Build a Security Compliance Program

  • Buy Link or Shortcode: {j2store}257|cart{/j2store}
  • member rating overall impact: 9.6/10 Overall Impact
  • member rating average dollars saved: $23,879 Average $ Saved
  • member rating average days saved: 15 Average Days Saved
  • Parent Category Name: Governance, Risk & Compliance
  • Parent Category Link: /governance-risk-compliance
  • Most organizations spend between 25 and 40 percent of their security budget on compliance-related activities.
  • Despite this growing investment in compliance, only 28% of organizations believe that government regulations help them improve cybersecurity.
  • The cost of complying with cybersecurity and data protection requirements has risen to the point where 58% of companies see compliance costs as barriers to entering new markets.
  • However, recent reports suggest that while the costs of complying are higher, the costs of non-compliance are almost three times greater.

Our Advice

Critical Insight

  • Test once, attest many. Having a control framework allows you to satisfy multiple compliance requirements by testing a single control.
  • Choose your own conformance adventure. Conformance levels allow your organization to make informed business decisions on how compliance resources will be allocated.
  • Put the horse before the cart. Take charge of your audit costs by preparing test scripts and evidence repositories in advance.

Impact and Result

  • Reduce complexity within the control environment by using a single framework to align multiple compliance regimes.
  • Provide senior management with a structured framework for making business decisions on allocating costs and efforts related to cybersecurity and data protection compliance obligations.
  • Reduces costs and efforts related to managing IT audits through planning and preparation.
  • This blueprint can help you comply with NIST, ISO, CMMC, SOC2, PCI, CIS, and other cybersecurity and data protection requirements.

Build a Security Compliance Program Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should manage your security compliance obligations, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

Infographic

Workshop: Build a Security Compliance Program

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Establish the Program

The Purpose

Establish the security compliance management program.

Key Benefits Achieved

Reviewing and adopting an information security control framework.

Understanding and establishing roles and responsibilities for security compliance management.

Identifying and scoping operational environments for applicable compliance obligations.

Activities

1.1 Review the business context.

1.2 Review the Info-Tech security control framework.

1.3 Establish roles and responsibilities.

1.4 Define operational environments.

Outputs

RACI matrix

Environments list and definitions

2 Identify Obligations

The Purpose

Identify security and data protection compliance obligations.

Key Benefits Achieved

Identifying the security compliance obligations that apply to your organization.

Documenting obligations and obtaining direction from management on conformance levels.

Mapping compliance obligation requirements into your control framework.

Activities

2.1 Identify relevant security and data protection compliance obligations.

2.2 Develop conformance level recommendations.

2.3 Map compliance obligations into control framework.

2.4 Develop process for operationalizing identification activities.

Outputs

List of compliance obligations

Completed Conformance Level Approval forms

(Optional) Mapped compliance obligation

(Optional) Identification process diagram

3 Implement Compliance Strategy

The Purpose

Understand how to build a compliance strategy.

Key Benefits Achieved

Updating security policies and other control design documents to reflect required controls.

Aligning your compliance obligations with your information security strategy.

Activities

3.1 Review state of information security policies.

3.2 Recommend updates to policies to address control requirements.

3.3 Review information security strategy.

3.4 Identify alignment points between compliance obligations and information security strategy.

3.5 Develop compliance exception process and forms.

Outputs

Recommendations and plan for updates to information security policies

Compliance exception forms

4 Track and Report

The Purpose

Track the status of your compliance program.

Key Benefits Achieved

Tracking the status of your compliance obligations.

Managing exceptions to compliance requirements.

Reporting on the compliance management program to senior stakeholders.

Activities

4.1 Define process and forms for self-attestation.

4.2 Develop audit test scripts for selected controls.

4.3 Review process and entity control types.

4.4 Develop self-assessment process.

4.5 Integrate compliance management with risk register.

4.6 Develop metrics and reporting process.

Outputs

Self-attestation forms

Completed test scripts for selected controls

Self-assessment process

Reporting process

Recommended metrics

Define a Release Management Process to Deliver Lasting Value

  • Buy Link or Shortcode: {j2store}158|cart{/j2store}
  • member rating overall impact: 10.0/10 Overall Impact
  • member rating average dollars saved: $12,999 Average $ Saved
  • member rating average days saved: 10 Average Days Saved
  • Parent Category Name: Development
  • Parent Category Link: /development
  • Your software platforms are a key enabler of your brand. When there are issues releasing, this brand suffers. Client confidence and satisfaction erode.
  • Your organization has invested significant capital in creating a culture product ownership, Agile, and DevOps. Yet the benefits from these investments are not yet fully realized.
  • Customers have more choices than ever when it comes to products and services. They require features and capabilities delivered quickly, consistently, and of sufficient quality otherwise they will look elsewhere.

Our Advice

Critical Insight

  • Eliminate the need for dedicating time for off-hour or weekend release activities. Use a release management framework for optimizing release-related tasks, making them predictable and of high quality.

Impact and Result

  • Develop a release management framework that efficiently and effectively orchestrates the different functions supporting a software’s release.
  • Use the release management framework and turn release-related activities into non-events.
  • Use principles of continuous delivery for converting your release processes from an overarching concern to a feature of a high-performing software practice.

Define a Release Management Process to Deliver Lasting Value Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Define a Release Management Process to Deliver Lasting Value Deck – A step-by-step document that walks you through how to develop and implement a release management framework that takes advantage of continuous delivery.

This presentation documents the Info-Tech approach to defining your application release management framework.

  • Define a Release Management Process to Deliver Lasting Value – Phases 1-4

2. Define a Release Management Process to Deliver Lasting Value Template – Use this template to help you define, detail, and make a reality your strategy in support of your application release management framework.

The template gives the user a guide to the development of their application release management framework.

  • Define a Release Management Process to Deliver Lasting Value Template

3. Define a Release Management Process to Deliver Lasting Value Workbook – This workbook documents the results of the exercises contained in the blueprint and offers the user a guide to development of their release management framework.

This workbook is designed to capture the results of your exercises from the Define a Release Management Process to Deliver Lasting Value blueprint.

  • Define a Release Management Process to Deliver Lasting Value Workbook
[infographic]

Workshop: Define a Release Management Process to Deliver Lasting Value

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Define the Current Situation

The Purpose

Document the existing release management process and current pain points and use this to define the future-state framework.

Key Benefits Achieved

Gain an understanding of the current process to confirm potential areas of opportunity.

Understand current pain points so that we can build resolution into the new process.

Activities

1.1 Identify current pain points with your release management process. If appropriate, rank them in order of most to least disruptive.

1.2 Use the statement of quality and current pain points (in addition to other considerations) and outline the guiding principles for your application release management framework.

1.3 Brainstorm a set of metrics that will be used to assess the success of your aspired-to application release management framework.

Outputs

Understanding of pain points, their root causes, and ranking.

Built guiding principles for application release management framework.

Created set of metrics to measure the effectiveness of the application release management framework.

2 Define Standard Release Criteria

The Purpose

Build sample release criteria, release contents, and standards for how it will be integrated in production.

Key Benefits Achieved

Define a map to what success will look like once a new process is defined.

Develop standards that the new process must meet to ensure benefits are realized.

Activities

2.1 Using an example of a product known to the team, list its criteria for release.

2.2 Using an example of a product known to the team, develop a list of features and tasks that are directly and indirectly important for either a real or hypothetical upcoming release.

2.3 Using an example of product known to the team, map out the process for its integration into the release-approved code in production. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

Outputs

Completed Workbook example highlighting releasability.

Completed Workbook example defining and detailing feature and task selection.

Completed Workbook example defining and detailing the integration step.

3 Define Acceptance and Deployment Standards

The Purpose

Define criteria for the critical acceptance and deployment phases of the release.

Key Benefits Achieved

Ensure that releases will meet or exceed expectations and meet user quality standards.

Ensure release standards for no / low risk deployments are recognized and implemented.

Activities

3.1 Using an example of product known to the team, map out the process for its acceptance. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

3.2 Using an example of product known to the team, map out the process for its deployment. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

Outputs

Completed Workbook example defining and detailing the acceptance step.

Completed Workbook example defining and detailing the deployment step.

4 Implement the Strategy

The Purpose

Define your future application release management process and the plan to make the required changes to implement.

Key Benefits Achieved

Build a repeatable process that meets the standards defined in phases 2 and 3.

Ensure the pain points defined in Phase 1 are resolved.

Show how the new process will be implemented.

Activities

4.1 Develop a plan and roadmap to enhance the integration, acceptance, and deployment processes.

Outputs

List of initiatives to reach the target state

Application release management implementation roadmap

Further reading

Define a Release Management Process for Your Applications to Deliver Lasting Value

Use your releases to drive business value and enhance the benefits delivered by your move to Agile.

Analyst Perspective

Improving your release management strategy and practices is a key step to fully unlock the value of your portfolio.

As firms invest in modern delivery practices based around product ownership, Agile, and DevOps, organizations assume that’s all that is necessary to consistently deliver value. As organizations continue to release, they continue to see challenges delivering applications of sufficient and consistent quality.

Delivering value doesn’t only require good vision, requirements, and technology. It requires a consistent and reliable approach to releasing and delivering products and services to your customer. Reaching this goal requires the definition of standards and criteria to govern release readiness, testing, and deployment.

This will ensure that when you deploy a release it meets the high standards expected by your clients and delivers the value you have intended.

Dr. Suneel Ghei

Principal Research Director, Application Development

Info-Tech Research Group

Executive Summary

Your Challenge

  • Your software platforms are a key enabler of your brand. When there are issues releasing, the brand suffers. Client confidence and satisfaction erode.
  • Your organization has invested significant capital in creating a culture of product ownership, Agile, and DevOps. Yet the benefits from these investments are not yet fully realized.
  • Customers have more choices than ever when it comes to products and services. They require features and capabilities delivered quickly, consistently, and of sufficient quality, otherwise they will look elsewhere.

Common Obstacles

  • Development teams are moving faster but then face delays waiting for testing and deployment due to a lack of defined release cycle and process.
  • Individual stages in your software development life cycle (SDLC), such as code collaboration, testing, and deployment, have become leaner, but the overall complexity has increased since many products and services are composed of many applications, platforms, and processes.
  • The specifics of releasing products is (wrongly) classified as a technical concern and not a business concern, hindering the ability to prioritize improved release practices.

Info-Tech's Approach

  • Develop a release management framework that efficiently and effectively orchestrates the different functions supporting a software’s release.
  • Use the release management framework and turn release-related activities into non-events.
  • Use principles of continuous delivery for converting your release processes from an overarching concern to a feature of a high-performing software practice.

Executive Summary

Info-Tech Insights

Turn release-related activities into non-events.

Eliminate the need for dedicating time for off-hour or weekend release activities. Use a release management framework for optimizing release-related tasks, making them predictable and of high quality.

Release management is NOT a part of the software delivery life cycle.

The release cycle runs parallel to the software delivery life cycle but is not tightly coupled with it. The act of releasing begins at the point requirements are confirmed and ends when user satisfaction is measurable. In contrast, the software delivery life cycle is focused on activities such as building, architecting, and testing.

All releases are NOT created equal.

Barring standard guiding principles, each release may have specific nuances that need to be considered as part of release planning.

Your release management journey

  1. Optimize Applications Release Management - Set a baseline release management process and organization.
  2. Modernize Your SDLC - Move your organization to Agile and increase throughput to feed releases.
  3. Deliver on Your Digital Product Vision - Understand the practices that go into delivering products, including articulating your release plans.
  4. Automate Testing to Get More Done - Create the ability to do more testing quickly and ensure test coverage.
  5. Implement DevOps Practices That Work - Build in tools and techniques necessary for release deployment automation.
  6. Define a Release Management Process to Deliver Lasting Value (We Are Here)

Define a Release Management Process for Your Applications to Deliver Lasting Value

Use your releases to drive business value and enhance the benefits delivered by your move to Agile.

Executive Brief

Your software delivery teams are expected to deliver value to stakeholders in a timely manner and with high quality

Software delivery teams must enable the organization to react to market needs and competitive changes to improve the business’ bottom line. Otherwise, the business will question the team’s competencies.

The business is constantly looking for innovative ways to do their jobs better and they need support from your technical teams.

The increased stress from the business is widening the inefficiencies that already exist in application release management, risking poor product quality and delayed releases.

Being detached from the release process, business stakeholders do not fully understand the complexities and challenges of completing a release, which complicates the team’s communication with them when issues occur.

IT Stakeholders Are Also Not Satisfied With Their Own Throughput

  • Only 29% of IT employees find application development throughput highly effective.
  • Only 9% of organizations were classified as having highly effective application development throughput.
  • Application development throughput ranked 37th out of 45 core IT processes in terms of effectiveness.

(Info-Tech’s Management and Governance Diagnostic, N=3,930)

Your teams, however, struggle with core release issues, resulting in delayed delivery (and disappointed stakeholders)

Implementing tools on top of an inefficient pipeline can significantly magnify the existing release issues. This can lead to missed deadlines, poor product quality, and business distrust with software delivery teams.

COMMON RELEASE ISSUES

  1. Local Thinking: Release decisions and changes are made and approved without consideration of the holistic system, process, and organization.
  2. No Release Cadence: Lack of process governance and oversight generates unpredictable bottlenecks and load and ill-prepared downstream teams.
  3. Mismanagement of Releases: Program management does not accommodate the various integrated releases completed by multiple delivery teams.
  4. Poor Scope Management: Teams are struggling to effectively accommodate changes during the project.

The bottom line: The business’ ability to operate is dictated by the software delivery team’s ability to successfully complete releases. If the team performs poorly, then the business will do poorly as well. Application release management is critical to ensure business expectations are within the team’s constraints.

As software becomes more embedded in the business, firms are discovering that the velocity of business change is now limited by how quickly they can deploy.” – Five Ways To Streamline Release Management, J.S. Hammond

Historically, managing releases has been difficult and complicated…

Typically, application release management has been hard to coordinate because…

  • Software has multiple dependencies and coordinating their inclusion into a deployable whole was not planned.
  • Teams many be spending too much time on features that are not needed any longer.
  • Software development functions (such as application architecture, test-first or test-driven design, source code integration, and functional testing) are not optimized.
  • There are no agreed upon service-level contracts (e.g. expected details in requirements, adequate testing, source control strategy) between development functions.
  • The different development functions are not integrated in a holistic style.
  • The different deployment environments have variability in their configuration, reducing the reliability of testing done in different environments.
  • Minimum thresholds for acceptable quality of development functions are either too low (leading to adverse outcomes down stream) or too high (leading to unnecessary delays).

…but research shows being effective at application release management increases your throughput

Research conducted on Info-Tech's members shows overwhelming evidence that application throughput is strongly tied to an effective application release management approach.

The image shows a scatter plot, with Release Management Effectiveness on the x-axis and Application Development Throughput Effectiveness on the Y-axis. The graph shows a steady increase.

(Info-Tech Management & Governance Diagnostic, since 2019; N=684 organizations)

An application release management framework is critical for effective and timely delivery of software

A well-developed application release management framework is transformative and changes...

From To
Short-lived projects Ongoing enhancements supporting a product strategy
Aiming for mandated targets Flexible roadmaps
Manual execution of release processes Automating a release pipeline as much as possible and reasonable
Manual quality assurance Automated assessment of quality
Centralized decision making Small, independent release teams, orchestrated through an optimized value stream

Info-Tech Insight: Your application release management framework should turn a system release into a non-event. This is only possible through the development of a holistic, low-risk and standardized approach to releasing software, irrespective of their size or complexity.

Robust continuous “anything” requires proficiency in five core practices

A continuous anything evaluation should not be a “one-and-done” event. As part of ongoing improvements, keep evolving it to make it a fundamental component of a strong operational strategy.

Continuous Anything

  • Automate where appropriate
    • Automation is not a silver bullet. All processes are not created equal; and therefore, some are not worthy of being automated.
  • Control system variables
    • Deploying and testing in environments that are apple to apple in comparison reduces the risk of unintended outcomes from production release.
  • Measure process outcomes
    • A process not open to being measured is a process bound to fail. If it can be measured, it should be, and insights found should be used for improving the system.
  • Select smaller features batches
    • Smaller release packages reduce the chances of cognitive load associated with finding root causes for defects and issues that may result as post-production incidents.
  • Reduction of cycle time
    • Identification of waste in each stage of the continuous anything process helps in lowering cost of operations and results in quicker generation of value for stakeholders.

Invest time in developing an application release management framework for your development team(s) with a continuous anything mindset

An application release management framework converts a set of features and make them ready for releasability in a low-risk, standardized, and high-quality process.

The image shows a diagram titled Application Release Engineering From Idea to Product, which illustrates the process.

A continuous anything (integration, delivery, and deployment) mindset is based on a growth and improvement philosophy, where every event is considered a valid data point for investigation of process efficiency.

Diagram adapted from Continuous Delivery in the Wild, Pete Hodgson, Published by O'Reilly Media, Inc., 2020

Related Info-Tech Research

Streamline Application Maintenance

  • Justify the necessity of streamlined maintenance. Gain a grounded understanding of stakeholder objectives and concerns and validate their achievability against the current state of the people, process, and technologies involved in application maintenance.
  • Strengthen triaging and prioritization practices. Obtain a holistic picture of the business and technical impacts, risks, and urgencies of each accepted maintenance request to justify its prioritization and relevance within your backlog. Identify opportunities to bundle requests together or integrate them within project commitments to ensure completion.
  • Establish and govern a repeatable process. Develop a maintenance process with well-defined stage gates, quality controls, and roles and responsibilities, and instill development best practices to improve the success of delivery.

“Releasability” (or release criteria) of a system depends upon the inclusion of necessary building blocks and proof that they were worked on

There is no standard definition of a system’s releasability. However, there are common themes around completions or assessments that should be investigated as part of a release:

  • The range of performance, technical, or compliance standards that need to be assessed.
  • The full range of test types required for business approval: unit tests, acceptance tests, security test, data migration tests, etc.
  • The volume-criticality mix of defects the organization is willing to accept as a risk.
  • The best source and version control strategy for the development team. This is mostly a function of the team's skill with using release branches and coordinating their work artifacts.
  • The addition of monitoring points and measures required for evaluations and impact analysis.
  • The documentation required for audit and compliance.
  • External and internal dependencies and integrations.
  • Validations, approvals, and sign-offs required as part of the business’ operating procedure.
  • Processes that are currently carried out outside and should be moved into the pipeline.
  • Manual processes that may be automated.
  • Any waste activities that do not directly contribute to releasability that can be eliminated from the development process.
  • Knowledge the team has regarding challenges and successes with similar software releases in the past.

Releasability of a system is different than governing principles for application release management

Governing principles are fundamental ways of doing something, which in this case is application release management, while releasability will generally have governing principles in addition to specific needs for a successful release.

Example of Governing Principles

  • Approval from Senior Director is necessary before releasing to production
  • Production deployments can only be done in off-hours
  • We will try to automate processes whenever it is possible for us to do so
  • We will use a collaborative set of metrics to measure our processes

Examples of Releasability Criteria

  • For the upcoming release, add performance testing for Finance and Budget Teams’ APIs
  • Audit and compliance documentation is required for this release
  • Automation of manual deployment
  • Use trunk-based source code management instead of feature-based

Regulated industries are not more stable despite being less nimble

A pervasive myth in industry revolves around the misperception that continuous anything and nimble and non-event application release management is not possible in large bureaucratic and regulated organizations because they are risk-averse.

"We found that external approvals were negatively correlated with lead-time, deployment frequency and restore time, and had no correlation with change failure rate. In short, approval by an external body (such as a manager or Change Approval Board) simply doesn’t work to increase the stability of production systems…However, it certainly slows things down. It is in fact worse than having no change approval process at all." – Accelerate by Gene Kim, Jez Humble, and Nicole Forsgren

Many organizations reduce risk in their product release by adopting a paternalistic stance by:

  • Requiring manual sign-offs from senior personnel who are external to the organization.
  • Increasing the number and level of authorization gates.
  • Staying away from change and preferring to stick with what has worked in the past.

Despite the prevalence of these types of responses to risk, the evidence is that they do not work and are in fact counter-productive because they:

  • Create blocks to frequent releases.
  • Introduce procedural complexity to each release and in effect make them “bigger.”
  • Prefer process over people (and trusting them). Increase non-value-add scrutiny and reporting.

There is a persistent misunderstanding about continuous anything being only an IT engineering practice

01

At the enterprise level, continuous anything focuses on:

  • Visibility of final value being provided in a high-quality and expedited manner
  • Ensuring efficiency in the organization’s delivery framework
  • Ensuring adherence to established governance and risk mitigation strategy

02

Focus of this blueprint

At the product level, continuous anything focuses on:

  • Reliability of the product delivery system
  • Use of scientific evidence for continuous improvement of the product’s delivery system
  • Orchestration of different artifacts into a single whole

03

At the functional level, continuous anything focuses on*:

  • Local functional optimization (functions = software engineering, testing, application design)
  • Automation of local functions
  • Use of patterns for standardizing inputs and functional areas

*Where necessary, practices at this level have been mentioned.

Related Info-Tech Research

Implement DevOps Practices That Work

  • Be DevOps, rather than do DevOps. DevOps is a philosophy, not an industry framework. Your organization’s culture must shift toward system-wide thinking, cross-function collaboration, and empathy.
  • Culture, learning, automation, integrated teams, and metrics and governance (CLAIM) are all critical components of effective DevOps.

Automate Testing to Get More Done

  • Optimize and automate SDLC stages to recover team capacity. Recognize that automation without optimization is a recipe for long-term pain. Do it right the first time.
  • Optimization and automation are not one-hit wonders. Technical debt is a part of software systems and never goes away. The only remedy is constant vigilance and enhancements to the processes.

The seeds of a good release are sown even before work on it begins

Pre-release practices such as requirements intake and product backlog management are important because:

  • A standard process for documentation of features and requirements helps reduce “cognitive dissonance” between business and technology teams. Clearly articulated and well-understood business needs are fundamental ingredients of a high-quality product.
  • Product backlog management done right ensures the prioritized delivery of value to stakeholders. Features can become stale or get a bump in importance, depending upon evolving circumstances. Prioritizing the backlog is, therefore, critical for ensuring time, effort, and budget are spent on things that matter.

Change Management's Role in Incident Prevention: standard changes

  • Large vertical image:
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A

During peak business hours, I witnessed a straightforward database field addition bring down a whole e-commerce platform. It was meant to be standard procedure, the type of “standard change” that is automatically approved because we have performed it innumerable times.

Adding a field to the end of a table and having applications retrieve data by field name instead of position made the change itself textbook low-impact. There is no need to alter the application or the functional flow. This could have been problematic in the past if you added a field in the middle of the list and it affected the values of other fields, but adding it at the end? That ought to have been impenetrable.

However, it wasn't.

Before I tell you what went wrong, let me explain why this is important to all of the IT professionals who are reading this.

Over the past three decades, industry data has repeatedly supported what this incident taught me: our presumptions about “safe” changes are frequently our greatest weakness. Upon reviewing the ITIL research, I was not surprised to learn that failed changes, many of which were categorized as “standard” or “low-risk,” are responsible for about 80% of unplanned outages.

When you look more closely, the numbers become even more concerning. Since I've been following the Ponemon Institute's work for years, I wasn't surprised to learn that companies with well-established change management procedures have 65% fewer unscheduled outages. The paradox surprised me: many of these “mature” procedures still operate under the premise that safety correlates with repetition.

What I had been observing in the field for decades was confirmed when Gartner released their research showing that standard changes are responsible for almost 40% of change-related incidents. The very changes we consider safe enough to avoid thorough review subtly create some of our greatest risks. IBM's analysis supports the pattern I've seen in innumerable organizations: standard changes cause three times as much business disruption due to their volume and our decreased vigilance around them, whereas emergency changes receive all the attention and scrutiny.

Aberdeen Group data indicates that the average cost of an unplanned outage has increased to $300,000 per hour, with change-related failures accounting for the largest category of preventable incidents. This data makes the financial reality stark.

What precisely went wrong with the addition of that database field that caused our e-commerce platform to crash?

We were unaware that the addition of this one field would cause the database to surpass an internal threshold, necessitating a thorough examination of its execution strategy. In its algorithmic wisdom, the database engine determined that the table structure had changed enough to necessitate rebuilding its access and retrieval mechanisms. Our applications relied on high-speed requests, and the new execution plan was terribly unoptimized for them.

Instead of completing quotes or purchases, customers were spending minutes viewing error pages. All applications began to time out while they awaited data that just wasn't showing up in the anticipated amounts of time. Thousands of transactions were impacted by a single extra field that should have been invisible to the application layer.

The field addition itself was not the primary cause. We assumed that since we had made similar adjustments dozens of times previously, this one would also act in the same way. Without taking into account the hidden complexities of database optimization thresholds, we had categorized it as a standard change based on superficial similarities.

My approach to standard changes was completely altered by this experience, and it is now even more applicable in DevOps-driven environments. Many organizations use pipeline deployments, which produce a standard change at runtime. It's great for speed and reliability, but it can easily fall into the same trap.

However, I have witnessed pipeline deployments result in significant incidents for non-code-related reasons. Due to timing, resource contention, or environmental differences that weren't noticeable in earlier runs, a deployment that performed flawlessly in development and staging abruptly fails in production. Although the automation boosts our confidence, it may also reveal blind spots.

Over the course of thirty years, I have come to the unsettling realization that there is no such thing as a truly routine change in complex systems. Every modification takes place in a slightly different setting, with varying environmental factors, data states, and system loads. What we refer to as “standard changes” are actually merely modifications with comparable processes rather than risk profiles.

For this reason, I support contextual change management. We must consider the system state, timing, dependencies, and cumulative effect of recent changes rather than just categorizing them based on their technical features. After three other changes have changed the system's behavior patterns, a change made at two in the morning on a Sunday with little system load is actually different from the same change made during peak business hours.

Effective change advisory boards must therefore go beyond assessing individual changes separately. I've worked with organizations where the change board carefully considered and approved each modification on its own merits, only to find that the cumulative effect of seemingly unrelated changes led to unexpected interactions and stress on the system. The most developed change management procedures I've come across mandate that their advisory boards take a step back and look at the whole change portfolio over a specified period of time. They inquire whether we are altering the database too frequently during a single maintenance window. Could there be unanticipated interactions between these three different application updates? What is the total resource impact of this week's approved changes?

It's the distinction between forest management and tree management. While each change may seem logical individually, when combined, they can create situations beyond the scope of any single change assessment.

Having worked in this field for thirty years, I've come to the conclusion that our greatest confidences frequently conceal our greatest vulnerabilities. Our primary blind spots frequently arise from the changes we've made a hundred times before, the procedures we've automated and standardized, and the adjustments we've labeled as “routine.”

Whether we should slow down our deployment pipelines or stop using standard changes is not the question. In the current competitive environment, speed and efficiency are crucial. The issue is whether we are posing the appropriate queries before carrying them out. Are we taking into account not only what the change accomplishes but also when it occurs, what else is changing at the same time, and how our systems actually look right now?

I've discovered that the phrase “we've done this before” is more dangerous in IT operations than “what could go wrong?” Because, despite what we may believe, we never actually perform the same action twice in complex systems.

Here is what I would like you to think about: which everyday modifications are subtly putting your surroundings at risk? Which procedures have you standardized or automated to the extent that you no longer challenge their presumptions? Most importantly, when was the last time your change advisory board examined your changes as a cohesive portfolio of system modifications rather than as discrete items on a checklist?

Remember that simple addition to a database field the next time you're tempted to accept a standard change. The most unexpected outcomes can occasionally result from the most routine adjustments.

I'm always up for a conversation if you want to talk about your difficulties with change management.

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments

  • Buy Link or Shortcode: {j2store}386|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Secure Cloud & Network Architecture
  • Parent Category Link: /secure-cloud-network-architecture
  • Security remains a large impediment to realizing cloud benefits. Numerous concerns still exist around the ability for data privacy, confidentiality, and integrity to be maintained in a cloud environment.
  • Even if adoption is agreed upon, it becomes hard to evaluate vendors that have strong security offerings and even harder to utilize security controls that are internally deployed in the cloud environment.

Our Advice

Critical Insight

  • The cloud can be secure despite unique security threats.
  • Securing a cloud environment is a balancing act of who is responsible for meeting specific security requirements.
  • Most security challenges and concerns can be minimized through our structured process (CAGI) of selecting a trusted cloud security provider (CSP) partner.

Impact and Result

  • The business is adopting a cloud environment and it must be secured, which includes:
    • Ensuring business data cannot be leaked or stolen.
    • Maintaining privacy of data and other information.
    • Securing the network connection points.
  • Determine your balancing act between yourself and your CSP; through contractual and configuration requirements, determine what security requirements your CSP can meet and cover the rest through internal deployment.
  • This blueprint and associated tools are scalable for all types of organizations within various industry sectors.

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should prioritize security in the cloud, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Determine your cloud risk profile

Determine your organization’s rationale for cloud adoption and what that means for your security obligations.

  • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 1: Determine Your Cloud Risk Profile
  • Secure Cloud Usage Policy

2. Identify your cloud security requirements

Use the Cloud Security CAGI Tool to perform four unique assessments that will be used to identify secure cloud vendors.

  • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 2: Identify Your Cloud Security Requirements
  • Cloud Security CAGI Tool

3. Evaluate vendors from a security perspective

Learn how to assess and communicate with cloud vendors with security in mind.

  • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 3: Evaluate Vendors From a Security Perspective
  • IaaS and PaaS Service Level Agreement Template
  • SaaS Service Level Agreement Template
  • Cloud Security Communication Deck

4. Implement your secure cloud program

Turn your security requirements into specific tasks and develop your implementation roadmap.

  • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program
  • Cloud Security Roadmap Tool

5. Build a cloud security governance program

Build the organizational structure of your cloud security governance program.

  • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: Build a Cloud Security Governance Program
  • Cloud Security Governance Program Template
[infographic]

Data Architecture

  • Buy Link or Shortcode: {j2store}17|cart{/j2store}
  • Related Products: {j2store}17|crosssells{/j2store}
  • member rating overall impact: 9.5/10
  • member rating average dollars saved: $30,159
  • member rating average days saved: 5
  • Parent Category Name: Data and Business Intelligence
  • Parent Category Link: /data-and-business-intelligence
Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, agile, and fit-for-purpose data architecture practice

Harness Configuration Management Superpowers

  • Buy Link or Shortcode: {j2store}303|cart{/j2store}
  • member rating overall impact: 8.5/10 Overall Impact
  • member rating average dollars saved: $12,999 Average $ Saved
  • member rating average days saved: 10 Average Days Saved
  • Parent Category Name: Asset Management
  • Parent Category Link: /asset-management
  • Configuration management databases (CMDB) are a lot of work to build and maintain. Starting down this process without the right tools, processes, and buy-in is a lot of work with very little reward.
  • If you decide to just build it and expect they will come, you may find it difficult to articulate the value, and you will be disappointed by the lack of visitors.
  • Relying on manual entry or automated data collection without governance may result in data you can’t trust, and if no one trusts the data, they won’t use it.

Our Advice

Critical Insight

  • The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

Impact and Result

  • Define your use cases: Identify the use cases and prioritize those objectives into phases. Define what information will be needed to meet the use cases and how that information will be populated.
  • Understand and design the CMDB data model: Define services and undiscoverable configuration items (CI) and map them to the discoverable CIs.
  • Operationalize configuration record updates: Define data stewards and governance processes and integrate your configuration management practice with existing practices and lifecycles.

Harness Configuration Management Superpowers Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Harness Configuration Management Superpowers Deck – A step-by-step document that walks you through creating a configuration management program.

Use this blueprint to create a configuration management program that provides immediate value.

  • Harness Configuration Management Superpowers – Phases 1-4

2. Configuration Management Project Charter Template – A project charter template to help you build a concise document for communicating appropriate project details to stakeholders.

Use this template to create a project charter to launch the configuration management project.

  • Configuration Management Project Charter

3. Configuration Control Board Charter Template – A board charter template to help you define the roles and responsibilities of the configuration control board.

Use this template to create your board charter for your configuration control board (CCB). Define roles and responsibilities and mandates for the CCB.

  • Configuration Control Board Charter

4. Configuration Management Standard Operating Procedures (SOP) Template – An SOP template to describe processes and procedures for ongoing maintenance of the CMDB under the configuration management program.

Use this template to create and communicate your SOP to ensure ongoing maintenance of the CMDB under the configuration management program.

  • Configuration Management Standard Operation Procedures

5. Configuration Management Audit and Validation Checklist Template – A template to be used as a starting point to meet audit requirements under NIST and ITIL programs.

Use this template to assess capability to pass audits, adding to the template as needed to meet internal auditors’ requirements.

  • Configuration Management Audit and Validation Checklist

6. Configuration Management Policy Template – A template to be used for building out a policy for governance over the configuration management program.

Use this template to build a policy for your configuration management program.

  • Configuration Management Policy

7. Use Cases and Data Worksheet – A template to be used for validating data requirements as you work through use cases.

Use this template to determine data requirements to meet use cases.

  • Use Cases and Data Worksheet

8. Configuration Management Diagram Template Library – Examples of process workflows and data modeling.

Use this library to view sample workflows and a data model for the configuration management program.

  • Configuration Management Diagram Template Library (Visio)
  • Configuration Management Diagram Template Library (PDF)

9. Configuration Manager Job Description – Roles and responsibilities for the job of Configuration Manager.

Use this template as a starting point to create a job posting, identifying daily activities, responsibilities, and required skills as you create or expand your configuration management program.

  • Configuration Manager

Infographic

Workshop: Harness Configuration Management Superpowers

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Configuration Management Strategy

The Purpose

Define the scope of your service configuration management project.

Design the program to meet specific stakeholders needs

Identify project and operational roles and responsibilities.

Key Benefits Achieved

Designed a sustainable approach to building a CMDB.

Activities

1.1 Introduction

1.2 Define challenges and goals.

1.3 Define and prioritize use cases.

1.4 Identify data needs to meet these goals.

1.5 Define roles and responsibilities.

Outputs

Data and reporting use cases based on stakeholder requirements

Roles and responsibility matrix

2 CMDB Data Structure

The Purpose

Build a data model around the desired use cases.

Identify the data sources for populating the CMDB.

Key Benefits Achieved

Identified which CIs and relationships will be captured in the CMDB.

Activities

2.1 Define and prioritize your services.

2.2 Evaluate CMDB default classifications.

2.3 Test configuration items against existing categories.

2.4 Build a data model diagram.

Outputs

List of CI types and relationships to be added to default settings

CMDB data model diagram

3 Processes

The Purpose

Key Benefits Achieved

Built a right-sized approach to configuration record updates and data validation.

Activities

3.1 Define processes for onboarding, offboarding, and maintaining data in the CMDB.

3.2 Define practices for configuration baselines.

3.3 Build a data validation and auditing plan.

Outputs

Documented processes and workflows

Data validation and auditing plan

4 Communications & Roadmap

The Purpose

Key Benefits Achieved

Metrics program defined

Communications designed

Activities

4.1 Define key metrics for configuration management.

4.2 Define metrics for supporting services.

4.3 Build configuration management policies.

4.4 Create a communications plan.

4.5 Build a roadmap

Outputs

Policy for configuration management

Communications documents

Roadmap for next steps

Further reading

Harness Configuration Management Superpowers

Create a configuration management practice that will provide ongoing value to the organization.

EXECUTIVE BRIEF

Analyst Perspective

A robust configuration management database (CMDB) can provide value to the business and superpowers to IT. It's time to invest smartly to reap the rewards.

IT environments are becoming more and more complex, and balancing demands for stability and demands for faster change requires visibility to make the right decisions. IT needs to know their environment intimately. They need to understand dependencies and integrations and feel confident they are making decisions with the most current and accurate view.

Solutions for managing operations rely on the CMDB to bring visibility to issues, calculate impact, and use predictive analytics to fix performance issues before they become major incidents. AIOps solutions need accurate data, but they can also help identify configuration drift and flag changes or anomalies that need investigation.

The days of relying entirely on manual entry and updates are all but gone, as the functionality of a robust configuration management system requires daily updates to provide value. We used to rely on that one hero to make sure information was up to date, but with the volume of changes we see in most environments today, it's time to improve the process and provide superpowers to the entire IT department.

This is a picture of Sandi Conrad

Sandi Conrad, ITIL Managing Professional
Principal Research Director, IT Infrastructure & Operations, Info-Tech Research Group

Executive Summary

Your Challenge

  • Build a configuration management database (CMDB): You need to implement a CMDB, populate it with records and relationships, and integrate it with discovery and management tools.
  • Identify the benefits of a CMDB: Too many CMDB projects fail because IT tries to collect everything. Base your data model on the desired use cases.
  • Define roles and responsibilities: Keeping data accurate and updated is difficult. Identify who will be responsible for helping

Common Obstacles

  • Significant process maturity is required: Service configuration management (SCM) requires high maturity in change management, IT asset management, and service catalog practices.
  • Large investment: Building a CMDB takes a large amount of effort, process, and expertise.
  • Tough business case: Configuration management doesn't directly provide value to the business, but it requires a lot of investment from IT.

Info-Tech's Approach

  • Define your scope and objectives: Identify the use cases for SCM and prioritize those objectives into phases.
  • Design the CMDB data model: Align with your existing configuration management system's data model.
  • Operationalize configuration record updates: Integrate your SCM practice with existing practices and lifecycles.

Start small

Scope creep is a serial killer of configuration management databases and service configuration management practices.

Insight summary

Many vendors are taking a CMDB-first approach to enable IT operations or sometimes asset management. It's important to ensure processes are in place immediately to ensure the data doesn't go stale as additional modules and features are activated.

Define processes early to ensure success

The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

Identify use cases

The initial use case will be the driving force behind the first assessment of return on investment (ROI). If ROI can be realized early, momentum will increase, and the team can build on the initial successes.

If you don't see value in the first year, momentum diminishes and it's possible the project will never see value.

Keep the initial scope small and focused

Discovery can collect a lot of data quickly, and it's possible to be completely overwhelmed early in the process.

Build expertise and troubleshoot issues with a smaller scope, then build out the process.

Minimize customizations

Most CMDBs have classes and attributes defined as defaults. Use of the defaults will enable easier implementation and faster time to value, especially where automations and integrations depend on standard terms for field mapping.

Automate as much as possible

In large, complex environments, the data can quickly become unmanageable. Use automation as much as possible for discovery, dependency mapping, validation, and alerts. Minimize the amount of manual work but ensure everyone is aware of where and how these manual updates need to happen to see continual value.

Info-Tech's Harness Configuration Management Superpowers.

Configuration management will improve functionality of all surrounding processes

A well-functioning CMDB empowers almost all other IT management and governance practices.

Service configuration management is about:

  • Building a system of record about IT services and the components that support those services.
  • Continuously reconciling and validating information to ensure data accuracy.
  • Ensuring the data lifecycle is defined and well understood and can pass data and process audits.
  • Accessing information in a variety of ways to effectively serve IT and the business.
An image of Info-Tech's CMDB Configuration Management tree, breaking down aspects into the following six categories: Strategic Partner; Service Provider; Proactive; Stabilize; Core; and Foundational.

Configuration management most closely impacts these practices

Info-Tech Research Group sees a clear relationship.

When an IT department reports they are highly effective at configuration management, they are much more likely to report they are highly effective at these management and governance processes:

The following management and governance processes are listed: Quality Management; Asset Management; Performance Measurement; Knowledge Management; Release Management; Incident and Problem Management; Service Management; Change Management.

The data is clear

Service configuration management is about more than just doing change management more effectively.

Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=684 organizations, 2019 to July 2022.

Make the case to use configuration management to improve IT operations

Consider the impact of access to data for informing innovations, optimization efforts, and risk assessments.

75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

75%

75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

42%

of publicly reported outages were due to software or configuration issues. (1)

58%

of networking-related IT outages were due to configuration and change management failure.(1)

It doesn't have to be that way!

Enterprise-grade IT service management (ITSM) tools require a CMDB for the different modules to work together and to enable IT operations management (ITOM), providing greater visibility.

Decisions about changes can be made with accurate data, not guesses.

The CMDB can give the service desk fast access to helpful information about the impacted components, including a history of similar incidents and resolutions and the relationship between the impacted components and other systems and components.

Turn your team into IT superheroes.

CMDB data makes it easier for IT Ops groups to:

  • Avoid change collisions.
  • Eliminate poor changes due to lack of visibility into complex systems.
  • Identify problematic equipment.
  • Troubleshoot incidents.
  • Expand the services provided by tier 1 and through automation.

Benefits of configuration management

For IT

  • Configuration management will supercharge processes that have relied on inherent knowledge of the IT environment to make decisions.
  • IT will more quickly analyze and understand issues and will be positioned to improve and automate issue identification and resolution.
  • Increase confidence and reduce risks for decisions involving release and change management with access to accurate data, regardless of the complexity of the environment.
  • Reduce or eliminate unplanned work related to poor outcomes due to decisions made with incorrect or incomplete data.

For the Business

  • Improve strategic planning for business initiatives involving IT solutions, which may include integrations, development, or security concerns.
  • More quickly deploy new solutions or updates due to visibility into complex environments.
  • Enable business outcomes with reliable and stable IT systems.
  • Reduce disruptions caused by planning without accurate data and improve resolution times for service interruptions.
  • Improve access to reporting for budgeting, showbacks, and chargebacks as well as performance metrics.

Measure the value of this blueprint

Fast-track your planning and increase the success of a configuration management program with this blueprint

Workshop feedback
8.1/10

$174,000 savings

30 average days saved

Guided Implementation feedback

8.7/10

$31,496 average savings

41 average days saved

"The workshop was well run, with good facilitation, and gained participation from even the most difficult parts of the audience. The best part of the experience was that if I were to find myself in the same position in the future, I would repeat the workshop."

– University of Exeter

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

Guided Implementation

“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

Workshop

“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

Consulting

“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

Diagnostics and consistent frameworks used throughout all four options

Guided Implementation

What does a typical GI on this topic look like?

Phase 1 Phase 2 Phase 3 Phase 4

Call #1: Scope requirements, objectives, and your specific challenges.

Call #2: Prioritize services and use cases.

Call #3: Identify data needed to meet goals.

Call #4: Define roles and responsibilities.

Call #5: Define and prioritize your services.

Call #6: Evaluate and test CMDB default classifications.

Call #7: Build a data model diagram.

Call #8: Define processes for onboarding, offboarding, and maintaining data.

Call #9: Discuss configuration baselines.

Call #10: Build a data validation and audit plan.

Call #11: Define key metrics.

Call #12: Build a configuration management policy and communications plan.

Call #13: Build a roadmap.

A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

A typical GI is between 8 to 12 calls over the course of 4 to 9 months.

Workshop Overview

Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889

Day 1 Day 2 Day 3 Day 4

Configuration Management Strategy

CMDB Data Structure

Process Design

Communications & Roadmap

Activities
  • Introduction
  • Define challenges and goals.
  • Define and prioritize use cases.
  • Identify data needed to meet goals.
  • Define roles and responsibilities.
  • Define and prioritize your services.
  • Evaluate CMDB default classifications.
  • Test configuration items against existing categories.
  • Build a data model diagram.
  • Define processes for onboarding, offboarding, and maintaining data in the CMDB.
  • Define practices for configuration baselines.
  • Build a data validation and auditing plan.
  • Define key metrics for configuration management.
  • Define metrics for supporting services.
  • Build configuration management policies.
  • Create a communications plan.
  • Build a roadmap.

Deliverables

  • Roles and responsibility matrix
  • Data and reporting use cases based on stakeholder requirements
  • List of CI types and relationships to be added to default settings
  • CMDB data model diagram
  • Documented processes and workflows
  • Data validation and auditing plan
  • Policy for configuration management
  • Roadmap for next steps
  • Communications documents

Blueprint deliverables

Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

Configuration Management Project Charter

Detail your approach to building an SCM practice and a CMDB.

Screenshot from the Configuration Management Project Charter

Use Cases and Data Worksheet

Capture the action items related to your SCM implementation project.

Screenshot from the Use Cases and Data Worksheet

Configuration Manager Job Description

Use our template for a job posting or internal job description.

Screenshot from the Configuration Manager Job Description

Configuration Management Diagram Template Library

Use these diagrams to simplify building your SOP.

Screenshot from the Configuration Management Diagram Template Library

Configuration Management Policy

Set expectations for configuration control.

screenshot from the Configuration Management Policy

Configuration Management Audit and Validation Checklist

Use this framework to validate controls.

Screenshot from the Configuration Management Audit and Validation Checklist

Configuration Control Board Charter

Define the board's responsibilities and meeting protocols.

Screenshot from the Configuration Management Audit and Validation Checklist

Key deliverable:

Configuration Management Standard Operating Procedures Template

Outlines SCM roles and responsibilities, the CMDB data model, when records are expected to change, and configuration baselines.

Four Screenshots from the Configuration Management Standard Operating Procedures Template

Phase 1

Configuration Management Strategy

Strategy Data Structure Processes Roadmap
  • Challenges and Goals
  • Use Cases and Data
  • Roles and Responsibilities
  • Services
  • Classifications
  • Data Modeling
  • Lifecycle Processes
  • Baselines
  • Audit and Data Validation
  • Metrics
  • Communications Plan
  • Roadmap

This phase will walk you through the following aspects of a configuration management system:

  • Scope
  • Use Cases
  • Reports and Analytics

This phase involves the following participants:

  • IT and business service owners
  • Business/customer relationship managers
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • SCM project manager
  • SCM project sponsor

Harness Service Configuration Management Superpowers

Establish clear definitions

Ensure everyone is using the same terms.

Term Definition
Configuration Management

The purpose of configuration management is to:

  • "Ensure that accurate and reliable information about the configuration of services, and the CIs that support them, is available when and where it is needed. This includes information on how CIs are configured and the relationships between them" (AXELOS).
  • "Provide sufficient information about service assets to enable the service to be effectively managed. Assess the impact of changes and deal with service incidents" (ISACA, 2018).
Configuration Management System (CMS) A set of tools and databases used to manage, update, and present data about all configuration items and their relationships. A CMS may maintain multiple federated CMDBs and can include one or many discovery and dependency mapping tools.
Configuration Management Database (CMDB) A repository of configuration records. It can be as simple as a spreadsheet or as complex as an integrated database populated through multiple autodiscovery tools.
Configuration Record Detailed information about a configuration item.
Configuration Item (CI)

"Any component that needs to be managed in order to deliver an IT service" (AXELOS).

These components can include everything from IT services and software to user devices, IT infrastructure components, and documents (e.g. maintenance agreements).
Attributes Characteristics of a CI included in the configuration record. Common attributes include name, version, license expiry date, location, supplier, SLA, and owner.
Relationships Information about the way CIs are linked. A CI can be part of another CI, connect to another CI, or use another CI. A CMDB is significantly more valuable when relationships are recorded. This information allows CMDB users to identify dependencies between components when investigating incidents, performing root-cause analysis, assessing the impact of changes before deployment, and much more.

What is a configuration management database (CMDB)?

The CMDB is a system of record of your services and includes a record for everything you need to track to effectively manage your IT services.

Anything that is tracked in your CMDB is called a configuration item (CI). Examples of CIs include:

  • User-Facing Services
  • IT-Facing Services
  • Business Capabilities
  • Relationships
  • IT Infrastructure Components
  • Enterprise Software
  • End-User Devices
  • Documents

Other systems of record can refer to CIs, such as:

  • Ticket database: Tickets can refer to which CI is impacted by an incident or provided as part of a service request.
  • Asset management database (AMDB): An IT asset is often also a CI. By associating asset records with CI records, you can leverage your IT asset data in your reporting.
  • Financial systems: If done well, the CMDB can supercharge your IT financial cost model.

CMDBs can allow you to:

  • Query multiple databases simultaneously (so long as you have the CI name field in each database).
  • Build automated workflows and chatbots that interact with data across multiple databases.
  • More effectively identify the potential impact of changes and releases.

Do not confuse asset with configuration

Asset and configuration management look at the same world through different lenses

  • IT asset management (ITAM) tends to focus on each IT asset in its own right: assignment or ownership, lifecycle, and related financial obligations and entitlements.
  • Configuration management is focused on configuration items (CIs) that must be managed to deliver a service and the relationships and integrations with other CIs.
  • ITAM and configuration management teams and practices should work closely together. Though asset and configuration management focus on different outcomes, they may use overlapping tools and data sets. Each practice, when working effectively, can strengthen the other.
  • Many objects will exist in both the CMDB and AMDB, and the data on those shared objects will need to be kept in sync.

A comparison between Asset and Configuration Management Databases

*Discovery, dependency mapping, and data normalization are often features or modules of configuration management, asset management, or IT service management tools.

Start with ITIL 4 guiding principles to make your configuration management project valuable and realistic

Focus on where CMDB data will provide value and ensure the cost of bringing that data in will be reasonable for its purpose. Your end goal should be not just to build a CMDB but to use a CMDB to manage workload and workflows and manage services appropriately.

Focus on value

Include only the relevant information required by stakeholders.

Start where you are

Use available sources of information. Avoid adding new sources and tools unless they are justified.

Progress iteratively with feedback

Regularly review information use and confirm its relevance, adjusting the CMDB scope if needed.

Collaborate and promote visibility

Explain and promote available sources of configuration information and the best ways to use them, then provide hints and tips for more efficient use.

Think and work holistically

Consider other sources of data for decision making. Do not try to put everything in the CMDB.

Keep it simple and practical

Provide relevant information in the most convenient way; avoid complex interfaces and reports.

Optimize and automate

Continually optimize resource-consuming practice activities. Automate CDMB verification, data collection, relationship discovery, and other activities.

ITIL 4 guiding principles as described by AXELOS

Step 1.1

Identify use cases and desired benefits for service configuration management

Activities

1.1.1 Brainstorm data collection challenges

1.1.2 Define goals and how you plan to meet them

1.1.3 Brainstorm and prioritize use cases

1.1.4 Identify the data needed to reach your goals

1.1.5 Record required data sources

This step will walk you through the following aspects of a configuration management system:

  • Scope
  • Use cases

This phase involves the following participants:

  • IT and business service owners
  • Business/customer relationship managers
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • Project sponsor
  • Project manager

Identify potential obstacles in your organization to building and maintaining a CMDB

Often, we see multiple unsuccessful attempts to build out a CMDB, with teams eventually losing faith and going back to spreadsheets. These are common obstacles:

  • Significant manual data collection, which is rarely current and fully accurate.
  • Multiple discovery solutions creating duplicate records, with no clear path to deduplicate records.
  • Manual dependency mapping that isn't accurate because it's not regularly assessed and updated.
  • Hybrid cloud and on-premises environment with discovery solutions only partially collecting as the right discovery and dependency mapping solutions aren't in place.
  • Dynamic environments (virtual, cloud, or containers) that may exist for a very short time, but no one knows how they should be managed.
  • Lack of expertise to maintain and update the CMDB or lack of an assigned owner for the CMDB. If no one owns the process and is assigned as a steward of data, it will not be maintained.
  • Database that was designed with other purposes in mind and is heavily customized, making it difficult to use and maintain.

Understanding the challenges to accessing and maintaining quality data will help define the risks created through lack of quality data.

This knowledge can drive buy-in to create a configuration management practice that benefits the organization.

1.1.1 Brainstorm data collection challenges

Involve stakeholders.
Allot 45 minutes for this discussion.

  1. As a group, brainstorm the challenges you have with data:
  2. Accuracy and trustworthiness: What challenges do you have with getting accurate data on IT services and systems?
    1. Access: Where do you have challenges with getting data to people when they need it?
    2. Manually created data: Where are you relying on data that could be automatically collected?
    3. Data integration: Where do you have issues with integrating data from multiple sources?
    4. Impact: What is the result of these challenges?
  3. Group together these challenges into similar issues and identify what goals would help overcome them.
  4. Record these challenges in the Configuration Management Project Charter, section 1.2: Project Purpose.

Download the Configuration Management Project Charter

Input

Output

  • None
  • List of high-level desired benefits for SCM
Materials Participants
  • Whiteboard/flip charts
  • Sticky notes
  • Markers/pens
  • Configuration Management Project Charter
  • IT and business service owners
  • Business/customer relationship managers
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

Info-Tech Maturity Ladder

Identify your current and target state

INNOVATOR

  • Characteristics of business partner
  • Integration with orchestration tools

BUSINESS PARTNER

Data collection and validation is fully automated

Integrated with several IT processes

Meets the needs of IT and business use cases

TRUSTED OPERATOR

  • Data collection and validation is partially or fully automated
  • Trust in data accuracy is high, meets the needs of several IT use cases

FIREFIGHTER

  • Data collection is partially or fully automated, validation is ad hoc
  • Trust in data accuracy is variable, used for decision making

UNSTABLE

INNOVATOR

  • Characteristics of business partner
  • Integration with orchestration tools

BUSINESS PARTNER

  • Data collection and validation is fully automated
  • Integrated with several IT processes
  • Meets the needs of IT and business use cases

TRUSTED OPERATOR

  • Data collection and validation is partially or fully automated
  • Trust in data accuracy is high, meets the needs of several IT use cases

FIREFIGHTER

  • Data collection is partially or fully automated, validation is ad hoc
  • Trust in data accuracy is variable, used for decision making

UNSTABLE

A tower is depicted, with arrows pointing to Current (orange) and Target(blue)

Define goals for your CMDB to ensure alignment with all stakeholders

  • How are business or IT goals being hindered by not having the right data available?
  • If the business isn't currently asking for service-based reporting and accountability, start with IT goals. This will help to develop goals that will be most closely aligned to the IT teams' needs and may help incentivize the right behavior in data maintenance.
  • Configuration management succeeds by enabling its stakeholders to achieve their outcomes. Set goals for configuration management based on the most important outcomes expected from this project. Ask your stakeholders:
    1. What are the business' or IT's planned transformational initiatives?
    2. What are your highest priority goals?
    3. What should the priorities of the configuration management practice be?
  • The answers to these questions will shape your approach to configuration management. Direct input from your leadership and executives, or their delegates, will help ensure you're setting a solid foundation for your practice.
  • Identify which obstacles will need to be overcome to meet these goals.

"[T]he CMDB System should be viewed as a 'system of relevance,' rather than a 'single source of truth.' The burdens of relevance are at once less onerous and far more meaningful in terms of action, analysis, and automation. While 'truth' implies something everlasting or at least stable, relevance suggests a far more dynamic universe."

– CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al

Identify stakeholders to discuss what they need from a CMDB; business and IT needs will likely differ

Define your audience to determine who the CMDB will serve and invite them to these conversations. The CMDB can aid the business and IT and can be structured to provide dashboards and reports for both.

Nondiscoverable configuration items will need to be created for both audiences to organize CIs in a way that makes sense for all uses.

Integrations with other systems may be required to meet the needs of your audience. Note integrations for future planning.

Business Services

Within the data sets, service configuration models can be used for:

  • Impact analysis
  • Cause and effect analysis
  • Risk analysis
  • Cost allocation
  • Availability analysis and planning

Technical Services

Connect to IT Finance for:

  • Service-based consumption and costing
  • Financial awareness through showback
  • Financial recovery through chargeback
  • Support IT strategy through financial transparency
  • Cost optimization
  • Reporting for depreciation, location-related taxation, and capitalization (may also use asset management for these)

Intersect with IT Processes to:

  • Reduce time to restore services through incident management
  • Improve stability through change management
  • Reduce outages through problem management
  • Optimize assets through IT asset management
  • Provide detailed reporting for audit/governance, risk, and compliance

1.1.2 Define goals and how you plan to meet them

Involve stakeholders.

Allot 45 minutes for this discussion.

As a group, identify current goals for building and using a CMDB.

Why are we doing this?

  • How do you hope to use the data within the CMDB?
  • What processes will be improved through use of this data and what are the expected outcomes?

How will we improve the process?

  • What processes will be put in place to ensure data integrity?
  • What tools will be put in place to improve the methods used to collect and maintain data?

Record these goals in the Configuration Management Project Charter, section 1.3: Project Objectives.

Input

Output

  • None
  • List of high-level desired benefits for SCM
Materials Participants
  • Whiteboard/flip charts
  • Sticky notes
  • Markers/pens
  • Configuration Management Project Charter
  • IT and business service owners
  • Business/customer relationship managers
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

It's easy to think that if you build it, they will come, but CMDBs rarely succeed without solid use cases

Set expectations for your organization that defined and fulfilled use cases will factor into prioritization exercises, functional plans, and project milestones to achieve ROI for your efforts.

A good use case:

  • Justifies resource allocation
  • Gains funding for the right tools
  • Builds stakeholder support
  • Drives interest and excitement
  • Gains support from anyone in a position to help build out and validate the data
  • Helps to define success

In the book CMDB Systems, Making Change Work in the Age of Cloud and Agile, authors Drogseth, Sturm, and Twing describe the secrets of success:

A documented evaluation of CMDB System vendors showed that while most "best case" ROI fell between 6 and 9 months for CMDB deployments, one instance delivered ROI for a significant CMDB investment in as little as 2 weeks!

If there's a simple formula for quick time to value for a CMDB System, it's the following:

Mature levels of process awareness
+ Strong executive level support
+ A ready and willing team with strongly supportive stakeholders
+ Clearly defined and ready phase one use case
+ Carefully selected, appropriate technologies

All this = Powerful early-phase CMDB System results

Define and prioritize use cases for how the CMDB will be used to drive value

The CMDB can support several use cases and may require integration with various modules within the ITSM solution and integration with other systems.

Document the use cases that will drive your CMDB to relevance, including the expected benefits for each use case.

Identify the dependencies that will need to be implemented to be successful.

Define "done" so that once data is entered, verified, and mapped, these use cases can be realized.

"Our consulting experience suggests that more than 75% of all strategic initiatives (CMDB or not) fail to meet at least initial expectations across IT organizations. This is often due more to inflated expectations than categorical failure."

– CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al.

This image demonstrates how CMBD will be used to drive value.

After identifying use cases, determine the scope of configuration items required to feed the use cases

On-premises software and equipment will be critical to many use cases as the IT team and partners work on network and data-center equipment, enterprise software, and integrations through various means, including APIs and middleware. Real-time and near real-time data collection and validation will ensure IT can act with confidence.

Cloud use can include software as a service (SaaS) solutions as well as infrastructure and platform as a service (IaaS and PaaS), and this may be more challenging for data collection. Tools must be capable of connecting to cloud environments and feeding the information back into the CMDB. Where on-premises and cloud applications show dependencies, you might need to validate data if multiple discovery and dependency mapping solutions are used to get a complete picture. Tagging will be crucial to making sense of the data as it comes into the CMDB.

In-house developed software would be beneficial to have in the CMDB but may require more manual work to identify and classify once discovered. A combination of discovery and tagging may be beneficial to input and classification.

Highly dynamic environments may require data collection through integration with a variety of solutions to manage and record continuous deployment models and verifications, or they may rely on tags and activity logs to record historical activity. Work with a partner who specializes in CI/CD to help architect this use case.

Containers will require an assessment of the level of detail required. Determine if the container is a CI and if the content will be described as attributes. If there is value to your use case to map the contents of each container as separate CIs within the container CI, then you can map to that level of detail, but don't map to that depth unless the use case calls for it.

Internet of Things (IoT) devices and applications will need to match a use case as well. IoT device asset data will be useful to track within an asset database but may have limited value to add to a CMDB. If there are connections between IoT applications and data warehouses, the dependencies should likely be mapped to ensure continued dataflow.

Out of scope

A single source of data is highly beneficial, but don't make it a catchall for items that are not easily stored in a CMDB.

Source code should be stored in a definitive media library (DML). Code can be linked to the CMDB but is generally too big to store in a CMDB and will reduce performance for data retrieval.

Knowledge articles and maintenance checklists are better suited to a knowledge base. They can also be linked to the CDMB if needed but this can get messy where many-to-many relationships between articles and CIs exist.

Fleet (transportation) assets and fixed assets should be in fleet management systems and accounting systems, respectively. Storing these types of data in the CMDB doesn't provide value to the support process.

1.1.3 Brainstorm and prioritize use cases

Which IT practices will you supercharge?

Focus on improving both operations and strategy.

  1. Brainstorm the list of relevant use cases. What do you want to do with the data from the CMDB? Consider:
    1. ITSM management and governance practices
    2. IT operations, vendor orchestration, and service integration and management (SIAM) to improve vendor interactions
    3. IT finance and business service reporting needs
  2. Identify which use cases are part of your two- to three-year plan, including the purpose for adding configuration data into that process. Prioritize one or two of these use cases to accomplish in your first year.
  3. Identify dependencies to manage as part of the solution and define a realistic timeline for implementing integrations, modules, or data sources.
  4. Document this table in the Configuration Management Project Charter, section 2.2: Use Cases.
Audience Use Case Goal/Purpose Project/Solution Dependencies Proposed Timeline Priority
  • IT
  • Change Management

Stabilize the process by seeing:

Change conflict reporting

Reports of CI changes without change records

System availability

RFC mapping requires discovered CIs

RFC review requires criticality, technical and business owners

Conflict reporting requires dependency mapping

  • Discovery and manual information entered by October
  • Dependency mapping implemented by December

High

Determine what additional data will be needed to achieve your use cases

Regardless of which use cases you are planning to fulfill with the CMDB, it is critical to not add data and complexity with the plan of resolving every possible inquiry. Ensure the cost and effort of bringing in the data and maintaining it is justified. The complexity of the environment will impact the complexity of data sources and integrations for discovery and dependency mapping.

Before bringing in new data, consider:

  • Is this information available in other maintained databases now?
  • Will this data be critical for decision making? If it is nice to have or optional, can it be automatically moved into the database and maintained using existing integrations?
  • Is there a cost to bringing the data into the CMDB and maintaining it? Is that cost reasonable for its purpose?
  • How frequently will this information be accessed, and can it be updated in an adequate cadence to meet these needs?
  • When does this information need to be available?

Info-Tech Insight

If data will be used only occasionally upon request, determine if it will be more efficient to maintain it or to retrieve it from the CMDB or another data source as needed.

Remember, within the data sets, service configuration models can be used for:

  • Impact analysis
  • Cause and effect analysis
  • Risk analysis
  • Cost allocation
  • Availability analysis and planning

1.1.4 Expand your use cases by identifying the data needed to reach your goals

Involve stakeholders.

Allot 60 minutes for this discussion.

Review use cases and their goals.

Identify what data will be required to meet those goals and determine whether it will be mandatory or optional/nice-to-have information.

Identify sources of data for each type of data. Color code or sort.

Italicize data points that can be automatically discovered.

Gain consensus on what information will be manually entered.

Record the data in the Use Cases and Data Worksheet.

Download the Use Cases and Data Worksheet

Input

Output

  • None
  • List of data requirements
MaterialsParticipants
  • Whiteboard/flip charts
  • Sticky notes
  • Markers/pens
  • Use Cases and Data Worksheet
  • IT and business service owners
  • Business/customer relationship managers
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

Use discovery and dependency mapping tools to automatically update the CMDB

Avoid manual data entry whenever possible.

Consider these features when looking at tools:

  • Application dependency mapping: Establishing and tracking the relationships and dependencies between system components, applications, and IT services. The ideal tool will be able to generate maps automatically.
  • Agentless and agent discovery: Scanning systems with both agent and agentless approaches. Agent-based scanning provides comprehensive information on applications used in individual endpoints, which is helpful in minimizing its IT footprint. However, agents require endpoint access. Agentless-based scanning provides a broader and holistic view of deployed applications without the need to install an agent on end devices, which can be good enough for inventory awareness.
  • Data export capability: Easy exporting of application inventory information to be used in reports and other tools.
  • Dashboards and chart visualization: Detailed list of the application inventory, including version number, number of users, licenses, deployment location, and other application details. These details will inform decision makers of each application's health and its candidacy for further rationalization activities.
  • Customizable scanning scripts: Tailor your application discovery approach by modifying the scripts used to scan your systems.
  • Integration with third-party tools: Easy integration with other systems with out-of-the-box plugins or customizable APIs.

