected and measured. If so, a calculation methodology is created. |
1.7 |
|
Validate metrics with stakeholders
Establish a feedback mechanism to have business stakeholders validate the meaningfulness of the metrics. |
| PHASE 1 | PHASE 2 | PHASE 3 | ||
1.1Derive the Service Metrics | 1.2Validate the Metrics | 2.1Determine Reporting Format | 3.1Select Pilot Metrics | 3.2Activate and Maintain Metrics |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 2.1: Select Presentation Format | Step 2.2: Review Design |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
|
Step 1 Understand the pros and cons of different reporting styles |
|
Step 2 Determine your reporting and presentation style Presentation Format Selection |
|
Step 3 Design your metrics reports |
Validated Service Reports |
The reports must also display information in a way that generates actions. If your stakeholders cannot make decisions, kick off activities, or ask questions based on your reports, then they have no value.
| Dashboard (PwC. “Mega-Trends and Implications.”)
|
Infographic (PwC. “Healthcare’s new entrants.”)
|
| Report (PwC Blogs. “Northern Lights.”)
|
Scorecard (PwC. “Annual Report 2015.”)
|
A dashboard is a reporting method that provides a dynamic at-a-glance view of key metrics from the perspective of key stakeholders. It provides a quick graphical way to process important performance information in real time.
| Features
Typically web-based Dynamic data that is updated in real time |
Advantage
Aggregates a lot of information into a single view Presents metrics in a simplistic style that is well understood Provides a quick point-in-time view of performance Easy to consume visual presentation style |
Disadvantage
Complicated to set up well. Promotes a short-term outlook – focus on now, no historical performance and no future trends. Doesn’t provide the whole picture and story. Existing dashboard tools are often not customized enough to provide real value to each stakeholder. |
![]() (Source: PwC. “Mega-Trends and Implications.”) |
Metrics presented through online dashboards are calculated in real time, which allows for a dynamic, current view into the performance of IT services at any time. |
An infographic is a graphical representation of metrics or data, which is used to show information quickly and clearly. It’s based on the understanding that people retain and process visual information more readily than written details.
| Features
Turns dry into attractive –transforms data into eye-catching visual memory that is easier to retain Can be used as the intro to a formal report There are endless types of infographics |
Advantage
Easily consumable Easy to retain Eye catching Easily shared Spurs conversation Customizable |
Disadvantage
Require design expertise and resources Can be time consuming to generate Could be easily misinterpreted Message can be lost with poor design |
![]() (Source: PwC. “Healthcare’s new entrants…”) |
There is no limit when it comes to designing an infographic. The image used here visually articulates the effects of new entrants pulling away the market. |
A formal report is a more structured and official reporting style that contains detailed research, data, and information required to enable specific business decisions, and to help evaluate performance over a defined period of time.
| Definition
Metrics can be presented as a component of a periodic, formal report A physical document that presents detailed information to a particular audience |
Advantage
More detailed, more structured and broader reporting period Formal, shows IT has put in the effort Effectively presents a broader and more complete story Targets different stakeholders at the same time |
Disadvantage
Requires significant effort and resources Higher risk if the report does not meet the expectation of the business stakeholder Done at a specific time and only valuable for that specific time period Harder to change format |
![]() (Source: PwC Blogs. “Northern Lights: Where are we now?”) |
An effective report incorporates visuals to demonstrate key improvements.
Formal reports can still contain visuals, but they are accompanied with detailed explanations. |
A scorecard is a graphic view of the progress and performance over time of key performance metrics. These are in relation to specified goals based on identified critical stakeholder objectives.
| Features Incorporates multiple metrics effectively. Scores services against the most important organizational goals and objectives. Scorecards may tie back into strategy and different perspectives of success. | Advantage Quick view of performance against objectives Measure against a set of consistent objectives Easily consumable Easy to retain | Disadvantage Requires a lot of forethought |
![]() (PwC. “Annual Report 2015.”) |
Scorecards provide a summary of performance that is directly linked to the organizational KPIs. |
2.1 Metrics Presentation Format Selection Guide
In this section, you will determine the optimal reporting style for the service metrics.
This guide contains four questions, which will help IT organizations identify the most appropriate presentation format based on stakeholder preference and needs for metrics.
|
|
| Download the Metrics Presentation Format Selection Guide. | |
2.1 2 Hours
INPUT: Identified stakeholder and his/her role
OUTPUT: Proper presentation format based on need for information
Materials: Metrics Presentation Format Selection Guide
Participants: BRM, SLM, Program Manager
After deciding on the report type to be used to present the metric, the organization needs to consider how stakeholders will consume the metric.
There are three options based on stakeholder needs and available presentation options within IT.
2.2 30 Minutes
Be sure to consider access rights for more senior reports. Site and user access permissions may need to be defined based on the level of reporting.
| CASE STUDY |
Industry: Manufacturing | Source: CIO Interview |
| The Situation
The business had a clear need to understand if the implementation of video conferencing would allow previously onsite meetings to achieve the same level of effectiveness. Reporting ContextProvided reports had always been generated from an IT perspective and the business rarely used the information to make decisions. The metrics needed to help the business understand if the meetings were remaining effective and be tied into the financial reporting against travel expenses, but there would be limited visibility during the executive meetings. |
ApproachThe service manager reviewed the information that he had gathered to confirm how often they needed information related to the service. He also met with the CIO to get some insight into the reports that were already being provided to the business, including the ones that were most effective. ConsiderationsThe conversations identified that there was no need for a dynamic real-time view of the performance of the service, since tracking of cost savings and utility would be viewed monthly and quarterly. They also identified that the item would be discussed within a very small window of time during the management meetings. The SolutionIt was determined that the best style of reporting for the metric was an existing scorecard that was produced monthly, using some infographics to ensure that the information is clear at a glance to enable quick decision making. |

|
|
2.1 |
|
Understand the different presentation options
The onsite analyst will introduce the group to the communication vehicles of infographic, scorecard, formal report, and dashboard. |
2.1 |
|
Assess stakeholder needs for information
For selected stakeholders, the analyst will facilitate a discussion on how stakeholders would like to view information and how the metrics can be presented to aid decision making. |

2.2 |
|
Select and design the metric report
Based on the discussion, the working group will select the most appropriate presentation format and create a rough draft of how the report should look. |
| PHASE 1 | PHASE 2 | PHASE 3 | ||
1.1Derive the Service Metrics | 1.2Validate the Metrics | 2.1Determine Reporting Format | 3.1Select Pilot Metrics | 3.2Activate and Maintain Metrics |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 3.1: Select and Launch Pilot Metrics | Step 3.2: Track and Maintain the Metrics |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
|
Step 1 Run your pilot Metrics Tracking Tool |
|
Step 2 Validate success Metrics Tracking Tool |
|
Step 3 Implement your metrics program in batches Metrics Tracking Tool |
Active Service Metrics Program |
This allows you to validate your approach and make refinements to the implementation and maintenance processes where necessary, prior to activating all service metrics.
3.1
The Metrics Tracking Tool will enable you to track goals and success metrics for your service metrics programs. It allows you to set long-term goals and track your results over time.
There are three sections in this tool:
|
3.1 30 MinutesINPUT: Identified services, Business feedback
OUTPUT: Services with most urgent need or impact
Materials: Service catalog or list of identified services
Participants: BRM, SLM, Business representatives
To start the implementation of your service metrics program and drive wider adoption, you need to run a pilot using a smaller subset of metrics.
To determine the sample for the pilot, consider metrics that:
Metrics that meet two or more criteria are ideal for the pilot
3.2 1 HourINPUT: Identified metrics
OUTPUT: A data collection mythology, Metrics tracking
Materials: Metrics
Participants: SLM, BRM, Service owner
You will need to start collection and validation of your identified data in order to calculate the results for your pilot metrics.
3.3 1 HourINPUT: Historical data/baseline data
OUTPUT: Realistic initial target for improvement
Materials: Metrics Tracking Tool
Participants: BRM, SLM, Service owner
Identify an initial service objective based on one or more of the following options:
The target may not always be a number - it could be a trend. The initial target will be changed after review with stakeholders
3.4 1 HourINPUT: SLM and BRM SOPs or responsibility documentations
OUTPUT: Integrate service metrics into the SLM/BRM role
Materials: SLM / BRM reports
Participants: SLM, BRM, CIO, Program manager, Service manager
The service metrics program is usually initiated, used, and maintained by the SLM and BRM functions.
Ensure that the metrics pilot is integrated with those functions by:
3.5 1 HourINPUT: Identified metrics, Selected presentation format
OUTPUT: Metrics reports that are ready for distribution
Materials: Metrics Presentation Format Selection Guide
Participants: BRM, SLM, CIO, Business representatives
Once you have completed the calculation for the pilot metrics:
3.6 1 HourINPUT: Feedback from pilot, Services in batch
OUTPUT: Systematic implementation of metrics
Materials: Metrics Tracking Tool
Participants: BRM, SLM, Program manager
Upon completion of the pilot, move to start the broader implementation of metrics across the organization:
3.7 1.5 HourINPUT: Feedback from business stakeholders
OUTPUT: Modification to individual metrics or to the process
Materials: Metrics Tracking Tool, Metrics Development Workbook
Participants: CIO, BRM, SLM, Program manager, Service owner
Once service metrics and reporting become active, it is necessary to determine the review time frame for your metrics to ensure they remain useful.
3.7
Based on the outcome of the review meeting, decide what needs to be done for each metric, using the following options:
| Add
A new metric is required or an existing metric needs large-scale changes (example: calculation method or scope). |
Change
A minor change is required to the presentation format or data. Note: a major change in a metric would be performed through the Add option. |
| Remove
The metric is no longer required, and it needs to be removed from reporting and data gathering. A final report date for that metric should be determined. |
Maintain
The metric is still useful and no changes are required to the metric, its measurement, or how it’s reported. |
| VC CASE STUDY | Industry: Manufacturing | Source: CIO Interview |
Reviewing the value of active metricsWhen the video conferencing service was initially implemented, it was performed as a pilot with a group of executives, and then expanded for use throughout the company. It was understood that prior to seeing the full benefit in cost reduction and increased efficiency and effectiveness, the rate of use and adoption had to be understood. The primary service metrics created for the service were based on tracking the number of requests for video conference meetings that were received by the IT organization. This identified the growth in use and could be used in conjunction with financial metrics related to travel to help identify the impact of the service through its growth phase. Once the service was adopted, this metric continued to be tracked but no longer showed growth or expanded adoption. The service manager was no longer sure this needed to be tracked. |
Key ActivityThe metrics around requests for video conference meetings were reviewed at the annual metrics review meeting with the business. The service manager asked if the need for the metric, the goal of tracking adoption, was still important for the business. The discussion identified that the adoption rate was over 80%, higher than anticipated, and that there was no value in continuing to track this metric. Based on the discussion, the adoption metrics were discontinued and removed from data gathering and reporting, while a success rate metric was added (how many meetings ran successfully and without issue) to ensure the ongoing value of the video conferencing service. |

![]() |
|
3.1 |
|
Select the pilot metrics
The onsite analyst will help the workshop group select the metrics that should be first implemented based on the urgency and impact of these metrics. |
3.2 |
|
Gather data and set initial targets
The analyst will help the group create a process to gather data, measure baselines, and set initial targets. |

3.5 |
|
Generate the reports and validate with stakeholders
The Info-Tech analyst will help the group establish a process to receive feedback from the business stakeholders once the report is generated. |
3.6 |
|
Implement the service metrics program
The analyst will facilitate a discussion on how to implement the metrics program across the organization. |
3.7 |
|
Track and maintain the metrics program
Set up a mechanism to ensure the success of the metrics program by assessing process adherence and process validity. |
Service metrics are critical to ensuring alignment of IT service performance and business service value achievement.
Service metrics reinforce positive business and end-user relationships by providing user-centric information that drives responsiveness and consistent service improvement.
Poorly designed metrics drive unintended and unproductive behaviors that have negative impacts on IT and produce negative service outcomes.
| Name | Organization |
| Joe Evers | Joe Evers Consulting |
| Glen Notman | Associate Partner, Citihub |
| David Parker | Client Program Manager, eHealth Ontario |
| Marianne Doran Collins | CIO, The CIO-Suite, LLC |
| Chris Kalbfleisch | Manager, Service Management, eHealth Ontario |
| Joshua Klingenberg | BHP Billiton Canada Inc. |
|
Design & Build a User-Facing Service Catalog The user-facing service catalog is the go-to place for IT service-related information. |
|
Unleash the True Value of IT by Transforming Into a Service Provider Earn your seat at the table and influence business strategy by becoming an IT service provider. |
Pollock, Bill. “Service Benchmarking and Measurement: Using Metrics to Drive Customer Satisfaction and Profits.” Aberdeen Group. June 2009. http://722consulting.com/ServiceBenchmarkingandMeasurement.pdf
PwC. “Mega-Trends and Implications.” RMI Discussion. LinkedIn SlideShare. September 2015. http://www.slideshare.net/AnandRaoPwC/mega-trends-and-implications-to-retirement
PwC. “Healthcare’s new entrants: Who will be the industry’s Amazon.com?” Health Research Institute. April 2014. https://www.pwc.com/us/en/health-industries/healthcare-new-entrants/assets/pwc-hri-new-entrant-chart-pack-v3.pdf
PwC. “Northern Lights: Where are we now?” PwC Blogs. 2012. http://pwc.blogs.com/files/12.09.06---northern-lights-2--summary.pdf
PwC. “PwC’s key performance indicators
This research is designed to help organizations who are preparing for a merger or acquisition and need help with:
The goal of M&A cybersecurity due diligence is to assess security risks and the potential for compromise. To succeed, you need to look deeper.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read our concise Executive Brief to find out how to master M&A cyber security due diligence, review Info-Tech’s methodology, and understand how we can support you in completing this project.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Discover Info-Tech's six priorities for Infrastructure & Operations leaders.
|
Over the last several years, successful CEOs turned to their Infrastructure and Operations (I&O) departments to survive the effects of the pandemic. It was I&O leaders who were able to reconfigure critical infrastructure on the fly to support remote work, adapt to critical supply chain shortages, and work with lines of business managers to innovate operational workflows. 2023 promises to bring a new set of challenges. Building on the credibility established during the pandemic, I&O is in a unique position to influence the direction a business will take to be successful in a time of austerity. I&O members are going to be asked to mitigate the threats of volatility from recession pressures, new cybersecurity attacks, and operational process and litigation from regulatory mandates. At the same time, I&O members are being asked for fundamental digital transformation items to realize long-term opportunities to their organizations in 2023. Seemingly counter-intuitive in a time of economic slowdown, organizations in 2023 will want to start the groundwork to realizing the I&O opportunities that unstructured data and artificial intelligence have promised, while prepping for what has been mislabeled as the Metaverse. |
If you are in a traditionally risk adverse industry, you’re more likely to be impacted by the threat mitigation. Opportunistic I&O members will use 2023 to proactively jumpstart digital transformation. |
|
If I&O members learned anything from the last few years, it’s how to tactically respond to the disruptive waves often arising from sources external to the organization. The good news is that Info-Tech’s I&O priorities report provides forward-looking insights to help members become more proactive to the tsunami of change predicted in our Trends Report to happen over the next three to five years. Info-Tech I&O priorities are generated through a phased approach. The first phase senses and identifies mega and macro tends in the digital landscape to formulate hypotheses about the trends for the next three to five years. These hypotheses are validated by sending out a survey to Info-Tech members. The responses from 813 members was used to produce an Info-Tech Trends Report focused on major long-term trends. The I&O Priorities were determined by combining the I&O member responses within the Info-tech Trends Survey with insightful signals from secondary research, economic markets, regulatory bodies, industry organizations, and vendors. The six I&O priorities identified in this report are presented in a framework that highlight the impacts of an economic slowdown, growing regulatory reporting requirements, cybersecurity threats, smart governance of AI, embracing stewardship of data, and the looming explosion of augmented reality and Web 3.0 technologies. We also have a challenge exercise to help you communicate which priorities to focus your I&O organization on. Additionally, we linked some Info-tech research and tools related to the priorities that help your I&O organization formulate actionable plans for each area. |
Priorities Six forward-looking priorities for the next year. Focus Activity to help select which priorities are relevant for you. Actions Actionable Info-tech research and tools to help you deliver. |
|
Threats signals Enhance I&O Cybersecurity Produce ESG Reporting Recession Readiness |
Get out of your silo. Forget your job description and start doing what needs to be done. Infrastructure rarely has authority in these areas, but somehow it ends up with many of the responsibilities. You can't afford to be reactive. Forget about your traditional silo and get out in front of these topics. Not in your job description? Find out whose job it is and make them aware. Better yet – take charge! If you're going to be responsible you might as well be in control. |
|
Opportunities signals AI Governance: Watching the Watchers Prep for A Brave New Metaverse Data Governance: Cornerstone of Value |
Proper stewardship of data is an I&O must. If thought you had problems with your unstructured data, wait until you see the data sprawl coming from the metaverse. I&O needs to be so much more than just an order taker for the dev teams and lines of business. The sprawl of unstructured data in Word, Excel, PDF and PowerPoint was bad historically; imagine those same problems at metaverse scale! Simple storage and connectivity is no longer enough – I&O must move upstream with more sophisticated service and product offerings generated through proper governance and stewardship. |
|
The hidden message in this report is that I&O priorities extend beyond the traditional scope of I&O functions. I&O members need to collaborate across functional areas to successfully address the priorities presented in this report. Info-Tech can help! Align your priorities with our material on how to Build a Business-Aligned IT Strategy. Use a modified version of the Strategy Initiative Template (next slide) to convey your strong opinion on the priorities you need your stakeholders to know about. And do so in a way that is familiar so they will easily understand. |
Info-Tech 2023 Trends Survey Results |
|
Call your Executive Advisor or Counselor to help identify the one or two key messages you want to bring forward for success in 2023! |
Info-Tech IT Strategy Initiative Template, from the IT Strategy Presentation Template & Priorities Report Initiative Template . |
Enhance I&O Cybersecurity
Produce ESG Reporting
Recession Readiness
SIGNALS
|
Cybersecurity incidents are |
Cybersecurity incidents have |
Related Info-Tech Research |
|---|---|---|
|
Of the surveyed I&O members, 53% identified cybersecurity incidents as the number one threat disrupting their operations in 2023. It’s understandable, as over 18% of surveyed I&O members experienced a cybersecurity incident in 2022. Alarmingly, 10% of surveyed I&O members didn’t know if they had a cybersecurity incident. The impact to the organization was with 14% of those incidents directly impacting their organizations for anywhere from 6 to 60 days. |
The 2022 report “Cost of a Data Breach” was conducted by IBM and the Ponemon Institute using data from 550 companies (across 17 countries) that experienced a security incident during a 12-month period ending in March 2022. It highlighted that the average total organizational cost of a security breach globally was USD 4.35M (locally these numbers expand to USA at USD 9.44M, Canada at USD 5.64, UK at USD 5.05M, Germany at USD 4.85M). (Source: IBM, 2022) |
Organizations' exposure comes from internal and external sources. | The right tools and process can reduce the impact of a cybersecurity incident. | Related Info-Tech Research |
|---|---|---|
The IBM/Ponemon Institute report highlighted the following:
(Source: IBM, 2022) | The IBM/Ponemon Institute report also identified technologies and procedures to reduce the fiscal impacts of cybersecurity breaches. Having a dedicated security incident response team with a regularly tested plan reduced the incident cost by an average of USD 2.66M. A fully implemented AI security deduction and response automation system can provide average incident savings of 27.6%. |
|
Cybersecurity spending is a major and expanding expenditure for our members. |
Cybersecurity is going |
|
|---|---|---|
|
For 36% of surveyed I&O members, cybersecurity consumed between 10-20% of their total budget in 2022. Moreover, cybersecurity defense funding is expected to increase for 57% of I&O members. |
A third of surveyed I&O members viewed misinformation as a major risk to their organization for 2023 and 2024. Only 38% of the I&O members reported that they will have software in place to monitor and manage social media posts. |
Increasing environment and regulatory complexity demands more sophisticated cybersecurity operations. Infrastructure teams must be expected to work alongside and integrate with cybersecurity operations. |
Get out of your I&O silo and form cross-functional cybersecurity teams.
I&O priority actions
Establish a cross-functional security steering committee to coordinate security processes and technologies. The complexity of managing security across modern applications, cloud, IoT, and network infrastructure that members operate is greater than ever before and requires coordinated teamwork.
Contain the cyber threat with zero trust (ZT) architecture. Extend ZT to network and critical infrastructure to limit exposure.
Leverage AI to build vigilant security intelligence. Smart I&O operators will make use of AI automation to augment their security technologies to help detect threats and contain security incidents on critical infrastructure.
Build specialized cybersecurity incident management protocols with your service desk. Build integrated security focused teams within service desk operations that continually test and improve security incident response protocols internally and with specialized security vendors. In some organizations, security incident response teams extend beyond traditional infrastructure into social media. Work cross-functionally to determine the risk exposure to misinformation and incident response procedures.
Treat lost or stolen equipment as a security incident. Develop hardware asset management protocols for tracking and reporting on these incidents and keep a record of equipment disposal. Implement tools that allow for remote deletion of data and report on lost or stolen equipment.
SIGNALS
Government mandates present an operational risk to I&O members. | ESG reporting is | Related Info-Tech Research |
|---|---|---|
Surveyed members identified government-enacted policy changes to be a top risk to disrupting to their business operations in 2023. One of the trends identified by Info-Tech is that the impact of regulations on environmental, social, and governance (ESG) reporting are being rolled out by governments worldwide. | Alarmingly, only 7% of surveyed members responded that they could very accurately report on their carbon footprint and 23% said they were not able to report accurately at all. |
SIGNALS
ESG reporting has greatly expanded since a 2017 report by Task Force on Climate-Related Financial Disclosures (TCFD, 2017) which recommended that organizations disclose climate-related financial metrics for investors to appropriately price climate-related risks to share price. In 2021, the Swiss Finance Institute research paper (Sautner, 2021) identified 29 countries that require ESG reporting, primarily for larger public companies, financial institutions, and state-owned corporations.
Global ESG mandates
29 nations with ESG mandates identified by the Swiss Finance Institute
SIGNALS
|
ESG mandates are being rolled out globally. |
|
|
The EU has mandated ESG reporting for approximately 11,700 large public companies with more than 500 employees under the Non-Financial Reporting Directive (NFRD), since 2014. The EU is going to replace the NFRD with the Corporate Sustainability Reporting Directive (European Council, 2022), which has set a 3-year timetable for escalating the ESG reporting level to what is estimated to be about 75% of EU total turnover (WorldFavor, 2022).
|
It's been a long time since most enterprises had to report on things like power efficiency factors. But don't think that being in the cloud will insulate you from a renewed interest in ESG reporting. |
CALL TO ACTION
Being unprepared for new ESG reporting mandates without a clear and validated ESG reporting process puts your organization at risk.
I&O priority actions
Understand ESG risk exposure. Define the gap between what ESG reporting is required in your jurisdiction and current reporting capabilities to meet them. Build the I&O role with responsibility for ESG reporting.
Include vendors in ESG reporting. Review infrastructure facilities with landlords, utilities, and hosting providers to see if they can provide ESG reporting on sustainable power generation, then map it to I&O power consumption as part of their contractual obligations. Ask equipment vendors to provide ESG reporting on manufacturing materials and energy consumption to boot-strap data collection.
Implement a HAM process to track asset disposal and other types of e-waste. Update agreements with disposal vendors to get reporting on waste and recycle volumes.
Implement an ESG reporting framework. There are five major ESG reporting frameworks being used globally. Select one of the frameworks below that makes sense for your organization, and implement it.
ISO 14001 Environmental Management: Part of the ISO Technical Committee family of standards that allows your organization to understand its legal requirements to become certified in ESG.
Global Reporting Initiative (GRI) Sustainability Reporting Standards: GRI has been developing ESG reporting standards since 1997. GRI provides a modular ESG framework applicable to all sizes and sectors of organizations worldwide.
Principles for Responsible Investment: UN-developed framework for ESG reporting framework for disclosure in responsible investments.
Sustainability Accounting Standards Board (SASB): ESG report framework to be used by investors.
UN Global Compact: ESG reporting framework based on 10 principles that organizations can voluntarily contribute data to.
Implement a HAM process to track asset disposal and other types of e-waste. Update agreements with disposal vendors to get reports on waste and recycle volumes.
SIGNALS
|
Managing accelerated technical debt. |
Recessionary pressures. |
Related Info-Tech Research |
|
I&O members experienced a spike in technical debt following the global pandemic economic shutdown, workforce displacement, and highly disrupted supply chains. 2023 presents a clear opportunity to work on these projects. |
The shortages in workforce and supply chain have accelerated inflation post pandemic. Central banks have started to slow down inflation in 2022 by raising interest rates. However, the World Bank has forecast a potential 2% rise in interest rates as the battle with inflation continues into 2023 and beyond, which could set off a global slowdown in GDP growth to 0.5%, qualifying as a recession. If interest rates continue to climb, I&O members may struggle with the higher cost of capital for their investments. (Source: World Bank Organization, 2022) |
SIGNALS
|
I&O budgets expected to increase. |
Focused budgetary increases. |
|
|
Despite economists’ prediction of a looming recession and inflationary pressures, only 11% of I&O members surveyed indicated that they anticipated any reduction in IT budgets for 2023. In fact, 44% of I&O members expected an increase of IT budgets of between 6% and 30%. |
These increases in budget are not uniform across all investments. Surveyed I&O members indicated that the largest anticipated budget increases (compared to 2022) were in the areas of:
|
"2022 has been the first true opportunity to start getting caught up on technical debt stemming from the post pandemic supply chain and resource shortages. That catch-up is going to continue for some time. Unfortunately, the world isn't sitting still while doing that. In fact, we see new challenges around inflationary pressures. 2023 planning is going to be a balancing act between old and new projects." Paul Sparks, |
SIGNALS
The responses indicated that I&O members expect decreased reinvestment for 2023 for the following:
Make sure you can clearly measure the value of all budgeted I&O activities.
Anything that can't demonstrate clear value to leadership is potentially on the chopping block.
CALL TO ACTION
Get ahead of inflationary pressures with early budgetary planning, and identify the gap between the catch-up projects and required critical net new investments.
II&O priority actions
Hedge against inflation on infrastructure projects. Develop and communicate value-based strategies to lock in pricing and mitigate inflationary risk with vendors.
Communicate value-add on all I&O budgeted items. Define an infrastructure roadmap to highlight which projects are technical debt and which are new strategic investments, and note their value to the organization.
Look for cost saving technologies. Focus on I&O projects that automate services to increase productivity and optimize head count.
AI governance: Watching the watchers
Data stewardship: Cornerstone of value
Prep for a brave new metaverse
SIGNALS
Continued investment | AI technology is permeating diverse I&O functional areas. | Related Info-Tech Research |
About 32% of survey respondents who work in I&O said that they already invest in AI, and 40% intend to invest in 2023. | I&O members have identified the following areas as the top five focal points for AI uses within their organizations.
|
SIGNALS
|
Consequences for misbehaving AI. |
|
|
I&O leaders can expect to have silos of AI in pockets scattered across the enterprise. Without oversight on the learning model and the data used for training and analytics there is a risk of overprovisioning, which could reduce the efficiency and effectiveness of AI models and results. This scale advantage of AI could result in operational inefficiencies without oversight. For example, bad governance means garbage in / garbage out. Which is worse: getting 100 outputs from a system with a 1% error rate, or getting 10,000 outputs from a system with an 1% error rate? These are just the operational issues; legally you can be on the hook, as well. The EU Parliament has issued a civil liability regime for AI (European Parliament, n.d.) which imposes liability to operators of AI systems, regardless of whether they acted with operational due diligence. Additionally, the IEEE (IEEE, 2019) is advocating for legal frameworks and accountability for AI that violates human rights and privacy laws and causes legal harm. |
Who is going to instill standards for AI Operations? Who is going to put in the mechanisms to validate and explain the output of AI black boxes? If you said it’s going to end up |
CALL TO ACTION
Establish I&O within an AI governance program to build trust in AI results and behaviors and limit legal exposure.
I&O priority actions
Define who has overall AI accountability for AI governance within I&O. This role is responsible for establishing strategic governance metrics over AI use and results, and identifying liability risks.
Maintain an inventory of AI use. Conduct an audit of where AI is used within I&O, and identify gaps in documentation and alignment with I&O processes and organizational values.
Define an I&O success map. Provide transparency of AI use by generating pseudo code of AI models, and scorecard AI decision making with expected predictions and behavioral actions taken.
Manage bias in AI decision making. Work with AI technology vendors to identify how unethical bias can enter the results, using operational data sets for validation prior to rollout.
Protect AI data sets from manipulation. Generate new secure storage for AI technology audit trails on AI design making and results. Work with your security team to ensure data sets used by AI for training can’t be corrupted.
SIGNALS
Data volumes grow | Data is seen as a source for generating new value. | Related Info-Tech Research |
Of surveyed I&O members, 63% expected to see the data storage grow by at least 10% in 2023, and 15% expected a 30% or more growth in data storage volumes. | I&O members identified the top three ways data brings value to the organization:
|
SIGNALS
Approach to data analysis is primarily done in-house.
85% of surveyed I&O members are doing data analysis with custom-made or external tools. Interestingly, 10% of I&O members do not conduct any data analysis.
Members are missing a formal data governance process.
81% of surveyed I&O members do not have a formal or automated process for data governance. Ironically, 24% of members responded that they aim to have publicly accessible data-as-a-service or information repositories.
Despite investment in data initiatives, organizations carry high levels of data debt.
Info-Tech research, Establish Data Governance, points out that data debt, the accumulated cost associated with sub-optimal governance of data assets, is a problem for 78% of organizations.
What the enterprise expects out of enterprise storage is much more complicated in 2023.
Data protection and governance are non-negotiable aspects of enterprise storage, even when it’s unstructured.
SIGNALS
Data quality is the primary driver for data governance. | The data governance market | Related Info-Tech Research |
In the 2022 Zaloni survey of data governance professionals, 71% indicated that consistent data quality was the top metric for data governance, followed by reduced time to insight and regulatory compliance. (Source: Zaloni DATAVERSITY, 2022) | The Business Research Company determined that the global data governance market is expected to grow from $3.28 billion in 2022 to $7.42 billion in 2026 at a CAGR of 22.7% in response to 74 zettabytes of data in 2021, with a growth rate of 1.145 trillion MB of new data being created every day. (Source: Business Research Company, 2022) |
CALL TO ACTION
Develop a data governance program that includes an I&O data steward for oversight.
I&O priority actions
Establish an I&O data steward. Make data governance by establishing a data steward role with accountability for governance. The steward works collaboratively with DataOPs to control access to I&O data, enforce policies, and reduce the time to make use of the data.
Define a comprehensive storage architecture. If you thought you had a data sprawl problem before, wait until you see the volume of data generated from IoT and Web 3.0 applications. Get ahead of the problem by creating an infrastructure roadmap for structured and unstructured data storage.
Build a solid backbone for AI Operations using data quality best practices. Data quality is the foundation for generation of operational value from the data and artificial intelligence efforts. Focus on using a methodology to build a culture of data quality within I&O systems and applications that generate data rather than reactive fixes.
Look to partner with third-party vendors for your master data management (MDM) efforts. Modern MDM vendors can work with your existing data fabrics/lake and help leverage your data governance policies into the cloud.
SIGNALS
From science fiction to science fact.
The term metaverse was coined in 1992 by Neal Stephenson and is a common theme in science fiction. For most I&O surveyed professionals, the term metaverse conjures up more confusion than clarity, as it’s not one place, but multiple metaverse worlds. The primordial metaverse was focused on multiplayer gaming and some educational experiences. It wasn’t until recently that it gained a critical mass in the fashion and entertainment industries with the use of non-fungible tokens (NFT). The pandemic created a unique opportunity for metaverse-related technologies to expand Web 3.0.
Related Info-Tech Research
SIGNALS
Collaboration and beyond.
On one hand, metaverse technologies virtual reality(VR)/augmented reality (AR) headsets can be a method of collaborating internally within a single organization. About 10% of our surveyed I&O members engaged this type of collaborative metaverse in 2022, with another 24% looking to run proof of concept projects in 2023. However, there is a much larger terrain for metaverse projects outside of workforce collaboration, which 17% of surveyed I&O members are planning to engage with in 2023.
These are sophisticated new metaverse worlds, and digital twins of production environments are being created for B2B collaboration, operations, engineering, healthcare, architecture, and education that include the use of block chain, NFTs, smart contracts, and other Web 3.0 technologies
“They are the audiovisual bodies that people use to communicate with each other in the Metaverse.”
Neal Stephenson,
Snow Crash 1992
SIGNALS
Security in the context of the metaverse presents new challenges to I&O. The infrastructure that runs the metaverse is still vulnerable to “traditional” security threats. New attack vectors include financial and identity fraud, privacy and data loss, along with new cyber-physical threats which are predicted to occur as the metaverse begins to integrate with IoT and other 3D objects in the physical world.
The ultimate in "not a product" – the metaverse promises to be a hodgepodge of badly standardized technologies for the near future.
Be prepared to take care of pets and not cattle for the foreseeable future, but keep putting the fencing around the ranch.
SIGNALS
Generating new wave of sophisticated engineering coming. | Economics boom around metaverse set to explode. | Related Info-Tech Research |
Beyond the current online educational resources, there are reputable universities around the world, including Stanford University, that are offering courses on metaverse and Web 3.0 concepts. (Source: Arti, 2022) | So, what’s providing the impetus for all this activity and investment? Economics. In their 2022 report, Metaverse and Money, Citi estimated that the economic value of the metaverse(s) will have 900M to 1B VR/AR users and 5 billion Web 3.0 users with market sizes of $1-2T and $8-$13T, respectively. Yes, that’s a “T” for Trillions. (Source: Ghose, 2022) |
CALL TO ACTION
Ready or not, the metaverse is coming to an infrastructure near you. Start expanding I&O technologies and processes to support a metaverse infrastructure.
Develop a plan for network upgrades.
A truly immersive VR/AR experience requires very low latency. Identify gaps and develop a plan to enhance your network infrastructure surrounding your metaverse space(s) and end users.
Extend security posture into the metaverse.
Securing the infrastructure that runs your metaverse is going to extend the end-user equipment used to navigate it. More importantly, security policies need to encompass the avatars that navigate it and the spatial web that they interact with, which can include physical world items like IoT.
Metaverse theft prevention
Leverage existing strategies to identify management in the metaverse. Privacy policies need to extend their focus to data loss prevention within the metaverse.
Collaborate
The skill set required to build, deploy, manage, and support the metaverse is complex. Develop a metaverse support organization that extends beyond I&O functions into security, DevOps, and end-user experiences.
Educate
Web 3.0 technologies and business models are complex. Education of I&O technical- and commerce-focused team members is going to help prevent you from getting blindsided. Seek out specialized training programs for technical staff and strategic education for executives, like the Wharton School of Business certification program.
![]() |
| |
|---|---|---|
John Annand Principal Research Director | Theo Antoniadis Principal Research Director | Contributors Paul Sparks, 2 Anonymous Contributors |
Figuring out the true nature of the “Turbo” button of his 486DX100 launched John on a 20-year career in managed services and solution architecture, exploring the secrets of HPC, virtualization, and DIY WANs built with banks of USR TotalControl modems. Today he focuses his research and advisory on software-defined infrastructure technologies, strategy, organization, and service design in an increasingly Agile and DevOps world. | Theo has decades of operational and project management experience with start-ups and multinationals across North America and Europe. He has held various consulting, IT management and operations leadership positions within telecommunications, SaaS, and software companies. |
“3 Cybersecurity Trends that are Changing Financial Data Management." FIMA US. Accessed August 2022.
Arti. “While much of the world is just discovering the Metaverse, a number of universities have already established centers for studying Web 3." Analytics Insight. 10 July 2022.
“Artificial intelligence (AI) for cybersecurity." IBM. Accessed September 2022
“Business in the Metaverse Economy." Wharton School of University of Pennsylvania. Accessed October 2022.
“Cost of a data breach 2022: A million-dollar race to detect and respond." IBM. Accessed September 2022.
“Countries affected by mandatory ESG reporting – here’s the list." New Zealand Ministry of Business, Innovation & Employment. Accessed September 2022.
“Countries affected by mandatory ESG reporting – here’s the list.” WorldFavor. Accessed September 2022.
Crenshaw, Caroline A. “SEC Proposes to Enhance Disclosures by Certain Investment Advisers and Investment Companies About ESG Investment Practices." U.S. Securities and Exchange Commission. May 2022.
“Cutting through the metaverse hype: Practical guidance and use cases for business." Avanade. Accessed October 2022.
“Data Governance Global Market Sees Growth Rate Of 25% Through 2022." The Business Research Company. August 2022.
“DIRECTIVE 2014/95/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 22 October 2014 amending Directive 2013/34/EU as regards disclosure of non-financial and diversity information by certain large undertakings and groups." UER-Lex. Accessed September 2022.
"Ethically Aligned Design: A Vision for Prioritizing Human Well-being with Autonomous and Intelligent Systems." IEEE. March 2019.
“European Parliament resolution of 20 October 2020 with recommendations to the Commission on a civil liability regime for artificial intelligence." European Parliament. Accessed October 2022.
Ghose, Ronit et al. "Metaverse and Money." Citi GPS. March 2022.
Hernandez, Roberto, et al. “Demystifying the metaverse." PWC. Accessed August 2022.
Info-Tech Trends Report Survey, 2023; N=813.
“ISO 14000 Family: Environmental Management." ISO. Accessed October 2022.
Knight, Michelle & Bishop, Annie, ”The 2022 State of Cloud Data Governance.“ Zaloni DATAVERSITY. 2022.
Kompella, Kashyap, “What is AI governance and why do you need it?“ TechTarget. March 2022.
“Management of electronic waste worldwide in 2019, by method." Statista. 2022.
“Model Artificial Intelligence Governance Framework and Assessment Guide.“ World Economic Forum. Accessed September 2022.
“Model Artificial Intelligence Governance Framework." PDPC Singapore. Accessed October 2022.
“New rules on corporate sustainability reporting: provisional political agreement between the Council and the European Parliament.“ European Council. June 2022.
"OECD Economic Outlook Volume 2022." OECD iLibrary. June 2022.
"Recommendations of the Task Force on Climate-related Financial Disclosures." TCFD. Accessed August 2022.
“Risk of Global Recession in 2023 Rises Amid Simultaneous Rate Hikes.” World Bank Organization. September 2022.
Sautner, Zacharias, et al. “The Effects of Mandatory ESG Disclosure around the World.” SSRN. November 2021.
Sondergaard, Peter. “AI GOVERNANCE – WHAT ARE THE KPIS? AND WHO IS ACCOUNTABLE?“ The Sondergaard Group. November 2019.
Srivastavam Sudeep, “How can your business enter the Metaverse?." Appinventiv.
September 2022.
“Standards Overview." SASB. Accessed October 2022.
Stephenson, Neal. Snow Crash. Bantam Books, 1992.
“Sustainability Reporting Standards." Global Reporting Initiative. Accessed October 2022.
“The Ten Principles of the UN Global Compact." UN Global Compact. Accessed October 2022.
Tian Tong Lee, Sheryl. "China Unveils ESG Reporting Guidelines to Catch Peers.” Bloomberg. May 2022.
“What are the Principles for Responsible Investment?" UNPRI. Accessed October 2022.
"What is the EU's Corporate Sustainability Reporting Directive (CSRD)?" WorldFavor.
June 2022.
West, Darrell M. “Six Steps to Responsible AI in the Federal Government.“ Brookings Institution. March 2022. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin your proactive Oracle licensing journey by understanding which information to gather and assessing the current state and gaps.
Review current licensing models and determine which licensing models will most appropriately fit your environment.
Review Oracle’s contract types and assess which best fit the organization’s licensing needs.
Conduct negotiations, purchase licensing, and finalize a licensing management strategy.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Assess current state and align goals; review business feedback
Interview key stakeholders to define business objectives and drivers
Have a baseline for requirements
Assess the current state
Determine licensing position
Examine cloud options
1.1 Gather software licensing data
1.2 Conduct a software inventory
1.3 Perform manual checks
1.4 Reconcile licenses
1.5 Create your Oracle licensing team
1.6 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation
Copy of your Oracle License Statement
Software inventory report from software asset management (SAM) tool
Oracle Database Inventory Tool
RASCI Chart
Oracle Licensing Effective License Position (ELP) Template
Oracle Licensing Purchase Reference Guide
Review licensing options
Review licensing rules
Understand how licensing works
Determine if you need software assurance
Discuss licensing rules, application to current environment.
Examine cloud licensing
Understand the importance of documenting changes
Meet with desktop product owners to determine product strategies
2.1 Review full, limited, restricted, and AST use licenses
2.2 Calculate license costs
2.3 Determine which database platform to use
2.4 Evaluate moving to the cloud
2.5 Examine disaster recovery strategies
2.6 Understand purchasing support
2.7 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation
Oracle TCO Calculator
Oracle Licensing Purchase Reference Guide
Review contract option types
Review vendors
Understand why a type of contract is best for you
Determine if ULA or term agreement is best
The benefits of other types and when you should change
3.1 Prepare to sign or renew your ULA
3.2 Decide on an agreement type that nets the maximum benefit
Type of contract to be used
Oracle TCO Calculator
Oracle Licensing Purchase Reference Guide
Finalize the contract
Prepare negotiation points
Discuss license management
Evaluate and develop a roadmap for future licensing
Negotiation strategies
Licensing management
Introduction of SAM
Leverage the work done on Oracle licensing to get started on SAM
4.1 Control the flow of communication terms and conditions
4.2 Use Info-Tech’s readiness assessment in preparation for the audit
4.3 Assign the right people to manage the environment
4.4 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation
Controlled Vendor Communications Letter
Vendor Communication Management Plan
Oracle Terms & Conditions Evaluation Tool
RASCI Chart
Oracle Licensing Purchase Reference Guide
A properly optimized CRM ecosystem will reduce costs and increase productivity.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Gather information around the application:
Assess CRM and related environment. Perform CRM process assessment. Assess user satisfaction across key processes, applications, and data. Understand vendor satisfaction
Build your optimization roadmap: process improvements, software capability improvements, vendor relationships, and data improvement initiatives.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define your CRM application vision.
Develop an ongoing application optimization team.
Realign CRM and business goals.
Understand your current system state capabilities.
Explore CRM and related costs.
1.1 Determine your CRM optimization team.
1.2 Align organizational goals.
1.3 Inventory applications and interactions.
1.4 Define business capabilities.
1.5 Explore CRM-related costs (optional).
CRM optimization team
CRM business model
CRM optimization goals
CRM system inventory and data flow
CRM process list
CRM and related costs
Map current-state capabilities.
Complete a CRM process gap analysis to understand where the CRM is underperforming.
Review the CRM application portfolio assessment to understand user satisfaction and data concerns.
Undertake a software review survey to understand your satisfaction with the vendor and product.
2.1 Conduct gap analysis for CRM processes.
2.2 Perform an application portfolio assessment.
2.3 Review vendor satisfaction.
CRM process gap analysis
CRM application portfolio assessment
CRM software reviews survey
Assess CRM.
Learn which processes you need to focus on.
Uncover underlying user satisfaction issues to address these areas.
Understand where data issues are occurring so that you can mitigate this.
Investigate your relationship with the vendor and product, including that relative to others.
Identify any areas for cost optimization (optional).
3.1 Explore process gaps.
3.2 Analyze user satisfaction.
3.3 Assess data quality.
3.4 Understand product satisfaction and vendor management.
3.5 Look for CRM cost optimization opportunities (optional).
CRM process optimization priorities
CRM vendor optimization opportunities
CRM cost optimization
Build the optimization roadmap.
Understanding where you need to improve is the first step, now understand where to focus your optimization efforts.
4.1 Identify key optimization areas.
4.2 Build your CRM optimization roadmap and next steps.
CRM optimization roadmap
In today’s connected world, continuous optimization of enterprise applications to realize your digital strategy is key.
Customer relationship management (CRM) systems are at the core of a customer-centric strategy to drive business results. They are critical to supporting marketing, sales, and customer service efforts.
CRM systems are expensive, their benefits are difficult to quantify, and they often suffer from poor user satisfaction. Post implementation, technology evolves, organizational goals change, and the health of the system is not monitored. This is complicated in today’s digital landscape with multiple integration points, siloed data, and competing priorities.
Too often organizations jump into the selection of replacement systems without understanding the health of their current systems. IT leaders need to stop reacting and take a proactive approach to continually monitor and optimize their enterprise applications. Strategically realign business goals, identify business application capabilities, complete a process assessment, evaluate user adoption, and create an optimization roadmap that will drive a cohesive technology strategy that delivers results.
Lisa Highfield
Research Director,
Enterprise Applications
Info-Tech Research Group
In today’s connected world, continuous optimization of enterprise applications to realize your digital strategy is key.
Enterprise applications often involve large capital outlay and unquantified benefits.
CRM application portfolios are often messy. Add to that poor processes, distributed data, and lack of training – business results and user dissatisfaction is common.
Technology owners are often distributed across the business. Consolidation of optimization efforts is key.
Enterprise applications involve large numbers of processes and users. Without a clear focus on organizational needs, decisions about what and how to optimize can become complicated.
Competing and conflicting priorities may undermine optimization value by focusing on the approaches that would only benefit one line of business rather than the entire organization.
Teams do not have a framework to illustrate, communicate, and justify the optimization effort in the language your stakeholders understand.
Build an ongoing optimization team to conduct application improvements.
Assess your CRM application(s) and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.
Validate CRM capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy
Pull this all together to develop a prioritized optimization roadmap.
CRM implementation should not be a one-and-done exercise. A properly optimized CRM ecosystem will reduce costs and increase productivity.
CRM platforms are the applications that provide functional capabilities and data management around the customer experience (CX).
Marketing, sales, and customer service are enabled through CRM technology.
CRM technologies facilitate an organization’s relationships with customers, service users, employees, and suppliers.
CRM technology is critical to managing the lifecycle of these relationships, from lead generation, to sales opportunities, to ongoing support and nurturing of these relationships.
Customer relationship management suites are one piece of the overall customer experience management ecosystem, alongside tools such as customer intelligence platforms and adjacent point solutions for sales, marketing, and customer service. Review Info-Tech’s CXM blueprint to build a complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components. The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis.
Statistical analysis of CRM projects indicate failures vary from 18% to 69%. Taking an average of those analyst reports, about one-third of CRM projects are considered a failure.
Source: CIO Magazine, 2017
Companies that apply the principles of behavioral economics outperform their peers by 85% in sales growth and more than 25% in gross margin.
Source: Gallup, 2012
In 2019, 40% of executives name customer experience the top priority for their digital transformation.
Source: CRM Magazine, 2019
Drivers of Dissatisfaction |
|||
|---|---|---|---|
| Business | Data | People and Teams | Technology |
|
|
|
|
While technology is the key enabler of building strong customer experiences, there are many other drivers of dissatisfaction. IT must stand shoulder to shoulder with the business to develop a technology framework for customer relationship management.
Marketing, Sales, and Customer Service, along with IT, can only optimize CRM with the full support of each other. The cooperation of the departments is crucial when trying to improve CRM technology capabilities and customer interaction.
“A successful application optimization strategy starts with the business need in mind and not from a technological point of view. No matter from which angle you look at it, modernizing a legacy application is a considerable undertaking that can’t be taken lightly. Your best approach is to begin the journey with baby steps.”
– Ernese Norelus, Sreeni Pamidala, and Oliver Senti
Medium, 2020
| 1. Map Current-State Capabilities | 2. Assess Your Current State | 3. Build Your Optimization Roadmap | |
|---|---|---|---|
| Phase Steps |
|
|
|
| Phase Outcomes |
|
|
|
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.
CRM Optimization Roadmap (Tab 8)