Determine which data collection methods will be used to populate the CMDB

The effort-to-value ratio is an important factor in populating a CMDB. Manual efforts require a higher process focus, more intensive data validation, and a constant need to remind team members to act on every change.

Real-Time Data AIOps continual scans Used for event and incident management
Near Real-Time Data Discovery and dependency mapping run on a regular cycle Used for change and asset management
Historical Data Activity log imports, manual data entry Used for IT finance, audit trail
  • Determine what amount of effort is appropriate for each data grouping and use case. As decisions are made to expand data within the CMDB, the effort-to-value ratio should always factor in. To be usable, data must be accurate, and every piece of data that needs to be manually entered runs the risk of becoming obsolete.
  • Identify which data sources will bring in each type of data. Where there is a possibility of duplicate records being created, one of the data sources will need to be identified as the primary.
  • If the decision is to manually enter configuration items early in the process, be aware that automation may create duplicates of the CIs that will need to be deduplicated at some point in the process to make the information more usable.
  • Typically, items are discovered, validated, then mapped, but there will be variations depending on the source.
  • Active Directory or LDAP may be used to bring users and technicians into the CMDB. Data may be imported from spreadsheets. Identify efforts where data cleanup may have to happen before transferring into the CMDB.
  • Identify how often manual imports will need to be conducted to make sure data is usable.

Identify other nondiscoverable data that will need to be added to or accessed by the CMDB

Foundational data, such as technicians, end users and approvers, roles, location, company, agency, department, building, or cost center, may be added to tables that are within or accessed by the CMDB. Work with your vendor to understand structure and where this information resides.

  • These records can be imported from CSV files manually, but this will require manual removal or edits as information changes.
  • Integration with the HRIS, Active Directory, or LDAP will enable automatic updates through synchronization or scheduled imports.
  • If synchronization is fully enabled, new data can be added and removed from the CMDB automatically.
  • Identify which nondiscoverable attributes will be needed, such as system criticality, support groups, groups it is managed by, location.
  • If partially automating the process, identify where manual updates will need to occur.
  • If fully automating the process, notifications will need to be set up when business owner or product or technical owner fields become empty to prompt defining a replacement within the CMDB.
  • Determine who will manage these updates.
  • Work with your CMDB implementation vendor to determine the best option for bringing this information in.

1.1.5 Record required data sources

Allot 15 minutes for this discussion.

  1. Where do you track the work involved in providing services? Typically, your ticket database tracks service requests and incidents. Additional data sources can include:
    • Enterprise resource planning tools for tracking purchase orders
    • Project management information system for tracking tasks
  2. What trusted data sources exist for the technology that supports these services? Examples include:
    • Management tools (e.g. Microsoft Endpoint Configuration Manager)
    • Architectural diagrams and network topology diagrams
    • IT asset management database
    • Spreadsheets
    • Other systems of record
  3. What other data sources can help you gather the data you identified in activity 1.1.4?
  4. Record the relevant data sources for each use case in the Configuration Management Standard Operating Procedures, section 6: Data Collection and Updates.

Info-Tech Insight

Improve the trustworthiness of your CMDB as a system of record by relying on data that is already trusted.

Input

Output

  • Use cases
  • List of data requirements
MaterialsParticipants
  • Use Cases and Data Worksheet
  • Configuration Management Standard Operating Procedures
  • IT and business service owners
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

Step 1.2

Define roles and responsibilities

Activities

1.2.1 Record the project team and stakeholders

1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

This step will walk you through the following aspects of a configuration management system:

  • Roles and responsibilities

This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • Project manager

Identify the roles you need in your SCM project

Determine which roles will need to be involved in the initial project and how to source these roles.

Leadership Roles
Oversee the SCM implementation

  1. Configuration Manager – The practice owner for SCM. This is a long-term role.
  2. Configuration Control Board (CCB) Chair – An optional role that oversees proposed alterations to configuration plans. If a CCB is implemented, this is a long-term role.
  3. Project Sponsor or Program Sponsor – Provides the necessary resources for building the CMDB and SCM practices.
  4. Architecture Roles
    Plan the program to build strong foundation
    1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
    2. Requirements Analyst – Gathers and manages the requirements for CM.
    3. Process Engineer – Defines, documents, and implements the entire process.

Architecture Roles
Plan the program to build strong foundation

  1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
  2. Requirements Analyst – Gathers and manages the requirements for CM.
  3. Process Engineer – Defines, documents, and implements the entire process.

Engineer Roles
Implement the system

  1. Logical Database Analyst (DBA) Designs the structure to hold the configuration management data and oversees implementation.
  2. Communications and Trainer – Communicates the goals and functions of CM and teaches impacted users the how and why of the process and tools.

Administrative Roles
Permanent roles involving long-term ownership

  1. Technical Owner – The system administrator responsible for their system's uptime. These roles usually own the data quality for their system.
  2. Configuration Management Integrator – Oversees regular transfer of data into the CMDB.
  3. Configuration Management Tool Support – Selects, installs, and maintains the CM tool.
  4. Impact Manager – Analyzes configuration data to ensure relationships between CIs are accurate; conducts impact analysis.

1.2.1 Record the project team and stakeholders

Allocate 25 minutes to this discussion.

  1. Record the project team.
    1. Identify the project manager who will lead this project.
    2. Identify key personnel that will need to be involved in design of the configuration management system and processes.
    3. Identify where vendors/outsourcers may be required to assist with technical aspects.
    4. Document the project team in the Configuration Management Project Charter, section 1.1: Project Team.
  1. Record a list of stakeholders.
    1. Identify stakeholders internal and external to IT.
    2. Build the stakeholder profile. For each stakeholder, identify their role, interest in the project, and influence on project success. You can score these criteria high/medium/low or score them out of ten.
    3. If managed service providers will need to be part of the equation, determine who will be the liaison and how they will provide or access data.
Input

Output

  • Project team members
  • Project plan resources
MaterialsParticipants
  • Configuration Management Project Charter
  • List of project stakeholders and participants
  • IT service owners
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

Even with full automation, this cannot be a "set it and forget it" project if it is to be successful long-term

Create a team to manage the process and data updates and to ensure data is always usable.

  • Services may be added and removed.
  • Technology will change as technical debt is reduced.
  • Vendors may change as contract needs develop.
  • Additional use cases may be introduced by IT and the business as approaches to management evolve.
  • AIOps can reduce the level of effort and improve visibility as configuration items change from the baseline and notifications are automated.
  • Changes can be checked against requests for changes through automated reconciliations, but changes will still need to be investigated where they do not meet expectations.
  • Manual data changes will need to be made regularly and verified.

"We found that everyone wanted information from the CMDB, but no one wanted to pay to maintain it. People pointed to the configuration management team and said, 'It's their responsibility.'

Configuration managers, however, cannot own the data because they have no way of knowing if the data is accurate. They can own the processes related to checking accuracy, but not the data itself."
– Tim Mason, founding director at TRM Associates
(Excerpt from Viewpoint: Focus on CMDB Leadership)

Include these roles in your CMDB practice to ensure continued success and continual improvement

These roles can make up the configuration control board (CCB) to make decisions on major changes to services, data models, processes, or policies. A CCB will be necessary in complex environments.

Configuration Manager

This role is focused on ensuring everyone works together to build the CMDB and keep it up to date. The configuration manager is responsible to:

  • Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement.
  • Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings.
  • Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions.
  • Audit data quality to ensure it is valid, is current, and meets defined standards.
  • Evaluate and recommend tools to support processes, data collection, and integrations.
  • Ensure configuration management processes interface with all other service and business management functions to meet use cases.
  • Report on configuration management performance and take appropriate action on process adherence and quality issues.

Configuration Librarian

This role is most important where manual data entry is prevalent and where many nonstandard configurations are in place. The librarian role is often held by the tool administrator. The librarian focuses specifically on data within the CMDB, including:

  • Manual updates to configuration data.
  • CMDB data verification on a regular schedule.
  • Processing ad hoc requests for data.

Product/Service/Technical Owners

The product or technical owner will validate information is correctly updating and reflects the existing data requirements as new systems are provisioned or as existing systems change.

Interfacing Practice Owners

All practice owners, such as change manager, incident manager, or problem manager, must work with the configuration team to ensure data is usable for each of the use cases they are responsible for.

Download the Configuration Manager job description

Assign configuration management responsibilities and accountabilities

Align authority and accountability.

  • A RACI exercise will help you discuss and document accountability and responsibility for critical configuration management activities.
  • When responsibility and accountability are not well documented, it's often useful to invite a representative of the roles identified to participate in this alignment exercise. The discussion can uncover contrasting views on responsibility and governance, which can help you build a stronger management and governance model.
  • The RACI chart can help you identify who should be involved when making changes to a given activity. Clarify the variety of responsibilities assigned to each key role.
  • In the future, you may need to define roles in more detail as you change your configuration management procedures.

Responsible: The person who actually gets the job done.
Different roles may be responsible for different aspects of the activity relevant to their role.

Accountable: The one role accountable for the activity (in terms of completion, quality, cost, etc.)
Must have sufficient authority to be held accountable; responsible roles are often accountable to this role.

Consulted: Those who need the opportunity to provide meaningful input at certain points in the activity; typically, subject matter experts or stakeholders. The more people you must consult, the more overhead and time you'll add to a process.

Informed: Those who receive information regarding the task but do not need to provide feedback.
Information might relate to process execution, changes, or quality.

Complete a RACI chart to define who will be accountable and responsible for configuration tasks

Determine what roles will be in place in your organization and who will fulfill them, and create your RACI chart to reflect what makes sense for your organization. Additional roles may be involved where there is complexity.

R = responsible, A = accountable, C = consulted, I = informed CCB Configuration Manager Configuration Librarian Technical Owner(s) Interfacing Practice Owners Tool Administrator
Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement. A R
Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings. A R
Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions. A R
Audit data quality to ensure it is valid, is current, and meets defined standards. A,R
Evaluate and recommend tools to support processes, data collection, and integrations. A,R
Ensure configuration management processes interface with all other service and business management functions to meet use cases. A
Report on configuration management performance and take appropriate action on process adherence and quality issues. A
Make manual updates to configuration data. A
Conduct CMDB data verification on a regular schedule. A
Process ad hoc requests for data. A
Enter new systems into the CMDB. A R
Update CMDB as systems change. A R
Identify new use cases for CMDB data. R A
Validate data meets the needs for use cases and quality. R A
Design reports to meet use cases. R
Ensure integrations are configured as designed and are functional. R

1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

Allot 60 minutes for this discussion.

  1. Open the Configuration Management Standard Operating Procedures, section 4.1: Responsibility Matrix. In the RACI chart, review the top row of roles. Smaller organizations may not need a configuration control board, in which case the configuration manager may have more authority.
  2. Modify or expand the process tasks in the left column as needed.
  3. For each role, identify what that person is responsible for, accountable for, consulted on, or informed of. Fill out each column.
  4. Document in the SOP. Schedule a time to share the results with organization leads.
  5. Distribute the chart among all teams in your organization.
  6. Describe additional roles as needed in the documentation.
  7. Add accountabilities and responsibilities for the CCB into the Configuration Control Board Charter.
  8. If appropriate, add auxiliary roles to the Configuration Management Standard Operating Procedures, section 4.2: Configuration Management Auxiliary Role Definitions.

Notes:

  1. Assign one Accountable for each task.
  2. Have one or more Responsible for each task.
  3. Avoid generic responsibilities such as "team meetings."
  4. Keep your RACI definitions in your documents for quick reference.

Refer back to the RACI chart when building out the communications plan to ensure accountable and responsible team members are on board and consulted and informed people are aware of all changes.

Input

Output

  • Task assignments
  • RACI chart with roles and responsibilities
MaterialsParticipants
  • Configuration Management Standard Operating Procedures, RACI chart
  • Configuration Control Board Charter, Responsibilities section
  • IT service owners
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

Phase 2

Configuration Management Data Model

StrategyData StructureProcessesRoadmap
  • Challenges and Goals
  • Use Cases and Data
  • Roles and Responsibilities
  • Services
  • Classifications
  • Data Modeling
  • Lifecycle Processes
  • Baselines
  • Audit and Data Validation
  • Metrics
  • Communications Plan
  • Roadmap

This phase will walk you through the following aspects of a configuration management system:

  • Data Model
  • Customer-Facing and Supporting Services
  • Business Capabilities
  • Relationships
  • IT Infrastructure Components
  • Enterprise Software
  • End-User Devices
  • Documents

This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • CM practice manager
  • CM project manager

Step 2.1

Build a framework for CIs and relationships

Activities

Document services:

2.1.1 Define and prioritize your services

2.1.2 Test configuration items against existing categories

2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

This step will walk you through the following aspects of a configuration management system:

  • Data model
  • Configuration items
  • Relationships

This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • CM practice manager
  • Project manager

Making sense of data daily will be key to maintaining it, starting with services

As CIs are discovered and mapped, they will automatically map to each other based on integrations, APIs, queries, and transactions. However, CIs also need to be mapped to a conceptional model or service to present the service and its many layers in an easily consumable way.

These services will need to be manually created or imported into the CMDB and manually connected to the application services. Services can be mapped to technical or business services or both.

If business services reporting has been requested, talk to the business to develop a list of services that will be required. Use terms the business will be expecting and identify which applications and instances will be mapped to those services.

If IT is using the CMDB to support service usage and reporting, develop the list of IT services and identify which applications and instances will be mapped to those services.

This image show the relationship between Discoverable and Nondiscoverable CIs. The discoverable CIs are coloured in purple, and the nondiscoverables are blue.

Work with your stakeholders to ensure catalog items make sense to them

There isn't a definitive right or wrong way to define catalog items. For example, the business and IT could both reference application servers, but only IT may need to see technical services broken down by specific locations or device types.

Refer back to your goals and use cases to think through how best to meet those objectives and determine how to categorize your services.

Define the services that will be the top-level, nondiscoverable services, which will group together the CIs that make up the complete service. Identify which application(s) will connect into the technical service.

When you are ready to start discovery, this list of services will be connected to the discovered data to organize it in a way that makes sense for how your stakeholders need to see the data.

While working toward meeting the goals of the first few use cases, you will want to keep the structure simple. Once processes are in place and data is regularly validated, complexities of different service types and names can be integrated into the data.

This image show the relationship between Discoverable and Nondiscoverable CIs. Both Discoverable and nondiscoverable CIs are blue.

Application Service(blue); Technical Service(Purple); IT Shared Services(Orange); Billable Services(green); Service Portfolio(red)

Define the service types to manage within the CMDB to logically group CIs

Determine which method of service groupings will best serve your audience for your prioritized use cases. This will help to name your service categories. Service types can be added as the CMDB evolves and as the audience changes.

Application Service

Technical Service

IT Shared Services

Billable Services

Service Portfolio

A set of interconnected applications and hosts configured to offer a service to the organization.

Example: Financial application service, which may include email, web server, application server, databases, and middleware.

A logical grouping of CIs based on common criteria.

Example: Toronto web services, which may include several servers, web applications, and databases.

A logical grouping of IT and business services shared and used across the organization.

Example: VoIP/phone services or networking or security services.

A group of services that will be billed out to departments or customers and would require logical groupings to enable invoicing.

A group of business and technical service offerings with specific performance reporting levels. This may include multiple service levels for different customer audiences for the same service.

2.1.1 Define and prioritize your services

Prioritize your starting point. If multiple audiences need to be accommodated, work with one group at a time.

Timing: will vary depending on number of services, and starting point

  1. Create your list of services, referencing an existing service catalog, business continuity or disaster recovery plan, list of applications, or brainstorming sessions. Use the terminology that makes the most sense for the audience and their reporting requirements.
  2. If this list is already in place, assess for relevance and reduce the list to only those services that will be managed through the CMDB.
  3. Determine what data will be relevant for each service based on the exercises done in 1.1.4 and 1.1.5. For example, if priority was a required attribute for use case data, ensure each service lists the priority of that service.
  4. For each of these, identify the supporting services. These items can come from your technical service catalog or list of systems and software.
  5. Document this table in the Use Cases and Data Worksheet, tab 3: Service Catalog.

Service Record Example

Service: Email
Supporting Services: M365, Authentication Services

Service Attributes

Availability: 24/7 (99.999%)
Priority: Critical
Users: All
Used for: Collaboration
Billable: Departmental
Support: Unified Support Model, Account # 123456789

The CMDB will be organized by services and will enable data analysis through multiple categorization schemes

To extract maximum service management benefit from a CMDB, the highest level of CI type should be a service, as demonstrated below. While it is easier to start at the system or single-asset level, taking the service mapping approach will provide you with a useful and dynamic view of your IT environment as it relates to the services you offer, instead of a static inventory of components.

Level 1: Services

  • Business Service Offering: A business service is an IT service that supports a business process, or a service that is delivered to business customers. Business service offerings typically are bound by service-level agreements.
  • IT Service Offering: An IT service supports the customer's business processes and is made up of people, processes, and technology. IT service offerings typically are bound by service-level agreements.

Level 2: Infrastructure CIs

  • IT Component Set: An IT service offering consists of one of more sets of IT components. An IT component set allows you to group or bundle IT components with other components or groupings.
  • IT Component: An IT system is composed of one or more supporting components. Many components are shared between multiple IT systems.

Level 3: Supporting CIs

  • IT Subcomponent: Any IT asset that is uniquely identifiable and a component of an IT system.
  • IT components can have subcomponents, and those components can have subcomponents, etc.

Two charts, showing Enterprise Architect Model and Configuration Service Model. Each box represents a different CI.

Assess your CMDB's standard category offerings against your environment, with a plan to minimize customization

Standard categorization schemes will allow for easier integration with multiple tools and reporting and improve results if using machine learning to automate categorization. If the CMDB chosen includes structured categories, use that as your starting point and focus only on gaps that are not addressed for CIs unique to your environment.

There is an important distinction between a class and a type. This concept is foundational for your configuration data model, so it is important that you understand it.

  • Types are general groupings, and the things within a type will have similarities. For attributes that you want to collect on a type, all children classes and CIs will have those attribute fields.
  • Classes are a more specific grouping within a type. All objects within a class will have specific similarities. You can also use subclasses to further differentiate between CIs.
  • Individual CIs are individual instances of a class or subclass. All objects in a class will have the same attribute fields and behave the same, although the values of their attributes will likely differ.
  • Attributes may be discovered or nondiscoverable and manually added to CIs. The attributes are properties of the CI such as serial number, version, memory, processor speed, or asset tag.

Use inheritance structures to simplify your configuration data model.

An example CM Data Model is depicted.

Assess the list of classes of configuration items against your requirements

Types are general groupings, and the things within a type will have similarities. Each type will have its own table within the CMDB. Classes within a type are a more specific grouping of configuration items and may include subclasses.

Review your vendor's CMDB documentation. Find the list of CI types or classes. Most CMDBs will have a default set of classes, like this standard list. If you need to build your own, use the table below as a starting point. Define anything required for unique classes. Create a list and consult with your installation partner.

Sample list of classes organized by type

Types Services Network Hardware Storage Compute App Environment Documents
Classes
  • Application Service
  • Technical Service
  • IT Shared Service
  • Billable Service
  • Service Portfolio
  • Switch
  • Router
  • Firewall
  • Modem
  • SD-WAN
  • Load Balancer
  • UPS
  • Computer
  • Laptop
  • Server
  • Tablet
  • Database
  • Network-Attached Storage
  • Storage Array Network
  • Blob
  • Operating System
  • Hypervisor
  • Virtual Server
  • Virtual Desktop
  • Appliance
  • Virtual Application
  • Enterprise Application
  • Line of Business Application Software
  • Development
  • Test
  • Production
  • Contract
  • Business Impact Analysis
  • Requirements

Review relationships to determine which ones will be most appropriate to map your dependencies

Your CMDB should include multiple relationship types. Determine which ones will be most effective for your environment and ensure everyone is trained on how to use them. As CIs are mapped, verify they are correct and only manually map what is incorrect or not mapping through automation.

Manually mapping CMDB relationships may be time consuming and prone to error, but where manual mapping needs to take place, ensure the team has a common view of the dependency types available and what is important to map.

Use automated mapping whenever possible to improve accuracy, provide functional visualizations, and enable dynamic updates as the environment changes.

Where a dependency maps to external providers, determine where it makes sense to discover and map externally provided CIs.

  • Only connect where there is value in mapping to vendor-owned systems.
  • Only connect where data and connections can be trusted and verified.

Most common dependency mapping types

A list of the most common dependency mapping types.

2.1.2 Test configuration items against existing categories

Time to complete: 1-2 hours

  1. Select a service to test.
  2. Identify the various components that make up the service, focusing on configuration items, not attributes
  3. Categorize configuration items against types and classes in the default settings of the CMDB.
  4. Using the default relationships within the CMDB, identify the relationships between the configuration items.
  5. Identify types, classes, and relationships that do not fit within the default settings. Determine if there are common terms for these items or determine most appropriate name.
  6. Validate these exceptions with the publisher.
  7. Document exceptions in the Configuration Management Standard Operating Procedures, Appendix 2: Types and Classes of Configuration Items
Input

Output

  • List of default settings for classes, types, and relationships
  • Small list of services for testing
  • List of CIs to map to at least one service
  • List of categories to add to the CMDB solution.
MaterialsParticipants
  • Use Cases and Data Worksheet
  • Configuration Management Standard Operating Procedures
  • IT service owners
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

A charter will set the tone for meetings, ensure purpose is defined and meeting cadence is set for regular reviews.

  1. Open the Configuration Control Board Charter. Review the document and modify as appropriate for your CCB. This will include:
    • Purpose and mandate of the committee – Reference objectives from the project charter.
    • Team composition – Determine the right mix of team members. A team of six to ten people can provide a good balance between having a variety of opinions and getting work done.
    • Voting option – Determine the right quorum to approve changes.
    • Responsibilities – List responsibilities, starting with RACI chart items.
    • Authority – Define the control board's span of control.
    • Governing laws and regulations – List any regulatory requirements that will need to be met to satisfy your auditors.
    • Meeting preparation – Set expectations to ensure meetings are productive.
  2. Distribute the charter to CCB members.
Input

Output

  • Project team members
  • Project plan resources
MaterialsParticipants
  • Configuration Control Board Charter
  • IT service owners
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

Assess the default list of statuses for each state

Align this list with your CMDB

Minimize the number of customizations that will make it difficult to update the platform.

  1. Review the default status list within the tool.
  2. Identify which statuses will be most used. Write a definition for each status.
  3. Update this list as you update process documentation in Step 3.1. After initial implementation, this list should only be modified through change enablement.
  4. Record this list of statuses in the Configuration Management Standard Operating Procedures, Appendix 4: Statuses
State Status Description
Preparation Ordered Waiting delivery from the vendor
In Planning Being created
Received Vendor has delivered the item, but it is not ready for deployment
Production In Stock Available to be deployed
In Use Deployed
On Loan Deployed to a user on a temporary basis
For Removal Planning to be phased out but still deployed to an end user
Offline In Transit Moving to a new location
Under Maintenance Temporarily offline while a patch or change is applied
Removed Decommissioned Item has been retired and is no longer in production
Disposed Item has been destroyed and we are no longer in possession of it
Lost Item has been lost
Stolen Item has been stolen

Step 2.2

Document statuses, attributes, and data sources

Activities

2.2.1 Follow the packet and map out the in-scope services and data centers

2.2.2 Build data model diagrams

2.2.3 Determine access rights for your data

This step will walk you through the following aspects of a configuration management system:

  • Statuses
  • Attributes for each class of CI

This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • Project manager

Outcomes of this step

  • Framework for approaching CI statuses
  • Attributes for each class of CI
  • Data sources for those attributes

Service mapping approaches

As you start thinking about dependency mapping, it's important to understand the different methods and how they work, as well as your CMDB's capabilities. These approaches may be all in the same tool, or the tool may only have the top-down options.

Top down, most common

Pattern-based

Most common option, which includes indicators of connections such as code, access rights, scripting, host discovery, and APIs.

Start with pattern-based, then turn on traffic-based for more detail. This combination will provide the most accuracy.

Traffic-based

Map against traffic patterns involving connection rules to get more granular than pattern-based.

Traffic-based can add a lot of overhead with extraneous data, so you may not want to run it continuously.

Tag-based

Primarily used for cloud, containers, and virtual machines and will attach the cloud licenses to their dependent services and any related CIs.

Tags work well with cloud but will not have the same hierarchical view as on-premises dependency mapping.

Machine learning

Machine learning will look for patterns in the traffic-based connections, match CIs to categories and help organize the data.

Machine learning (ML) may not be in every solution, but if you have it, use it. ML will provide many suggestions to make the life of the data manager easier.

Model hierarchy

Automated data mapping will be helpful, but it won't be foolproof. It's critical to understand the data model to validate and map nondiscoverable CIs correctly.

The framework consists of the business, enterprise, application, and implementation layers.

The business layer encodes real-world business concepts via the conceptual model.

The enterprise layer defines all enterprise data assets' details and their relationships.

The application layer defines the data structures as used by a specific application.

The implementation layer defines the data models and artifacts for use by software tools.

An example of Model Hierarchy is depicted.

Learn how to create data models with Info-Tech's blueprint Create and Manage Enterprise Data Models

2.2.1 Follow the packet and map out the in-scope services and data centers

Reference your network topology and architecture diagrams.

Allot 1 hour for this activity.

  1. Start with a single service that is well understood and documented.
  2. Identify the technical components (hardware and applications) that make up the service.
  3. Determine if there is a need to further break down services into logical service groupings. For example, the email service to the right is broken down into authentication and mail flow.
  4. If you don't have a network diagram to follow, create a simple one to identify workflows within the service and components the service uses.
  5. Record the apps and underlying components in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

This information will be used for CM project planning and validating the contents of the CMDB.

an example of a Customer-facing service is shown, for Email sample topology.

Download the Configuration Management Diagram Template Library to see an example.

Build your configuration data model

Rely on out-of-the-box functionality where possible and keep a narrow focus in the early implementation stages.

  1. If you have an enterprise architecture, then your configuration management data model should align with it.
  2. Keep a narrow focus in the early implementation stages. Don't fill up your CMDB until you are ready to validate and fix the data.
  3. Rely on out-of-the-box (OOTB) functionality where possible. If your configuration management database (CMDB) and platform do not have a data model OOTB, then rely on a publicly available data model.
  4. Map your business or IT service offering to the first few layers.

Once this is built out in the system, you can let the automated dependency mapping take over, but you will still need to validate the accuracy of the automated mapping and investigate anything that is incorrect.

Sample Configuration Data Model

Every box represents a CI, and every line represents a relationship

A sample configuration Data model is shown.

Example: Data model and CMDB visualization

Once the data model is entered into the CMDB, it will provide a more dynamic and complex view, including CIs shared with other services.

An example of a Data Model Exercise

CMDB View

An example of a CMDB View of the Data Model Exercise

2.2.2 Build data model diagrams

Visualize the expected CI classes and relationships.

Allot 45 minutes.

  1. Identify the different data model views you need. Use multiple diagrams to keep the information simple to read and understand. Common diagrams include:
    1. Network level: Outline expected CI classes and relationships at the network level.
    2. Application level: Outline the expected components and relationships that make up an application.
    3. Services level: Outline how business capability CIs and service CIs relate to each other and to other types of CIs.
  1. Use boxes to represent CI classes.
  2. Use lines to represent relationships. Include details such as:
    1. Relationship name: Write this name on the arrow.
    2. Direction: Have an arrow point to each child.

Review samples in Configuration Management Diagram Template Library.
Record these diagrams in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

Input

Output

  • List of default settings for classes, types, and relationships
  • Small list of services for testing
  • List of CIs to map to at least one service
  • List of additions of categories to add to the CMDB solution.
MaterialsParticipants
  • Configuration Management Standard Operating Procedures
  • Configuration Management Diagram Template Library
  • IT service owners
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

Download the Configuration Management Diagram Template Library to see examples.

Determine governance for data security, access, and validation

Align CMDB access to the organization's access control policy to maintain authorized and secure access for legitimate staff performing their role.

Data User Type Access Role
Data consumers
  • View-only access
  • Will need to view and use the data but will not need to make modifications to it
  • Service desk
  • Change manager
  • Major incident manager
  • Finance
CMDB owner
  • Read/write access with the ability to update and validate data as needed
  • Configuration manager
Domain owner
  • Read/write access for specific domains
  • Data owner within their domain, which includes validating that data is in the database and that it is correctly categorized.
  • Enterprise architect
  • Application owner
Data provider
  • Read/write access for specific domains
  • Ensures automated data has been added and adds nondiscoverable assets and attributes as needed
  • Server operations
  • Database management
  • Network teams
CMDB administrator
  • View-only access for data
  • Will need to have access for modifying the structure of the product, including adding fields, as determined by the CCB
  • ITSM tool administrator

2.2.3 Determine access rights for your data

Allot 30 minutes for this discussion.

  1. Open the Configuration Management Standard Operating Procedures, section 5: Access Rights.
  2. Review the various roles from an access perspective.
    1. Who needs read-only access?
    2. Who needs read/write access?
    3. Should there be restrictions on who can delete data?
  1. Fill in the chart and communicate this to your CMDB installation vendor or your CMDB administrator.
Input

Output

  • Task assignments
  • Access rights and roles
MaterialsParticipants
  • Configuration Management Standard Operating Procedures
  • IT service owners
  • Practice owners and managers
  • SCM practice manager
  • SCM project sponsor

Phase 3

Configuration Record Updates

StrategyData StructureProcessesRoadmap
  • Challenges and Goals
  • Use Cases and Data
  • Roles and Responsibilities
  • Services
  • Classifications
  • Data Modeling
  • Lifecycle Processes
  • Baselines
  • Audit and Data Validation
  • Metrics
  • Communications Plan
  • Roadmap

This phase will walk you through the following aspects of a configuration management system:

  • ITSM Practices and Workflows
  • Discovery and Dependency Mapping Tools
  • Auditing and Data Validation Practices

This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • SCM project manager
  • IT audit

Harness Service Configuration Management Superpowers

Step 3.1

Keep CIs and relationships up to date through lifecycle process integrations

Activities

3.1.1 Define processes to bring new services into the CMDB

3.1.2 Determine when each type of CI will be created in the CMDB

3.1.3 Identify when each type of CI will be retired in the CMDB

3.1.4 Record when and how attributes will change

3.1.5 Institute configuration control and configuration baselines

This step will walk you through the following aspects of a configuration management system:

  1. ITSM Practices and Workflows
  2. Discovery and Dependency Mapping Tools

This phase involves the following participants:

  1. IT service owners
  2. Enterprise architects
  3. Practice owners and managers
  4. SCM practice manager
  5. Project manager

Outcomes of this step

  • List of action items for updating interfacing practices and processes
  • Identification of where configuration records will be manually updated

Incorporate CMDB updates into IT operations

Determine which processes will prompt changes to the CMDB data

Onboard new services - Offboard Redundant Services. Onboard new CIs - Offboard Redundant CIs; Maintain CIs - Update Attributes.

Change enablement

Identify which process are involved in each stage of data input, maintenance, and removal to build out a process for each scenario.

Project management

Change enablement

Asset management

Security controls

Project management

Incident management

Deployment management

Change enablement

Asset management

Security controls

Project management

Incident management

Service management

Formalize the process for adding new services to the CMDB

As new services and products are introduced into the environment, you can improve your ability to correctly cost the service, design integrations, and ensure all operational capabilities are in place, such as data backup and business continuity plans.
In addition, attributes such as service-level agreements (SLAs), availability requirements, and product, technical, and business owners should be documented as soon as those new systems are made live.

  • Introduce the technical team and CCB to the product early to ensure the service record is created before deployment and to quickly map the services once they are moved into the production environment.
  • Engage with project managers or business analysts to define the process to include security and technical reviews early.
  • Engage with the security and technical reviewers to start documenting the service as soon as it is approved.
  • Determine which practices will be involved in the creation and approval of new services and formalize the process to streamline entry of the new service, onboarding corresponding CIs and mapping dependencies.

an example of the review and approval process for new service or products is shown.

3.1.1 Define processes to bring new services into the CMDB

Start with the most frequent intake methods, and if needed, use this opportunity to streamline the process.

  1. Discuss the methods for new services to be introduced to the IT environment.
  2. Critique existing methods to assess consistency and identify issues that could prevent the creation of services in the CMDB in a timely manner.
  3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
  4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
  5. Discuss the validation process and determine where control points are. Document these on the workflows.
  6. Complete the Configuration Management Standard Operating Procedures, section 8.1: Introduce New Service and Data Model.

Possible intake opportunities:

  • Business-driven project intake process
  • IT-driven project intake process
  • Change enablement reviews
  • Vendor-driven product changes
Input

Output

  • Discussion
  • Intake processes
MaterialsParticipants
  • Configuration Management Standard Operating Procedures
  • Configuration Management Diagram Template Library
  • Configuration control board
  • Configuration manager
  • Project sponsor
  • IT stakeholders

Identify scenarios where CIs are added and removed in the configuration management database

New CIs may be introduced with new services or may be introduced and removed as part of asset refreshes or through service restoration in incident management. Updates may be done by your own services team or a managed services provider.
Determine the various ways the CIs may be changed and test with various CI types.
Review attributes such as SLAs, availability requirements, and product, technical, and business owners to determine if changes are required.

  • Identify what will be updated automatically or manually. Automation could include discovery and dependency mapping or synchronization with AMDB or AIOps tools.
  • Engage with relevant program managers to define and validate processes.
  • Identify control points and review audit requirements.

An example of New or refresh CI from Procurement.

Info-Tech Insight

Data deemed no longer current may be archived or deleted. Retained data may be used for tracing lifecycle changes when troubleshooting or meeting audit obligations. Determine what types of CIs and use cases require archived data to meet data retention policies. If none do, deletion of old data may be appropriate.

3.1.2 Identify when each type of CI will be created in the CMDB

Allot 45 minutes for discussion.

  1. Discuss the various methods for new CIs to be introduced to the IT environment.
  2. Critique existing methods to assess consistency and identify issues that could prevent the creation of CIs in the CMDB in a timely manner.
  3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
  4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
  5. Discuss the validation process and determine where control points are. Document these on the workflows.
  6. Complete Configuration Management Standard Operating Procedures, section 8.2: Introduce New Configuration Items to the CMDB

Possible intake opportunities:

  • Business-driven project intake process
  • IT-driven project intake process
  • Change enablement reviews
  • Vendor-driven product changes
  • Incident management
  • Asset management, lifecycle refresh
Input

Output

  • Discussion
  • Retirement processes
MaterialsParticipants
  • Configuration Management Standard Operating Procedures
  • Configuration Management Diagram Template Library
  • Configuration control board
  • Configuration manager
  • Project sponsor
  • IT stakeholders

3.1.3 Identify when each type of CI will be retired in the CMDB

Allot 45 minutes for discussion.

  1. Discuss the various methods for CIs to be removed from the IT environment.
  2. Critique existing methods to assess consistency and identify issues that could prevent the retirement of CIs in the CMDB in a timely manner.
  3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
  4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
  5. Discuss the validation process and determine where control points are. Document these on the workflows.
  6. Discuss data retention. How long will retired information need to be archived? What are the potential scenarios where legacy information may be needed for analysis?
  7. Complete the Configuration Management Standard Operating Procedures, section 8.4: Retire and Archive Configuration Records.

Possible retirement scenarios:

  • Change enablement reviews
  • Vendor-driven product changes
  • Incident management
  • Asset management, lifecycle refresh
Input

Output

  • Discussion
  • Intake processes
MaterialsParticipants
  • Configuration Management Standard Operating Procedures
  • Configuration Management Diagram Template Library
  • Configuration control board
  • Configuration manager
  • Project sponsor
  • IT stakeholders

Determine appropriate actions for detecting new or changed CIs through discovery

Automated detection will provide the most efficient way of recording planned changes to CIs as well as detected unplanned changes. Check with the tool to determine what reports or notifications are available for the configuration management process and define what actions will be appropriate.

As new CIs are detected, identify the process by which they should have been introduced into configuration management and compare against those records. If your CMDB can automatically check for documentation, this may be easier. Weekly reporting will allow you to catch changes quickly, and alerts on critical CIs could enable faster remediation, if the tool allows for alerting. AIOps could identify, notify of, and process many changes in a highly dynamic environment.

Type of Change

Impacted Process

Validation

Findings

Actions

Configuration change to networking equipment or software

Change management

Check for request for change

No RFC

Add to CAB agenda, notify technical owner

Configuration change to end-user device or software

Asset management

Check for service ticket

No ticket

Escalate to asset agenda, notify service manager

New assets coming into service

Security incident and event management

Check for SIEM integration

No SIEM integration

Notify security operations team to investigate

The configuration manager may not have authority to act but can inform the process owners of unauthorized changes for further action. Once the notifications are forwarded to the appropriate process owner, the configuration manager will note the escalation and follow up on data corrections as deemed appropriate by the associated process owner.

3.1.4 Record when and how attributes will change

These lists will help with configuration control plans and your implementation roadmap.

  1. List each attribute that will change in that CI type's life.
  2. Write all the times that each attribute will change. Identify:
    1. The name of the workflow, service request, process, or practice that modifies the attribute.
    2. Whether the update is made automatically or manually.
    3. The role or tool that updates the CMDB.
  1. Update the relevant process or procedure documentation. Explicitly identify when the configuration records are updated.

Document these tables in Configuration Management Standard Operation Procedures, Section 8.7: Practices That Modify CIs.

Network Equipment
Attributes

Practices That Modify This Attribute

Status
  • Infra Deployment (updated manually by Network Engineering)
  • Change Enablement (updated manually by CAB or Network Engineering)
Assigned User
  • IT Employee Offboarding or Role Change (updated manually by Network Engineering)
Version
  • Patch Deployment (updated automatically by SolarWinds)
End-User Computers
Attributes
Practices That Modify This Attribute
Status
  • Device Deployment (updated manually by Desktop Support)
  • Device Recovery (updated manually by Desktop Support)
  • Employee Offboarding and Role Change (updated manually by Service Desk)
Assigned User
  • Device Deployment (updated manually by Desktop Support)
  • Device Recovery (updated manually by Desktop Support)
  • Employee Offboarding and Role Change (updated manually by Service Desk)
Version
  • Patch Deployment (updated automatically by ConfigMgr)

Institute configuration control and configuration baselines where appropriate

A baseline enables an assessment of one or more systems against the desired state and is useful for troubleshooting incidents or problems and validating changes and security settings.

Baselines may be used by enterprise architects and system engineers for planning purposes, by developers to test their solution against production copies, by technicians to assess configuration drift that may be causing performance issues, and by change managers to assess and verify the configuration meets the target design.

Configuration baselines are a snapshot of configuration records, displaying attributes and first-level relationships of the CIs. Standard configurations may be integral to the success of automated workflows, deployments, upgrades, and integrations, as well as prevention of security events. Comparing current CIs against their baselines will identify configuration drift, which could cause a variety of incidents. Configuration baselines are updated through change management processes.
Configuration baselines can be used for a variety of use cases:

  • Version control – Management of software and hardware versions, https://dj5l3kginpy6f.cloudfront.net/blueprints/harness-configuration-management-superpowers-phases-1-4/builds, and releases.
  • Access control – Management of access to facilities, storage areas, and the CMS.
  • Deployment control – Take a baseline of CIs before performing a release so you can use this to check against actual deployment.
  • Identify accidental changes Everyone makes mistakes. If someone installs software on the wrong server or accidentally drops a table in a database, the CMS can alert IT of the unauthorized change (if the CI is included in configuration control).

Info-Tech Insight

Determine the appropriate method for evaluating and approving changes to baselines. Delegating this to the CCB every time may reduce agility, depending on volume. Discuss in CCB meetings.

A decision tree for deploying requested changes.

3.1.5 Institute configuration control and configuration baselines where appropriate

Only baseline CIs and relationships that you want to control through change enablement.

  1. Determine criteria for capturing configuration baselines, including CI type, event, or processes.
  2. Identify who will use baselines and how they will use the data. Identify their needs.
  3. Identify CIs that will be out of scope and not have baselines created.
  4. Document requirements in the SOP.
  5. Ensure appropriate team members have training on how to create and capture baselines in the CMDB.
  6. Document in the Configuration Management Standard Operating Procedures, section 8.5: Establish and Maintain Configuration Baselines.
Process Criteria Systems
Change Enablement & Deployment All high-risk changes must have the baseline captured with version number to revert to stable version in the event of an unsuccessful change
  • Servers (physical and virtual)
  • Enterprise software
  • IaaS
  • Data centers
Security Identify when configuration drift may impact risk mitigation strategies
  • Servers (physical and virtual)
  • Enterprise software
  • IaaS
  • Data centers
Input

Output

  • Discussion
  • Baseline configuration guidelines
MaterialsParticipants
  • Configuration Management Standard Operating Procedures
  • Configuration control board
  • Configuration manager
  • Project sponsor
  • IT stakeholders

Step 3.2

Validate data within the CMDB

Activities

3.2.1 Build an audit plan and checklist

This step will walk you through the following aspects of a configuration management system:

  • Data validation and audit

This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • Project manager
  • IT audit

Outcomes of this step

  • Updates to processes for data validation
  • Plan for auditing and validating the data in the CMDB

Audit and validate the CMDB

Review the performance of the supporting technologies and processes to validate the accuracy of the CMDB.

A screenshot of the CM Audit Plan.

CM Audit Plan

  • CM policies
  • CM processes and procedures
  • Interfacing processes
  • Content within the CMDB

"If the data in your CMDB isn't accurate, then it's worthless. If it's wrong or inaccurate, it's going to drive the wrong decisions. It's going to make IT worse, not better."
– Valence Howden, Research Director, Info-Tech Research Group

Ensure the supporting technology is working properly

Does the information in the database accurately reflect reality?

Perform functional tests during audits and as part of release management practices.

Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
The audit should cover three areas:

  • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
  • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
  • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

Build auditing and validation of processes whenever possible

When technicians and analysts are working on a system, they should check to make sure the data about that system is correct. When they're working in the CMDB, they should check that the data they're working with is correct.

More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

  • Watch for data duplication from multiple discovery tools.
  • Review mapping to ensure all relevant CIs are attached to a product or service.
  • Ensure report data is logical.

Ensure the supporting technology is working properly

Does the information in the database accurately reflect reality?

Perform functional tests during audits and as part of release management practices.

Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
The audit should cover three areas:

  • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
  • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
  • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

  • Watch for data duplication from multiple discovery tools.
  • Review mapping to ensure all relevant CIs are attached to a product or service.
  • Ensure report data is logical.

Identify where processes break down and data is incorrect

Once process stops working, data becomes less accurate and people find workarounds to solve their own data needs.

Data within the CMDB often becomes incorrect or incomplete where human work breaks down

  • Investigate processes that are performed manually, including data entry.
  • Investigate if the process executors are performing these processes uniformly.
  • Determine if there are opportunities to automate or provide additional training.
  • Select a sample of the corresponding data in the CMS. Verify if the data is correct.

Non-CCB personnel may not be completing processes fully or consistently

  • Identify where data in the CMS needs to be updated.
  • Identify whether the process practitioners are uniformly updating the CMS.
  • Discuss options for improving the process and driving consistency for data that will benefit the whole organization.

Ensure that the data entered in the CMDB is correct

  • Confirm that there is no data duplication. Data duplication is very common when there are multiple discovery tools in your environment. Confirm that you have set up your tools properly to avoid duplication.
  • Build a process to respond to baseline divergence when people make changes without following change processes and when updates alter settings.
  • Audit the system for accuracy and completeness.

3.2.1 Build an audit plan and checklist

Use the audit to identify areas where processes are breaking down.

Audits present you with the ability to address these pain points before they have greater negative impact.

  1. Identify which regulatory requirements and/or auditing bodies will be relevant to audit processes or findings.
  2. Determine frequency of practice audits and how they relate to internal audits or external audits.
  3. Determine audit scope, including requirements for data spot checks.
  4. Determine who will be responsible for conducting audits and validate this is consistent with the RACI chart.
  5. Record audit procedures in the Configuration Management Standard Operating Procedures section 8.6: Verify and Review the Quality of Information Through Auditing.
  6. Review the Configuration Management Audit and Validation Checklist and modify to suit your needs.

Download the Configuration Management Audit and Validation Checklist

Input

Output

  • Discussion
  • Baseline configuration guidelines
MaterialsParticipants
  • Configuration Management Standard Operating Procedures
  • Configuration control board
  • Configuration manager
  • Project sponsor
  • IT stakeholders

Phase 4

Service Configuration Roadmap

StrategyData StructureProcessesRoadmap
  • Challenges and Goals
  • Use Cases and Data
  • Roles and Responsibilities
  • Services
  • Classifications
  • Data Modeling
  • Lifecycle Processes
  • Baselines
  • Audit and Data Validation
  • Metrics
  • Communications Plan
  • Roadmap

This phase will walk you through the following aspect of a configuration management system:
Roadmap
This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • SCM project manager

Harness Service Configuration Management Superpowers

Step 4.1

Define measures of success

Activities

4.1.1 Identify key metrics to define configuration management success
4.1.2 Brainstorm and record desired reports, dashboards, and analytics
4.1.3 Build a configuration management policy

This phase will walk you through the following aspects of a configuration management system:

  • Metrics
  • Policy

This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • SCM project manager

The value of metrics can be found in IT efficiency increases

When determining metrics for configuration management, be sure to separate metrics needed to gauge configuration management success and those that will use data from the CMDB to provide metrics on the success of other practices.

  • Metrics provide accurate indicators for IT and business decisions.
  • Metrics help you identify IT efficiencies and problems and solve issues before they become more serious.
  • Active metrics tracking makes root cause analysis of issues much easier.
  • Proper application of metrics helps IT services identification and prioritization.
  • Operational risks can be prevented by identifying and implementing metrics.
  • Metrics analysis increases the confidence of the executive team and ensures that IT is working well.

A funnel is shown. The output is IT Performance. The inputs are: Service Desk Metrics; Incident Metrics; Asset Mgmt. Metrics; Release Mgmt. Metrics; Change Mgmt. Metrics; Infra. Metrics

4.1.1 Identify key metrics to define configuration management success

Determine what metrics are specifically related to the practice and how and when metrics will be accessed.

Success factors

Key metrics

Source

Product and service configuration data is relevant

  • Stakeholder satisfaction with data access, accuracy, and usability
  • Stakeholder satisfaction with service configuration management interface, procedures, and reports

Stakeholder discussions

  • Number of bad decisions made due to incorrect or insufficient data
  • Impact of bad decisions made due to incorrect or insufficient data

Process owner discussions

  • Number and impact of data identified as incorrect
  • % of CMDB data verified over the period

CMDB

Cost and effort are continually optimized

  • Effort devoted to service configuration management
  • Cost of tools directly related to the process

Resource management or scheduling

ERP

Progress reporting

  • Communication execution
  • Process
  • Communications and feedback

Communications team and stakeholder discussions

Data – How many products are in the CMDB and are fully and accurately discovered and mapped?

CMDB

Ability to meet milestones on time and with appropriate quality

Project team

Document metrics in the Configuration Management Standard Operating Procedures, section 7: Success Metrics

Use performance metrics to identify areas to improve service management processes using CMDB data

Metrics can indicate a problem with service management processes but cannot provide a clear path to a solution on their own.

  • The biggest challenge is defining and measuring the process and people side of the equation.
  • Expected performance may also need to be compared to actual performance in planning, budgeting, and improvements.
  • The analysis will need to include critical success factors (CSFs), data collection procedures, office routines, engineering practices, and flow diagrams including workflows and key relationships.
  • External benchmarking may also prove useful in identifying how similar organizations are managing aspects of their infrastructure, processing transactions/requests, or staffing. If using external benchmarking for actual process comparisons, clearly defining your internal processes first will make the data collection process smoother and more informative.

Info-Tech Insight

Using a service framework such as ITIL, COBIT, or ISO 20000 may make this job easier, and subscribing to benchmarking partners will provide some of the external data needed for comparison.

4.1.2 Brainstorm and record desired reports, dashboards, and analytics with related practices

The project team will use this list as a starting point

Allot 45 minutes for this discussion.

  1. Create a table for each service or business capability.
    1. Have one column for each way of consuming data: reports, dashboards, and ad hoc analytics.
    2. Have one row for each stakeholder group that will consume the information.
  2. Use the challenges and use cases to brainstorm reports, dashboards, and ad hoc analytic capabilities that each stakeholder group will find useful.
  3. Record these results in your Configuration Management Standard Operating Procedures, section 7: Aligned Processes' Desired Analytical Capabilities.
Stakeholder Groups Reports Dashboards
Change Management
  • CI changes executed without an RFC
  • RFCs grouped by service
  • Potential collisions in upcoming changes
Security
  • Configuration changes that no longer match the baseline
  • New configuration items discovered
Finance
  • Service-based costs
  • Service consumption by department

Download the blueprint Take Control of Infrastructure and Operations Metrics to create a complete metrics program.

Create a configuration management policy and communicate it

Policies are important documents to provide definitive guidelines and clarity around data collection and use, process adherence, and controls.

  • A configuration management policy will apply to IT as the audience, and participants in the program will largely be technical.
  • Business users will benefit from a great configuration management program but will not participate directly.
  • The policy will include objectives and scope, use of data, security and integrity of data, data models and criteria, and baseline configurations.
  • Several governing regulations and practices may intersect with configuration management, such as ITIL, COBIT, and NIST frameworks, as well as change enablement, quality management, asset management, and more.
  • As the policy is written, review processes to ensure policies and processes are aligned. The policy should enable processes, and it may require modifications if it hinders the collection, security, or use of data required to meet proposed use cases.
  • Once the policy is written and approved, ensure all stakeholders understand the importance, context, and repercussions of the policy.

The approvals process is about appropriate oversight of the drafted policies. For example:

  • Do the policies satisfy compliance and regulatory requirements?
  • Do the policies work with the corporate culture?
  • Do the policies address the underlying need?

If the draft is approved:

  • Set the effective date and a review date.
  • Begin communication, training, and implementation.

Employees must know that there are new policies and understand the steps they must take to comply with the policies in their work.

Employees must be able to interpret, understand, and know how to act upon the information they find in the policies.

Employees must be informed on where to get help or ask questions and who to request policy exceptions from.

If the draft is rejected:

  • Acquire feedback and make revisions.
  • Resubmit for approval.

4.1.3 Build a configuration management policy

This policy provides the foundation for configuration control.

Use this template as a starting point.

The Configuration Management Policy provides the foundation for a configuration control board and the use of configuration baselines.
Instructions:

  1. Review and modify the policy statements. Ensure that the policy statements reflect your organization and the expectations you wish to set.
  2. If you don't have a CCB: The specified responsibilities can usually be assigned to either the configuration manager or the governing body for change enablement.
  3. Determine if you should apply this policy beyond SCM. As written, this policy may provide a good starting point for practices such as:
    • Secure baseline configuration management
    • Software configuration management

Two screenshots from the Configuration Management Policy template

Download the Configuration Management Policy template

Step 4.2

Build communications and a roadmap

Activities

4.2.1 Build a communications plan
4.2.2 Identify milestones

This phase will walk you through the following aspects of a configuration management system:

  • Communications plan
  • Roadmap

This phase involves the following participants:

  • IT service owners
  • Enterprise architects
  • Practice owners and managers
  • SCM practice manager
  • SCM project manager

Outcomes of this step

  • Documented expectations around configuration control
  • Roadmap and action items for the SCM project

Do not discount the benefits of a great communications plan as part of change management

Many configuration management projects have failed due to lack of organizational commitment and inadequate communications.

  • Start at the top to ensure stakeholder buy-in by verifying alignment and use cases. Without a committed project sponsor who believes in the value of configuration management, it will be difficult to draw the IT team into the vision.
  • Clearly articulate the vision, strategy, and goals to all stakeholders. Ensure the team understands why these changes are happening, why they are happening now, and what outcomes you hope to achieve.
  • Gain support from technical teams by clearly expressing organizational and departmental benefits – they need to know "what's in it for me."
  • Clearly communicate new responsibilities and obligations and put a feedback process in place to hear concerns, mitigate risk, and act on opportunities for improvement. Be prepared to answer questions as this practice is rolled out.
  • Be consistent in your messaging. Mixed messages can easily derail progress.
  • Communicate to the business how these efforts will benefit the organization.
  • Share documents built in this blueprint or workshop with your technical teams to ensure they have a clear picture of the entire configuration management practice.
  • Share your measures and view of success and communicate wins throughout building the practice.

30%

When people are truly invested in change, it is 30% more likely to stick.
McKinsey

82%

of CEOs identify organizational change management as a priority.
D&B Consulting

6X

Initiatives with excellent change management are six times more likely to meet objectives than those with poor change management.
Prosci

For a more detailed program, see Drive Technology Adoption

Formulate a communications plan to ensure all stakeholders and impacted staff will be aware of the plan

Communication is key to success in process adoption and in identifying potential risks and issues with integration with other processes. Engage as often as needed to get the information you need for the project and for adoption.

Identify Messages

Distinct information that needs to be sent at various times. Think about:

  • Who will be impacted and how.
  • What the goals are for the project/new process.
  • What the audience needs to know about the new process and how they will interface with each business unit.
  • How people can request configuration data.

Identify Audiences

Any person or group who will be the target of the communication. This may include:

  • Project sponsors and stakeholders.
  • IT staff who will be involved in the project.
  • IT staff who will be impacted by the project (i.e. who will benefit from it or have obligations to fulfill because of it).
  • Business sponsors and product owners.

Document and Track

Document messaging, medium, and responsibility, working with the communications team to refine messages before executing.

  • Identify where people can send questions and feedback to ensure they have the information they need to make or accept the changes.
  • Document Q&A and share in a central location.

Determine Timing

Successful communications plans consider timing of various messages:

  • Advanced high-level notice of improvements for those who need to see action.
  • Advanced detailed notice for those who will be impacted by workload.
  • Advanced notice for who will be impacted (i.e. who will benefit from it or have obligations to fulfill because of it) once the project is ready to be transitioned to daily life.

Determine Delivery

Work with your communications team, if you have one, to determine the best medium, such as:

  • Meeting announcement for stakeholders and IT.
  • Newsletter for those less impacted.
  • Intranet announcements: "coming soon!"
  • Demonstrations with vendors or project team.

4.2.1 Build a communications plan

The communications team will use this list as a starting point.

Allot 45 minutes for this discussion.

Identify stakeholders.

  1. Identify everyone who will be affected by the project and by configuration management.

Craft key messages tailored to each stakeholder group.

  1. Identify the key messages that must be communicated to each group.

Finalize the communication plan.

  1. Determine the most appropriate timing for communications with each group to maximize receptivity.
  2. Identify any communication challenges you anticipate and incorporate steps to address them into your communication plan.
  3. Identify multiple methods for getting the messages out (e.g. newsletters, emails, meetings).
  1. Identify how feedback will be collected (i.e. through interviews or surveys) to measure whether the changes were communicated well.
Audience Message Medium Timing Feedback Mechanism
Configuration Management Team Communicate all key processes, procedures, policies, roles, and responsibilities In-person meetings and email communications Weekly meetings Informal feedback during weekly meetings
Input

Output

  • Discussion
  • Rough draft of messaging for communications team
MaterialsParticipants
  • Project plan
  • Configuration manager
  • Project sponsor
  • IT director
  • Communications team

Build a realistic, high-level roadmap including milestones

Break the work into manageable pieces

  1. Plan to have multiple phases with short-, medium-, and long-term goals/timeframes. Building a CMDB is not easy and should be broken into manageable sections.
  2. Set reasonable milestones. For each phase, document goals to define "done" and ensure they're reasonable for the resources you have available. If working with a vendor, include them in your discussions of what's realistic.
  3. Treat the first phase as a pilot. Focus on items you understand well:
    1. Well-understood user-facing and IT services
    2. High-maturity management and governance practices
    3. Trusted data sources
  4. Capture high-value, high-criticality services early. Depending on the complexity of your systems, you may need to split this phase into multiple phases.

Document this table in the Configuration Management Project Charter, section 3.0: Milestones

Timeline/Owner Milestone/Deliverable Details
First four weeks Milestone: Plan defined and validated with ITSM installation vendor Define processes for intake, maintenance, and retirement.
Rebecca Roberts Process documentation written, approved, and ready to communicate Review CI categories

4.2.2 Identify milestones

Build out a high-level view to inform the project plan

Open the Configuration Management Project Charter, section 3: Milestones.
Instructions:

  1. Identify high-level milestones for the implementation of the configuration management program. This may include tool evaluation and implementation, assignment of roles, etc.
  2. Add details to fill out the milestone, keeping to a reasonable level of detail. This may inform vendor discussion or further development of the project plan.
  3. Add target dates to the milestones. Validate they are realistic with the team.
  4. Add notes to the assumptions and constraints section.
  5. Identify risks to the plan.

Two Screenshots from the Configuration Management Project Charter

Download the Configuration Management Project Charter

Workshop Participants

R = Recommended
O = Optional

Participants Day 1 Day 2 Day 3 Day 4
Configuration Management Strategy CMDB Data Structure Processes Communications & Roadmap
Morning Afternoon Morning Afternoon Morning Afternoon Morning Afternoon
Head of IT R O
Project Sponsor R R O O O O O O
Infrastructure, Enterprise Apps Leaders R R O O O O O O
Service Manager R R O O O O O O
Configuration Manager R R R R R R R R
Project Manager R R R R R R R R
Representatives From Network, Compute, Storage, Desktop R R R R R R R R
Enterprise Architecture R R R R O O O O
Owner of Change Management/Change Control/Change Enablement R R R R R R R R
Owner of In-Scope Apps, Use Cases R R R R R R R R
Asset Manager R R R R R R R R

Related Info-Tech Research

Research Contributors and Experts

Thank you to everyone who contributed to this publication

Brett Johnson, Senior Consultant, VMware

Yev Khovrenkov, Senior Consultant, Solvera Solutions

Larry Marks, Reviewer, ISACA New Jersey

Darin Ohde, Director of Service Delivery, GreatAmerica Financial Services

Jim Slick, President/CEO, Slick Cyber Systems

Emily Walker, Sr. Digital Solution Consultant, ServiceNow

Valence Howden, Principal Research Director, Info-Tech Research Group

Allison Kinnaird, Practice Lead, IT Operations, Info-Tech Research Group

Robert Dang, Principal Research Advisor, Security, Info-Tech Research Group

Monica Braun, Research Director, IT Finance, Info-Tech Research Group

Jennifer Perrier, Principal Research Director, IT Finance, Info-Tech Research Group

Plus 13 anonymous contributors

Bibliography

An Introduction to Change Management, Prosci, Nov. 2019.
BAI10 Manage Configuration Audit Program. ISACA, 2014.
Bizo, Daniel, et al, "Uptime Institute Global Data Center Survey 2021." Uptime Institute, 1 Sept. 2021.
Brown, Deborah. "Change Management: Some Statistics." D&B Consulting Inc. May 15, 2014. Accessed June 14, 2016.
Cabinet Office. ITIL Service Transition. The Stationery Office, 2011.
"COBIT 2019: Management and Governance Objectives. ISACA, 2018.
"Configuration Management Assessment." CMStat, n.d. Accessed 5 Oct. 2022.
"Configuration Management Database Foundation." DMTF, 2018. Accessed 1 Feb. 2021.
Configuration Management Using COBIT 5. ISACA, 2013.
"Configuring Service Manager." Product Documentation, Ivanti, 2021. Accessed 9 Feb. 2021.
"Challenges of Implementing configuration management." CMStat, n.d. Accessed 5 Oct. 2022.
"Determining if configuration management and change control are under management control, part 1." CMStat, n.d. Accessed 5 Oct. 2022.
"Determining if configuration management and change control are under management control, part 2." CMStat, n.d. Accessed 5 Oct. 2022.
"Determining if configuration management and change control are under management control, part 3." CMStat, n.d. Accessed 5 Oct. 2022.
"CSDM: The Recipe for Success." Data Content Manager, Qualdatrix Ltd. 2022. Web.
Drogseth, Dennis, et al., 2015, CMDB Systems: Making Change Work in the Age of Cloud and Agile. Morgan Kaufman.
Ewenstein, B, et al. "Changing Change Management." McKinsey & Company, 1 July 2015. Web.
Farrell, Karen. "VIEWPOINT: Focus on CMDB Leadership." BMC Software, 1 May 2006. Web.
"How to Eliminate the No. 1 Cause of Network Downtime." SolarWinds, 4 April 2014. Accessed 9 Feb. 2021.
"ISO 10007:2017: Quality Management -- Guidelines for Configuration Management." International Organization for Standardization, 2019.
"IT Operations Management." Product Documentation, ServiceNow, version Quebec, 2021. Accessed 9 Feb. 2021.
Johnson, Elsbeth. "How to Communicate Clearly During Organizational Change." Harvard Business Review, 13 June 2017. Web.
Kloeckner, K. et al. Transforming the IT Services Lifecycle with AI Technologies. Springer, 2018.
Klosterboer, L. Implementing ITIL Configuration Management. IBM Press, 2008.
Norfolk, D., and S. Lacy. Configuration Management: Expert Guidance for IT Service Managers and Practitioners. BCS Learning & Development Limited, revised ed., Jan. 2014.
Painarkar, Mandaar. "Overview of the Common Data Model." BMC Documentation, 2015. Accessed 1 Feb. 2021.
Powers, Larry, and Ketil Been. "The Value of Organizational Change Management." Boxley Group, 2014. Accessed June 14, 2016.
"Pulse of the Profession: Enabling Organizational Change Throughout Strategic Initiatives." PMI, March 2014. Accessed June 14, 2016.
"Service Configuration Management, ITIL 4 Practice Guide." AXELOS Global Best Practice, 2020
"The Guide to Managing Configuration Drift." UpGuard, 2017.

Mentoring for Agile Teams

  • Buy Link or Shortcode: {j2store}154|cart{/j2store}
  • member rating overall impact: 9.5/10 Overall Impact
  • member rating average dollars saved: $187,599 Average $ Saved
  • member rating average days saved: 27 Average Days Saved
  • Parent Category Name: Development
  • Parent Category Link: /development
  • Today’s realities are driving organizations to digitize faster and become more Agile.
  • Most hierarchical, command and control–style organizations are not yet well adapted to using Agile.
  • So-called textbook Agile practices often clash with traditional processes and practices.
  • Members must adapt their Agile practices to accommodate their organizational realities.

Our Advice

Critical Insight

  • There is no one-size-fits-all approach to Agile. Agile practices need to be adjusted to work in your organization based on a thoughtful diagnosis of the challenges and solutions tailored to the nature of your organization.

Impact and Result

  • Identify your Agile challenges and success factors (both organization-wide and team-specific).
  • Leverage the power of research and experience to solve key Agile challenges and gain immediate benefits for your project.
  • Your Agile playbook will capture your findings so future projects can benefit from them.

Mentoring for Agile Teams Research & Tools

Start here – read the Executive Brief

Read this Executive Brief to understand how a Agile Mentoring can help your organization to successfully establish Agile practices within your context.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Take the Info-Tech Agile Challenges and Success Factors Survey

This tool will help you identify where your Agile teams are experiencing the most pain so you can create your Agile challenges hit list.

  • Agile Challenges and Success Factors Survey

2. Review typical challenges and findings

While each organization/team will struggle with its own individual challenges, many members find they face similar organizational/systemic challenges when adopting Agile. Review these typical challenges and learn from what other members have discovered.

  • Mentoring for Agile Teams – Typical Findings

Infographic

Workshop: Mentoring for Agile Teams

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Take the Agile Challenges and Success Factors Survey

The Purpose

Determine whether an Agile playbook is right for you.

Broadly survey your teams to identify Agile challenges and success factors in your organization.