Complete an assessment of processes, user satisfaction, data quality, and vendor management using the Workbook or the APA diagnostic.
Align your business and technology goals and objectives in the current environment.
Identify and prioritize your CRM optimization goals.
Assess IT-enabled user satisfaction across your CRM portfolio.
Understand areas for improvement.
Align strategy and technology to meet consumer demand.
INDUSTRY - Entertainment
SOURCE - Forbes, 2017
Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.
Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience
In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.
Netflix’s disruptive innovation is built on the foundation of great customer experience management. Netflix is now a $28-billion company, which is tenfold what Blockbuster was worth.
Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time, video rental industry leader, Blockbuster.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 1 | Phase 2 | Phase 3 | ||
|---|---|---|---|---|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #2: Build the CRM team. Align organizational goals. |
Call #4: Conduct gap analysis for CRM processes. Prepare application portfolio assessment. |
Call #5: Understand product satisfaction and vendor management. Look for CRM cost optimization opportunities (optional). |
Call #7: Identify key optimization areas. Build out optimization roadmap and next steps. |
Call #3: Map current state. Inventory CRM processes. Explore CRM-related costs. |
Call #6: Review APA results. |
|||
A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 8 to 12 calls over the course of 4 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| Define Your CRM Application Vision | Map Current-State Capabilities | Assess CRM | Build the Optimization Roadmap | Next Steps and Wrap-Up (offsite) | |
Activities |
1.1 Determine your CRM optimization team 1.2 Align organizational goals 1.3 Inventory applications and interactions 1.4 Define business capabilities 1.5 Explore CRM-related costs |
2.1 Conduct gap analysis for CRM processes 2.2 Perform an application portfolio assessment 2.3 Review vendor satisfaction |
3.1 Explore process gaps 3.2 Analyze user satisfaction 3.3 Assess data quality 3.4 Understand product satisfaction and vendor management 3.5 Look for CRM cost optimization opportunities (optional) |
4.1 Identify key optimization areas 4.2 Build your CRM optimization roadmap and next steps |
5.1 Complete in-progress deliverables from previous four days 5.2 Set up review time for workshop deliverables and to discuss next steps |
| Deliverables |
|
|
|
|
Get the Most Out of Your CRM

Integration is paramount: your CRM application often integrates with other applications within the organization. Create an integration map to reflect a system of record and the exchange of data. To increase customer engagement, channel integration is a must (i.e. with robust links to unified communications solutions, email, and VoIP telephony systems).
CRM plays a key role in the more holistic customer experience framework. However, it is heavily influenced by and often interacts with many other platforms.
Data is one key consideration that needs to be considered here. If customer information is fragmented, it will be nearly impossible to build a cohesive view of the customer. Points of integration (POIs) are the junctions between the CRM(s) and other applications where data is flowing to and from. They are essential to creating value, particularly in customer insight-focused and omnichannel-focused deployments.
CRM strategy is a critical component of customer experience (CX).
Source: Forbes, 2019
Build a cohesive CRM strategy that aligns business goals with CRM capabilities.
Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.
Technology is the key enabler of building strong customer experiences: IT must stand shoulder to shoulder with the business to develop a technology framework for customer relationship management.
1.1.1 Identify the stakeholders whose support will be critical to success
1.1.2 Select your CRM optimization team
Understand the roles necessary to get the most out of your CRM.
Understand the role of each player within your optimization initiative. Look for listed participants on the activity slides to determine when each player should be involved.
Do not limit input or participation. Include subject matter experts and internal stakeholders at stages within the optimization initiative. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to creating your CRM optimization strategy.
| Title | Roles Within CRM Optimization Initiative |
|---|---|
Optimization Sponsor |
|
Optimization Initiative Manager |
|
Business Leads/ |
|
CRM Optimization Team |
|
Steering Committee |
|
Consider the core team functions when composing the CRM optimization team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned CRM optimization strategy.
Don’t let your core team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the optimization team will enable effective decision making while still including functional business units such as Marketing, Sales, Service, and Customer Service.
Required Skills/Knowledge |
Suggested Optimization Team Members |
|---|---|
Business |
|
|
|
IT |
|
|
|
| Other | |
|
|
Get the Most Out of Your CRM Workbook
Map Current-State Capabilities
Your corporate strategy:
Your CRM Strategy:
CRM projects are more successful when the management team understands the strategic importance and the criticality of alignment. Time needs to be spent upfront aligning business strategies with CRM capabilities. Effective alignment between Sales, Marketing, Customer Service, Operations, IT, and the business should happen daily. Alignment doesn’t just need to occur at the executive level but at each level of the organization.
Increase Revenue |
Enable lead scoring |
Deploy sales collateral management tools |
Improve average cost per lead via a marketing automation tool |
|---|---|---|---|
Enhance Market Share |
Enhance targeting effectiveness with a CRM |
Increase social media presence via an SMMP |
Architect customer intelligence analysis |
Improve Customer Satisfaction |
Reduce time-to-resolution via better routing |
Increase accessibility to customer service with live chat |
Improve first contact resolution with customer KB |
Increase Customer Retention |
Use a loyalty management application |
Improve channel options for existing customers |
Use customer analytics to drive targeted offers |
Create Customer-Centric Culture |
Ensure strong training and user adoption programs |
Use CRM to provide 360-degree view of all customer interactions |
Incorporate the voice of the customer into product development |
Identifying organizational objectives of high priority will assist in breaking down business needs and CRM objectives. This exercise will better align the CRM systems with the overall corporate strategy and achieve buy-in from key stakeholders.
Business Needs |
Business Drivers |
Technology Drivers |
Environmental Factors |
|
|---|---|---|---|---|
| Definition | A business need is a requirement associated with a particular business process. | Business drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as employee retention, operation excellence, and financial performance. | Technology drivers are technological changes that have created the need for a new CRM enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge. | External considerations are factors taking place outside of the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business. |
Examples |
|
|
|
|
One of the biggest drivers for CRM adoption is the ability to make decisions through consolidated data. This driver is a result of external considerations. Many industries today are highly competitive, uncertain, and rapidly changing. To succeed under these pressures, there needs to be timely information and visibility into all components of the organization.
Get the Most Out of Your CRM Workbook
![]() |
|||
|---|---|---|---|
External Considerations |
Organizational Drivers |
Technology Considerations |
Functional Requirements |
|
|
|
|
There are several different factors that may stifle the success of an CRM portfolio. Organizations creating an CRM foundation must scan their current environment to identify internal barriers and challenges.
Management Support |
Organizational Culture |
Organizational Structure |
IT Readiness |
|
|---|---|---|---|---|
| Definition | The degree of understanding and acceptance towards CRM technology and systems. | The collective shared values and beliefs. | The functional relationships between people and departments in an organization. | The degree to which the organization’s people and processes are prepared for new CRM system(s.) |
Questions |
|
|
|
|
| Impact |
|
|
|
|
Get the Most Out of Your CRM Workbook
![]() |
|||
|---|---|---|---|
Functional Gaps |
Technical Gaps |
Process Gaps |
Barriers to Success |
|
|
|
|
![]() | |||
|---|---|---|---|
Business Benefits | IT Benefits | Organizational Benefits | Enablers of Success |
|
|
|
|
| Increase Revenue | CRM Benefits |
|---|---|
|
|
|
|
|
|
|
Download the Get the Most Out of Your CRM Workbook
1.3.1 Inventory applications and interactions


Be sure to include enterprise applications that are not included in the CRM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.
When assessing the current application portfolio that supports CRM, the tendency will be to focus on the applications under the CRM umbrella, relating mostly to Marketing, Sales, and Customer Service. Be sure to include systems that act as input to, or benefit due to outputs from, the CRM or similar applications.

1.4.1 Define business capabilities
1.4.2 List your key CRM processes
In business architecture, the primary view of an organization is known as a business capability map.
A business capability defines what a business does to enable value creation, rather than how.
Business capabilities:
A business capability map provides details that help the business architecture practitioner direct attention to a specific area of the business for further assessment.
When examining CRM optimization, it is important we approach this from the appropriate layer.
In today’s complex organizations, it can be difficult to understand where inefficiencies stem from and how performance can be enhanced.
To fix problems and maximize efficiencies business capabilities and processes need to be examined to determine gaps and areas of lagging performance.
Info-Tech’s CRM framework and industry tools such as the APQC’s Process Classification Framework can help make sense of this.
CRM Application Inventory Tool
An operating model is a framework that drives operating decisions. It helps to set the parameters for the scope of CRM and the processes that will be supported. The operating model will serve to group core operational processes. These groupings represent a set of interrelated, consecutive processes aimed at generating a common output.
Value Streams |
Design Product |
Produce Product |
Sell Product |
Customer Service |
|---|---|---|---|---|
|
|
|
|
Value streams connect business goals to the organization’s value realization activities in the marketplace. Those activities are dependent on the specific industry segment in which an organization operates.
There are two types of value streams: core value streams and support value streams.
An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers.
Source: APQC, 2020
If you do not have a documented process model, you can use the APQC Framework to help define your inventory of sales business processes.
APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

APQC provides a process classification framework. It allows organizations to effectively define their processes and manage them appropriately.
THE APQC PROCESS CLASSIFICATION FRAMEWORK (PCF)® was developed by non-profit APQC, a global resource for benchmarking and best practices, and its member companies as an open standard to facilitate improvement through process management and benchmarking, regardless of industry, size, or geography. The PCF organizes operating and management processes into 12 enterprise level categories, including process groups and over 1,000 processes and associated activities. To download the full PCF or industry-specific versions of the PCF as well as associated measures and benchmarking, visit www.apqc.org/pcf.
| Level 1 | Level | Level 3 | Level 4 |
|---|---|---|---|
Market and sell products and services |
Understand markets, customers, and capabilities | Perform customer and market intelligence analysis | Conduct customer and market research |
Market and sell products and services |
Develop sales strategy | Develop sales forecast | Gather current and historic order information |
Deliver services |
Manage service delivery resources | Manage service delivery resource demand | Develop baseline forecasts |
| ? | ? | ? | ? |
Focus your initial assessment on the level 1 processes that matter to your organization. This allows you to target your scant resources on the areas of optimization that matter most to the organization and minimize the effort required from your business partners.
You may need to iterate the assessment as challenges are identified. This allows you to be adaptive and deal with emerging issues more readily and become a more responsive partner to the business.
Get the Most Out of Your CRM Workbook

*Adapted from the APQC Cross-Industry Process Classification Framework, 2019.
1.5.1 List CRM-related costs (optional)
Before you can make changes and optimization decisions, you need to understand the high-level costs associated with your current application architecture. This activity will help you identify the types of technology and people costs associated with your current systems.

Get the Most Out of Your CRM Workbook





Option 1: Use Info-Tech’s Application Portfolio Assessment to generate your user satisfaction score. This tool not only measures application satisfaction but also elicits great feedback from users regarding support they receive from the IT team.
Option 2: Use the method of choice to elicit current user satisfaction for each of the processes identified as important to the organization.

Understand user satisfaction across capabilities and departments within your organization.
Download the CRM Application Inventory Tool
Using the results from the Application Portfolio Assessment or your own user survey:

Understand user satisfaction across capabilities and departments within your organization.
2.3.1 Rate your vendor and product satisfaction
2.3.2 Enter SoftwareReviews scores from your CRM Product Scorecard (optional)
Source: SoftwareReviews, March 2019
80% satisfaction score, and the other list is CIOs with <80% satisfaction score.">
The data shows that effective IT leaders invest a significant amount of time (8%) on vendor management initiatives.
Be proactive in managing you calendar and block time for these important tasks.
Analysis of CIOs’ calendars revealed that how CIOs spend their time has a correlation to both stakeholder IT satisfaction and CEO-CIO alignment.
Those CIOs that prioritized vendor management were more likely to have a business satisfaction score greater than 80%.

Use Info-Tech’s vendor satisfaction survey to identify optimization areas with your CRM product(s) and vendor(s).
Option 1 (recommended): Conduct a satisfaction survey using SoftwareReviews. This option allows you to see your results in the context of the vendor landscape.
Download the Get the Most Out of Your CRM Workbook
Option 2: Use your Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization,” to review your satisfaction with your software.
SoftwareReviews’ Customer Relationship Management

Download the Get the Most Out of Your CRM Workbook
SoftwareReviews’ Customer Relationship Management
Support user satisfaction
Enabling a high-performing, customer-centric sales, marketing, and customer service operations program requires excellent management practices and continuous optimization efforts.
Technology portfolio and architecture is important, but we must go deeper. Taking a holistic view of CRM technologies in the environments in which they operate allows for the inclusion of people and process improvements – this is key to maximizing business results.
Using a formal CRM optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process improvement.


| Data Quality Management | Effective Data Governance | Data-Centric Integration Strategy | Extensible Data Warehousing |
|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|


A VMI is a formalized process within an organization, responsible for evaluating, selecting, managing, and optimizing third-party providers of goods and services.
The amount of resources you assign to managing vendors depends on the number and value of your organization’s relationships. Before optimizing your vendor management program around the best practices presented in this blueprint, assess your current maturity and build the process around a model that reflects the needs of your organization.
Info-Tech uses VMI interchangeably with the terms “vendor management office (VMO),” “vendor management function,” “vendor management process,” and “vendor management program.”
See previous slide for help around implementing a vendor management initiative.

Before you can make changes and optimization decisions, you need to understand the high-level costs associated with your current application architecture. This activity will help you identify the types of technology and people costs associated with your current systems.
This is meant as a high-level roadmap. For formal, ongoing optimization project management, refer to “Build a Better Backlog” (Phase 2 of the Info-Tech blueprint Deliver on Your Digital Product Vision).

Use a holistic assessment of the “interest” paid on technical debt to quantify and prioritize risk and enable the business make better decisions.
Phase 2: Build a Better Product Backlog
Build a structure for your backlog that supports your product vision.
An ongoing CRM optimization effort is best facilitated through a continuous Agile process. Use info-Tech’s developed tools to build out your backlog.
The key to a better backlog is a common structure and guiding principles that product owners and product teams can align to.
Exceptional customer value begins with a clearly defined backlog focused on items that will create the greatest human and business benefits.
Activity Participants | ||||||||
|---|---|---|---|---|---|---|---|---|
Backlog Activity | Quality Filter | Product Manager | Product Owner | Dev Team | Scrum Master | Business | Architects | |
| Sprint | Sprint Planning | “Accepted” | ✔ | ✔ | ✔ | |||
| Ready | Refine | “Ready” | ✔ | ✔ | ✔ | |||
| Qualified | Analysis | “Qualified” | ✔ | ✔ | ✔ | ✔ | ✔ | |
Ideas | Intake | “Backlogged” | ✔ | ✔ | ✔ | ✔ | ✔ | |
A product owner is accountable for defining and prioritizing the work that will be of the greatest value to the organization and its customers. The backlog is the key to facilitating this process and accomplishing the most fundamental goals of delivery.
For more information on the role of a product owner, see Build a Better Product Owner.
Highly effective Agile teams spend 28% of their time on product backlog management and roadmapping (Quantitative Software Management, 2015).
A well-formed backlog can be thought of as a DEEP backlog:
Detailed Appropriately: PBIs are broken down and refined as necessary.
Emergent: The backlog grows and evolves over time as PBIs are added and removed.
Estimated: The effort a PBI requires is estimated at each tier.
Prioritized: The PBI’s value and priority are determined at each tier.
![]() |
3 - IDEASComposed of raw, vague, and potentially large ideas that have yet to go through any formal valuation. |
2 - QUALIFIEDResearched and qualified PBIs awaiting refinement. |
|
1 - READYDiscrete, refined PBIs that are ready to be placed in your development teams’ sprint plans. |
CRM technology is critical to facilitate an organization’s relationships with customers, service users, employees, and suppliers. CRM implementation should not be a one-and-done exercise. There needs to be an ongoing optimization to enable business processes and optimal organizational results.
Get the Most Out of Your CRM allows organizations to proactively implement continuous assessment and optimization of a customer relationship management system. This includes:
This formal CRM optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process-improvement.
Contact your account representative for more information
workshops@infotech.com
1-866-670-8889

Ben Dickie
Research Practice Lead
Info-Tech Research Group
Ben Dickie is a Research Practice Lead at Info-Tech Research Group. His areas of expertise include customer experience management, CRM platforms, and digital marketing. He has also led projects pertaining to enterprise collaboration and unified communications.

Scott Bickley
Practice Lead & Principal Research Director
Info-Tech Research Group
Scott Bickley is a Practice Lead & Principal Research Director at Info-Tech Research Group focused on vendor management and contract review. He also has experience in the areas of IT asset management (ITAM), software asset management (SAM), and technology procurement, along with a deep background in operations, engineering, and quality systems management.

Andy Neil
Practice Lead, Applications
Info-Tech Research Group
Andy is Senior Research Director, Data Management and BI, at Info-Tech Research Group. He has over 15 years of experience in managing technical teams, information architecture, data modeling, and enterprise data strategy. He is an expert in enterprise data architecture, data integration, data standards, data strategy, big data, and the development of industry-standard data models.
Armel, Kate. “Data-driven Estimation, Management Lead to High Quality.” Quantitative Software Management Inc. 2015. Web.
Chappuis, Bertil, and Brian Selby. “Looking beyond Technology to Drive Sales Operations.” McKinsey & Company, 24 June 2016. Web.
Cross-Industry Process Classification Framework (PCF) Version 7.2.1. APQC, 26 Sept. 2019. Web.
Fleming, John, and Hater, James. “The Next Discipline: Applying Behavioral Economics to Drive Growth and Profitability.” Gallup, 22 Sept. 2012. Accessed 6 Oct. 2020.
Hinchcliffe, Dion. “The evolving role of the CIO and CMO in customer experience.” ZDNet, 22 Jan. 2020. Web.
Karlsson, Johan. “Backlog Grooming: Must-Know Tips for High-Value Products.” Perforce. 18 May 2018. Web. Feb. 2019.
Klie, L. “CRM Still Faces Challenges, Most Speakers Agree: CRM systems have been around for decades, but interoperability and data siloes still have to be overcome.” CRM Magazine, vol. 23, no. 5, 2019, pp. 13-14.
Kumar, Sanjib, et al. “Improvement of CRM Using Data Mining: A Case Study at Corporate Telecom Sector.” International Journal of Computer Applications, vol. 178, no. 53, 2019, pp. 12-20, doi:10.5120/ijca2019919413.
Morgan, Blake. “50 Stats That Prove The Value Of Customer Experience.” Forbes, 24 Sept. 2019. Web.
Norelus, Ernese, et al. “An Approach to Application Modernization: Discovery and Assessment Phase.” IBM Garage, Medium, 24 Feb 2020. Accessed 4 Mar. 2020.
“Process Frameworks.” APQC, 4 Nov. 2020. Web.
“Process vs. Capability: Understanding the Difference.” APCQ, 2017. Web.
Rubin, Kenneth S. "Essential Scrum: A Practical Guide to the Most Popular Agile Process." Pearson Education, 2012.
Savolainen, Juha, et al. “Transitioning from Product Line Requirements to Product Line Architecture.” 29th Annual International Computer Software and Applications Conference (COMPSAC'05), IEEE, vol. 1, 2005, pp. 186-195, doi: 10.1109/COMPSAC.2005.160
Smith, Anthony. “How To Create A Customer-Obsessed Company Like Netflix.” Forbes, 12 Dec. 2017. Web.
“SOA Reference Architecture – Capabilities and the SOA RA.” The Open Group, TOGAF. Web.
Taber, David. “What to Do When Your CRM Project Fails.” CIO Magazine, 18 Sept. 2017. Web.
“Taudata Case Study.” Maximizer CRM Software, 17 Jan. 2020. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the concepts of ESM, determine the scope of the ESM program, and get buy-in.
Determine the current state for ESM and identify the gaps.
Create customer journey maps, identify an ESM pilot, and finalize the action plan for the pilot.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand what ESM is and how it can improve customer service.
Determine the scope of your ESM initiative and identify who the stakeholders are for this program.
Understanding of ESM concepts.
Understanding of the scope and stakeholders for your ESM initiative.
Plan for getting buy-in for the ESM program.
1.1 Understand the concepts and benefits of ESM.
1.2 Determine the scope of your ESM program.
1.3 Identify your stakeholders.
1.4 Develop an executive buy-in presentation.
1.5 Develop a general communications presentation.
Executive buy-in presentation
General communications presentation
Assess your current state with respect to culture, governance, skills, and tools.
Identify your strengths and weaknesses from the ESM assessment scores.
Understanding of your organization’s current enablers and constraints for ESM.
Determination and analysis of data needed to identify strengths or weaknesses in culture, governance, skills, and tools.
2.1 Understand your organization’s mission and vision.
2.2 Assess your organization’s culture, governance, skills, and tools.
2.3 Identify the gaps and determine the necessary foundational action items.
ESM assessment score
Foundational action items
Define and choose the top services at the organization.
Create customer journey maps for the chosen services.
List of prioritized services.
Customer journey maps for the prioritized services.
3.1 Make a list of your services.
3.2 Prioritize your services.
3.3 Build customer journey maps.
List of services
Customer journey maps
To remain competitive, enterprises must deliver products and services like a startup or a digital native enterprise. This requires enterprises to:
Organizations that implement this project will draw benefits in the following aspects:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Collect data and stats that will help build a narrative for digital factory.
Discuss purpose, mission, organizational support, and leadership.
Discuss organizational structure, management, culture, teams, environment, technology, and KPIs.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand and gather data and stats for factors impacting digital transformation.
Develop a narrative for the digital factory.
Identification of key pain points and data collected
Narrative to support the digital factory
1.1 Understand the importance and urgency of digital transformation (DX).
1.2 Collect data and stats on the progress of DX initiatives.
1.3 Identify the factors that hamper DX and tie them to data/stats.
1.4 Build the narrative for the digital factory (DF) using the data/stats.
Identification of factors that hamper DX
Data and stats on progress of DX
Narrative for the digital factory
Discuss the factors that impact the success of establishing a digital factory.
A solid understanding and awareness that successful digital factories have clarity of purpose, organizational support, and sound leadership.
2.1 Discuss
2.2 Discuss what organizational support the digital factory will require and align and commit to it.
2.3 Discuss reference models to understand the dynamics and the strategic investment.
2.4 Discuss leadership for the digital age.
DF purpose and mission statements
Alignment and commitment on organizational support
Understanding of competitive dynamics and investment spread
Develop the profile of a digital leader
Understand the fundamentals of the operating model.
Understand the gaps and formulate the strategies.
Design of structure and organization
Design of culture aligned with organizational goals
Management practices aligned with the goals of the digital factory
3.1 Discuss structure and organization and associated organizational pathologies, with focus on hierarchy and silos, size and complexity, and project-centered mindset.
3.2 Discuss the importance of culture and its impact on productivity and what shifts will be required.
3.3 Discuss management for the digital factory, with focus on governance, rewards and compensation, and talent management.
Organizational design in the context of identified pathologies
Cultural design for the DF
Management practices and governance for the digital factory
Roles/responsibilities for governance
Understand the fundamentals of the operating model.
Understand the gaps and formulate the strategies.
Discuss agile teams and the roles for DF
Environment design that supports productivity
Understanding of existing and new platforms
4.1 Discuss teams and various roles for the DF.
4.2 Discuss the impact of the environment on productivity and satisfaction and discuss design factors.
4.3 Discuss technology and tools, focusing on existing and future platforms, platform components, and organization.
4.4 Discuss design of meaningful metrics and KPIs.
Roles for DF teams
Environment design factors
Platforms and technology components
Meaningful metrics and KPIs
M365 projects are fraught with obstacles. Common mistakes organizations make include:
There are three primary areas where organizations fail in a successful implementation of M365: training, adoption, and information governance. While it is not up to IT to ensure every user is well trained, it is their initial responsibility to find champions, SMEs, and business-based trainers and manage information governance from the backup, retention, and security aspects of data management.
Migrating to M365 is a disruptive move for most organizations. It poses risk to untrained IT staff, including admins, help desk, and security teams. The aim for organizations, especially in this new hybrid workspace, is to maintain efficiencies through collaboration, share information in a secure environment, and work from anywhere, any time.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
There are three primary goals when deploying Microsoft 365: productivity, security and compliance, and collaborative functionality. On top of these you need to meet the business KPIs and IT’s drive for adoption and usage. This research will guide you through the important considerations that are often overlooked as this powerful suite of tools is rolled out to the organization.
![]() |
There are three primary objectives when deploying Microsoft 365: from a business perspective, the expectations are based on productivity; from an IT perspective, the expectations are based on IT efficiencies, security, and compliance; and from an organizational perspective, they are based on a digital employee experience and collaborative functionality. Of course, all these expectations are based on one primary objective, and that is user adoption of Teams, OneDrive, and SharePoint Online. A mass adoption, along with a high usage rate and a change in the way users work, is required for your investment in M365 to be considered successful. So, adoption is your first step, and that can be tracked and analyzed through analytics in M365 or other tools. But what else needs to be considered once you have released M365 on your organization? What about backup? What about security? What about sharing data outside your business? What about self-service? What about ongoing training? M365 is a powerful suite of tools, and taking advantage of all that it entails should be IT’s primary goal. How to accomplish that, efficiently and securely, is up to you! |
John Donovan |
Collaboration, efficiencies, and cost savings need to be earned |
Migrating to M365 is a disruptive move for most organizations. Additionally, it poses risk to untrained IT staff, including admins, help desk, and security teams. The aim for organizations, especially in this new hybrid workspace, is to maintain efficiencies through collaboration, share information in a secure environment, and work from anywhere, any time. However, organizations need to manage their licensing and storage costs and build this new way of working through post-deployment planning. By reducing their hardware and software footprint they can ensure they have earned these savings and efficiencies. |
Understand any shortcomings in M365 or pay the price |
Failing to understand any shortcomings M365 poses for your organization can ruin your chances at a successful implementation. Commonly overlooked expenses include backup and archiving, especially for regulated organizations; spending on risk mitigation through third-party tools for security; and paying a premium to Microsoft to use its Azure offerings with Microsoft Sentinel, Microsoft Defender, or any security add-on that comes at a price above your E5 license, which is expensive in itself. |
Spend time with users to understand how they will use M365 |
Understanding business processes is key to anticipating how your end users will adopt M365. By spending time with the staff and understanding their day-to-day activities and interactions, you can build better training scenarios to suit their needs and help them understand how the apps in M365 can help them do their job. On top of this you need to meet the business KPIs and IT’s drive for adoption and usage. Encourage early adopters to become trainers and champions. Success will soon follow. |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
M365 is a full suite of tools for collaboration, communication, and productivity, but organizations find the platform is not used to its full advantage and fail to get full value from their license subscription. Many users are unsure which tool to use when: Do you use Teams or Viva Engage, MS Project or Planner? When do you use SharePoint versus OneDrive? From an IT perspective, finding time to help users at the outset is difficult – it’s quite the task to set up governance, security, and backup. Yet training staff must be a priority if the implementation is to succeed. |
M365 projects are fraught with obstacles. Common mistakes organizations make include:
|
To define your post-migration tasks and projects:
Failure to take meaningful action will not bode well for your M365 journey. |
There are three primary areas where organizations fail in a successful implementation of M365: training, adoption, and information governance. While it is not up to IT to ensure every user is well trained, it is their initial responsibility to find champions, SMEs, and business-based trainers and to manage information governance from backup, retention, and security aspects of data management.
What IT teams are saying
Top IT reasons for adopting M365
61% More collaborative working style
54% Cost savings
51% Improved cybersecurity
49% Greater mobility
Define Vision |
Build Team |
Plan Projects |
Execute |
|---|---|---|---|
Define your vision and what your priorities are for M365. Understand how to reach your vision. |
Ensure you have an executive sponsor, develop champions, and build a team of SMEs. |
List all projects in a to-be scenario. Rank and prioritize projects to understand impact and difficulty. |
Build your roadmap, create timelines, and ensure you have enough resources and time to execute and deliver to the business. |

A clear understanding of the business purpose and processes, along with insight into the organizational culture, will help you align the right apps with the right tasks. This approach will bring about better adoption and collaboration and cancel out the shadow IT products we see in every business silo.
To give organizations insight into the adoption of services in M365, Microsoft provides built-in usage analytics in Power BI, with templates for visualization and custom reports. There are third-party tools out there, but why pay more? However, the template app is not free; you do need a Power BI Pro license.
Usage Analytics pulls data from ActiveDirectory, including location, department, and organization, giving you deeper insight into how users are behaving. It can collect up to 12 months of data to analyze.
Reports that can be created include Adoption, Usage, Communication, Collaboration (how OneDrive and SharePoint are being used), Storage (cloud storage for mailboxes, OneDrive, and SharePoint), and Mobility (which clients and devices are used to connect to Teams, email, Yammer, etc.).
Admin Roles |
Best Practices |
|---|---|
|
Only assign two to four global admins, depending on the size of the organization. Too many admins increases security risk. In larger organizations, segment admin roles using role-based access control. Because admins have access to sensitive data, you’ll want to assign the least permissive role so they can access only the tools and data they need to do their job. Enable MFA for all admins except one break-glass account that is stored in the cloud and not synced. Ensure a complex password, stored securely, and use only in the event of an MFA outage. Due to the large number of admin roles available and the challenges that brings with it, Microsoft has a built-in tool to compare roles in the admin portal. This can help you determine which role should be used for specific tasks. |
Identity Checklist
Determine your training needs and align with your business processes. Choose training modalities that will give users the best chance of success. Consider one or many training methods, such as:
Why is M365 backup so important?
Accidental Data Deletion.
If a user is deleted, that deletion gets replicated across the network. Backup can save you here by restoring that user.
Internal and External Security Threats.
Malicious internal deletion of data and external threats including viruses, ransomware, and malware can severely damage a business and its reputation. A clean backup can easily restore the business’ uninfected data.
Legal and Compliance Requirements.
While e-discovery and legal hold are available to retain sensitive data, a third-party backup solution can easily search and restore all data to meet regulatory requirements – without depending on someone to ensure a policy was set.
Retention Policy Gaps.
Retention policies are not a substitute for backup. While they can be used to retain or delete content, they are difficult to keep track of and manage. Backups offer greater latitude in retention and better security for that data.
Legacy |
Microsoft 365 |
|---|---|
SharePoint 2016/19 |
SharePoint Online |
Microsoft Exchange Server |
Microsoft Exchange in Azure |
Skype for Business Server |
Teams |
Trello |
Planner 2022 |
System Center Configuration Manager (SCCM) |
Endpoint Manager, Intune, Autopilot |
File servers |
OneDrive |
Access |
Power Apps |
To meet the objectives of cost reduction and rationalization, look at synergies that M365 brings to the table. Determine what you are currently using to meet collaboration, storage, and security needs and plan to use the equivalent in your Microsoft entitlement.
There are plenty of preconfigured security features contained in M365, but what’s available to you depends on your license. For example, Microsoft Defender, which has many preset policies, is built-in for E5 licenses, but if you have E3 licenses Defender is an add-on.
Three elements in security policies are profiles, policies, and policy settings.
Check your license entitlement before you start purchasing add-ons or third-party solutions. Security and compliance are not optional in today’s cybersecurity risk world. With many organizations offering hybrid and remote work arrangements and bring-your-own-device (BYOD) policies, it is necessary to protect your data at the tenant level. Defender for Microsoft 365 is a tool that can protect both your exchange and collaboration environments.
More information: Microsoft 365 Defender
NOTE: You must have Azure AD Premium and Windows 10 V1703 or later as well as Intune or other MDM service to use Autopilot. There is a monthly usage fee based on volume of data transmitted. These fees can add up over time.
For more details visit the following Microsoft Learn pages:

Info-Tech’s research on zero-touch provisioning goes into more detail on Intune and Autopilot:
Simplify Remote Deployment With Zero-Touch Provisioning

Drive Ongoing Adoption With an M365 Center of Excellence
Simplify Remote Deployment With Zero-Touch Provisioning
“5 Reasons Why Microsoft Office 365 Backup Is Important.” Apps 4Rent, Dec 2021, Accessed Oct 2022 .
Chandrasekhar, Aishwarya. “Office 365 Migration Best Practices & Challenges 2022.” Saketa, 31 Mar 2022. Accessed Oct. 2022.
Chronlund, Daniel. “The Fundamental Checklist – Secure your Microsoft 365 Tenant”. Daniel Chronlund Cloud Tech Blog,1 Feb 2019. Accessed 1 Oct 2022.
Davies, Joe. “The Microsoft 365 Enterprise Deployment Guide.” Tech Community, Microsoft, 19 Sept 2018. Accessed 2 Oct 2022.
Dillaway, Kevin. “I Upgraded to Microsoft 365 E5, Now What?!.” SpyGlassMTG, 10 Jan 2022. Accessed 4 Oct. 2022.
Hartsel, Joe. “How to Make Your Office 365 Implementation Project a Success.” Centric, 20 Dec 2021. Accessed 2 Oct. 2022.
Jha, Mohit. “The Ultimate Microsoft Office 365 Migration Checklist for Pre & Post Migration.” Office365 Tips.Org, 24 June 2022. Accessed Sept. 2022.
Lang, John. “Why organizations don't realize the full value of Microsoft 365.“Business IT, 29 Nov 202I. Accessed 10 Oct 2022.
Mason, Quinn. “How to increase Office 365 / Microsoft 365 user adoption.” Sharegate, 19 Sept 2019. Accessed 3 Oct 2022.
McDermott, Matt. “6-Point Office 365 Post-Migration Checklist.” Spanning , 12 July 2019 . Accessed 4 Oct 2022.
“Microsoft 365 usage analytics.” Microsoft 365, Microsoft, 25 Oct 2022. Web.
Sharma, Megha. “Office 365 Pre & Post Migration Checklist.’” Kernel Data Recovery, 26 July 2022. Accessed 30 Sept. 2022.
Sivertsen, Per. “How to avoid a failed M365 implementation? Infotechtion, 19 Dec 2021. Accessed 2 Oct. 2022.
St. Hilaire, Dan. “Most Common Mistakes with Office 365 Deployment (and How to Avoid Them).“ KnowledgeWave, 4Mar 2019. Accessed Oct. 2022.
“Under the Hood of Microsoft 365 and Office 365 Adoption.” SoftwareONE, 2019. Web.
The Business Impact Analysis (BIA) is easily one of the most misunderstood processes in the modern enterprise. For many, the term conjures images of dusty binders filled with disaster recovery plans. A compliance checkbox exercise focused solely on what to do when the servers are smoking or the building is flooded. This view, while not entirely incorrect, is dangerously incomplete. It relegates the BIA to a reactive, insurance-policy mindset when it should be a proactive, strategic intelligence tool.
Yes, I got that text from AI. So recognizable. But you know what? There is a kernel of truth in this.
A modern BIA is about understanding and protecting value more than just about planning for disaster. That is the one thing we must keep in mind at all times. The BIA really is a deep dive into the DNA of the organization. It maps the connections between information assets, operational processes, and business outcomes. It answers the critical question, “What matters? And why ? And what is the escalating cost of its absence?”
To answer “what matters,” the process must begin at the highest level: with senior management and, ideally, the board. Defining the organization's core mission and priorities is a foundational governance task, a principle now embedded in European regulations like DORA.
The process begins at the highest level with senior management. I would say, the board. They need to decide what the business is all about. (This is in line with the DORA rules in Europe.) The core business units or departments of the organization are ranked based on their contribution to the company's mission. This ranking is frequently based on revenue generation, but it can also factor in strategic importance, market position, or essential support functions. For example, the “Production” and “Sales” units might be ranked higher than “Internal HR Administration.” This initial ranking provides the foundational context for all subsequent decisions.
I want to make something crystal clear: this ranking is merely a practical assessment. Obviously the HR and well being departments play a pivotal role in the value delivery of the company. Happy employees make for happy customers.
But, being a bit Wall-Streety about it, the sales department generating the biggest returns is probably only surpassed by the business unit producing the product for those sales. And with that I just said that the person holding the wrench, who knows your critical production machine, is your most valuable HR asset. Just saying.
With the business units prioritized, the next step is to drill down into each one and identify its critical operational functions. The focus here is on processes, not technology. For the top-ranked “Sales” unit, critical functions might include:
SF-01: Processing New Customer Orders
SF-02: Managing the Customer Relationship Management (CRM) System
SF-03: Generating Sales Quotes
These functions are then rated against each other within the business unit to create a prioritized list of what truly matters for that unit to achieve its goals.
And here I'm going to give you some food for thought. There will be a superficial geographical difference in importance. If you value continuity then new business may not be the top critical department. I can imagine this is completely counter intuitive. But remember that it is cheaper to keep and upsell an existing client than it is to acquire a new one.
With a clear map of what the business does, the next logical step is to identify what it uses to get it done. This brings us to the non-negotiable foundation of resilience: comprehensive information asset classification.
Without knowing what you have, where it is, and what it's worth, any attempt at risk management is simply guesswork. You risk spending millions protecting low/mid-value data while leaving the crown jewels exposed (I guess your Ciso will have said something 😊). In this article, we will explore how foundational asset classification can evolve into a mature, value-driven impact analysis, offering a blueprint for transforming the BIA from a tactical chore into a strategic imperative.
Before you can determine the effect of losing an asset, you must first understand the asset itself. Information asset classification is the systematic process of inventorying, categorizing, and assigning business value to your organization's data. Now that we have terabyte-scale data on servers, cloud environments, and countless SaaS applications, you have your work cut out for you. It is, however, a most critical investment in the risk management lifecycle.
Classification forces an organization to look beyond the raw data and evaluate it through two primary lenses: criticality and sensitivity.
Criticality is a measure of importance. It answers the question: “How much damage would the business suffer if this asset were unavailable or corrupted?” This is directly tied to the operational functions that depend on the asset. The criticality of a customer database, for instance, is determined by the impact on the sales, marketing, and support functions that would grind to a halt without it. This translates to the availability rating.
Sensitivity is a measure of secrecy. It answers the question: “What is the potential harm if this asset were disclosed to unauthorized parties?” This considers reputational damage, competitive disadvantage, legal penalties, and customer privacy violations. This translates to the confidentiality rating.
Without this dual understanding, it's impossible to implement a proportional and cost-effective security program. The alternative is a one-size-fits-all approach, which invariably leads to one of two expensive failures:
Overprotection: Applying the highest level of security controls to all information is prohibitively expensive and creates unnecessary operational friction. It's like putting a bank vault door on a broom closet.
Underprotection: Applying a baseline level of security to all assets leaves your most critical and sensitive information dangerously vulnerable. It exposes your organization to unacceptable risk. Remember assigning an A2 rating to all your infra because it cannot be related to specific business processes? The “we'll take care of it at the higher levels” approach leads to exactly this issue.
By understanding the criticality and sensitivity of assets, organizations can ensure that security efforts are directly tied to business objectives, making the investment in protection proportional to the asset's value. Proportionality is also embedded in new European legislation.
While the concept is straightforward, the execution can be complex. A successful classification program requires a methodical framework that moves from high-level policy to granular implementation. in this first stage, we're going to talk about data.
The first step is to establish a simple, intuitive classification scheme. When you complicate it, you lose your people. Most organizations find success with a three- or four-tiered model, which is easy for employees to understand and apply. For example:
Public: Information intended for public consumption with no negative impact from disclosure (e.g., marketing materials, press releases).
Internal: Information for use within the organization but not overly sensitive. Its disclosure would be inconvenient but not damaging (e.g., internal memos on non-sensitive topics, general project plans).
Confidential: Sensitive business information that, if disclosed, could cause measurable damage to the organization's finances, operations, or reputation (e.g., business plans, financial forecasts, customer lists).
Restricted or secret: The most sensitive data that could cause severe financial or legal damage if compromised. Access is strictly limited on a need-to-know basis (e.g., trade secrets, source code, PII, M&A details).
This is often the most challenging phase: identifying and locating all information assets. You must create a comprehensive inventory and detail not just the data itself but its entire context:
Data Owners: The business leader accountable for the data and for determining its classification.
Data Custodians: The IT or operational teams responsible for implementing and managing the security controls on the data.
Location: Where does the data live? Is it in a specific database, a cloud storage bucket, a third-party application, or a physical filing cabinet?
External Dependencies: Crucially, this inventory must extend beyond the company's walls. Which third-party vendors (payroll processors, cloud hosting providers, marketing agencies) handle, store, or transport your data? Their security posture is now part of your risk surface. In Europe, this is now a foundation of your data management through GDPR, DORA, the AI Act and other legislation.
Information isn't static. Its value and handling requirements can change over its lifecycle. Your classification process must define clear rules for each stage:
Creation: How is data classified when it's first created? How is it marked (e.g., digital watermarks, document headers)?
Storage & Use: What security controls apply to each classification level at rest and in transit (e.g., encryption standards, access control rules)? What about legislative initiatives?
Archiving & Retention: How long must the data be kept to meet business needs and legal requirements? What about external storage?
Destruction: What are the approved methods for securely destroying the data (e.g., cryptographic erasure, physical shredding) once it's no longer required?
Without clear, consistent handling standards for each level, the classification labels themselves are meaningless. The classification directly dictates the required security measures.
This dual (business processes and asset classification) top-down approach to determining criticality is often referred to as the 'hierarchy of importance,' which helps in systematically prioritizing assets based on their business value.
Once assets are inventoried, the next step is to systematically determine their criticality. Randomly assigning importance to thousands of assets is futile. A far more effective method is a top-down, hierarchical approach that mirrors the structure of the business itself. This method creates a clear “chain of criticality,” where the importance of a technical asset is directly derived from the value of the business function it supports.
Only now, once you have clearly defined the critical business functions and prioritized them, can you finally map the specific assets and resources they depend on. These are the people, technology, and facilities that enable the function. For the critical function “Processing New Customer Orders,” the supporting assets might include:
Application: SAP ERP System (Module SD)
Database: Oracle Customer Order Database
Hardware: Primary ERP Server Cluster
Personnel: Sales team and Order Entry team
The criticality of the “Oracle Customer Order Database” is now clear. It is clearly integrated into the business; it is critically important because it is an essential asset for a top-priority function (SF-01) within a top-ranked business unit (“Sales”). This top-down structure provides a clear, business-justified view of risk that management can easily understand. It allows you to see precisely how a technical risk (e.g., a vulnerability in the Oracle database) can bubble up to impact a core business operation.
With a clear understanding of what's indispensable, the BIA can now finally move to its core purpose: analyzing the tangible and intangible impacts of a disruption over time. A robust impact analysis prevents “impact inflation,” which is the common tendency to focus solely on unrealistic scenarios or self-importance assurances, as this just causes management to discount your findings. That just causes management to discount your findings. A more credible approach uses a range of outcomes that paint a realistic picture of escalating damage over time.
Your analysis should assess the loss of the four core pillars of information security:
Loss of Confidentiality: The unauthorized disclosure of sensitive information. The impact can range from legal fines for a data breach to the loss of competitive advantage from a leaked product design.
Loss of Integrity: The unauthorized or improper modification of data. This can lead to flawed decision-making based on corrupted reports, financial fraud, or a complete loss of trust in the system.
Loss of Availability: The inability to access a system or process. This is the most common focus of traditional BIA, leading to lost productivity, missed sales, and an inability to deliver services.
This brings us to the CIAA rating, which encompasses Confidentiality, Integrity, Availability, and Authenticity, providing a comprehensive framework for assessing information security impacts.
Impacts can be measured in two ways, and the most effective BIAs use a combination of both:
Qualitative Analysis: This uses descriptive scales (e.g., High, Medium, Low) to assess impacts that are difficult to assign a specific monetary value to. This is ideal for measuring things like reputational damage, loss of customer confidence, or employee morale. Its main advantage is prioritizing risks quickly, but it lacks the financial precision needed for a cost-benefit analysis.
Quantitative Analysis: This assigns a specific monetary value ($) to the impact. This is used for measurable losses like lost revenue per hour, regulatory fines, or the cost of manual workarounds. The major advantage is that it provides clear financial data to justify security investments. For example, “This outage will cost us $100,000 per hour in lost sales” is a powerful statement when requesting funding for a high-availability solution.
A mature analysis might involve scenario modeling—where we walk through a small set of plausible disruption scenarios with business stakeholders to define a range of outcomes (minimum, maximum, and most likely). This provides a far more nuanced and credible dataset that aligns with how management views other business risks.
To elevate the BIA from an internal exercise to a truly strategic tool, we can apply one more lens: the Customer Value Chain Contribution (CVCC)©. This approach reframes the impact analysis to focus explicitly on the customer. Instead of just asking, “What is the impact on our business?” we ask, “What is the impact on our customer's experience and our ability to deliver value to them?”
The CVCC method involves mapping your critical processes and assets to specific stages of the customer journey. For example:
Awareness/Acquisition: A disruption to the company website or marketing automation platform directly impacts your ability to attract new customers.
Conversion/Sale: An outage of the e-commerce platform or CRM system prevents customers from making purchases, directly impacting revenue and frustrating users at a key moment.
Service Delivery/Fulfillment: A failure in the warehouse management or logistics system means orders can't be fulfilled, breaking promises made to the customer.
Support/Retention: If the customer support ticketing system is down, customers with problems can't get help, leading to immense frustration and potential churn.
By analyzing impact through the CVCC lens, the consequences become far more vivid and compelling. “Loss of the CRM system” becomes “a complete inability to process new sales leads or support existing customers, causing direct revenue loss and significant reputational damage.” This framing aligns the BIA directly with the goal of any business: creating and retaining satisfied customers. It transforms the discussion from technical risk to the preservation of the customer relationship and the value chain that supports it.
When you build your BIA on this framework, meaning that it is rooted in sound asset classification, structured by the correct top-down criticality analysis, and enriched by the customer-centric view of impact, then it is no longer a static document. It becomes the dynamic, strategic blueprint for organizational resilience.
These insights generate business decisions:
Prioritized risk mitigation: they show exactly where to focus security efforts and resources for the greatest return on investment.
Justified security spending: they provide the quantitative and qualitative data needed to make a compelling business case for new security controls, technologies, and processes.
Informed recovery planning: they establish clear, business-justified Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) that form the foundation of any effective business continuity and disaster recovery plan.
I'm convinced that this expanded vision of the business impact analysis embeds the right analytical understanding of value and risk into the fabric of the organization. I want you to move beyond the fear of disaster and toward a confident, proactive posture of resilience. Like that, you ensure that in a world of constant change and disruption, the things that truly matter are always understood, always protected, and always available.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a clear project vision that outlines the goals and objectives for the HRIS strategy. Subsequently, construct an HRIS business model that is informed by enablers, barriers, and the organizational, IT, and HR needs.
Gather high-level requirements to determine the ideal future state. Explore solution alternatives and choose the path that is best aligned with the organization's needs.
Identify roadmap initiatives. Prioritize initiatives based on importance and effort.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the importance of creating an HRIS strategy before proceeding with software selection and implementation.
Learn why a large percentage of HRIS projects fail and how to avoid common mistakes.
Set expectations for the HRIS strategy and understand Info-Tech’s HRIS methodology.
Complete a project charter to gain buy-in, build a project team, and track project success.
A go/no-go decision on the project appropriateness.
Project stakeholders identified.
Project team created with defined roles and responsibilities.
Finalized project charter to gain buy-in.
1.1 Set a direction for the project by clarifying the focus.
1.2 Identify the right stakeholders for your project team.
1.3 Identify HRIS needs, barriers, and enablers.
1.4 Map the current state of your HRIS.
1.5 Align your business goals with your HR goals and objectives.
Project vision
Defined project roles and responsibilities
Completed HRIS business model
Completed current state map and thorough understanding of the HR technology landscape
Strategy alignment between HR and the business
Gain a thorough understanding of the HRIS-related pains felt throughout the organization.
Use stakeholder-identified pains to directly inform the HRIS strategy and long-term solution.
Visualize your ideal processes and realize the art of the possible.
Requirements to strengthen the business case and inform the strategy.
The art of the possible.
2.1 Requirements gathering.
2.2 Sketch ideal future state processes.
2.3 Establish process owners.
2.4 Determine guiding principles.
2.5 Identify metrics.
Pain points classified by data, people, process, and technology
Ideal future process vision
Assigned process owners, guiding principles, and metrics for each HR process in scope
Brainstorm and prioritize short- and long-term HRIS tasks.
Understand next steps for the HRIS project.
3.1 Create a high-level implementation plan that shows dependencies.
3.2 Identify risks and mitigation efforts.
3.3 Finalize stakeholder presentation.
Completed implementation plan
Completed risk management plan
HRIS stakeholder presentation
If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue, then it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard reviews the top ten pieces of advice for improving ticket queue management at the service desk.
This template includes several examples of service desk queue structures, followed by space to build your own model of your optimal service desk queue structure and document who is assigned to each queue and responsible for managing each queue.
Service Desk and IT leaders who are struggling with low efficiency, high backlogs, missed SLAs, and poor service desk metrics often think they need to hire more resources or get a new ITSM tool with better automation and AI capabilities. However, more often than not, the root cause of their challenges goes back to the fundamentals.
Strong ticket queue management processes are critical to the success of all other service desk processes. You can’t resolve incidents and fulfill service requests in time to meet SLAs without first getting the ticket to the right place efficiently and then managing all tickets in the queue effectively. It sounds simple, but we see a lot of struggles around queue management, from new tickets sitting too long before being assigned, to in-progress tickets getting buried in favor of easier or higher-priority tickets, to tickets jumping from queue to queue without progress, to a seemingly insurmountable backlog.
Once you have taken the time to clearly structure your queues, assign resources, and define your processes for routing tickets to and from queues and resolving tickets in the queue, you will start to see response and resolution time decrease along with the ticket backlog. However, accountability for queue management is often overlooked and is really key to success.