Key Benefits Achieved

Better understanding of common Agile challenges and success factors

Identification of common Agile challenges and success factors are prevalent in your organization

Activities

1.1 Distribute survey and gather results.

1.2 Consolidate survey results.

Outputs

Completed survey responses from across teams/organization

Consolidated heat map of your Agile challenges and success factors

2 Identify Your Agile Challenges Hit List

The Purpose

Examine consolidated survey results.

Identify your most pressing challenges.

Create a hit list of challenges to be resolved.

Key Benefits Achieved

Identification of the most serious challenges to your Agile transformation

Attention focused on those challenge areas that are most impacting your Agile teams

Activities

2.1 Analyze and discuss your consolidated heat map.

2.2 Prioritize identified challenges.

2.3 Select your hit list of challenges to address.

Outputs

Your Agile challenges hit list

3 Problem Solve

The Purpose

Address each challenge in your hit list to eliminate or improve it.

Key Benefits Achieved

Better Agile team performance and effectiveness

Activities

3.1 Work with Agile mentor to problem solve each challenge in your hit list.

3.2 Apply these to your project in real time.

Outputs

4 Create Your Agile Playbook

The Purpose

Capture the findings and lessons learned while problem solving your hit list.

Key Benefits Achieved

Strategies and tactics for being successful with Agile in your organization which can be applied to future projects

Activities

4.1 For each hit list item, capture the findings and lessons learned in Module 3.

4.2 Document these in your Agile Playbook.

Outputs

Your Agile Playbook deliverable

Create an Architecture for AI

  • Buy Link or Shortcode: {j2store}344|cart{/j2store}
  • member rating overall impact: 9.0/10 Overall Impact
  • member rating average dollars saved: $604,999 Average $ Saved
  • member rating average days saved: 49 Average Days Saved
  • Parent Category Name: Data Management
  • Parent Category Link: /data-management

This research is designed to help organizations who are facing these challenges:

  • Deliver on the AI promise within the organization.
  • Prioritize the demand for AI projects and govern the projects to prevent overloading resources.
  • Have sufficient data management capability.
  • Have clear metrics in place to measure progress and for decision making.

AI requires a high level of maturity in all data management capabilities, and the greatest challenge the CIO or CDO faces is to mature these capabilities sufficiently to ensure AI success.

Our Advice

Critical Insight

  • Build your target state architecture from predefined best-practice building blocks.
  • Not all business use cases require AI to increase business capabilities.
  • Not all organizations are ready to embark on the AI journey.
  • Knowing the AI pattern that you will use will simplify architecture considerations.

Impact and Result

  • This blueprint will assist organizations with the assessment, planning, building, and rollout of their AI initiatives.
    • Do not embark on an AI project with an immature data management practice. Embark on initiatives to fix problems before they cripple your AI projects.
    • Using architecture building blocks will speed up the architecture decision phase.
  • The success rate of AI initiatives is tightly coupled with data management capabilities and a sound architecture.

Create an Architecture for AI Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to understand why you need an underlying architecture for AI, review Info-Tech's methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Assess business use cases for AI readiness

Define business use cases where AI may bring value. Evaluate each use case to determine the company’s AI maturity in people, tools, and operations for delivering the correct data, model development, model deployment, and the management of models in the operational areas.

  • Create an Architecture for AI – Phase 1: Assess Business Use Cases for AI Readiness
  • AI Architecture Assessment and Project Planning Tool
  • AI Architecture Assessment and Project Planning Tool – Sample

2. Design your target state

Develop a target state architecture to allow the organization to effectively deliver in the promise of AI using architecture building blocks.

  • Create an Architecture for AI – Phase 2: Design Your Target State
  • AI Architecture Templates

3. Define the AI architecture roadmap

Compare current state with the target state to define architecture plateaus and build a delivery roadmap.

  • Create an Architecture for AI – Phase 3: Define the AI Architecture Roadmap
[infographic]

Workshop: Create an Architecture for AI

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Answer “Where To?”

The Purpose

Define business use cases where AI may add value and assess use case readiness.

Key Benefits Achieved

Know upfront if all required data resources are available in the required velocity, veracity, and variety to service the use case.

Activities

1.1 Review the business vision.

1.2 Identify and classify business use cases.

1.3 Assess company readiness for each use case.

1.4 Review architectural principles and download and install Archi.

Outputs

List of identified AI use cases

Assessment of each use case

Data sources needed for each use case

Archi installed

2 Define the Required Architecture Building Blocks

The Purpose

Define architecture building blocks that can be used across use cases and data pipeline.

Key Benefits Achieved

The architectural building blocks ensure reuse of resources and form the foundation of a stepwise rollout.

Activities

2.1 ArchiMate modelling language overview.

2.2 Architecture building block overview

2.3 Identify architecture building blocks by use case.

2.4 Define the target state architecture.

Outputs

A set of building blocks created in Archi

Defined target state architecture using architecture building blocks

3 Assess the Current State Architecture

The Purpose

Assess your current state architecture in the areas identified by the target state.

Key Benefits Achieved

Only evaluating the current state architecture that will influence your AI implementation.

Activities

3.1 Identify the current state capabilities as required by the target state.

3.2 Assess your current state architecture.

3.3 Define a roadmap and design implementation plateaus.

Outputs

Current state architecture documented in Archi

Assessed current state using assessment tool

A roadmap defined using plateaus as milestones

4 Bridge the Gap and Create the Roadmap

The Purpose

Assess your current state against the target state and create a plan to bridge the gaps.

Key Benefits Achieved

Develop a roadmap that will deliver immediate results and ensure long-term durability.

Activities

4.1 Assess the gaps between current- and target-state capabilities.

4.2 Brainstorm initiatives to address the gaps in capabilities

4.3 Define architecture delivery plateaus.

4.4 Define a roadmap with milestones.

4.5 Sponsor check-in.

Outputs

Current to target state gap assessment

Architecture roadmap divided into plateaus

Take Control of Cloud Costs on AWS

  • Buy Link or Shortcode: {j2store}425|cart{/j2store}
  • member rating overall impact: 9.3/10 Overall Impact
  • member rating average dollars saved: $62,500 Average $ Saved
  • member rating average days saved: 26 Average Days Saved
  • Parent Category Name: Cloud Strategy
  • Parent Category Link: /cloud-strategy
  • Traditional IT budgeting and procurement processes don't work for public cloud services.
  • The self-service nature of the cloud means that often the people provisioning cloud resources aren't accountable for the cost of those resources.
  • Without centralized control or oversight, organizations can quickly end up with massive AWS bills that exceed their IT salary cost.

Our Advice

Critical Insight

  • Most engineers care more about speed of feature delivery and reliability of the system than they do about cost.
  • Often there are no consequences for over architecting or overspending on AWS.
  • Many organizations lack sufficient visibility into their AWS spend, making it impossible to establish accountability and controls.

Impact and Result

  • Define roles and responsibilities.
  • Establish visibility.
  • Develop processes, procedures, and policies.

Take Control of Cloud Costs on AWS Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should take control of cloud costs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Build cost accountability framework

Assess your current state, define your cost allocation model, and define roles and responsibilities.

  • Cloud Cost Management Worksheet
  • Cloud Cost Management Capability Assessment
  • Cloud Cost Management Policy
  • Cloud Cost Glossary of Terms

2. Establish visibility

Define dashboards and reports, and document account structure and tagging requirements.

  • Service Cost Cheat Sheet

3. Define processes and procedures

Establish governance for tagging and cost control, define processes for right-sizing, and define processes for purchasing commitment discounts.

  • Right-Sizing Workflow (Visio)
  • Right-Sizing Workflow (PDF)
  • Commitment Purchasing Workflow (Visio)
  • Commitment Purchasing Workflow (PDF)

4. Build implementation plan

Document process interactions, establish program KPIs, and build implementation roadmap and communication plan.

  • Cloud Cost Management Task List

Infographic

Workshop: Take Control of Cloud Costs on AWS

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Build Cost Accountability Framework

The Purpose

Establish clear lines of accountability and document roles and responsibilities to effectively manage cloud costs.

Key Benefits Achieved

Chargeback/showback model to provide clear accountability for costs.

Understanding of key areas to focus on to improve cloud cost management capabilities.

Activities

1.1 Assess current state

1.2 Determine cloud cost model

1.3 Define roles and responsibilities

Outputs

Cloud cost management capability assessment

Cloud cost model

Roles and responsibilities

2 Establish Visibility

The Purpose

Establish visibility into cloud costs and drivers of those costs.

Key Benefits Achieved

Better understanding of what is driving costs and how to keep them in check.

Activities

2.1 Develop architectural patterns

2.2 Define dashboards and reports

2.3 Define account structure

2.4 Document tagging requirements

Outputs

Architectural patterns; service cost cheat sheet

Dashboards and reports

Account structure

Tagging scheme

3 Define Processes and Procedures

The Purpose

Develop processes, procedures, and policies to control cloud costs.

Key Benefits Achieved

Improved capability of reducing costs.

Documented processes and procedures for continuous improvement.

Activities

3.1 Establish governance for tagging

3.2 Establish governance for costs

3.3 Define right-sizing process

3.4 Define purchasing process

3.5 Define notification and alerts

Outputs

Tagging policy

Cost control policy

Right-sizing process

Commitment purchasing process

Notifications and Alerts

4 Build Implementation Plan

The Purpose

Document next steps to implement and improve cloud cost management program.

Key Benefits Achieved

Concrete roadmap to stand up and/or improve the cloud cost management program.

Activities

4.1 Document process interaction changes

4.2 Define cloud cost program KPIs

4.3 Build implementation roadmap

4.4 Build communication plan

Outputs

Changes to process interactions

Cloud cost program KPIs

Implementation roadmap

Communication plan

Enhance PPM Dashboards and Reports

  • Buy Link or Shortcode: {j2store}438|cart{/j2store}
  • member rating overall impact: 9.5/10 Overall Impact
  • member rating average dollars saved: $18,849 Average $ Saved
  • member rating average days saved: 66 Average Days Saved
  • Parent Category Name: Portfolio Management
  • Parent Category Link: /portfolio-management
  • Your organization has introduced project portfolio management (PPM) processes that require new levels of visibility into the project portfolio that were not required before.
  • Key PPM decision makers are requesting new or improved dashboards and reports to help support making difficult decisions.
  • Often PPM dashboards and reports provide too much information and are difficult to navigate, resulting in information overload and end-user disengagement.
  • PPM dashboards and reports are laborious to maintain; ineffective dashboards end up wasting scarce resources, delay decisions, and negatively impact the perceived value of the PMO.

Our Advice

Critical Insight

  • Well-designed dashboards and reports help actively engage stakeholders in effective management of the project portfolio by communicating information and providing support to key PPM decision makers. This tends to improve PPM performance, making resource investments into reporting worthwhile.
  • Observations and insights gleaned from behavioral studies and cognitive sciences (largely ignored in PPM literature) can help PMOs design dashboards and reports that avoid information overload and that provide targeted decision support to key PPM decision makers.

Impact and Result

  • Enhance your PPM dashboards and reports by carrying out a carefully designed enhancement project. Start by clarifying the purpose of PPM dashboards and reports. Establish a focused understanding of PPM decision-support needs, and design dashboards and reports to address these in a targeted way.
  • Conduct a thorough review of all existing dashboards and reports, evaluating the need, effort, usage, and satisfaction of each report to eliminate any unnecessary or ineffective dashboards and design improved dashboards and reports that will address these gaps.
  • Design effective and targeted dashboards and reports to improve the engagement of senior leaders in PPM and help improve PPM performance.

Enhance PPM Dashboards and Reports Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should enhance your PPM reports and dashboards, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Establish a PPM dashboard and reporting enhancement project plan

Identify gaps, establish a list of dashboards and reports to enhance, and set out a roadmap for your dashboard and reporting enhancement project.

  • Enhance PPM Dashboards and Reports – Phase 1: Establish a PPM Dashboard and Reporting Enhancement Project Plan
  • PPM Decision Support Review Workbook
  • PPM Dashboard and Reporting Audit Workbook
  • PPM Dashboard and Reporting Audit Worksheets – Exisiting
  • PPM Dashboard and Reporting Audit Worksheets – Proposed
  • PPM Metrics Menu
  • PPM Dashboard and Report Enhancement Project Charter Template

2. Design and build enhanced PPM dashboards and reporting

Gain an understanding of how to design effective dashboards and reports.

  • Enhance PPM Dashboards and Reports – Phase 2: Design and Build New or Improved PPM Dashboards and Reporting
  • PPM Dashboard and Report Requirements Workbook
  • PPM Executive Dashboard Template
  • PPM Dashboard and Report Visuals Template
  • PPM Capacity Dashboard Operating Manual

3. Implement and maintain effective PPM dashboards and reporting

Officially close and evaluate the PPM dashboard and reporting enhancement project and transition to an ongoing and sustainable PPM dashboard and reporting program.

  • Enhance PPM Dashboards and Reports – Phase 3: Implement and Maintain Effective PPM Dashboards and Reporting
  • PPM Dashboard and Reporting Program Manual
[infographic]

Workshop: Enhance PPM Dashboards and Reports

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Establish a PPM Dashboard and Reporting Enhancement

The Purpose

PPM dashboards and reports will only be effective and valuable if they are designed to meet your organization’s specific needs and priorities.

Conduct a decision-support review and a thorough dashboard and report audit to identify the gaps your project will address.

Take advantage of the planning stage to secure sponsor and stakeholder buy-in.

Key Benefits Achieved

Current-state assessment of satisfaction with PPM decision-making support.

Current-state assessment of all existing dashboards and reports: effort, usage, and satisfaction.

A shortlist of dashboards and reports to improve that is informed by actual needs and priorities.

A shortlist of dashboards and reports to create that is informed by actual needs and priorities.

The foundation for a purposeful and focused PPM dashboard and reporting program that is sustainable in the long term.

Activities

1.1 Engage in PPM decision-making review.

1.2 Perform a PPM dashboard and reporting audit and gap analysis.

1.3 Identify dashboards and/or reports needed.

1.4 Plan the PPM dashboard and reporting project.

Outputs

PPM Decision-Making Review

PPM Dashboard and Reporting Audit

Prioritized list of dashboards and reports to be improved and created

Roadmap for the PPM dashboard and reporting project

2 Design New or Improved PPM Dashboards and Reporting

The Purpose

Once the purpose of each PPM dashboard and report has been identified (based on needs and priorities) it is important to establish what exactly will be required to produce the desired outputs.

Gathering stakeholder and technical requirements will ensure that the proposed and finalized designs are realistic and sustainable in the long term.

Key Benefits Achieved

Dashboard and report designs that are informed by a thorough analysis of stakeholder and technical requirements.

Dashboard and report designs that are realistically sustainable in the long term.

Activities

2.1 Review the best practices and science behind effective dashboards and reporting.

2.2 Gather stakeholder requirements.

2.3 Gather technical requirements.

2.4 Build wireframe options for each dashboard or report.

2.5 Review options: requirements, feasibility, and usability.

2.6 Finalize initial designs.

2.7 Design and record the input, production, and consumption workflows and processes.

Outputs

List of stakeholder requirements for dashboards and reports

Wireframe design options

Record of the assessment of each wireframe design: requirements, feasibility, and usability

A set of finalized initial designs for dashboards and reports.

Process workflows for each initial design

3 Plan to Roll Out Enhanced PPM Dashboards and Reports

The Purpose

Ensure that enhanced dashboards and reports are actually adopted in the long term by carefully planning their roll-out to inputters, producers, and consumers.

Plan to train all stakeholders, including report consumers, to ensure that the reports generate the decision support and PPM value they were designed to.

Key Benefits Achieved

An informed, focused, and scheduled plan for rolling out dashboards and reports and for training the various stakeholders involved.

Activities

3.1 Plan for external resourcing (if necessary): vendors, consultants, contractors, etc.

3.2 Conduct impact analysis: risks and opportunities.

3.3 Create an implementation and training plan.

3.4 Determine PPM dashboard and reporting project success metrics.

Outputs

External resourcing plan

Impact analysis and risk mitigation plan

Record of the PPM dashboard and reporting project success metrics

Build a Robust and Comprehensive Data Strategy

  • Buy Link or Shortcode: {j2store}120|cart{/j2store}
  • member rating overall impact: 9.3/10 Overall Impact
  • member rating average dollars saved: $46,734 Average $ Saved
  • member rating average days saved: 29 Average Days Saved
  • Parent Category Name: Data Management
  • Parent Category Link: /data-management
  • The volume and variety of data that organizations have been collecting and producing have been growing exponentially and show no sign of slowing down.
  • At the same time, business landscapes and models are evolving, and users and stakeholders are becoming more and more data centric, with maturing expectations and demands.

Our Advice

Critical Insight

  • As the CDO or equivalent data leader in your organization, a robust and comprehensive data strategy is the number one tool in your toolkit for delivering on your mandate of creating measurable business value from data.
  • A data strategy should never be formulated disjointed from the business. Ensure the data strategy aligns with the business strategy and supports the business architecture.
  • Building and fostering a data-driven culture will accelerate and sustain adoption of, appetite for, and appreciation for data and hence drive the ROI on your various data investments.

Impact and Result

  • Formulate a data strategy that stitches all of the pieces together to better position you to unlock the value in your data:
    • Establish the business context and value: Identify key business drivers for executing on an optimized data strategy, build compelling and relevant use cases, understand your organization’s culture and appetite for data, and ensure you have well-articulated vision, principles, and goals for your data strategy
    • Ensure you have a solid data foundation: Understand your current data environment, data management enablers, people, skill sets, roles, and structure. Know your strengths and weakness so you can optimize appropriately.
    • Formulate a sustainable data strategy: Round off your strategy with effective change management and communication for building and fostering a data-driven culture.

Build a Robust and Comprehensive Data Strategy Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Data Strategy Research – A step-by-step document to facilitate the formulation of a data strategy that brings together the business context, data management foundation, people, and culture.

Data should be at the foundation of your organization’s evolution. The transformational insights that executives and decision makers are constantly seeking to leverage can be unlocked with a data strategy that makes high-quality, trusted, and relevant data readily available to the users who need it.

  • Build a Robust and Comprehensive Data Strategy – Phases 1-3

2. Data Strategy Stakeholder Interview Guide and Findings – A template to support you in your meetings or interviews with key stakeholders as you work on understanding the value of data within the various lines of business.

This template will help you gather insights around stakeholder business goals and objectives, current data consumption practices, the types or domains of data that are important to them in supporting their business capabilities and initiatives, the challenges they face, and opportunities for data from their perspective.

  • Data Strategy Stakeholder Interview Guide and Findings

3. Data Strategy Use Case Template – An exemplar template to demonstrate the business value of your data strategy.

Data strategy optimization anchored in a value proposition will ensure that the data strategy focuses on driving the most valuable and critical outcomes in support of the organization’s enterprise strategy. The template will help you facilitate deep-dive sessions with key stakeholders for building use cases that are of demonstrable value not only to their relevant lines of business but also to the wider organization.

  • Data Strategy Use Case Template

4. Chief Data Officer – A job description template that includes a detailed explication of the responsibilities and expectations of a CDO.

Bring data to the C-suite by creating the Chief Data Officer role. This position is designed to bridge the gap between the business and IT by serving as a representative for the organization's data management practices and identifying how the organization can leverage data as a competitive advantage or corporate asset.

  • Chief Data Officer

5. Data Strategy Document Template – A structured template to plan and document your data strategy outputs.

Use this template to document and formulate your data strategy. Follow along with the sections of the blueprint Build a Robust and Comprehensive Data Strategy and complete the template as you progress.

  • Data Strategy Document Template
[infographic]

Workshop: Build a Robust and Comprehensive Data Strategy

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Establish Business Context and Value: Understand the Current Business Environment

The Purpose

Establish the business context for the business strategy.

Key Benefits Achieved

Substantiates the “why” of the data strategy.

Highlights the organization’s goals, objectives, and strategic direction the data must align with.

Activities

1.1 Data Strategy 101

1.2 Intro to Tech’s Data Strategy Framework

1.3 Data Strategy Value Proposition: Understand stakeholder’s strategic priorities and the alignment with data

1.4 Discuss the importance of vision, mission, and guiding principles of the organization’s data strategy

1.5 Understand the organization’s data culture – discuss Data Culture Survey results

1.6 Examine Core Value Streams of Business Architecture

Outputs

Business context; strategic drivers

Data strategy guiding principles

Sample vision and mission statements

Data Culture Diagnostic Results Analysis

2 Business-Data Needs Discovery: Key Business Stakeholder Interviews

The Purpose

Build use cases of demonstrable value and understand the current environment.

Key Benefits Achieved

An understanding of the current maturity level of key capabilities.

Use cases that represent areas of concern and/or high value and therefore need to be addressed.

Activities

2.1 Conduct key business stakeholder interviews to initiate the build of high-value business-data cases

Outputs

Initialized high-value business-data cases

3 Understand the Current Data Environment & Practice: Analyze Data Capability and Practice Gaps and Develop Alignment Strategies

The Purpose

Build out a future state plan that is aimed at filling prioritized gaps and that informs a scalable roadmap for moving forward on treating data as an asset.

Key Benefits Achieved

A target state plan, formulated with input from key stakeholders, for addressing gaps and for maturing capabilities necessary to strategically manage data.

Activities

3.1 Understand the current data environment: data capability assessment

3.2 Understand the current data practice: key data roles, skill sets; operating model, organization structure

3.3 Plan target state data environment and data practice

Outputs

Data capability assessment and roadmapping tool

4 Align Business Needs with Data Implications: Initiate Roadmap Planning and Strategy Formulation

The Purpose

Consolidate business and data needs with consideration of external factors as well as internal barriers and enablers to the success of the data strategy. Bring all the outputs together for crafting a robust and comprehensive data strategy.

Key Benefits Achieved

A consolidated view of business and data needs and the environment in which the data strategy will be operationalized.

An analysis of the feasibility and potential risks to the success of the data strategy.

Activities

4.1 Analyze gaps between current- and target-state

4.2 Initiate initiative, milestone and RACI planning

4.3 Working session with Data Strategy Owner

Outputs

Data Strategy Next Steps Action Plan

Relevant data strategy related templates (example: data practice patterns, data role patterns)

Initialized Data Strategy on-a-Page

Further reading

Build a Robust and Comprehensive Data Strategy

Key to building and fostering a data-driven culture.

ANALYST PERSPECTIVE

Data Strategy: Key to helping drive organizational innovation and transformation

"In the dynamic environment in which we operate today, where we are constantly juggling disruptive forces, a well-formulated data strategy will prove to be a key asset in supporting business growth and sustainability, innovation, and transformation.

Your data strategy must align with the organization’s business strategy, and it is foundational to building and fostering an enterprise-wide data-driven culture."

Crystal Singh,

Director – Research and Advisory

Info-Tech Research Group

Our understanding of the problem

This Research is Designed For:

  • Chief data officers (CDOs), chief architects, VPs, and digital transformation directors and CIOs who are accountable for ensuring data can be leveraged as a strategic asset of the organization.

This Research Will Help You:

  • Put a strategy in place to ensure data is available, accessible, well integrated, secured, of acceptable quality, and suitably visualized to fuel decision making by the organizations’ executives.
  • Align data management plans and investments with business requirements and the organization’s strategic plans.
  • Define the relevant roles for operationalizing your data strategy.

This Research Will Also Assist:

  • Data architects and enterprise architects who have been tasked with supporting the formulation or optimization of the organization’s data strategy.
  • Business leaders creating plans for leveraging data in their strategic planning and business processes.
  • IT professionals looking to improve the environment that manages and delivers data.

This Research Will Help Them:

  • Get a handle on the current situation of data within the organization.
  • Understand how the data strategy and its resulting initiatives will affect the operations, integration, and provisioning of data within the enterprise.

Executive Summary

Situation

  • The volume and variety of data that organizations have been collecting and producing have been growing exponentially and show no sign of slowing down. At the same time, business landscapes and models are evolving, and users and stakeholders are becoming more and more data centric, with maturing and demanding expectations.

Complication

  • As organizations pivot in response to industry disruptions and changing landscapes, a reactive and piecemeal approach leads to data architectures and designs that fail to deliver real and measurable value to the business.
  • Despite the growing focus on data, many organizations struggle to develop a cohesive business-driven strategy for effectively managing and leveraging their data assets.

Resolution

Formulate a data strategy that stitches all of the pieces together to better position you to unlock the value in your data:

  • Establish the business context and value: Identify key business drivers for executing on an optimized data strategy, build compelling and relevant use cases, understand your organization’s culture and appetite for data, and ensure you have well-articulated vision, principles, and goals for your data strategy.
  • Ensure you have a solid data foundation: Understand your current data environment, data management enablers, people, skill sets, roles, and structure. Know your strengths and weakness so you can optimize appropriately.
  • Formulate a sustainable data strategy: Round off your strategy with effective change management and communication for building and fostering a data-driven culture.

Info-Tech Insight

  1. As the CDO or equivalent data leader in your organization, a robust and comprehensive data strategy is the number one tool in your toolkit for delivering on your mandate of creating measurable business value from data.
  2. A data strategy should never be formulated disjointed from the business. Ensure the data strategy aligns with the business strategy and supports the business architecture.
  3. Building and fostering a data-driven culture will accelerate and sustain adoption of, appetite for, and appreciation for data and hence drive the ROI on your various data investments.

Why do you need a data strategy?

Your data strategy is the vehicle for ensuring data is poised to support your organization’s strategic objectives.

The dynamic marketplace of today requires organizations to be responsive in order to gain or maintain their competitive edge and place in their industry.

Organizations need to have that 360-degree view of what’s going on and what’s likely to happen.

Disruptive forces often lead to changes in business models and require organizations to have a level of adaptability to remain relevant.

To respond, organizations need to make decisions and should be able to turn to their data to gain insights for informing their decisions.

A well-formulated and robust data strategy will ensure that your data investments bring you the returns by meeting your organization’s strategic objectives.

Organizations need to be in a position where they know what’s going on with their stakeholders and anticipate what their stakeholders’ needs are going to be.

Data cannot be fully leveraged without a cohesive strategy

Most organizations today will likely have some form of data management in place, supported by some of the common roles such as DBAs and data analysts.

Most will likely have a data architecture that supports some form of reporting.

Some may even have a chief data officer (CDO), a senior executive who has a seat at the C-suite table.

These are all great assets as a starting point BUT without a cohesive data strategy that stitches the pieces together and:

  • Effectively leverages these existing assets
  • Augments them with additional and relevant key roles and skills sets
  • Optimizes and fills in the gaps around your current data management enablers and capabilities for the growing volume and variety of data you’re collecting
  • Fully caters to real, high-value strategic organizational business needs

you’re missing the mark – you are not fully leveraging the incredible value of your data.

Cross-industry studies show that on average, less than half of an organization’s structured data is actively used in making decisions

And, less than 1% of its unstructured data is analyzed or used at all. Furthermore, 80% of analysts' time is spent simply discovering and preparing, data with over 70% of employees having access to data they should not. Source: HBR, 2017

Organizational drivers for a data strategy

Your data strategy needs to align with your organizational strategy.

Main Organizational Strategic Drivers:

  1. Stakeholder Engagement/Service Excellence
  2. Product and Service Innovations
  3. Operational Excellence
  4. Privacy, Risk, and Compliance Management

“The companies who will survive and thrive in the future are the ones who will outlearn and out-innovate everyone else. It is no longer ‘survival of the fittest’ but ‘survival of the smartest.’ Data is the element that both inspires and enables this new form of rapid innovation.– Joel Semeniuk, 2016

A sound data strategy is the key to unlocking the value in your organization’s data.

Data should be at the foundation of your organization’s evolution.

The transformational insights that executives are constantly seeking to leverage can be unlocked with a data strategy that makes high-quality, well-integrated, trustworthy, relevant data readily available to the business users who need it.

Whether hoping to gain a better understanding of your business, trying to become an innovator in your industry, or having a compliance and regulatory mandate that needs to be met, any organization can get value from its data through a well-formulated, robust, and cohesive data strategy.

According to a leading North American bank, “More than one petabyte of new data, equivalent to about 1 million gigabytes” is entering the bank’s systems every month. – The Wall Street Journal, 2019

“Although businesses are at many different stages in unlocking the power of data, they share a common conviction that it can make or break an enterprise.”– Jim Love, ITWC CIO and Chief Digital Officer, IT World Canada, 2018

Data is a strategic organizational asset and should be treated as such

The expression “Data is an asset” or any other similar sentiment has long been heard.

With such hype, you would have expected data to have gotten more attention in the boardrooms. You would have expected to see its value reflected on financial statements as a result of its impact in driving things like acquisition, retention, product and service development and innovation, market growth, stakeholder satisfaction, relationships with partners, and overall strategic success of the organization.

The time has surely come for data to be treated as the asset it is.

“Paradoxically, “data” appear everywhere but on the balance sheet and income statement.”– HBR, 2018

“… data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset.”– “5 Essential Components of a Data Strategy,” SAS

According to Anil Chakravarthy, who is the CEO of Informatica and has a strong vantage point on how companies across industries leverage data for better business decisions, “what distinguishes the most successful businesses … is that they have developed the ability to manage data as an asset across the whole enterprise.”– McKinsey & Company, 2019

How data is perceived in today’s marketplace

Data is being touted as the oil of the digital era…

But just like oil, if left unrefined, it cannot really be used.

"Data is the new oil." – Clive Humby, Chief Data Scientist

Source: Joel Semeniuk, 2016

Enter your data strategy.

Data is being perceived as that key strategic asset in your organization for fueling innovation and transformation.

Your data strategy is what allows you to effectively mine, refine, and use this resource.

“The world’s most valuable resource is no longer oil, but data.”– The Economist, 2017

“Modern innovation is now dependent upon this data.”– Joel Semeniuk, 2016

“The better the data, the better the resulting innovation and impact.”– Joel Semeniuk, 2016

What is it in it for you? What opportunities can data help you leverage?

GOVERNMENT

Leveraging data as a strategic asset for the benefit of citizens.

  • The strategic use of data can enable governments to provide higher-quality services.
  • Direct resources appropriately and harness opportunities to improve impact.
  • Make better evidence-informed decisions and better understand the impact of programs so that funds can be directed to where they are most likely to deliver the best results.
  • Maintain legitimacy and credibility in an increasingly complex society.
  • Help workers adapt and be competitive in a changing labor market.
  • A data strategy would help protect citizens from the misuse of their data.

Source: Privy Council Office, Government of Canada, 2018

What is it in it for you? What opportunities can data help you leverage?

FINANCIAL

Leveraging data to boost traditional profit and loss levers, find new sources of growth, and deliver the digital bank.

  • One bank used credit card transactional data (from its own terminals and those of other banks) to develop offers that gave customers incentives to make regular purchases from one of the bank’s merchants. This boosted the bank’s commissions, added revenue for its merchants, and provided more value to the customer (McKinsey & Company, 2017).
  • In terms of enhancing productivity, a bank used “new algorithms to predict the cash required at each of its ATMs across the country and then combined this with route-optimization techniques to save money” (McKinsey & Company, 2017).

A European bank “turned to machine-learning algorithms that predict which currently active customers are likely to reduce their business with the bank.” The resulting understanding “gave rise to a targeted campaign that reduced churn by 15 percent” (McKinsey & Company, 2017).

A leading Canadian bank has built a marketplace around their data – they have launched a data marketplace where they have productized the bank’s data. They are providing data – as a product – to other units within the bank. These other business units essentially represent internal customers who are leveraging the product, which is data.

Through the use of data and advanced analytics, “a top bank in Asia discovered unsuspected similarities that allowed it to define 15,000 microsegments in its customer base. It then built a next-product-to-buy model that increased the likelihood to buy three times over.” Several sets of big data were explored, including “customer demographics and key characteristics, products held, credit-card statements, transaction and point-of-sale data, online and mobile transfers and payments, and credit-bureau data” (McKinsey & Company, 2017).

What is it in it for you? What opportunities can data help you leverage?

HEALTHCARE

Leveraging data and analytics to prevent deadly infections

The fifth-largest health system in the US and the largest hospital provider in California uses a big data and advanced analytics platform to predict potential sepsis cases at the earliest stages, when intervention is most helpful.

Using the Sepsis Bio-Surveillance Program, this hospital provider monitors 120,000 lives per month in 34 hospitals and manages 7,500 patients with potential sepsis per month.

Collecting data from the electronic medical records of all patients in its facilities, the solution uses natural language processing (NLP) and a rules engine to continually monitor factors that could indicate a sepsis infection. In high-probability cases, the system sends an alarm to the primary nurse or physician.

Since implementing the big data and predictive analytics system, this hospital provider has seen a significant improvement in the mortality and the length of stay in ICU for sepsis patients.

At 28 of the hospitals which have been on the program, sepsis mortality rates have dropped an average of 5%.

With patients spending less time in the ICU, cost savings were also realized. This is significant, as sepsis is the costliest condition billed to Medicare, the second costliest billed to Medicaid and the uninsured, and the fourth costliest billed to private insurance.

Source: SAS, 2019

What is it in it for you? What opportunities can data help you leverage?

RETAIL

Leveraging data to better understand customer preferences, predict purchasing, drive customer experience, and optimize supply and demand planning.

Netflix is an example of a big brand that uses big data analytics for targeted advertising. With over 100 million subscribers, the company collects large amounts of data. If you are a subscriber, you are likely familiar with their suggestions messages of the next series or movie you should catch up on. These suggestions are based on your past search data and watch data. This data provides Netflix with insights into your interests and preferences for viewing (Mentionlytics, 2018).

“For the retail industry, big data means a greater understanding of consumer shopping habits and how to attract new customers.”– Ron Barasch, Envestnet | Yodlee, 2019

The business case for data – moving from platitudes to practicality

When building your business case, consider the following:

  • What is the most effective way to communicate the business case to executives?
  • How can CDOs and other data leaders use data to advance their organizations’ corporate strategy?
  • What does your data estate look like? Are you looking to leverage and drive value from your semi-structured and unstructured data assets?
  • Does your current organizational culture support a data-driven one? Does the organization have a history of managing change effectively?
  • How do changing privacy and security expectations alter the way businesses harvest, save, use, and exchange data?

“We’re the converted … We see the value in data. The battle is getting executive teams to see it our way.”– Ted Maulucci, President of SmartONE Solutions Inc. IT World Canada, 2018

Where do you stack up? What is your current data management maturity?

Info-Tech’s IT Maturity Ladder denotes the different levels of maturity for an IT department and its different functions. What is the current state of your data management capability?

Innovator - Transforms the Business. Business Partner - Expands the Business. Trusted Operator - Optimizes the Business. Firefighter - Supports the Business. Unstable - Struggles to Support.

Info-Tech Insight

You are best positioned to successfully execute on a data strategy if you are currently at or above the Trusted Operator level. If you find yourself still at the Unstable or Firefighter stage, your efforts are best spent on ensuring you can fulfill your day-to-day data and data management demands. Improving this capability will help build a strong data management foundation.

Guiding principles of a data strategy

Value of Clearly Defined Data Principles

  • Guiding principles help define the culture and characteristics of your practice by describing your beliefs and philosophy.
  • Guiding principles act as the heart of your data strategy, helping to shape initiative plans and day-to-day behaviors related to the use and treatment of the organization’s data assets.

“Organizational culture can accelerate the application of analytics, amplify its power, and steer companies away from risky outcomes.”– McKinsey, 2018

Build a Robust and Comprehensive Data Strategy

Business Strategy and Current Environment connect with the Data Strategy. Data Strategy includes: Organizational Drivers and Data Value, Data Strategy Objectives and Guiding Principles, Data Strategy Vision and Mission, Data Strategy Roadmap, People: Roles and Organizational Structure, Data Culture and Data Literacy, Data Management and Tools, Risk and Feasibility.

Follow Info-Tech’s methodology for effectively leveraging the value out of your data

Some say it’s the new oil. Or the currency of the new business landscape. Others describe it as the fuel of the digital economy. But we don’t need platitudes — we need real ways to extract the value from our data. – Jim Love, CIO and Chief Digital Officer, IT World Canada, 2018

1. Business Context. 2. Data and Resources Foundation. 3. Effective Data Strategy

Our practical step-by-step approach helps you to formulate a data strategy that delivers business value.

  1. Establish Business Context and Value: In this phase, you will determine and substantiate the business drivers for optimizing the data strategy. You will identify the business drivers that necessitate the data strategy optimization and examine your current organizational data culture. This will be key to ensuring the fruits of your optimization efforts are being used. You will also define the vision, mission, and guiding principles and build high-value use cases for the data strategy.
  2. Ensure You Have a Solid Data and Resources Foundation: This phase will help you ensure you have a solid data and resources foundation for operationalizing your data strategy. You will gain an understanding of your current environment in terms of data management enablers and the required resources portfolio of key people, roles, and skill sets.
  3. Formulate a Sustainable Data Strategy: In this phase, you will bring the pieces together for formulating an effective data strategy. You will evaluate and prioritize the use cases built in Phase 1, which summarize the alignment of organizational goals with data needs. You will also create your strategic plan, considering change management and communication.

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

Guided Implementation

“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

Workshop

“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

Consulting

“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

Diagnostics and consistent frameworks are used throughout all four options.

Quality Management

  • Buy Link or Shortcode: {j2store}45|cart{/j2store}
  • Related Products: {j2store}45|crosssells{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Service Planning and Architecture
  • Parent Category Link: /service-planning-and-architecture
Drive efficiency and agility with right-sized quality management

Drive Ongoing Adoption With an M365 Center of Excellence

  • Buy Link or Shortcode: {j2store}66|cart{/j2store}
  • member rating overall impact: 9.0/10 Overall Impact
  • member rating average dollars saved: 20 Average Days Saved
  • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
  • Parent Category Name: End-User Computing Applications
  • Parent Category Link: /end-user-computing-applications

There are roadblocks common to all CoEs: lack of in-house expertise, lack of resources (time, budget, etc.), and employee perception that this is just another burdensome administrative layer. These are exacerbated when building an M365 CoE.

  • Constant vendor-initiated change in M365 means expertise always needs updating.
  • The self-service architecture of M365 is at odds with centralized limits and controls.
  • M365 has a multitude of services that can be adopted across a huge swath of the organization compared to the specific capabilities and limited audience of traditional CoEs.

Our Advice

Critical Insight

The M365 CoE should be somewhat decentralized to avoid an “us versus them” mentality. Having clear KPIs at the center of the program makes it easier to demonstrate improvements and competencies. COMMUNICATE these early successes! They are vital in gaining widespread credibility and momentum.

Impact and Result

Having a clear vision of what you want business outcomes you want your Microsoft 365 CoE to accomplish is key. This vision helps select the core competencies and deliverables of the CoE.

  • Ongoing measurement and reporting of business value generated from M365 adoption.
  • Servant leadership allows the CoE to work closely and deeply with end users, which builds them up to share knowledge with others
  • Focus and clear lines of accountability ensure that everyone involved feels part of the compromise when decisions are to be made.

Drive Ongoing Adoption With an M365 Center of Excellence Research & Tools

Build out your M365 CoE competencies, membership, and roles; create success metrics and build your M365 adoption, then communicate

In this deck we explain why your M365 CoE needs to be distributed and how it should be organized. Using a roadmap will assist you in building competency and maturity through training, certifications, and building governance.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

  • Drive Ongoing Adoption With an M365 Center of Excellence Storyboard
[infographic]

Further reading

Drive Ongoing Adoption With an M365 Center of Excellence

Accelerate business processes change and get more value from your subscription by building and sharing thanks to an effective Centre of Excellence.

CLIENT ADVISORY DECK

Drive Ongoing Adoption With an M365 Centre of Excellence

Accelerate business processes change and get more value from your subscription by building and sharing thanks to an effective Centre of Excellence

Research Team:
John Donovan
John Annand
Principal Research Directors I&O Practice

41 builds released in 2021!
IT can no longer be expected to provide training to all users on all features

  • Traditional classroom training (online and self-paced) is time consuming and overly generic
  • Users tend to hold onto old familiar tools even as new ones roll out
  • Citizen Programming comes with a lot of promise but also the spectre of reliving the era of Access ‘97 databases
  • Seemingly small decisions around configuration have outsized impacts
  • Every enterprises’ journey through adoption is unique

▲20% $ spent in 2021

148% more meetings
66% more users collaborating on documents
40.6B more emails

2021 vs. 2022 Source: Microsoft The Work Trend Index

  • Who needs to be in a CoE? What daily tasks do they undertake?
  • How do you turn artifacts like best practice documents into actual behavioral change?
  • How does CoE differ from governance? And why is it going to be any more successful?
  • How does the CoE evolve over time as enterprises become more mature?

CoE Competencies, Membership and Roles
Communication, Standards Templates
Adoption, and Business Success Metrics

this image depicts the key CoE Competencies: Goals; Controls; Tools; Training; and Support

Using these deliverables, Info-Tech will help you drive consistency in your enterprise collaboration, increase end-user satisfaction in the tools they are provided, optimize your license spending, fill the gaps between implementation of a technology and realization of business value, and empower end-users to innovate in ways that senior leadership had not imagined.

Executive Summary

Insight

User adoption is the primary focus of the efforts in the CoE

User adoption and setting up guardrails in governance are the focuses of the CoE in its early stages. Purging obsolete data from legacy share servers, and exchange, and rationalize legacy applications that are comparable to Microsoft offerings. The primary goal is M365 excellence, but that needs to be primed with a Roadmap, and laying down clear milestones to show progress, along with setting up quick wins to get buy in from the organization.

Breakdown your CoE into distinct areas for improvement

Due to the size and complexity of Microsoft 365, breaking it into clearly defined divisions makes sense. The parts that need to be fragmented into are, Collaboration, Power Apps, Office tools, Learning, Professional Training and Certifications, Governance and Support. Subject Matter experts needs to keep pace with the ever-changing M365 environment with enhancements continuously being rolled out. (There were 41 build releases in 2021 alone! )

Set up your M365 CoE in a decentralized design

Define how your CoE will be set up. It will either be centralized, distributed, or a combination of both. They all have their strengths and weaknesses; however a distributed CoE can ensure there is buy-in from the various departments across the CoE, as they participate in the decision making and therefore the direction the CoE goes. Additionally, it ensures that each segment of the CoE is accountable for the success of the M365 adoption, its usage, and delivering value to the organization.

Summary

Your Challenge

You have purchased Microsoft 365 for your business, and you have determined that you are not realizing the full value and potential of the product, neither adoption nor usage – for example, you have legacy applications that the user base is reluctant to move away from, whether it be Skype, Jabber, or other collaboration tools available to them. You have released Teams to the organization but may have not shown how useful it is and you have not communicated to the business that it is your new collaboration tool, along with SharePoint Online and OneDrive. How do you fix this problem?

Common Obstacles

There are roadblocks common to all CoEs: lack of in-house expertise, lack of resources (time, budget, etc.) and employee perception of just another burdensome administrative layer. These are exacerbated when building an M365 CoE.

  • Constant vendor-initiated change in M365 means expertise always needs updating
  • The self-service architecture of M365 is at odds with centralized limits and controls
  • M365 is a multitude of services, adopted across a huge swath of the organization compared to the specific capabilities and limited audience of traditional CoEs

Info-Tech’s Approach

Having a clear vision of what business outcomes you want your Microsoft 365 CoE to accomplish is key. This vision helps select the core competencies and deliverables of the CoE.

  1. Ongoing measurement and reporting of business value generated from M365 adoption
  2. Servant leadership allows the CoE to work closely and deeply with end-users, which builds them up to share knowledge with others
  3. Focus and clear lines of accountability ensure that everyone involved feels part of the compromise when decisions are to be made

Info-Tech Insight

The M365 CoE should be somewhat decentralized to avoid an “us versus them” mentality. Having clear KPIs at the center of the program makes it easier to demonstrate improvements and competencies. COMMUNICATE these early successes! They are vital in gaining widespread credibility and momentum.

Charter Mandate Authority to Operate

Mission : To accelerate the value that M365 brings to the organization by using the M365 CoE to increase adoption, build competency through training and best practices, and deliver on end user innovation throughout the business.

Vision Statement: To transform the organization’s efficiencies and performance through an optimized world-class M365 CoE by meeting all KPIs set out in the Charter.

Info-Tech Insights

A mission and vision for your M365 CoE are a necessary step to kick the program off. Not aving clear goals and a roadmap to get there will hinder your progress. It may even stall the whole objective if you cannot agree or measure what you are trying to accomplish

  • The scope of the M365 CoE is to build the adoption rate that can meet milestone goals to advance user competency, as well as the maturation of the SMEs in each segment of the CoE leadership and contributors.
  • Maturity will be measured through 100% adoption, specifically around collaboration tools and Office apps across the organization that use M365. Strategic value will be measured by core competencies within the CoE.
  • SMEs are developed and educated with certifications and other training throughout the course of the CoE development to bring “bench strength” to the vision of optimizing a world-class M365 CoE.
  • SMEs will all be certified Microsoft professionals. They will set the standard to be met within the CoE. The SMEs can either be internal candidates or external hires, depending on the current IT department competency.
  • Additional resources required will be tech savvy department leads that understand and can help in the training of staff, who also are willing to spend a certain amount of their work time in coaching colleagues.
  • They will be assisted by the training through the SMEs providing relevant material and various M365 courses both in class and self-paced online learning using M365 VIVA tools.

Charter Metrics

Areas in Scope:

  • Ensure Mission is aligned to the business objectives.
  • Form core team for M365 CoE, including steering committee.
  • Create document for signoff from business sponsors.
  • Build training plans for users, engineers, and admins.
  • Document best practices and build standard templates for organizational uniformity.
  • Build governance charter and priorities, setting up guardrails early to ensure compliance and security.
  • Transition away and retire all legacy on-Prem apps to M365 Cloud apps.
  • Build a RACI model for roles and responsibility.

Info-Tech Insights

If meaningful metrics are set up correctly, the CoE can produce results early in the one- or two-year process, demonstrating business value and increasing production amongst staff and demonstrating SME development.

this image contains example metrics, spread across three phases.

CoE

What are the reason to build an M365 CoE, and what is it expected to deliver?

What It IS NOT

It does not design or build applications, migrate applications, or create migration plans. It does not deploy applications nor does it operate and monitor applications. While a steering committee is a key part of the M365 CoE, its real function is to set the standards to be achieved though metrics that can measure a successful, efficient, and best-in-class M365 operation. It does not set business goals but does align M365 goals to the business drivers. SMEs in the CoE give guidance on M365 best practices and assist in its adoption and users’ competency.

What It IS

M365 CoE means investing in and developing usage growth and adoption while maintaining governance and control. A CoE is designed to drive innovation and improvement, and as a business-wide functional unit, it can break down geographical and organizational silos that utilize their own tools and collaboration platforms. It builds a training and artifacts database of relevant and up-to-date materials.

Why Build It

Benefits that can be realized are:

  • Building efficiencies, delivering quality training and knowledge transfer, and reducing risk from an organized and effective governance.
  • Consistency in document and information management.
  • Reusable templates and blueprints that standardize the business processes.
  • Standardized and communicated business policies around security and best practices.
  • Overcoming the challenges that comes with the titan of a platform that is M365.

Expected Goals and Benefits With Risk

Demonstrated impact for sustainability
Ensuring value is delivered
Ability to escalate to executive branch

The What?

What does the M365 CoE solve?

  • M365 Adoption
  • M365 tools templates
  • SME in tools deployment and delivery
  • Training and education – create artifacts and organize training sessions and certifications
  • Empower users into super users
  • Build analytics around usage, adoption, and ROI from license optimization

And the How?

How does the M365 CoE do it?

  • By defining clear adoption goals and best practices
  • By building a dedicated team with the confidence to improve the user experience
  • By creating a collection of reusable artifacts.
  • By establishing a stable, tested environment ensures users are not hindered in execution of the tools
  • By continuously improving M365 processes

What are the Risks?

  • All goals must be achievable
  • Timeline phases are based on core SME competency of the IT department and the training quality of end users
  • Current state of SMEs in house or hired to execute the mandate of the M365 CoE
  • Business success – if business is struggling to make profits and grow, its usually the CoE that will get chopped – mainly due to layoffs
  • Inability to find SMEs or train SMEs
  • Turnover in CoE due to job function changes or attrition
  • Overload of day-to-day responsibilities preventing SMEs from executing work for the CoE – Need to align SMEs and CoE steering chair to establish and enable shared responsibilities.

Who needs to be in a CoE for M365

Design the CoE – What model to be used?

What are their daily tasks? Is the CoE centralized, decentralized, or a combination?

a flow chart is depicted, starting with the executive steering committee, describing governance 365, and VP applications.

Info-Tech Insights

Due to the size and complexity of Microsoft 365, a decentralized model works best. Each segment of the group could in themselves be a CoE, as in governance, training, or collaboration CoE. Maintaining SME in each group will drive the success of the M365 CoE.

Key Competencies for CoE

  • Build a team of experts in M365 with sub teams in Products.
  • Manage the business processes around M365.
  • Train and optimize technical teams.
  • Share best practices and create a knowledge base.
  • Build processes that are repeatable and self-provisioned.
This image depicts the core Coe Competencies, Strategy; Technology; Governance; and Skills/Capabilities.

CoE for M365

What is the Structure? Is it centralized, decentralized, or combination? What are the pros and cons?

Thought Model

This image depicts a thought model describing CoE for M365.

How does the CoE differ from governance?

Why is it going to be any more successful?

“These problems already exist and haven't been successfully addressed by governance – how is the CoE going to be any different?”

  • Leadership
  • Empower end users
  • Automation of processes
  • Retention policies
  • Governance priorities
  • Risk management
  • Standard procedures
  • Set metrics
  • Self service
  • Training
  • SMEs
  • Automation
  • Innovation

CoE

While M365 governance is an integral part of the M365 CoE, the CoE is a more strategic program aimed at providing guidance, experienced leadership, and training.

The CoE is designed to drive innovation and improvements throughout the organization’s M365 deployment. It will build best practices, create artifacts, and mentor members to become SMEs.

Governance

CoE is a form of collaborative governance. Those responsible for making the rules are the same ones who are working through how the rules are implemented in practice.

The word most associated with CoE is "nurture." The word most associated with governance is "prevent."

The CoE is experimental and innovative and constantly revising its guidance compared to governance, which is opaque and static.

RACI chart for CoE define activities and ownership

The Work

Build artifacts

Templates

Scripts

Reference architecture

Policies definition

Blueprints

Version control

Measure usage and ROI

Quality assurance

Baseline creation and integrity

ActivitiesSupport Steering CTraining TeamM365 Tools Admin M365 Security AdminDoc Mgt
Monitor M365 ChangeAIRR
CommunicationsIR
TrainingAR
Support – Microsoft + HelpdeskRI
Monitor UsageR
Security and ComplianceAR
Decom On-PremAR
Eliminate Shadow ITR
Identity and AccessAR
Automate Policies in TennantAR
Audit MonitorAR
Data and Information ProtectionARR
Build TemplatesAAR
Manage ArtifactsARA

Steering Committee

This image contains a screenshot of the organization of the CoE Steering Committee

Roles and Responsibilities

  • Set the goals and metrics for the CoE charter
  • Ensure the CoE is aligned to the business objectives
  • Clear any roadblocks that may hinder progress for the team leads
  • Provide guidance on best practices
  • Set expectations for training and certifications
  • Build SME strength through mentoring
  • Promote and facilitate research into M365 developments and releases
  • Ensure knowledge transfer is documented
  • Create roadmap to ensure phase KPIs are met and drive toward excellence

Info-Tech Insight

Executive sponsorship is an element of the CoE that cannot be overlooked. If this occurs, the funding and longevity of the CoE will be limited. Additionally, ensure you determine if the CoE will have an end of life and what that looks like.

M365 Governance CoE Team

Governance and Management

After you’ve developed and implemented your data classification framework, ongoing governance and maintenance will be critical to your success. In addition to tracking how sensitivity labels are used in practice, you’ll need to update your control requirements based on changes in regulations, cybersecurity leading practices, and the nature of the content you manage. Governance and maintenance efforts can include:

  • Establishing a governance body dedicated to data classification or adding a data classification responsibility to the charter of an existing information security body.
  • Defining roles and responsibilities for those overseeing Data Classification
  • Establishing KPIs to monitor and measure progress
  • Tracking cybersecurity leading practices and regulatory changes
  • Developing Standard Operating Procedures that support and enforce a data classification framework

Governance CoE

Tools Used in the Governance CoE Identity – MFA, SSO, Identity Manager, Conditional Access, AD , Microsoft Defender, Compliance Assessments Templates

Security and Compliance - Azure Purview, Microsoft Defender Threat Analytics, Rules-Based Classification (AIP Client & Scanner), Endpoint DLP, Insider Risk Management

Information Management – Audit Log Retention, Information Protection and Governance, Trainable Classifiers

Licenses – Entitlement Management, Risk-Based Conditional Access.

 This image depicts the M365 Governance CoE Team organization.

M365 Tools CoE Team

  • Collaboration tools are at the center of the product portfolio for M365.
  • Need to get users empowered to manage and operate Teams, OneDrive, and SharePoint Online and promote uniform communications and collaborate with document building, sharing, and storing.

This image depicts a screenshot of the Tools CoE Team organization

Collaboration SME – Teams admin, Exchange admin, SharePoint, One Drive admin, Viva Learning (Premium), and Viva Insights (Premium)

Application SME – Covers all updates and new features related to Office programs

Power BI SME – Covers Power Automate for Office 365, Power Apps for Office 365, and Power BI Pro

Voice and Video – Tools-Calling Plan, Audio Conference (Full), Teams Phone, Mobility

PMO – Manages all M365 products online and in production. Also coordinates enhancements, writes up documentation for updates, and releases them to the training CoE for publication.

Microsoft 365 tools used to support business

M365 Training CoE Team

Training and certifications for both end users and technical staff managing the M365 platform. Ensure that you set goals and objectives with your training schedule.

this image depicts the framework for the training CoE team.

Training for SMEs can be broken into two categories:

First line training is internal training for users, in the collaboration space. Teams, One Drive, SharePoint Online, Exchange, and specialty training on Office tools – Word, PowerPoint, Excel, and Microsoft Forms.

Second line training is professional development for the SMEs including certifications in M365 admin, Global admin, Teams admin, and SharePoint administrator.

Additional training and certification can be obtained in governance, information management, and in the admin center for licencing optimization and compliance.

Tools used

  • Viva topics – Integrated knowledge and expert discovery
  • Viva Insight
  • Viva Learning
  • Viva Connections
  • Dynamics 365
  • Voice of the customer surveys

Support M365 CoE Team

This image depicts the framework for m365 CoE team support.

Support CoE:

In charge of creating a knowledge base for M365. Manages incidents with access, usage, and administering apps to desktop. Manages change issues related to updates in patching.

Help Desk Admin:

Resets passwords when self service fails, force sign out, manages service requests.

Works with learning CoE to populate knowledge base with articles and templates.

Manages end user issues with changes and enhancements for M365.

Supporting Metrics

  • Number of calls for M365 support
  • Recurring M365 incidents
  • Number of unresolved Platform issues
  • First call resolution
  • Knowledge sharing of M365
  • Customer satisfaction
  • Turnaround time of tickets created

Roadmap

How does the CoE evolve over time as enterprises become more mature?

  • Depending on the complexity and regulatory requirements of the business, baseline governance and rules around external partners sharing internal documents will need to be set up.
  • Identifying your SMEs in the organization is a perquisite at the beginning stages of setting up the M365 working group.
  • Build a roadmap to get to maturity and competency that brings strategic business value.
  • Meet milestone goals through a two-year, three-phase process. Begin with setting up governance guardrails.
  • Set up foundational baselines against which metrics will be measured.
  • Set up the M365 CoE, at first with target easy wins through group training and policy communications throughout the organization.
this image depicts the CoE Roadmap, from Foundational Baseline, to Standardize Process, to Optimization

How do you turn artifacts like best practice documents into actual behavior change?

this image depicts the process of turning M365 ARtifacts into actual behavioural change within a company

Info-Tech Insights

Building Blocks
The building blocks for a change in end user behavior are based on four criteria which must be clearly communicated. Knowledge transfer from SMEs to the training team is key. That in turn leads to effective knowledge transfer, allowing end users to develop skills quickly that can be shared with their teams. Sharing practices leads to best practices and maintaining these in a repository that can be quickly accessed will build on the efficiencies and effectiveness of the employees.

How Do You Empower End Users to Innovate?

Info-Tech Insights

Understand the Vision

Empowering End users starts with understanding the business vision that is embedded into the M365 CoE charter.

Ensure that the business innovation goals are aligned to the organizational strategies.

The innovative strategies need to be clearly communicated to the employees and the tools to achieve this needs to be mapped out and trained. Clearly lay out the goals, outcomes, and expectations.

End users need to understand how the M365 CoE will assist them in their day-to-day operations, whether in the collaboration space with their colleagues, or with power BI that assists them in their decision making though analytics.

The Right Resources

Arm your team with the resources they need to be successful. Building use cases as part of the training program will give the employees insight into how the M365 tools can be used in their daily work environment. It will also address the pervasive use of nonstandard tools as is seen throughout organizations that are operated in a vacuum.

Empowering your user base though the knowledge transfer borne through the building of artifacts that deal with real life examples that join the dots for employees.

By painting a picture of how the innovative use of the M365 platform can be achieved, users will feel empowered and use those use cases to build out their own innovative ideas.

Hybrid Work

Digital fabric

Collaboration – Communication – Creation

Cloud Services – Innovative Apps – Security

Productivity anywhere any place

Shared working documents in secure cloud

Mesh for Microsoft Teams/Viva

Power apps and dataverse for Teams

Self Service M365

My Apps

My Sign-Ins

My Groups

My Staff

My Access

My Account

Password reset

Sample Best Practices
Tools and Standards Templates

Then communicate them

Collaboration Best Practices

Sharing documents

Real time co-authoring

Comment

Meet

Mobile

Version History

Security Best Practices

This is a screenshot of the Security Best Practices

Default Security Settings

Microsoft Security Score

Enable Alert Policies

Assign RBAC for Admins

Enable Continuous Access Evaluation

Admin Roles Best Practices in M365

This is a screenshot of the admin roles best ractices in M365.

Business Success Metrics for M365 CoE

What does success look like?

  • Are you aligning the M365 metrics to business goals?
  • Are your decisions data driven?
  • Are you able to determine opportunities to improve with your metrics – continuous process improvement?
  • Are you seeing productivity gains, and are they being measured?
This image contains a screenshot of the Business Success Metrics for M365-CoE: SMC Training; Content published and tagged; Usage Metrics; Cost Metrics; Adoption Metrics; New Product Introduction

Activity Output

Start building your M365 CoE and considering the steps for the Phase 1 checklist

BUILD A FOUNDATIONAL BASELINE

Step 1

  1. Select Resources to create a CoE working group
  2. Define your goals and objectives
  3. Identify SMEs within the business and do a gap analysis
  4. Build the M365 charter, mission, and vision
  5. Build consensus and sponsorship from C suite
  6. Create an organizational M365 framework that provides best coverage for all touch points to the platform, from support to training to controls.
  7. Determine the type of CoE you want to create that fits your business (centralized, distributed, or a combination).

Step 2

  1. Build training plans for SMEs and M365 teams
  2. Populate company intranet with artifacts, knowledge articles, and user training portal with all things M365
  3. Build out best practice workbooks, tools, and templates that encompass all departments
  4. Create roles and responsibilities matrix
  5. Identify “super users” in departments to assist with promoting learning and knowledge sharing.
  6. Develop Metrics scorecards on success criteria ensuring they align to business goals

Step 3

  1. Rational M365 licensing
  2. Create communication plan promoting CoE and M365 advantages
  3. Align your governance posture and building guardrails
  4. Identify legacy apps that can be retired and replaced
  5. Train support team and analysts with metrics supporting M365 CoE goals
  6. Create baseline metrics with clear alignment to business KPIs

Related Blueprints

Modernize Your Microsoft Licensing for the Cloud Era

  • Take control of your Microsoft licensing and optimize spend

Govern Office 365

  • Office 365 is as difficult to wrangle as it is valuable. Leverage best practices to produce governance outcomes aligned with your goals

Migrate to Office 365 Now

  • One small step to cloud, one big leap to Office 365. The key is to look before you leap

Build a Data Classification MVP for M365

  • Kickstart your governance with data classification users will actually use!

Bibliography

“Five Guiding Principles of a successful Center of Excellence” Perficient, n.d. Web.

“Self Service in Microsoft 365.” Janbakker.tech, n.d. Web.

“My Apps portal overview.” Microsoft, June 2, 2022. Web.

“Collaboration Best Practices Microsoft365.” Microsoft, n.d. Web.

“Security Best Practices Microsoft 365” Microsoft, July 1, 2022. Web.

Optimize Software Pricing in a Volatile Competitive Market

  • Buy Link or Shortcode: {j2store}566|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Marketing Solutions
  • Parent Category Link: /marketing-solutions

Your challenge:

  • Rising supplier costs and inflation are eroding margins and impacting customers' budgets.
  • There is pressure from management to make a gut-feeling decision because of time, lack of skills, and process limitations.
  • You must navigate competing pricing-related priorities among product, sales, and finance teams.
  • Product price increases fail because discovery lacks understanding of costs, price/value equation, and competitive price points.
  • Customers can react negatively, and results are seen much later (more than 12 months) after the price decision.

Our Advice

Critical Insight

Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.

Impact and Result

  • Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and assumptions. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.
  • This will build skills on how to price new products or adjust pricing for existing products. The disciplines using our pricing strategy methodology will strengthen efforts to develop repeatable pricing models and processes and build credibility with senior management.

Optimize Software Pricing in a Volatile Competitive Market Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Optimize Software Pricing in a Volatile Competitive Market Executive Brief - A deck to build your skills on how to price new products or adjust pricing for existing products.

This Executive Brief will build your skills on how to price new products or adjust pricing for existing products.

  • Optimize Software Pricing in a Volatile Competitive Market Executive Brief

2. Optimize Software Pricing in a Volatile Competitive Market Storyboard – A deck that provides key steps to complete the project.

This blueprint will build your skills on how to price new products or adjust pricing for existing products with documented key steps to complete the pricing project and use the Excel workbook and customer presentation.

  • Optimize Software Pricing in a Volatile Competitive Market – Phases 1-3

3. Optimize Software Pricing in a Volatile Competitive Market Workbook – A tool that enables product managers to simplify the organization and collection of customer and competitor information for pricing decisions.

These five organizational workbooks for product pricing priorities, interview tracking, sample questions, and critical competitive information will enable the price team to validate price change data through researching the three pricing schemes (competitor, customer, and cost-based).

  • Optimize Software Pricing in a Volatile Competitive Market Workbook

4. Optimize Software Pricing in a Volatile Competitive Market Presentation Template – A template that serves as a guide to communicating the Optimize Pricing Strategy team's results for a product or product line.

This template includes the business case to justify product repricing, contract modifications, and packaging rebuild or removal for launch. This template calls for the critical summarized results from the Optimize Software Pricing in a Volatile Competitive Market blueprint and the Optimize Software Pricing in a Volatile Competitive Market Workbook to complete.

  • Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Infographic

Further reading

SoftwareReviews — A Division of INFO~TECH RESEARCH GROUP

Optimize Software Pricing in a Volatile Competitive Market

Leading SaaS product managers align pricing strategy to company financial goals and refresh the customer price/value equation to avoid leaving revenues uncaptured.

Table of Contents

Section Title Section Title
1 Executive Brief 2 Key Steps
3 Concluding Slides

Optimize Software Pricing in a Volatile Competitive Market

Leading SaaS product managers align pricing strategy to company financial goals and refresh the customer price/value equation to avoid leaving revenues uncaptured.

EXECUTIVE BRIEF

Analyst Perspective

Optimized Pricing Strategy

Product managers without well-documented and repeatable pricing management processes often experience pressure from “Agile” management to make gut-feel pricing decisions, resulting in poor product revenue results. When combined with a lack of customer, competitor, and internal cost understanding, these process and timing limitations drive most product managers into suboptimal software pricing decisions. And, adding insult to injury, the poor financial results from bad pricing decisions aren’t fully measured for months, which further compounds the negative effects of poor decision making.

A successful product pricing strategy aligns finance, marketing, product management, and sales to optimize pricing using a solid understanding of the customer perception of price/value, competitive pricing, and software production costs.

Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and data. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.

This blueprint will build your skills on how to price new products or adjust pricing for existing products. The discipline you build using our pricing strategy methodology will strengthen your team’s ability to develop repeatable pricing and will build credibility with senior management and colleagues in marketing and sales.

Photo of Joanne Morin Correia, Principal Research Director, SoftwareReviews.

Joanne Morin Correia
Principal Research Director
SoftwareReviews

Executive Summary

Organizations struggle to build repeatable pricing processes:
  • A lack of alignment and collaboration among finance, marketing, product development, and sales.
  • A lack of understanding of customers, competitors, and market pricing.
  • Inability to stay ahead of complex and shifting software pricing models.
  • Time is wasted without a deep understanding of pricing issues and opportunities, and revenue opportunities go unrealized.
Obstacles add friction to the pricing management process:
  • Pressure from management to make quick decisions results in a gut-driven approach to pricing.
  • A lack of pricing skills and management processes limits sound decision making.
  • Price changes fail because discovery often lacks competitive intelligence and buyer value to price point understanding. Customers’ reactions are often observed much later, after the decision is made.
  • Economic disruptions, supplier price hikes, and higher employee salaries/benefits are driving costs higher.
Use SoftwareReviews’ approach for more successful pricing:
  • Organize for a more effective pricing project including roles & responsibilities as well as an aligned pricing approach.
  • Work with CFO/finance partner to establish target price based on margins and key factors affecting costs.
  • Perform a competitive price assessment and understand the buyer price/value equation.
  • Arrive at a target price based on the above and seek buy-in and approvals.

SoftwareReviews Insight

Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and they will make ongoing adjustments based on an ability to monitor buyers, competitors, and product cost changes.

What is an optimized price strategy?

“Customer discovery interviews help reduce the chance of failure by testing your hypotheses. Quality customer interviews go beyond answering product development and pricing questions.” (Pricing Strategies, Growth Ramp, March 2022)

Most product managers just research their direct competitors when launching a new SaaS product. While this is essential, competitive pricing intel is insufficient to create a long-term optimized pricing strategy. Leaders will also understand buyer TCO.

Your customers are constantly comparing prices and weighing the total cost of ownership as they consider your competition. Why?

Implementing a SaaS solution creates a significant time burden as buyers spend days learning new software, making sure tools communicate with each other, configuring settings, contacting support, etc. It is not just the cost of the product or service.

Optimized Price Strategy Is…
  • An integral part of any product plan and business strategy.
  • Essential to improving and maintaining high levels of margins and customer satisfaction.
  • Focused on delivering the product price to your customer’s business value.
  • Understanding customer price-value for your software segment.
  • Monitoring your product pricing with real-time data to ensure support for competitive strategy.
Price Strategy Is Not…
  • Increasing or decreasing price on a gut feeling.
  • Changing price for short-term gain.
  • Being wary of asking customers pricing-related questions.
  • Haphazardly focusing entirely on profit.
  • Just covering product costs.
  • Only researching direct competitors.
  • Focusing on yourself or company satisfaction but your target customers.
  • Picking the first strategy you see.

SoftwareReviews Insight

An optimized pricing strategy establishes the “best” price for a product or service that maximizes profits and shareholder value while considering customer business value vs. the cost to purchase and implement – the total cost of ownership (TCO).

Challenging environment

Product managers are currently experiencing the following:
  • Supplier costs and inflation are rising, eroding product margins and impacting customers’ budgets.
  • Pressure from management to make a gut-feeling decision because of time, lack of skills, and process limitations.
  • Navigating competing pricing-related priorities among product, sales, and finance.
  • Product price increases that fail because discovery lacks understanding of costs, price/value equation, and competitive price points.
  • Slowing customer demand due to poorly priced offerings may not be fully measured for many months following the price decision.
Doing nothing is NOT an option!
Offense Double Down

Benefit: Leverage long-term financial and market assets

Risk: Market may not value those assets in the future
Fight Back

Benefit: Move quickly

Risk: Hard to execute and easy to get pricing wrong
Defense Retrench

Benefit: Reduce threats from new entrants through scale and marketing

Risk: Causes managed decline and is hard to sell to leadership
Move Away

Benefit: Seize opportunities for new revenue sources

Risk: Diversification is challenging to pull off
Existing Markets and Customers New Markets and Customers

Pricing skills are declining

Among product managers, limited pricing skills are big obstacles that make pricing difficult and under-optimized.

Visual of a bar chart with descending values, each bar has written on it: 'Limited - Limits in understanding of engineering, marketing, and sales expectations or few processes for pricing and/or cost', 'Inexperienced - Inexperience in pricing project skills and corporate training', 'Lagging - Financial lag indicators (marketing ROI, revenue, profitability, COGs)', 'Lacking - Lack of relevant competitive pricing/packaging information', 'Shifting - Shift to cloud subscription-based revenue models is challenging'.

The top three weakest product management skills have remained constant over the past five years:
  • Competitive analysis
  • Pricing
  • End of life
Pricing is the weakest skill and has been declining the most among surveyed product professionals every year. (Adapted from 280 Group, 2022)

Key considerations for more effective pricing decisions

Pricing teams can improve software product profitability by:
  • Optimizing software profit with four critical elements: properly pricing your product, giving complete and accurate quotations, choosing the terms of the sale, and selecting the payment method.
  • Implementing tailored price changes (versus across-the-board price actions) to help account for inflation exposure, customer willingness to pay, and product attribute changes.
  • Accelerating ongoing pricing decision-making with a dedicated cross-functional team ready to act quickly.
  • Resetting discounting and promotion, and revisiting service-level agreements.
Software pricing leaders will regularly assess:

Has it been over a year since prices were updated?

Have customers told you to raise your prices?

Do you have the right mix of customers in each pricing plan?

Do 40% of your customers say they would be very disappointed if your product disappeared? (Adapted from Growth Ramp, 2021)

Case Study

Middleware Vendor

INDUSTRY
Technology Middleware
SOURCE
SoftwareReviews Custom Pricing Strategy Project
A large middleware vendor, who is running on Microsoft Azure, known for quality development and website tools, needed to react strategically to the March 2022 Microsoft price increase.

Key Initiative: Optimize New Pricing Strategy

The program’s core objective was to determine if the vendor should implement a price increase and how the product should be packaged within the new pricing model.

For this initiative, the company interviewed buyers using three key questions: What are the core capabilities to focus on building/selling? What are the optimal features and capabilities valued by customers that should be sold together? And should they be charging more for their products?

Results
This middleware vendor saw buyer support for a 10% price increase to their product line and restructuring of vertical contract terms. This enabled them to retain customers over multi-year subscription contracts, and the price increase enabled them to protect margins after the Microsoft price increase.

The Optimize New Pricing Strategy included the following components:

Components: 'Product Feature Importance & Satisfaction', 'Correlation of Features and Value Drivers', 'Fair Cost to Value Average for Category', 'Average Discounting for Category', 'Customer Value Is an Acceptable Multiple of Price'. First four: 'Component fails into the scope of optimizing price strategy to value'; last one: 'They are optimizing their price strategy decisions'.

New product price approach

As a collaborative team across product management, marketing, and finance, we see leaders taking a simple yet well-researched approach when setting product pricing.

Iterating to a final price point is best done with research into how product pricing:

  • Delivers target margins.
  • Is positioned vs. key competitors.
  • Delivers customer value at a fair price/value ratio.
To arrive at our new product price, we suggest iterating among 3 different views:

New Target Price:

  • Buyer Price vs. Value
  • Cost - Plus
  • Vs. Key Competitors
We analyzed:
  • Customer price/value equation interviews
  • Impacts of Supplier cost increases
  • Competitive pricing research
  • How product pricing delivers target margins

Who should care about optimized pricing?

Product managers and marketers who:

  • Support the mandate for optimizing pricing and revenue generation.
  • Need a more scientific way to plan and implement new pricing processes and methods to optimize revenues and profits.
  • Want a way to better apply customer and competitive insights to product pricing.
  • Are evaluating current pricing and cost control to support a refreshed pricing strategy.

Finance, sales, and marketing professionals who are pricing stakeholders in:

  • Finding alternatives to current pricing and packaging approaches.
  • Looking for ways to optimize price within the shifting market momentum.

How will they benefit from this research?

  • Refine the ability to effectively target pricing to specific market demands and customer segments.
  • Strengthen product team’s reputation for reliable and repeatable price-management capabilities among senior leadership.
  • Recognize and plan for new revenue opportunities or cost increases.
  • Allow for faster, more accurate intake of customer and competitive data. 
  • Improve pricing skills for professional development and business outcomes.
  • Create new product price, packaging, or market opportunities. 
  • Reduce financial costs and mistakes associated with manual efforts and uneducated guessing.
  • Price software products that better achieve financial goals optimizing revenue, margins, or market share.
  • Enhance the product development and sales processes with real competitive and customer expectations.

Is Your Pricing Strategy Optimized?

With the right pricing strategy, you can invest more money into your product, service, or growth. A 1% price increase will improv revenues by:

Three bars: 'Customer acquisition, 3.32%', 'Customer retention, 6.71%', 'Price monetization, 12.7%'.

Price monetization will almost double the revenue increases over customer acquisition and retention. (Pricing Strategies, Growth Ramp, March 2022)

DIAGNOSE PRICE CHALLENGES

Prices of today's cloud-based services/products are often misaligned against competition and customers' perceived value, leaving more revenues on the table.
  • Do you struggle to price new products with confidence?
  • Do you really know your SaaS product's costs?
  • Have you lost pricing power to stronger competitors?
  • Has cost focus eclipsed customer value focus?
If so, you are likely skipping steps and missing key outputs in your pricing strategy.

OPTIMIZE THESE STEPS

ALIGNMENT
  1. Assign Team Responsibilities
  2. Set Timing for Project Deliverables
  3. Clarify Financial Expectations
  4. Collect Customer Contacts
  5. Determine Competitors
  6. BEFORE RESEARCH, HAVE YOU
    Documented your executive's financial expectations? If "No," return.

RESEARCH & VALIDATE
  1. Research Competitors
  2. Interview Customers
  3. Test Pricing vs. Financials
  4. Create Pricing Presentation
  5. BEFORE PRESENTING, HAVE YOU:
    Clarified your customer and competitive positioning to validate pricing? If "No," return.

BUY-IN
  1. Executive Pricing Presentation
  2. Post-Mortem of Presentation
  3. Document New Processes
  4. Monitor the Pricing Changes
  5. BEFORE RESEARCH, HAVE YOU:
    Documented your executive's financial expectations? If "No," return.

DELIVER KEY OUTPUTS

Sponsoring executive(s) signs-offs require a well-articulated pricing plan and business case for investment that includes:
  • Competitive features and pricing financial templates
  • Customer validation of price value
  • Optimized price presentation
  • Repeatable pricing processes to monitor changes

REAP THE REWARDS

  • Product pricing is better aligned to achieve financial goals
  • Improved pricing skills or professional development
  • Stronger team reputation for reliable price management

Key Insights

  1. Gain a competitive edge by using market and customer information to optimize product financials, refine pricing, and speed up decisions.
  2. Product leaders will best set software product price based on a deep understanding of buyer/price value equation, alignment with financial strategy, and an ongoing ability to monitor buyer, competitor, and product costs.

SoftwareReviews’ methodology for optimizing your pricing strategy

Steps

1.1 Establish the Team and Responsibilities
1.2 Educate/Align Team on Pricing Strategy
1.2 Document Portfolio & Target Product(s) for Pricing Updates
1.3 Clarify Product Target Margins
1.4 Establish Customer Price/Value
1.5 Identify Competitive Pricing
1.6 Establish New Price and Gain Buy-In

Outcomes

  1. Well-organized project
  2. Clarified product pricing strategy
  3. Customer value vs. price equation
  4. Competitive price points
  5. Approvals

Insight summary

Modernize your price planning

Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.

Ground pricing against financials

Meet and align with financial stakeholders.
  • Give finance a heads-up that you want to work with them.
  • Find out the CFO’s expectations for pricing and margins.
  • Ask for a dedicated finance team member.

Align on pricing strategy

Lead stakeholders in SaaS product pricing decisions to optimize pricing based on four drivers:
  • Customer’s price/value
  • Competitive strategy
  • Reflective of costs
  • Alignment with financial goals

Decrease time for approval

Drive price decisions, with the support of the CFO, to the business value of the suggested change:
  • Reference current product pricing guidelines
  • Compare to the competition and our strategy and weigh results against our customer’s price/value
  • Compare against the equation to business value for the suggested change
Develop the skill of pricing products

Increase product revenues and margins by enhancing modern processes and data monetization. Shift from intuitive to information-based pricing decisions.

Look at other options for revenue

Adjust product design, features, packaging, and contract terms while maintaining the functionality customers find valuable to their business.

Blueprint deliverables

Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Key deliverable:

New Pricing Strategy Presentation Template

Capture key findings for your price strategy with the Optimize Your Pricing in a Volatile Competitive Market Strategy Presentation Template

Sample of the 'Acme Corp New Product Pricing' blueprint.

Optimize Software Pricing in a Volatile Competitive Market Executive Brief

This executive brief will build your knowledge on how to price new products or adjust pricing for existing products.

Sample of the 'Optimize Software Pricing in a Volatile Competitive Market' blueprint.

Optimize Software Pricing in a Volatile Competitive Market Workbook

This workbook will help you prioritize which products require repricing, hold customer interviews, and capture competitive insights.

Sample of the 'Optimize Software Pricing in a Volatile Competitive Market' workbook.

Guided Implementation

A Guided Implementation (GI) is a series of calls with a SoftwareReviews analyst to help implement our best practices in your organization.

A typical GI is 4 to 8 calls over the course of 2 to 4 months.

What does a typical GI on optimizing software pricing look like?

Alignment

Research & Reprice

Buy-in

Call #1: Share the pricing team vision and outline activities for the pricing strategy process. Plan next call – 1 week.

Call #2: Outline products that require a new pricing approach and steps with finance. Plan next call – 1 week.

Call #3: Discuss the customer interview process. Plan next call – 1 week.

Call #4 Outline competitive analysis. Plan next call – 1 week.

Call #5: Review customer and competitive results for initial new pricing business case with finance for alignment. Plan next call – 3 weeks.

Call #6: Review the initial business case against financial plans across marketing, sales, and product development. Plan next call – 1 week.

Call #7 Review the draft executive pricing presentation. Plan next call – 1 week.

Call #8: Discuss gaps in executive presentation. Plan next call – 3 days.

SoftwareReviews Offers Various Levels of Support to Meet Your Needs

Included in Advisory Membership Optional add-ons

DIY Toolkit

Guided Implementation

Workshop

Consulting

"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

Desire a Guided Implementation?

  • A GI is where your SoftwareReviews engagement manager and executive advisor/counselor will work with SoftwareReviews research team members to craft with you a Custom Key Initiative Plan (CKIP).
  • A CKIP guides your team through each of the major steps, outlines responsibilities between members of your team and SoftwareReviews, describes expected outcomes, and captures actual value delivered.
  • A CKIP also provides you and your team with analyst/advisor/counselor feedback on project outputs, helps you communicate key principles and concepts to your team, and helps you stay on project timelines.
  • If Guided Implementation assistance is desired, contact your engagement manager.

Workshop overview

Contact your account representative for more information.
workshops@infotech.com1-888-670-8889
Day 1 Day 2 Day 3 Day 4 Day 5
Align Team, Identify Customers, and Document Current Knowledge
Validate Initial Insights and Identify Competitors and Market View
Schedule and Hold Buyer Interviews
Summarize Findings and Provide Actionable Guidance to Stakeholders
Present, Go Forward, and Measure Impact and Results
Activities

1.1 Identify Team Members, roles, and responsibilities

1.2 Establish timelines and project workflow

1.3 Gather current product and future financial margin expectations

1.4 Review the Optimize Software Executive Brief and Workbook Templates

1.4 Build prioritized pricing candidates hypothesis

2.1 Identify customer interviewee types by segment, region, etc.

2.2 Hear from industry analysts their perspectives on the competitors, buyer expectations, and price trends

2.3 Research competitors for pricing, contract type, and product attributes

3.2 Review pricing and attributes survey and interview questionnaires

3.2 Hold interviews and use interview guides (over four weeks)

A gap of up to 4 weeks for scheduling of interviews.

3.3 Hold review session after initial 3-4 interviews to make adjustments

4.1 Review all draft price findings against the market view

4.2 Review Draft Executive Presentation

5.1 Review finalized pricing strategy plan with analyst for market view

5.2 Review for comments on the final implementation plan

Deliverables
  1. Documented steering committee and working team
  2. Current and initial new pricing targets for strategy
  3. Documented team knowledge
  1. Understanding of market and potential target interviewee types
  2. Objective competitive research
  1. Initial review – “Are we going in the right direction with surveys?”
  2. Validate or adjust the pricing surveys to what you hear in the market
  1. Complete findings and compare to the market
  2. Review and finish drafting the Optimize Software Pricing Strategy presentation
  1. Final impute on strategy
  2. Review of suggested next steps and implementation plan

Our process

Align team, perform research, and gain executive buy-in on updated price points

  1. Establish the team and responsibilities
  2. Educate/align team on pricing strategy
  3. Document portfolio & target product(s) for pricing updates
  4. Clarify product target margins
  5. Establish customer price/value
  6. Identify competitive pricing
  7. Establish new price and gain buy-in

Optimize Software Pricing in a Volatile Competitive Market

Our process will help you deliver the following outcomes:

  • Well-organized project
  • Clarified product pricing strategy
  • Customer value vs. price equation
  • Competitive price points
  • Approvals

This project involves the following participants:

  • Product management
  • Program leadership
  • Product marketing
  • CFO or finance representative/partner
  • Others
  • Representative(s) from Sales

1.0 Assign team responsibilities

Input: Steering committee roles and responsibilities, Steering committee interest and role

Output: List of new pricing strategy steering committee and workstream members, roles, and timelines, Updated Software Pricing Strategy presentation

Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: CFO, sponsoring executive, Functional leads – development, product marketing, product management, marketing, sales, customer success/support

1-2 hours
  1. The product manager/member running this pricing/repricing program should review the entire Optimize Software Pricing in a Volatile Competitive Market blueprint and each blueprint attachment.
  2. The product manager should also refer to slide 19 of the Optimize Software Pricing in a Volatile Competitive Market blueprint and decide if help via a Guided Implementation (GI) is of value. If desired, alert your SoftwareReviews engagement manager.
1-2 hours
  1. The product manager should meet with the chief product officer/CPO and functional leaders, and set the meeting agenda to:
    1. Nominate steering committee members.
    2. Nominate work-stream leads.
    3. Establish key pricing project milestones.
    4. Schedule both the steering committee (suggest monthly) and workstream lead meetings (suggest weekly) through the duration of the project.
    5. Ask the CPO to craft, outside this meeting, his/her version of the "Message from the chief product officer.”
    6. If a Guided Implementation is selected, inform the meeting attendees that a SoftwareReviews analyst will join the next meeting to share his/her Executive Brief on Pricing Strategy.
  2. Record all above findings in the Optimize Software Pricing in a Volatile Competitive Market Presentation Template.

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

SoftwareReviews Advisory Insight:

Pricing steering committees are needed to steer overall product, pricing, and packaging decisions. Some companies include the CEO and CFO on this committee and designate it as a permanent body that meets monthly to give go/no-go decisions to “all things product and pricing related” across all products and business units.

2.0 Educate the team

1 hour

Input: Typically, a joint recognition that pricing strategies need upgrading and have not been fully documented, Steering committee and working team members

Output: Communication of team members involved and the makeup of the steering committee and working team, Alignment of team members on a shared vision of “why a new price strategy is critical” and what key attributes define both the need and impact on business

Materials: Optimize Your Software Strategy Executive Brief PowerPoint presentation

Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales, SoftwareReviews marketing analyst (optional)

  1. Walk the team through the Optimize Software Pricing in a Volatile Competitive Market Executive Brief PowerPoint presentation.
  2. Optional – Have the SoftwareReviews Advisory (SRA) analyst walk the team through the Optimize Software Pricing in a Volatile Competitive Market Executive Brief PowerPoint presentation as part of your session. Contact your engagement manager to schedule.
  3. Walk the team through the current version of the Optimize Software Pricing in a Volatile Competitive Market Presentation Template outlining project goals, steering committee and workstream make-up and responsibilities, project timeline and key milestones, and approach to arriving at new product pricing.
  4. Set expectations among team members of their specific roles and responsibilities for this project, review the frequency of steering committee and workstream meetings to set expectations of key milestones and deliverable due dates.

Download the Optimize Software Pricing in a Volatile Competitive Market Executive Brief

3.0 Document portfolio and target products for pricing update

1-3 Hours

Input: List of entire product portfolio

Output: Prioritized list of product candidates that should be repriced

Materials: Optimize Software Pricing in a Volatile Competitive Market Executive Brief presentation, Optimize Software Pricing in a Volatile Competitive Market Workbook

Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales

  1. Walk the team through the current version of Optimize Software Pricing in a Volatile Competitive Market workbook, tab 2: “Product Portfolio Organizer.” Modify sample attributes to match your product line where necessary.
  2. As a group, record the product attributes for your entire portfolio.
  3. Prioritize the product price optimization candidates for repricing with the understanding that it might change after meeting with finance.

Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

4.0 Clarify product target margins

2-3 sessions of 1 Hour each

Input: Finance partner/CFO knowledge of target product current and future margins, Finance partner/CFO who has information on underlying costs with details that illustrate supplier contributions

Output: Product finance markup target percentage margins and revenues

Materials: Finance data on the product family, Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: Initiative manager, Finance partner/CFO

  1. Schedule a meeting with your finance partner/CFO to validate expectations for product margins. The goal is to understand the detail of underlying costs/margins and if the impacts of supplier costs affect the product family. The information will be placed into the Optimize Software Pricing in a Volatile Competitive Market Workbook on tab 2, Product Portfolio Organizer under the “Unit Margins” heading.
  2. Arrive at a final “Cost-Plus New Price” based on underlying costs and target margins for each of the products. Record results in the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 2, under the “Cost-Plus New Price” heading.
  3. Record product target finance markup price under “Cost-Plus” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9, and details in Appendix, “Cost-Plus Analysis,” slide 11.
  4. Repeat this process for any other products to be repriced.

Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

5.0 Establish customer price to value

1-4 weeks

Input: Identify segments within which you require price-to-value information, Understand your persona insight gaps, Review Sample Interview Guide using the Optimize Software Pricing in a Volatile, Competitive Market Workbook, Tab 4. Interview Guide.

Output: List of interviewees, Updated Interview Guide

Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: Initiative manager, Customer success to help identify interviewees, Customers, prospects

  1. Identify a list of customers and prospects that best represent your target persona when interviewed. Choose interviewees who will inform key differences among key segments (geographies, company size, a mix of customers and prospects, etc.) and who are decision makers and can best inform insights on price/value and competitors.
  2. Recruit interviewees and schedule 30-minute interviews.
  3. Keep track of interviewees using the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 3: “Interviewee Tracking.”
  4. Review the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 4: “Interview Guide,” and modify/update it where appropriate.
  5. Record interviewee perspectives on the “price they are willing to pay for the value received” (price/value equation) using the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 4: “Interview Guide.”
  6. Summarize findings to result in an average “customer’s value price.” Record product target ”customer’s value price” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9 and supporting details in Appendix, “Customer Pricing Analysis,” slide 12.

Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

6.0 Identify competitive pricing

1-2 weeks

Input: Identify price candidate competitors, Your product pricing, contract type, and product attribute information to compare against, Knowledge of existing competitor information, websites, and technology research sites to guide questions

Output: Competitive product average pricing

Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: Initiative manager, Customers, prospects

  1. Identify the top 3-5 competitors’ products that you most frequently compete against with your selected product.
  2. Perform competitive intelligence research on deals won or lost that contain competitive pricing insights by speaking with your sales force.
  3. Use the interviews with key customers to also inform competitive pricing insights. Include companies which you may have lost to a competitor in your customer interviewee list.
  4. Modify and add key competitive pricing, contract, or product attributes in the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 5: “Competitive Information.”
  5. Place your product’s information into the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 5: “Competitive Information.”
  6. Research your competitors’ summarized pricing and product attribute insights into the workbook.
  7. Record research in the Summarize research on competitors to arrive at an average “Competitors Avg. Price”. Record in ”Customer’s Value Price” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9, and details in Appendix, “Competitor Pricing Analysis,” slide 13.

Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

7.0 Establish new price and gain buy-in

2-3 hours

Input: Findings from competitive, cost-plus, and customer price/value analysis

Output: Approvals for price change

Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Participants: Initiative manager, Steering committee, Working team – typically representatives in product marketing, product management, sales

  1. Using prior recorded findings of Customer’s Value Price, Competitors’ Avg. Price, and Finance Markup Price, arrive at a recommended “New Price” and record in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9 and the Appendix for Project Analysis Details.
  2. Present findings to steering committee. Be prepared to show customer interviews and competitive analysis results to support your recommendation.
  3. Plan internal and external communications and discuss the timing of when to “go live” with new pricing. Discuss issues related to migration to a new price, how to handle currently low-priced customers, and how to migrate them over time to the new pricing.
  4. Identify if it makes sense to target a date to launch the new pricing in the future, so customers can be alerted in advance and therefore take advantage of “current pricing” to drive added revenues.
  5. Confer with IT to assess times required to implement within CPQ systems and with product marketing for time to change sales proposals, slide decks, and any other affected assets and systems.

Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

Summary of Accomplishment

Problem Solved

With the help of this blueprint, you have deepened your and your company’s understanding of how to look at new pricing opportunities and what the market and the buyer will pay for your product. You are among the minority of product and marketing leaders that have thoroughly documented their new pricing strategy and processes – congratulations!

The benefits of having led your team through the process are significant and include the following:

  • Allow for faster, more accurate intake of customer and competitive data 
  • Refine the ability to effectively target pricing to specific market demands and customer segments 
  • Understand the association between the value proposition of products and services
  • Reduce financial costs and mistakes associated with manual efforts & uneducated guessing
  • Recognize and plan for new revenue opportunities or cost increases
  • Create new market or product packaging opportunities
And finally, by bringing your team along with you in this process, you have also led your team to become more customer-focused while pricing your products – a strategic shift that all organizations should pursue.

If you would like additional support, contact us and we’ll make sure you get the professional expertise you need.

Contact your account representative for more information.

info@softwarereviews.com
1-888-670-8889

Bibliography

“Chapter 4 Reasons for Project Failure.” Kissflow's Guide to Project Management. Kissflow, n.d. Web.

Edie, Naomi. “Microsoft Is Raising SaaS Prices, and Other Vendors Will, Too.” CIO Dive, 8 December 2021. Web.

Gruman, Galen, Alan S. Morrison, and Terril A. Retter. “Software Pricing Trends.” PricewaterhouseCoopers, 2018. Web.

Hargrave, Marshall. “Example of Economic Exposure.” Investopedia, 12 April 2022. Web.

Heaslip, Emily. “7 Smart Pricing Strategies to Attract Customers.” CO—, 17 November 2021. Web.

Higgins, Sean. “How to Price a Product That Your Sales Team Can Sell.” HubSpot, 4 April 2022. Web.

“Pricing Strategies.” Growth Ramp, March 2022. Web.

“Product Management Skills Benchmark Report 2021.” 280 Group, 9 November 2021. Web.

Quey, Jason. “Price Increase: How to Do a SaaS Pricing Change in 8 Steps.” Growth Ramp, 22 March 2021. Web.

Steenburg, Thomas, and Jill Avery. “Marketing Analysis Toolkit: Pricing and Profitability Analysis.” Harvard Business School, 16 July 2010. Web.

“2021 State of Competitive Intelligence.” Crayon and SCIO, n.d. Web.

Valchev, Konstantin. “Cost of Goods Sold (COGS) for Software-as-a-Service (SaaS) Business.” OpenView Venture Partners, OV Blog, 20 April 2020. Web.

“What Is Price Elasticity?” Market Business News, n.d. Web.

Implement a New IT Organizational Structure

  • Buy Link or Shortcode: {j2store}276|cart{/j2store}
  • member rating overall impact: 10.0/10 Overall Impact
  • member rating average dollars saved: $30,999 Average $ Saved
  • member rating average days saved: 5 Average Days Saved
  • Parent Category Name: Organizational Design
  • Parent Category Link: /organizational-design
  • Organizational design implementations can be highly disruptive for IT staff and business partners. Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.
  • CIOs walk a tightrope as they manage the operational and emotional turbulence while aiming to improve business satisfaction within IT. Failure to achieve balance could result in irreparable failure.

Our Advice

Critical Insight

  • Mismanagement will hurt you. The majority of IT organizations do not manage organizational design implementations effectively, resulting in decreased satisfaction, productivity loss, and increased IT costs.
  • Preventing mismanagement is within your control. 72% of change management issues can be directly improved by managers. IT leaders have a tendency to focus their efforts on operational changes rather than on people.

Impact and Result

Leverage Info-Tech’s organizational design implementation process and deliverables to build and implement a detailed transition strategy and to prepare managers to lead through change.

Follow Info-Tech’s 5-step process to:

  1. Effect change and sustain productivity through real-time employee engagement monitoring.
  2. Kick off the organizational design implementation with effective communication.
  3. Build an integrated departmental transition strategy.
  4. Train managers to effectively lead through change.
  5. Develop personalized transition plans.

Implement a New IT Organizational Structure Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out how you should implement a new organizational design, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Build a change communication strategy

Create strategies to communicate the changes to staff and maintain their level of engagement.

  • Implement a New Organizational Structure – Phase 1: Build a Change Communication Strategy
  • Organizational Design Implementation FAQ
  • Organizational Design Implementation Kick-Off Presentation

2. Build the organizational transition plan

Build a holistic list of projects that will enable the implementation of the organizational structure.

  • Implement a New Organizational Structure – Phase 2: Build the Organizational Transition Plan
  • Organizational Design Implementation Project Planning Tool

3. Lead staff through the reorganization

Lead a workshop to train managers to lead their staff through the changes and build transition plans for all staff members.

  • Implement a New Organizational Structure – Phase 3: Lead Staff Through the Reorganization
  • Organizational Design Implementation Manager Training Guide
  • Organizational Design Implementation Stakeholder Engagement Plan Template
  • Organizational Design Implementation Transition Plan Template
[infographic]

Workshop: Implement a New IT Organizational Structure

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Build Your Change Project Plan

The Purpose

Create a holistic change project plan to mitigate the risks of organizational change.

Key Benefits Achieved

Building a change project plan that encompasses both the operational changes and minimizes stakeholder and employee resistance to change.

Activities

1.1 Review the new organizational structure.

1.2 Determine the scope of your organizational changes.

1.3 Review your MLI results.

1.4 Brainstorm a list of projects to enable the change.

Outputs

Project management planning and monitoring tool

McLean Leadership Index dashboard

2 Finalize Change Project Plan

The Purpose

Finalize the change project plan started on day 1.

Key Benefits Achieved

Finalize the tasks that need to be completed as part of the change project.

Activities

2.1 Brainstorm the tasks that are contained within the change projects.

2.2 Determine the resource allocations for the projects.

2.3 Understand the dependencies of the projects.

2.4 Create a progress monitoring schedule.

Outputs

Completed project management planning and monitoring tool

3 Enlist Your Implementation Team

The Purpose

Enlist key members of your team to drive the implementation of your new organizational design.

Key Benefits Achieved

Mitigate the risks of staff resistance to the change and low engagement that can result from major organizational change projects.

Activities

3.1 Determine the members that are best suited for the team.

3.2 Build a RACI to define their roles.

3.3 Create a change vision.

3.4 Create your change communication strategy.

Outputs

Communication strategy

4 Train Your Managers to Lead Through Change

The Purpose

Train your managers who are more technically focused to handle the people side of the change.

Key Benefits Achieved

Leverage your managers to translate how the organizational change will directly impact individuals on their teams.

Activities

4.1 Conduct the manager training workshop with managers.

4.2 Review the stakeholder engagement plans.

4.3 Review individual transition plan template with managers.

Outputs

Conflict style self-assessments

Stakeholder engagement plans

Individual transition plan template

5 Build Your Transition Plans

The Purpose

Complete transition plans for individual members of your staff.

Key Benefits Achieved

Create individual plans for your staff members to ease the transition into their new roles.

Activities

5.1 Bring managers back in to complete transition plans.

5.2 Revisit the new organizational design as a source of information.

5.3 Complete aspects of the templates that do not require staff feedback.

5.4 Discuss strategies for transitioning.

Outputs

Individual transition plan template

Further reading

Implement a New IT Organizational Structure

Prioritize quick wins and critical services during IT org changes.

This blueprint is part 3/3 in Info-Tech’s organizational design program and focuses on implementing a new structure

Part 1: Design Part 2: Structure Part 3: Implement
IT Organizational Architecture Organizational Sketch Organizational Structure Organizational Chart Transition Strategy Implement Structure
  1. Define the organizational design objectives.
  2. Develop strategically-aligned capability map.
  3. Create the organizational design framework.
  4. Define the future state work units.
  5. Create future state work unit mandates.
  1. Assign work to work units (accountabilities and responsibilities).
  2. Develop organizational model options (organizational sketches).
  3. Assess options and select go-forward model.
  1. Define roles by work unit.
  2. Create role mandates.
  3. Turn roles into jobs.
  4. Define reporting relationships between jobs.
  5. Define competency requirements.
  1. Determine number of positions per job.
  2. Conduct competency assessment.
  3. Assign staff to jobs.
  1. Form OD implementation team.
  2. Develop change vision.
  3. Build communication presentation.
  4. Identify and plan change projects.
  5. Develop organizational transition plan.
  1. Train managers to lead through change.
  2. Define and implement stakeholder engagement plan.
  3. Develop individual transition plans.
  4. Implement transition plans.
Risk Management: Create, implement, and monitor risk management plan.
HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.

Monitor and Sustain Stakeholder Engagement →

The sections highlighted in green are in scope for this blueprint. Click here for more information on designing or on structuring a new organization.

Our understanding of the problem

This Research is Designed For:

  • CIOs

This Research Will Help You:

  • Effectively implement a new organizational structure.
  • Develop effective communications to minimize turnover and lost productivity during transition.
  • Identify a detailed transition strategy to move to your new structure with minimal interruptions to service quality.
  • Train managers to lead through change and measure ongoing employee engagement.

This Research Will Also Assist:

  • IT Leaders

This Research Will Help Them:

  • Effectively lead through the organizational change.
  • Manage difficult conversations with staff and mitigate staff concerns and turnover.
  • Build clear transition plans for their teams.

Executive summary

Situation

  • Organizational Design (OD) projects are typically undertaken in order to enable organizational priorities, improve IT performance, or to reduce IT costs. However, due to the highly disruptive nature of the change, only 25% of changes achieve their objectives over the long term. (2013 Towers Watson Change and Communication ROI Survey)

Complication

  • OD implementations can be highly disruptive for IT staff and business partners. Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.
  • CIOs walk a tightrope as they manage the operational and emotional turbulence while aiming to improve business satisfaction within IT. Failure to achieve balance could result in irreparable failure.

Resolution

  • Leverage Info-Tech’s organizational design implementation process and deliverables to build and implement a detailed transition strategy and to prepare managers to lead through change. Follow Info-Tech’s 5-step process to:
    1. Effect change and sustain productivity through real-time employee engagement monitoring.
    2. Kick off the organizational design implementation with effective communication.
    3. Build an integrated departmental transition strategy.
    4. Train managers to effectively lead through change.
    5. Develop personalized transition plans.

Info-Tech Insight

  1. Mismanagement will hurt you. The majority of IT organizations do not manage OD implementations effectively, resulting in decreased satisfaction, productivity loss, and increased IT costs.
  2. Preventing mismanagement is within your control. 72% of change management issues can be directly improved by managers. (Abilla, 2009) IT leaders have a tendency to focus their efforts on operational changes rather than on people. This is a recipe for failure.

Organizational Design Implementation

Managing organizational design (OD) changes effectively is critical to maintaining IT service levels and retaining top talent throughout a restructure. Nevertheless, many organizations fail to invest appropriate consideration and resources into effective OD change planning and execution.

THREE REASONS WHY CIOS NEED TO EFFECTIVELY MANAGE CHANGE:

  1. Failure is the norm; not the exception. According to a study by Towers Watson, only 55% of organizations experience the initial value of a change. Even fewer organizations, a mere 25%, are actually able to sustain change over time to experience the full expected benefits. (2013 Towers Watson Change and Communication ROI Survey)
  2. People are the biggest cause of failure. Organizational design changes are one of the most difficult types of changes to manage as staff are often highly resistant. This leads to decreased productivity and poor results. The most significant people challenge is the loss of momentum through the change process which needs to be actively managed.
  3. Failure costs money. Poor IT OD implementations can result in increased turnover, lost productivity, and decreased satisfaction from the business. Managing the implementation has a clear ROI as the cost of voluntary turnover is estimated to be 150% of an employee’s annual salary. (Inc)

86% of IT leaders believe organization and leadership processes are critical, yet the majority struggle to be effective

PERCENTAGE OF IT LEADERS WHO BELIEVE THEIR ORGANIZATION AND LEADERSHIP PROCESSES ARE HIGHLY IMPORTANT AND HIGHLY EFFECTIVE

A bar graph, with the following organization and leadership processes listed on the Y-axis: Human Resources Management; Leadership, Culture, Values; Organizational Change Management; and Organizational Design. The bar graph shows that over 80% of IT leaders rate these processes as High Importance, but less than 40% rate them as having High Effectiveness.

GAP BETWEEN IMPORTANCE AND EFFECTIVENESS

Human Resources Management - 61%

Leadership, Culture, Values - 48%

Organizational Change Management - 55%

Organizational Design - 45%

Note: Importance and effectiveness were determined by identifying the percentage of individuals who responded with 8-10/10 to the questions…

  • “How important is this process to the organization’s ability to achieve business and IT goals?” and…
  • “How effective is this process at helping the organization to achieve business and IT goals?”

Source: Info-Tech Research Group, Management and Governance Diagnostic. N=22,800 IT Professionals

Follow a structured approach to your OD implementation to improve stakeholder satisfaction with IT and minimize risk

  • IT reorganizations are typically undertaken to enable strategic goals, improve efficiency and performance, or because of significant changes to the IT budget. Without a structured approach to manage the organizational change, IT might get the implementation done, but fail to achieve the intended benefits, i.e. the operation succeeds, but the patient has died on the table.
  • When implementing your new organizational design, it’s critical to follow a structured approach to ensure that you can maintain IT service levels and performance and achieve the intended benefits.
  • The impact of organizational structure changes can be emotional and stressful for staff. As such, in order to limit voluntary turnover, and to maintain productivity and performance, IT leaders need to be strategic about how they communicate and respond to resistance to change.

TOP 3 BENEFITS OF FOLLOWING A STRUCTURED APPROACH TO IMPLEMENTING ORGANIZATIONAL DESIGN

  1. Improved stakeholder satisfaction with IT. A detailed change strategy will allow you to successfully transition staff into new roles with limited service interruptions and with improved stakeholder satisfaction.
  2. Experience minimal voluntary turnover throughout the change. Know how to actively engage and minimize resistance of stakeholders throughout the change.
  3. Execute implementation on time and on budget. Effectively managed implementations are 65–80% more likely to meet initial objectives than those with poor organizational change management. (Boxley Group, LLC)

Optimize your organizational design implementation results by actively preparing managers to lead through change

IT leaders have a tendency to make change even more difficult by focusing on operations rather than on people. This is a recipe for failure. People pose the greatest risk to effective implementation and as such, IT managers need to be prepared and trained on how to lead their staff through the change. This includes knowing how to identify and manage resistance, communicating the change, and maintaining positive momentum with staff.

Staff resistance and momentum are the most challenging part of leading through change (McLean & Company, N=196)

A bar graph with the following aspects of Change Management listed on the Y-Axis, in increasing order of difficulty: Dealing with Technical Issues; Monitoring metrics to measure progress; Amending policies and processes; Coordinating with stakeholders; Getting buy-in from staff; Maintaining a positive momentum with staff.

Reasons why change fails: 72% of failures can be directly improved by the manager (shmula)

A pie chart showing the reasons why change fails: Management behavior not supportive of change = 33%; Employee resistance to change = 39%; Inadequate resources or budget = 14%; and All other obstacles = 14%.

Leverage organizational change management (OCM) best practices for increased OD implementation success

Effective change management correlates with project success

A line graph, with Percent of respondents that met or exceeded project objectives listed on the Y-axis, and Poor, Fair, Good, and Excellent listed on the X-axis. The line represents the overall effectiveness of the change management program, and as the value on the Y-axis increases, so does the value on the X-axis.

Source: Prosci. From Prosci’s 2012 Best Practices in Change Management benchmarking report.

95% of projects with excellent change management met or EXCEEDED OBJECTIVES, vs. 15% of those with poor OCM. (Prosci)

143% ROI on projects with excellent OCM. In other words, for every dollar spent on the project, the company GAINS 43 CENTS. This is in contrast to 35% ROI on projects with poor OCM. (McKinsey)

Info-Tech’s approach to OD implementation is a practical and tactical adaptation of several successful OCM models

BUSINESS STRATEGY-ORIENTED OCM MODELS. John Kotter’s 8-Step model, for instance, provides a strong framework for transformational change but doesn’t specifically take into account the unique needs of an IT transformation.

GENERAL-PURPOSE OCM FRAMEWORKS such as ACMP’s Standard for Change Management, CMI’s CMBoK, and Prosci’s ADKAR model are very comprehensive and need to be configured to organizational design implementation-specific initiatives.

COBIT MANAGEMENT PRACTICE BAI05: MANAGE ORGANIZATIONAL CHANGE ENABLEMENT follows a structured process for implementing enterprise change quickly. This framework can be adapted to OD implementation; however, it is most effective when augmented with the people and management training elements present in other frameworks.

References and Further Reading

Tailoring a comprehensive, general-purpose OCM framework to an OD implementation requires familiarity and experience. Info-Tech’s OD implementation model adapts the best practices from a wide range of proven OCM models and distills it into a step-by-step process that can be applied to an organizational design transformation.

The following OD implementation symptoms can be avoided through structured planning

IN PREVIOUS ORGANIZATIONAL CHANGES, I’VE EXPERIENCED…

“Difficultly motivating my staff to change.”

“Higher than average voluntary turnover during and following the implementation.”

“An overall sense of staff frustration or decreased employee engagement.”

“Decreased staff productivity and an inability to meet SLAs.”

“Increased overtime caused by being asked to do two jobs at once.”

“Confusion about the reporting structure during the change.”

“Difficulty keeping up with the rate of change and change fatigue from staff.”

“Business partner dissatisfaction about the change and complaints about the lack of effort or care put in by IT employees.”

“Business partners not wanting to adjust to the change and continuing to follow outdated processes.”

“Decrease in stakeholder satisfaction with IT.”

“Increased prevalence of shadow IT during or following the change.”

“Staff members vocally complaining about the IT organization and leadership team.”

Follow this blueprint to develop and execute on your OD implementation

IT leaders often lack the experience and time to effectively execute on organizational changes. Info-Tech’s organizational design implementation program will provide you with the needed tools, templates, and deliverables. Use these insights to drive action plans and initiatives for improvement.

How we can help

  • Measure the ongoing engagement of your employees using Info-Tech’s MLI diagnostic. The diagnostic comes complete with easily customizable reports to track and act on employee engagement throughout the life of the change.
  • Use Info-Tech’s customizable project management tools to identify all of the critical changes, their impact on stakeholders, and mitigate potential implementation risks.
  • Develop an in-depth action plan and transition plans for individual stakeholders to ensure that productivity remains high and that service levels and project expectations are met.
  • Align communication with real-time staff engagement data to keep stakeholders motivated and focused throughout the change.
  • Use Info-Tech’s detailed facilitation guide to train managers on how to effectively communicate the change, manage difficult stakeholders, and help ensure a smooth transition.

Leverage Info-Tech’s customizable deliverables to execute your organizational design implementation

A graphic with 3 sections: 1.BUILD A CHANGE COMMUNICATION STRATEGY; 2.BUILD THE ORGANIZATIONAL TRANSITION PLAN; 3.1 TRAIN MANAGERS TO LEAD THROUGH CHANGE; 3.2 TRANSITION STAFF TO NEW ROLES. An arrow emerges from point one and directs right, over the rest of the steps. Text above the arrow reads: ONGOING ENGAGEMENT MONITORING AND COMMUNICATION. Dotted arrows emerge from points two and three directing back toward point one. Text below the arrow reads: COMMUNICATION STRATEGY ITERATION.

CUSTOMIZABLE PROJECT DELIVERABLES

1. BUILD A CHANGE COMMUNICATION STRATEGY

  • McLean Leadership Index: Real-Time Employee Engagement Dashboard
  • Organizational Design
  • Implementation Kick-Off Presentation
  • Organizational Design Implementation FAQ

2. BUILD THE ORGANIZATIONAL TRANSITION PLAN

  • Organizational Design Implementation Project Planning Tool

3.1 TRAIN MANAGERS TO LEAD THROUGH CHANGE

3.2 TRANSITION STAFF TO NEW ROLES

  • Organizational Design Implementation Manager Training Guide
  • Organizational Design Implementation Transition Plan Template

Leverage Info-Tech’s tools and templates to overcome key engagement program implementation challenges

KEY SECTION INSIGHTS:

BUILD A CHANGE COMMUNICATION STRATEGY

Effective organizational design implementations mitigate the risk of turnover and lost productivity through ongoing monitoring and managing of employee engagement levels. Take a data-driven approach to managing engagement with Info-Tech’s real-time MLI engagement dashboard and adjust your communication and implementation strategy before engagement risks become issues.

BUILD THE ORGANIZATIONAL TRANSITION PLAN

Your organizational design implementation is made up of a series of projects and needs to be integrated into your larger project schedule. Too often, organizations attempt to fit the organizational design implementation into their existing schedules which results in poor resource planning, long delays in implementation, and overall poor results.

LEAD STAFF THROUGH THE REORGANIZATION

The majority of IT managers were promoted because they excelled at the technical aspect of their job rather than in people management. Not providing training is setting your organization up for failure. Train managers to effectively lead through change to see a 72% decrease in change management issues. (Abilla, 2009)

METRICS:

  1. Voluntary turnover: Conduct an exit interview with all staff members during and after transition. Identify any staff members who cite the change as a reason for departure. For those who do leave, multiply their salary by 1.5% (the cost of a new hire) and track this over time.
  2. Business satisfaction trends: Conduct CIO Business Vision one year prior to the change vs. one year after change kick-off. Prior to the reorganization, set metrics for each category for six months after the reorganization, and one year following.
  3. Saved development costs: Number of hours to develop internal methodology, tools, templates, and process multiplied by the salary of the individual.

Use this blueprint to save 1–3 months in implementing your new organizational structure

Time and Effort Using Blueprint Without Blueprint
Assess Current and Ongoing Engagement 1 person ½ day – 4 weeks 1–2 hours for diagnostic set up (allow extra 4 weeks to launch and review initial results). High Value 4–8 weeks
Set Up the Departmental Change Workbooks 1–5 people 1 day 4–5 hours (varies based on the scope of the change). Medium Value 1–2 weeks
Design Transition Strategy 1–2 people 1 day 2–10 hours of implementation team’s time. Medium Value 0–2 weeks
Train Managers to Lead Through Change 1–5 people 1–2 weeks 1–2 hours to prepare training (allow for 3–4 hours per management team to execute). High Value 3–5 weeks

These estimates are based on reviews with Info-Tech clients and our experience creating the blueprint.

Totals:

Workshop: 1 week

GI/DIY: 2-6 weeks

Time and Effort Saved: 8-17 weeks

CIO uses holistic organizational change management strategies to overcome previous reorganization failures

CASE STUDY

Industry: Manufacturing

Source: Client interview

Problem

When the CIO of a large manufacturing company decided to undertake a major reorganization project, he was confronted with the stigma of a previous CIO’s attempt. Senior management at the company were wary of the reorganization since the previous attempt had failed and cost a lot of money. There was major turnover since staff were not happy with their new roles costing $250,000 for new hires. The IT department saw a decline in their satisfaction scores and a 10% increase in help desk tickets. The reorganization also cost the department $400,000 in project rework.

Solution

The new CIO used organizational change management strategies in order to thoroughly plan the implementation of the new organizational structure. The changes were communicated to staff in order to improve adoption, every element of the change was mapped out, and the managers were trained to lead their staff through the change.

Results

The reorganization was successful and eagerly adopted by the staff. There was no turnover after the new organizational structure was implemented and the engagement levels of the staff remained the same.

$250,000 - Cost of new hires and salary changes

10% - Increase in help desk tickets

$400,000 - Cost of project delays due to the poorly effective implementation of changes

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

Guided Implementation

“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

Workshop

“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

Consulting

“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

Diagnostics and consistent frameworks used throughout all four options

Implement a New Organizational Structure

3. Lead Staff Through the Reorganization
1. Build a Change Communication Strategy 2. Build the Organizational Transition Plan 3.1 Train Managers to Lead Through Change 3.2 Transition Staff to New Roles
Best-Practice Toolkit

1.1 Launch the McLean Leadership Index to set a baseline.

1.2 Establish your implementation team.

1.3 Build your change communication strategy and change vision.

2.1 Build a holistic list of change projects.

2.2 Monitor and track the progress of your change projects.

3.1.1 Conduct a workshop with managers to prepare them to lead through the change.

3.1.2 Build stakeholder engagement plans and conduct conflict style self-assessments.

3.2.1 Build transition plans for each of your staff members.

3.2.2 Transition your staff to their new roles.

Guided Implementations
  • Set up your MLI Survey.
  • Determine the members and roles of your implementation team.
  • Review the components of a change communication strategy.
  • Review the change dimensions and how they are used to plan change projects.
  • Review the list of change projects.
  • Review the materials and practice conducting the workshop.
  • Debrief after conducting the workshop.
  • Review the individual transition plan and the process for completing it.
  • Final consultation before transitioning staff to their new roles.
Onsite Workshop Module 1: Effectively communicate the reorganization to your staff. Module 2: Build the organizational transition plan. Module 3.1: Train your managers to lead through change. Module 3.2: Complete your transition plans

Phase 1 Results:

  • Plans for effectively communicating with your staff.

Phase 2 Results:

  • A holistic view of the portfolio of projects required for a successful reorg

Phase 3.1 Results:

  • A management team that is capable of leading their staff through the reorganization

Phase 3.2 Results:

  • Completed transition plans for your entire staff.

Workshop overview

Contact your account representative or email Workshops@InfoTech.com for more information.

Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
Activities

Build Your Change Project Plan

1.1 Review the new organizational structure.

1.2 Determine the scope of your organizational changes.

1.3 Review your MLI results.

1.4 Brainstorm a list of projects to enable the change.

Finalize Change Project Plan

2.1 Brainstorm the tasks that are contained within the change projects.

2.2 Determine the resource allocation for the projects.

2.3 Understand the dependencies of the projects.

2.4 Create a progress monitoring schedule

Enlist Your Implementation Team

3.1 Determine the members that are best suited for the team.

3.2 Build a RACI to define their roles.

3.3 Create a change vision.

3.4 Create your change communication strategy.

Train Your Managers to Lead Through Change

4.1 Conduct the manager training workshop with managers.

4.2 Review the stakeholder engagement plans.

4.3 Review individual transition plan template with managers

Build Your Transition Plans

5.1 Bring managers back in to complete transition plans.

5.2 Revisit new organizational design as a source for information.

5.3 Complete aspects of the template that do not require feedback.

5.4 Discuss strategies for transitioning.

Deliverables
  1. McLean Leadership Index Dashboard
  2. Organizational Design Implementation Project Planning Tool
  1. Completed Organizational Design Implementation Project Planning Tool
  1. Communication Strategy
  1. Stakeholder Engagement Plans
  2. Conflict Style Self-Assessments
  3. Organizational Design Implementation Transition Plan Template
  1. Organizational Design Implementation Transition Plan Template

Phase 1

Build a Change Communication Strategy

Build a change communication strategy

Outcomes of this Section:

  • Launch the McLean Leadership Index
  • Define your change team
  • Build your reorganization kick-off presentation and FAQ for staff and business stakeholders

This section involves the following participants:

  • CIO
  • IT leadership team
  • IT staff

Key Section Insight:

Effective organizational design implementations mitigate the risk of turnover and lost productivity through ongoing monitoring of employee engagement levels. Take a data-driven approach to managing engagement with Info-Tech’s real-time MLI engagement dashboard and adjust your communication and implementation strategy in real-time before engagement risks become issues.

Phase 1 outline

Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

Guided Implementation 1: Build a Change Communication Strategy

Proposed Time to Completion (in weeks): 1-6 weeks

Step 1.1: Launch Your McLean Leadership Index Survey

Start with an analyst kick off call:

  • Discuss the benefits and uses of the MLI.
  • Go over the required information (demographics, permissions, etc.).
  • Set up a live demo of the survey.

Then complete these activities…

  • Launch the survey with your staff.
  • Have a results call with a member of the Info-Tech staff.

With these tools & templates:

McLean Leadership Index

Step 1.2: Establish Your Implementation Team

Review findings with analyst:

  • Review what members of your department should participate.
  • Build a RACI to determine the roles of your team members.

Then complete these activities…

  • Hold a kick-off meeting with your new implementation team.
  • Build the RACI for your new team members and their roles.

Step 1.3: Build Your Change Communication Strategy

Finalize phase deliverable:

  • Customize your reorganization kick-off presentation.
  • Create your change vision. Review the communication strategy.

Then complete these activities…

  • Hold your kick-off presentation with staff members.
  • Launch the reorganization communications.

With these tools & templates:

  • Organizational Design Implementation Kick-Off Presentation
  • Organizational Design Implementation FAQ

Set the stage for the organizational design implementation by effectively introducing and communicating the change to staff

Persuading people to change requires a “soft,” empathetic approach to keep them motivated and engaged. But don’t mistake “soft” for easy. Managing the people and communication aspects around the change are amongst the toughest work there is, and require a comfort and competency with uncertainty, ambiguity, and conflict.

Design Engagement Transition
Communication

Communication and engagement are the chains linking your design to transition. If the organizational design initiative is going to be successful it is critical that you manage this effectively. The earlier you begin planning the better. The more open and honest you are about the change the easier it will be to maintain engagement levels, business satisfaction, and overall IT productivity.

Kick-Off Presentation Inputs

  • LAUNCH THE MCLEAN LEADERSHIP INDEX
  • IDENTIFY YOUR CHANGE TEAM
  • DETERMINE CHANGE TEAM RESPONSIBILITIES
  • DEVELOP THE CHANGE VISION
  • DEFINE KEY MESSAGES AND GOALS
  • IDENTIFY MAJOR CHANGES
  • IDENTIFY KEY MILESTONES
  • BUILD AND MAINTAIN A CHANGE FAQ

Use the MLI engagement dashboard to measure your current state and the impact of the change in real-time

The McLean Leadership Index diagnostic is a low-effort, high-impact program that provides real-time metrics on staff engagement levels. Use these insights to understand your employees’ engagement levels throughout the organizational design implementation to measure the impact of the change and to manage turnover and productivity levels throughout the implementation.

WHY CARE ABOUT ENGAGEMENT DURING THE CHANGE? ENGAGED EMPLOYEES REPORT:

39% Higher intention to stay at the organization.

29% Higher performance and increased likelihood to work harder and longer hours. (Source: McLean and Company N=1,308 IT Employees)

Why the McLean Leadership Index?

Based on the Net Promoter Score (NPS), the McLean Leadership Index is one question asked monthly to assess engagement at various points in time.

Individuals responding to the MLI question with a 9 or 10 are your Promoters and are most positive and passionate. Those who answer 7 or 8 are Passives while those who answer 0 to 6 are Detractors.

Track your engagement distribution using our online dashboard to view MLI data at any time and view results based on teams, locations, manager, tenure, age, and gender. Assess the reactions to events and changes in real-time, analyze trends over time, and course-correct.

Dashboard reports: Know your staff’s overall engagement and top priorities

McLean Leadership Index

OVERALL ENGAGEMENT RESULTS

You get:

  • A clear breakdown of your detractors, passives, and promotors.
  • To view results by team, location, and individual manager.
  • To dig deeper into results by reviewing results by age, gender, and tenure at the organization to effectively identify areas where engagement is weak.

TIME SERIES TRENDS

You get:

  • View of changes in engagement levels for each team, location, and manager.
  • Breakdown of trends weekly, monthly, quarterly, and yearly.
  • To encourage leaders to monitor results to analyze root causes for changes and generate improvement initiatives.

QUALITATIVE COMMENTS

You get:

  • To view qualitative comments provided by staff on what is impacting their engagement.
  • To reply directly to comments without impacting the anonymity of the individuals making the comments.
  • To leverage trends in the comments to make changes to communication approaches.

Launch the McLean Leadership Index in under three weeks

Info-Tech’s dedicated team of program managers will facilitate this diagnostic program remotely, providing you with a convenient, low-effort, high-impact experience.

We will guide you through the process with your goals in mind to deliver deep insight into your successes and areas to improve.

What You Need To Do:

  1. Contact Info-Tech to launch the program and test the functionality in a live demo.
  2. Identify demographics and set access permissions.
  3. Complete manager training with assistance from Info-Tech Advisors.
  4. Participate in a results call with an Info-Tech Advisor to review results and develop an action plan.

Info-Tech’s Program Manager Will:

  1. Collect necessary inputs and generate your custom dashboard.
  2. Launch, maintain, and support the online system in the field.
  3. Send out a survey to 25% of the staff each week.
  4. Provide ongoing support over the phone, and the needed tools and templates to communicate and train staff as well as take action on results.

Explore your initial results in a one-hour call with an Executive Advisor to fully understand the results and draw insights from the data so you can start your action plan.

Start Your Diagnostic Now

We'll help you get set up as soon as you're ready.

Start Now

Communication has a direct impact on employee engagement; measure communication quality using your MLI results

A line graph titled: The impact of manager communication on employee engagement. The X-axis is labeled from Strongly Disagree to Strongly Agree, and the Y-axis is labeled: Percent of Engaged Respondents. There are 3 colour-coded lines: dark blue indicates My manager provides me with high-quality feedback; light blue indicates I clearly understand what is expected of me on the job; and green indicates My manager keeps me well informed about decisions that affect me. The line turns upward as it moves to the right of the graph.

(McLean & Company, 2015 N=17,921)

A clear relationship exists between how effective a manager’s communication is perceived to be and an employee’s level of engagement. If engagement drops, circle back with employees to understand the root causes.

Establish an effective implementation team to drive the organizational change

The implementation team is responsible for developing and disseminating information around the change, developing the transition strategy, and for the ongoing management of the changes.

The members of the implementation team should include:

  • CIO
  • Current IT leadership team
  • Project manager
  • Business relationship managers
  • Human resources advisor

Don’t be naïve – building and executing the implementation plan will require a significant time commitment from team members. Too often, organizations attempt to “fit it in” to their existing schedules resulting in poor planning, long delays, and overall poor results. Schedule this work like you would a project.

TOP 3 TIPS FOR DEFINING YOUR IMPLEMENTATION TEAM

  1. Select a Project Manager. Info-Tech strongly recommends having one individual accountable for key project management activities. They will be responsible for keeping the project on time and maintaining a holistic view of the implementation.
  2. Communication with Business Partners is Critical. If you have Business Relationship Managers (BRMs), involve them in the communication planning or assign someone to play this role. You need your business partners to be informed and bought in to the implementation to maintain satisfaction.
  3. Enlist Your “Volunteer Army.” (Kotter’s 8 Principles) If you have an open culture, Info-Tech encourages you to have an extended implementation team made up of volunteers interested in supporting the change. Their role will be to support the core group, assist in planning, and communicate progress with peers.

Determine the roles of your implementation team members

1.1 30 Minutes

Input

  • Implementation team members

Output

  • RACI for key transition elements

Materials

  • RACI chart and pen

Participants

  • Core implementation committee
  1. Each member should be actively engaged in all elements of the organizational design implementation. However, it’s important to have one individual who is accountable for key activities and ensures they are done effectively and measured.
  2. Review the chart below and as a group, brainstorm any additional key change components.
  3. For each component listed below, identify who is Accountable, Responsible, Consulted, and Informed for each (suggested responsibility below).
CIO IT Leaders PM BRM HR
Communication Plan A R R R C
Employee Engagement A R R R C

Departmental Transition Plan

R A R I R
Organizational Transition Plan R R A I C
Manager Training A R R I C

Individual Transition Plans

R A R I I
Technology and Logistical Changes R R A I I
Hiring A R I I R
Learning and Development R A R R R
Union Negotiations R I I I A
Process Development R R A R I

Fast-track your communication planning with Info-Tech’s Organizational Design Implementation Kick-Off Presentation

Organizational Design Implementation Kick-Off Presentation

Communicate what’s important to your staff in a simple, digestible way. The communication message should reflect what is important to your stakeholders and what they want to know at the time.

  • Why is this change happening?
  • What are the goals of the reorganization?
  • What specifically is changing?
  • How will this impact me?
  • When is this changing?
  • How and where can I get more information?

It’s important that the tone of the meeting suits the circumstances.

  • If the reorganization is going to involve lay-offs: The meeting should maintain a positive feel, but your key messages should stress the services that will be available to staff, when and how people will be communicated with about the change, and who staff can go to with concerns.
  • If the reorganization is to enable growth: Focus on celebrating where the organization is going, previous successes, and stress that the staff are critical in enabling team success.

Modify the Organizational Design ImplementationKick-Off Presentation with your key messages and goals

1.2 1 hour

Input

  • New organizational structure

Output

  • Organizational design goal statements

Materials

  • Whiteboard & marker
  • ODI Kick-off Presentation

Participants

  • OD implementation team
  1. Within your change implementation team, hold a meeting to identify and document the change goals and key messages.
  2. As a group, discuss what the key drivers were for the organizational redesign by asking yourselves what problem you were trying to solve.
  3. Select 3–5 key problem statements and document them on a whiteboard.
  4. For each problem statement, identify how the new organizational design will allow you to solve those problems.
  5. Document these in your Organizational Design Implementation Kick-Off Presentation.

Modify the presentation with your unique change vision to serve as the center piece of your communication strategy

1.3 1 hour

Input

  • Goal statements

Output

  • Change vision statement

Materials

  • Sticky notes
  • Pens
  • Voting dots

Participants

  • Change team
  1. Hold a meeting with the change implementation team to define your change vision. The change vision should provide a picture of what the organization will look like after the organizational design is implemented. It should represent the aspirational goal, and be something that staff can all rally behind.
  2. Hand out sticky notes and ask each member to write down on one note what they believe is the #1 desired outcome from the organizational change and one thing that they are hoping to avoid (you may wish to use your goal statements to drive this).
  3. As a group, review each of the sticky notes and group similar statements in categories. Provide each individual with 3 voting dots and ask them to select their three favorite statements.
  4. Select your winning statements in teams of 2–3. Review each statement and as a team work to strengthen the language to ensure that the statement provides a call to action, that it is short and to the point, and motivational.
  5. Present the statements back to the group and select the best option through a consensus vote.
  6. Document the change vision in your Organizational Design Implementation Kick-Off Presentation.