Natalie Sansone, PhD
Senior Research Analyst, Infrastructure & Operations
Info-Tech Research Group
If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.
A host of different factors influence service desk response time and resolution time, including process optimization and documentation, workflow automation, clearly defined prioritization and escalation rules, and a comprehensive and easily accessible knowledgebase.
However, the root cause of poor response and resolution time often comes down to the basics like ticket queue management. Without clearly defined processes and ownership for assigning and actioning tickets from the queue in the most effective order and manner, customer satisfaction will suffer.
*to email and web support tickets
Source: Freshdesk, 2021
A Freshworks analysis of 107 million service desk interactions found the relationship between CSAT and response time is stronger than resolution time - when customers receive prompt responses and regular updates, they place less value on actual resolution time.
Email/web
Ideally, the majority of tickets come into the ticket queue through email or a self-service portal, allowing for appropriate categorization, prioritization, and assignment.
Phone
For IT teams with a high volume of support requests coming in through the phone, reducing wait time in queue may be a priority.
Chat
Live chat is growing in popularity as an intake method and may require routing and distribution rules to prevent long or multiple queues.
Queue management is a set of processes and tools to direct and monitor tickets or manage ticket flow. It involves the following activities:
Without a clear and efficient process or accountability for moving incoming tickets to the right place, tickets will be worked on randomly, older tickets will get buried, the backlog will grow, and SLAs will be missed.
With effective queue management and ownership, tickets are quickly assigned to the right resource, worked on within the appropriate SLO/SLA, and actively monitored, leading to a more manageable backlog and good response and resolution times.
A growing backlog will quickly lead to frustrated and dissatisfied customers, causing them to avoid the service desk and seek alternate methods to get what they need, whether going directly to their favorite technician or their peers (otherwise known as shadow IT).
Build a mature ticket queue management process that allows your team to properly prioritize, assign, and work on tickets to maximize response and resolution times.
As queue management maturity increases:
Response time decreases
Resolution time decreases
Backlog decreases
End-user satisfaction increases