Customize the presentation identifying key changes that will be occurring

1.4 2 hours

Input

  • Old and new organizational sketch

Output

  • Identified key changes that are occurring

Materials

  • Whiteboard
  • Sticky notes & Pens
  • Camera

Participants

  • OD implementation team
  1. On a whiteboard, draw a high-level picture of your previous organizational sketch and your new organizational sketch.
  2. Using sticky notes, ask individuals to highlight key high-level challenges that exist in the current model (consider people, process, and technology).
  3. Consider each sticky note, and highlight and document how and where your new sketch will overcome those challenges and the key differences between the old structure and the new.
  4. Take a photo of the two sketches and comments, and document these in your Organizational Design Implementation Kick-Off Presentation.

Modify the presentation by identifying and documenting key milestones

1.5 1 hour

Input

  • OD implementation team calendars

Output

  • OD implementation team timeline

Materials

  • OD Implementation Kick-Off Presentation

Participants

  • OD implementation team
  1. Review the timeline in the Organizational Design Implementation Kick-Off Presentation. As a group, discuss the key milestones identified in the presentation:
    • Kick-off presentation
    • Departmental transition strategy built
    • Organizational transition strategy built
    • Manager training
    • One-on-one meetings with staff to discuss changes to roles
    • Individual transition strategy development begins
  2. Review the timeline, and keeping your other commitments in mind, estimate when each of these tasks will be completed and update the timeline.

Build an OD implementation FAQ to proactively address key questions and concerns about the change

Organizational Design Implementation FAQ

Leverage this template as a starting place for building an organizational design implementation FAQ.

This template is prepopulated with example questions and answers which are likely to arise.

Info-Tech encourages you to use the list of questions as a basis for your FAQ and to add additional questions based on the changes occurring at your organization.

It may also be a good idea to store the FAQ on a company intranet portal so that staff has access at all times and to provide users with a unique email address to forward questions to when they have them.

Build your unique organizational design implementation FAQ to keep staff informed throughout the change

1.6 1 hour + ongoing

Input

  • OD implementation team calendars

Output

  • OD implementation team timeline

Materials

  • OD Implementation Kick-Off Presentation

Participants

  • OD implementation team
  1. Download a copy of the Organizational Design Implementation FAQ and as a group, review each of the key questions.
  2. Delete any questions that are not relevant and add any additional questions you either believe you will receive or which you have already been asked.
  3. Divide the questions among team members and have each member provide a response to these questions.
  4. The CIO and the project manager should review the responses for accuracy and ensure they are ready to be shared with staff.
  5. Publish the responses on an IT intranet site and make the location known to your IT staff.

Dispelling rumors by using a large implementation team

CASE STUDY

Industry: Manufacturing

Source: CIO

Challenge

When rumors of the impending reorganization reached staff, there was a lot of confusion and some of the more vocal detractors in the department enforced these rumors.

Staff were worried about changes to their jobs, demotions, and worst of all, losing their jobs. There was no communication from senior management to dispel the gossip and the line managers were also in the dark so they weren’t able to offer support.

Staff did not feel comfortable reaching out to senior management about the rumors and they didn’t know who the change manager was.

Solution

The CIO and change manager put together a large implementation team that included many of the managers in the department. This allowed the managers to handle the gossip through informal conversations with their staff.

The change manager also built a communication strategy to communicate the stages of the reorganization and used FAQs to address the more common questions.

Results

The reorganization was adopted very quickly since there was little confusion surrounding the changes with all staff members. Many of the personnel risks were mitigated by the communication strategy because it dispelled rumors and took some of the power away from the vocal detractors in the department.

An engagement survey was conducted 3 months after the reorganization and the results showed that the engagement of staff had not changed after the reorganization.

If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

Book a workshop with our Info-Tech analysts:

  • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
  • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
  • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

The following are sample activities that will be conducted by Info-Tech analysts with your team:

1a: Launch the MLI Dashboard (Pre-Work)

Prior to the workshop, Info-Tech’s advisors will work with you to launch the MLI diagnostic to understand the overall engagement levels of your organization.

1b: Review Your MLI Results

The analysts will facilitate several exercises to help you and your team identify your current engagement levels, and the variance across demographics and over time.

If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

Book a workshop with our Info-Tech analysts:

1.1: Define Your Change Team Responsibilities

Review the key responsibilities of the organizational design implementation team and define the RACI for each individual member.

1.3: Define Your Change Vision and Goals

Identify the change vision statement which will serve as the center piece for your change communications as well as the key message you want to deliver to your staff about the change. These messages should be clear, emotionally impactful, and inspirational.

1.4: Identify Key Changes Which Will Impact Staff

Collectively brainstorm all of the key changes that are happening as a result of the change, and prioritize the list based on the impact they will have on staff. Document the top 10 biggest changes – and the opportunities the change creates or problems it solves.

If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

Book a workshop with our Info-Tech analysts:

1.5: Define the High-Level Change Timeline

Identify and document the key milestones within the change as a group, and determine key dates and change owners for each of the key items. Determine the best way to discuss these timelines with staff, and whether there are any which you feel will have higher levels of resistance.

1.5: Build the FAQ and Prepare for Objection Handling

As a group, brainstorm the key questions you believe you will receive about the change and develop a common FAQ to provide to staff members. The advisor will assist you in preparing to manage objections to limit resistance.

Phase 2

Build The Organizational Transition Plan

Build the organizational transition plan

Outcomes of this section:

  • A holistic list of projects that will enable the implementation of the organizational structure.
  • A schedule to monitor the progress of your change projects.

This section involves the following participants:

  • CIO
  • Reorganization Implementation Team

Key Section Insight:

Be careful to understand the impacts of the change on all groups and departments. For best results, you will need representation from all departments to limit conflict and ensure a smooth transition. For large IT organizations, you will need to have a plan for each department/work unit and create a larger integration project.

Phase 2 outline

Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

Guided Implementation 2: Build the Organizational Transition Plan

Proposed Time to Completion (in weeks): 2-4 weeks

Step 2.1: Review the Change Dimensions and How They Are Used to Plan Change Projects

Start with an analyst kick off call:

  • Review the purpose of the kick-off meeting.
  • Review the change project dimensions.
  • Review the Organizational Design Implementation Project Planning Tool.

Then complete these activities…

  • Conduct your kick-off meeting.
  • Brainstorm a list of reorganization projects and their related tasks.

With these tools & templates:

  • Organizational Design Implementation Project Planning Tool

Step 2.2: Review the List of Change Projects

Review findings with analyst:

  • Revisit the list of projects and tasks developed in the brainstorming session.
  • Assess the list and determine resourcing and dependencies for the projects.
  • Review the monitoring process.

Then complete these activities…

  • Complete the Organizational Design Implementation Project Planning Tool.
  • Map out your project dependencies and resourcing.
  • Develop a schedule for monitoring projects.

With these tools & templates:

  • Organizational Design Implementation Project Planning Tool

Use Info-Tech’s Organizational Design Implementation Project Planning Tool to plan and track your reorganization

  • Use Info-Tech’s Organizational Design Implementation Project Planning Tool to document and track all of the changes that are occurring during your reorganization.
  • Automatically build Gantt charts for all of the projects that are being undertaken, track problems in the issue log, and monitor the progress of projects in the reporting tab.
  • Each department/work group will maintain its own version of this tool throughout the reorganization effort and the project manager will maintain a master copy with all of the projects listed.
  • The chart comes pre-populated with example data gathered through the research and interview process to help generate ideas for your own reorganization.
  • Review the instructions at the top of each work sheet for entering and modifying the data within each chart.

Have a short kick-off meeting to introduce the project planning process to your implementation team

2.1 30 minutes

Output

  • Departmental ownership of planning tool

Materials

  • OD Implementation Project Planning Tool

Participants

  • Change Project Manager
  • Implementation Team
  • Senior Management (optional)
  1. The purpose of this kick-off meeting is to assign ownership of the project planning process to members of the implementation team and to begin thinking about the portfolio of projects required to successfully complete the reorganization.
  2. Use the email template included on this slide to invite your team members to the meeting.
  3. The topics that need to be covered in the meeting are:
    • Introducing the materials/templates that will be used throughout the process.
    • Assigning ownership of the Organizational Design Implementation Project Planning Tool to members of your team.
      • Ownership will be at the departmental level where each department or working group will manage their own change projects.
    • Prepare your implementation team for the next meeting where they will be brainstorming the list of projects that will need to be completed throughout the reorganization.
  4. Distribute/email the tools and templates to the team so that they may familiarize themselves with the materials before the next meeting.

Hello [participant],

We will be holding our kickoff meeting for our reorganization on [date]. We will be discussing the reorganization process at a high level with special attention being payed to the tools and templates that we will be using throughout the process. By the end of the meeting, we will have assigned ownership of the Project Planning Tool to department representatives and we will have scheduled the next meeting where we’ll brainstorm our list of projects for the reorganization.

Consider Info-Tech’s four organizational change dimensions when identifying change projects

CHANGE DIMENSIONS

  • TECHNOLOGY AND LOGISTICS
  • COMMUNICATION
  • STAFFING
  • PROCESS

Technology and Logistics

  • These are all the projects that will impact the technology used and physical logistics of your workspace.
  • These include new devices, access/permissions, new desks, etc.

Communication

  • All of the required changes after the reorganization to ongoing communications within IT and to the rest of the organization.
  • Also includes communication projects that are occurring during the reorganization.

Staffing

  • These projects address the changes to your staff’s roles.
  • Includes role changes, job description building, consulting with HR, etc.

Process

  • Projects that address changes to IT processes that will occur after the reorganization.

Use these trigger questions to help identify all aspects of your coming changes

STAFFING

  • Do you need to hire short or long-term staff to fill vacancies?
  • How long does it typically take to hire a new employee?
  • Will there be staff who are new to management positions?
  • Is HR on board with the reorganization?
  • Have they been consulted?
  • Have transition plans been built for all staff members who are transitioning roles/duties?
  • Will gaps in the structure need to be addressed with new hires?

COMMUNICATION

  • When will the change be communicated to various members of the staff?
  • Will there be disruption to services during the reorganization?
  • Who, outside of IT, needs to know about the reorganization?
  • Do external communications need to be adjusted because of the reorganization? Moving/centralizing service desk, BRMs, etc.?
  • Are there plans/is there a desire to change the way IT communicates with the rest of the organization?
  • Will the reorganization affect the culture of the department? Is the new structure compatible with the current culture?

Use these trigger questions to help identify all aspects of your coming changes (continued)

TECHNOLOGY AND LOGISTICS

  • Will employees require new devices in their new roles?
  • Will employees be required to move their workspace?
  • What changes to the workspace are required to facilitate the new organization?
  • Does new furniture have to be purchased to accommodate new spaces/staff?
  • Is the workspace adequate/up to date technologically (telephone network, Wi-Fi coverage, etc.)?
  • Will employees require new permissions/access for their changing roles?
  • Will permissions/access need to be removed?
  • What is your budget for the reorganization?
  • If a large geographical move is occurring, have problems regarding geography, language barriers, and cultural sensitivities been addressed?

PROCESS

  • What processes need to be developed?
  • What training for processes is required?
  • Is the daily functioning of the IT department predicted to change?
  • Are new processes being implemented during the reorganization?
  • How will the project portfolio be affected by the reorganization?
  • Is new documentation required to accompany new/changing processes?

Brainstorm the change projects to be carried out during the reorganization for your team/department

2.2 3 hours

Input

  • Constructive group discussion

Output

  • Thorough list of all reorganization projects

Materials

  • Whiteboard, sticky notes
  • OD Implementation Project Planning Tool

Participants

  • Implementation Team
  • CIO
  • Senior Management
  1. Before the meeting, distribute the list of trigger questions presented on the two previous slides to prepare your implementation team for the brainstorming session.
  2. Begin the meeting by dividing up your implementation team into the departments/work groups that they represent (and have ownership of the tool over).
  3. Distribute a different color of sticky notes to each team and have them write out each project they can think of for each of the change planning dimensions (Staffing, Communication, Process and Technology/Logistics) using the trigger questions.
  4. After one hour, ask the groups to place the projects that they brainstormed onto the whiteboard divided into the four change dimensions.
  5. Discuss the complete list of projects on the board.
    • Remove projects that are listed more than once since some projects will be universal to some/all departments.
    • Adjust the wording of projects for the sake of clarity.
    • Identify projects that are specific to certain departments.
  6. Document the list of high-level projects on tab 2 “Project Lists” within the OD Implementation Project Planning Tool after the activity is complete.

Prioritize projects to assist with project planning modeling

Prioritization is the process of ranking each project based on its importance to implementation success. Hold a meeting for the implementation team and extended team to prioritize the project list. At the conclusion of the meeting, each requirement should be assigned a priority level. The implementation teams will use these priority levels to ensure efforts are targeted towards the proper projects. A simple way to do this for your implementation is to use the MoSCoW Model of Prioritization to effectively order requirements.

The MoSCoW Model of Prioritization

MUST HAVE - Projects must be implemented for the organizational design to be considered successful.

SHOULD HAVE - Projects are high priority that should be included in the implementation if possible.

COULD HAVE - Projects are desirable but not necessary and could be included if resources are available.

WON'T HAVE - Projects won’t be in the next release, but will be considered for the future releases.

The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994.

Keep the following criteria in mind as you determine your priorities

Effective Prioritization Criteria

Criteria Description
Regulatory & Legal Compliance These requirements will be considered mandatory.
Policy or Contract Compliance Unless an internal policy or contract can be altered or an exception can be made, these projects will be considered mandatory.
Business Value Significance Give a higher priority to high-value projects.
Business Risk Any project with the potential to jeopardize the entire project should be given a high priority and implemented early.
Implementation Complexity Give a higher priority to quick wins.
Alignment with Strategy Give a higher priority to requirements that enable the corporate strategy and IT strategy.
Urgency Prioritize projects based on time sensitivity.
Dependencies A project on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.
Funding Availability Do we have the funding required to make this change?

Prioritize the change projects within your team/department to be executed during the reorganization

2.3 3 hours

Input

  • Organizational Design Implementation Project Planning Tool

Output

  • Prioritized list of projects

Materials

  • Whiteboard, sticky notes
  • OD Implementation Project Planning Tool

Participants

  • Implementation Team
  • Extended Implementation Team
  1. Divide the group into their department teams. Draw 4 columns on a whiteboard, including the following:
    • Must have
    • Should have
    • Could have
    • Won’t have
  2. As a group, review each project and collaboratively identify which projects fall within each category. You should have a strong balance between each of the categories.
  3. Beginning with the “must have” projects, determine if each has any dependencies. If any of the projects are dependent on another, add the dependency project to the “must have” category. Group and circle the dependent projects.
  4. Continue the same exercise with the “should have” and “could have” options.
  5. Record the results on tab “2. Project List” of the Organizational Design Implementation Project Planning Tool using the drop down option.

Determine resource availability for completing your change projects

2.4 2 hours

Input

  • Constructive group discussion

Output

  • Thorough list of all reorganization projects

Materials

  • Whiteboard, sticky notes
  • OD Implementation Project Planning Tool

Participants

  • Implementation Team
  • CIO
  • Senior Management
  1. Divide the group into their department teams to plan the execution of the high-level list of projects developed in activity 2.2.
  2. Review the list of high-level projects and starting with the “must do” projects, consider each in turn and brainstorm all of the tasks required to complete these projects. Write down each task on a sticky note and place it under the high-level project.
  3. On the same sticky note as the task, estimate how much time would be required to complete each task. Be realistic about time frames since these projects will be on top of all of the regular day-to-day work.
  4. Along with the time frame, document the resources that will be required and who will be responsible for the tasks. If you have a documented Project Portfolio, use this to determine resourcing.
  5. After mapping out the tasks, bring the group back together to present their list of projects, tasks, and required resources.
    • Go through the project task lists to make sure that nothing is missed.
    • Review the timelines to make sure they are feasible.
    • Review the resources to ensure that they are available and realistic based on constraints (time, current workload, etc.).
    • Repeat the process for the Should do and Could do projects.
  1. Document the tasks and resources in tab “3. Task Monitoring” in the OD Implementation Project Planning Tool after the activity is complete.

Map out the change project dependencies at the departmental level

2.5 2 hours

Input

  • Constructive group discussion

Output

  • Thorough list of all reorganization projects

Materials

  • Whiteboard, sticky notes
  • OD Implementation Project Planning Tool

Participants

  • Implementation Team
  • CIO
  • Senior Management
  1. Divide the group into their department teams to map the dependencies of their tasks created in activity 2.3.
  2. Take the project task sticky notes created in the previous activity and lay them out along a timeline from start to finish.
  3. Determine the dependencies of the tasks internal to the department. Map out the types of dependencies.
    • Finish to Start: Preceding task must be completed before the next can start.
    • Start to Start: Preceding task must start before the next task can start.
    • Finish to Finish: Predecessor must finish before successor can finish.
    • Start to Finish: Predecessor must start before successor can finish.
  4. Bring the group back together and review each group’s timeline and dependencies to make sure that nothing has been missed.
  5. As a group, determine whether there are dependencies that span the departmental lists of projects.
  6. Document all of the dependencies within the department and between departmental lists of projects and tasks in the OD Implementation Project Planning Tool.

Amalgamate all of the departmental change planning tools into a master copy

2.6 3 hours

Input

  • Department-specific copies of the OD Implementation Project Planning Tool

Output

  • Universal list of all of the change projects

Materials

  • Whiteboard and sticky notes

Participants

  • Implementation Project Manager
  • Members of the implementation team for support (optional)
  1. Before starting the activity, gather all of the OD Implementation Project Planning Tools completed at the departmental level.
  2. Review each completed tool and write all of the individual projects with their timelines on sticky notes and place them on the whiteboard.
  3. Build timelines using the documented dependencies for each department. Verify that the resources (time, people, physical) are adequate and feasible.
  4. Combine all of the departmental project planning tools into one master tool to be used to monitor the overall status of the reorganization. Separate the projects based on the departments they are specific to.
  5. Finalize the timeline based on resource approval and using the dependencies mapped out in the previous exercise.
  6. Approve the planning tools and store them in a shared drive so they can be accessed by the implementation team members.

Create a progress monitoring schedule

2.7 1 hour weekly

Input

  • OD Implementation Project Planning Tools (departmental & organizational)

Output

  • Actions to be taken before the next pulse meeting

Participants

  • Implementation Project Manager
  • Members of the implementation team for support
  • Senior Management
  1. Hold weekly pulse meetings to keep track of project progress.
  2. The agenda of each meeting should include:
    • Resolutions to problems/complications raised at the previous week’s meeting.
    • Updates on each department’s progress.
    • Raising any issues/complications that have appeared that week.
    • A discussion of potential solutions to the issues/complications.
    • Validating the work that will be completed before the next meeting.
    • Raising any general questions or concerns that have been voiced by staff about the reorganization.
  3. Upload notes from the meeting about resolutions and changes to the schedules to the shared drive containing the tools.
  4. Increase the frequency of the meetings towards the end of the project if necessary.

Building a holistic change plan enables adoption of the new organizational structure

CASE STUDY

Industry: Manufacturing

Source: CIO

Challenge

The CIO was worried about the impending reorganization due to problems that they had run into during the last reorganization they had conducted. The change management projects were not planned well and they led to a lot of uncertainty before and after the implementation.

No one on the staff was ready for the reorganization. Change projects were completed four months after implementation since many of them had not been predicted and cataloged. This caused major disruptions to their user services leading to drops in user satisfaction.

Solution

Using their large and diverse implementation team, they spent a great deal of time during the early stages of planning devoted to brainstorming and documenting all of the potential change projects.

Through regular meetings, the implementation team was able to iteratively adjust the portfolio of change projects to fit changing needs.

Results

Despite having to undergo a major reorganization that involved centralizing their service desk in a different state, there were no disruptions to their user services.

Since all of the change projects were documented and completed, they were able to move their service desk staff over a weekend to a workspace that was already set up. There were no changes to the user satisfaction scores over the period of their reorganization.

If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

Book a workshop with our Info-Tech analysts:

  • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
  • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
  • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

The following are sample activities that will be conducted by Info-Tech analysts with your team:

2.2 Brainstorm Your List of Change Projects

Review your reorganization plans and facilitate a brainstorming session to identify a complete list of all of the projects needed to implement your new organizational design.

2.5 Map Out the Dependencies and Resources for Your Change Projects

Examine your complete list of change projects and determine the dependencies between all of your change projects. Align your project portfolio and resource levels to the projects in order to resource them adequately.

Phase 3

Lead Staff Through the Reorganization

Train managers to lead through change

Outcomes of this Section:

  • Completed the workshop: Lead Staff Through Organizational Change
  • Managers possess stakeholder engagement plans for each employee
  • Managers are prepared to fulfil their roles in implementing the organizational change

This section involves the following participants:

  • CIO
  • IT leadership team
  • IT staff

Key Section Insight:

The majority of IT managers were promoted because they excelled at the technical aspect of their job rather than in people management. Not providing training is setting your organization up for failure. Train managers to effectively lead through change to see a 72% decrease in change management issues. (Source: Abilla, 2009)

Phase 3 outline

Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

Guided Implementation 3: Train Managers to Lead Through Change

Proposed Time to Completion (in weeks): 1-2 weeks

Step 3.1: Train Your Managers to Lead Through the Change

Start with an analyst kick off call:

  • Go over the manager training workshop section of this deck.
  • Review the deliverables generated from the workshop (stakeholder engagement plan and conflict style self-assessment).

Then complete these activities…

  • Conduct the workshop with your managers.

With these tools & templates:

  • Organizational Design Implementation Manager Training Guide
  • Organizational Design Implementation Stakeholder Engagement Plan Template

Step 3.2: Debrief After the Workshop

Review findings with analyst:

  • Discuss the outcomes of the manager training.
  • Mention any feedback.
  • High-level overview of the workshop deliverables.

Then complete these activities…

  • Encourage participants to review and revise their stakeholder engagement plans.
  • Review the Organizational Design Implementation Transition Plan Template and next steps.

Get managers involved to address the majority of obstacles to successful change

Managers all well-positioned to translate how the organizational change will directly impact individuals on their teams.

Reasons Why Change Fails

EMPLOYEE RESISTANCE TO CHANGE - 39%

MANAGEMENT BEHAVIOR NOT SUPPORTIVE OF CHANGE - 33%

INADEQUATE RESOURCE OR BUDGET - 14%

OTHER OBSTACLES - 14%

72% of change management issues can be directly improved by management.

(Source: shmula)

Why are managers crucial to organizational change?

  • Managers are extremely well-connected.
    • They have extensive horizontal and vertical networks spanning the organization.
    • Managers understand the informal networks of the organization.
  • Managers are valuable communicators.
    • Managers have established strong relationships with employees.
    • Managers influence the way staff perceive messaging.

Conduct a workshop with managers to help them lead their teams through change

Organizational Design Implementation Manager Training Guide

Give managers the tools and skills to support their employees and carry out difficult conversations.

Understand the role of management in communicating the change

Understand reactions to change

Resolve conflict

Respond to FAQs

Monitor and measure employee engagement

Prepare managers to effectively execute their role in the organizational change by running a 2-hour training workshop.

Complete the activities on the following slides to:

  • Plan and prepare for the workshop.
  • Execute the group exercises.
  • Help managers develop stakeholder engagement plans for each of their employees.
  • Initiate the McLean Leadership Index™ survey to measure employee engagement.

Plan and prepare for the workshop

3.1 Plan and prepare for the workshop.

Output

  • Workshop participants
  • Completed workshop prep

Materials

  • Organizational Design Implementation Manager Training Guide

Instructions

  1. Create a list of all managers that will be responsible for leading their teams through the change.
  2. Select a date for the workshop.
    • The training session will run approximately 2 hours and should be scheduled within a week of when the implementation plan is communicated organization-wide.
  3. Review the material outlined in the presentation and prepare the Organizational Design Implementation Manager Training Guide for the workshop:
    • Copy and print the “Pre-workshop Facilitator Instructions” and “Facilitator Notes” located in the notes section below each slide.
    • Revise frequently asked questions (FAQs) and responses.
    • Delete instruction slides.

Invite managers to the workshop

Workshop Invitation Email Template

Make necessary modifications to the Workshop Invitation Email Template and send invitations to managers.

Hi ________,

As you are aware, we are starting to roll out some of the initiatives associated with our organizational change mandate. A key component of our implementation plan is to ensure that managers are well-prepared to lead their teams through the transition.

To help you proactively address the questions and concerns of your staff, and to ensure that the changes are implemented effectively, we will be conducting a workshop for managers on .

While the change team is tasked with most of the duties around planning, implementing, and communicating the change organization-wide, you and other managers are responsible for ensuring that your employees understand how the change will impact them specifically. The workshop will prepare you for your role in implementing the organizational changes in the coming weeks, and help you refine the skills and techniques necessary to engage in challenging conversations, resolve conflicts, and reduce uncertainty.

Please confirm your attendance for the workshop. We look forward to your participation.

Kind regards,

Change team

Prepare managers for the change by helping them build useful deliverables

ODI Stakeholder Engagement Plan Template & Conflict Style Self-Assessment

Help managers create useful deliverables that continue to provide value after the workshop is completed.

Workshop Deliverables

Organizational Design Implementation Stakeholder Engagement Plan Template

  • Document the areas of change resistance, detachment, uncertainty, and support for each employee.
  • Document strategies to overcome resistance, increase engagement, reduce uncertainty, and leverage their support.
  • Create action items to execute after the workshop.

Conflict Style Self-Assessment

  • Determine how you approach conflicts.
  • Analyze the strengths and weaknesses of this approach.
  • Identify ways to adopt different conflict styles depending on the situation.

Book a follow-up meeting with managers and determine which strategies to Start, Stop, or Continue

3.2 1 hour

Output

  • Stakeholder engagement templates

Materials

  • Sticky notes
  • Pen and paper

Participants

  • Implementation Team
  • Managers
  1. Schedule a follow-up meeting 2–3 weeks after the workshop.
  2. Facilitate an open conversation on approaches and strategies that have been used or could be used to:
    • Overcome resistance
    • Increase engagement
    • Reduce uncertainty
    • Leverage support
  3. During the discussion, document ideas on the whiteboard.
  4. Have participants vote on whether the approaches and strategies should be started, stopped, or continued.
    • Start: actions that the team would like to begin.
    • Stop: actions that the team would like to stop.
    • Continue: actions that work for the team and should proceed.
  5. Encourage participants to review and revise their stakeholder engagement plans.

If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

Book a workshop with our Info-Tech analysts:

  • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
  • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
  • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

The following are sample activities that will be conducted by Info-Tech analysts with your team:

3.1 The Change Maze

Break the ice with an activity that illustrates the discomfort of unexpected change, and the value of timely and instructive communication.

3.2 Perform a Change Management Retrospective

Leverage the collective experience of the group. Share challenges and successes from previous organizational changes and apply those lessons to the current transition.

3.3 Create a Stakeholder Engagement Plan

Have managers identify areas of resistance, detachment, uncertainty, and support for each employee and share strategies for overcoming resistance and leveraging support to craft an action plan for each of their employees.

3.4 Conduct a Conflict Style Self-Assessment

Give participants an opportunity to better understand how they approach conflicts. Administer the Conflict Style Self-Assessment to identify conflict styles and jumpstart a conversation about how to effectively resolve conflicts.

Transition your staff to their new roles

Outcomes of this Section:

  • Identified key responsibilities to transition
  • Identified key relationships to be built
  • Built staff individual transition plans and timing

This section involves the following participants:

  • All IT staff members

Key Section Insight

In order to ensure a smooth transition, you need to identify the transition scheduled for each employee. Knowing when they will retire and assume responsibilities and aligning this with the organizational transition will be crucial.

Phase 3b outline

Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

Guided Implementation 3b: Transition Staff to New Roles

Proposed Time to Completion (in weeks): 2-4

Step 4.1: Build Your Transition Plans

Start with an analyst kick off call:

  • Review the Organizational Design Implementation Transition Plan Template and its contents.
  • Return to the new org structure and project planning tool for information to fill in the template.

Then complete these activities…

  • Present the template to your managers.
  • Have them fill in the template with their staff.
  • Approve the completed templates.

With these tools & templates:

  • Organizational Design Implementation Project Planning Tool
  • Organizational Design Implementation Transition Plan Template

Step 4.2: Finalize Your Transition Plans

Review findings with analyst:

  • Discuss strategies for timing the transition of your employees.
  • Determine the readiness of your departments for transitioning.

Then complete these activities…

  • Build a transition readiness timeline of your departments.
  • Move your employees to their new roles.

With these tools & templates:

  • Organizational Design Implementation Project Planning Tool
  • Organizational Design Implementation Transition Plan Template

Use Info-Tech’s transition plan template to map out all of the changes your employees will face during reorganization

Organizational Design Implementation Transition Plan Template

  • Use Info-Tech’s Organizational Design Implementation Transition Plan Template to document (in consultation with your employees) all of the changes individual staff members need to go through in order to transition into their new roles.
  • It provides a holistic view of all of the changes aligned to the change planning dimensions, including:
    • Current and new job responsibilities
    • Outstanding projects
    • Documenting where the employee may be moving
    • Technology changes
    • Required training
    • New relationships that need to be made
    • Risk mitigation
  • The template is designed to be completed by managers for their direct reports.

Customize the transition plan template for all affected staff members

4.1 30 minutes per employee

Output

  • Completed transition plans

Materials

  • Individual transition plan templates (for each employee)

Participants

  • Implementation Team
  • Managers
  1. Implementation team members should hold one-on-one meetings with the managers from the departments they represent to go through the transition plan template.
  2. Some elements of the transition plan can be completed at the initial meeting with knowledge from the implementation team and documentation from the new organizational structure:
    • Employee information (except for the planned transition date)
    • New job responsibilities
    • Logistics and technology changes
    • Relationships (recommendations can be made about beneficial relationships to form if the employee is transitioning to a new role)
  3. After the meeting, managers can continue filling in information based on their own knowledge of their employees:
    • Current job responsibilities
    • Outstanding projects
    • Training (identify gaps in the employee’s knowledge if their role is changing)
    • Risks (potential concerns or problems for the employee during the reorganization)

Verify and complete the individual transition plans by holding one-on-one meetings with the staff

4.2 30 minutes per employee

Output

  • Completed transition plans

Materials

  • Individual transition plan templates (for each employee)

Participants

  • Managers
  • Staff (Managers’ Direct Reports)
  1. After the managers complete everything they can in the transition plan templates, they should schedule one-on-one meetings with their staff to review the completed document to ensure the information is correct.
  2. Begin the meeting by verifying the elements that require the most information from the employee:
    • Current job responsibilities
    • Outstanding projects
    • Risks (ask about any problems or concerns they may have about the reorganization)
  3. Discuss the following elements of the transition plan to get feedback:
    • Training (ask if there is any training they feel they may need to be successful at the organization)
    • Relationships (determine if there are any relationships that the employee would like to develop that you may have missed)
  4. Since this may be the first opportunity that the staff member has had to discuss their new role (if they are moving to one), review their new job title and new job responsibilities with them. If employees are prepared for their new role, they may feel more accountable for quickly adopting the reorganization.
  5. Document any questions that they may have so that they can be answered in future communications from the implementation team.
  6. After completing the template, managers will sign off on the document in the approval section.

Validate plans with organizational change project manager and build the transition timeline

4.3 3 hours

Input

  • Individual transition plans
  • Organizational Design Implementation Project Planning Tool

Output

  • Timeline outlining departmental transition readiness

Materials

  • Whiteboard

Participants

  • Implementation Project Manager
  • Implementation Team
  • Managers
  1. After receiving all of the completed individual transition plan templates from managers, members of the implementation team need to approve the contents of the templates (for the departments that they represent).
  2. Review the logistics and technology requirements for transition in each of the templates and align them with the completion dates of the related projects in the Project Planning Tool. These dates will serve as the earliest possible time to transition the employee. Use the latest date from the list to serve as the date that the whole department will be ready to transition.
  3. Hand the approved transition plan templates and the dates at which the departments will be ready for transitioning to the Implementation Project Manager.
  4. The Project Manager needs to verify the contents of the transition plans and approve them.
  5. On a calendar or whiteboard, list the dates that each department will be ready for transitioning.
  6. Review the master copy of the Project Planning Tool. Determine if the outstanding projects limit your ability to transition the departments (when they are ready to transition). Change the ready dates of the departments to align with the completion dates of those projects.
  7. Use these dates to determine the timeline for when you would like to transition your employees to their new roles.

Overcoming inexperience by training managers to lead through change

CASE STUDY

Industry: Manufacturing

Source: CIO

Challenge

The IT department had not undergone a major reorganization in several years. When they last reorganized, they experienced high turnover and decreased business satisfaction with IT.

Many of the managers were new to their roles and only one of them had been around for the earlier reorganization. They lacked experience in leading their staff through major organizational changes.

One of the major problems they faced was addressing the concerns, fears, and resistance of their staff properly.

Solution

The implementation team ran a workshop for all of the managers in the department to train them on the change and how to communicate the impending changes to their staff. The workshop included information on resistance and conflict resolution.

The workshop was conducted early on in the planning phases of the reorganization so that any rumors or gossip could be addressed properly and quickly.

Results

The reorganization was well accepted by the staff due to the positive reinforcement from their managers. Rumors and gossip about the reorganization were under control and the staff adopted the new organizational structure quickly.

Engagement levels of the staff were maintained and actually improved by 5% immediately after the reorganization.

Voluntary turnover was minimal throughout the change as opposed to the previous reorganization where they lost 10% of their staff. There was an estimated cost savings of $250,000–$300,000.

If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

Book a workshop with our Info-Tech analysts:

  • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
  • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
  • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

The following are sample activities that will be conducted by Info-Tech analysts with your team:

3.2.1 Build Your Staff Transition Plan

Review the contends of the staff transition plan, and using the organizational change map as a guide, build the transition schedule for one employee.

3.2.1 Review the Transition Plan With the Transition Team

Review and validate the results for your transition team schedule with other team members. As a group, discuss what makes this exercise difficult and any ideas for how to simplify the exercise.

Works cited

American Productivity and Quality Center. “Motivation Strategies.” Potentials Magazine. Dec. 2004. Web. November 2014.

Bersin, Josh. “Time to Scrap Performance Appraisals?” Forbes Magazine. 5 June 2013. Web. 30 Oct 2013.

Bridges, William. Managing Transitions, 3rd Ed. Philadelphia: Da Capo Press, 2009.

Buckley, Phil. Change with Confidence – Answers to the 50 Biggest Questions that Keep Change Leaders up at Night. Canada: Jossey-Bass, 2013.

“Change and project management.” Change First. 2014. Web. December 2009. <http://www.changefirst.com/uploads/documents/Change_and_project_management.pdf>.

Cheese, Peter, et al. “Creating an Agile Organization.” Accenture. Oct. 2009. Web. Nov. 2013.

Croxon, Bruce et al. “Dinner Series: Performance Management with Bruce Croxon from CBC's 'Dragon's Den.'” HRPA Toronto Chapter. Sheraton Hotel, Toronto, ON. 12 Nov. 2013. Panel discussion.

Culbert, Samuel. “10 Reasons to Get Rid of Performance Reviews.” Huffington Post Business. 18 Dec. 2012. Web. 28 Oct. 2013. <http://www.huffingtonpost.com/samuel-culbert/performance-reviews_b_2325104.html>.

Denning, Steve. “The Case Against Agile: Ten Perennial Management Objections.” Forbes Magazine. 17 Apr. 2012. Web. Nov. 2013.

Works cited cont.

“Establish A Change Management Structure.” Human Technology. Web. December 2014.

Estis, Ryan. “Blowing up the Performance Review: Interview with Adobe’s Donna Morris.” Ryan Estis & Associates. 17 June 2013. Web. Oct. 2013. <http://ryanestis.com/adobe-interview/>.

Ford, Edward L. “Leveraging Recognition: Noncash incentives to Improve Performance.” Workspan Magazine. Nov 2006. Web. Accessed May 12, 2014.

Gallup, Inc. “Gallup Study: Engaged Employees Inspire Company Innovation.” Gallup Management Journal. 12 Oct. 2006. Web. 12 Jan 2012.

Gartside, David, et al. “Trends Reshaping the Future of HR.” Accenture. 2013. Web. 5 Nov. 2013.

Grenville-Cleave, Bridget. “Change and Negative Emotions.” Positive Psychology News Daily. 2009.

Heath, Chip, and Dan Heath. Switch: How to Change Things When Change Is Hard. Portland: Broadway Books. 2010.

HR Commitment AB. Communicating organizational change. 2008.

Keller, Scott, and Carolyn Aiken. “The Inconvenient Truth about Change Management.” McKinsey & Company, 2009. <http://www.mckinsey.com/en.aspx>.

Works cited cont.

Kotter, John. “LeadingChange: Why Transformation Efforts Fail.” Harvard Business Review. March-April 1995. <http://hbr.org>.

Kubler-Ross, Elisabeth and David Kessler. On Grief and Grieving: Finding the Meaning of Grief Through the Five Stages of Loss. New York: Scribner. 2007.

Lowlings, Caroline. “The Dangers of Changing without Change Management.” The Project Manager Magazine. December 2012. Web. December 2014. <http://changestory.co.za/the-dangers-of-changing-without-change-management/>.

“Managing Change.” Innovative Edge, Inc. 2011. Web. January 2015. <http://www.getcoherent.com/managing.html>.

Muchinsky, Paul M. Psychology Applied to Work. Florence: Thomson Wadsworth, 2006.

Nelson, Kate and Stacy Aaron. The Change Management Pocket Guide, First Ed., USA: Change Guides LLC, 2005.

Nguyen Huy, Quy. “In Praise of Middle Managers.” Harvard Business Review. 2001. Web. December 2014. <https://hbr.org/2001/09/in-praise-of-middle-managers/ar/1>

“Only One-Quarter of Employers Are Sustaining Gains From Change Management Initiatives, Towers Watson Survey Finds.” Towers Watson. August 2013. Web. January 2015. <http://www.towerswatson.com/en/Press/2013/08/Only-One-Quarter-of-Employers-Are-Sustaining-Gains-From-Change-Management>.

Shmula. “Why Transformation Efforts Fail.” Shmula.com. September 28, 2009. <http://www.shmula.com/why-transformation-efforts-fail/1510/>

Master Your Security Incident Response Communications Program

  • Buy Link or Shortcode: {j2store}321|cart{/j2store}
  • member rating overall impact: 8.0/10 Overall Impact
  • member rating average dollars saved: $2,339 Average $ Saved
  • member rating average days saved: 5 Average Days Saved
  • Parent Category Name: Threat Intelligence & Incident Response
  • Parent Category Link: /threat-intelligence-incident-response
  • When a significant security incident is discovered, usually very few details are known for certain. Nevertheless, the organization will need to say something to affected stakeholders.
  • Security incidents tend to be ongoing situations that last considerably longer than other types of crises, making communications a process rather than a one-time event.
  • Effective incident response communications require collaboration from: IT, Legal, PR, and HR – groups that often speak “different languages.”

Our Advice

Critical Insight

  • There’s no such thing as successful incident response communications; strive instead for effective communications. There will always be some fallout after a security incident, but it can be effectively mitigated through honesty, transparency, and accountability.
  • Effective external communications begin with effective internal communications. Security Incident Response Team members come from departments that don’t usually work closely with each other. This means they often have different ways of thinking and speaking about issues. Be sure they are familiar with each other before a crisis occurs.
  • You won’t save face by withholding embarrassing details. Lying only makes a bad situation worse, but coming clean and acknowledging shortcomings (and how you’ve fixed them) can go a long way towards restoring stakeholders’ trust.

Impact and Result

  • Effective and efficient management of security incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities: communications must be integrated into each of these phases.
  • Understand that prior planning helps to take the guesswork out of incident response communications. By preparing for several different types of security incidents, the communications team will get used to working with each other, as well as learning what strategies are and are not effective. Remember, the communications team contains diverse members from various departments, and each may have different ideas about what information is important to release.

Master Your Security Incident Response Communications Program Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should implement a security incident response communications plan, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Dive into communications planning

This phase addresses the benefits and challenges of incident response communications and offers advice on how to assemble a communications team and develop a threat escalation protocol.

  • Master Your Security Incident Response Communications Program – Phase 1: Dive Into Communications Planning
  • Security Incident Management Plan

2. Develop your communications plan

This phase focuses on creating an internal and external communications plan, managing incident fallout, and conducting a post-incident review.

  • Master Your Security Incident Response Communications Program – Phase 2: Develop Your Communications Plan
  • Security Incident Response Interdepartmental Communications Template
  • Security Incident Communications Policy Template
  • Security Incident Communications Guidelines and Templates
  • Security Incident Metrics Tool
  • Tabletop Exercises Package
[infographic]

Embrace Business-Managed Applications

  • Buy Link or Shortcode: {j2store}179|cart{/j2store}
  • member rating overall impact: 9.0/10 Overall Impact
  • member rating average dollars saved: $64,999 Average $ Saved
  • member rating average days saved: 18 Average Days Saved
  • Parent Category Name: Architecture & Strategy
  • Parent Category Link: /architecture-and-strategy
  • The traditional model of managing applications does not address the demands of today’s rapidly changing market and digitally minded business, putting stress on scarce IT resources. The business is fed up with slow IT responses and overbearing desktop and system controls.
  • The business wants more control over the tools they use. Software as a service (SaaS), business process management (BPM), robotic process automation (RPA), artificial intelligence (AI), and low-code development platforms are all on their radar.
  • However, your current governance and management structures do not accommodate the risks and shifts in responsibilities to business-managed applications.

Our Advice

Critical Insight

  • IT is a business partner, not just an operator. Effective business operations hinge on high-quality, valuable, fit-for-purpose applications. IT provides the critical insights, guidance, and assistance to ensure applications are implemented and leveraged in a way that maximizes return on investment, whether it is being managed by end users or lines of business (LOBs). This can only happen if the organization views IT as a critical asset, not just a supporting player.
  • All applications should be business owned. You have applications because LOBs need them to meet the objectives and key performance indicators defined in the business strategy. Without LOBs, there would be no need for business applications. LOBs define what the application should be and do for it to be successful, so LOBs should own them.
  • Everything boils down to trust. The business is empowered to make their own decisions on how they want to implement and use their applications and, thus, be accountable for the resulting outcomes. Guardrails, role-based access, application monitoring, and other controls can help curb some risk factors, but it should not come at the expense of business innovation and time-sensitive opportunities. IT must trust the business will make rational application decisions, and the business must trust IT to support them in good times and bad.

Impact and Result

  • Focus on the business units that matter. BMA can provide significant value to LOBs if teams and stakeholders are encouraged and motivated to adopt organizational and operational changes.
  • Reimagine the role of IT. IT is no longer the gatekeeper that blocks application adoption. Rather, IT enables the business to adopt the tools they need to be productive and they guide the business on successful BMA practices.
  • Instill business accountability. With great power comes great responsibility. If the business wants more control of their applications, they must be willing to take ownership of the outcomes of their decisions.

Embrace Business-Managed Applications Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should embrace business-managed applications, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

  • Embrace Business-Managed Applications – Phases 1-3
  • Business-Managed Applications Communication Template

1. State your objectives

Level-set the expectations for your business-managed applications.

  • Embrace Business- Managed Applications – Phase 1: State Your Objectives

2. Design your framework and governance

Identify and define your application managers and owners and build a fit-for-purpose governance model.

  • Embrace Business-Managed Applications – Phase 2: Design Your Framework & Governance

3. Build your roadmap

Build a roadmap that illustrates the key initiatives to implement your BMA and governance models.

  • Embrace Business-Managed Applications – Phase 3: Build Your Roadmap

[infographic]

Workshop: Embrace Business-Managed Applications

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 State Your Objectives

The Purpose

Define business-managed applications in your context.

Identify your business-managed application objectives.

State the value opportunities with business-managed applications.

Key Benefits Achieved

A consensus definition and list of business-managed applications goals

Understanding of the business value business-managed applications can deliver

Activities

1.1 Define business-managed applications.

1.2 List your objectives and metrics.

1.3 State the value opportunities.

Outputs

Grounded definition of a business-managed application

Goals and objectives of your business-managed applications

Business value opportunity with business-managed applications

2 Design Your Framework & Governance

The Purpose

Develop your application management framework.

Tailor your application delivery and ownership structure to fit business-managed applications.

Discuss the value of an applications committee.

Discuss technologies to enable business-managed applications.

Key Benefits Achieved

Fit-for-purpose and repeatable application management selection framework

Enhanced application governance model

Applications committee design that meets your organization’s needs

Shortlist of solutions to enable business-managed applications

Activities

2.1 Develop your management framework.

2.2 Tune your delivery and ownership accountabilities.

2.3 Design your applications committee.

2.4 Uncover your solution needs.

Outputs

Tailored application management selection framework

Roles definitions of application owners and managers

Applications committee design

List of business-managed application solution features and services

3 Build Your Roadmap

The Purpose

Build your roadmap to implement busines-managed applications and build the foundations of your optimized governance model.

Key Benefits Achieved

Implementation initiatives

Adoption roadmap

Activities

3.1 Build your roadmap.

Outputs

Business-managed application adoption roadmap

 

Customer Value Contribution

I'm proud to announce our new Customer Value Contribution Calculator©, or CVCC© in short.

It enhances and possibly replaces the BIA (Business Impact Analysis) process with a much simpler way.

More info to follow shortly.

Decide if You Are Ready for SAFe

  • Buy Link or Shortcode: {j2store}355|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Architecture & Strategy
  • Parent Category Link: /architecture-and-strategy
  • Complex application landscapes require delivery teams to work together and coordinate changes across multiple product lines and releases.
  • Leadership wants to balance strategic goals with localized prioritization of changes.
  • Traditional methodologies are not well suited to support enterprise agility: Scrum doesn’t scale easily, and Waterfall is too slow and risky.

Our Advice

Critical Insight

SAFe’s popularity is largely due to its structural resemblance to enterprise portfolio and project planning with top-down prioritization and decision making. This directly conflicts with Agile’s purpose and principles of empowerment and agility.

  • Poor culture, processes, governance, and leadership will disrupt any methodology. Many drivers for SAFe could be solved by improving and standardizing development and release management within current methodologies.
  • Few organizations are capable or should be applying a pure SAFe framework. Successful organizations have adopted and modified SAFe frameworks to best fit their needs, teams, value streams, and maturity.

Impact and Result

  • Start with a clear understanding of your needs, constraints, goals, and culture.
    • Start with an Agile readiness assessment. Agile is core to value realization.
    • Take the time to determine your drivers and goals.
    • If SAFe is right for you, selecting the right implementation partner is key.
  • Plan SAFe as a long-term enterprise cultural transformation requiring changes at all levels.

Decide if You Are Ready for SAFe Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Decide if You Are Ready for SAFe Storyboard – Research to help you understand where SAFe fits into delivery methodologies and determine if SAFe is right for your organization.

This deck will guide you to define your primary drivers for SAFe, assess your Agile readiness, define enablers and blockers, estimate implementation risk, and start your SAFe implementation plan.

  • Decide if You Are Ready for SAFe Storyboard

2. Scaled Agile Readiness Assessment – A tool to conduct an Agile readiness survey.

Start your journey with a clear understanding about the level of Agile and product maturity throughout the organization. Each area that lacks strength should be evaluated further and added to your journey map.

  • Scaled Agile Readiness Assessment

3. SAFe Transformation Playbook – A template to build a change management plan to guide your transition.

Define clear ownership for every critical step.

  • SAFe Transformation Playbook
[infographic]

Workshop: Decide if You Are Ready for SAFe

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Understand where SAFe fits into delivery methodologies and SDLCs

The Purpose

Understand what is driving your proposed SAFe transformation and if it is the right framework for your organization.

Key Benefits Achieved

Better understanding of your scaled agile needs and drivers

Activities

1.1 Define your primary drivers for SAFe.

1.2 Create your own list of pros and cons of SAFe.

Outputs

List of primary drivers for SAFe

List of pros and cons of SAFe

2 Determine if you are ready for SAFe

The Purpose

Identify factors influencing a SAFe implementation and ensure teams are aware and prepared.

Key Benefits Achieved

Starting understanding of your organization’s readiness to implement a SAFe framework

Activities

2.1 Assess your Agile readiness.

2.2 Define enablers and blockers of scaling Agile delivery.

2.3 Estimate your SAFe implementation risk.

2.4 Start your SAFe implementation plan.

Outputs

Agile readiness assessment results

List of enablers and blockers of scaling Agile delivery

Estimated SAFe implementation risk

High-level SAFe implementation plan template

Further reading

Decide if You Are Ready for SAFe

Approach the Scaled Agile Framework (SAFe) with open eyes and an open wallet.

Analyst Perspective

Ensure that SAFe is the right move before committing.

Waterfall is dead. Or obsolete at the very least.

Organizations cannot wait months or years for product, service, application, and process changes. They need to embrace business agility to respond to opportunities more quickly and deliver value sooner. Agile established values and principles that have promoted smaller cycle times, greater connections between teams, improved return on investment (ROI) prioritization, and improved team empowerment.

Where organizations continue to struggle is matching localized Scrum teams with enterprise initiatives. This struggle is compounded by legacy executive planning cycles, which undermine Agile team authority. SAFe has provided a series of frameworks to help organizations deal with these issues. It combines enterprise planning and alignment with cross-team collaboration.

Don't rely on popularity or marketing to make your scaled Agile decision. SAFe is a highly disruptive transformation, and it requires extensive training, coaching, process changes, and time to implement. Without the culture shift to an Agile mindset at all levels, SAFe becomes a mirror of Waterfall processes dressed in SAFe names. Furthermore, SAFe itself will not fix problems with communication, requirements, development, testing, release, support, or governance. You will still need to fix these problems within the SAFe framework to be successful.

Hans Eckman, Principal Research Director, Applications Delivery and Management

Hans Eckman
Principal Research Director, Applications Delivery and Management
Info-Tech Research Group

Executive Summary

Your Challenge Common Obstacles Info-Tech's Approach
  • Complex application landscapes require delivery teams to work together and coordinate changes across multiple product lines and releases.
  • Leadership wants to maintain executive strategic planning with faster delivery of changes.
  • Traditional methodologies are not well suited to support enterprise agility.
    • Waterfall is too slow, inefficient, and full of accumulated risk.
    • Scrum is not easy to scale and requires behavioral changes.
  • Enterprise transformations are never fast or easy, and SAFe is positioned as a complete replacement of your delivery practices.
  • Teams struggle with SAFe's rigid framework, interconnected methodologies, and new terms.
  • Few organizations are successful at implementing a pure SAFe framework.
  • Organizations without scaled product families have difficulties organizing SAFe teams into proper value streams.
  • Team staffing and stability are hard to resolve.
Start with a clear understanding of your needs, constraints, goals, and culture.
  • Developing an Agile mindset is core to value realization. Start with Info-Tech's Agile Readiness Assessment.
  • Take the time to identify your drivers and goals.
  • If SAFe is right for you, build a transformation plan and select the right implementation partner.
Plan SAFe as a long-term enterprise cultural transformation, requiring changes at all levels.

Info-Tech Insight
SAFe is a highly disruptive enterprise transformation, and it won't solve your organizational delivery challenges by itself. Start with an open mind, and understand what is needed to support a multi-year cultural transition. Decide how far and how fast you are willing to transform, and make sure that you have the right transformation and coaching partner in place. There is no right software development lifecycle (SDLC) or methodology. Find or create the methodology that best aligns to your needs and goals.

Agile's Four Core Values

"...while there is value in the items on the right, we value the items on the left more."
- The Agile Manifesto

STOP! If you're not Agile, don't start with SAFe.

Agile over SAFe

Successful SAFe requires an Agile mindset at all levels.

Be aware of common myths around Agile and SAFe

SAFe does not...

1...solve development and communication issues.

2...ensure that you will finish requirements faster.

3...mean that you do not need planning and documentation.

"Without proper planning, organizations can start throwing more resources at the work, which spirals into the classic Waterfall issues of managing by schedule."
– Kristen Morton, Associate Implementation Architect,
OneShield Inc. (Info-Tech Interview)

Info-Tech Insight
Poor culture, processes, governance, and leadership will disrupt any methodology. Many drivers for SAFe could be solved by improving and standardizing development and release management within current methodologies.

Review the drivers that are motivating your organization to adopt and scale Agile practices

Functional groups have their own drivers to adopt Agile development processes, practices, and techniques (e.g. to improve collaboration, decrease churn, or increase automation). Their buy-in to scaling Agile is just as important as the buy-in of stakeholders.

If a group's specific needs and drivers are not addressed, its members may develop negative sentiments toward Agile development. These negative sentiments can affect their ability to see the benefits of Agile, and they may return to their old habits once the opportunity arises.

It is important to find opportunities in which both business objectives and functional group drivers can be achieved by scaling Agile development. This can motivate teams to continuously improve and adhere to the new environment, and it will maintain business buy-in. It can also be used to justify activities that specifically address functional group drivers.

Examples of Motivating Drivers for Scaling Agile

  • Improve artifact handoffs between development and operations.
  • Increase collaboration among development teams.
  • Reveal architectural and system risks early.
  • Expedite the feedback loop from support.
  • Improve capacity management.
  • Support development process innovation.
  • Create a safe environment to discuss concerns.
  • Optimize value streams.
  • Increase team engagement and comradery.

Don't start with scaled Agile!

Scaling Agile is a way to optimize product management and product delivery in application lifecycle management practices. Do not try to start with SAFe when the components are not yet in place.

Scaled Agile


Thought model describing how Agile connects Product Management to Product Delivery to elevate the entire Solution Lifecycle.

Scale Agile delivery to improve cross-functional dependencies and releases

Top Business Concerns When Scaling Agile

1 Organizational Culture: The current culture may not support team empowerment, learning from failure, and other Agile principles. SAFe also allows top-down decisions to persist.

2 Executive Support: Executives may not dedicate resources, time, and effort into removing obstacles to scaling Agile because of lack of business buy-in.

3 Team Coordination: Current collaboration structures may not enable teams and stakeholders to share information freely and integrate workflows easily.

4 Business Misalignment: Business vision and objectives may be miscommunicated early in development, risking poorly planned and designed initiatives and low-quality products.

Extending collaboration is the key to success.

Uniting stakeholders and development into a single body is the key to success. Assess the internal and external communication flow and define processes for planning and tracking work so that everyone is aware of how to integrate, communicate, and collaborate.

The goal is to enable faster reaction to customer needs, shorter release cycles, and improved visibility of the project's progress with cross-functional and diverse conversations.

Advantages of successful SAFe implementations

Once SAFe is complete and operational, organizations have seen measurable benefits:

  • Multiple frameworks to support different levels of SAFe usage
  • Deliberate and consistent planning and coordination
  • Coordinating dependencies within value streams
  • Reduced time to delivery
  • Focus on customers and end users
  • Alignment to business goals and value streams
  • Increased employee engagement

Sources: TechBeacon, 2019; Medium, 2020; "Benefits," Scaled Agile, 2023;
"Pros and Cons," PremierAgile, n.d.; "Scaling Agile Challenges," PremierAgile, n.d.

Advantages of successful SAFe implementations

Source: "Benefits," Scaled Agile, 2023

Recognize the difference between Scrum teams and the Scaled Agile Framework (SAFe)

SAFe provides a framework that aligns Scrum teams into coordinated release trains driven by top-down prioritization.

Scrum vs SAFe

Develop Your Agile Approach for a Successful Transformation

Source: Scaled Agile, Inc.

Info-Tech's IT Management & Governance Framework

Info-Tech's IT Management & Governance Framework

Info-Tech Insight
SAFe is an enterprise, culture, and process transformation that impacts all IT services. Some areas of Info-Tech's IT Management & Governance Framework have higher impacts and require special attention. Plan to include transformation support for each of these topics during your SAFe implementation. SAFe will not fix broken processes on its own.

Without adopting an Agile mindset, SAFe becomes Waterfall with SAFe terminology

Waterfall with SAFe terminology

Source: Scaled Agile, Inc.

Info-Tech Insight
When first implementing SAFe, organizations reproduce their organizational design and Waterfall delivery structures with SAFe terms:

  • Delivery Manager = Release Train Engineer
  • Stakeholder/Sponsor = Product Manager
  • Release = Release Train
  • Project/Program = Project or Portfolio

SAFe isn't without risks or challenges

Risks and Causes of Failed SAFe Transformations

  • SAFe conflicts with legacy cultures and delivery processes.
  • SAFe promotes continued top-down decisions, undermining team empowerment.
  • Scaled product families are required to define proper value streams.
  • Team empowerment and autonomy are reduced.
  • SAFe activities are poorly executed.
  • There are high training and coaching costs.
  • Implementation takes a long time.
  • End-to-end delivery management tools aligned to SAFe are required.
  • Legacy delivery challenges are not specifically solved with SAFe.
  • SAFe is designed to work for large-scale development teams.

Challenges

  • Adjusting to a new set of terms for common roles, processes, and activities
  • Executing planning cycles
  • Defining features and epics at the right level
  • Completing adequate requirements
  • Defining value streams
  • Coordinating releases and release trains
  • Providing consistent quality

Sources: TechBeacon, 2019; Medium, 2020; "Benefits," Scaled Agile, 2023;
"Pros and Cons," PremierAgile, n.d.; "Scaling Agile Challenges," PremierAgile, n.d.

Focus on your core competencies instead

Before undertaking an enterprise transformation, consider improving the underlying processes that will need to be fixed anyway. Fixing these areas while implementing SAFe compounds the effort and disruption.

Product Delivery

Product Management

"But big-bang transitions are hard. They require total leadership commitment, a receptive culture, enough talented and experienced agile practitioners to staff hundreds of teams without depleting other capabilities, and highly prescriptive instruction manuals to align everyone's approach."
– "Agile at Scale," Harvard Business Review

Insight Summary

Overarching insight
SAFe is a highly disruptive enterprise transformation, and it will not solve your organizational delivery challenges by itself. Start with an open mind, and understand what is needed to support a multi-year cultural transition. Decide how far and fast you are willing to transform and make sure that you have the right transformation and coaching partner in place.

SAFe conflicts with core Agile principles.
The popularity of SAFe is largely due to its structural resemblance to enterprise portfolio and project planning with top-down prioritization and decision-making. This directly conflicts with Agile's purpose and principles of empowerment and agility.

SAFe and Agile will not solve enterprise delivery challenges.
Poor culture, processes, governance, and leadership will disrupt any methodology. Many issues with drivers for SAFe could be solved by improving development and release management within current methodologies.

Most organizations should not be using a pure SAFe framework
Few organizations are capable of, or should be, applying a pure SAFe framework. Successful organizations have adopted and modified SAFe frameworks to best fit their needs, teams, value streams, and maturity.

Without an Agile mindset, SAFe will be executed as Waterfall stages using SAFe terminology.
Groups that "Do Agile" are not likely to embrace the behavioral changes needed to make any scaled framework effective. SAFe becomes a series of Waterfall PIs using SAFe terminology.

Your transformation does not start with SAFe.
Start your transition to scaled Agile with a maturity assessment for current delivery practices. Fixing broken process, tools, and teams must be at the heart of your initiative.

Blueprint Deliverables

Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

Key Deliverable

SAFe Transformation Playbook

Build a transformation and organizational change management plan to guide your transition. Define clear ownership for every critical step.

Scaled Agile Readiness Assessment

Conduct the Agile readiness survey. Without an Agile mindset, SAFe will follow Waterfall or WaterScrumFall practices.

Case Study

Spotify's approach to Agile at scale

INDUSTRY: Digital Media
SOURCE: Unified Communications and Collaborations

Spotify's Scaling Agile Initiative

With rapid user adoption growth (over 15 million active users in under six years), Spotify had to find a way to maintain an Agile mindset across 30+ teams in three different cities, while maintaining the benefits of cross-functional collaboration and flexibility for future growth.

Spotify's Approach

Spotify found a fit-for-purpose way for the organization to increase team autonomy without losing the benefits of cross-team communication from economics of scale. Spotify focused on identifying dependencies that block or slow down work through a mix of reprioritization, reorganization, architectural changes, and technical solutions. The organization embraced dependencies that led to cross-team communication and built in the necessary flexibility to allow Agile to grow with the organization.

Spotify's scaling Agile initiative used interview processes to identify what each team depended on and how those dependencies blocked or slowed the team.

Squad refers to an autonomous Agile release team in this case study.

Case Study

Suncorp instilled dedicated communication streams to ensure cross-role collaboration and culture.

INDUSTRY: Insurance
SOURCE: Agile India, International Conference on Agile and Lean Software Development, 2014

Challenge Solution Results
  • Suncorp Group wanted to improve delivery and minimize risk. Suncorp realized that it needed to change its project delivery process to optimize business value delivery.
  • With five core business units, over 15,000 employees, and US$96 billion in assets, Suncorp had to face a broad set of project coordination challenges.
  • Suncorp decided to deliver all IT projects using Agile.
  • Suncorp created a change program consisting of five main streams of work, three of which dealt with the challenges specific to Agile culture:
    • People: building culture, leadership, and support
    • Communication: ensuring regular employee collaboration
    • Capabilities: blending training and coaching
  • Sponsorship from management and champions to advocate Agile were key to ensure that everyone was unified in a common purpose.
  • Having a dedicated communication stream was vital to ensure regular sharing of success and failure to enable learning.
  • Having a structured, standard approach to execute the planned culture change was integral to success.

Case Study

Nationwide embraces DevOps and improves software quality.

INDUSTRY: Insurance
SOURCE: Agile India, International Conference on Agile and Lean Software Development, 2014

Challenge Solution Results
  • In the past, Nationwide primarily followed a Waterfall development process. However, this method created conflicts between IT and business needs.
  • The organization began transitioning from Waterfall to Agile development. It has seen early successes with Agile: decrease in defects per release and more success in meeting delivery times.
  • Nationwide needed to respond more efficiently to changing market requirements and regulations and to increase speed to market.
  • Nationwide decided to take a DevOps approach to application development and delivery.
  • IT wanted to perform continuous integration and deployment in its environments.
  • Cross-functional teams were organically created, made up of members from the business and multiple IT groups, including development and operations.
  • DevOps allowed Nationwide to be more Agile and more responsive to its customers.
  • Teams were able to perform acceptance testing with their customers in parallel with development. This allowed immediate feedback to help steer the project in the right direction.
  • DevOps improved code quality by 50% over a three-year period and reduced user downtime by 70%.

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit Guided Implementation Workshop Consulting
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

Diagnostics and consistent frameworks are used throughout all four options.

Guided Implementation

What does a typical GI on this topic look like?

Phase 1

Call #1:

Scope your requirements, objectives, and specific challenges.

Call #2:

1.1.1 Define your primary drivers for SAFe.

1.1.2 Create your own list of pros and cons of SAFe.

Call #3:

1.2.1 Assess your Agile readiness.

1.2.2 Define enablers and blockers for scaling Agile delivery.

1.2.3 Estimate your SAFe implementation risk.

Call #4:

1.2.4 Start your SAFe implementation plan.

Summarize your results and plan your next steps.

A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

A typical GI is one to four calls over the course of one to six weeks.

Workshop Overview

Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889

Pre-Planning Step 1.1 Step 1.2
Identify your stakeholders. Step 1.1 Understand where SAFe fits into your delivery methodologies and SDLCs. Step 1.2 Determine if you are ready for SAFe.
Activities 1. Determine stakeholders and subject matter experts.
2. Coordinate timing and participation.
3. Set goals and expectations for the workshop.
1.1.1 Define your primary drivers for SAFe.
1.1.2 Create your own list of pros and cons of SAFe
1.2.1 Assess your Agile readiness.
1.2.2 Define enablers and blockers for scaling Agile delivery.
1.2.3 Estimate your SAFe implementation risk.
1.2.4 Start your SAFe implementation plan.
Deliverables
  • Workshop schedule
  • Participant commitment
    • List of primary drivers for SAFe
    • List of pros and cons of SAFe
    • Agile Readiness Assessment results
    • List of enablers and blockers for scaling Agile delivery
    • Estimated SAFe implementation risk
    • Template for high-level SAFe implementation plan

    Supporting Your Agile Journey

    Enable Product Agile Delivery Executive Workshop Develop Your Agile Approach Spread Best Practices with an Agile Center of Excellence Implement DevOps Practices That Work Enable Organization-Wide Collaboration by Scaling Agile
    Number One Number two Number Three Number Four Number Five

    Align and prepare your IT leadership teams.

    Audience: Senior and IT delivery leadership

    Size: 8-16 people

    Time: 7 hours

    Tune Agile team practices to fit your organization culture.

    Audience: Agile pilot teams and subject matter experts (SMEs)

    Size: 10-20 people

    Time: 4 days

    Leverage Agile thought leadership to expand your best practices.

    Audience: Agile SMEs and thought leaders

    Size: 10-20 people

    Time: 4 days

    Build a continuous integration and continuous delivery pipeline.

    Audience: Product owners (POs) and delivery team leads

    Size: 10-20 people

    Time: 4 days

    Execute a disciplined approach to rolling out Agile methods.

    Audience: Agile steering team and SMEs

    Size: 3-8 people

    Time: 3 hours

    Repeat Legend

    Sample agendas are included in the following sections for each of these topics.

    Your Product Transformation Journey

    1. Make the Case for Product Delivery2. Enable Product Delivery - Executive Workshop3. Deliver on Your Digital Product Vision4. Deliver Digital Products at Scale5. Mature and Scale Product Ownership
    Align your organization with the practices to deliver what matters most.Participate in a one-day executive workshop to help you align and prepare your leadership.Enhance product backlogs, roadmapping, and strategic alignment.Scale product families to align with your organization's goals.Align and mature your product owners.

    Audience: Senior executives and IT leadership

    Size: 8-16 people

    Time: 6 hours

    Repeat Symbol

    Audience: Product owners/managers

    Size: 10-20 people

    Time: 3-4 days

    Repeat Symbol

    Audience: Product owners/managers

    Size: 10-20 people

    Time: 3-4 days

    Audience: Product owners/managers

    Size: 8-16 people

    Time: 2-4 days

    Repeat Symbol

    Repeat Legend

    Phase 1

    Determine if SAFe Is Right for Your Organization

    Phase 1
    1.1 Understand where SAFe fits into your delivery methodologies and SDLCs
    1.2 Determine if you are ready for SAFe (fit for purpose)

    This phase will walk you through the following activities:

    • 1.1.1 Define your primary drivers for SAFe.
    • 1.1.2 Create your own list of pros and cons of SAFe.
    • 1.2.1 Assess your Agile readiness.
    • 1.2.2 Define enablers and blockers for scaling Agile delivery.
    • 1.2.3 Estimate your SAFe implementation risk.
    • 1.2.4 Start your SAFe implementation plan.

    This phase involves the following participants:

    • Senior leadership
    • IT leadership
    • Project Management Office
    • Delivery managers
    • Product managers/owners
    • Agile thought leaders and coaches
    • Compliance teams leads

    Step 1.1

    Understand where SAFe fits into your delivery methodologies and SDLCs

    Activities
    1.1.1 Define your primary drivers for SAFe
    1.1.2 Create your own list of pros and cons of SAFe

    This step involves the following participants:

    • IT leadership
    • Delivery managers
    • Project management office
    • Product owners and managers
    • Development team leads
    • Portfolio managers
    • Architects

    Outcomes of this step:

    • List of primary drivers for SAFe
    • List of pros and cons of SAFe

    Agile's Four Core Values

    "...while there is value in the items on the right, we value the items on the left more."
    – The Agile Manifesto

    STOP! If you're not Agile, don't start with SAFe.

    Agile's Four Core Values

    Successful SAFe requires an Agile mindset at all levels.

    Be aware of common myths around Agile and SAFe

    SAFe does not...

    1...solve development and communication issues.

    2...ensure that you will finish requirements faster.

    3...mean that you do not need planning and documentation.

    "Without proper planning, organizations can start throwing more resources at the work, which spirals into the classic Waterfall issues of managing by schedule."
    – Kristen Morton, Associate Implementation Architect,
    OneShield Inc. (Info-Tech Interview)

    Info-Tech Insight
    SAFe only provides a framework and steps where these issues can be resolved.

    The importance of values and principles

    Modern development practices (such as Agile, Lean, and DevOps) are based on values and principles. This supports the move away from command-and-control management to self-organizing teams.

    Values

    • Values represent your team's core beliefs and capture what you want to instill in your team.

    Principles

    • Principles represent methods for solving a problem or deciding.
    • Given that principles are rooted in specifics, they can change more frequently because they are both fallible and conducive to learning.

    Consider the guiding principles of your application team

    Teams may have their own perspectives on how they deliver value and their own practices for how they do this. These perspectives can help you develop guiding principles for your own team to explain your core values and cement your team's culture. Guiding principles can help you:

    • Enable the appropriate environment to foster collaboration within current organizational, departmental, and cultural constraints
    • Foster the social needs that will engage and motivate your team in a culture that suits its members
    • Ensure that all teams are driven toward the same business and team goals, even if other teams are operating differently
    • Build organizational camaraderie aligned with corporate strategies

    Info-Tech Insight
    Following methodologies by the book can be detrimental if they do not fit your organization's needs, constraints, and culture. The ultimate goal of all teams is to deliver value. Any practices or activities that drive teams away from this goal should be removed or modified.

    Review the drivers that are motivating your organization to adopt and scale Agile practices

    Functional groups have their own drivers to adopt Agile development processes, practices, and techniques (e.g. to improve collaboration, decrease churn, or increase automation). Their buy-in to scaling Agile is just as important as the buy-in of stakeholders.

    By not addressing a group's specific needs and drivers, the resulting negative sentiments of its members toward Agile development can affect their ability to see the benefits of Agile and they may return to old habits once the opportunity arises.

    Find opportunities in which both business objectives and functional group drivers can be achieved with scaling Agile development. This alignment can motivate teams to continuously improve and adhere to the new environment, and it will maintain business buy-in. This assessment can also be used to justify activities that specifically address functional group drivers.

    Examples of Motivating Drivers for Scaling Agile

    • Improve artifact hand-offs between development and operations.
    • Increase collaboration among development teams.
    • Reveal architectural and system risks early.
    • Expedite the feedback loop from support.
    • Improve capacity management.
    • Support development process innovation.
    • Create a safe environment to discuss concerns.
    • Optimize value streams.
    • Increase team engagement and comradery.

    Exercise 1.1.1 Define your primary drivers for SAFe

    30 minutes

    • Brainstorm a list of drivers for scaling Agile.
    • Build a value canvas to help capture and align team expectations.
    • Identify jobs or functions that will be impacted by SAFe.
    • List your current pains and gains.
    • List the pain relievers and gain creators.
    • Identify the deliverable needed for a successful transformation.
    • Complete your SAFe value canvas in your SAFe Transformation Playbook.

    Enter the results in your SAFe Transformation Playbook.

    Input
    • Organizational understanding
    • Existing Agile delivery strategic plans
    Output
    • IT leadership
    • Delivery managers
    • Project management office
    • Product owners and managers
    • Development team leads
    • Portfolio managers
    • Architects

    SAFe Value Canvas Template

    SAFe Value Canvas Template

    Case Study

    A public utilities organization steadily lost stakeholder engagement, diminishing product quality.

    INDUSTRY: Public Utilities
    SOURCE: Info-Tech Expert Interview

    Challenge

    • The goal of a public utilities organization was to adopt Agile so it could quickly respond to changes and trim costs.
    • The organization decided to scale Agile using a structured approach. It began implementation with IT teams that were familiar with Agile principles and leveraged IT seniors as Agile champions. To ensure that Agile principles were widespread, the organization decided to develop a training program with vendor assistance.
    • As Agile successes began to be seen, the organization decided to increase the involvement of business teams gradually so it could organically grow the concept within the business.

    Results

    • Teams saw significant success with many projects because they could easily demonstrate deliverables and clearly show the business value. Over time, the teams used Agile for large projects with complex processing needs.
    • Teams continued to deliver small projects successfully, but business engagement waned over time. Some of the large, complex applications they delivered using Agile lacked the necessary functionality and appropriate controls and, in some cases, did not have the ability to scale due to a poor architectural framework. These applications required additional investment, which far exceeded the original cost forecasts.

    While Agile and product development are intertwined, they are not the same!

    Delivering products does not necessarily require an Agile mindset. However, Agile methods help to facilitate the journey because product thinking is baked into them.

    Agile and product development are intertwined

    Recognize the difference between Scrum teams and the Scaled Agile Framework (SAFe)

    SAFe provides a framework that aligns Scrum teams into coordinated release trains driven by top-down prioritization.

    Difference between Scrum and SAFe

    Develop Your Agile Approach for a Successful Transformation

    Without adopting an Agile mindset, SAFe becomes Waterfall with SAFe terminology

    Waterfall with SAFe terminology

    Info-Tech Insight
    When first implementing SAFe, organizations reproduce their organizational design and Waterfall delivery structures with SAFe terms:

    • Delivery Manager = Release Train Engineer
    • Stakeholder/Sponsor = Product Manager
    • Release = Release Train
    • Project/Program = Project or Portfolio

    Advantages of successful SAFe implementations

    Once SAFe is complete and operational, organizations have seen measurable benefits:

    • Multiple frameworks to support different levels of SAFe usage
    • Deliberate and consistent planning and coordination
    • Coordinating dependencies within value streams
    • Reduced time to delivery
    • Focus on customers and end users
    • Alignment to business goals and value streams
    • Increased employee engagement

    Sources: TechBeacon, 2019; Medium, 2020; "Benefits," Scaled Agile, 2023;
    "Pros and Cons," PremierAgile, n.d.; "Scaling Agile Challenges," PremierAgile, n.d.

    Advantages of successful SAFe implementations

    Source: "Benefits," Scaled Agile, 2023

    SAFe isn't without risks or challenges

    Risks and Causes of Failed SAFe Transformations

    • SAFe conflicts with legacy cultures and delivery processes.
    • SAFe promotes continued top-down decisions, undermining team empowerment.
    • Scaled product families are required to define proper value streams.
    • Team empowerment and autonomy are reduced.
    • SAFe activities are poorly executed.
    • There are high training and coaching costs.
    • Implementation takes a long time.
    • End-to-end delivery management tools aligned to SAFe are required.
    • Legacy delivery challenges are not specifically solved with SAFe.
    • SAFe is designed to work for large-scale development teams.

    Challenges

    • Adjusting to a new set of terms for common roles, processes, and activities
    • Executing planning cycles
    • Defining features and epics at the right level
    • Completing adequate requirements
    • Defining value streams
    • Coordinating releases and release trains
    • Providing consistent quality

    Sources: TechBeacon, 2019; Medium, 2020; "Benefits," Scaled Agile, 2023; "Pros and Cons," PremierAgile, n.d.; "Scaling Agile Challenges," PremierAgile, n.d.

    Exercise 1.1.2 Create your own list of the pros and cons of SAFe

    1 hour

    Pros Cons

    Enter the results in your SAFe Transformation Playbook

    Input
    • Organizational drivers
    • Analysis of SAFe
    • Estimate of fit for purpose
    Output
    • IT leadership
    • Delivery managers
    • Project management office
    • Product owners and managers
    • Development team leads
    • Portfolio managers
    • Architects

    Focus on your core competencies instead

    Before undertaking an enterprise transformation, consider improving the underlying processes that will need to be fixed anyway. Fixing these areas while implementing SAFe compounds the effort and disruption.

    Product Delivery

    Product Management

    "But big-bang transitions are hard. They require total leadership commitment, a receptive culture, enough talented and experienced agile practitioners to staff hundreds of teams without depleting other capabilities, and highly prescriptive instruction manuals to align everyone's approach."
    - "Agile at Scale," Harvard Business Review

    Step 1.2

    Determine if you are ready for SAFe (fit for purpose)

    Activities
    1.2.1 Assess your Agile readiness
    1.2.2 Define enablers and blockers for scaling Agile delivery
    1.2.3 Estimate your SAFe implementation risk
    1.2.4 Start your SAFe implementation plan

    This step involves the following participants:

    • IT leadership
    • Delivery managers
    • Project management office
    • Product owners and managers
    • Development team leads
    • Portfolio managers
    • Architects

    Outcomes of this step:

    • Agile Readiness Assessment results
    • Enablers and blockers for scaling Agile
    • SAFe implementation risk
    • SAFe implementation plan

    Use CLAIM to guide your Agile journey

    Use CLAIM to guide your Agile journey

    Conduct the Agile Readiness Assessment Survey

    Without an Agile mindset, SAFe will follow Waterfall or WaterScrumFall practices.

    • Start your journey with a clear understanding of the level of Agile and product maturity throughout your organization.
    • Each area that lacks strength should be evaluated further and added to your journey map.

    Chart of Agile Readiness

    Exercise 1.2.1 Assess your Agile readiness

    1 hour

    • Open and complete the Agile Readiness Assessment in your playbook or the Excel tool provided.
    • Discuss each area's high and low scores to reach a consensus.
    • Record your results in your SAFe Transformation Playbook.

    Chart of Agile Readiness

    Enter the results in Scaled Agile Readiness Assessment.

    Input
    • Organizational knowledge
    • Agile Readiness Assessment
    Output
    • IT leadership
    • Delivery managers
    • Project Management Office
    • Product owners and managers
    • Development team leads
    • Portfolio managers
    • Architects

    Exercise 1.2.2 Define enablers and blockers for scaling Agile delivery

    1 hour

    • Identify and mitigate blockers for scaling Agile in your organization.
      • Identify enablers who will support successful SAFe transformation.
      • Identify blockers who will make the transition to SAFe more difficult.
      • For each blocker, define at least one mitigating step.
    Enablers Blockers Mitigation

    Enter the results in your SAFe Transformation Playbook

    Input
    • Agile Readiness Assessment
    • Organizational knowledge
    Output
    • IT leadership
    • Delivery managers
    • Project management office
    • Product owners and managers
    • Development team leads
    • Portfolio managers
    • Architects

    Estimate your SAFe implementation risk

    Poor Fit High Risk Scaling Potential
    Team size <50 >150 or non-dedicated 50-150 dedicated
    Agile maturity Waterfall and project delivery Individual Scrum DevOps teams Scrum DevOps teams coordinating dependencies
    Product management maturity Project-driver changes from stakeholders Proxy product owners within delivery teams Defined product families and products
    Strategic goals Localized decisions Enterprise goals implemented at the app level Translation and refinement of enterprise goals through product families
    Enterprise architecture Siloed architecture standards Common architectures Future enterprise architecture and employee review board (ERB) reviews
    Release management Independent release schedules Formal release calendar Continuous integration/development (CI/CD) with organizational change management (OCM) scheduled cross-functional releases
    Requirements management and quality assurance Project based Partial requirements and test case coverage Requirements as an asset and test automation

    Exercise 1.2.3 Estimate your SAFe implementation risk

    30 minutes

    • Determine which description best matches your overall organizational state.
    • Enter the results in your SAFe Transformation Playbook.
    • Change the text to bold in the cell you selected to describe your current state and/or add a border around the cell.

    Chart of SAFe implementation risk

    Enter the results in SAFe Transformation Playbook.

    Input
    • Agile Readiness Assessment
    • Organizational knowledge
    Output
    • IT leadership
    • Delivery managers
    • Project management office
    • Product owners and managers
    • Development team leads
    • Portfolio managers
    • Architects

    Interpret your SAFe implementation risks

    Analyze your highlighted selections and patterns in the rows and columns. Use these factors to inform your SAFe implementation steps and timing.

    Interpret your SAFe implementation risks

    Build your implementation plan

    Build a transformation and organizational change management plan to guide your transition. Define clear ownership for every critical step.

    Plan your transformation.

    • Align stakeholders and thought leaders.
    • Select an implementation partner.
    • Insert critical steps.

    Build your SAFe framework.

    • Define your target SAFe framework.
    • Customize your SAFe framework.
    • Establish SAFe governance and reporting.
    • Insert critical steps.

    Implement SAFe practices.

    • Define product families and value streams.
    • Conduct SAFe training for:
      • Executive leadership
      • Agile SAFe coaches
      • Practitioners
    • Insert critical steps.

    For additional help with OCM, please download Master Organizational Change Management Practices.

    Exercise 1.2.4 Start your SAFe implementation plan

    30 minutes

    • Using the high-level SAFE implementation framework, begin building out the critical steps.
    • Record the results in your SAFe Transformation Playbook.
    • Your playbook is an evergreen document to help guide your implementation. It should be reviewed often.

    SAFe implementation plan

    Enter the results in your SAFe Transformation Playbook

    Input
    • SAFe readiness assessment
    • Enablers and blockers
    • Drivers for SAFe
    Output
    • IT leadership
    • Delivery managers
    • Project management office
    • Product owners and managers
    • Development team leads
    • Portfolio managers
    • Architects

    Select an implementation partner

    Finding the right SAFe implementation partner is critical to your transformation success.

    • Using your previous assessment, align internal and external resources to support your transformation.
    • Select a partner who has experience in similar organizations and is aligned with your delivery goals.
    • Plan to transition support to internal teams when SAFe practices have stabilized and moved into continuous improvement.
    • Augment your transformation partner with internal coaches.
    • Plan for a multiyear engagement before SAFe benefits are realized.

    Summary of Accomplishments

    Your journey begins.

    Implementing SAFe is a long, expensive, and difficult process. For some organizations, SAFe provides the balance of leadership-driven prioritization and control with shorter release cycles and time to value. The key is making sure that SAFe is right for you and you are ready for SAFe. Few organizations fit perfectly into one of the SAFe frameworks. Instead, consider fine-tuning and customizing SAFe to meet your needs and gradual transformation.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Contact your account representative for more information.
    workshops@infotech.com
    1-888-670-8889

    Additional Support

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

    To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

    Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.

    Below are sample activities that will be conducted by Info-Tech analysts with your team:

    Scaled Agile Delivery Readiness Assessment
    This assessment will help identify enablers and blockers in your organizational culture using our CLAIM+G organization transformation model.

    SAFE Value Canvas
    Use a value campus to define jobs, pains, gains, pain relievers, gain creators, and needed deliverables to help inform and guide your SAFe transformation.

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Bibliography

    "6 Biggest SAFe Agile Implementation Mistakes to Avoid." Triumph Strategic Consulting, 27 July 2017.

    "The 7 Must-Haves for Achieving Scaling Agile Success." The 7 Must-Haves for Achieving Scaling Agile Success.

    Ageling, Willem-Jan. "11 Most Common Reasons to Use Scaled Agile Framework (SAFE) and How to Do This With Unscaled Scrum." Medium, Serious Scrum, 26 Jan. 2020.

    Agile India, International Conference on Agile and Lean Software Development, 2014.

    "Air France - KLM - Agile Adoption with SAFe." Scaled Agile, 28 Nov. 2022.

    "Application Development Trends 2019 - Global Survey Report." OutSystems.

    "Benefits of SAFe: How It Benefits Organizations." Scaled Agile, 13 Mar. 2023.

    Berkowitz, Emma. "The Cost of a SAFe(r) Implementation: CPRIME Blog." Cprime, 30 Jan. 2023.

    "Chevron - Adopting SAFe with Remote Workforce." Scaled Agile, 28 Nov. 2022.

    "Cisco It - Adopting Agile Development with SAFe." Scaled Agile, 13 Sept. 2022.

    "CMS - Business Agility Transformation Using SAFe." Scaled Agile, 13 Sept. 2022.

    Crain, Anthony. "4 Biggest Challenges in Moving to Scaled Agile Framework (SAFe)." TechBeacon, 25 Jan. 2019.

    "The Essential Role of Communications ." Project Management Institute .

    Gardiner, Phil. "SAFe Implementation: 4 Tips for Getting Started." Applied Frameworks, 20 Jan. 2022.

    "How Do I Start Implementing SAFe?" Agility in Mind, 29 July 2022.

    "How to Masterfully Screw Up Your SAFe Implementation." Wibas Artikel-Bibliothek, 6 Sept. 2022.

    "Implementation Roadmap." Scaled Agile Framework, 14 Mar. 2023.

    Islam, Ayvi. "SAFe Implementation 101 - The Complete Guide for Your Company." //Seibert/Media, 22 Dec. 2020.

    "Johnson Controls - SAFe Implementation Case Study." Scaled Agile, 28 Nov. 2022.

    "The New Rules and Opportunities of Business Transformation." KPMG.

    "Nokia Software - SAFe Agile Transformation." Scaled Agile, 28 Nov. 2022.

    Pichler, Roman. "What Is Product Management?" Romanpichler, 2014.

    "Product Documentation." ServiceNow.

    "Pros and Cons of Scaled Agile Framework." PremierAgile.

    "Pulse of the Profession Beyond Agility." Project Management Institute.

    R, Ramki. "Pros and Cons of Scaled Agile Framework (SAFe)." Medium, 3 Mar. 2019.

    R, Ramki. "When Should You Consider Implementing SAFe (Scaled Agile Framework)?" Medium, Medium, 3 Mar. 2019.

    Rigby, Darrell, Jeff Sutherland, and Andy Noble. "Agile at Scale: How to go from a few teams to hundreds." Harvard Business Review, 2018.

    "SAFe Implementation Roadmap." Scaled Agile Framework, Scaled Agile, Inc., 14 Mar. 2023.

    "SAFe Partner Cprime: SAFe Implementation Roadmap: Scaled Agile." Cprime, 5 Apr. 2023.

    "SAFe: The Good, the Bad, and the Ugly." Project Management Institute.

    "Scaled Agile Framework." Wikipedia, Wikimedia Foundation, 29 Mar. 2023.

    "Scaling Agile Challenges and How to Overcome Them." PremierAgile.

    "SproutLoud - a Case Study of SAFe Agile Planning." Scaled Agile, 29 Nov. 2022.

    "Story." Scaled Agile Framework, 13 Apr. 2023.

    Sutherland , Jeff. "Scrum: How to Do Twice as Much in Half the Time." Tedxaix, YouTube, 7 July 2014.

    Venema, Marjan. "6 Scaled Agile Frameworks - Which One Is Right for You?" NimbleWork, 23 Dec. 2022.

    Warner, Rick. "Scaled Agile: What It Is and Why You Need It." High-Performance Low-Code for App Development, OutSystems, 25 Oct. 2019.

    Watts, Stephen, and Kirstie Magowan. "The Scaled Agile Framework (SAFE): What to Know and How to Start." BMC Blogs, 9 Sept. 2020.

    "What Is SAFe? The Scaled Agile Framework Explained." CIO, 9 Feb. 2021.

    "Why Agile Transformations Fail: Four Common Culprits." Planview.

    "Why You Should Use SAFe (and How to Find SAFe Training to Help)." Easy Agile.

    Y., H. "Story Points vs. 'Ideal Days.'" Cargo Cultism, 19 Aug. 2010.

    Bibliography

    Enable Organization-Wide Collaboration by Scaling Agile

    Ambler, Scott W. "Agile Architecture: Strategies for Scaling Agile Development." Agile Modeling, 2012.

    - - -. "Comparing Approaches to Budgeting and Estimating Software Development Projects." AmbySoft.

    - - -. "Agile and Large Teams." Dr. Dobb's, 17 Jun 2008.

    Ambler, Scott W. and Mark Lines. Disciplined Agile Delivery: A Practitioner's Guide to Agile Software Delivery in the Enterprise. IBM Press, 2012.

    Ambler, Scott W., and Mark Lines. "Scaling Agile Software Development: Disciplined Agility at Scale." Disciplined Agile Consortium White Paper Series, 2014.

    AmbySoft. "2014 Agile Adoption Survey Results." Scott W. Ambler + Associates, 2014.

    Bersin, Josh. "Time to Scrap Performance Appraisals?" Forbes Magazine, 5 June 2013. Accessed 30 Oct. 2013..

    Cheese, Peter, et al. " Creating an Agile Organization." Accenture, Oct. 2009. Accessed Nov. 2013..

    Croxon, Bruce, et al. "Dinner Series: Performance Management with Bruce Croxon from CBC's 'Dragon's Den.'" HRPA Toronto Chapter. Sheraton Hotel, Toronto, ON, 12 Nov. 2013. Panel discussion.

    Culbert, Samuel. "10 Reasons to Get Rid of Performance Reviews." Huffington Post Business, 18 Dec. 2012. Accessed 28 Oct. 2013.

    Denning, Steve. "The Case Against Agile: Ten Perennial Management Objections." Forbes Magazine, 17 Apr. 2012. Accessed Nov. 2013.

    Estis, Ryan. "Blowing up the Performance Review: Interview with Adobe's Donna Morris." Ryan Estis & Associates, 17 June 2013. Accessed Oct. 2013.

    Heikkila et al. "A Revelatory Case Study on Scaling Agile Release Planning." EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), 2010.

    Holler, Robert, and Ian Culling. "From Agile Pilot Project to Enterprise-Wide Deployment: Five Sure-Fire Ways To Fail When You Scale." VersionOne, 2010.

    Kniberg, Henrik, and Anders Ivarsson, "Scaling Agile @ Spotify," Unified Communications and Collaborations, 2012.

    Narayan, Sriram. "Agile IT Organization Design: For Digital Transformation and Continuous Delivery." Addison-Wesley Professional, 2015.

    Shrivastava, NK, and Phillip George. "Scaling Agile." RefineM, 2015.

    Sirkia, Rami, and Maarit Laanti. "Lean and Agile Financial Planning." Scaled Agile Framework Blog, 2014.

    Scaled Agile Framework (SAFe). "Agile Architecture." Scaled Agile Inc., 2015.

    VersionOne. 9th Annual: State of Agile Survey. VersionOne, LLC, 2015.

    Appendix A: Supporting Info-Tech Research

    Transformation topics and supporting research to make your journey easier, with less rework

    Supporting research and services

    Improving IT Alignment

    Build a Business-Aligned IT Strategy
    Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

    Make Your IT Governance Adaptable
    Governance isn't optional, so keep it simple and make it flexible.

    Create an IT View of the Service Catalog
    Unlock the full value of your service catalog with technical components.

    Application Portfolio Management Foundations
    Ensure your application portfolio delivers the best possible return on investment.

    Shifting Toward Agile DevOps

    Agile/DevOps Research Center
    Access the tools and advice you need to be successful with Agile.

    Develop Your Agile Approach for a Successful Transformation
    Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

    Implement DevOps Practices That Work
    Streamline business value delivery through the strategic adoption of DevOps practices.

    Perform an Agile Skills Assessment
    Being Agile isn't about processes, it's about people.

    Define the Role of Project Management in Agile and Product-Centric Delivery
    Projects and products are not mutually exclusive.

    Shifting Toward Product Management

    Make the Case for Product Delivery
    Align your organization on the practices to deliver what matters most.

    Deliver on Your Digital Product Vision
    Build a product vision your organization can take from strategy through execution.

    Deliver Digital Products at Scale
    Deliver value at the scale of your organization through defining enterprise product families.

    Mature and Scale Product Ownership
    Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

    Build a Value Measurement Framework
    Focus product delivery on business value- driven outcomes.

    Improving Value and Delivery Metrics

    Build a Value Measurement Framework
    Focus product delivery on business value-driven outcomes.

    Create a Holistic IT Dashboard
    Mature your IT department by measuring what matters.

    Select and Use SDLC Metrics Effectively
    Be careful what you ask for, because you will probably get it.

    Reduce Time to Consensus With an Accelerated Business Case
    Expand on the financial model to give your initiative momentum.

    Improving Governance, Prioritization, and Value

    Make Your IT Governance Adaptable
    Governance isn't optional, so keep it simple and make it flexible.

    Maximize Business Value From IT Through Benefits Realization
    Embed benefits realization into your governance process to prioritize IT spending and confirm the value of IT.

    Drive Digital Transformation With Platform Strategies
    Innovate and transform your business models with digital platforms.

    Succeed With Digital Strategy Execution
    Building a digital strategy is only half the battle: create a systematic roadmap of technology initiatives to execute the strategy and drive digital transformation.

    Build a Value Measurement Framework
    Focus product delivery on business value-driven outcomes.

    Create a Holistic IT Dashboard
    Mature your IT department by measuring what matters.

    Improving Requirements Management and Quality Assurance

    Requirements Gathering for Small Enterprises
    Right-size the guidelines of your requirements gathering process.

    Improve Requirements Gathering
    Back to basics: great products are built on great requirements.

    Build a Software Quality Assurance Program
    Build quality into every step of your SDLC.

    Automate Testing to Get More Done
    Drive software delivery throughput and quality confidence by extending your automation test coverage.

    Manage Your Technical Debt
    Make the case to manage technical debt in terms of business impact.

    Create a Business Process Management Strategy
    Avoid project failure by keeping the "B" in BPM.

    Build a Winning Business Process Automation Playbook
    Optimize and automate your business processes with a user-centric approach.

    Improving Release Management

    Optimize Applications Release Management
    Build trust by right-sizing your process using appropriate governance.

    Streamline Application Maintenance
    Effective maintenance ensures the long-term value of your applications.

    Streamline Application Management
    Move beyond maintenance to ensure exceptional value from your apps.

    Optimize IT Change Management
    Right-size IT change management to protect the live environment.

    Manage Your Technical Debt
    Make the case to manage technical debt in terms of business impact.

    Improve Application Development Throughput
    Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.

    Improving Business Relationship Management

    Embed Business Relationship Management in IT
    Show that IT is worthy of Trusted Partner status.

    Mature and Scale Product Ownership
    Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

    Improving Security

    Build an Information Security Strategy
    Create value by aligning your strategy to business goals and business risks.

    Develop and Deploy Security Policies
    Enhance your overall security posture with a defensible and prescriptive policy suite.

    Simplify Identity and Access Management
    Leverage risk- and role-based access control to quantify and simplify the identity and access management (IAM) process.

    Improving and Supporting Business-Managed Applications

    Embrace Business-Managed Applications
    Empower the business to implement their own applications with a trusted business-IT relationship.

    Enhance Your Solution Architecture Practices
    Ensure your software systems solution is architected to reflect stakeholders' short- and long-term needs.

    Satisfy Digital End Users With Low- and No-Code
    Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

    Build Your First RPA Bot
    Support RPA delivery with strong collaboration and management foundations.

    Automate Work Faster and More Easily With Robotic Process Automation
    Embrace the symbiotic relationship between the human and digital workforce.

    Improving Business Intelligence, Analytics, and Reporting

    Modernize Data Architecture for Measurable Business Results
    Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, agile, and fit-for-purpose data architecture practice.

    Build a Reporting and Analytics Strategy
    Deliver actionable business insights by creating a business-aligned reporting and analytics strategy.

    Build Your Data Quality Program
    Quality data drives quality business decisions.

    Design Data-as-a-Service
    Journey to the data marketplace ecosystems.

    Build a Robust and Comprehensive Data Strategy
    Learn about the key to building and fostering a data-driven culture.

    Build an Application Integration Strategy
    Level the table before assembling the application integration puzzle or risk losing pieces.

    Appendix B: SDLC Transformation Steps

    Waterfall SDLC

    Valuable product delivered at the end of an extended project lifecycle, frequently in years

    Waterfall SDLC

    • Business is separated from the delivery of technology it needs. Only one-third of the product is actually valuable (ITRG, N=40,000).
    • In Waterfall, a team of experts in specific disciplines hand off different aspects of the lifecycle.
    • Document sign-offs are required to ensure integration between silos (Business, Development, and Operations) and individuals.
    • A separate change-request process lays over the entire lifecycle to prevent changes from disrupting delivery.
    • Tools are deployed to support a specific role (e.g. BA) and seldom integrated (usually requirements <-> test).

    Wagile/Agifall/WaterScrumFall SDLC

    Valuable product delivered in multiple releases

     Wagile/Agifall/WaterScrumFall SDLC

    • Business is more closely integrated by a business product owner, who is accountable for day-to-day delivery of value for users.
    • The team collaborates and develops cross-functional skills as they define, design, build, and test code over time.
    • Sign-offs are reduced but documentation is still focused on satisfying project delivery and operations policy requirements.
    • Change is built into the process to allow the team to respond to change dynamically.
    • Tools start to be integrated to streamline delivery (usually requirements and Agile work management tools).

    Agile SDLC

    Valuable product delivered iteratively: frequency depends Ops' capacity

    Agile SDLC

    • Business users are closely integrated through regularly scheduled demos (e.g. every two weeks).
    • Team is fully cross-functional and collaborates to plan, define, design, build, and test the code, supported by specialists.
    • Documentation is focused on future development and operations needs.
    • Change is built into the process to allow the team to respond to change dynamically.
    • Automation is explored for application development (e.g. automated regression testing).

    Agile With DevOps SDLC

    High frequency iterative delivery of valuable product (e.g. every two weeks)

     Agile With DevOps SDLC

    • Business users are closely integrated through regularly scheduled demos.
    • Development and operations teams collaborate to plan, define, design, build, test, and deploy code, supported by automation.
    • Documentation is focused on supporting users, future changes, and operational support.
    • Change is built into the process to allow the team to respond to change dynamically.
    • Test, build, deploy process is fully automated. (Service desk is still separated.)

    DevOps SDLC

    Continuous integration and delivery

     DevOps SDLC

    • Business users are closely integrated through regularly scheduled demos.
    • Fully integrated DevOps team collaborates to plan, define, design, build, test, deploy, and maintain code.
    • Documentation is focused on future development and use adoption.
    • Change is built into the process to allow the team to respond to change dynamically.
    • Development and operations toolchain are fully integrated.

    Fully integrated product SDLC

    Agile + DevOps + continuous delivery of valuable product on demand

     Fully integrated product SDLC

    • Business users are fully integrated with the teams through dedicated business product owner.
    • Cross-functional teams collaborate across the business and technical life of the product.
    • Documentation supports internal and external needs (business, users, operations).
    • Change is built into the process to allow the team to respond to change dynamically.
    • Toolchain is fully integrated (including service desk).

    Appendix C: Understanding Agile Scrum Practices and Ceremonies

    Cultural advantages of Agile

    Cultural advantages of Agile

    Agile* SDLC

    With shared ownership instead of silos, we are able to deliver value at the end of every iteration (aka sprint)

    Agile SDLC

    Key Elements of the Agile SDLC

    • You are not "one and done." There are many short iterations with constant feedback.
    • There is an empowered product owner. This is a single authoritative voice who represents stakeholders.
    • There is a fluid product backlog. This enables prioritization of requirements "just-in-time."
    • There is a cross-functional, self-managing team. This team makes commitments and is empowered by the organization to do so.
    • There is working, tested code at the end of each sprint: Value becomes more deterministic along sprint boundaries.
    • Stakeholders are allowed to see and use the functionality and provide necessary feedback.
    • Feedback is being continuously injected back into the product backlog. This shapes the future of the solution.
    • There is continuous improvement through sprint retrospectives.
    • The virtuous cycle of sprint-demo-feedback is internally governed when done right.

    * There are many Agile methodologies to choose from, but Scrum is by far the most widely used (and is shown above).

    Understand the Scrum process

    The scrum process coordinates multiple stakeholders to deliver on business priorities.

    Understand the Scrum process

    Understand the ceremonies part of the scrum process

     Understand the ceremonies part of the scrum process

    Scrum vs. Kanban: Key differences

    Scrum vs. Kanban: Key differences

    Scrum vs. Kanban: When to use each

    Scrum

    Related or grouped changes are delivered in fixed time intervals.

    Use when:

    • Coordinating the development or release of related items
    • Maturing a product or service
    • Coordinating interdependencies between work items

    Kanban

    Independent items are delivered as soon as each is ready.

    Use when:

    • Completing work items from ticketing or individual requests
    • Completing independent changes
    • Releasing changes as soon as possible

    Appendix D: Improving Product Management

    Product delivery realizes value for your product family

    While planning and analysis are done at the family level, work and delivery are done at the individual product level.

    Product delivery realizes value for your product family

    Manage and communicate key milestones

    Successful product-delivery managers understand and define key milestones in their product-delivery lifecycles. These milestones need to be managed along with the product backlog and roadmap.

    Manage and communicate key milestones

    Info-Tech Best Practice
    Product management is not just about managing the product backlog and development cycles. Teams need to manage key milestones, such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints.

    A backlog stores and organizes product backlog items (PBIs) at various stages of readiness

    Organize product backlog at various stages of readiness

    A well-formed backlog can be thought of as a DEEP backlog:

    Detailed Appropriately: PBIs are broken down and refined as necessary.

    Emergent: The backlog grows and evolves over time as PBIs are added and removed.

    Estimated: The effort that a PBI requires is estimated at each tier.

    Prioritized: A PBI's value and priority are determined at each tier.

    Source: Perforce, 2018

    Backlog tiers facilitate product planning steps

    Ranging from the intake of an idea to a PBI ready for development; to enter the backlog, each PBI must pass through a given quality filter.

    Backlog tiers facilitate product planning steps

    Each activity is a variation of measuring value and estimating effort in order to validate and prioritize a PBI.

    A PBI successfully completes an activity and moves to the next backlog tier when it meets the appropriate criteria. Quality filters should exist between each tier.

    Use quality filters to ensure focus on the most important PBIs

    Expand the concepts of defining "ready" and "done" to include the other stages of a PBI's journey through product planning.

    Use quality filters to ensure focus on the most important PBIs

    Info-Tech Best Practice
    A quality filter ensures that quality is met and the appropriate teams are armed with the correct information to work more efficiently and improve throughput.

    Define product value by aligning backlog delivery with roadmap goals

    In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

    Define product value by aligning backlog delivery with roadmap goals

    Product roadmaps guide delivery and communicate your strategy

    In "Deliver on Your Digital Product Vision," we demonstrate how a product roadmap is core to value realization. The product roadmap is your communicated path. As a product owner, you use it to align teams and changes to your defined goals, as well as your product to enterprise goals and strategy.

    Product roadmaps guide delivery and communicate your strategy

    Info-Tech Insight
    The quality of your product backlog - and your ability to realize business value from your delivery pipeline - is directly related to the input, content, and prioritization of items in your product roadmap.

    Info-Tech's approach

    Operationally align product delivery to enterprise goals

    Operationally align product delivery to enterprise goals

    The Info-Tech Difference

    Create a common definition of what a product is and identify the products in your inventory.

    Use scaling patterns to build operationally aligned product families.

    Develop a roadmap strategy to align families and products to enterprise goals and priorities.

    Use products and families to assess value realization.

    Build a Digital Workspace Strategy

    • Buy Link or Shortcode: {j2store}294|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $12,399 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: End-User Computing Strategy
    • Parent Category Link: /end-user-computing-strategy
    • IT must figure out what a digital workspace is, why they’re building one, and what type they want.
    • Remote work creates challenges that cannot be solved by technology alone.
    • Focusing solely on technology risks building something the business doesn’t want or can’t use.

    Our Advice

    Critical Insight

    Building a smaller digital workspace doesn’t mean that the workspace will have a smaller impact on the business.

    Impact and Result

    • Partner with the business to create a team of digital workspace champions.
    • Empower employees with a tool that makes remote work easier.

    Build a Digital Workspace Strategy Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should partner with the business for building a digital workspace, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify the digital workspace you want to build

    Create a list of benefits that the organization will find compelling and build a cross-functional team to champion the workspace.

    • Build a Digital Workspace Strategy – Phase 1: Identify the Digital Workspace You Want to Build
    • Digital Workspace Strategy Template
    • Digital Workspace Executive Presentation Template

    2. Identify high-level requirements

    Design the digital workspace’s value proposition to drive your requirements.

    • Build a Digital Workspace Strategy – Phase 2: Identify High-Level Requirements
    • Sample Digital Workspace Value Proposition
    • Flexible Work Location Policy
    • Flexible Work Time Policy
    • Flexible Work Time Off Policy
    • Mobile Device Remote Wipe Waiver Template
    • Mobile Device Connectivity & Allowance Policy
    • General Security – User Acceptable Use Policy

    3. Identify initiatives and a high-level roadmap

    Take an agile approach to building your digital workspace.

    • Build a Digital Workspace Strategy – Phase 3: Identify Initiatives and a High-Level Roadmap
    [infographic]

    Workshop: Build a Digital Workspace Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify the Digital Workspace You Want to Build

    The Purpose

    Ensure that the digital workspace addresses real problems the business is facing.

    Key Benefits Achieved

    Defined benefits that will address business problems

    Identified strategic business partners

    Activities

    1.1 Identify the digital workspace’s direction.

    1.2 Prioritize benefits and define a vision.

    1.3 Assemble a team of digital workspace champions.

    Outputs

    Vision statement

    Mission statement

    Guiding principles

    Prioritized business benefits

    Metrics and key performance indicators

    Service Owner, Business Owner, and Project Sponsor role definitions

    Project roles and responsibilities

    Operational roles and responsibilities

    2 Identify Business Requirements

    The Purpose

    Drive requirements through a well-designed value proposition.

    Key Benefits Achieved

    Identified requirements that are based in employees’ needs

    Activities

    2.1 Design the value proposition.

    2.2 Identify required policies.

    2.3 Identify required level of input from users and business units.

    2.4 Document requirements for user experiences, processes, and services.

    2.5 Identify in-scope training and culture requirements.

    Outputs

    Prioritized functionality requirements

    Value proposition for three business roles

    Value proposition for two service provider roles

    Policy requirements

    Interview and focus group plan

    Business process requirements

    Training and culture initiatives

    3 Identify IT and Service Provider Requirements

    The Purpose

    Ensure that technology is an enabler.

    Key Benefits Achieved

    Documented requirements for IT and service provider technology

    Activities

    3.1 Identify systems of record requirements.

    3.2 Identify requirements for apps.

    3.3 Identify information storage requirements.

    3.4 Identify management and security integrations.

    3.5 Identify requirements for internal and external partners.

    Outputs

    Requirements for systems for record

    Prioritized list of apps

    Storage system requirements

    Data and security requirements

    Outsourcing requirements

    Switching Software Vendors Overwhelmingly Drives Increased Satisfaction

    • Buy Link or Shortcode: {j2store}612|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Selection & Implementation
    • Parent Category Link: /selection-and-implementation

    Organizations risk being locked in a circular trap of inertia from auto-renewing their software. With inertia comes complacency, leading to a decrease in overall satisfaction. Indeed, organizations are uniformly choosing to renew their software – even if they don’t like the vendor!

    Our Advice

    Critical Insight

    Renewal is an opportunity cost. Switching poorly performing software substantially drives increased satisfaction, and it potentially lowers vendor costs in the process. To realize maximum gains, it’s essential to have a repeatable process in place.

    Impact and Result

    Realize the benefits of switching by using Info-Tech’s five action steps to optimize your vendor switching processes:

    1. Identify switch opportunities.
    2. Evaluate your software.
    3. Build the business case.
    4. Optimize selection method.
    5. Plan implementation.

    Switching Software Vendors Overwhelmingly Drives Increased Satisfaction Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Why you should consider switching software vendors

    Use this outline of key statistics to help make the business case for switching poorly performing software.

    • Switching Existing Software Vendors Overwhelmingly Drives Increased Satisfaction Storyboard

    2. How to optimize your software vendor switching process

    Optimize your software vendor switching processes with five action steps.

    [infographic]

    Why learn from Tymans Group?

    The TY classes contain in-depth learning material based on over 30 years of experience in IT Operations and Resilience.

    You receive the techniques, tips, tricks, and "professional secrets" you need to succeed in your resilience journey.

    Why would I share "secrets?"

    Because over time, you will find that "secrets" are just manifested experiences.

    What do I mean by that? Gordon Ramsay, who was born in 1966 like me, decided to focus on his culinary education at age 19. According to his Wikipedia page, that was a complete accident. (His Wikipedia page is a hoot to read, by the way.) And he has nothing to prove anymore. His experience in his field speaks for itself.

    I kept studying in my original direction for just one year longer, but by 21, I founded my first company in Belgium in 1987, in the publishing industry. This was extended by IT experiences in various sectors, like international publishing and hospitality, culminating in IT for high-velocity international financial markets and insurance.

    See, "secrets" are a great way to get you to sign up for some "guru" program that will "tell all!" Don't fall for it, especially if the person is too young to have significant experience.

    There are no "secrets." There is only experience and 'wisdom." And that last one only comes with age.

    If I were in my 20s, 30s, or 40s, there is no chance I would share my core experiences with anyone who could become my competitor. At that moment, I'm building my own credibility and my own career. I like helping people, but not to the extent that it will hurt my prospects. 

    And that is my second lesson: be always honest about your intentions. Yes, always. 

    At the current point in my career, "hurting my prospects" is less important. Yes, I still need to make a living, and in another post, I will explain more about that. Here, I feel it is important to share my knowledge and experience with the next people who will take my place in the day-to-day operations of medium and large corporations. And that is worth something. Hence, "sharing my secrets."

    Gert

    Why learn about resilience from us?

    This is a great opportunity to learn from my 30+ years of resilience experience. TY's Gert experienced 9/11 in New York, and he was part of the Lehman Disaster Recovery team that brought the company back within one (one!) week of the terrorist attack.

    He also went through the London Bombings of 2005 and the 2008 financial crisis, which required fast incident responses, the Covid 2020 issues, and all that entailed. Not to mention that Gert was part of the Tokyo office disaster response team as early as 1998, ensuring that Salomon was protected from earthquakes and floods in Japan.

    Gert was part of the solution (for his clients) to several further global events, like the admittedly technical log4J event in 2021, the 2024 Crowdstrike event, and many other local IT incidents, to ensure that clients could continue using the services they needed at that time.

    Beyond the large corporate world, we helped several small local businesses improve their IT resilience with better cloud storage and security solutions. 

    These solutions and ways of thinking work for any business, large or small.

    The TY team

    Explore our resilience solutions.

    IT Strategy

    • Buy Link or Shortcode: {j2store}20|cart{/j2store}
    • Related Products: {j2store}20|crosssells{/j2store}
    • Up-Sell: {j2store}20|upsells{/j2store}
    • member rating overall impact: 9.3/10
    • member rating average dollars saved: $105,465
    • member rating average days saved: 35
    • Parent Category Name: Strategy and Governance
    • Parent Category Link: strategy-and-governance
    Success depends on IT initiatives clearly aligned to business goals.

    Drive Customer Convenience by Enabling Text-Based Customer Support

    • Buy Link or Shortcode: {j2store}531|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Customer Relationship Management
    • Parent Category Link: /customer-relationship-management
    • Text messaging services and applications (such as SMS, iMessage, WhatsApp, and Facebook Messenger) have seen explosive growth over the last decade. They are an entrenched part of consumers’ daily lives. For many demographics, text messaging rather than audio calls is the preferred medium of communication via smartphone.
    • Despite the popularity of text messaging services and applications with consumers, organizations have been slow to adequately incorporate these channels into their customer service strategy.
    • The result is a major disconnect between the channel preferences of consumers and the customer service options being offered by businesses.

    Our Advice

    Critical Insight

    • IT must work with their counterparts in customer service to build a technology roadmap that incorporates text messaging services and apps as a core channel for customer interaction. Doing so will increase IT’s stature as an innovator in the eyes of the business, while allowing the broader organization to leapfrog competitors that have not yet added text-based support to their repertoire of service channels. Incorporating text messaging as a customer service channel will increase customer satisfaction, improve retention, and reduce cost-to-serve.
    • A prudent strategy for text-based customer service begins with defining the value proposition and creating objectives: is there a strong fit with the organization’s customers and service use cases? Next, organizations must create a technology enablement roadmap for text-based support that incorporates the right tools and applications to deliver it. Finally, the strategy must address best practices for text-based customer service workflows and appropriate resourcing.

    Impact and Result

    • Understand the value and use cases for text-based customer support.
    • Create a framework for enabling technologies that will support scalable text-based customer service.
    • Improve underlying business metrics such as customer satisfaction, retention, and time to resolution by having a plan for text-based support.
    • Better align IT with customer service and support needs.

    Drive Customer Convenience by Enabling Text-Based Customer Support Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should be leveraging text-based services for customer support, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Create the business case for text-based customer support

    Understand the use cases and benefits of using text-based services for customer support, and establish how they align to the organization’s current service strategy.

    • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 1: Create the Business Case for Text-Based Customer Support
    • Text-Based Customer Support Strategic Summary Template
    • Text-Based Customer Support Project Charter Template
    • Text-Based Customer Support Business Case Assessment

    2. Create a technology enablement framework for text-based customer support

    Identify the right applications that will be needed to adequately support a text-based support strategy.

    • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 2: Create a Technology Enablement Framework for Text-Based Customer Support
    • Text-Based Customer Support Requirements Traceability Matrix

    3. Create customer service workflows for text-based support

    Create repeatable workflows and escalation policies for text-centric support.

    • Drive Customer Convenience by Enabling Text-Based Customer Support – Phase 3: Create Customer Service Workflows for Text-Based Support
    • Text-Based Customer Support TCO Tool
    • Text-Based Customer Support Acceptable Use Policy
    [infographic]

    Workshop: Drive Customer Convenience by Enabling Text-Based Customer Support

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Create the Business Case for Text-Based Support

    The Purpose

    Create the business case for text-based support.

    Key Benefits Achieved

    A clear direction on the drivers and value proposition of text-based customer support for your organization.

    Activities

    1.1 Identify customer personas.

    1.2 Define business and IT drivers.

    Outputs

    Identification of IT and business drivers.

    Project framework and guiding principles for the project.

    2 Create a Technology Enablement Framework for Text-Based Support

    The Purpose

    Create a technology enablement framework for text-based support.

    Key Benefits Achieved

    Prioritized requirements for text-based support and a vetted shortlist of the technologies needed to enable it.

    Activities

    2.1 Determine the correct migration strategy based on the current version of Exchange.

    2.2 Plan the user groups for a gradual deployment.

    Outputs

    Exchange migration strategy.

    User group organization by priority of migration.

    3 Create Service Workflows for Text-Based Support

    The Purpose

    Create service workflows for text-based support.

    Key Benefits Achieved

    Customer service workflows and escalation policies, as well as risk mitigation considerations.

    Present final deliverable to key stakeholders.

    Activities

    3.1 Review the text channel matrix.

    3.2 Build the inventory of customer service applications that are needed to support text-based service.

    Outputs

    Extract requirements for text-based customer support.

    4 Finalize Your Text Service Strategy

    The Purpose

    Finalize the text service strategy.

    Key Benefits Achieved

    Resource and risk mitigation plan.

    Activities

    4.1 Build core customer service workflows for text-based support.

    4.2 Identify text-centric risks and create a mitigation plan.

    4.3 Identify metrics for text-based support.

    Outputs

    Business process models assigned to text-based support.

    Formulation of risk mitigation plan.

    Key metrics for text-based support.

    Business Intelligence and Reporting

    • Buy Link or Shortcode: {j2store}6|cart{/j2store}
    • Related Products: {j2store}6|crosssells{/j2store}
    • member rating overall impact: 8.9/10
    • member rating average dollars saved: $45,792
    • member rating average days saved: 29
    • Parent Category Name: Data and Business Intelligence
    • Parent Category Link: /improve-your-core-processes/data-and-business-intelligence

    The challenge

    • Your business partners need an environment that facilitates flexible data delivery.
    • Your data and BI strategy must continuously adapt to new business realities and data sources to stay relevant.
    • The pressure to go directly to the solution design is high.  

    Our advice

    Insight

    • A BI initiative is not static. It must be treated as a living platform to adhere to changing business goals and objectives. Only then will it support effective decision-making.
    • Hear the voice of the business; that is the "B" in BI.
    • Boys and their toys... The solution to better intelligence often lies not in the tool but the BI practices.
    • Build a roadmap that starts with quick-wins to establish base support for your initiative.

    Impact and results 

    • Use the business goals and objectives to drive your BI initiatives.
    • Focus first on what you already have in your company's business intelligence landscape before investing in a new tool that will only complicate things.
    • Understand the core of what your users need by leveraging different approaches to pinpointing BI capabilities.
    • Create a roadmap that details the iterative deliveries of your business intelligence initiative. Show both the short and long term.

    The roadmap

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    Get started

    Our concise executive brief shows why you should create or refresh your business intelligence (BI) strategy. We'll show you our methodology and the ways we can help you in handling this.

    Upon ordering you receive the complete guide with all files zipped.

    Understand your business context and BI landscape

    Understand critical business information and analyze your current business intelligence landscape.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 1: Understand the Business Context and BI Landscape (ppt)
    • BI Strategy and Roadmap Template (doc)
    • BI End-User Satisfaction Survey Framework (ppt)

    Evaluate your current business intelligence practices

    Assess your current maturity level and define the future state.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 2: Evaluate the Current BI Practice (ppt)
    • BI Practice Assessment Tool – Example 1 (xls)
    • BI Practice Assessment Tool – Example 2 (xls)

    Create your BI roadmap

    Create business intelligence focused initiatives for continuous improvement.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 3: Create a BI Roadmap for Continuous Improvement (ppt)
    • BI Initiatives and Roadmap Tool (xls)
    • BI Strategy and Roadmap Executive Presentation Template (ppt)

     

    Bring Visibility to Your Day-to-Day Projects

    • Buy Link or Shortcode: {j2store}444|cart{/j2store}
    • member rating overall impact: 9.8/10 Overall Impact
    • member rating average dollars saved: $9,649 Average $ Saved
    • member rating average days saved: 24 Average Days Saved
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • As an IT leader, you are responsible for getting new things done while keeping the old things running. These “new things” can come in many forms, e.g. service requests, incidents, and officially sanctioned PMO projects, as well as a category of “unofficial” projects that have been initiated through other channels.
    • These unofficial projects get called many things by different organizations (e.g. level 0 projects,BAU projects, non-PMO projects, day-to-day projects), but they all have the similar characteristics: they are smaller and less complex than larger projects or officially sanctioned projects; they are larger and more risky than operational tasks or incidents; and they are focused on the needs of a specific functional unit and tend to stay within those units to get done.
    • Because these day-to-day projects are small, emergent, team-specific, operationally vital, yet generally perceived as being strategically unimportant, top-level leadership has a limited understanding of them when they are approving and prioritizing major projects. As a result, they approve projects with no insight into how your team’s capacity is already stretched thin by existing demands.

    Our Advice

    Critical Insight

    • Senior leadership cannot contrast the priority of things that are undocumented. As an IT leader, you need to ensure day-to-day projects receive the appropriate amount of documentation without drowning your team in a process that the types of project don’t warrant.
    • Don’t bleed your project capacity dry by leaving the back door open. When executive oversight took over the strategic portfolio, we assumed they’d resource those projects as a priority. Instead, they focused on “alignment,” “strategic vision,” and “go to market” while failing to secure and defend the resource capacity needed. To focus on the big stuff, you need to sweat the small stuff.

    Impact and Result

    • Develop a method to consistently identify and triage day-to-day projects across functional teams in a standard and repeatable way.
    • Establish a way to balance and prioritize the operational necessity of day-to-day projects against the strategic value of major projects.
    • Build a repeatable process to document and report where the time goes across all given pockets of demand your team faces.

    Bring Visibility to Your Day-to-Day Projects Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should put more portfolio management structure around your day-to-day projects, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Uncover your organization’s hidden pockets of day-to-day projects

    Define an organizational standard for identifying day-to-day projects and triaging them in relation to other categories of projects.

    • Bring Visibility to Your Day-to-Day Projects – Phase 1: Uncover Your Organization’s Hidden Pockets of Day-to-Day Projects
    • Day-to-Day Project Definition Tool
    • Day-to-Day Project Supply/Demand Calculator

    2. Establish ongoing day-to-day project visibility

    Build a process for maintaining reliable day-to-day project supply and demand data.

    • Bring Visibility to Your Day-to-Day Projects – Phase 2: Establish Ongoing Day-to-Day Project Visibility
    • Day-to-Day Project Process Document
    • Day-to-Day Project Intake and Prioritization Tool
    [infographic]

    Workshop: Bring Visibility to Your Day-to-Day Projects

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Analyze the Current State of Day-to-Day Projects

    The Purpose

    Assess the current state of project portfolio management and establish a realistic target state for the management of day-to-day projects.

    Key Benefits Achieved

    Realistic and well-informed workshop goals.

    Activities

    1.1 Begin with introductions and workshop expectations activity.

    1.2 Perform PPM SWOT analysis.

    1.3 Assess pain points and analyze root causes.

    Outputs

    Realistic workshop goals and expectations

    PPM SWOT analysis

    Root cause analysis

    2 Establish Portfolio Baselines for Day-to-Day Projects

    The Purpose

    Establish a standard set of baselines for day-to-day projects that will help them to be identified and managed in the same way across different functional teams.

    Key Benefits Achieved

    Standardization of project definitions and project value assessments across different functional teams.

    Activities

    2.1 Formalize the definition of a day-to-day project and establish project levels.

    2.2 Develop a project value scorecard for day-to-day projects.

    2.3 Analyze the capacity footprint of day-to-day projects.

    Outputs

    Project identification matrix

    Project value scorecard

    A capacity overview to inform baselines

    3 Build a Target State Process for Day-to-Day Projects

    The Purpose

    Establish a target state process for tracking and monitoring day-to-day projects at the portfolio level.

    Key Benefits Achieved

    Standardization of how day-to-day projects are managed and reported on across different functional teams.

    Activities

    3.1 Map current state workflows for the intake and resource management practices (small and large projects).

    3.2 Perform a right-wrong-missing-confusing analysis.

    3.3 Draft a target state process for the initiation of day-to-day projects and for capacity planning.

    Outputs

    Current state workflows

    Right-wrong-missing-confusing analysis

    Target state workflows

    4 Prepare to Implement Your New Processes

    The Purpose

    Start to plan the implementation of your new processes for the portfolio management of day-to-day projects.

    Key Benefits Achieved

    An implementation plan, complete with communication plans, timelines, and goals.

    Activities

    4.1 Perform a change impact and stakeholder management analysis.

    4.2 Perform a start-stop-continue activity.

    4.3 Define an implementation roadmap.

    Outputs

    Change impact and stakeholder analyses

    Start-stop-continue retrospective

    Implementation roadmap

    Domino – Maintain, Commit to, or Vacate?

    If you have a Domino/Notes footprint that is embedded within your business units and business processes and is taxing your support organization, you may have met resistance from the business and been asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses and a multipurpose solution that, over the years, became embedded within core business applications and processes.

    Our Advice

    Critical Insight

    For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

    Impact and Result

    The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

    Domino – Maintain, Commit to, or Vacate? Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Domino – Maintain, Commit to, or Vacate? – A brief deck that outlines key migration options for HCL Domino platforms.

    This blueprint will help you assess the fit, purpose, and price of Domino options; develop strategies for overcoming potential challenges; and determine the future of Domino for your organization.

    • Domino – Maintain, Commit to, or Vacate? Storyboard

    2. Application Rationalization Tool – A tool to understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

    Use this tool to input the outcomes of your various application assessments.

    • Application Rationalization Tool

    Infographic

    Further reading

    Domino – Maintain, Commit to, or Vacate?

    Lotus Domino still lives, and you have options for migrating away from or remaining with the platform.

    Executive Summary

    Info-Tech Insight

    “HCL announced that they have somewhere in the region of 15,000 Domino customers worldwide, and also claimed that that number is growing. They also said that 42% of their customers are already on v11 of Domino, and that in the year or so since that version was released, it’s been downloaded 78,000 times. All of which suggests that the Domino platform is, in fact, alive and well.”
    – Nigel Cheshire in Team Studio

    Your Challenge

    You have a Domino/Notes footprint embedded within your business units and business processes. This is taxing your support organization; you are meeting resistance from the business, and you are now asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses as a multipurpose solution that, over the years, became embedded within core business applications and processes.

    Common Obstacles

    For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

    Info-Tech Approach

    The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

    Review

    Is “Lotus” Domino still alive?

    Problem statement

    The number of member engagements with customers regarding the Domino platform has, as you might imagine, dwindled in the past couple of years. While many members have exited the platform, there are still many members and organizations that have entered a long exit program, but with how embedded Domino is in business processes, the migration has slowed and been met with resistance. Some organizations had replatformed the applications but found that the replacement target state was inadequate and introduced friction because the new solution was not a low-code/business-user-driven environment. This resulted in returning the Domino platform to production and working through a strategy to maintain the environment.

    This research is designed for:

    • IT strategic direction decision-makers
    • IT managers responsible for an existing Domino platform
    • Organizations evaluating migration options for mission-critical applications running on Domino

    This research will help you:

    1. Evaluate migration options.
    2. Assess the fit and purpose.
    3. Consider strategies for overcoming potential challenges.
    4. Determine the future of this platform for your organization.

    The “everything may work” scenario

    Adopt and expand

    Believe it or not, Domino and Notes are still options to consider when determining a migration strategy. With HCL still committed to the platform, there are options organizations should seek to better understand rather than assuming SharePoint will solve all. In our research, we consider:

    Importance to current business processes

    • Importance of use
    • Complexity in migrations
    • Choosing a new platform

    Available tools to facilitate

    • Talent/access to skills
    • Economies of scale/lower cost at scale
    • Access to technology

    Info-Tech Insight

    With multiple options to consider, take the time to clearly understand the application rationalization process within your decision making.

    • Archive/retire
    • Application migration
    • Application replatform
    • Stay right where you are

    Eliminate your bias – consider the advantages

    “There is a lot of bias toward Domino; decisions are being made by individuals who know very little about Domino and more importantly, they do not know how it impacts business environment.”

    – Rob Salerno, Founder & CTO, Rivet Technology Partners

    Domino advantages include:

    Modern Cloud & Application

    • No-code/low-code technology

    Business-Managed Application

    • Business written and supported
    • Embrace the business support model
    • Enterprise class application

    Leverage the Application Taxonomy & Build

    • A rapid application development platform
    • Develop skill with HCL training

    HCL Domino is a supported and developed platform

    Why consider HCL?

    • Consider scheduling a Roadmap Session with HCL. This is an opportunity to leverage any value in the mission and brand of your organization to gain insights or support from HCL.
    • Existing Domino customers are not the only entities seeking certainty with the platform. Software solution providers that support enterprise IT infrastructure ecosystems (backup, for example) will also be seeking clarity for the future of the platform. HCL will be managing these relationships through the channel/partner management programs, but our observations indicate that Domino integrations are scarce.
    • HCL Domino should be well positioned feature-wise to support low-code/NoSQL demands for enterprises and citizen developers.

    Visualize Your Application Roadmap

    1. Focus on the application portfolio and crafting a roadmap for rationalization.
      • The process is intended to help you determine each application’s functional and technical adequacy for the business process that it supports.
    2. Document your findings on respective application capability heatmaps.
      • This drives your organization to a determination of application dispositions and provides a tool to output various dispositions for you as a roadmap.
    3. Sort the application portfolio into a disposition status (keep, replatform, retire, consolidate, etc.)
      • This information will be an input into any cloud migration or modernization as well as consolidation of the infrastructure, licenses, and support for them.

    Our external support perspective

    by Darin Stahl

    Member Feedback

    • Some members who have remaining Domino applications in production – while the retire, replatform, consolidate, or stay strategy is playing out – have concerns about the challenges with ongoing support and resources required for the platform. In those cases, some have engaged external services providers to augment staff or take over as managed services.
    • While there could be existing support resources (in house or on retainer), the member might consider approaching an external provider who could help backstop the single resource or even provide some help with the exit strategies. At this point, the conversation would be helpful in any case. One of our members engaged an external provider in a Statement of Work for IBM Domino Administration focused on one-time events, Tier 1/Tier 2 support, and custom ad hoc requests.
    • The augmentation with the managed services enabled the member to shift key internal resources to a focus on executing the exit strategies (replatform, retire, consolidate), since the business knowledge was key to that success.
    • The member also very aggressively governed the Domino environment support needs to truly technical issues/maintenance of known and supported functionality rather than coding new features (and increasing risk and cost in a migration down the road) – in short, freezing new features and functionality unless required for legal compliance or health and safety.
    • There obviously are other providers, but at this point Info-Tech no longer maintains a market view or scan of those related to Domino due to low member demand.

    Domino database assessments

    Consider the database.