*Queues may be defined by skillset, role, ticket category, priority, or a hybrid.
Start small; don’t create a queue for every possible ticket type. Remember that someone needs to be accountable for each of these queues, so only build what you can monitor.
PROCESS INCLUDES: |
DEFINE THE FOLLOWING: |
|
|---|---|---|
TRIAGING INCOMING TICKETS |
|
|
WORKING ON ASSIGNED TICKETS |
|
|
The triage role is critical but difficult. Consider rotating your Tier 1 resources through this role, or your service desk team if you’re a very small group.
You decide which channels to enable and prioritize, not your users. Phone and chat are very interrupt-driven and should be reserved for high-priority issues if used. Your users may not understand that but can learn over time with training and reinforcement.
Priority matrixes are necessary for consistency but there are always circumstances that require judgment calls. Think about risk and expected outcome rather than simply type of issue alone. And if the impact is bigger than the initial classification, change it.
In some organizations, the same issue can be more critical if it happens to a certain user role (e.g. client facing, c-suite). Identify and flag VIP users and clearly define how their tickets should be prioritized.
If users are in different time zones, take their current business hours into account when choosing which ticket to work on.
Think of your service desk as an emergency room. Patients come in with different symptoms, and the triage nurse must quickly assess these symptoms to decide who the patient should see and how soon. Some urgent cases will need to see the doctor immediately, while others can wait in another queue (the waiting room) for a while before being dealt with. Some cases who come in through a priority channel (e.g. ambulance) may jump the queue. Checklists and criteria can help with this decision making, but some degree of judgement is also required and that comes with experience. The triage role is sometimes seen as a junior-level role, but it actually requires expertise to be done well.
Info-Tech’s blueprint Standardize the Service Desk will help you standardize and document core service desk processes and functions, including:
Someone must be responsible for monitoring all incoming and open tickets as well as assigned tickets in every queue to ensure they are routed and fulfilled appropriately. This person must have authority to view and coordinate all queues and Queue Managers.
Someone must be responsible for managing each queue, including assigning resources, balancing workload, and ensuring SLOs are met for the tickets within their queue. For example, the Apps Manager may be the Queue Manager for all tickets assigned to the Apps team queue.
Will you have a triage team who monitors and assigns all incoming tickets? What are their specific responsibilities (e.g. prioritize, categorize, attempt troubleshooting, assign or escalate)? If not, who is responsible for assigning new tickets and how is this done? Will the triage role be a rotating role, and if so, what will the schedule be?
Everyone who is assigned tickets should understand the ticket handling process and their specific responsibilities when it comes to queue management.
You may have multiple queue manager roles: one for each queue, and one who has visibility over all the queues. Typically, these roles make up only part of an individual’s job. Clearly define the responsibilities of the Queue Manager role; sample responsibilities are on the right.
Lack of authority over queues – especially those outside Tier 1 of the service desk – is one of the biggest pitfalls we see causing aging tickets and missed SLAs. Every queue needs clear ownership and accountability with everyone committed to meeting the same SLOs.
Specific responsibilities may include:
Ticket Documentation
Ticket descriptions and documentation must be kept accurate and up to date. This ensures that if the ticket is escalated or assigned to a new person, or the Queue Manager or Service Desk Manager needs to know what progress has been made on a ticket, that person doesn’t need to waste time with back-and-forth communication with the technician or end user.
Ticket Status
The ticket status field should change as the ticket moves toward resolution, and must be updated every time the status changes. This ensures that anyone looking at the ticket queue can quickly learn and communicate the status of a ticket, tickets don’t get lost or neglected, metrics are accurate (such as time to resolve), and SLAs are not impacted if a ticket is on hold.
For more guidance on ticket handling and documentation, download Info-Tech’s blueprint: Standardize the Service Desk.
Shift left means enabling fulfilment of repeatable tasks and requests via faster, lower-cost delivery channels, self-help tools, and automation.
Automation rules can be used to ensure tickets are assigned to the right person or queue, to alert necessary parties when a ticket is about to breach or has breached SLA, or to remind technicians when a ticket has sat in a queue or at a particular status for too long.
This can improve efficiency, reduce error, and bring greater visibility to both high-priority tickets and aging tickets in the backlog.
However, your processes, queues, and responsibilities must be clearly defined before you can build in automation.
For examples of rules, triggers, and fields you can automate to improve the efficiency of your queue management processes, see the next slide.
It can be overwhelming to support agents when their view is a long and never-ending queue. Set the default dashboard view to show only those tickets assigned to the viewer to make it appear more manageable and easier to organize.
The queue should quickly give your team all the information they need to prioritize their work, including ticket status, priority, category, due date, and updated timestamps. Configuration is important - if it’s confusing, clunky, or difficult to filter or sort, it will impact response and resolution times and can lead to missed tickets. Give your team input into configuration and use visuals such as color coding to help agents prioritize their work – for example, VIP tickets may be clearly flagged, critical or high priority tickets may be highlighted, tickets about to breach may be red.
Track metrics that give visibility into how quickly tickets are being resolved and how many aging tickets you have. Metrics may include:
Regularly review reports on these metrics with the team.
Make it an agenda item to review aging tickets, on hold tickets, and tickets about to breach or past breach with the team.
Take action on aging tickets to ensure progress is being made.
Set rules to close tickets after a certain number of attempts to reach unresponsive users (and change ticket status appropriately).
Schedule times for your team to tackle aged tickets or tickets in the backlog.
It can be easy for high priority work to constantly push down low priority work, leaving the lower priority tickets to constantly be ignored and users to be frustrated. If you’re struggling with aging tickets, backlog, and tickets breaching SLA, experiment with your team and queue structure to figure out the best resource distribution to handle your workload. This could mean rotating people through the triage role to allow them time to work through the backlog, reducing the number of people doing triage during slower volume periods, or giving technicians dedicated time to work through tickets. For help with forecasting demand and optimizing resources, see Staff the Service Desk to Meet Demand.
Map out your optimal ticket queue structure using the Service Desk Queue Structure Template. Follow the instructions in the template to complete it as a team.
The template includes several examples of service desk queue structures followed by space to build your own model of an optimal service desk queue structure and to document who is assigned to each queue and responsible for managing each queue.
The template is not meant to map out your entire service desk structure (e.g. tiers, escalation paths) or ticket resolution process, but simply the ticket queues and how a ticket moves between queues. For help documenting more detailed process workflows or service desk structure, see the blueprint Standardize the Service Desk.
This project will help you build and improve essential service desk processes including incident management, request fulfillment, and knowledge management to create a sustainable service desk.
This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.
This project will help you streamline your ticket intake process and identify improvements to your intake channels.
This project will help you determine your optimal service desk structure and staffing levels based on your unique environment, workload, and trends.
“What your Customers Really Want.” Freshdesk, 31 May 2021. Accessed May 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify your open data program's current state maturity, and gain buy-in from the business for the program.
Identify a target state maturity and reach it through building a policy and processes and the use of metrics.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Ensure that the open data program is being driven out from the business in order to gain business support.
Identify drivers for the open data program that are coming directly from the business.
1.1 Understand constraints for the open data program.
1.2 Conduct interviews with the business to gain input on business drivers and level-set expectations.
1.3 Develop list of business drivers for open data.
Defined list of business drivers for the open data program
Understand the gaps between where your program currently is and where you want it to be.
Identify top processes for improvement in order to bring the open data program to the desired target state maturity.
2.1 Perform current state maturity assessment.
2.2 Define desired target state with business input.
2.3 Highlight gaps between current and target state.
Defined current state maturity
Identified target state maturity
List of top processes to improve in order to reach target state maturity
Develop a draft open data policy that will give you a starting point when building your policy with the community.
A draft open data policy will be developed that is based on best-practice standards.
3.1 Define the purpose of the open data policy.
3.2 Establish principles for the open data program.
3.3 Develop a rough governance outline.
3.4 Create a draft open data policy document based on industry best-practice examples.
Initial draft of open data policy
Build open data processes and identify metrics for the program in order to track benefits realization.
Formalize processes to set in place to improve the maturity of the open data program.
Identify metrics that can track the success of the open data program.
4.1 Develop the roles that will make up the open data program.
4.2 Create processes for new dataset requests, updates of existing datasets, and the retiring of datasets.
4.3 Identify metrics that will be used for measuring the success of the open data program.
Initial draft of open data processes
Established metrics for the open data program
IT needs to answer these questions:
Your answers need to balance choice, risk, and cost.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you identify your goals, build standard offerings for users, define governance and policies around offerings, and develop a roadmap for your EUC program.
Use these templates to document your end-user computing strategy. Follow the guidelines in the blueprint and record activity results in the template. The findings will be presented to the management team.
The Ideas Catalog introduces provisioning models, form factors, and supported operating systems. Use the Standard Offering Template to document provisioning models and define computing devices along with apps and peripherals according to the outcome of the user group analysis.
Use these policy templates to communicate the purposes behind each end-user computing decision and establish company standards, guidelines, and procedures for the purchase of technologies. The policies will ensure purchasing, reimbursement, security, and remote wiping enforcements are consistent and in alignment with the company strategy.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Dig into the current state and build user persona.
Determine your challenges and strengths.
Delineate user IT requirements.
1.1 Assess the current state of end-user computing.
1.2 Perform SWOT analysis.
1.3 Map benefits to stakeholder drivers and priorities.
1.4 Identify user groups.
1.5 Identify supporting technology.
1.6 Identify opportunities to provide value.
SWOT analysis of current state
Goals cascade
Persona analysis
Define your EUC vision and standard offerings.
Brainstorm EUC vision and mission.
Find out the standard offerings.
Set the direction for end-user computing to support shift-left enablement.
2.1 Prioritize benefits.
2.2 Craft a vision and mission statement.
2.3 Identify goals.
2.4 Define guiding principles for your strategy.
2.5 Select a provisioning model for each persona.
2.6 Define the standard device offerings.
2.7 Document each persona's entitlements.
Vision statement, mission statement, and guiding principles
Goals and indicators
End-user device entitlements standard
Outline supporting practices and define policies for each use case.
Document supporting practices.
Document EUC policies.
3.1 Define device management tools and approach.
3.2 Identify groups involved in supporting practices.
3.3 Identify opportunities to improve customer service.
3.4 Define acceptable use.
3.5 Define BYOD policies.
3.6 Define procurement and entitlement policies.
3.7 Define security policies.
List of management tools for end-user computing
Roles and responsibilities for maintaining the end-user computing environment
Opportunities to improve customer service
End-user computing policy templates
Build a user migration roadmap.
Make the project a reality by documenting initiatives and building a roadmap.
4.1 Identify the gaps in devices, user support, use cases, policy & governance, and fitness for use.
4.2 Plan the deployment and user migration journey.
4.3 Document initiatives in the roadmap.
Initiatives mapped to practice areas
User migration journey map
It’s easy to think that if we give end users nice devices, then they will be more engaged and they will be happy with IT. If only it were that easy.
Info-Tech Research Group has surveyed over 119,000 people through its CIO Business Vision diagnostic. The results show that a good device is necessary but not enough for high satisfaction with IT. Once a user has a decent device, the other aspects of the user’s experience has a higher impact on their satisfaction with IT.
After all, if a person is trying to run apps designed in the 1990s, if they are struggling to access resources through an underperforming VPN connection, or if they can’t get help when their devices and apps aren’t working, then it doesn’t matter that you gave them a state-of-the-art MacBook or Microsoft Surface.
As you build out your end-user computing strategy to reflect the new reality of today’s workforce, ensure you focus on shifting user support left, modernizing apps to support how users need to work, and ensuring that your network and collaboration tools can support the increased demands. End-user computing teams need to focus beyond the device.
Ken Weston, ITIL MP, PMP, Cert.APM, SMC
Research Director, Infrastructure and Operations Info-Tech Research Group
Mahmoud Ramin, PhD
Senior Research Analyst, Infrastructure and Operations Info-Tech Research Group
IT needs to answer these questions:
Your answers need to balance choice, risk, and cost.
Management paradigms have shifted:
Take end-user computing beyond the OS.
This blueprint will help you:
A good device is necessary for satisfaction with IT but it’s not enough.
If a user has a prestigious tablet but the apps aren’t built well, they can’t get support on it, or they can’t connect to the internet, then that device is useless. Focus on supportability, use cases, connection, policy – and device.
Definition: End-User Computing (EUC)
End-user computing (EUC) is the domain of information and technology that deals with the devices used by workers to do their jobs. EUC has five focus areas: devices, user support, use cases, policy & governance, and fitness for use.
A good end-user computing strategy will effectively balance:
User Choice
Cost
Risk
The right balance will be unique for every organization.
| Cost | Risk | Choice | Result | |
|---|---|---|---|---|
| Higher Education | High importance | Low importance | High importance | Full BYOD for professors. Standardized offerings for administration. |
| Software Development Firms | Low importance | Medium/High importance | High importance | Standardized offerings for developers. Virtual desktops for users on BYOD. |
| Legal Firm | Medium importance | High importance | Low importance | Partners offered prestigious devices. Everyone else uses Windows PCs. Virtual desktops and apps for remote access. |
|
Healthcare |
High importance | High importance | Low importance | Nurses, janitors, and other frontline staff use shared tablets. Doctors are provisioned their own tablet. Admin staff and doctors are provisioned virtual desktops to maintain security and compliance. |
| Government | High importance | High importance | Low importance | Standardized PC offerings for all employees. MacBooks are provided with justification. Devices managed with Intune and ConfigMgr. |
Info-Tech’s CIO Business Vision has shown that when someone is dissatisfied with their device, their satisfaction with IT overall is only 40.92% on average.
When a person is satisfied with their device, their average satisfaction increases by approximately 30 percentage points to 70.22%. (Info-Tech Research Group, CIO Business Vision, 2021; N=119,383)
Improvements in the service desk, business apps, networks and communication infrastructure, and IT policy all have a higher impact on increasing satisfaction.
For every one-point increase in satisfaction in those areas, respondents’ overall satisfaction with IT increased by the respective percentage of a point. (Info-Tech Research Group, CIO Business Vision, 2021; N=119,409)
Only Windows
Group Policy & Client Management
Limited to email on phones
Hands-on with images
Virtual Desktop Infrastructure in the Data Center
Performed by IT
Rare
Phone calls and transactional interactions
Only Windows
Microsoft is still the dominant player in end-user computing, but Windows has only a fraction of the share it once had.
IT needs to revisit their device management practices. Modern management tools such as unified endpoint management (UEM) tools are better suited than traditional client management tools (CMT) for a cross-platform world.
IT must also revisit their application portfolios. Are business apps supported on Android and iOS or are they only supported on Windows? Is there an opportunity to offer more options to end users? Are end users already running apps and handling sensitive data on Android and iOS through software-as-a-service and bring-your-own-device (BYOD) capabilities in Office 365 and Google apps?
IT can’t expect everyone to be fluent on Windows and Mac, have a computer at home, or even have home broadband.
Of US adults aged 18-29:
Further, only 59% of US adults making less than $30,000/year have a laptop or desktop. (“Mobile Technology” and “Digital Divide,” Pew Research, 2021.)
Globally, people are likelier to have a cell subscription than they are to have access to broadband.
Group Policy & Client Management
CMTs such as Microsoft Endpoint Configuration Manager (ConfigMgr, aka SCCM) can be used to distribute apps, apply patches, and enforce group policy.
EMM tools allow you to manage multiple device platforms through mobile device management (MDM) protocols. These tools enforce security settings, allow you to push apps to managed devices, and monitor patch compliance through reporting.
EMM tools often support mobile application management (MAM) and mobile content management (MCM). Most EMM tools can manage devices running Windows, Mac OS, iOS, and Android, although there are exceptions.
UEM solutions combine CMT and EMM for better control of remote computers running Windows or Macs. Examples include:
Most UEM tools can manage devices running Windows, Mac OS, iOS, and Android, allowing IT to manage all end-user devices from a unified tool set (although there are exceptions).
MAM provides the ability to package an app with security settings, distribute app updates, and enforce app updates. Some capabilities do not require apps to be enrolled in an EMM or UEM solution.
MCM tools distribute files to remote devices. Many MCM solutions allow for security settings to be applied, such as encrypting the files or prohibiting data from leaving the secure container. Examples include OneDrive, Box, and Citrix ShareFile.
| Windows Management Features | Traditional CMT | Hybrid UEM | Cloud-Based EMM |
|---|---|---|---|
| Group Policy | ✔ Primary management approach | ✔ Available alongside configuration service providers | X Replaced by configuration service providers |
| Manage remote devices without VPN | X | X | ✔ |
| No longer manage and maintain images | X | ✔ Images are still available | ✔ Images replaced by provisioning packages |
| Secure and support BYOD | X (Certain tools may offer limited MDM capabilities) | ✔ | ✔ |
| Support remote zero-touch provisioning | X (Only available via PXE boot) | ✔ | ✔ |
| App, patch, update deployments | Via defined distribution points | Via defined distribution points or MAM | Via MAM |
Hands-on with images
Supply chain issues are making computers longer to procure, meaning users are waiting longer for computers (Cision, 2021). The resulting silicon chip shortage is expected to last until at least 2023 (Light Reading, 2021).
IT departments are delaying purchases, delaying refreshes, and/or purchasing more to reserve devices before they need them.
Remote work has increased by 159% over the past 12 years (NorthOne, 2021). New hires and existing users can’t always go into the office to get a new computer.
IT departments are paying vendors to hold onto computers and then drop-ship them directly to the end user. The devices are provisioned using zero touch (e.g. Autopilot, Apple Device Manager, or another tool). Since zero-touch provisioning tools do not support images, teams have had to switch to provisioning packages.
Virtual Desktop Infrastructure in the Data Center
Citrix saw subscription revenue increase 71% year over year in 2020 (Citrix 2020 Annual Report, p. 4). VMware saw subscription and SaaS revenue increase 38% from January 2020 to 2021 – while on-premises licensing revenue decreased by 5% (VMware Annual Report 2021, p. 40).
Microsoft and AWS are offering desktops as a service (i.e. cloud-based virtual desktops). IT needs to manage only the device, not the underlying virtual desktop infrastructure. This is in addition to Citrix’s and VMware’s cloud offerings, where IT doesn’t need to manage the underlying infrastructure that supports VDI.
Visit the blueprint Implement Desktop Virtualization and Transition to Everything as a Service to get started.
Rare
“More technical troubleshooting due to users working from home a lot more. It can be more difficult to talk users through fixes when they are off site if you cannot remotely assist so more emphasis on the communication skill which was already important.” (Service Desk Institute, 2021)
Visit the Hybrid Workplace Research Center to better support a hybrid workforce.
Limited to email on phones
Action Item: Identify how IT can provide more support to personally owned computers, tablets, and smartphones.
58% of working Americans say their work devices are “awful to work on." (PCMag, 2021)
But only 22% of organizations provide full support to BYOD. (Cybersecurity Insiders, 2021)
IT must either provide better devices or start fully supporting users on personal PCs.
Performed by IT
Action Item: Build a governance framework that describes the roles and responsibilities involved in business-owned apps. Identify the user’s role and end-user computing’s role in supporting low-code apps.
Visit the blueprint Embrace Business-Managed Apps to learn how to build a governance framework for low-code development platforms.
Visit the Low-Code Business Process Management SoftwareReviews category to compare different platforms.
Phone calls and transactional interactions
Microsoft’s 2019 “Global State of Customer Service” report shows that people have high expectations:
End users have the same expectations of IT, the service desk, and end-user computing teams:
Most Important Aspects of Customer Service
Resolving issue in one interaction - 35%
Knowledgeable agent - 31%
Finding information myself - 11%
Not repeating information - 20%
(Microsoft, 2019)
Action Item: Apply shift-left enablement to train tier 1 agents on troubleshooting more incidents and fulfilling more service requests. Build top-notch self-service capabilities for end users.
Work with your service desk on the blueprint Optimize the Service Desk with a Shift-Left Strategy.
Take end-user computing beyond the device
Only Windows
Group Policy & Client Management
Limited to email on phones
Hands-on with images
Virtual Desktop Infrastructure in the Data Center
Performed by IT
Rare
Phone calls and transactional interactions
Improvements in the service desk, business apps, networks and communication infrastructure, and IT policy have a higher impact on increasing satisfaction.
Impact of End-User Satisfaction of IT by Area Compared to Devices
Devices (x1.0)
IT Policy (x1.09)
Network & Communications Infrastructure (x1.41)
Business Apps (x1.51)
Service Desk (x1.54)
(Info-Tech Research Group, CIO Business Vision, 2021; n=119,409)
End-User Group Analysis
Supported Devices & Apps
Device Support
Fitness for Use
Vision
The right balance will be unique for every organization. Get the balance right by aligning your strategy's goals to senior leadership’s most important priorities.
Have a more prestigious option ready for users, such as VIPs, who want more than the usual offerings. This approach will help you to proactively anticipate your users' needs.
These five personas will exist in one form or another throughout your user groups.
| 1. Set the Direction | 2. Define the Offering | 3. Build the Roadmap | |
|---|---|---|---|
| Phase Steps |
1.1 Identify Desired Benefits 1.2 Perform a User Group Analysis 1.3 Define the Vision |
2.1 Define the Standard Offerings 2.2 Outline Supporting Services 2.3 Define Governance and Policies |
3.1 Develop Initiatives |
| Phase Outcomes |
Current-State Assessment Goals Cascade User Group Assessment Vision Statement Mission Statement Guiding Principles |
Standard Offerings by User Group Device Management Model Technical Support Model Device Entitlement Policy Acceptable Use Policy Remote Wipe Policy & Waiver Personal Device Reimbursement Policy |
End-User Migration Journey Map Strategy and Roadmap |
Once users are satisfied with devices, focus on the bigger picture
If end users are dissatisfied with devices, they will also be dissatisfied with IT. But if you don’t also focus on apps and supportability, then giving users better devices will only marginally increase satisfaction with IT.
Bring it back to stakeholder priorities
Before you build your vision statement, make sure it resonates with the business by identifying senior leadership’s priorities and aligning your own goals to them.
Balance choice, risk, and cost
The balance of user choice, risk mitigation, and cost optimization is unique for each company. Get the balance right by aligning your strategy’s goals to senior leadership’s most important priorities.
Communicate early and often with users
Expect users to become anxious when you start targeting their devices. Address this anxiety by bringing them into the conversation early in the planning – they will see that their concerns are being addressed and may even feel a sense of ownership over the strategy.
Standardize the nonstandard
When users such as VIP users want more than the standard offering, have a more prestigious option available. This approach will help you to proactively anticipate your users’ needs.
Consider multiple personas when building your standards, training, and migrations
Early Adopters, Late Adopters, VIP Users, Road Warriors, and Hoarders – these five personas will exist in one form or another throughout your user groups.
Use these worksheets to guide your analysis.
Compare options for your end-user computing environment.
Define your supported offerings and publish this document in your service catalog.
Use these templates as a starting point for addressing policy gaps.
Document your strategy using this boardroom-ready template.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 8 to 10 calls over the course of 4 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| Set the Direction | Define the Offering | Support the Offering | Bridge the Gap and Create the Roadmap | Next Steps and Wrap-Up (offsite) | |
| Activities |
1.1 Identify desired benefits. 1.1.1 Assess the current state of end-user computing. 1.1.2 Perform a SWOT analysis. 1.1.3 Map benefits to stakeholder drivers and priorities. 1.2 Analyze user groups. 1.2.1 Identify user groups. 1.2.2 Identify supporting technology. 1.2.3 Record use cases. 1.2.4 Identify opportunities to provide value. |
1.3 Define the vision. 1.3.1 Prioritize benefits. 1.3.2 Craft a vision and mission statement. 1.3.3 Identify goals. 1.3.4 Define guiding principles for your strategy. 2.1 Define the standard offerings. 2.1.1 Select a provisioning model for each persona. 2.1.2 Define the standard device offerings. 2.1.3 Document each personas’ entitlements. |
2.2 Outline supporting practices. 2.2.1 Define device management tools and approach. 2.2.2 Identify groups involved in supporting practices. 2.2.4 Identify opportunities to improve customer service. 2.3 Define policies. 2.3.1 Define acceptable use. 2.3.2 Define BYOD policies. 2.3.3 Define procurement and entitlement policies. 2.3.4 Define security policies. |
3.1 Develop initiatives. 3.1.1 Identify the gaps in devices, user support, use cases, policy & governance, and fitness for use. 3.1.2 Plan the deployment and user migration journey. 3.1.3 Document initiatives in the roadmap . |
5.1 Complete in-progress deliverables from previous four days. 5.2 Set up time to review workshop deliverables and discuss next steps |
| Deliverables |
|
|
|
|
|
1.1 Identify Desired Benefits
1.2 Perform a User Group Analysis
1.3 Define the Vision
2.1 Define the Standard Offerings
2.2 Outline Supporting Services
2.3 Define Governance and Policies
3.1 Develop Initiatives
This phase will walk you through the following activities:
This phase involves the following participants:
Download the End-User Computing Strategy Template.
1.1.1 Assess the current state of end-user computing
1.1.2 Perform a SWOT analysis
1.1.3 Map benefits to stakeholder drivers and priorities
Optional: Identify current total cost of ownership
This step requires the following inputs:
This step involves the following participants:
Download the End-User Computing Strategy Template.
Devices: As shown in the executive brief, devices are necessary for satisfaction in IT. In your current-state assessment, outline the principal means by which users are provided with a desktop and computing.
User support: Examine how the end-user computing team enables a high-quality customer service experience. Especially consider self-service and tier 1 support.
Use cases: Reflect on how IT and end-user computing supports users’ most important use cases. Consider these aspects:
Policy and governance: Document the current state of policies governing the use of end-user computing devices, both corporate-issued and personally owned. Review Step 2.3 for a list of policy questions to address and for links to policy templates.
IT policies: List your current policy documents. Include policies that relate to end-user computing, such as security policy documents; acceptable use policy documents; purchasing policies; documents governing entitlements to computers, tablets, smartphones, and prestigious devices; and employee monitoring policy documents.
Fitness for use: Reflect on your ability to secure users, enterprise data, and computers. Document your current capabilities to ensure devices are adequately secured and risks adequately mitigated.
Record your SWOT analysis in the “Current-State Assessment” section of your End-User Computing Strategy Template.
Download the End-User Computing Strategy Template.
| Stakeholder | Drivers and Strategic Priorities | End-User Computing Benefits |
|---|---|---|
| CEO | Ensure service continuity with remote work |
|
| Respond to COVID-19 changes with agility |
|
|
| Reduce unnecessary costs |
|
|
| COO | Business continuity: being able to work from home |
|
Record this table on the “Goals Cascade” slide in the “Vision and Desired Benefits” section of your End-User Computing Strategy Template.
Use the CEO-CIO Alignment Program to identify which business benefits are most important.
| Business Goals | End-User Computing Benefits | |||
|---|---|---|---|---|
| Manage risk | Controls are effectively enforced on remote devices | Sensitive data is secured | Devices and data are accounted for | |
| Ensure service continuity | Business processes can still function with remote personnel | Customers can still be served by remote workers | Personnel can be productive from anywhere | IT practices can still operate remotely |
| Comply with external regulation | Improved ability to demonstrate compliance | |||
| Respond to change with agility | Personnel can be productive from anywhere | More business processes can be performed remotely | ||
| Improve operational efficiency | More efficient sales practices | More efficient customer service practices | Increased number of digitized business processes | Increased use of IT and HR self-service tools |
| Offer competitive products and services | Increased customer satisfaction with online services | Number of piloted new products | ||
| Manage people | Increased employee productivity | Increased employee engagement | Increased talent attraction | Increased workforce retention |
| Make data-driven decisions | Increased workforce retention | Improved understanding of customers | Access to accurate data on services and spending | Improved IT cost forecasting |
| Improve customer experience | Increased customer satisfaction with online services | Ability to scale up capacity to meet increased demand | Customers can still be served by remote workers | Improved customer self-service options |
| Maximize stakeholder value | Transition to OpEx spend and reduce CapEx investments | Access to accurate data on services and spending | Improved IT cost forecasting | |
Insert the results into your End-User Computing Strategy Template.
Download the HAM Budgeting Tool.
Download the Mobile Strategy TCO Calculator.
1.2.1 Organize roles based on how they work
1.2.2 Organize users into groups
1.2.3 Document the current offerings
1.2.4 Brainstorm pain points and desired gains for each user group
This step requires the following inputs:
This step involves the following participants:
Use the Application Portfolio Assessment to run a relationship survey.
Dive deeper with the blueprint Improve Requirements Gathering.
Organization chart: Consult with HR or department leaders to provide a list of the different roles that exist in each department.
Identity access management tools: You can consult tools like Active Directory, but only if the data is clean.
Apps and devices used: Run a report from your endpoint management tool to see what devices and apps are used by one another. Supplement this report with a report from a network management tool to identify software as a service that are in use and/or consult with department leaders.
Relationship surveys: Tools like the End-User Application Satisfaction Diagnostic allow you to assess overall satisfaction with IT.
Focus groups and interviews: Gather unstructured feedback from users about their apps and devices.
User shadowing: Observe people as they use technology to identify improvement opportunities (e.g. shadow meetings, review video call recordings).
Ticket data: Identify apps or systems that users submit the most incidents about as well as high-volume requests that could be automated.
| Always Works in the Same Location | Sometimes Works in Different Locations | Always Works in Different Locations | |
|---|---|---|---|
| Predominantly Reads Information |
|
||
| Reads and Writes Information |
|
|
|
| Predominantly Creates Information |
|
Download the User Group Analysis Workbook.
Standardize the nonstandard
When users such as VIP users want more than the standard offering, have a more prestigious option available. This approach will help you to proactively anticipate your users’ needs.
Record each user group’s pain points and desired gains on their respective worksheet.
For additional questions you can ask, visit this Strategyzer blog post by Alexander Osterwalder.
Info-Tech Insight
Identify out-of-scope benefits?
If that desired gain is required for the vision to be achieved for a specific role, you have two options:
Forcing a user group to use an unsatisfactory tool will severely undermine your chance of success, especially in the project’s early stages.
1.3.1 Prioritize which benefits you want to achieve
1.3.2 Identify how you will track performance
1.3.3 Craft a vision statement that demonstrates what you’re trying to create
1.3.4 Craft a mission statement for your end-user computing team
1.3.5 Define guiding principles
This step requires the following inputs:
This step involves the following participants:
Record the output in your End-User Computing Strategy Template under “Benefit Prioritization” in the “Vision and Desired Benefits” section.
Sample output:
| Must Have | Should Have | Could Have | Won't Have |
|---|---|---|---|
|
|
|
|
Record this information in your End-User Computing Strategy Template.
Sample output:
| Critical Success Factor | Key Performance Indicator | Metrics |
|---|---|---|
| Improve remote worker productivity | Increase employee engagement by 10% in two years |
|
| Integrate relevant information sources into one spot for sales | Integrate three information sources that will be useful to sales in one year |
|
| Reduce real-estate costs | Reduce office space by 50% in two cities over three years |
|
| Securely deliver all apps, information, and data to any device, anywhere, at any time | Build the apps and information sources into a digital workspace for three business processes over one year |
|
Strong IT vision statements have the following characteristics:
Sample IT Vision Statements:
Strong IT mission statements have the following characteristics:
Sample IT Mission Statements:
| IT Principle Name | IT Principle Statement |
|---|---|
| 1. Enterprise value focus | We aim to provide maximum long-term benefits to the enterprise as a whole while optimizing total costs of ownership and risks. |
| 2. Fit for purpose | We maintain capability levels and create solutions that are fit for purpose without over-engineering them. |
| 3. Simplicity | We choose the simplest solutions and aim to reduce operational complexity of the enterprise. |
| 4. Reuse > buy > build | We maximize reuse of existing assets. If we can’t reuse, we procure externally. As a last resort, we build custom solutions. |
| 5. Managed data | We handle data creation, modification, and use enterprise-wide in compliance with our data governance policy. |
| 6. Controlled technical diversity | We control the variety of technology platforms we use. |
| 7. Managed security | We manage, support, and assist in the implementation of security enterprise-wide in collaboration with our security governance team. |
| 8. Compliance to laws and regulations | We operate in compliance with all applicable laws and regulations. |
| 9. Innovation | We seek innovative ways to use technology for business advantage. |
| 10. Customer centricity | We deliver best experiences to our end users by aligning to customer service best practices. |
1.1 Identify Desired Benefits
1.2 Perform a User Group Analysis
1.3 Define the Vision
Define the Offering
2.1 Define the Standard Offerings
2.2 Outline Supporting Services
2.3 Define Governance and Policies
Build the Roadmap
3.1 Develop Initiatives
This phase will walk you through the following activities:
This phase involves the following participants:
2.1.1 Identify the provisioning models for each user group
2.1.2 Define the standard device offerings
2.1.3 Document each user group’s entitlements
This step requires the following inputs:
This step involves the following participants:
Action Item: Provide a defined set of standard options to the business to proactively address different needs.
A good end-user computing strategy will effectively balance:
Your standard offerings need to strike the right balance for your organization.
The catalog provides information about choices in:
Review the catalog to learn about items that can help your organization to achieve the desired vision from Phase 1.
As you review the catalog, think about these questions:
Download the End-User Computing Ideas Catalog.
Download the End-User Computing Ideas Catalog.
Download the Standard End-User Entitlements and Offerings Template.
| Persona | Primary Computing Device | Secondary Laptops or Computers | Smartphone | Tablet |
|---|---|---|---|---|
| Sales | COPE | BYOD | BYOD | BYOD |
| Field Sales | CYOD | BYOD | COBO | COBO |
| Customer Service | COBO | None | None | None |
| Knowledge Worker | COPE | BYOD | BYOD | BYOD |
| App Dev | CYOPED | None | CYOD | CYOD |
| VIP | CYOPED | CYOPED | CYOPE | BYOD |
When users such as VIP users want more than the standard offering, have a more prestigious option ready to offer. This approach will help you to proactively anticipate your users’ needs.
Generally, if it is a supported device, then the budget owner determines whether to allow the user to receive a more powerful or more prestigious device.
This decision can be based on factors such as:
If IT gets this answer wrong, then it can result in shadow IT
Document your answer in the Device Entitlement Policy Template.
| Windows | Mac OS | iOS | Android | |
|---|---|---|---|---|
| Laptops | Lenovo T15 Gen 2 | MacBook Pro 14” | N/A | N/A |
| Power Laptops | Lenovo ThinkPad X1 Carbon | MacBook Pro 16” | N/A | N/A |
| Prestigious Laptops | Lenovo ThinkPad X1 Yoga Gen 6 | MacBook Pro 16” | N/A | N/A |
| Tablets | Microsoft Surface | N/A | iPad Pro | Samsung Galaxy Tab |
| Smartphones | N/A | N/A | iPhone 13 | Samsung Galaxy S21 |
Download the Standard End-User Entitlements and Offerings Template.
2.2.1 Review device management tools and capabilities
2.2.2 Identify common incidents and requests for devices
2.2.3 Record how you want to shift resolution
2.2.4 Define which IT groups are involved in supporting practices
Define the Offering
This step requires the following inputs:
This step involves the following participants:
Outcomes of this step
| Provision | Protect from loss/theft | Deploy/update apps | Backup & protect | Protect from injections | Complies with policies | Track | Decommission | |
|---|---|---|---|---|---|---|---|---|
| Windows 10 & 11 (co-managed) | Autopilot | Gap | ConfigMgr | Gap | Windows Security | ConfigMgr | ConfigMgr Intune | Intune and Autopilot |
| Windows 10 & 11 (Intune) | Autopilot | Intune (remote wipe) | Intune | OneDrive for Business | Windows Security | Microsoft Advanced Threat Protection | Intune | Intune and Autopilot |
| Mac OS | Jamf Pro | Intune (remote wipe) | Jamf Pro | OneDrive for Business | Gap | Jamf Pro | Intune | Jamf Pro |
Document the results on the “IT Management Tools” slide in the “IT Support” section of your End-User Computing Strategy Template.
Analyze your service desk ticket data. Look for the following information:
Record the level at which these tickets can be resolved today. Ensure you include these groups:
Record the desired state. For each incident and request, to where do you want to shift resolution?
Record this chart on the “Current State of IT Support” slide in the “IT Support” section of your End-User Computing Strategy Template.
| Most Common Incidents & Requests | Self-Service | Service Desk Tier 1 | Desk-Side or Field Support | End-User Computing |
|---|---|---|---|---|
| Connect/fix a printer | X | |||
| Web conferencing issue | X | |||
| Bluetooth issues | X | |||
| Outlook issues | X | |||
| Install standard app | X | |||
| Install app requiring approval | X | |||
| Install nonstandard app | X | |||
| Enroll personal iOS/Android device | X | |||
| Enroll personal Mac/Windows computer | X | |||
| Perform a factory reset on a lost or stolen device | X | |||
| Unenroll device | X |
Starting with the chart you created in Activity 2.2.2, record the desired state. For each incident and request, to where do you want to shift resolution?
Use the “Opportunities to Provide Self-Service and Articles” and “Desired State” slides in the “IT Support” section of your End-User Computing Strategy Template to document quick wins and high-value, high-effort shifts.
| Most Common Incidents & Requests | Self-Service | Service Desk Tier 1 | Desk-Side or Field Support | End-User Computing |
|---|---|---|---|---|
| Connect/fix a printer | H | QW | X | |
| Web conferencing issue | H | X | ||
| Bluetooth issues | L | X | ||
| Outlook issues | H | H | X | |
| Install standard app | X | |||
| Install app requiring approval | H | X | ||
| Install nonstandard app | OoS | X | ||
| Enroll personal iOS/Android device | QW | QW | X | |
| Enroll personal Mac/Windows computer | QW | QW | X | |
| Perform a factory reset on a lost or stolen device | QW | QW | X | |
| Unenroll device | QW | QW | X |
2.3.1 Answer these organizational policy questions
2.3.2 Answer these security policy questions
Define the Offering
This step requires the following inputs:
This step involves the following participants:
Outcomes of this step
Use the “Policies” section in the End-User Computing Strategy Template to document the answers in this section. Activities 2.3.2 and 2.3.3 present links to policy templates. Use these templates to help address any gaps in your current policy suite.
Use the “Policies” section of the End-User Computing Strategy Template to document these answers.
Download the Mobile Device Connectivity & Allowance Policy template.
Download the Purchasing Policy template.
Download the Mobile Device Reimbursement Policy template.
Download the Mobile Device Reimbursement Agreement template.
Download the General Security – User Acceptable Use Policy template.
Download the BYOD Acceptable Use Policy template.
Download the Mobile Device Remote Wipe Waiver template.
Download the General Security – User Acceptable Use Policy template.
Visit the Reduce and Manage Your Organization’s Insider Threat Risk blueprint to address this gap.
Use the “Policies” section of the End-User Computing Strategy Template to document these answers.
Download the General Security – User Acceptable Use Policy template.
Visit the Discover and Classify Your Data blueprint to address this gap.
Download the General Security – User Acceptable Use Policy template.
Download the General Security – User Acceptable Use Policy template.
Visit the Develop and Deploy Security Policies blueprint to address this gap.
For help defining your own security configuration baselines for each operating system, reference best practice documentation such as:
National Institute of Standards and Technology’s National Checklist Program.
Center for Internet Security’s solutions.
Microsoft’s security baseline settings for Windows 10 and 11 Configuration Service Providers.
1.1 Identify Desired Benefits
1.2 Perform a User Group Analysis
1.3 Define the Vision
2.1 Define the Standard Offerings
2.2 Outline Supporting Services
2.3 Define Governance and Policies
3.1 Develop Initiatives
This phase will walk you through the following activities:
This phase involves the following participants:
3.1.1 Identify initiatives for each EUC practice
3.1.2 Build out the user’s migration journey map
3.1.3 Build out a list of initiatives
Build the Roadmap
This step requires the following inputs:
This step involves the following participants:
Outcomes of this step
For each of the five areas, build a profile for the changes you want to implement. Record:
Identify the initiatives involved in each area.
Document these profiles and initiatives in the “Roadmap” section of your End-User Computing Strategy Template.
Users execute the migrate on their own (e.g. Microsoft’s consumer migration to Windows 10).
Users come in person, select a device, and perform the migration with a specialist. If the device needs support, they return to the same place (e.g. buying a computer from a store).
Users select a device. When the device is ready, they can schedule time to pick up the device and perform the migration with a specialist (e.g. purchasing an iPhone in advance from Apple’s website with in-store pick-up).
Migrations to the new tool may fail. IT should check in with the user to confirm that the device successfully made the migration.
Download the End-User Computing Strategy Template.
On tab “1. Setup”:
Use tab “2. Data Entry” to record your list of initiatives.
Use tab “3. Roadmap” to visualize your data. You will have to press “Refresh All” under Data in the ribbon for the PivotChart to update.
Copy the roadmap visual on tab “3. Roadmap” into your End-User Computing Strategy Template. You can also copy the list of initiatives over into the document.
Download the Roadmap Tool.
You built a strategy to improve the balance between user enablement, risk mitigation, and cost optimization. Throughout the blueprint, you identified opportunities to provide additional value to end users and stakeholders during these activities:
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Identify User Groups
Identify each user group based on the business processes, tasks, and applications they use.
Define Standard Device Offerings
Record your provisioning models for each user group and the primary and secondary devices, apps, and peripherals that each group receives.
This project helps you align your zero-touch approach with stakeholder priorities and larger IT strategies. You will be able to build your zero-touch provisioning and patching plan from both the asset lifecycle and the end-user perspective to create a holistic approach that emphasizes customer service. Tailor deployment plans to more easily scope and resource deployment projects.
This project will help you analyze the current state of your HAM program, define assets that will need to be managed, and build and involve the ITAM team from the beginning to help embed the change. It will also help you define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.
This project will help you conduct a goals exercise and capability assessment for Office 365. You will be able to refine governance objectives, build out controls, formalize governance, build out one pagers, and finalize a communication plan.
A special thank-you to 6 anonymous contributors
“2020 Annual Report and Proxy.” Citrix, 2020. Accessed Oct. 2021.
“2021 BYOD Security Report.” Cybersecurity Insiders, 2021. Web.
Anderson, Arabella. “12 Remote Work Statistics to Know in 2022.” NorthOne, 2021. Accessed Oct. 2021.
Bayes, Scarlett. “ITSM: 2021 & Beyond.” Service Desk Institute, 14 April 2021, p. 14. Web.
Belton, Padraig. “Intel: Chip shortage will extend to at least 2023.” Light Reading, 22 Oct. 2021. Web.
Beroe Inc. “Demand for PC Components Saw a Surge Due to COVID-19, Says Beroe Inc.” Cision PR Newswire, 2 Sept. 2021. Web.
Devaraj, Vivekananthan. “Reference Architecture: Remote PC Access.” Citrix, 2021. Accessed Aug. 2021.
“Elements of the Project Charter and Project Scope Statement.” A Guide to PMBOK, 7th edition, PMI, 2021. Accessed Sept. 2021.
Elliott, Christopher. “This Is How The Pandemic Improved Customer Service.” Forbes, 2021. Accessed Oct. 2021.
“Enable TMP 2.0 on your PC.” Microsoft, Support, Aug. 2021. Web.
“End User Computing Trends to Look Out for in 2021.” Stratodesk, 30 Oct. 2020. Accessed September 2021.
“Global State of Customer Service: The Transformation of Customer Service from 2015 to Present Day.” Microsoft, 2019. Web.
Goodman, Elizabeth et al. “Observing the User Experience” A Practitioner's Guide to User Research, 2nd edition. Elsevier, 2012. Accessed Sept. 2021.
Govindarajulu, Chittibabu. “An Instrument to Classify End-Users Based On the User Cube” Informing Science, June 2002. Accessed September 2021.
Griffith, Eric. “Remote Employees to Bosses: Our PCs Suck!” PCMag, 11 Oct. 2021. Web.
Hutchings, Jeffrey D., and Craig A. de Ridder. “Impact of Remote Working on End User Computing Solutions and Services.” Pillsbury, 2021. Accessed Sept. 2021
“ITIL4 Create, Deliver, and Support.” Axelos, 2020. Accessed Sept. 2021.
“ITIL4 Drive Stakeholder Value” Axelos, 2020. Accessed Sept. 2021.
Mcbride, Neil, and Trevor Wood-Harper. “Towards User-Oriented Control of End-User Computing in Large Organizations” Journal of Organizational and End User Computing, vol. 14, no. 1, pp. 33-41, 2002. Accessed September 2021.
““Microsoft Endpoint Configuration Manager Documentation.” Microsoft Docs, Microsoft, 2021. Accessed Sept. 2021.
“Microsoft Intune documentation.” Microsoft Docs, Microsoft. Accessed Sept. 2021.
“Mobile Cellular Subscriptions (per 100 People).” The World Bank, International Telecommunication Union (ITU) World Telecommunication/ICT Indicators Database, 2020. Web.
Morgan, Jacob. “The Employee Experience Advantage: How to Win the War for Talent by Giving Employees the Workspaces they Want, the Tools they Need, and a Culture They Can Celebrate.” Wiley, 2017. Accessed Sept. 2021.
Murphy, Anna. “How the pandemic has changed customer support forever.” Intercom, 2021. Accessed Sept. 2021.
“Operating System Market Share Worldwide, Jan 2021-Jan 2022.” StatCounter GlobalStats, 2022. Web.
“Operating System Market Share Worldwide, Jan-Dec 2011.” StatCounter GlobalStats, 2012. Web.
Pereira, Karla Susiane, et al. “A Taxonomy to Classify Risk End-User Profile in Interaction with the Computing Environment.” In: Tryfonas T. (eds.) Human Aspects of Information Security, Privacy, and Trust. HAS 2016. Lecture Notes in Computer Science, vol. 9750. Accessed Sept. 2021.
Perrin, Andrew. “Mobile Technology and Home Broadband 2020.” Pew Research Center, 3 June 2021. Web.
Quan-Haase, Anabel. “Technology and Society: Social Networks, Power, and Inequality” Oxford University Press, 2012. Accessed Aug. 2021.
Reed, Karin, and Joseph Allen. “Suddenly Virtual: Making Remote Meetings Work.” Wiley, 2021. Accessed Aug. 2021.
Rockart, John F., and Lauren S. Flannery. “The management of end user computing.” Communications of the ACM, vol. 26, no. 10, Oct. 1983. Accessed September 2021.
Turek, Melanie. “Employees Say Smartphones Boost Productivity by 34 Percent: Frost & Sullivan Research.” Samsung Insights, 3 Aug. 2016. Web.
Vladimirskiy, Vadim. “Windows 365 vs. Azure Virtual Desktop (AVD) – Comparing Two DaaS Products.” Nerdio, 2021. Accessed Aug. 2021.
“VMware 2021 Annual Report.” VMware, Financial Document Library, 2021. Web.
VMworld 2021, Oct. 2021.
Vogels, Emily A. “Digital divide persists even as americans with lower incomes make gains in tech adoption.” Pew Research Center, 22 June 2021. Web.
“What is End-User computing?” VMware, 2021. Accessed Aug. 2021.
“Windows 10 Home and Pro.” Microsoft, Docs, 2021. Web.
Zibreg, Christian. “Microsoft 365 Now Boasts Over 50 Million Subscribers.” MUD, 29 April 2021. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Determining SAP’s fit within your organization is critical. Start off by building a business case to assess overarching drivers and justification for change, any net new business benefits and long-term sustainability. Oftentimes the ROI is negative, but the investment sets the stage for long-term growth.
Your deployment model is more important than you think. Selecting a deployment model will dictate your licensing options followed by your contractual pathways forward.
Know what’s in the contract. Each customer agreement is different and there may be existing terms that are beneficial. Depending on how much is spent, anything can be up for negation.
I'm proud to announce our new Customer Value Contribution Calculator©, or CVCC© in short.
It enhances and possibly replaces the BIA (Business Impact Analysis) process with a much simpler way.
More info to follow shortly.
Addressing and managing the negotiation debriefing process will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This phase will help you debrief after each negotiation session and identify the parts of your strategy that must be modified before your next negotiation session.
This phase will help you conduct evaluations at three critical points after the negotiations have concluded.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Improve negotiation skills and outcomes; share lessons learned.
Understand the value of debriefing sessions during the negotiation process.
Understand how to use the Info-Tech After Negotiations Tool.
A better understanding of how and when to debrief during the negotiation process to leverage key insights.
The After Negotiations Tool will be reviewed and configured for the customer’s environment (as applicable).
1.1 Debrief after each negotiation session
1.2 Determine next steps
1.3 Return to preparation phase
1.4 Conduct Post Mortem #1
1.5 Conduct Implementation Assessment
1.6 Conduct Post Mortem #2
Negotiation Session Debrief Checklist and Questionnaire
Next Steps Checklist
Discussion
Post Mortem #1 Checklist & Dashboard
Implementation Assessment Checklist and Questionnaire
Post Mortem #2 Checklist & Dashboard
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Get your desktop and mobile device support teams out of firefighting mode by identifying the real problem.
Improve the day-to-day operations of your desktop and mobile device support teams through role definition, training, and process standardization.
Stop using management tools and techniques from the Windows XP era. Save yourself, and your technicians, from needless pain.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify how unified endpoint management (UEM) can improve the lives of the end user and of IT.
Cutting through the vendor hype and aligning with business needs.
1.1 Identify benefits you can provide to stakeholders.
1.2 Identify business and IT goals in order to prioritize benefits.
1.3 Identify how to achieve benefits.
1.4 Define goals based on desired benefits.
Executive presentation
Ensure that your teams have a consistent approach to end-user device management.
Developed a standard approach to roles and responsibilities, to training, and to device management processes.
2.1 Align roles to your environment.
2.2 Assign architect-, engineer-, and administrator-level responsibilities.
2.3 Rationalize your responsibility matrix.
2.4 Ensure you have the necessary skills.
2.5 Define Tier 2 processes, including patch deployment, emergency patch deployment, device deployment, app deployment, and app packaging.
List of roles involved in end-user device management
Responsibility matrix for end-user device management
End-user device management training plan
End-user device management standard operating procedure
Workflows and checklists of end-user device management processes
Modernize the toolset used by IT to manage end-user devices.
Saving time and resources for many standard device management processes.
3.1 Define the core image for each device/OS.
3.2 Define app packages.
3.3 Gather action items for improving the support technologies.
3.4 Create a roadmap for improving end-user device management.
3.5 Create a communication plan for improving end-user device management.
Core image outline
Application package outline
End-user device management roadmap
End-user device management communication plan
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
With the exponential pace of technological change, an organization's success will depend largely on how well CIOs can evolve from technology evangelists to strategic business partners. This will require CIOs to effectively broker relationships to improve IT's effectiveness and create business value. A confidential journal can help you stay committed to fostering productive relationships while building trust to expand your sphere of influence.
Highly effective executives have in common the ability to successfully balance three things: time, personal capabilities, and relationships. Whether you are a new CIO or an experienced leader, the relentless demands on your time and unpredictable shifts in the organization’s strategy require a personal game plan to deliver business value. Rather than managing stakeholders one IT project at a time, you need an action plan that is tailored for unique work styles.
A personal relationship journal will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this research to create a personal relationship journal in four steps:
Use this exemplar to build a journal that is readily accessible, flexible, and easy to maintain.
As technology becomes increasingly important, an organization's success depends on the evolution of the modern CIO from a technology evangelist to a strategic business leader. The modern CIO will need to leverage their expansive partnerships to demonstrate the value of technology to the business while safeguarding their time and effort on activities that support their strategic priorities. CIOs struggling to transition risk obsolescence with the emergence of new C-suite roles like the Digital Transformation Officer, Chief Digital Officer, Chief Data Officer, and so on.
CIOs will need to flex new social skills to accommodate diverse styles of work and better predict dynamic situations. This means expanding beyond their comfort level to acquire new social skills. Having a clear understanding of one's own work style (preferences, natural tendencies, motivations, and blind spots) is critical to identify effective communication and engagement tactics.
Building trust is an art. Striking a balance between fulfilling your own goals and supporting others will require a carefully curated approach to navigate the myriad of personalities and work styles. A personal relationship journal will help you stay committed through these peaks and troughs to foster productive partnerships and expand your sphere of influence over the long term.
Joanne Lee
Principal, Research Director, CIO Advisory
Info-Tech Research Group
Your ChallengeIn today's unpredictable markets and rapid pace of technological disruptions, CIOs need to create business value by effectively brokering relationships to improve IT's performance. Challenges they face:
|
Common ObstaclesLimited span of influence. Mistaking formal roles in organizations for influence. Understanding what key individuals want and, more importantly, what they don't want. Lack of situational awareness to adapt communication styles to individual preferences and context. Leveraging different work styles to create a tangible action plan. Perceiving relationships as "one and done." |
Info-Tech's ApproachA personal relationship journal will help you stay committed to fostering productive relationships while building trust to expand your sphere of influence.
|
Highly effective executives have in common the ability to balance three things: time, personal capabilities, and relationships. Whether you are a new CIO or an experienced leader, the relentless demand on your time and unpredictable shifts in the organization's strategy will require a personal game plan to deliver business value. This will require more than managing stakeholders one IT project at a time: It requires an action plan that fosters relationships over the long term.
Stakeholder Management
A common term used in project management to describe the successful delivery of any project, program, or activity that is associated with organizational change management. The goal of stakeholder management is intricately tied to the goals of the project or activity with a finite end. Not the focus of this advisory research.
Relationship Management
A broad term used to describe the relationship between two parties (individuals and/or stakeholder groups) that exists to create connection, inclusion, and influence. The goals are typically associated with the individual's personal objectives and the nature of the interaction is seen as ongoing and long-term.
Continuum of Commitment
Info-Tech's framework that illustrates the different levels of commitment in a relationship. It spans from active resistance to those who are committed to actively supporting your personal priorities and objectives. This can be used to baseline where you are today and where you want the relationship to be in the future.
Work Style
A reference to an individual's natural tendencies and expectations that manifest itself in their communication, motivations, and leadership skills. This is not a behavior assessment nor a commentary on different personalities but observable behaviors that can indicate different ways people communicate, interact, and lead.
Glossary
CDxO: Chief Digital Officer
CDO: Chief Data Officer
CxO: C-Suite Executives
63% of CDxOs report directly to the CEO ("Rise of the Chief Digital Officer," CIO.com)
44% of organizations with a dedicated CDxO in place have a clear digital strategy versus 22% of those without a CDxO (KPMG/Harvey Nash CIO Survey)
The "good news": CIOs tend to have a longer tenure than CDxOs.
Source: "Age and Tenure of C-Suites," Korn Ferry
The "bad news": The c-suite is getting overcrowded with other roles like Chief Data Officer.
Source: "Chief Data Officer Study," PwC, 2022
The digital evolution has created the emergence of new roles like the Chief Digital Officer and Chief Data Officer. They are a response to bridge the skill gap that exists between the business and technology. CIOs need to focus on building effective partnerships to better communicate the business value generated by technology or they risk becoming obsolete.
From managing relationships with friends to key business partners, your success will come from having the right game plan. Productive relationships are more than managing stakeholders to support IT initiatives. You need to effectively influence those who have the potential to champion or derail your strategic priorities. Understanding differences in work styles is fundamental to adapting your communication approach to various personalities and situations.
Insight 1: Expand your sphere of influence
It's not just about gaining a volume of acquaintances. Figure out where you want to spend your limited time, energy, and effort to develop a network of professional allies who will support and help you achieve your strategic priorities.
Insight 2: Know thyself first and foremost
Healthy relationships start with understanding your own working style, preferences, and underlying motivations that drive your behavior and ultimately your expectations of others. A win/win scenario emerges when both parties' needs for inclusion, influence, and connection are met or mutually conceded.
Insight 3: Walk a mile in their shoes
If you want to build successful partnerships, you need to understand the context in which your stakeholder operates: their motivations, desires, priorities, commitments, and challenges. This will help you adapt as their needs shift and, moreover, leverage empathy to identify the best tactics for different working styles.
Insight 4: Nurturing relationships is a daily commitment
Building, fostering, and maintaining professional relationships requires a daily commitment to a plan to get through tough times, competing priorities, and conflicts to build trust, respect, and a shared sense of purpose.
Supplement your CIO journey with these related blueprints.
|
|
First 100 Days as CIO |
|
|
Become a Strategic CIO |
|
|
Improve IT Team Effectiveness |
|
|
Become a Transformational CIO |
What are the hallmarks of a healthy relationship with your key stakeholders?
"In my view, I work with partners like they are an extension of my team, as we rely on each other to achieve mutual success. Partnerships involve a deeper, more intimate relationship, where both parties are invested in the long-term success of the business."
Why is it important to understand your stakeholder's situation?
"It's crucial to remember that every IT project is a business project, and vice versa. As technology leaders, our role is to demystify technology by focusing on its business value. Empathy is a critical trait in this endeavor, as it allows us to see a stakeholder's situation from a business perspective, align better with the business vision and goals, and ultimately connect with people, rather than just technology."
How do you stay committed during tough times?
"I strive to leave emotions at the door and avoid taking a defensive stance. It's important to remain neutral and not personalize the issue. Instead, stay focused on the bigger picture and goals, and try to find a common purpose. To build credibility, it's also essential to fact-check assumptions regularly. By following these principles, I approach situations with a clear mind and better perspective, which ultimately helps achieve success."
In a recent conversation with a business executive about the evolving role of CIOs, she expressed: "It's the worst time to be perceived as a technology evangelist and even worse to be perceived as an average CIO who can't communicate the business value of technology."
This highlights the immense pressure many CIOs face when evolving beyond just managing the IT factory.
The modern CIO is a business leader who can forge relationships and expand their influence to transform IT into a core driver of business value.
Identify key stakeholders and their perception of IT's effectiveness
Identify and prioritize your key stakeholders. Be diligent with stakeholder identification. Use a broad view to identify stakeholders who are known versus those who are "hidden." If stakeholders are missed, then so are opportunities to expand your sphere of influence.
Assess stakeholder sentiments from Info-Tech's diagnostic reports and/or your organization's satisfaction surveys to help identify individuals who may have the greatest influence to support or detract IT's performance and those who are passive observers that can become your greatest allies. Determine where best to focus your limited time amid competing priorities by focusing on the long-term goals that support the organization's vision.
Understand which individuals can directly or indirectly influence your ability to achieve your priorities. Look inside and out, as you may find influencers beyond the obvious peers or executives in an organization. Influence can result from expansive connections, power of persuasion, and trust to get things done.
Visit Info-Tech's Diagnostic Programs
30-60 minutes
Start with the key stakeholders that are known to you. Take a 360-degree view of both internal and external connections. Leverage external professional & network platforms (e.g. LinkedIn), alumni connections, professional associations, forums, and others that can help flush out hidden stakeholders.
Use stakeholder satisfaction surveys like Info-Tech's Business Vision diagnostic as a starting point to identify those who are your allies and those who have the potential to derail IT's success, your professional brand, and your strategic priorities. Review the results of the diagnostic reports to flush out those who are:
Consider the following:
Key Output: Create a tab for your most critical stakeholders.

Download the Personal Relationship Management Journal Template.
Create a stakeholder profile to understand the context in which stakeholders operate.
Collect and analyze key information to understand the context in which your stakeholders operate. Use the information to derive insights about their mandate, accountabilities, strategic goals, investment priorities, and performance metrics and challenges they may be facing.
Stakeholder profiles can be used to help design the best approach for personal interactions with individuals as their business context changes.
If you are short on time, use this checklist to gather information:
Understanding what stakeholders want (and more importantly, what they don't) requires knowing their business and the personal and social circumstances underlying their priorities and behaviors.
Create a profile for each of your priority stakeholders to document their business context. Review all the information collected to understand their mandate, core accountability, and business capabilities. The context in which individuals operate is a window into the motivations, pressures, and vested interests that will influence the intersectionality between their expectations and yours.
Crushing demands and competing priorities can lead to tension and stress as people jockey to safeguard their time. Identify some observable challenges to create greater situational awareness. Possible underlying factors:
Adapt communication styles to the situational context in which your stakeholders operate
Each stakeholder has a preferred modality of working which is further influenced by dynamic situations. Some prefer to meet frequently to collaborate on solutions while others prefer to analyze data in solitude before presenting information to substantiate recommendations. However, fostering trust requires:
Adapting your communication style to create productive interactions will require a diverse arsenal of interpersonal skills that you can draw upon as situations shift. The ability to adapt your work style to dial any specific trait up or down will help to increase your powers of persuasion and influence.
"There are only two ways to influence human behavior: you can manipulate it, or you can inspire it." – Simon Sinek
Every individual has a preferred style of working. Determine work styles starting with self-awareness:
Through observation and situational awareness, we can make inferences about people's work style.
Where appropriate and when opportunities arise, ask individuals directly about their preferred work styles and method for communication. What is their preferred method of communication? During a normal course of interaction vs. for urgent priorities?
Consider the following when brainstorming engagement strategies for different work styles.
Think engagement strategies in different professional scenarios:
Use the Business Archetypes to brainstorm possible approaches for engaging with different work styles. Additional communication and engagement tactics may need to be considered based on circumstances and changing situations.
Be Relevant
Be Consistent and Accurate
Be Clear and Concise
Be Attentive and Authentic
"Good communication is the bridge between confusion and clarity."– Nat Turner (LinkedIn, 2020)
Moving from intent to action requires a plan to ensure you stay committed through the peaks and troughs.
Key elements of the action plan:
Investing in relationships is a long-term process. You need to accumulate enough trust to trade or establish coalitions to expand your sphere of influence. Even the strongest of professional ties will have their bouts of discord. To remain committed to building the relationship during difficult periods, use an action plan that helps you stay grounded around:
"Make intentional actions to set intentionality. Plans are good to keep you grounded and focused especially when relationship go through ups and down and there are changes: to new people and new relationships."
– Angela Diop, Senior Director, Executive Services, Info-Tech & former VP of Information Services with Unity Health Care
Establish your personal goals and expectations around what you are seeking from the relationship. Determine the strength of your current connection and identify where you want to move the relationship across the continuum of commitment.
Use insights from your stakeholder's profile to explore their span of influence and degree of interest in supporting your strategic priorities.
Based on your personal goals, identify where you want to move the relationship across the continuum of commitment: What are you hoping to achieve from the relationship? How will this help create a win/win situation for both you and the key stakeholder?
Fostering relationships take time and commitment. Utilizing metrics or personal success criteria for each of your focus areas will help you stay on track and find opportunities to make each engagement valuable instead of being transactional.
The strength of the relationship will help inform the level of time and effort needed to achieve your goals.
Cultivate your network and relationship with the goal of building emotional connection, understanding, and trust around your shared purpose and organization's vision through regular dialogue. Be mindful of transactional exchanges ("quid pro quo") to be strategic about its use. Treat every interaction as equally important regardless of agenda, duration, or channel of communication.
Everyone's time is valuable, and you need to come prepared with a clear understanding of why you are engaging. Think about the intentionality of the conversation:
Communication is built on both overt expressions and subtext. While verbal communication is the most recognizable form, non-lexical components of verbal communication (i.e. paralanguage) can alter stated vs. intended meaning. Engage with the following in mind:
Management plans are living documents and need to be flexible to adapt to changes in stakeholder context.
Building trust takes time and commitment. Treat every conversation with your key stakeholders as an investment in building the social capital to expand your span of influence when and where you need it to go. This requires making relationship management a daily habit. Action plans need to be a living document that is your personal journal to document your observations, feelings, and actions. Such a plan enables you to make constant adjustments along the relationship journey.
"Without involvement, there is no commitment. Mark it down, asterisk it, circle it, underline it."– Stephen Convey (LinkedIn, 2016)
While a personal relationship journal is not a formal performance management tool, identifying some tangible measures will improve the likelihood of aligning your intent with outcomes. Good measures will help you focus your efforts, time, and resources appropriately.
Keep the following in mind:
Knowledge Gained
New Concepts
Approach to Creating a Personal Journal
| Tech Trends and Priorities Research CentreAccess Info-Tech's Tech Trend reports and research center to learn about current industry trends, shifts in markets, and disruptions that are impacting your industry and sector. This is a great starting place to gain insights into how the ecosystem is changing your business and the role of IT within it. |
| Embed Business Relationship Management in ITCreate a business relationship management (BRM) function in your program to foster a more effective partnership with the business and drive IT's value to the organization. |
| Become a Transformational CIOCollaborate with the business to lead transformation and leave behind a legacy of growth. |
Content:
Info-Tech's Business Archetypes was created based on our analysis of the DiSC Profile and Myers-Briggs FIRO-B personality assessment tools that are focused on assessing interpersonal traits to better understand personalities.
The adaptation is due in part to Info-Tech's focus on not designing a personality assessment tool as this is neither the intent nor the expertise of our services. Instead, the primary purpose of this adaptation is to create a simple framework for our members to base their observations of behavioral cues to identify appropriate communication styles to better interact with key stakeholders.
Cautionary note:
Business archetypes are personas and should not be used to label, make assumptions and/or any other biased judgements about individual personalities. Every individual has all elements and aspects of traits across various spectrums. This must always remain at the forefront when utilizing any type of personality assessments or frameworks.
Click here to learn about DiSC Profile
Click here learn about FIRO-B
Click here learn about Experience Cube
DisC® is a personal assessment tool that was originally developed in 1928 by psychologist William Moulton Marston, who designed it to predict job performance. The tool has evolved and is now widely used by thousands of organizations around the world, from large government agencies and Fortune 500 companies to nonprofit and small businesses, to help improve teamwork, communication, and productivity in the workplace. The tool provides a common language people can use to better understand themselves and those they interact with - and use this knowledge to reduce conflict and improve working relationships.
DiSC is an acronym that stands for the four main personality profiles described in the Everything DiSC model: (D)ominance, (i)nfluence, (S)teadiness, (C)onscientiousness
People with (D) personalities tend to be confident and emphasize accomplishing bottom-line results.
People with (i) personalities tend to be more open and emphasize relationships and influencing or persuading others.
People with (S) personalities tend to be dependable and emphasize cooperation and sincerity.
People with (C) personalities tend to emphasize quality, accuracy, expertise, and competency.
The Fundamental Interpersonal Relations Orientation Behavior (FIRO-B®) tool has been around for forty years. The tool assesses your interpersonal needs and the impact of your behavior in the workplace. The framework reveals how individuals can shape and adapt their individual behaviors, influence others effectively, and build trust among colleagues. It has been an excellent resource for coaching individuals and teams about the underlying drivers behind their interactions with others to effectively build successful working relationships.
The FIRO framework addresses five key questions that revolve around three interpersonal needs. Fundamentally, the framework focuses on how you want to express yourself toward others and how you want others to behave toward you. This interaction will ultimately result in the universal needs for (a) inclusion, (b) control, and (c) affection. The insights from the results are intended to help individuals adjust their behavior in relationships to get what they need while also building trust with others. This will allow you to better predict and adapt to different situations in the workplace.
FIRO helps people recognize where they may be giving out mixed messages and prompts them to adapt their exhibited behaviors to build trust in their relationships. It also reveals ways of improving relationships by showing individuals how they are seen by others, and how this external view may differ from how they see themselves. Using this lens empowers people to adjust their behavior, enabling them to effectively influence others to achieve high performance.
In team settings, it is a rich source of information to explore motivations, underlying tensions, inconsistent behaviors, and the mixed messages that can lead to mistrust and derailment. It demonstrates how people may approach teamwork differently and explains the potential for inefficiencies and delays in delivery. Through the concept of behavioral flexibility, it helps defuse cultural stereotypes and streamline cross-cultural teams within organizations.
Go to this link to explore FIRO-B for Business
The Experience Cube model was developed by Gervase Bushe, a professor of Leadership and Organization at the Simon Fraser University's school of Business and a thought leader in the field of organizational behavior. The experience cube is intended as a tool to plan and manage conversations to communicate more effectively in the moment. It does this by promoting self-awareness to better reduce anxiety and adapt to evolving and uncertain situations.
Using the four elements of the experience cube (Observations, Thoughts, Feelings, and Wants) helps you to separate your experience with the situation from your potential judgements about the situation. This approach removes blame and minimizes defensiveness, facilitating a positive discussion. The goal is to engage in a continuous internal feedback loop that allows you to walk through all four quadrants in the moment to help promote self-awareness. With heightened self-awareness, you may (1) remain curious and ask questions, (2) check-in for understanding and clarification, and (3) build consensus through agreement on shared purpose and next steps.
Observations: Sensory data (information you take in through your senses), primarily what you see and hear. What a video camera would record.
Thoughts: The meaning you add to your observations (i.e. the way you make sense of them, including your beliefs, expectations, assumptions, judgments, values, and principles). We call this the "story you make up."
Feelings: Your emotional or physiological response to the thoughts and observations. Feelings words such as sad, mad, glad, scared, or a description of what is happening in your body.
Wants: Clear description of the outcome you seek. Wants go deeper than a simple request for action. Once you clearly state what you want, there may be different ways to achieve it.
Go to this link to explore more: Experience Cube
Joanne Lee
Principal, Research Director, CIO Advisory
Info-Tech Research Group
Joanne is a professional executive with over twenty-five years of experience in digital technology and management consulting spanning healthcare, government, municipal, and commercial sectors across Canada and globally. She has successfully led several large, complex digital and business transformation programs. A consummate strategist, her expertise spans digital and technology strategy, organizational redesign, large complex digital and business transformation, governance, process redesign, and PPM. Prior to joining Info-Tech Research Group, Joanne was a Director with KPMG's CIO Advisory management consulting services and the Digital Health practice lead for Western Canada. She brings a practical and evidence-based approach to complex problems enabled by technology.
Joanne holds a Master's degree in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.
Gord Harrison
Senior Vice President, Research and Advisory
Info-Tech Research Group
Gord Harrison, SVP, Research and Consulting, has been with Info-Tech Research Group since 2002. In that time, Gord leveraged his experience as the company's CIO, VP Research Operations, and SVP Research to bring the consulting and research teams together under his current role, and to further develop Info-Tech's practical, tactical, and value-oriented research product to the benefit of both organizations.
Prior to Info-Tech, Gord was an IT consultant for many years with a focus on business analysis, software development, technical architecture, and project management. His background of educational game software development, and later, insurance industry application development gave him a well-rounded foundation in many IT topics. Gord prides himself on bringing order out of chaos and his customer-first, early value agile philosophy keeps him focused on delivering exceptional experiences to our customers.
Angela Diop
Senior Director, Executive Services
Info-Tech Research Group
Angela has over twenty-five years of experience in healthcare, as both a healthcare provider and IT professional. She has spent over fifteen years leading technology departments and implementing, integrating, managing, and optimizing patient-facing and clinical information systems. She believes that a key to a healthcare organization's ability to optimize health information systems and infrastructure is to break the silos that exist in healthcare organizations.
Prior to joining Info-Tech, Angela was the Vice President of Information Services with Unity Health Care. She has demonstrated leadership and success in this area by fostering environments where business and IT collaborate to create systems and governance that are critical to providing patient care and sustaining organizational health.
Angela has a Bachelor of Science in Systems Engineering and Design from the University of Illinois and a Doctorate of Naturopathic Medicine from Bastyr University. She is a Certified CIO with the College of Healthcare Information Management Executives. She is a two-time Health Information Systems Society (HIMSS) Davies winner.
Edison Barreto
Senior Director, Executive Services
Info-Tech Research Group
Edison is a dynamic technology leader with experience growing different enterprises and changing IT through creating fast-paced organizations with cultural, modernization, and digital transformation initiatives. He is well versed in creating IT and business cross-functional leadership teams to align business goals with IT modernization and revenue growth. Over twenty-five years of Gaming, Hospitality, Retail, and F&B experience has given him a unique perspective on guiding and coaching the creation of IT department roadmaps to focus on business needs and execute successful changes.
Edison has broad business sector experience, including:
Hospitality, Gaming, Sports and Entertainment, IT policy and oversight, IT modernization, Cloud first programs, R&D, PCI, GRDP, Regulatory oversight, Mergers acquisitions and divestitures.
Mike Tweedie
Practice Lead, CIO Strategy
Info-Tech Research Group
Michael Tweedie is the Practice Lead, CIO – IT Strategy at Info-Tech Research Group, specializing in creating and delivering client-driven, project-based, practical research, and advisory. He brings more than twenty-five years of experience in technology and IT services as well as success in large enterprise digital transformations.
Prior to joining Info-Tech, Mike was responsible for technology at ADP Canada. In that role, Mike led several large transformation projects that covered core infrastructure, applications, and services and worked closely with and aligned vendors and partners. The results were seamless and transparent migrations to current services, like public cloud, and a completely revamped end-user landscape that allowed for and supported a fully remote workforce.
Prior to ADP, Mike was the North American Head of Engineering and Service Offerings for a large French IT services firm, with a focus on cloud adoption and complex ERP deployment and management; he managed large, diverse global teams and had responsibilities for end-to-end P&L management.
Mike holds a Bachelor's degree in Architecture from Ryerson University.
Carlene McCubbin
Practice Lead, People and Leadership
Info-Tech Research Group
Carlene McCubbin is a Research Lead for the CIO Advisory Practice at Info-Tech Research Group covering key topics in operating models & design, governance, and human capital development.
During her tenure at Info-Tech, Carlene has led the development of Info-Tech's Organization and Leadership practice and worked with multiple clients to leverage the methodologies by creating custom programs to fit each organization's needs.
Before joining Info-Tech, Carlene received her Master of Communications Management from McGill University, where she studied development of internal and external communications, government relations, and change management. Her education honed her abilities in rigorous research, data analysis, writing, and understanding the organization holistically, which has served her well in the business IT world.
Anubhav Sharma
Research Director, CIO Strategy
Info-Tech Research Group
Anubhav is a digital strategy and execution professional with extensive experience in leading large-scale transformation mandates for organizations both in North America and globally, including defining digital strategies for leading banks and spearheading a large-scale transformation project for a global logistics pioneer across ten countries. Prior to joining Info-Tech Research Group, he held several industry and consulting positions in Fortune 500 companies driving their business and technology strategies. In 2023, he was recognized as a "Top 50 Digital Innovator in Banking" by industry peers.
Anubhav holds an MBA in Strategy from HEC Paris, a Master's degree in Finance from IIT-Delhi, and a Bachelor's degree in Engineering.
Kim Osborne-Rodriguez
Research Director, CIO Strategy
Info-Tech Research Group
Kim is a professional engineer and Registered Communications Distribution Designer (RCDD) with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach to digital transformation, with a track record of supporting successful implementations.
Kim holds a Bachelor's degree in Mechatronics Engineering from University of Waterloo.
Amanda Mathieson
Research Director, People and Leadership
Info-Tech Research Group
Amanda joined Info-Tech Research Group in 2019 and brings twenty years of expertise working in Canada, the US, and globally. Her expertise in leadership development, organizational change management, and performance and talent management comes from her experience in various industries spanning pharmaceutical, retail insurance, and financial services. She takes a practical, experiential approach to people and leadership development that is grounded in adult learning methodologies and leadership theory. She is passionate about identifying and developing potential talent, as well as ensuring the success of leaders as they transition into more senior roles.
Amanda has a Bachelor of Commerce degree and Master of Arts in Organization and Leadership Development from Fielding Graduate University, as well as a post-graduate diploma in Adult Learning Methodologies from St. Francis Xavier University. She also has certifications in Emotional Intelligence – EQ-i 2.0 & 360, Prosci ADKAR® Change Management, and Myers-Briggs Type Indicator Step I and II.
Bacey, Christopher. "KPMG/Harvey Nash CIO Survey finds most organizations lack enterprise-wide digital strategy." Harvey Nash/KPMG CIO Survey. Accessed Jan. 6, 2023. KPMG News Perspective - KPMG.us.com
Calvert, Wu-Pong Susanna. "The Importance of Rapport. Five tips for creating conversational reciprocity." Psychology Today Magazine. June 30, 2022. Accessed Feb. 10, 2023. psychologytoday.com/blog
Coaches Council. "14 Ways to Build More Meaningful Professional Relationships." Forbes Magazine. September 16, 2020. Accessed Feb. 20, 2023. forbes.com/forbescoachescouncil
Council members. "How to Build Authentic Business Relationships." Forbes Magazine. June 15, 2021. Accessed Jan. 15, 2023. Forbes.com/business council
Deloitte. "Chief Information Officer (CIO) Labs. Transform and advance the role of the CIO." The CIO program. Accessed Feb. 5, 2021.
Dharsarathy, Anusha et al. "The CIO challenge: Modern business needs a new kind of tech leader." McKinsey and Company. January 27, 2020. Accessed Feb 2023. Mckinsey.com
DiSC profile. "What is DiSC?" DiSC Profile Website. Accessed Feb. 5, 2023. discprofile.com
FIRO Assessment. "Better working relationships". Myers Brigg Website. Resource document downloaded Feb. 10, 2023. myersbriggs.com/article
Fripp, Patricia. "Frippicisms." Website. Accessed Feb. 25, 2023. fripp.com
Grossman, Rhys. "The Rise of the Chief Digital Officer." Russell Reynolds Insights, January 1, 2012. Accessed Jan. 5, 2023. Rise of the Chief Digital Officer - russellreynolds.com
Kambil, Ajit. "Influencing stakeholders: Persuade, trade, or compel." Deloitte Article. August 9, 2017. Accessed Feb. 19, 2023. www2.deloitte.com/insights
Kambil, Ajit. "Navigating the C-suite: Managing Stakeholder Relationships." Deloitte Article. March 8, 2017. Accessed Feb. 19, 2023. www2.deloitte.com/insights
Korn Ferry. "Age and tenure in the C-suite." Kornferry.com. Accessed Jan. 6, 2023. Korn Ferry Study Reveals Trends by Title and Industry
Kumthekar, Uday. "Communication Channels in Project". Linkedin.com, 3 March 2020. Accessed April 27, 2023. Linkedin.com/Pulse/Communication Channels
McWilliams, Allison. "Why You Need Effective Relationships at Work." Psychology Today Magazine. May 5, 2022. Accessed Feb. 11, 2023. psychologytoday.com/blog
McKinsey & Company. "Why do most transformations fail? A conversation with Harry Robinson." Transformation Practice. July 2019. Accessed Jan. 10, 2023. Mckinsey.com
Mind Tools Content Team. "Building Good Work Relationships." MindTools Article. Accessed Feb. 11, 2023. mindtools.com/building good work relationships
Pratt, Mary. "Why the CIO-CFO relationship is key to digital success." TechTarget Magazine. November 11, 2021. Accessed Feb. 2023. Techtarget.com
LaMountain, Dennis. "Quote of the Week: No Involvement, No Commitment". Linkedin.com, 3 April 2016. Accessed April 27, 2023. Linkedin.com/pulse/quote-week-involvement
PwC Pulse Survey. "Managing Business Risks". PwC Library. 2022. Accessed Jan. 30, 2023. pwc.com/pulse-survey
Rowell, Darin. "3 Traits of a Strong Professional Relationship." Harvard Business Review. August 8, 2019. Accessed Feb. 20, 2023. hbr.org/2019/Traits of a strong professional relationship
Sinek, Simon. "The Optimism Company from Simon Sinek." Website. Image Source. Accessed, Feb. 21, 2023. simonsinek.com
Sinek, Simon. "There are only two ways to influence human behavior: you can manipulate it or you can inspire it." Twitter. Dec 9, 2022. Accessed Feb. 20, 2023. twitter.com/simonsinek
Whitbourne, Susan Krauss. "10 Ways to Measure the Health of Relationship." Psychology Today Magazine. Aug. 7, 2021. Accessed Jan. 30, 2023. psychologytoday.com/blog
You have made significant investments in availability and disaster recovery – but your ability to recover hasn’t been tested in years. Testing will:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this research to understand the different types of tests, prioritize and plan tests for your organization, review the results, and establish a cadence for testing.
Use this template to document scope and goals, participants, key pre-test milestones, the test-day schedule, and your findings from the testing exercise.
Identify the tests you will run over the next year and the expertise, governance, process, and funding required to support testing.
[infographic]