    • Domino database assessments should be informed through the lens of a multi-value database, like jBase, or an object system.
    • The assessment of the databases, often led by relational database subject matter experts grounded in normalized databases, can be a struggle since Notes databases must be denormalized.
    Key/Value Column

    Use case: Heavily accessed, rarely updated, large amounts of data
    Data Model: Values are stored in a hash table of keys.
    Fast access to small data values, but querying is slow
    Processor friendly
    Based on amazon's Dynamo paper
    Example: Project Voldemort used by LinkedIn

    this is a Key/Value example

    Use case: High availability, multiple data centers
    Data Model: Storage blocks of data are contained in columns
    Handles size well
    Based on Google's BigTable
    Example: Hadoop/Hbase used by Facebook and Yahoo

    This is a Column Example
    Document Graph

    Use case: Rapid development, Web and programmer friendly
    Data Model: Stores documents made up of tagged elements. Uses Key/Value collections
    Better query abilities than Key/Value databases.
    Inspired by Lotus Notes.
    Example: CouchDB used by BBC

    This is a Document Example

    Use case: Best at dealing with complexity and relationships/networks
    Data model: Nodes and relationships.
    Data is processed quickly
    Inspired by Euler and graph theory
    Can easily evolve schemas
    Example: Neo4j

    This is a Graph Example

    Understand your options

    Archive/Retire

    Store the application data in a long-term repository with the means to locate and read it for regulatory and compliance purposes.

    Migrate

    Migrate to a new version of the application, facilitating the process of moving software applications from one computing environment to another.

    Replatform

    Replatforming is an option for transitioning an existing Domino application to a new modern platform (i.e. cloud) to leverage the benefits of a modern deployment model.

    Stay

    Review the current Domino platform roadmap and understand HCL’s support model. Keep the application within the Domino platform.

    Archive/retire

    Retire the application, storing the application data in a long-term repository.

    Abstract

    The most common approach is to build the required functionality in whatever new application/solution is selected, then archive the old data in PDFs and documents.

    Typically this involves archiving the data and leveraging Microsoft SharePoint and the new collaborative solutions, likely in conjunction with other software-as-a-service (SaaS) solutions.

    Advantages

    • Reduce support cost.
    • Consolidate applications.
    • Reduce risk.
    • Reduce compliance and security concerns.
    • Improve business processes.

    Considerations

    • Application transformation
    • eDiscovery costs
    • Legal implications
    • Compliance implications
    • Business process dependencies

    Info-Tech Insights

    Be aware of the costs associated with archiving. The more you archive, the more it will cost you.

    Application migration

    Migrate to a new version of the application

    Abstract

    An application migration is the managed process of migrating or moving applications (software) from one infrastructure environment to another.

    This can include migrating applications from one data center to another data center, from a data center to a cloud provider, or from a company’s on-premises system to a cloud provider’s infrastructure.

    Advantages

    • Reduce hardware costs.
    • Leverage cloud technologies.
    • Improve scalability.
    • Improve disaster recovery.
    • Improve application security.

    Considerations

    • Data extraction, starting from the document databases in NSF format and including security settings about users and groups granted to read and write single documents, which is a powerful feature of Lotus Domino documents.
    • File extraction, starting from the document databases in NSF format, which can contain attachments and RTF documents and embedded files.
    • Design of the final relational database structure; this activity should be carried out without taking into account the original structure of the data in Domino files or the data conversion and loading, from the extracted format to the final model.
    • Design and development of the target-state custom applications based on the new data model and the new selected development platform.

    Application replatform

    Transition an existing Domino application to a new modern platform

    Abstract

    This type of arrangement is typically part of an application migration or transformation. In this model, client can “replatform” the application into an off-premises hosted provider platform. This would yield many benefits of cloud but in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.

    Two challenges are particularly significant when migrating or replatforming Domino applications:

    • The application functionality/value must be reproduced/replaced with not one but many applications, either through custom coding or a commercial-off-the-shelf/SaaS solution.
    • Notes “databases” are not relational databases and will not migrate simply to an SQL database while retaining the same business value. Notes databases are essentially NoSQL repositories and are difficult to normalize.

    Advantages

    • Leverage cloud technologies.
    • Improve scalability.
    • Align to a SharePoint platform.
    • Improve disaster recovery.
    • Improve application security.

    Considerations

    • Application replatform resource effort
    • Network bandwidth
    • New platform terms and conditions
    • Secure connectivity and communication
    • New platform security and compliance
    • Degree of complexity

    Info-Tech Insights

    There is a difference between a migration and a replatform application strategy. Determine which solution aligns to the application requirements.

    Stay with HCL

    Stay with HCL, understanding its future commitment to the platform.

    Abstract

    Following the announced acquisition of IBM Domino and up until around December 2019, HCL had published no future roadmap for the platform. The public-facing information/website at the time stated that HCL acquired “the product family and key lab services to deliver professional services.” Again, there was no mention or emphasis on upcoming new features for the platform. The product offering on their website at the time stated that HCL would leverage its services expertise to advise clients and push applications into four buckets:

    1. Replatform
    2. Retire
    3. Move to cloud
    4. Modernize

    That public-facing messaging changed with release 11.0, which had references to IBM rebranded to HCL for the Notes and Domino product – along with fixes already inflight. More information can be found on HCL’s FAQ page.

    Advantages

    • Known environment
    • Domino is a supported platform
    • Domino is a developed platform
    • No-code/low-code optimization
    • Business developed applications
    • Rapid application framework

    This is the HCL Domino Logo

    Understand your tools

    Many tools are available to help evaluate or migrate your Domino Platform. Here are a few common tools for you to consider.

    Notes Archiving & Notes to SharePoint

    Summary of Vendor

    “SWING Software delivers content transformation and archiving software to over 1,000 organizations worldwide. Our solutions uniquely combine key collaborative platforms and standard document formats, making document production, publishing, and archiving processes more efficient.”*

    Tools

    Lotus Notes Data Migration and Archiving: Preserve historical data outside of Notes and Domino

    Lotus Note Migration: Replacing Lotus Notes. Boost your migration by detaching historical data from Lotus Notes and Domino.

    Headquarters

    Croatia

    Best fit

    • Application archive and retire
    • Migration to SharePoint

    This is an image of the SwingSoftware Logo

    * swingsoftware.com

    Domino Migration to SharePoint

    Summary of Vendor

    “Providing leading solutions, resources, and expertise to help your organization transform its collaborative environment.”*

    Tools

    Notes Domino Migration Solutions: Rivit’s industry-leading solutions and hardened migration practice will help you eliminate Notes Domino once and for all.

    Rivive Me: Migrate Notes Domino applications to an enterprise web application

    Headquarters

    Canada

    Best fit

    • Application Archive & Retire
    • Migration to SharePoint

    This is an image of the RiVit Logo

    * rivit.ca

    Lotus Notes to M365

    Summary of Vendor

    “More than 300 organizations across 40+ countries trust skybow to build no-code/no-compromise business applications & processes, and skybow’s community of customers, partners, and experts grows every day.”*

    Tools

    SkyBow Studio: The low-code platform fully integrated into Microsoft 365

    Headquarters:

    Switzerland

    Best fit

    • Application Archive & Retire
    • Migration to SharePoint

    This is an image of the SkyBow Logo

    * skybow.com | About skybow

    Notes to SharePoint Migration

    Summary of Vendor

    “CIMtrek is a global software company headquartered in the UK. Our mission is to develop user-friendly, cost-effective technology solutions and services to help companies modernize their HCL Domino/Notes® application landscape and support their legacy COBOL applications.”*

    Tools

    CIMtrek SharePoint Migrator: Reduce the time and cost of migrating your IBM® Lotus Notes® applications to Office 365, SharePoint online, and SharePoint on premises.

    Headquarters

    United Kingdom

    Best fit

    • Application replatform
    • Migration to SharePoint

    This is an image of the CIMtrek Logo

    * cimtrek.com | About CIMtrek

    Domino replatform/Rapid application selection framework

    Summary of Vendor

    “4WS.Platform is a rapid application development tool used to quickly create multi-channel applications including web and mobile applications.”*

    Tools

    4WS.Platform is available in two editions: Community and Enterprise.
    The Platform Enterprise Edition, allows access with an optional support pack.

    4WS.Platform’s technical support provides support services to the users through support contracts and agreements.

    The platform is a subscription support services for companies using the product which will allow customers to benefit from the knowledge of 4WS.Platform’s technical experts.

    Headquarters

    Italy

    Best fit

    • Application replatform

    This is an image of the 4WS PLATFORM Logo

    * 4wsplatform.org

    Activity

    Understand your Domino options

    Application Rationalization Exercise

    Info-Tech Insight

    Application rationalization is the perfect exercise to fully understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

    This activity involves the following participants:

    • IT strategic direction decision-makers.
    • IT managers responsible for an existing Domino platform
    • Organizations evaluating platforms for mission-critical applications.

    Outcomes of this step:

    • Completed Application Rationalization Tool

    Application rationalization exercise

    Use this Application Rationalization Tool to input the outcomes of your various application assessments

    In the Application Entry tab:

    • Input your application inventory or subset of apps you intend to rationalize, along with some basic information for your apps.

    In the Business Value & TCO Comparison tab, determine rationalization priorities.

    • Input your business value scores and total cost of ownership (TCO) of applications.
    • Review the results of this analysis to determine which apps should require additional analysis and which dispositions should be prioritized.

    In the Disposition Selection tab:

    • Add to or adapt our list of dispositions as appropriate.

    In the Rationalization Inputs tab:

    • Add or adapt the disposition criteria of your application rationalization framework as appropriate.
    • Input the results of your various assessments for each application.

    In the Disposition Settings tab:

    • Add or adapt settings that generate recommended dispositions based on your rationalization inputs.

    In the Disposition Recommendations tab:

    • Review and compare the rationalization results and confirm if dispositions are appropriate for your strategy.

    In the Timeline Considerations tab:

    • Enter the estimated timeline for when you execute your dispositions.

    In the Portfolio Roadmap tab:

    • Review and present your roadmap and rationalization results.

    Follow the instructions to generate recommended dispositions and populate an application portfolio roadmap.

    This image depicts a scatter plot graph where the X axis is labeled Business Value, and the Y Axis is labeled Cost. On the graph, the following datapoints are displayed: SF; HRIS; ERP; ALM; B; A; C; ODP; SAS

    Info-Tech Insight

    Watch out for misleading scores that result from poorly designed criteria weightings.

    Related Info-Tech Research

    Build an Application Rationalization Framework

    Manage your application portfolio to minimize risk and maximize value.

    Embrace Business-Managed Applications

    Empower the business to implement their own applications with a trusted business-IT relationship.

    Satisfy Digital End Users With Low- and No-Code

    Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

    Maximize the Benefits from Enterprise Applications with a Center of Excellence

    Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.

    Drive Successful Sourcing Outcomes With a Robust RFP Process

    Leverage your vendor sourcing process to get better results.

    Research Authors

    Darin Stahl, Principal Research Advisor, Info-Tech Research Group

    Darin Stahl, Principal Research Advisor,
    Info-Tech Research Group

    Darin is a Principal Research Advisor within the Infrastructure practice, leveraging 38+ years of experience. His areas of focus include IT operations management, service desk, infrastructure outsourcing, managed services, cloud infrastructure, DRP/BCP, printer management, managed print services, application performance monitoring, managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).

    Troy Cheeseman, Practice Lead, Info-Tech Research Group

    Troy Cheeseman, Practice Lead,
    Info-Tech Research Group

    Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

    Research Contributors

    Rob Salerno, Founder & CTO, Rivit Technology Partners

    Rob Salerno, Founder & CTO, Rivit Technology Partners

    Rob is the Founder and Chief Technology Strategist for Rivit Technology Partners. Rivit is a system integrator that delivers unique IT solutions. Rivit is known for its REVIVE migration strategy which helps companies leave legacy platforms (such as Domino) or move between versions of software. Rivit is the developer of the DCOM Application Archiving solution.

    Bibliography

    Cheshire, Nigel. “Domino v12 Launch Keeps HCL Product Strategy On Track.” Team Studio, 19 July 2021. Web.

    “Is LowCode/NoCode the best platform for you?” Rivit Technology Partners, 15 July 2021. Web.

    McCracken, Harry. “Lotus: Farewell to a Once-Great Tech Brand.” TIME, 20 Nov. 2012. Web.

    Sharwood, Simon. “Lotus Notes refuses to die, again, as HCL debuts Domino 12.” The Register, 8 June 2021. Web.

    Woodie, Alex. “Domino 12 Comes to IBM i.” IT Jungle, 16 Aug. 2021. Web.

    Create and Manage Enterprise Data Models

    • Buy Link or Shortcode: {j2store}340|cart{/j2store}
    • member rating overall impact: 9.2/10 Overall Impact
    • member rating average dollars saved: $7,263 Average $ Saved
    • member rating average days saved: 16 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Business executives don’t understand the value of Conceptual and Logical Data Models and how they define their data assets.
    • Data, like mercury, is difficult to manage and contain.
    • IT needs to justify the time and cost of developing and maintaining Data Models.
    • Data as an asset is only perceived from a physical point of view, and the metadata that provides context and definition is often ignored.

    Our Advice

    Critical Insight

    • Data Models tell the story of the organization and its data in pictures to be used by a business as a tool to evolve the business capabilities and processes.
    • Data Architecture and Data Modeling have different purposes and should be represented as two distinct processes within the software development lifecycle (SDLC).
    • The Conceptual Model provides a quick win for both business and IT because it can convey abstract business concepts and thereby compartmentalize the problem space.

    Impact and Result

    • A Conceptual Model can be used to define the semantics and relationships for your analytical layer.
      • It provides a visual representation of your data in the semantics of business.
      • It acts as the anchor point for all data lineages.
      • It can be used by business users and IT for data warehouse and analytical planning.
      • It provides the taxonomies for data access profiles.
      • It acts as the basis for your Enterprise Logical and Message Models.

    Create and Manage Enterprise Data Models Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should create enterprise data models, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Setting the stage

    Prepare your environment for data architecture.

    • Enterprise Data Models

    2. Revisit your SDLC

    Revisit your SDLC to embed data architecture.

    • Enterprise Architecture Tool Selection

    3. Develop a Conceptual Model

    Create and maintain your Conceptual Data Model via an iterative process.

    4. Data Modeling Playbook

    View the main deliverable with sample models.

    • Data Modeling Playbook
    [infographic]

    Workshop: Create and Manage Enterprise Data Models

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish the Data Architecture Practice

    The Purpose

    Understand the context and goals of data architecture in your organization.

    Key Benefits Achieved

    A foundation for your data architecture practice.

    Activities

    1.1 Review the business context.

    1.2 Obtain business commitment and expectations for data architecture.

    1.3 Define data architecture as a discipline, its role, and the deliverables.

    1.4 Revisit your SDLC to embed data architecture.

    1.5 Modeling tool acquisition if required.

    Outputs

    Data Architecture vision and mission and governance.

    Revised SDLC to include data architecture.

    Staffing strategy.

    Data Architecture engagement protocol.

    Installed modeling tool.

    2 Business Architecture and Domain Modeling

    The Purpose

    Identify the concepts and domains that will inform your data models.

    Key Benefits Achieved

    Defined concepts for your data models.

    Activities

    2.1 Revisit business architecture output.

    2.2 Business domain selection.

    2.3 Identify business concepts.

    2.4 Organize and group of business concepts.

    2.5 Build the Business Data Glossary.

    Outputs

    List of defined and documented entities for the selected.

    Practice in the use of capability and business process models to identify key data concepts.

    Practice the domain modeling process of grouping and defining your bounded contexts.

    3 Harvesting Reference Models

    The Purpose

    Harvest reference models for your data architecture.

    Key Benefits Achieved

    Reference models selected.

    Activities

    3.1 Reference model selection.

    3.2 Exploring and searching the reference model.

    3.3 Harvesting strategies and maintaining linkage.

    3.4 Extending the conceptual and logical models.

    Outputs

    Established and practiced steps to extend the conceptual or logical model from the reference model while maintaining lineage.

    4 Harvesting Existing Data Artifacts

    The Purpose

    Gather more information to create your data models.

    Key Benefits Achieved

    Remaining steps and materials to build your data models.

    Activities

    4.1 Use your data inventory to select source models.

    4.2 Match semantics.

    4.3 Maintain lineage between BDG and existing sources.

    4.4 Select and harvest attributes.

    4.5 Define modeling standards.

    Outputs

    List of different methods to reverse engineer existing models.

    Practiced steps to extend the logical model from existing models.

    Report examples.

    5 Next Steps and Wrap-Up (offsite)

    The Purpose

    Wrap up the workshop and set your data models up for future success.

    Key Benefits Achieved

    Understanding of functions and processes that will use the data models.

    Activities

    5.1 Institutionalize data architecture practices, standards, and procedures.

    5.2 Exploit and extend the use of the Conceptual model in the organization.

    Outputs

    Data governance policies, standards, and procedures for data architecture.

    List of business function and processes that will utilize the Conceptual model.

    Build Your Data Quality Program

    • Buy Link or Shortcode: {j2store}127|cart{/j2store}
    • member rating overall impact: 9.1/10 Overall Impact
    • member rating average dollars saved: $40,241 Average $ Saved
    • member rating average days saved: 33 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Experiencing the pitfalls of poor data quality and failing to benefit from good data quality, including:
      • Unreliable data and unfavorable output.
      • Inefficiencies and costly remedies.
      • Dissatisfied stakeholders.
    • The chances of successful decision-making capabilities are hindered with poor data quality.

    Our Advice

    Critical Insight

    • Address the root causes of your data quality issues and form a viable data quality program.
      • Be familiar with your organization’s data environment and business landscape.
      • Prioritize business use cases for data quality fixes.
      • Fix data quality issues at the root cause to ensure proper foundation for your data to flow.
    • It is important to sustain best practices and grow your data quality program.

    Impact and Result

    • Implement a set of data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.
    • Develop a prioritized data quality improvement project roadmap and long-term improvement strategy.
    • Build related practices such as artificial intelligence and analytics with more confidence and less risk after achieving an appropriate level of data quality.

    Build Your Data Quality Program Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should establish a data quality program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Define your organization’s data environment and business landscape

    Learn about what causes data quality issues, how to measure data quality, what makes a good data quality practice in relation to your data and business environments.

    • Business Capability Map Template

    2. Analyze your priorities for data quality fixes

    Determine your business unit priorities to create data quality improvement projects.

    • Data Quality Problem Statement Template
    • Data Quality Practice Assessment and Project Planning Tool

    3. Establish your organization’s data quality program

    Revisit the root causes of data quality issues and identify the relevant root causes to the highest priority business unit, then determine a strategy for fixing those issues.

    • Data Lineage Diagram Template
    • Data Quality Improvement Plan Template

    4. Grow and sustain your data quality practices

    Identify strategies for continuously monitoring and improving data quality at the organization.

    Infographic

    Workshop: Build Your Data Quality Program

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define Your Organization’s Data Environment and Business Landscape

    The Purpose

    Evaluate the maturity of the existing data quality practice and activities.

    Assess how data quality is embedded into related data management practices.

    Envision a target state for the data quality practice.

    Key Benefits Achieved

    Understanding of the current data quality landscape

    Gaps, inefficiencies, and opportunities in the data quality practice are identified

    Target state for the data quality practice is defined

    Activities

    1.1 Explain approach and value proposition

    1.2 Detail business vision, objectives, and drivers

    1.3 Discuss data quality barriers, needs, and principles

    1.4 Assess current enterprise-wide data quality capabilities

    1.5 Identify data quality practice future state

    1.6 Analyze gaps in data quality practice

    Outputs

    Data Quality Management Primer

    Business Capability Map Template

    Data Culture Diagnostic

    Data Quality Diagnostic

    Data Quality Problem Statement Template

    2 Create a Strategy for Data Quality Project 1

    The Purpose

    Define improvement initiatives

    Define a data quality improvement strategy and roadmap

    Key Benefits Achieved

    Improvement initiatives are defined

    Improvement initiatives are evaluated and prioritized to develop an improvement strategy

    A roadmap is defined to depict when and how to tackle the improvement initiatives

    Activities

    2.1 Create business unit prioritization roadmap

    2.2 Develop subject areas project scope

    2.3 By subject area 1 data lineage analysis, root cause analysis, impact assessment, and business analysis

    Outputs

    Business Unit Prioritization Roadmap

    Subject area scope

    Data Lineage Diagram

    3 Create a Strategy for Data Quality Project 2

    The Purpose

    Define improvement initiatives

    Define a data quality improvement strategy and roadmap

    Key Benefits Achieved

    Improvement initiatives are defined

    Improvement initiatives are evaluated and prioritized to develop an improvement strategy

    A roadmap is defined to depict when and how to tackle the improvement initiatives

    Activities

    3.1 Understand how data quality management fits in with the organization’s data governance and data management programs

    3.2 By subject area 2 data lineage analysis, root cause analysis, impact assessment, and business analysis

    Outputs

    Data Lineage Diagram

    Root Cause Analysis

    Impact Analysis

    4 Create a Strategy for Data Quality Project 3

    The Purpose

    Determine a strategy for fixing data quality issues for the highest priority business unit

    Key Benefits Achieved

    Strategy defined for fixing data quality issues for highest priority business unit

    Activities

    4.1 Formulate strategies and actions to achieve data quality practice future state

    4.2 Formulate a data quality resolution plan for the defined subject area

    4.3 By subject area 3 data lineage analysis, root cause analysis, impact assessment, and business analysis

    Outputs

    Data Quality Improvement Plan

    Data Lineage Diagram

    5 Create a Plan for Sustaining Data Quality

    The Purpose

    Plan for continuous improvement in data quality

    Incorporate data quality management into the organization’s existing data management and governance programs

    Key Benefits Achieved

    Sustained and communicated data quality program

    Activities

    5.1 Formulate metrics for continuous tracking of data quality and monitoring the success of the data quality improvement initiative

    5.2 Workshop Debrief with Project Sponsor

    5.3 Meet with project sponsor/manager to discuss results and action items

    5.4 Wrap up outstanding items from the workshop, deliverables expectations, GIs

    Outputs

    Data Quality Practice Improvement Roadmap

    Data Quality Improvement Plan (for defined subject areas)

    Further reading

    Build Your Data Quality Program

    Quality Data Drives Quality Business Decisions

    Executive Brief

    Analyst Perspective

    Get ahead of the data curve by conquering data quality challenges.

    Regardless of the driving business strategy or focus, organizations are turning to data to leverage key insights and help improve the organization’s ability to realize its vision, key goals, and objectives.

    Poor quality data, however, can negatively affect time-to-insight and can undermine an organization’s customer experience efforts, product or service innovation, operational efficiency, or risk and compliance management. If you are looking to draw insights from your data for decision making, the quality of those insights is only as good as the quality of the data feeding or fueling them.

    Improving data quality means having a data quality management practice that is sustainably successful and appropriate to the use of the data, while evolving to keep pace with or get ahead of changing business and data landscapes. It is not a matter of fixing one data set at a time, which is resource and time intensive, but instead identifying where data quality consistently goes off the rails, and creating a program to improve the data processes at the source.

    Crystal Singh

    Research Director, Data and Analytics

    Info-Tech Research Group

    Executive Summary

    Your Challenge

    Your organization is experiencing the pitfalls of poor data quality, including:

    • Unreliable data and unfavorable output.
    • Inefficiencies and costly remedies.
    • Dissatisfied stakeholders.

    Poor data quality hinders successful decision making.

    Common Obstacles

    Not understanding the purpose and execution of data quality causes some disorientation with your data.

    • Failure to realize the importance/value of data quality.
    • Unsure of where to start with data quality.
    • Lack of investment in data quality.

    Organizations tend to adopt a project mentality when it comes to data quality instead of taking the strategic approach that would be all-around more beneficial in the long term.

    Info-Tech’s Approach

    Address the root causes of your data quality issues by forming a viable data quality program.

    • Be familiar with your organization’s data environment and business landscape.
    • Prioritize business use cases for data quality fixes.
    • Fixing data quality issues at the root cause to ensure a proper foundation for your data to flow.

    It is important to sustain best practices and grow your data quality program.

    Info-Tech Insight

    Fix data quality issues as close as possible to the source of data while understanding that business use cases will each have different requirements and expectations from data quality.

    Data is the foundation of your organization’s knowledge

    Data enables your organization to make decisions.

    Reliable data is needed to facilitate data consumers at all levels of the enterprise.

    Insights, knowledge, and information are needed to inform operational, tactical, and strategic decision-making processes. Data and information are needed to manage the business and empower business processes such as billing, customer touchpoints, and fulfillment.

    Raw Data

    Business Information

    Actionable Insights

    Data should be at the foundation of your organization’s evolution. The transformational insights that executives are constantly seeking can be uncovered with a data quality practice that makes high-quality, trustworthy information readily available to the business users who need it.

    98% of companies use data to improve customer experience. (Experian Data Quality, 2019)

    High-Level Data Architecture

    The image is a graphic, which at the top shows different stages of data, and in the lower part of the graphic shows the data processes.

    Build Your Data Quality Program

    1. Data Quality & Data Culture Diagnostics Business Landscape Exercise
    2. Business Strategy & Use Cases
    3. Prioritize Use Cases With Poor Quality

    Info-Tech Insight

    As data is ingested, integrated, and maintained in the various streams of the organization's system and application architecture, there are multiple points where the quality of the data can degrade.

    1. Understand the organization's data culture and data quality environment across the business landscape.
    2. Prioritize business use cases with poor data quality.
    3. For each use case, identify data quality issues and requirements throughout the data pipeline.
    4. Fix data quality issues at the root cause.
    5. As data flow through quality assurance monitoring checkpoints, monitor data to ensure good quality output.

    Insight:

    Proper application of data quality dimensions throughout the data pipeline will result in superior business decisions.

    Data quality issues can occur at any stage of the data flow.

    The image shows the flow of data through various stages: Data Creation; Data Ingestion; Data Accumulation and Engineering; Data Delivery; and Reporting & Analytics. At the bottom, there are two bars: the left one labelled Fix data quality root causes here...; and the right reads: ...to prevent expensive cures here.

    The image is a legend that accompanies the data flow graphic. It indicates that a white and green square icon indicates Data quality dimensions; a red cube indicates a potential point of data quality degradation; the pink square indicates Root cause of poor data quality; and a green flag indicates Quality Assurance Monitoring.

    Prevent the domino effect of poor data quality

    Data is the foundation of decisions made at data-driven organizations.

    Therefore, if there are problems with the organization’s underlying data, this can have a domino effect on many downstream business functions.

    Let’s use an example to illustrate the domino effect of poor data quality.

    Organization X is looking to migrate their data to a single platform, System Y. After the migration, it has become apparent that reports generated from this platform are inconsistent and often seem wrong. What is the effect of this?

    1. Time must be spent on identifying the data quality issues, and often manual data quality fixes are employed. This will extend the time to deliver the project that depends on system Y by X months.
    2. To repair these issues, the business needs to contract two additional resources to complete the unforeseen work. The new resources cost $X each, as well as additional infrastructure and hardware costs.
    3. Now, the strategic objectives of the business are at risk and there is a feeling of mistrust in the new system Y.

    Three key challenges impacting the ability to deliver excellent customer experience

    30% Poor data quality

    30% Method of interaction changing

    30% Legacy systems or lack of new technology

    95% Of organizations indicated that poor data quality undermines business performance.

    (Source: Experian Data Quality, 2019)

    Maintaining quality data will support more informed decisions and strategic insight

    Improving your organization’s data quality will help the business realize the following benefits:

    Data-Driven Decision Making

    Business decisions should be made with a strong rationale. Data can provide insight into key business questions, such as, “How can I provide better customer satisfaction?”

    89% Of CIOs surveyed say lack of quality data is an obstacle to good decision making. (Larry Dignan, CIOs juggling digital transformation pace, bad data, cloud lock0in and business alignment, 2020)

    Customer Intimacy

    Improve marketing and the customer experience by using the right data from the system of record to analyze complete customer views of transactions, sentiments, and interactions.

    94% Percentage of senior IT leaders who say that poor data quality impinges business outcomes. (Clint Boulton, Disconnect between CIOs and LOB managers weakens data quality, 2016)

    Innovation Leadership

    Gain insights on your products, services, usage trends, industry directions, and competitor results to support decisions on innovations, new products, services, and pricing.

    20% Businesses lose as much as 20% of revenue due to poor data quality. (RingLead Data Management Solutions, 10 Stats About Data Quality I Bet You Didn’t Know)

    Operational Excellence

    Make sure the right solution is delivered rapidly and consistently to the right parties for the right price and cost structure. Automate processes by using the right data to drive process improvements.

    10-20% The implementation of data quality initiatives can lead to reductions in corporate budget of up to 20%. (HaloBI, 2015)

    However, maintaining data quality is difficult

    Avoid these pitfalls to get the true value out of your data.

    1. Data debt drags down ROI – a high degree of data debt will hinder you from attaining the ROI you’re expecting.
    2. Lack of trust means lack of usage – a lack of confidence in data results in a lack of data usage in your organization, which negatively effects strategic planning, KPIs, and business outcomes.
    3. Strategic assets become a liability – bad data puts your business at risk of failing compliance standards, which could result in you paying millions in fines.
    4. Increased costs and inefficiency – time spent fixing bad data means less workload capacity for your important initiatives and the inability to make data-based decisions.
    5. Barrier to adopting data-driven tech – emerging technologies, such as predictive analytics and artificial intelligence, rely on quality data. Inaccurate, incomplete, or irrelevant data will result in delays or a lack of ROI.
    6. Bad customer experience – Running your business on bad data can hinder your ability to deliver to your customers, growing their frustration, which negatively impacts your ability to maintain your customer base.

    Info-Tech Insight

    Data quality suffers most at the point of entry. This is one of the causes of the domino effect of data quality – and can be one of the most costly forms of data quality errors due to the error propagation. In other words, fix data ingestion, whether through improving your application and database design or improving your data ingestion policy, and you will fix a large majority of data quality issues.

    Follow Our Data & Analytics Journey

    Data Quality is laced into Data Strategy, Data Management, and Data Governance.

    • Data Strategy
      • Data Management
        • Data Quality
        • Data Governance
          • Data Architecture
            • MDM
            • Data Integration
            • Enterprise Content Management
            • Information Lifecycle Management
              • Data Warehouse/Lake/Lakehouse
                • Reporting and Analytics
                • AI

    Data quality is rooted in data management

    Extract Maximum Benefit Out of Your Data Quality Management.

    • Data management is the planning, execution, and oversight of policies, practices, and projects that acquire, control, protect, deliver, and enhance the value of data and information assets (DAMA, 2009).
    • In other words, getting the right information, to the right people, at the right time.
    • Data quality management exists within each of the data practices, information dimensions, business resources, and subject areas that comprise the data management framework.
    • Within this framework, an effective data quality practice will replace ad hoc processes with standardized practices.
    • An effective data quality practice cannot succeed without proper alignment and collaboration across this framework.
    • Alignment ensures that the data quality practice is fit for purpose to the business.

    The DAMA DMBOK2 Data Management Framework

    • Data Governance
      • Data Quality
      • Data Architecture
      • Data Modeling & Design
      • Data Storage & Operations
      • Data Security
      • Data Integration & Interoperability
      • Documents & Content
      • Reference & Master Data
      • Data Warehousing & Business Intelligence
      • Meta-data

    (Source: DAMA International)

    Related Info-Tech Research

    Build a Robust and Comprehensive Data Strategy

    • People often think that the main problems they need to fix first are related to data quality when the issues transpire at a much larger level. This blueprint is the key to building and fostering a data-driven culture.

    Create a Data Management Roadmap

    • Refer to this blueprint to understand data quality in the context of data disciplines and methods for improving your data management capabilities.

    Establish Data Governance

    • Define an effective data governance strategy and ensure the strategy integrates well with data quality with this blueprint.

    Info-Tech’s methodology for Data Quality

    Phase Steps 1. Define Your Organization’s Data Environment and Business Landscape 2. Analyze Your Priorities for Data Quality Fixes 3. Establish Your Organization’s Data Quality Program 4. Grow and Sustain Your Data Quality Practice
    Phase Outcomes This step identifies the foundational understanding of your data and business landscape, the essential concepts around data quality, as well as the core capabilities and competencies that IT needs to effectively improve data quality. To begin addressing specific, business-driven data quality projects, you must identify and prioritize the data-driven business units. This will ensure that data improvement initiatives are aligned to business goals and priorities. After determining whose data is going to be fixed based on priority, determine the specific problems that they are facing with data quality, and implement an improvement plan to fix it. Now that you have put an improvement plan into action, make sure that the data quality issues don’t keep cropping up. Integrate data quality management with data governance practices into your organization and look to grow your organization’s overall data maturity.

    Info-Tech Insight

    “Data Quality is in the eyes of the beholder.”– Igor Ikonnikov, Research Director

    Data quality means tolerance, not perfection

    Data from Info-Tech’s CIO Business Vision Diagnostic, which represents over 400 business stakeholders, shows that data quality is very important when satisfaction with data quality is low.

    However, when data quality satisfaction hit a threshold, it became less important.

    The image is a line graph, with the X-axis labelled Satisfaction with Data Quality, and the Y axis labelled Rated Importance for Data Quality. The line begins high, and then descends. There is text inside the graph, which is transcribed below.

    Respondents were asked “How satisfied are you with the quality, reliability, and effectiveness of the data you use to manage your group?” as well as to rank how important data quality was to their organization.

    When the business satisfaction of data quality reached a threshold value of 71-80%, the rated importance reached its lowest value.

    Info-Tech Insight

    Data needs to be good, but truly spectacular data may go unnoticed.

    Provide the right level of data quality, with the appropriate effort, for the correct usage. This blueprint will help you to determine what “the right level of data quality” means, as well as create a plan to achieve that goal for the business.

    Data Roles and Responsibilities

    Data quality occurs through three main layers across the data lifecycle

    Data Strategy

    Data Strategy should contain Data Quality as a standard component.

    ← Data Quality issues can occur throughout at any stage of the data flow →

    DQ Dimensions

    Timeliness – Representation – Usability – Consistency – Completeness – Uniqueness – Entry Quality – Validity – Confidence – Importance

    Source System Layer

    • Data Resource Manager/Collector: Enters data into a database and ensures that data collection sources are accurate

    Data Transformation Layer

    • ETL Developer: Designs data storage systems
    • Data Engineer: Oversees data integrations, data warehouses and data lakes, data pipelines
    • Database Administrator: Manages database systems, ensures they meet SLAs, performances, backups
    • Data Quality Engineer: Finds and cleanses bad data in data sources, creates processes to prevent data quality problems

    Consumption Layer

    • Data Scientist: Gathers and analyses data from databases and other sources, runs models, and creates data visualizations for users
    • BI Analyst: Evaluates and mines complex data and transforms it into insights that drive business value. Uses BI software and tools to analyze industry trends and create visualizations for business users
    • Data Analyst: Extracts data from business systems, analyzes it, and creates reports and dashboards for users
    • BI Engineer: Documents business needs on data analysis and reporting and develops BI systems, reports, and dashboards to support them
    Data Creation → [SLA] Data Ingestion [ QA] →Data Accumulation & Engineering → [SLA] Data Delivery [QA] →Reporting & Analytics
    Fix Data Quality root causes here… to prevent expensive cures here.

    Executive Brief Case Study

    Industry: Healthcare

    Source: Primary Info-Tech Research

    Align source systems to maximize business output.

    A healthcare insurance agency faced data quality issues in which a key business use case was impacted negatively. Business rules were not well defined, and default values instead of real value caused a concern. When dealing with multiple addresses, data was coming from different source systems.

    The challenge was to identify the most accurate address, as some were incomplete, and some lacked currency and were not up to date. This especially challenged a key business unit, marketing, to derive business value in performing key activities by being unable to reach out to existing customers to advertise any additional products.

    For this initiative, this insurance agency took an economic approach by addressing those data quality issues using internal resources.

    Results

    Without having any MDM tools or having a master record or any specific technology relating to data quality, this insurance agency used in-house development to tackle those particular issues at the source system. Data quality capabilities such as data profiling were used to uncover those issues and address them.

    “Data quality is subjective; you have to be selective in terms of targeting the data that matters the most. When getting business tools right, most issues will be fixed and lead to achieving the most value.” – Asif Mumtaz, Data & Solution Architect

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    Guided Implementation

    "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostic and consistent frameworks are used throughout all four options.

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 Phase 2 Phase 3 Phase 4
    • Call #1: Learn about the concepts of data quality and the common root causes of poor data quality.
    • Call #2: Identify the core capabilities of IT for improving data quality on an enterprise scale.
    • Call #3: Determine which business units use data and require data quality remediation.
    • Call #4: Create a plan for addressing business unit data quality issues according to priority of the business units based on value and impact of data.
    • Call #5: Revisit the root causes of data quality issues and identify the relevant root causes to the highest priority business unit.
    • Call #6: Determine a strategy for fixing data quality issues for the highest priority business unit.
    • Call #7: Identify strategies for continuously monitoring and improving data quality at the organization.
    • Call #8: Learn how to incorporate data quality practices in the organization’s larger data management and data governance frameworks.
    • Call #9: Summarize results and plan next steps on how to evolve your data landscape.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between eight to twelve calls over the course of four to six months.

    Workshop Overview

    Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4 Day 5
    Define Your Organization’s Data Environment and Business Landscape Create a Strategy for Data Quality Project 1 Create a Strategy for Data Quality Project 2 Create a Strategy for Data Quality Project 3 Create a Plan for Sustaining Data Quality
    Activities
    1. Explain approach and value proposition.
    2. Detail business vision, objectives, and drivers.
    3. Discuss data quality barriers, needs, and principles.
    4. Assess current enterprise-wide data quality capabilities.
    5. Identify data quality practice future state.
    6. Analyze gaps in data quality practice.
    1. Create business unit prioritization roadmap.
    2. Develop subject areas project scope.
    3. By subject area 1:
    • Data lineage analysis
    • Root cause analysis
    • Impact assessment
    • Business analysis
    1. Understand how data quality management fits in with the organization’s data governance and data management programs.
    2. By subject area 2:
    • Data lineage analysis
    • Root cause analysis
    • Impact assessment
    • Business analysis
    1. Formulate strategies and actions to achieve data quality practice future state.
    2. Formulate data quality resolution plan for defined subject area.
    3. By subject area 3:
    • Data lineage analysis
    • Root cause analysis
    • Impact assessment
    • Business analysis
    1. Formulate metrics for continuous tracking of data quality and monitoring the success of the data quality improvement initiative.
    2. Workshop Debrief with Project Sponsor.
    • Meet with project sponsor/manager to discuss results and action items.
    • Wrap up outstanding items from the workshop, deliverables expectations, GIs.
    Deliverables
    1. Data Quality Management Primer
    2. Business Capability Map Template
    3. Data Culture Diagnostic
    4. Data Quality Diagnostic
    5. Data Quality Problem Statement Template
    1. Business Unit Prioritization Roadmap
    2. Subject area scope
    3. Data Lineage Diagram
    1. Data Lineage Diagram
    2. Root Cause Analysis
    3. Impact Analysis
    1. Data Lineage Diagram
    2. Data Quality Improvement Plan
    1. Data Quality Practice Improvement Roadmap
    2. Data Quality Improvement Plan (for defined subject areas)

    Phase 1

    Define Your Organization’s Data Environment and Business Landscape

    Build Your Data Quality Program

    Data quality is a methodology and must be treated as such

    A comprehensive data quality practice includes appropriate business requirements gathering, planning, governance, and oversight capabilities, as well as empowering technologies for properly trained staff, and ongoing development processes.

    Some common examples of appropriate data management methodologies for data quality are:

    • The data quality team has the necessary competencies and resources to perform the outlined workload.
    • There are processes that exist for continuously evaluating data quality performance capabilities.
    • Improvement strategies are designed to increase data quality performance capabilities.
    • Policies and procedures that govern data quality are well-documented, communicated, followed, and updated.
    • Change controls exist for revising policies and procedures, including communication of updates and changes.
    • Self-auditing techniques are used to ensure business-IT alignment when designing or recalibrating strategies.

    Effective data quality practices coordinate with other overarching data disciplines, related data practices, and strategic business objectives.

    “You don’t solve data quality with a Band-Aid; you solve it with a methodology.” – Diraj Goel, Growth Advisor, BC Tech

    Data quality can be defined by four key quality indicators

    Similar to measuring the acidity of a substance with a litmus test, the quality of your data can be measured using a simple indicator test. As you learn about common root causes of data quality problems in the following slides, think about these four quality indicators to assess the quality of your data:

    • Completeness – Closeness to the correct value. Encompasses accuracy, consistency, and comparability to other databases.
    • Usability – The degree to which data meets current user needs. To measure this, you must determine if the user is satisfied with the data they are using to complete their business functions.
    • Timeliness – Length of time between creation and availability of data.
    • Accessibility – How easily a user can access and understand the data (including data definitions and context). Interpretability can also be used to describe this indicator.

    Info-Tech Insight

    Quality is a relative term. Data quality is measured in terms of tolerance. Perfect data quality is both impossible and a waste of time and effort.

    How to get investment for your data quality program

    Follow these steps to convince leadership of the value of data quality:

    “You have to level with people, you cannot just start talking with the language of data and expect them to understand when the other language is money and numbers.” – Izabela Edmunds, Information Architect at Mott MacDonald

    1. Perform Phases 0 & 1 of this blueprint as this will offer value in carrying out the following steps.
    2. Build credibility. Show them your understanding of data and how it aligns to the business.
    3. Provide tangible evidence of how significant business use cases are impacted by poor quality data.
    4. Present the ROI of fixing the data quality issues you have prioritized.
    5. Explain how the data quality program will be established, implemented, and sustained.
    6. Prove the importance of fixing data quality issues at the source and how it is the most efficient, effective, and cost-friendly solution.

    Phase 1 deliverables

    Each of these deliverables serve as inputs to detect key outcomes about your organization and to help complete this blueprint:

    1. Data Culture Diagnostic

    Use this report to understand where your organization lies across areas relating to data culture.

    While the Quality & Trust area of the report might be most prevalent to this blueprint, this diagnostic may point out other areas demanding more attention.

    Please speak to your account manager for access

    2. Business Capability Map Template

    Perform this process to understand the capabilities that enable specific value streams. The output of this deliverable is a high-level view of your organization’s defined business capabilities.

    Download this tool

    Info-Tech Insight

    Understanding your data culture and business capabilities are foundational to starting the journey of data quality improvement.

    Key deliverable:

    3. Data Quality Diagnostic

    The Data Quality Report is designed to help you understand, assess, and improve key organizational data quality issues. This is where respondents across various areas in the organization can assess Data Quality across various dimensions.

    Download this tool

    Data Quality Diagnostic Value

    Prioritize business use cases with our data quality dimensions.

    • Complete this diagnostic for each major business use case. The output from the Data Culture Diagnostic and the Business Capability Map should help you understand which use cases to address.
    • Involve all key stakeholders involved in the business use case. There may be multiple business units involved in a single use case.
    • Prioritize the business use cases that need the most attention pertaining to data quality by comparing the scores of the Importance and Confidence data quality dimensions.

    If there are data elements that are considered of high importance and low confidence, then they must be prioritized.

    Sample Scorecard

    The image shows a screen capture of a scorecard, with sample information filled in.

    The image shows a screen capture of a scorecard, with sample information filled in.

    Poor data quality develops due to multiple root causes

    After you get to know the properties of good quality data, understand the underlying causes of why those indicators can point to poor data quality.

    If you notice that the usability, completeness, timeliness, or accessibility of the organization’s data is suffering, one or more of the following root causes are likely plaguing your data:

    Common root causes of poor data quality, through the lens of Info-Tech’s Five-Tier Data Architecture:

    The image shows a graphic of Info-Tech's Five-Tier Data Architecture, with root causes of poor data quality identified. In the data creation and ingestion stages, the root causes are identified as Poor system/application design, Poor database design, Inadequate enterprise integration. The root causes identified in the latter stages are: Absence of data quality policies, procedures, and standards, and Incomplete/suboptimal business processes

    These root causes of poor data quality are difficult to avoid, not only because they are often generated at an organization’s beginning stages, but also because change can be difficult. This means that the root causes are often propagated through stale or outdated business processes.

    Data quality problems root cause #1:

    Poor system or application design

    Application design plays one of the largest roles in the quality of the organization’s data. The proper design of applications can prevent data quality issues that can snowball into larger issues downstream.

    Proper ingestion is 90% of the battle. An ounce of prevention is worth a pound of cure. This is true in many different topics, and data quality is one of them. Designing an application so that data gets entered properly, whether by internal staff or external customers, is the single most effective way to prevent data quality issues.

    Some common causes of data quality problems at the application/system level include:

    • Too many open fields (free-form text fields that accept a variety of inputs).
    • There are no lookup capabilities present. Reference data should be looked up instead of entered.
    • Mandatory fields are not defined, resulting in blank fields.
    • No validation of data entries before writing to the underlying database.
    • Manual data entry encourages human error. This can be compounded by poor application design that facilitates the incorrect data entry.

    Data quality problems root cause #2:

    Poor database design

    Database design also affects data quality. How a database is designed to handle incoming data, including the schema and key identification, can impact the integrity of the data used for reporting and analytics.

    The most common type of database is the relational database. Therefore, we will focus on this type of database.

    When working with and designing relational databases, there are some important concepts that must be considered.

    Referential integrity is a term that is important for the design of relational database schema, and indicates that table relationships must always be consistent.

    For table relationships to be consistent, primary keys (unique value for each row) must uniquely identify entities in columns of the table. Foreign keys (field that is defined in a second table but refers to the primary key in the first table) must agree with the primary key that is referenced by the foreign key. To maintain referential integrity, any updates must be propagated to the primary parent key.

    Info-Tech Insight

    Other types of databases, including databases with unstructured data, need data quality consideration. However, unstructured data may have different levels of quality tolerance.

    At the database level, some common root causes include:

    1. Lack of referential integrity.
    2. Lack of unique keys.
    3. Don’t have restricted data range.
    4. Incorrect datatype, string fields that can hold too many characters.
    5. Orphaned records.

    Databases and People:

    Even though database design is a technology issue, don’t forget about the people.

    A lack of training employees on database permissions for updating/entering data into the physical databases is a common problem for data quality.

    Data quality problems root cause #3:

    Improper integration and synchronization of enterprise data

    Data ingestion is another category of data-quality-issue root causes. When moving data in Tier 2, whether it is through ETL, ESB, point-to-point integration, etc., the integrity of the data during movement and/or transformation needs to be maintained.

    Tier 2 (the data ingestion layer) serves to move data for one of two main purposes:

    • To move data from originating systems to downstream systems to support integrated business processes.
    • To move data to Tier 3 where data rests for other purposes. This movement of data in its purest form means we move raw data to storage locations in an overall data warehouse environment reflecting any security, compliance and other standards in our choices for how to store. Also, it is where data is transformed for unique business purpose that will also be moved to a place of rest or a place of specific use. Data cleansing and matching and other data-related blending tasks occur at this layer.

    This ensures the data is pristine throughout the process and improves trustworthiness of outcomes and speed to task completion.

    At the integration layer, some common root causes of data quality problems include:

    1. No data mask. For example, zip code should have a mask of five numeric characters.
    2. Questionable aggregation, transformation process, or incorrect logic.
    3. Unsynchronized data refresh process in an integrated environment.
    4. Lack of a data matching tool.
    5. Lack of a data quality tool.
    6. Don’t have data profiling capability.
    7. Errors with data conversion or migration processes – when migrating, decommissioning, or converting systems – movement of data sets.
    8. Incorrect data mapping between data sources and targets.

    Data quality problems root cause #4:

    Insufficient and ineffective data quality policies and procedures

    Data policies and procedures are necessary for establishing standards around data and represent another category of data-quality-issue root causes. This issue spans across all five of the 5 Tier Architecture.

    Data policies are short statements that seek to manage the creation, acquisition, integrity, security, compliance, and quality of data. These policies vary amongst organizations, depending on your specific data needs.

    • Policies describe what to do, while standards and procedures describe how to do something.
    • There should be few data policies, and they should be brief and direct. Policies are living documents and should be continuously updated to respond to the organization’s data needs.
    • The data policies should highlight who is responsible for the data under various scenarios and rules around how to manage it effectively.

    Some common root causes of data quality issues related to policies and procedures include:

    1. Policies are absent or out of date.
    2. Employees are largely unaware of policies in effect.
    3. Policies are unmonitored and unenforced.
    4. Policies are in multiple locations.
    5. Multiple versions of the same policy exist.
    6. Policies are managed inconsistently across different silos.
    7. Policies are written poorly by untrained authors.
    8. Inadequate policy training program.
    9. Draft policies stall and lose momentum.
    10. Weak policy support from senior management.

    Data quality problems root cause #5:

    Inefficient or ineffective business processes

    Some common root causes of data quality issues related to business processes include:

    1. Multiple entries of the same record leads to duplicate records proliferating in the database.
    2. Many business definitions of data.
    3. Failure to document data manipulations when presenting data.
    4. Failure to train people on how to understand data.
    5. Manually intensive processes can result in duplication of effort (creates room for errors).
    6. No clear delineation of dependencies of business processes within or between departments, which leads to a siloed approach to business processes, rather than a coordinated and aligned approach.

    Business processes can impact data quality. How data is entered into systems, as well as employee training and knowledge about the correct data definitions, can impact the quality of your organization’s data.

    These problematic business process root causes can lead to:

    Duplicate records

    Incomplete data

    Improper use of data

    Wrong data entered into fields

    These data quality issues will result in costly and inefficient manual fixes, wasting valuable time and resources.

    Phase 1 Summary

    1. Data Quality Understanding

    • Understanding that data quality is a methodology and should be treated as such.
    • Data quality can be defined by four key indicators which are completeness, usability, timeliness, and accessibility.
    • Explained how to get investment for your data quality program and showcasing its value to leadership.

    2. Phase 0 Deliverables

    Introduced foundational tools to help you throughout this blueprint:

    • Complete the Data Culture Diagnostic and Business Capability Map Template as they are foundational in understanding your data culture and business capabilities to start the journey of data quality improvement.
    • Involve key relevant stakeholders when completing the Data Quality Diagnostic for each major business use case. Use the Importance and Confidence dimensions to help you prioritize which use case to address.

    3. Common Root Causes

    Addressed where multiple root causes can occur throughout the flow of your data.

    Analyzed the following common root causes of data quality:

    1. Poor system or application design
    2. Poor database design
    3. Improper integration and synchronization of enterprise data
    4. Insufficient and ineffective data quality policies and procedures
    5. Inefficient or ineffective business processes

    Phase 2

    Analyze Your Priorities for Data Quality Fixes

    Build Your Data Quality Program

    Business Context & Data Quality

    Establish the business context of data quality improvement projects at the business unit level to find common goals.

    • To ensure the data improvement strategy is business driven, start your data quality project evaluation by understanding the business context. You will then determine which business units use data and create a roadmap for prioritizing business units for data quality repairs.
    • Your business context is represented by your corporate business vision, mission, goals and objectives, differentiators, and drivers. Collectively, they provide essential information on what is important to your organization, and some hints on how to achieve that. In this step, you will gather important information about your business view and interpret the business view to establish a data view.

    Business Vision

    Business Goals

    Business Drivers

    Business Differentiators

    Not every business unit uses data to the same extent

    A data flow diagram can provide value by allowing an organization to adopt a proactive approach to data quality. Save time by knowing where the entry points are and where to look for data flaws.

    Understanding where data lives can be challenging as it is often in motion and rarely resides in one place. There are multiple benefits that come from taking the time to create a data flow diagram.

    • Mapping out the flow of data can help provide clarity on where the data lives and how it moves through the enterprise systems.
    • Having a visual of where and when data moves helps to understand who is using data and how it is being manipulated at different points.
    • A data flow diagram will allow you to elicit how data is used in a different use case.

    Info-Tech’s Four-Column Model of Data will help you to identify the essential aspects of your data:

    Business Use Case →Used by→Business Unit →Housed in→Systems→Used for→Usage of the Data

    Not every business unit requires the same standard of data quality

    To prioritize your business units for data quality improvement projects, you must analyze the relative importance of the data they use to the business. The more important the data is to the business, the higher the priority is of fixing that data. There are two measures for determining the importance of data: business value and business impact.

    Business Value of Data

    Business value of data can be evaluated by thinking about its ties to revenue generation for the organization, as well as how it is used for productivity and operations at the organization.

    The business value of data is assessed by asking what would happen to the following parameters if the data is not usable (due to poor quality, for example):

    • Loss of Revenue
    • Loss of Productivity
    • Increased Operating Costs

    Business Impact of Data

    Business impact of data should take into account the effects of poor data on both internal and external parties.

    The business impact of data is assessed by asking what the impact would be of bad data on the following parameters:

    • Impact on Customers
    • Impact on Internal Staff
    • Impact on Business Partners

    Value + Impact = Data Priority Score

    Ensure that the project starts on the right foot by completing Info-Tech’s Data Quality Problem Statement Template

    Before you can identify a solution, you must identify the problem with the business unit’s data.

    Download this tool

    Use Info-Tech’s Data Quality Problem Statement Template to identify the symptoms of poor data quality and articulate the problem.

    Info-Tech’s Data Quality Problem Statement Template will walk you through a step-by-step approach to identifying and describing the problems that the business unit feels regarding its data quality.

    Before articulating the problem, it helps to identify the symptoms of the problem. The following W’s will help you to describe the symptoms of the data quality issues:

    What

    Define the symptoms and feelings produced by poor data quality in the business unit.

    Where

    Define the location of the data that are causing data quality issues.

    When

    Define how severe the data quality issues are in frequency and duration.

    Who

    Define who is affected by the data quality problems and who works with the data.

    Info-Tech Best Practice

    Symptoms vs. Problems. Often, people will identify a list of symptoms of a problem and mistake those for the problem. Identifying the symptoms helps to define the problem, but symptoms do not help to identify the solution. The problem statement helps you to create solutions.

    Define the project problem to articulate the purpose

    1 hour

    Input

    • Symptoms of data quality issues in the business unit

    Output

    • Refined problem description

    Materials

    • Data Quality Problem Statement Template

    Participants

    • Data Quality Improvement Project team
    • Business line representatives

    A defined problem helps you to create clear goals, as well as lead your thinking to determine solutions to the problem.

    A problem statement consists of one or two sentences that summarize a condition or issue that a quality improvement team is meant to address. For the improvement team to fix the problem, the problem statement therefore has to be specific and concise.

    Instructions

    1. Gather the Data Quality Improvement Project Team in a room and start with an issue that is believed to be related to data quality.
    2. Ask what are the attributes and symptoms of that reality today; do this with the people impacted by the issue. This should be an IT and business collaboration.
    3. Draw your conclusions of what it all means: what have you collectively learned?
    4. Consider the implications of your conclusions and other considerations that must be taken into account such as regulatory needs, compliance, policy, and targets.
    5. Develop solutions – Contain the problem to something that can be solved in a realistic timeframe, such as three months.

    Download the Data Quality Problem Statement Template

    Case Study

    A strategic roadmap rooted in business requirements primes a data quality improvement plan for success.

    MathWorks

    Industry

    Software Development

    Source

    Primary Info-Tech Research

    As part of moving to a formalized data quality practice, MathWorks leveraged an incremental approach that took its time investigating business cases to support improvement actions. Establishing realistic goals for improvement in the form of a roadmap was a central component for gaining executive approval to push the project forward.

    Roadmap Creation

    In constructing a comprehensive roadmap that incorporated findings from business process and data analyses, MathWorks opted to document five-year and three-year overall goals, with one-year objectives that supported each goal. This approach ensured that the tactical actions taken were directed by long-term strategic objectives.

    Results – Business Alignment

    In presenting their roadmap for executive approval, MathWorks placed emphasis on communicating the progression and impact of their initiatives in terms that would engage business users. They focused on maintaining continual lines of communication with business stakeholders to demonstrate the value of the initiatives and also to gradually shift the corporate culture to one that is invested in an effective data quality practice.

    “Don’t jump at the first opportunity, because you may be putting out a fire with a cup of water where a fire truck is needed.” – Executive Advisor, IT Research and Advisory Firm

    Use Info-Tech’s Practice Assessment and Project Planning Tool to create your strategy for improving data quality

    Assess IT’s capabilities and competencies around data quality and plan to build these as the organization’s data quality practice develops. Before you can fix data quality, make sure you have the necessary skills and abilities to fix data quality correctly.

    The following IT capabilities are developed on an ongoing basis and are necessary for standardizing and structuring a data quality practice:

    • Meeting Business Needs
    • Services and Projects
    • Policies, Procedures, and Standards
    • Roles and Organizational Structure
    • Oversight and Communication
    • Data Quality of Different Data Types

    Download this Tool

    Data Handling and Remediation Competencies:

    • Data Standardization: Formatting values into consistent standards based on industry standards and business rules.
    • Data Cleansing: Modification of values to meet domain restrictions, integrity constraints, or other business rules for sufficient data quality for the organization.
    • Data Matching: Identification, linking, and merging related entries in or across sets of data.
    • Data Validation: Checking for correctness of the data.

    After these capabilities and competencies are assessed for a current and desired target state, the Data Quality Practice Assessment and Project Planning Tool will suggest improvement actions that should be followed in order to build your data quality practice. In addition, a roadmap will be generated after target dates are set to create your data quality practice development strategy.

    Benchmark current and identify target capabilities for your data quality practice

    1 hour

    Input

    • Current and desired data quality practices in the organization

    Output

    • Assessment of where the gaps lie in your data quality practice

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Data Quality Project Lead
    • Business Line Representatives
    • Business Architects

    Use the Data Quality Practice Assessment and Project Planning Tool to evaluate the baseline and target capabilities of your practice in terms of how data quality is approached and executed.

    Download this Tool

    Instructions

    1. Invite the appropriate stakeholders to participate in this exercise. Examples:
      1. Business executives will have input in Tab 2
      2. Unique stakeholders: communications expert or executive advisors may have input
    2. On Tab 2: Practice Components, assess the current and target states of each capability on a scale of 1–5. Note: “Ad hoc” implies a capability is completed, but randomly, informally, and without a standardized method.

    These results will set the baseline against which you will monitor performance progress and keep track of improvements over time.

    Info-Tech Insight

    Focus on early alignment. Assessing capabilities within specific people’s job functions can naturally result in disagreement or debate, especially between business and IT people. Remind everyone that data quality should ultimately serve business needs wherever possible.

    Visualization improves the holistic understanding of where gaps exist in your data quality practice

    To enable deeper analysis on the results of your practice assessment, Tab 3: Data Quality Practice Scorecard in the Data Quality Practice Assessment and Project Planning Tool creates visualizations of the gaps identified in each of your practice capabilities and related data management practices. These diagrams serve as analysis summaries.

    Gap assessment of “Meeting Business Needs” capabilities

    The image shows a screen capture of the Gap assessment of 
“Meeting Business Needs” capabilities, with sample information filled in.

    Visualization of gap assessment of data quality practice capabilities

    The image shows a bar graph titled Data Quality Capabilities.

    1. Enhance your gap analyses by forming a relative comparison of total gaps in key practice capability areas, which will help in determining priorities.
    • Example: In Tab 2 compare your capabilities within “Policies, Procedures, and Standards.” Then in Tab 3, compare your overall capabilities in “Policies, Procedures, and Standards” versus “Empowering Technologies.”
  • Put these up on display to improve discussion in the gap analyses and prioritization sessions.
  • Improve the clarity and flow of your strategy template, final presentations, and summary documents by copying and pasting the gap assessment diagrams.
  • Before engaging in the data quality improvement project plan, receive signoff from IT regarding feasibility

    The final piece of the puzzle is to gain sign-off from IT.

    Hofstadter's law: It always takes longer than you expect, even when you take into account Hofstadter’s Law.

    This means that before engaging IT in data quality projects to fix the business units’ data in Phase 2, IT must assess feasibility of the data quality improvement plan. A feasibility analysis is typically used to review the strengths and weaknesses of the projects, as well as the availability of required skills and technologies needed to complete them. Use the following workflow to guide you in performing a feasibility analysis:

    Project evaluation process:

    Present capabilities

    • Operational Capabilities
    • System Capabilities
    • Schedule Capabilities
      • Summary of Evaluation Results
        • Recommendations/ modifications to the project plan

    Info-Tech Best Practice

    While the PMO identifies and coordinates projects, IT must determine how long and for how much.

    Conduct gap analysis sessions to review and prioritize the capability gaps

    1 hour

    Input

    • Current and Target State Assessment

    Output

    • Documented initiatives to help you get to the target state

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Data Quality team
    • IT representatives

    Instructions

    • Analyze Gap Analysis Results – As a group, discuss the high-level results on Tab 3: Data Quality Practice Score. Discuss the implications of the gaps identified.
    • Do a line-item review of the gaps between current and target levels for each assessed capability by using Tab 2: Practice Components.
    • Brainstorm Alignment Strategies – Brainstorm the effort and activities that will be necessary to support the practice in building its capabilities to the desired target level. Ask the following questions:
      • What activities must occur to enable this capability?
      • What changes/additions to resources, process, technology, business involvement, and communication must occur?
    • Document Data Quality Initiatives – Turn activities into initiatives by documenting them in Tab 4. Data Quality Practice Roadmap. Review the initiatives and estimate the start and end dates of each one.
    • Continue to evaluate the assessment results in order to create a comprehensive set of data quality initiatives that support your practice in building capabilities.

    Download this Tool

    Create the organization’s data quality improvement strategy roadmap

    1 hour

    Input

    • Data quality practice gaps and improvement actions

    Output

    • Data quality practice improvement roadmap

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Data Quality Project Lead
    • Business Executives
    • IT Executives
    • Business Architects

    Generating Your Roadmap

    1. Plan the sequence, starting time, and length of each initiative in the Data Quality Practice Assessment and Project Planning Tool.
    2. The tool will generate a Gantt chart based on the start and length of your initiatives.
    3. The Gantt chart is generated in Tab 4: Data Quality Practice Roadmap, and can be used to organize and ensure that all of the essential aspects of data quality are addressed.

    Use the Practice Roadmap to plan and improve data quality capabilities

    Download this Tool

    Info-Tech Best Practice

    To help get you started, Info-Tech has provided an extensive list of data quality improvement initiatives that are commonly undertaken by organizations looking to improve their data quality.

    Establish Baseline Metrics

    Baseline metrics will be improved through:

    2 hours

    Create practice-level metrics to monitor your data quality practice.

    Instructions:

    1. Establish metrics for both the business and IT that will be used to determine if the data quality practice development is effective.
    2. Set targets for each metric.
    3. Collect current data to calculate the metrics and establish a baseline.
    4. Assign an owner for tracking each metric to be accountable for performance.
    Metric Current Goal
    Usage (% of trained users using the data warehouse)
    Performance (response time)
    Performance (response time)
    Resource utilization (memory usage, number of machine cycles)
    User satisfaction (quarterly user surveys)
    Data quality (% values outside valid values, % fields missing, wrong data type, data outside acceptable range, data that violates business rules. Some aspects of data quality can be automatically tracked and reported)
    Costs (initial installation and ongoing, Total Cost of Ownership including servers, software licenses, support staff)
    Security (security violations detected, where violations are coming from, breaches)
    Patterns that are used
    Reduction in time to market for the data
    Completeness of data that is available
    How many "standard" data models are being used
    What is the extra business value from the data governance program?
    How much time is spent for data prep by BI & analytics team?