Most businesses make significant investments in disaster recovery and technology resilience. Redundant sites and systems, monitoring, intrusion prevention, backups, training, documentation: it all costs time and money.
But does this investment deliver expected value? Specifically, can you deliver service continuity in a way that meets business requirements?
You can’t know the answer without regularly testing recovery processes and systems. And more than just validation, testing helps you deliver service continuity by finding and addressing gaps in your plans and training your staff on recovery procedures.
Use the insights, tools, and templates in this research to create a streamlined and effective resilience testing program that helps validate recovery capabilities and enhance service reliability, availability, and continuity.
Research Director, Infrastructure & Operations
Info-Tech Research Group
Your ChallengeYou have made significant investments in availability and disaster recovery (DR) – but your ability to recover hasn’t been tested in years. Testing will:
|
Common ObstaclesDespite the value testing can offer, actually executing on DR tests is difficult because:
|
Info-Tech's ApproachTake a realistic approach to resilience testing by starting with small, low-risk tests, then iterating with the lessons you’ve learned:
|
If you treat testing as a pass/fail exercise, you aren’t meeting the end goal of improving organizational resilience. Focus on identifying gaps and risks so you can address them before a real disaster hits.
This research is accompanied by templates to help you achieve your goals faster.
1 - Establish the business rationale for DR testing.
2 - Review a range of options for testing.
3 - Prioritize tests that are most valuable to your business.
4 - Create a disaster recovery test plan.
5 - Establish a Test Program to support a regular testing cycle.
Orange activity slides like the one on the left provide directions to help you make key decisions.
Disaster Recovery Test Plan Template
Build a plan for your first disaster recovery test.
This document provides a complete example you can use to quickly build your own plan, including goals, milestones, participants, the test-day schedule, and findings from the after-action review.
“Routine testing is vital to survive a disaster… that’s when muscle memory sets in. If you don’t test your DR plan it falls [in importance], and you never see how routine changes impact it.”
– Jennifer Goshorn
Chief Administrative Officer
Gunderson Dettmer LLP
Info-Tech members estimated even one day of system downtime could lead to significant revenue losses. 
Average estimated potential loss* in thousands of USD due to a 24-hour outage (N=41)
*Data aggregated from 41 business impact analyses (BIAs) conducted with Info-Tech advisory assistance. BIAs evaluate potential revenue loss due to a full day of system downtime, at the worst possible time.

30 minutes
Identify a group of participants who can fill the following roles and inform the discussions around testing in this research. A single person could fill multiple roles and some roles could be filled by multiple people. Many participants will be drawn from the larger DRP team.
Input
|
Output
|
Participants
|
Use Info-Tech’s Create a Right-Sized Disaster Recovery Plan research to identify recovery objectives based on business impact and outline recovery processes. Both are tremendously valuable inputs to your test plans.
IT Disaster Recovery PlanA plan to restore IT services (e.g. applications and infrastructure) following a disruption. A DRP:
|
BCP for Each Business UnitA set of plans to resume business processes for each business unit. A business continuity plan (BCP) is also sometimes called a continuity of operations plan (COOP). BCPs are created and owned by each business unit, and creating a BCP requires deep involvement from the leadership of each business unit. Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization. |
Crisis Management PlanA plan to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage. Info-Tech’s Implement Crisis Management Best Practices blueprint provides a framework for planning a response to any crisis, from health and safety incidents to reputational damage. |
15-30 minutes
Identify the value recovery testing for your organization. Use language appropriate for a nontechnical audience. Start with the list below and add, modify, or delete bullet points to reflect your own organization.
Drivers for testing – Examples:
Time-strapped technical staff will sometimes push back on planning and testing, objecting that the team will “figure it out” in a disaster. But the question isn’t whether recovery is possible – it’s whether the recovery aligns with business needs. If your plan is to “MacGyver” a solution on the fly, you can’t know if it’s the right solution for your organization.
Input
|
Output
|
Participants
|

In a tabletop planning exercise, the team walks through a disaster scenario to outline the recovery workflow, and risks or gaps that could disrupt that workflow.
Tabletops are particularly effective because:
2 hours
Tabletop testing is part of our core DRP methodology, Create a Right-Sized Disaster Recovery Plan. This exercise can be run using cue cards, sticky notes, or on a whiteboard; many of our facilitators find building the workflow directly in flowchart software to be very effective.
Use our Recovery Workflow Template as a starting point.
Some tips for running your first tabletop exercise:
Do
|
Don't
|
Input
|
Output
|
Participants
|
In live exercises, some portion of your recovery plans are executed in a way that mimics a real recovery scenario. Some advantages of live testing:
| Boot and smoke test | Turn on a standby system and confirm it boots up correctly. |
| Restore and validate data | Restore data or servers from backup. Confirm data integrity. |
| Parallel testing | Send familiar transactions to production and standby systems. Confirm both systems produce the same result. |
| Failover systems | Shut down the production system and use the standby system in production. |
Most unacceptable downtime is caused by localized issues, such as hardware or software failures, rather than widespread destructive events. Regular local testing can help validate the recovery plan for local issues and improve overall service continuity.
Make local testing a standard step in maintenance work and new deployments to embed resilience considerations in day-to-day activities. Run the same tests in both your primary and your DR environment.
Some examples of localized tests:
Local tests will vary between different services, and local test design is usually best left to the system SMEs. At the same time, centralize reporting to understand where tests are being done.
Investigate whether your IT Service Management or ticketing system can create recurring tasks or work orders to schedule, document, and track test exercises. Tasks can be pre-populated with checklists and documentation to support the test and provide a record of completed tests to support oversight and reporting.
User acceptance testing (UAT) after system recovery is a key step in the recovery process. Like any step in the process, there’s value in testing it before it actually needs to be done. Assign responsibility for building UATs to the person who will be responsible for executing them.
An acceptance test script might look something like the checklist below.
“I cannot stress how important it is to assign ownership of responsibilities in a test; this is the only way to truly mitigate against issues in a test.”
– Robert Nardella
IT Service Management
Certified z/OS Mainframe Professional
Build test scripts and test transactions ahead of time to minimize the amount of new work required during a recovery scenario.
What you get:
What you need:
What you get:
What you need:
What you get:
What you need:
What you get:
What you need:
More complex, challenging, risky, or costly tests, such as full failover tests, can deliver value. But do the high-value, low-effort stuff first!
30-60 minutes
Even if you have an idea of what you need to test and how you want to run those tests, this brainstorming exercise can generate useful ideas for testing that might otherwise have been missed.
The next steps will help you prioritize the list – if needed – to tests that are highest value and lowest effort.
“There are different levels of testing and it is very progressive. I do not recommend my clients to do anything, unless they do it in a progressive fashion. Don’t try to do a live failover test with your users, right out of the box.”
– Steve Tower
Principal Consultant
Prompta Consulting Group
Input
|
Output
|
Participants
|
3-5 days
Building a test plan helps the test run smoothly and can uncover issues with the underlying DRP as you dig into the details.
The test coordinator will own the plan document but will rely on the sponsor to confirm scope and goals, technical SMEs to develop system recovery plans, and business liaisons to create UAT scripts.
Download Info-Tech’s Disaster Recovery Test Plan Template. Use the structure of the template to build your own document, deleting example data as you go. Consider saving a separate copy of this document as an example and working from a second copy.
Key sections of the document include:
Download the Disaster Recovery Test Plan Template
Input
|
Output
|
Participants
|
30-60 minutes
Take time after test exercises – especially large-scale tests with many participants – to consider what went well, what didn’t, and where you can improve future testing exercises. Track lessons learned and next steps at the bottom of your test plan.
Input
|
Output
|
Participants
|
All tests are expected to drive actions to improve resilience, as appropriate. Experience from previous tests will be applied to future testing exercises.

Outputs and lessons learned from testing should help you run future tests.

Testing should get easier over time. But if you’re easily passing every test, it’s a sign that you’re ready to run more challenging tests.
2-4 hours
Regular testing allows you to build on prior tests and helps keep plans current despite changes to your environment.
Keeping a regular testing schedule requires expertise, a process to coordinate your efforts, and a level of governance to provide oversight and ensure testing continues to deliver value. Create a call to action using Info-Tech’s Disaster Recovery Testing Program Summary Template.
The result is a summary document that:
“It is extremely important in the early stages of development to concentrate the focus on actual recoverability and data protection, enhancing these capabilities over time into a fully matured program that can truly test the recovery, and not simply focusing on the testing process itself.”
– Joe Starzyk
Senior Business Development Executive
IBM Global Services
Alton, Yoni. “Ransomware simulators – reality or a bluff?” Palo Alto Blog, 2 May 2022. Accessed 31 Jan 2023.
https://www.paloaltonetworks.com/blog/security-operations/ransomware-simulators-reality-or-a-bluff/
Brathwaite, Shimon. “How to Test your Business Continuity and Disaster Recovery Plan,” Security Made Simple, 13 Nov 2022. Accessed 31 Jan 2023.
https://www.securitymadesimple.org/cybersecurity-blog/how-to-test-your-business-continuity-and-disaster-recovery-plan
The Business Continuity Institute. Good Practice Guidelines: 2018 Edition. The Business Continuity Institute, 2017.
Emigh, Jacqueline. “Disaster Recovery Testing: Ensuring Your DR Plan Works,” Enterprise Storage Forum, 28 May 2019. Accessed 31 Jan 2023.
Disaster Recovery Testing: Ensuring Your DR Plan Works | Enterprise Storage Forum
Gardner, Dana. "Case Study: Strategic Approach to Disaster Recovery and Data Lifecycle Management Pays off for Australia's SAI Global." ZDNet. BriefingsDirect, 26 Apr 2012. Accessed 31 Jan 2023.
http://www.zdnet.com/article/case-study-strategic-approach-to-disaster-recovery-and-data-lifecycle-management-pays-off-for-australias-sai-global/.
IBM. “Section 11. Testing the Disaster Recovery Plan.” IBM, 2 Aug 2021. Accessed 31 Jan 2023. Section 11. Testing the disaster recovery plan - IBM Documentation Lutkevich, Ben and Alexander Gillis. “Chaos Engineering”. TechTarget, Jun 2021. Accessed 31 Jan 2023.
https://www.techtarget.com/searchitoperations/definition/chaos-engineering
Monperrus, Martin. “Principles of Antifragility.” Arxiv Forum, 7 June 2017. Accessed 31 Jan 2023.
https://arxiv.org/ftp/arxiv/papers/1404/1404.3056.pdf
“Principles of Chaos Engineering.” Principles of Chaos Engineering, 2019 March. Accessed 31 Jan 2023.
https://principlesofchaos.org/
Sloss, Benjamin Treynor. “Introduction.” Site Reliability Engineering. Ed. Betsy Beyer. O’Reilly Media, 2017. Accessed 31 Jan 2023.
https://sre.google/sre-book/introduction/
Addressing and managing critical negotiation elements helps:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Throughout this phase, ten essential negotiation elements are identified and reviewed.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Improve negotiation skills and outcomes.
Understand how to use the Info-Tech During Negotiations Tool.
A better understanding of the subtleties of the negotiation process and an identification of where the negotiation strategy can go awry.
The During Negotiation Tool will be reviewed and configured for the customer’s environment (as applicable).
1.1 Manage six key items during the negotiation process.
1.2 Set the right tone and environment for the negotiation.
1.3 Focus on improving three categories of intangibles.
1.4 Improve communication skills to improve negotiation skills.
1.5 Customize your negotiation approach to interact with different personality traits and styles.
1.6 Maximize the value of your discussions by focusing on seven components.
1.7 Understand the value of impasses and deadlocks and how to work through them.
1.8 Use concessions as part of your negotiation strategy.
1.9 Identify and defeat common vendor negotiation ploys.
1.10 Review progress and determine next steps.
Sample negotiation ground rules
Sample vendor negotiation ploys
Sample discussion questions and evaluation matrix
When the economy is negatively influenced by factors beyond any organization’s control, the impact can be felt almost immediately on the bottom line. This decline in revenue as a result of a weakening economy will force organizations to reconsider every dollar they spend.
By following our process, we can provide your organization with the direction, tools, and best practices to lay off employees. This will need to be done with careful consideration into your organization’s short- and longer-term strategic goals.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the most effective cost-cutting solutions and set layoff policies and guidelines.
Develop an objective layoff selection method and plan for the transfer of essential responsibilities.
Plan logistics, training, and a post-layoff plan communication.
Collaborate with necessary departments and deliver layoffs notices.
Plan communications for affected employee groups and monitor organizational performance.