    Phase 2 summary

    As you improve your data quality practice and move from reactive to stable, don’t rest and assume that you can let data quality keep going by itself. Rapidly changing consumer requirements or other pains will catch up to your organization and you will fall behind again. By moving to the proactive and predictive end of the maturity scale, you can stay ahead of the curve. By following the methodology laid out in Phase 1, the data quality practices at your organization will improve over time, leading to the following results:

    Chaotic

    Before Data Quality Practice Improvements

    • No standards to data quality

    Reactive

    Year 1

    • Processes defined
    • Data cleansing approach to data quality

    Stable

    Year 2

    • Business rules/ stewardship in place
    • Education and training

    Proactive

    Year 3

    • Data quality practices fully in place and embedded in the culture
    • Trusted and intelligent enterprise

    (Global Data Excellence, Data Excellence Maturity Model)

    Phase 3

    Establish Your Organization’s Data Quality Program

    Build Your Data Quality Program

    Create a data lineage diagram to map the data journey and identify the data subject areas to be targeted for fixes

    It is important to understand the various data that exist in the business unit, as well as which data are essential to business function and require the highest degree of quality efforts.

    Visualize your databases and the flow of data. A data lineage diagram can help you and the Data Quality Improvement Team visualize where data issues lie. Keeping the five-tier architecture in mind, build your data lineage diagram.

    Reminder: Five-Tier Architecture

    The image shows the Five-Tier Architecture graphic.

    Use the following icons to represent your various data systems and databases.

    The image shows four icons. They are: the image of a square and a computer monitor, labelled Application; the image of two sheets of paper, labelled Desktop documents; the image of a green circle next to a computer monitor, labelled Web Application; and a blue cylinder labelled Database.

    Use Info-Tech’s Data Lineage Diagram to document the data sources and applications used by the business unit

    2 hours

    Input

    • Data sources and applications used by the business unit

    Output

    • Data lineage diagram

    Materials

    • Data Lineage Diagram Template

    Participants

    • Business Unit Head/Data Owner
    • Business Unit SMEs
    • Data Analysts/Architects

    Map the flow and location of data within a business unit by creating a system context diagram.

    Gain an accurate view of data locations and uses: Engage business users and representatives with a wide breadth of knowledge-related business processes and the use of data by related business operations.

    1. Sit down with key business representatives of the business unit.
    2. Document the sources of data and processes in which they’re involved, and get IT confirmation that the sources of the data are correct.
    3. Map out the sources and processes in a system context diagram.

    Download this Tool

    Sample Data Lineage Diagram

    The image shows a sample data lineage diagram, split into External Applications and Internal Applications, and showing the processes involved in each.

    Leverage Info-Tech’s Data Quality Practice Assessment and Project Planning Tool to document business context

    1 hour

    Input

    • Business vision, goals, and drivers

    Output

    • Business context for the data quality improvement project

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Data Quality project lead
    • Business line representatives
    • IT executives

    Develop goals and align them with specific objectives to set the framework for your data quality initiatives.

    In the context of achieving business vision, mission, goals, and objectives and sustaining differentiators and key drivers, think about where and how data quality is a barrier. Then brainstorm data quality improvement objectives that map to these barriers. Document your list of objectives in Tab 5. Prioritize business units of the Data Quality Practice Assessment and Project Planning Tool.

    Establishing Business Context Example

    Healthcare Industry

    Vision To improve member services and make service provider experience more effective through improving data quality and data collection, aggregation, and accessibility for all the members.
    Goals

    Establish meaningful metrics that guide to the improvement of healthcare for member effectiveness of health care providers:

    • Data collection
    • Data harmonization
    • Data accessibility and trust by all constituents.
    Differentiator Connect service consumers with service providers, that comply with established regulations by delivering data that is accurate, trusted, timely, and easy to understand to connect service providers and eliminate bureaucracy and save money and time.
    Key Driver Seamlessly provide a healthcare for members.

    Download this Tool

    Document the identified business units and their associated data

    30 minutes

    Input

    • Business units

    Output

    • Documented business units to begin prioritization

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Project Manager

    Instructions

    1. Using Tab 5: Prioritize Business Units of the Data Quality Practice Assessment and Project Planning Tool, document the business units that use data in the organization. This will likely be all business units in the organization.
    2. Next, document the primary data used by those business units.
    3. These inputs will then be used to assess business unit priority to generate a data quality improvement project roadmap.

    The image shows a screen capture of Tab 5: Prioritize Business Units, with sample information inputted.

    Reminder – Not every business unit requires the same standard of data quality

    To prioritize your business units for data quality improvement projects, you must analyze the relative importance of the data they use to the business. The more important the data is to the business, the higher the priority is of fixing that data. There are two measures for determining the importance of data: business value and business impact.

    Business Value of Data

    Business value of data can be evaluated by thinking about its ties to revenue generation for the organization, as well as how it is used for productivity and operations at the organization.

    The business value of data is assessed by asking what would happen to the following parameters if the data is not usable (due to poor quality, for example):

    • Loss of Revenue
    • Loss of Productivity
    • Increased Operating Costs

    Business Impact of Data

    Business impact of data should take into account the effects of poor data on both internal and external parties.

    The business impact of data is assessed by asking what the impact would be of bad data on the following parameters:

    • Impact on Customers
    • Impact on Internal Staff
    • Impact on Business Partners

    Value + Impact = Data Priority Score

    Assess the business unit priority order for data quality improvements

    2 hours

    Input

    • Assessment of value and impact of business unit data

    Output

    • Prioritization list for data quality improvement projects

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Project Manager
    • Data owners

    Instructions

    Instructions In Tab 5: Prioritize Business Units of the Data Quality Practice Assessment and Project Planning Tool, assess business value and business impact of the data within each documented business unit.

    Use the ratings High, Medium, and Low to measure the financial, productivity, and efficiency value and impact of each business unit’s data.

    In addition to these ratings, assess the number of help desk tickets that are submitted to IT regarding data quality issues. This parameter is an indicator that the business unit’s data is high priority for data quality fixes.

    Download this Tool

    Create a business unit order roadmap for your data quality improvement projects

    1 hour

    Input

    • Rating of importance of data for each business unit

    Output

    • Roadmap for data quality improvement projects

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Project Manager
    • Product Manager
    • Business line representatives

    Instructions

    After assessing the business units for the business value and business impact of their data, the Data Quality Practice Assessment and Project Planning Tool automatically assesses the prioritization of the business units based on your ratings. These prioritizations are then summarized in a roadmap on Tab 6: Data Quality Project Roadmap. The following is an example of a project roadmap:

    The image shows an example of a project roadmap, with three business units listed vertically along the left hand side, and a Gantt chart showing the time periods in which each Business Unit would work. At the bottom, a table shows the Length of the Project in days (100), and the start date for the first project.

    On Tab 6, insert the timeline for your data quality improvement projects, as well as the starting date of your first data quality project. The roadmap will automatically update with the chosen timing and dates.

    Download this Tool

    Identify metrics at the business unit level to track data quality improvements

    As you improve the data quality for specific business units, measuring the benefits of data quality improvements will help you demonstrate the value of the projects to the business.

    Use the following table to guide you in creating business-aligned metrics:

    Business Unit Driver Metrics Goal
    Sales Customer Intimacy Accuracy of customer data. Percent of missing or incomplete records. 10% decrease in customer record errors.

    Marketing

    Customer Intimacy Accuracy of customer data. Percent of missing or incomplete records. 10% decrease in customer record errors.
    Finance Operational Excellence Relevance of financial reports. Decrease in report inaccuracy complaints.
    HR Risk Management Accuracy of employee data. 10% decrease in employee record errors.
    Shipping Operational Excellence Timeliness of invoice data. 10% decrease in time to report.

    Info-Tech Insight

    Relating data governance success metrics to overall business benefits keeps executive management and executive sponsors engaged because they are seeing actionable results. Review metrics on an ongoing basis with those data owners/stewards who are accountable, the data governance steering committee, and the executive sponsors.

    Case Study

    Address data quality with the right approach to maximize the ROI

    EDC

    Industry: Government

    Source: Environment Development of Canada (EDC)

    Challenge

    Environment Development Canada (EDC) would initially identify data elements that are important to the business purely based on their business instinct.

    Leadership attempted to tackle the enterprise’s data issues by bringing a set of different tools into the organization.

    It didn’t work out because the fundamental foundational layer, which is the data and infrastructure, was not right – they didn't have the foundational capabilities to enable those tools.

    Solution

    Leadership listened to the need for one single team to be responsible for the data persistence.

    Therefore, the data platform team was granted that mandate to extensively execute the data quality program across the enterprise.

    A data quality team was formed under the Data & Analytics COE. They had the mandate to profile the data and to understand what quality of data needed to be achieved. They worked constantly with the business to build the data quality rules.

    Results

    EDC tackled the source of their data quality issues through initially performing a data quality management assessment with business stakeholders.

    From then on, EDC was able to establish their data quality program and carry out other key initiatives that prove the ROI on data quality.

    Begin your data quality improvement project starting with the highest priority business unit

    Now that you have a prioritized list for your data quality improvement projects, identify the highest priority business unit. This is the business unit you will work through Phase 3 with to fix their data quality issues.

    Once you have initiated and identified solutions for the first business unit, tackle data quality for the next business unit in the prioritized list.

    The image is a graphic labelled as Phase 2. On the left, there is a vertical arrow pointing upward labelled Priority of Business Units. Next to it, there are three boxes, with downward pointing arrows between them, each box labelled as each Business Unit's Data Quality Improvement Project. From there an arrow points right to a circle. Inside the circle are the steps necessary to complete the data quality improvement project.

    Create and document your data quality improvement team

    1 hour

    Input

    • Individuals who fit the data quality improvement plan team roles

    Output

    • Project team

    Materials

    • Data Quality Improvement Plan Template

    Participants

    • Data owner
    • Project Manager
    • Product Manager

    The Data Quality Improvement Plan is a concise document that should be created for each data quality project (i.e. for each business unit) to keep track of the project.

    Instructions

    1. Meet with the data owner of the business unit identified for the data quality improvement project.
    2. Identify individuals who fit the data quality improvement plan team roles.
    3. Using the Data Quality Improvement Plan Template to document the roles and individuals who will fit those roles.
    4. Have an introductory meeting with the Improvement team to clarify roles and responsibilities for the project.

    Download this Tool

    Team role Assigned to
    Data Owner [Name]
    Project Manager [Name]
    Business Analyst/BRM [Name]
    Data Steward [Name]
    Data Analyst [Name]

    Document the business context of the Data Quality Improvement Plan

    1 hour

    Input

    • Project team
    • Identified data attributes

    Output

    • Business context for the data quality improvement plan

    Materials

    • Data Quality Improvement Plan Template

    Participants

    • Data owner
    • Project Sponsor
    • Product owner

    Data quality initiatives have to be relevant to the business, and the business context will be used to provide inputs to the data improvement strategy. The context can then be used to determine exactly where the root causes of data quality issues are, which will inform your solutions.

    Instructions

    The business context of the data quality improvement plan includes documenting from previous activities:

    1. The Data Quality Improvement Team.
    2. Your Data Lineage Diagram.
    3. Your Data Quality Problem Statement.

    Info-Tech Best Practice

    While many organizations adopt data quality principles, not all organizations express them along the same terms. Have multiple perspectives within your organization outline principles that fit your unique data quality agenda. Anyone interested in resolving the day-to-day data quality issues that they face can be helpful for creating the context around the project.

    Download this tool

    Now that you have a defined problem, revisit the root causes of poor data quality

    You previously fleshed out the problem with data quality present in the business unit chosen as highest priority. Now it is time to figure out what is causing those problems.

    In the table below, you will find some of the common categories of causes of data quality issues, as well as some specific root causes.

    Category Description
    1. System/Application Design Ineffective, insufficient, or even incorrect system/application design accepts incorrect and missing data elements to the source applications and databases. The data records in those source systems may propagate into systems in tiers 2, 3, 4, and 5 of the 5-tier architecture, creating domino and ripple effects.
    2. Database design Database is created and modeled in an incorrect manner so that the management of the data records is incorrect, resulting in duplicated and orphaned records, and records that are missing data elements or records that contain incorrect data elements. Poor operational data in databases often leads to issues in tiers 2, 3, 4, and 5.
    3. Enterprise Integration Data or information is improperly integrated, transformed, masked, and aggregated in tier 2. In addition, some data integration tasks might not be timely, resulting in out-of-date data or even data that contradicts with other data. Enterprise integration is a precursor of loading a data warehouse and data marts. Issues in this layer affect tier 3, 4 and 5 on the 5-tier architecture.
    4. Policies and Procedures Policies and procedures are not effectively used to reinforce data quality. In some situations, policy gaps are found. In others, policies are overlapped and duplicated. Policies may also be out-of-date or too complex, affecting the users’ ability to interpret the policy objectives. Policies affect all tiers in the 5-tier architecture.
    5. Business Processes Improper business process design introduces poor data into the data systems. Failure to create processes around approving data changes, failure to document key data elements, and failure to train employees on the proper uses of data make data quality a burning problem.

    Leverage a root cause analysis approach to pinpoint the origins of your data issues

    A root cause analysis is a systematic approach to decompose a problem into its components. Use fishbone diagrams to help reveal the root causes of data issues.

    The image shows a fishbone diagram on the left, which starts with Process on the left, and then leads to Application and Integration, and then Database and Policies. This section is titled Root causes. The right hand section is titled Lead to problems with data... and includes 4 circles with the word or in between each. The circles are labelled: Completeness; Usability; Timeliness; Accessibility.

    Info-Tech recommends five root cause categories for assessing data quality issues:

    Application Design. Is the issue caused by human error at the application level? Consider internal employees, external partners/suppliers, and customers.

    Database Design. Is the issue caused by a particular database and stems from inadequacies in its design?

    Integration. Data integration tools may not be fully leveraged, or data matching rules may be poorly designed.

    Policies and Procedures. Do the issues take place because of lack of governance?

    Business Processes. Do the issues take place due to insufficient processes?

    For Example:

    When performing a deeper analysis of your data issues related to the accuracy of the business unit’s data, you would perform a root cause analysis by assessing the contribution of each of the five categories of data quality problem root causes:

    The image shows another fishbone diagram, with example information filled in. The first section on the left is titled Application Design, and includes the text: Data entry problems lead to incorrect accounting entries. The second is Integration, and includes the text: Data integration tools are not fully leveraged. The third section is Policies, and includes the text: No policy on standardizing name and address. The last section is Database design, with text that reads: Databases do not contain unique keys. The diagram ends with an arrow pointing right to a blue circle with Accuracy in it.

    Leverage a combination of data analysis techniques to identify and quantify root causes

    Info-Tech Insight

    Including all attributes of the key subject area in your data profiling activities may produce too much information to make sense of. Conduct data profiling primarily at the table level and undergo attribute profiling only if you are able to narrow down your scope sufficiently.

    Data Profiling Tool

    Data profiling extracts a sample of the target data set and runs it through multiple levels of analysis. The end result is a detailed report of statistics about a variety of data quality criteria (duplicate data, incomplete data, stale data, etc.).

    Many data profiling tools have built-in templates and reports to help you uncover data issues. In addition, they quantify the occurrences of the data issues.

    E-Discovery Tool

    This supplements a profiling tool. For Example, use a BI tool to create a custom grouping of all the invalid states (e.g. “CAL,” “AZN,” etc.) and visualize the percentage of invalid states compared to all states.

    SQL Queries

    This supplements a profiling tool. For example, use a SQL statement to group the customer data by customer segment and then by state to identify which segment–state combinations contain poor data.

    Identify the data issues for the particular business unit under consideration

    2 hours

    Input

    • Issues with data quality felt by the business unit
    • Data lineage diagram

    Output

    • Categorized data quality issues

    Materials

    • Whiteboard, markers, sticky notes
    • Data Quality Improvement Plan Template

    Participants

    • Data quality improvement project team
    • Business line representatives

    Instructions

    1. Gather the data quality improvement project team in a room, along with sticky notes and a whiteboard.
    2. Display your previously created data lineage diagram on the whiteboard.
    3. Using color-coded sticky notes, attach issues to each component of the data lineage diagram that team members can identify. Use different colors for the four quality attributes: Completeness, Usability, Timeliness, and Accessibility.

    Example:

    The image shows the data lineage diagram that has been shown in previous sections. In addition, the image shows 4 post-its arranges around the diagram, labelled: Usability; Completeness; Timeliness; and Accessibility.

    Map the data issues on fishbone diagrams to identify root causes

    1 hour

    Input

    • Categorized data quality issues

    Output

    • Completed fishbone diagrams

    Materials

    • Whiteboard, markers, sticky notes
    • Data Quality Improvement Plan Template

    Participants

    • Data quality improvement project team

    Now that you have data quality issues classified according to the data quality attributes, map these issues onto four fishbone diagrams.

    The image shows a fishbone diagram, which is titled Example: Root cause analysis diagram for data accuracy.

    Download this Tool

    Get to know the root causes behind system/application design mistakes

    Suboptimal system/application design provides entry points for bad data.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Insufficient data mask No data mask is defined for a free-form text field in a user interface. E.g. North American phone number should have 4 masks – country code (1-digit), area code (3-digit), and local number (7-digit). X X
    Too many free-form text fields Incorrect use of free-form text fields (fields that accept a variety of inputs). E.g. Use a free-form text field for zip code instead of a backend look up. X X
    Lack of value lookup Reference data is not looked up from a reference list. E.g. State abbreviation is entered instead of being looked up from a standard list of states. X X
    Lack of mandatory field definitions Mandatory fields are not identified and reinforced. Resulting data records with many missing data elements. E.g. Some users may fill up 2 or 3 fields in a UI that has 20 non-mandatory fields. X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Application Design section is highlighted.

    Get to know the root causes behind common database design mistakes

    Improper database design allows incorrect data to be stored and propagated.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Incorrect referential integrity Referential integrity constraints are absent or incorrectly implemented, resulting in child records without parent records, or related records are updated or deleted in a cascading manner. E.g. An invoice line item is created before an invoice is created. X X
    Lack of unique keys Lack of unique keys creating scenarios where record uniqueness cannot be guaranteed. E.g. Customer records with the same customer_ID. X X
    Data range Fail to define a data range for incoming data, resulting in data values that are out of range. E.g. The age field is able to store an age of 999. X X
    Incorrect data type Incorrect data types are used to store data fields. E.g. A string field is used to store zip codes. Some users use that to store phone numbers, birthdays, etc. X X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Database Design section is highlighted

    Get to know the root causes behind enterprise integration mistakes

    Improper data integration or synchronization may create poor analytical data.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Incorrect transformation Transformation is done incorrectly. A wrong formula may have been used, transformation is done at the wrong data granularity, or aggregation logic is incorrect. E.g. Aggregation is done for all customers instead of just active customers. X X
    Data refresh is out of sync Data is synchronized at different intervals, resulting in a data warehouse where data domains are out of sync. E.g. Customer transactions are refreshed to reflect the latest activities but the account balance is not yet refreshed. X X
    Data is matched incorrectly Fail to match records from disparate systems, resulting in duplications and unmatched records. E.g. Unable to match customers from different systems because they have different cust_ID. X X
    Incorrect data mapping Fields from source systems are not properly matched with data warehouse fields. E.g. Status fields from different systems are mixed into one field. X X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Integration section is highlighted

    Get to know the root causes behind policy and procedure mistakes

    Suboptimal policies and procedures undermine the effect of best practices.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Policy Gaps There are gaps in the policy landscape in terms of some missing key policies or policies that are not refreshed to reflect the latest changes. E.g. A data entry policy is absent, leading to inconsistent data entry practices. X X
    Policy Communications Policies are in place but the policies are not communicated effectively to the organization, resulting in misinterpretation of policies and under-enforcement of policies. E.g. The data standard is created but very few developers are aware of its existence. X X
    Policy Enforcement Policies are in place but not proactively re-enforced and that leads to inconsistent application of policies and policy adoption. E.g. Policy adoption is dropping over time due to lack of reinforcement. X X
    Policy Quality Policies are written by untrained authors and they do not communicate the messages. E.g. A non-technical data user may find a policy that is loaded with technical terms confusing. X X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Policies section is highlighted

    Get to know the root causes behind common business process mistakes

    Ineffective and inefficient business processes create entry points for poor data.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Lack of training Key data personnel and business analysts are not trained in data quality and data governance, leading to lack of accountability. E.g. A data steward is not aware of downstream impact of a duplicated financial statement. X X
    Ineffective business process The same piece of information is entered into data systems two or more times. Or a piece of data is stalled in a data system for too long. E.g. A paper form is scanned multiple times to extract data into different data systems. X X
    Lack of documentation Fail to document the work flows of the key business processes. A lack of work flow results in sub-optimal use of data. E.g. Data is modeled incorrectly due to undocumented business logic. X X
    Lack of integration between business silos Business silos hold on to their own datasets resulting in data silos in which data is not shared and/or data is transferred with errors. E.g. Data from a unit is extracted as a data file and stored in a shared drive with little access. X X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Processes section is highlighted

    Phase 3 Summary

    1. Data Lineage Diagram
    • Creating the data lineage diagram is recommended to help visualize the flow of your data and to map the data journey and identify the data subject areas to be targeted for fixes.
    • The data lineage diagram was leveraged multiple times throughout this Phase. For example, the data lineage diagram was used to document the data sources and applications used by the business unit
  • Business Context
    • Business context was documented through the Data Quality Practice Assessment and Project Planning Tool.
    • The same tool was used to document identified business units and their associated data.
    • Metrics were also identified at the business unit level to track data quality improvements.
  • Common Root Causes
    • Leverage a root cause analysis approach to pinpoint the origins of your data quality issues.
    • Analyzed and got to know the root causes behind the following:
      1. System/application design mistakes
      2. Common database design mistakes
      3. Enterprise integration mistakes
      4. Policies and procedures mistakes
      5. Common business processes mistakes
  • Phase 4

    Grow and Sustain Your Data Quality Program

    Build Your Data Quality Program

    For the identified root causes, determine the solutions for the problem

    As you worked through the previous step, you identified the root causes of your data quality problems within the business unit. Now, it is time to identify solutions.

    The following slides provide an overview of the solutions to common data quality issues. As you identify solutions that apply to the business unit being addressed, insert the solution tables in Section 4: Proposed Solutions of the Data Quality Improvement Plan Template.

    All data quality solutions have two components to them:

    • Technology
    • People

    For the next five data quality solution slides, look for the slider for the contributions of each category to the solution. Use this scale to guide you in creating solutions.

    When designing solutions, keep in mind that solutions to data quality problems are not mutually exclusive. In other words, an identified root cause may have multiple solutions that apply to it.

    For example, if an application is plagued with inaccurate data, the application design may be suboptimal, but also the process that leads to data being entered may need fixing.

    Data quality improvement strategy #1:

    Fix data quality issues by improving system/application design.

    Technology

    Application Interface Design

    Restrict field length – Capture only the characters you need for your application.

    Leverage data masks – Use data masks in standardized fields like zip code and phone number.

    Restrict the use of open text fields and use reference tables – Only present open text fields when there is a need. Use reference tables to limit data values.

    Provide options – Use radio buttons, drop-down lists, and multi-select instead of using open text fields.

    Data Validation at the Application Level

    Validate data before committing – Use simple validation to ensure the data entered is not random numbers and letters.

    Track history – Keep track of who entered what fields.

    Cannot submit twice – Only design for one-time submission.

    People

    Training

    Data-entry training – Training that is related to data entry, creating, or updating data records.

    Data resolution training – Training data stewards or other dedicated data personnel on how to resolve data records that are not entered properly.

    Continuous Improvement

    Standards – Develop application design principles and standards.

    Field testing – Field data entry with a few people to look for abnormalities and discrepancies.

    Detection and resolution – Abnormal data records should be isolated and resolved ASAP.

    Application Testing

    Thorough testing – Application design is your first line of defence against poor data. Test to ensure bad data is kept out of the systems.

    Case Study

    HMS

    Industry: Healthcare

    Source: Informatica

    Improve your data quality ingestion procedures to provide better customer intimacy for your users

    Healthcare Management Systems (HMS) provides cost containment services for healthcare sponsors and payers, and coordinates benefits services. This is to ensure that healthcare claims are paid correctly to both government agencies and individuals. To do so, HMS relies on data, and this data needs to be of high quality to ensure the correct decisions are made, the right people get the correct claims, and the appropriate parties pay out.

    To improve the integrity of HMS’s customer data, HMS put in place a framework that helped to standardize the collection of high volume and highly variable data.

    Results

    Working with a data quality platform vendor to establish a framework for data standardization, HMS was able to streamline data analysis and reduce new customer implementations from months to weeks.

    HMS data was plagued with a lack of standardization of data ingestion procedures.

    Before improving data quality processes After improving data quality processes
    Data Ingestion Data Ingestion
    Many standards of ingestion. Standardized data ingestion
    Data Storage Data Storage
    Lack of ability to match data, creating data quality errors.
    Data Analysis Data Analysis
    = =
    Slow Customer Implementation Time 50% Reduction in Customer Implementation Time

    Data quality improvement strategy #2:

    Fix data quality issues using proper database design.

    Technology

    Database Design Best Practices

    Referential integrity – Ensure parent/child relationships are maintained in terms of cascade creation, update, and deletion.

    Primary key definition – Ensure there is at least one key to guarantee the uniqueness of the data records, and primary key should not allow null.

    Validate data domain – Create triggers to check the data values entered in the database fields.

    Field type and length – Define the most suitable data type and length to hold field values.

    One-Time Data Fix (more on the next slide)

    Explore solutions – Where to fix the data issues? Is there a case to fix the issues?

    Running profiling tools to catch errors – Run scans on the database with defined criteria to identify occurrences of questionable data.

    Fix a sample before fixing all records – Use a proof-of-concept approach to explore fix options and evaluate impacts before fixing the full set.

    People

    The DBA Team

    Perform key tasks in pairs – Take a pair approach to perform key tasks so that validation and cross-check can happen.

    Skilled DBAs – DBAs should be certified and accredited.

    Competence – Assess DBA competency on an ongoing basis.

    Preparedness – Develop drills to stimulate data issues and train DBAs.

    Cross train – Cross train team members so that one DBA can cover another DBA.

    Data quality improvement strategy #3:

    Improve integration and synchronization of enterprise data.

    Technology

    Integration Architecture

    Info-Tech’s 5-Tier Architecture – When doing transformations, it is good practice to persist the integration results in tier 3 before the data is further refined and presented in tier 4.

    Timing, timing, and timing – Think of the sequence of events. You may need to perform some ETL tasks before other tasks to achieve synchronization and consistence.

    Historical changes – Ensure your tier 3 is robust enough to include historical data. You need to enable type 2 slowly, changing dimension to recreate the data at a point in time.

    Data Cleansing

    Standardize – Leverage data standardization to standardize name and address fields to improve matching and integration.

    Fuzzy matching – When there are no common keys between datasets. The datasets can only be matched by fuzzy matching. Fuzzy matching is not hard science; define a confidence level and think about a mechanism to deal with the unmatched.

    People

    Reporting and Documentations

    Business data glossary and data lineage – Define a business data glossary to enhance findability of key data elements. Document data mappings and ETL logics.

    Create data quality reports – Many ETL platforms provide canned data quality reports. Leverage those quality reports to monitor the data health.

    Code Review

    Create data quality reports – Many ETL platforms provide canned data quality reports. Leverage those quality reports to monitor the data health.

    ARB (architectural review board) – All ETL codes should be approved by the architectural review board to ensure alignment with the overall integration strategy.

    Data quality improvement strategy #4:

    Improve data quality policies and procedures.

    Technology

    Policy Reporting

    Data quality reports – Leverage canned data quality reports from the ETL platforms to monitor data quality on an on-going basis. When abnormalities are found, provoke the right policies to deal with the issues.

    Store policies in a central location that is well known and easy to find and access. A key way that technology can help communicate policies is by having them published on a centralized website.

    Make the repository searchable and easily navigable. myPolicies helps you do all this and more.

    myPolicies helps you do all this and more.

    Go to this link

    People

    Policy Review and Training

    Policy review – Create a schedule for reviewing policies on a regular basis – invite professional writers to ensure polices are understandable.

    Policy training – Policies are often unread and misread. Training users and stakeholders on policies is an effective way to make sure those users and stakeholders understand the rationale of the policies. It is also a good practice to include a few scenarios that are handled by the policies.

    Policy hotline/mailbox – To avoid misinterpretation of the policies, a policy hotline/mailbox should be set up to answer any data policy questions from the end users/stakeholders.

    Policy Communications

    Simplified communications – Create handy one-pagers and infographic posters to communicate the key messages of the polices.

    Policy briefing – Whenever a new data project is initiated, a briefing of data policies should be given to ensure the project team follows the policies from the very beginning.

    Data quality improvement strategy #5:

    Streamline and optimize business processes.

    Technology

    Requirements Gathering

    Data Lineage – Leverage a metadata management tool to construct and document data lineage for future reference.

    Documentations Repository – It is a best practice to document key project information and share that knowledge across the project team and with the stakeholder. An improvement understanding of the project helps to identify data quality issues early on in the project.

    “Automating creation of data would help data quality most. You have to look at existing processes and create data signatures. You can then derive data off those data codes.” – Patrick Bossey, Manager of Business Intelligence, Crawford and Company

    People

    Requirements Gathering

    Info-Tech’s 4-Column Model – The datasets may exist but the business units do not have an effective way of communicating the quality needs. Use our four-column model and the eleven supporting questions to better understand the quality needs. See subsequent slides.

    I don’t know what the data means so I think the quality is poor – It is not uncommon to see that the right data presented to the business but the business does not trust the data. They also do not understand the business logic done on the data. See our Business Data Glossary in subsequent slides.

    Understand the business workflow – Know the business workflow to understand the manual steps associated with the workflow. You may find steps in which data is entered, manipulated, or consumed inappropriately.

    “Do a shadow data exercise where you identify the human workflows of how data gets entered, and then you can identify where data entry can be automated.” – Diraj Goel, Growth Advisor, BC Tech

    Brainstorm solutions to your data quality issues

    4 hours

    Input

    • Data profiling results
    • Preliminary root cause analyses

    Output

    • Proposals for data fix
    • Fixed issues

    Materials

    • Data Quality Improvement Plan Template

    Participants

    • Business and Data Analysts
    • Data experts and stewards

    After walking through the best-practice solutions to data quality issues, propose solutions to fix your identified issues.

    Instructions

    1. Review Root Cause Analyses: Revisit the root cause analysis and data lineage diagram you have generated in Step 3.2. to understand the issues in greater details.
    2. Characterize Each Issue: You may need to generate a data profiling report to characterize the issue. The report can be generated by using data quality suites, BI platforms, or even SQL statements.
    3. Brainstorm the Solutions: As a group, discuss potential ways to fix the issue. You can tackle the issues by approaching from these areas:
    Solution Approaches
    Technology Approach
    People Approach

    X crossover with

    Problematic Areas
    Application/System Design
    Database Design
    Data Integration and Synchronization
    Policies and Procedures
    Business Processes
    1. Document and Communicate: Document the solutions to your data issues. You may need to reuse or refer to the solutions. Also brainstorm some ideas on how to communicate the results back to the business.

    Download this Tool

    Sustaining your data quality requires continuous oversight through a data governance practice

    Quality data is the ultimate outcome of data governance and data quality management. Data governance enables data quality by providing the necessary oversight and controls for business processes in order to maintain data quality. There are three primary groups (at right) that are involved in a mature governance practice. Data quality should be tightly integrated with all of them.

    Define an effective data governance strategy and ensure the strategy integrates well with data quality with Info-Tech’s Establish Data Governance blueprint.

    Visit this link

    Data Governance Council

    This council establishes data management practices that span across the organization. This should be comprised of senior management or C-suite executives that can represent the various departments and lines of business within the organization. The data governance council can help to promote the value of data governance, facilitate a culture that nurtures data quality, and ensure that the goals of the data governance program are well aligned with business objectives.

    Data Owners

    Identifying the data owner role within an organization helps to create a greater degree of accountability for data issues. They often oversee how the data is being generated as well as how it is being consumed. Data owners come from the business side and have legal rights and defined control over a data set. They ensure data is available to the right people within the organization.

    Data Stewards

    Conflict can occur within an organization’s data governance program when a data steward’s role is confused with that of the steering committee’s role. Data stewards exist to enforce decisions made about data governance and data management. Data stewards are often business analysts or power users of a particular system/dataset. Where a data owner is primarily responsible for access, a data steward is responsible for the quality of a dataset.

    Integrate the data quality management strategy with existing data governance committees

    Ongoing and regular data quality management is the responsibility of the data governance bodies of the organization.

    The oversight of ongoing data quality activities rests on the shoulders of the data governance committees that exist in the organization.

    There is no one-size-fits-all data governance structure. However, most organizations follow a similar pattern when establishing committees, councils, and cross-functional groups. They strive to identify roles and responsibilities at a strategic, tactical, and operational level:

    The image shows a pyramid, with Executive Sponsors at the top, with the following roles in descending order: DG Council; Steering Committee; Working Groups; Data Owners and Data Stewards; and Data Users. Along the left side of the pyramid, there are three labels, in ascending order: Operational, Tactical, and Strategic.

    The image is a flow chart showing project roles, in two sections: the top section is labelled Governing Bodies, and the lower section is labelled Data Quality Improvement Team. There is a note indicating that the Data Owner reports to and provides updates regarding the state of data quality and data quality initiatives.

    Create and update the organization’s Business Data Glossary to keep up with current data definitions

    2 hours

    Input

    • Metrics and goals for data quality

    Output

    • Regularly scheduled data quality checkups

    Materials

    • Business Data Glossary Template
    • Data Quality Dashboard

    Participants

    • Data steward

    A crucial aspect of data quality and governance is the Business Data Glossary. The Business Data Glossary helps to align the terminology of the business with the organization’s data assets. It allows the people who interact with the data to quickly identify the applications, processes, and stewardship associated with it, which will enhance the accuracy and efficiency of searches for organization data definitions and attributes, enabling better access to the data. This will, in turn, enhance the quality of the organization’s data because it will be more accurate, relevant, and accessible.

    Use the Business Data Glossary Template to document key aspects of the data, such as:

    • Definition
    • Source System
    • Possible Values
    • Data Steward
    • Data Sensitivity
    • Data Availability
    • Batch or Live
    • Retention

    Data Element

    • Mkt-Product
    • Fin-Product

    Info-Tech Insight

    The Business Data Glossary ensures that the crucial data that has key business use by key business systems and users is appropriately owned and defined. It also establishes rules that lead to proper data management and quality to be enforced by the data owners.

    Download this Tool

    Data Steward(s): Use the Data Quality Improvement Plan of the business unit for ongoing quality monitoring

    Integrating your data quality strategy into the organization’s data governance program requires passing the strategy over to members of the data governance program. The data steward role is responsible for data quality at the business unit level, and should have been involved with the creation and implementation of the data quality improvement project. After the data quality repairs have been made, it is the responsibility of the data steward to regularly monitor the quality of the business unit’s data.

    Create Improvement Plan ↓
    • Data Quality Improvement Team identifies root cause issues.
    • Brainstorm solutions.
    Implement Improvement Plan ↓
    • Data Quality Improvement Team works with IT.
    Sustain Improvement Plan
    • Data Steward should regularly monitor data quality.

    Download this tool

    See Info-Tech’s Data Steward Job Description Template for a detailed understanding of the roles and responsibilities of the data steward.

    Responsible for sustaining

    The image shows a screen capture of a document entitled Business Context & Subject Area Selection.

    Develop a business-facing data quality dashboard to show improvements or a sudden dip in data quality

    One tool that the data steward can take advantage of is the data quality dashboard. Initiatives that are implemented to address data quality must have metrics defined by business objectives in order to demonstrate the value of the data quality improvement projects. In addition, the data steward should have tools for tracking data quality in the business unit to report issues to the data owner and data governance steering committee.

    • Example 1: Marketing uses data for direct mail and e-marketing campaigns. They care about customer data in particular. Specifically, they require high data quality in attributes such as customer name, address, and product profile.
    • Example 2: Alternatively, Finance places emphasis on financial data, focusing on attributes like account balance, latency in payment, credit score, and billing date.

    The image is Business dashboard on Data Quality for Marketing. It features Data Quality metrics, listed in the left column, and numbers for each quarter over the course of one year, on the right.

    Notes on chart:

    General improvement in billing address quality

    Sudden drop in touchpoint accuracy may prompt business to ask for explanations

    Approach to creating a business-facing data quality dashboard:

    1. Schedule a meeting with the functional unit to discuss what key data quality metrics are essential to their business operations. You should consider the business context, functional area, and subject area analyses you completed in Phase 1 as a starting point.
    2. Discuss how to gather data for the key metrics and their associated calculations.
    3. Discuss and decide the reporting intervals.
    4. Discuss and decide the unit of measurement.
    5. Generate a dashboard similar to the example. Consider using a BI or analytics tool to develop the dashboard.

    Data quality management must be sustained for ongoing improvements to the organization’s data

    • Data quality is never truly complete; it is a set of ongoing processes and disciplines that requires a permanent plan for monitoring practices, reviewing processes, and maintaining consistent data standards.
    • Setting the expectation to stakeholders that a long-term commitment is required to maintain quality data within the organization is critical to the success of the program.
    • A data quality maintenance program will continually revise and fine-tune ongoing practices, processes, and procedures employed for organizational data management.

    Data quality is a program that requires continual care:

    →Maintain→Good Data →

    Data quality management is a long-term commitment that shifts how an organization views, manages, and utilizes its corporate data assets. Long-term buy-in from all involved is critical.

    “Data quality is a process. We are trying to constantly improve the quality over time. It is not a one-time fix.” – Akin Akinwumi, Manager of Data Governance, Startech.com

    Define a data quality review agenda for data quality sustainment

    2 hours

    Input

    • Metrics and goals for data quality

    Output

    • Regularly scheduled data quality checkups

    Materials

    • Data Quality Diagnostic
    • Data Quality Dashboard

    Participants

    • Data Steward

    As a data steward, you are responsible for ongoing data quality checks of the business unit’s data. Define an improvement agenda to organize the improvement activities. Organize the activities yearly and quarterly to ensure improvement is done year-round.

    Quarterly

    • Measure data quality metrics against milestones. Perform a regular data quality health check with Info-Tech’s Data Quality Diagnostic.
    • Review the business unit’s Business Data Glossary to ensure that it is up to date and comprehensive.
    • Assess progress of practice area initiatives (time, milestones, budget, benefits delivered).
    • Analyze overall data quality and report progress on key improvement projects and corrective actions in the executive dashboard.
    • Communicate overall status of data quality to oversight body.

    Annually

    • Calculate your current baseline and measure progress by comparing it to previous years.
    • Set/revise quality objectives for each practice area and inter-practice hand-off processes.
    • Re-evaluate/re-establish data quality objectives.
    • Set/review data quality metrics and tracking mechanisms.
    • Set data quality review milestones and timelines.
    • Revisit data quality training from an end-user perspective and from a practitioner perspective.

    Info-Tech Insight

    Do data quality diagnostic at the beginning of any improvement plan, then recheck health with the diagnostic at regular intervals to see if symptoms are coming back. This should be a monitoring activity, not a data quality fixing activity. If symptoms are bad enough, repeat the improvement plan process.

    Take the next step in your Data & Analytics Journey

    After establishing your data quality program, look to increase your data & analytics maturity.

    • Artificial Intelligence (AI) is a concept that many organizations strive to implement. AI can really help in areas such as data preparation. However, implementing AI solutions requires a level of maturity that many organizations are not at.
    • While a solid data quality foundation is essential for AI initiatives being successful, AI can also ensure high data quality.
    • An AI analytics solution can address data integrity issues at the earliest point of data processing, rapidly transforming these vast volumes of data into trusted business information. This can be done through Anomaly detection, which flags “bad” data, identifying suspicious anomalies that can impact data quality. By tracking and evaluating data, anomaly detection gives critical insights into data quality as data is processed. (Ira Cohen, The End to a Never-Ending Story? Improve Data Quality with AI Analytics, anodot, 2020)

    Consider… “Garbage in, garbage out.”

    Lay a solid foundation by addressing your data quality issues prior to investing heavily in an AI solution.

    Related Info-Tech Research

    Are You Ready for AI?

    • Use AI as a compelling event to expedite funding, resources, and project plans for your data-related initiatives. Check out this note to understand what it takes to be ready to implement AI solutions.

    Get Started With Artificial Intelligence

    • Current AI technology is data-enabled, automated, adaptive decision support. Once you believe you are ready for AI, check out this blueprint on how to get started.

    Build a Data Architecture Roadmap

    • The data lineage diagram was a key tool used in establishing your data quality program. Check out this blueprint and learn how to optimize your data architecture to provide greatest value from data.

    Create an Architecture for AI

    • Build your target state architecture from predefined best practice building blocks. This blueprint assists members first to assess if they have the maturity to embrace AI in their organization, and if so, which AI acquisition model fits them best.

    Phase 4 Summary

    1. Data Quality Improvement Strategy
    • Brainstorm solutions to your data quality issues using the following data quality improvement strategies as a guide:
      1. Fix data quality issues by improving system/application design
      2. Fix data quality issues using proper database design
      3. Improve integration and synchronization of enterprise data
      4. Improve data quality policies and procedures
      5. Streamline and optimize business processes
  • Sustain Your Data Quality Program
    • Quality data is the ultimate outcome of data governance and data quality management.
    • Sustaining your data quality requires continuous oversight through a data governance practice.
    • There are three primary groups (Data Governance Council, Data Owners, and Data Stewards) that are involved in a mature governance practice.
  • Grow Your Data & Analytics Maturity
    • After establishing your data quality program, take the next step in increasing your data & analytics maturity.
    • Good data quality is the foundation of pursuing different ways of maximizing the value of your data such as implementing AI solutions.
    • Continue your data & analytics journey by referring to Info-Tech’s quality research.
  • Research Contributors and Experts

    Izabela Edmunds

    Information Architect Mott MacDonald

    Akin Akinwumi

    Manager of Data Governance Startech.com

    Diraj Goel

    Growth Advisor BC Tech

    Sujay Deb

    Director of Data Analytics Technology and Platforms Export Development Canada

    Asif Mumtaz

    Data & Solution Architect Blue Cross Blue Shield Association

    Patrick Bossey

    Manager of Business Intelligence Crawford and Company

    Anonymous Contributors

    Ibrahim Abdel-Kader

    Research Specialist Info-Tech Research Group

    Ibrahim is a Research Specialist at Info-Tech Research Group. In his career to date he has assisted many clients using his knowledge in process design, knowledge management, SharePoint for ECM, and more. He is expanding his familiarity in many areas such as data and analytics, enterprise architecture, and CIO-related topics.

    Reddy Doddipalli

    Senior Workshop Director Info-Tech Research Group

    Reddy is a Senior Workshop Director at Info-Tech Research Group, focused on data management and specialized analytics applications. He has over 25 years of strong industry experience in IT leading and managing analytics suite of solutions, enterprise data management, enterprise architecture, and artificial intelligence–based complex expert systems.

    Andy Neill

    Practice Lead, Data & Analytics and Enterprise Architecture Info-Tech Research Group

    Andy leads the data and analytics and enterprise architecture practices at ITRG. He has over 15 years of experience in managing technical teams, information architecture, data modeling, and enterprise data strategy. He is an expert in enterprise data architecture, data integration, data standards, data strategy, big data, and development of industry standard data models.

    Crystal Singh

    Research Director, Data & Analytics Info-Tech Research Group

    Crystal is a Research Director at Info-Tech Research Group. She brings a diverse and global perspective to her role, drawing from her professional experiences in various industries and locations. Prior to joining Info-Tech, Crystal led the Enterprise Data Services function at Rogers Communications, one of Canada’s leading telecommunications companies.

    Igor Ikonnikov

    Research Director, Data & Analytics Info-Tech Research Group

    Igor is a Research Director at Info-Tech Research Group. He has extensive experience in strategy formation and execution in the information management domain, including master data management, data governance, knowledge management, enterprise content management, big data, and analytics.

    Andrea Malick

    Research Director, Data & Analytics Info-Tech Research Group

    Andrea Malick is a Research Director at Info-Tech Research Group, focused on building best practices knowledge in the enterprise information management domain, with corporate and consulting leadership in enterprise architecture and content management (ECM).

    Natalia Modjeska

    Research Director, Data & Analytics Info-Tech Research Group

    Natalia Modjeska is a Research Director at Info-Tech Research Group. She advises members on topics related to AI, machine learning, advanced analytics, and data science, including ethics and governance. Natalia has over 15 years of experience in developing, selling, and implementing analytical solutions.

    Rajesh Parab

    Research Director, Data & Analytics Info-Tech Research Group

    Rajesh Parab is a Research Director at Info-Tech Research Group. He has over 20 years of global experience and brings a unique mix of technology and business acumen. He has worked on many data-driven business applications. In his previous architecture roles, Rajesh created a number of product roadmaps, technology strategies, and models.

    Bibliography

    Amidon, Kirk. "Case Study: How Data Quality Has Evolved at MathWorks." The Fifth MIT Information Quality Industry Symposium. 13 July 2011. Web. 19 Aug. 2015.

    Boulton, Clint. “Disconnect between CIOs and LOB managers weakens data quality.” CIO. 05 February 2016. Accessed June 2020.

    COBIT 5: Enabling Information. Rolling Meadows, IL: ISACA, 2013. Web.

    Cohen, Ira. “The End to a Never-Ending Story? Improve Data Quality with AI Analytics.” anodot. 2020.

    “DAMA Guide to the Data Management Body of Knowledge (DAMA-DMBOK Guide).” First Edition. DAMA International. 2009. Digital. April 2014.

    "Data Profiling: Underpinning Data Quality Management." Pitney Bowes. Pitney Bowes - Group 1 Software, 2007. Web. 18 Aug. 2015.

    Data.com. “Data.com Clean.” Salesforce. 2016. Web. 18 Aug. 2015.

    “Dawn of the CDO." Experian Data Quality. 2015. Web. 18 Aug. 2015.

    Demirkan, Haluk, and Bulent Dal. "Why Do So Many Analytics Projects Fail?" The Data Economy: Why Do so Many Analytics Projects Fail? Analytics Magazine. July-Aug. 2014. Web.

    Dignan, Larry. “CIOs juggling digital transformation pace, bad data, cloud lock-in and business alignment.” ZDNet. 11 March 2020. Accessed July.

    Dumbleton, Janani, and Derek Munro. "Global Data Quality Research - Discussion Paper 2015." Experian Data Quality. 2015. Web. 18 Aug. 2015.

    Eckerson, Wayne W. "Data Quality and the Bottom Line - Achieving Business Success through a Commitment to High Quality Data." The Data Warehouse Institute. 2002. Web. 18 Aug. 2015.

    “Infographic: Data Quality in BI the Costs and Benefits.” HaloBI. 2015 Web.

    Lee, Y.W. and Strong, D.M. “Knowing-Why About Data Processes and Data Quality.” Journal of Management Information Systems. 2004.

    “Making Data Quality a Way of Life.” Cognizant. 2014. Web. 18 Aug. 2015.

    "Merck Serono Achieves Single Source of Truth with Comprehensive RIM Solutions." www.productlifegroup.com. ProductLife Group. 15 Apr. 2015. Web. 23 Nov. 2015.

    Myers, Dan. “List of Conformed Dimensions of Data Quality.” Conformed Dimensions of Data Quality (CDDQ). 2019. Web.

    Redman, Thomas C. “Make the Case for Better Data Quality.” Harvard Business Review. 24 Aug. 2012. Web. 19 Aug. 2015.

    RingLead Data Management Solutions. “10 Stats About Data Quality I Bet You Didn’t Know.” RingLead. Accessed 7 July 2020.

    Schwartzrock, Todd. "Chrysler's Data Quality Management Case Study." Online video clip. YouTube. 21 April. 2011. Web. 18 Aug. 2015

    “Taking control in the digital age.” Experian Data Quality. Jan 2019. Web.

    “The data-driven organization, a transformation in progress.” Experian Data Quality. 2020. Web.

    "The Data Quality Benchmark Report." Experian Data Quality. Jan. 2015. Web. 18 Aug. 2015.

    “The state of data quality.” Experian Data Quality. Sept. 2013. Web. 17 Aug. 2015.

    Vincent, Lanny. “Differentiating Competence, Capability and Capacity.” Innovation Management Services. Web. June 2008.

    “7 ways poor data quality is costing your business.” Experian Data Quality. July 2020. Web.

    Design a Tabletop Exercise to Support Your Security Operation

    • Buy Link or Shortcode: {j2store}319|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $12,599 Average $ Saved
    • member rating average days saved: 5 Average Days Saved
    • Parent Category Name: Threat Intelligence & Incident Response
    • Parent Category Link: /threat-intelligence-incident-response
    • Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data.
    • Security incidents are inevitable, but how they are handled is critical.
    • The increasing use of sophisticated malware is making it difficult for organizations to identify the true intent behind the attack campaign.
    • The incident response is often handled in an ad hoc or ineffective manner.

    Our Advice

    Critical Insight

    • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and share information mutually with other organizations to stay ahead of incoming threats.
    • Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
    • You might experience a negative return on your security control investment. As technology in the industry evolves, threat actors will adopt new tools, tactics, and procedures; a tabletop exercise will help ensure teams are leveraging your security investment properly and providing relevant situational awareness to stay on top of the rapidly evolving threat landscape.

    Impact and Result

    Establish and design a tabletop exercise capability to support and test the efficiency of the core prevention, detection, analysis, and response functions that consist of an organization's threat intelligence, security operations, vulnerability management, and incident response functions.

    Design a Tabletop Exercise to Support Your Security Operation Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should design a tabletop exercise, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Plan

    Evaluate the need for a tabletop exercise.

    • Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

    2. Design

    Determine the topics, scope, objectives, and participant roles and responsibilities.

    • Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

    3. Develop

    Create briefings, guides, reports, and exercise injects.

    • Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop
    • Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

    4. Conduct

    Host the exercise in a conference or classroom setting.

    • Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

    5. Evaluate

    Plan to ensure measurement and continued improvement.

    • Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate
    [infographic]

    Mandate Data Valuation Before It’s Mandated

    • Buy Link or Shortcode: {j2store}121|cart{/j2store}
    • member rating overall impact: 8.0/10 Overall Impact
    • member rating average dollars saved: $25,000 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Data can be valuable if used properly or dangerous when mishandled.
    • The organization needs to understand the value of their data before they can establish proper data management practice.
    • Data is not considered a capital asset unless there is a financial transaction (e.g. buying or selling data assets).
    • Data valuation is not easy, and it costs money to collect, store, and maintain data.

    Our Advice

    Critical Insight

    • Data always outlives people, processes, and technology. They all come and go, while data remains.
    • Oil is a limited resource, data is not. Contrary to oil, data is likely to grow over time.
    • Data is likely to outlast all other current popular financial instruments including currency, assets, or commodities.
    • Data is used internally and externally and can easily be replicated or combined.
    • Data is beyond currency, assets, or commodities and needs to be a category of its own.

    Impact and Result

    • Every organization must calculate the value of their data. This will enable organizations to become truly data-driven.
    • Too much time has been spent arguing different methods of valuation. An organization must settle on valuation that is acceptable to all its stakeholders.
    • Align data governance and data management to data valuation. Often organizations struggle to justify data initiatives due to lack of visibility in data valuation.
    • Establish appropriate roles and responsibilities and ensure alignment to a common set of goals as a foundation to get the most accurate future data valuation for your organization.
    • Assess organization data assets and implementation roadmap that considers the necessary competencies and capabilities and their dependencies in moving towards the higher maturity of data assets.

    Mandate Data Valuation Before It’s Mandated Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to understand the value associated with the organization's data. Review Info-Tech’s methodology for assessing data value and justifying your data initiatives with a value proposition.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Demystify data valuation

    Understand the benefits of data valuation.

    • Mandate Data Valuation Before It’s Mandated – Phase 1: Demystify Data Valuation

    2. Data value chain

    Learn about the data value chain framework and preview the step-by-step guide to start collecting data sources.

    • Mandate Data Valuation Before It’s Mandated – Phase 2: Data Value Chain

    3. Data value assessment

    Mature your data valuation by putting in the valuation dimensions and metrics. Establish documented results that can be leveraged to demonstrate value in your data assets.

    • Mandate Data Valuation Before It’s Mandated – Phase 3: Data Value Assessment
    [infographic]

    Workshop: Mandate Data Valuation Before It’s Mandated

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Understand the Value of Data Valuation

    The Purpose

    Explain data valuation approach and value proposition.

    Key Benefits Achieved

    A clear understanding and case for data valuation.

    Activities

    1.1 Review common business data sources and how the organization will benefit from data valuation assessment.

    1.2 Understand Info-Tech’s data valuation framework.

    Outputs

    Organization data valuation priorities

    2 Capture Organization Data Value Chain

    The Purpose

    Capture data sources and data collection methods.

    Key Benefits Achieved

    A clear understanding of the data value chain.

    Activities

    2.1 Assess data sources and data collection methods.

    2.2 Understand key insights and value proposition.

    2.3 Capture data value chain.

    Outputs

    Data Valuation Tool

    3 Data Valuation Framework

    The Purpose

    Leverage the data valuation framework.

    Key Benefits Achieved

    Capture key data valuation dimensions and align with data value chain.

    Activities

    3.1 Introduce data valuation framework.

    3.2 Discuss key data valuation dimensions.

    3.3 Align data value dimension to data value chain.

    Outputs

    Data Valuation Tool

    4 Plan for Continuous Improvement

    The Purpose

    Improve organization’s data value.

    Key Benefits Achieved

    Continue to improve data value.

    Activities

    4.1 Capture data valuation metrics.

    4.2 Define data valuation for continuous monitoring.

    4.3 Create a communication plan.

    4.4 Define a plan for continuous improvements.

    Outputs

    Data valuation metrics

    Data Valuation Communication Plan

    Refine Your Estimation Practices With Top-Down Allocations

    • Buy Link or Shortcode: {j2store}434|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $12,599 Average $ Saved
    • member rating average days saved: 20 Average Days Saved
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • As a portfolio manager, you’re expected to size projects for approval and intake before they have sufficient definition.
    • The consequences of initial sizing are felt throughout the project lifecycle.

    Our Advice

    Critical Insight

    • Your organization lacks strong organizational memory upon which assumptions and estimates can be made.
    • Definition is at a minimum not validated, untested, and is likely incomplete. It has the potential to be dangerously misleading.

    Impact and Result

    • Build project history and make more educated estimates – Projects usually start with a “ROM” or t-shirt size estimate, but if your estimates are consistently off, then it’s time to shift the scale.
    • Plan ahead – Projects face risks; similar projects face similar risks. Provide sponsors with estimates that account for as many risks as possible, so that if something goes wrong you have a plan to make it right.
    • Store and strengthen organizational memory – Each project is rich with lessons that can inform your next project to make it more effective and efficient, and ultimately help to avoid committing the same failures over and over again. Develop a process to catalogue project history and all of the failures and successes associated with those projects.

    Refine Your Estimation Practices With Top-Down Allocations Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should improve your estimation practices, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build organizational memory to inform early estimates

    Analyze your project history to identify and fill gaps in your estimation practices.

    • Refine Your Estimation Practices With Top-Down Allocations – Phase 1: Build Organizational Memory to Inform Early Estimations
    • PMO Organizational Memory Tool
    • T-Shirt Sizing Health Check Lite
    • Project Estimation Playbook

    2. Develop and refine a reliable estimate with top-down allocations

    Allocate time across project phases to validate and refine estimates and estimate assumptions.

    • Refine Your Estimation Practices With Top-Down Allocations – Phase 2: Develop and Refine a Reliable Estimate With Top-Down Allocations
    • Planning-Level Estimate Calculator

    3. Implement a new estimation process

    Implement a lessons learned process to provide transparency to your sponsors and confidence to your teams.

    • Refine Your Estimation Practices With Top-Down Allocations – Phase 3: Implement a New Estimation Process
    • Project Lessons Learned Template
    [infographic]

    Workshop: Refine Your Estimation Practices With Top-Down Allocations

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Develop the Foundations of Organizational Memory

    The Purpose

    Track key performance indicators on past projects to inform goals for future projects.

    Key Benefits Achieved

    Developed Project History List.

    Refined starting estimates that can be adjusted accurately from project to project.

    Activities

    1.1 Build project history.

    1.2 Analyze estimation capabilities.

    1.3 Identify estimation goals.

    Outputs

    Project History List

    T-Shirt Sizing Health Check

    Estimate Tracking Plan

    2 Define a Requirements Gathering Process

    The Purpose

    Outline the common attributes required to complete projects.

    Identify the commonly forgotten attributes to ensure comprehensive scoping early on.

    Key Benefits Achieved

    Refined initial estimate based on high-level insights into work required and resources available.

    Activities

    2.1 Develop a list of in-scope project attributes.

    2.2 Identify leadership priorities for deliverables and attributes.

    2.3 Track team and skill responsibilities for attributes.

    Outputs

    Identified list or store of past project attributes and costs

    Attribute List and Estimated Cost

    Required Skills List

    3 Build an Estimation Process

    The Purpose

    Set clear processes for tracking the health of your estimate to ensure it is always as accurate as possible.

    Define check-in points to evaluate risks and challenges to the project and identify trigger conditions.

    Key Benefits Achieved

    An estimation process rooted in organizational memory and lessons learned.

    Project estimates that are consistently reevaluated to predict and correct challenges before they can drastically affect your projects.

    Activities

    3.1 Determine Milestone Check-In Points.

    3.2 Develop Lessons Learned Meeting Agendas.

    3.3 Identify common risks and past lessons learned.

    3.4 Develop contingency tracking capabilities.

    Outputs

    Project Lessons Learned Template

    Historic Risks and Lessons Learned Master Template

    Contingency Reserve and Risk Registers

    4 Improve Business Alignment With Your Estimation Plan

    The Purpose

    Bridge the gap between death march projects and bloated and uncertain estimates by communicating expectations and assumptions clearly to your sponsors.

    Key Benefits Achieved

    Clear estimation criteria and assumptions aligned with business priorities.

    Post-mortem discussion items crucial to improving project history knowledge for next time.

    Activities

    4.1 Identify leadership risk priorities.

    4.2 Develop IT business alignment.

    4.3 Develop hand-off procedures and milestone approval methods.

    4.4 Create a list of post-mortem priorities.

    Outputs

    Estimation Quotation

    Risk Priority Rankings

    Hand-Off Procedures

    Post-mortem agenda planning

    Drive Business Value With Off-the-Shelf AI

    • Buy Link or Shortcode: {j2store}205|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Business Intelligence Strategy
    • Parent Category Link: /business-intelligence-strategy
    • Understanding the impact of the machine learning/AI component that is built into most of the enterprise products and tools and its role in the implementation of the solution.
    • Understanding the most important aspects that the organization needs to consider while planning the implementation of the AI-powered product.

    Our Advice

    Critical Insight

    • Organizations are faced with multiple challenges trying to adopt AI solutions. Challenges include data issues, ethics and compliance considerations, business process challenges, and misaligned leadership goals.
    • When choosing the right product to meet business needs, organizations need to know what questions to ask vendors to ensure they fully understand the implications of buying an AI/ML product.
    • To guarantee the success of your off-the-shelf AI implementation and ensure it delivers value, you must start with a clear definition of the business case and an understanding of your data.

    Impact and Result

    To guarantee success of the off-the-shelf AI implementation and deliver value, in addition to formulating a clear definition of the business case and understanding of data, organizations should also:

    • Know what questions to ask vendors while evaluating AI-powered products.
    • Measure the impact of the project on business and IT processes.

    Drive Business Value With Off-the-Shelf AI Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Drive Business Value With Off-the-Shelf AI Deck – A step-by-step approach that will help guarantee the success of your Off-the-Shelf AI implementation and ensure it delivers business value

    Use this practical and actionable framework that will guide you through the planning of your Off-the-Shelf AI product implementation.

    • Drive Business Value With Off-the-Shelf AI Storyboard

    2. Off-the-Shelf AI Analysis – A tool that will guide the analysis and planning of the implementation

    Use this analysis tool to ensure the success of the implementation.

    • Off-the-Shelf AI Analysis

    Infographic

    Further reading

    Drive Business Value With Off-the-Shelf AI

    A practical guide to ensure return on your Off-the-Shelf AI investment

    Executive Summary

    Your Challenge
    • Understanding the impact of the machine learning/AI component that is built into most of the enterprise products and tools and its role in the implementation of the solution.
    • What are the most important aspects that organizations needs to consider while planning the implementation of the AI-powered product?
    Common Obstacles
    • Organizations are faced with multiple challenges trying to adopt an AI solution. Challenges include data issues, ethics and compliance considerations, business process challenges, and misaligned leadership goals.
    • When choosing the right product to meet business needs, organizations need to know what questions to ask vendors to ensure they fully understand the implications of buying an AI/ML product.
    Info-Tech’s Approach

    Info-Tech’s approach includes a framework that will guide organizations through the process of the Off-the-Shelf AI product selection.

    To guarantee success of the Off-the-Shelf AI implementation and deliver value, organization should start with clear definition of the business case and an understanding of data.

    Other steps include:

    • Knowing what questions to ask vendors to evaluate AI-powered products.
    • Measuring the impact of the project on your business and IT processes.
    • Assessing impact on the organization and ensure team readiness.

    Info-Tech Insight

    To guarantee the success of your Off-the-Shelf AI implementation and ensure it delivers value, you must start with a clear definition of the business case and an understanding of your data.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Getting value out of AI and machine learning investments

    92.1%

    of companies say they are achieving returns on their data and AI investments

    91.7%

    said they were increasing investments in data and AI

    26.0%

    of companies have AI systems in widespread production
    However, CIO Magazine identified nine main hurdles to AI adoption based on the survey results:
    • Data issues
    • Business process challenges
    • Implementation challenges and skill shortages
    • Costs of tools and development
    • Misaligned leadership goals
    • Measuring and proving business value
    • Legal and regulatory risks
    • Cybersecurity
    • Ethics
    • (Source: CIO, 2019)
    “Data and AI initiatives are becoming well established, investments are paying off, and companies are getting more economic value from AI.” (Source: NewVantage, 2022.)

    67% of companies are currently using machine learning, and 97% are using or planning to use it in the next year.” (Source: Deloitte, 2020)

    AI vs. ML

    Machine learning systems learn from experience and without explicit instructions. They learn patterns from data then analyze and make predictions based on past behavior and the patterns learned.

    Artificial intelligence is a combination of technologies and can include machine learning. AI systems perform tasks mimicking human intelligence such as learning from experience and problem solving. Most importantly, AI is making its own decisions without human intervention.

    The AI system can make assumptions, test these assumptions, and learn from the results.

    (Level of decision making required increases from left to right)
    Statistical Reasoning
    Infer relationships between variables

    Statistical models are designed to find relationships between variables and the significance of those relationships.

    Machine Learning:
    Making accurate predictions

    Machine learning is a subset of AI that discovers patterns from data without being explicitly programmed to do so.

    Artificial Intelligence
    Dynamic adaptation to novelty

    AI systems choose the optimal combination of methods to solve a problem. They make assumptions, reassess the model, and reevaluate the data.

    “Machine learning is the study of computer algorithms that improve automatically through experience.” (Tom Mitchell, 1997)

    “At its simplest form, artificial intelligence is a field, which combines computer science and robust datasets, to enable problem-solving.” (IBM, “What is artificial intelligence?”)

    Types of Off-the-Shelf AI products and solutions

    ML/AI-Powered Products Off-the-Shelf Pre-built and Pre-trained AI/ML Models
    • AI/ML capabilities built into the product and might require training as part of the implementation.
    • Off-the-Shelf ML/AI Models, pre-built, pre-trained, and pre-optimized for a particular task. For example, language models or image recognition models that can be used to speed up and simplify ML/AI systems development.
    Examples of OTS tools/products: Examples of OTS models:

    The data inputs for these models are defined, the developer has to conform to the provided schema, and the data outputs are usually fixed due to the particular task the OTS model is built to solve.

    Insight summary

    Overarching insight:

    To guarantee the success of your Off-the-Shelf AI implementation and ensure it delivers value, you must start with a clear definition of the business case and an understanding of your data.

    Business Goals

    Question the value that AI adds to the tool you are evaluating. Don’t go after the tool simply because it has an AI label attached to it. AI/ML capabilities might add little value but increase implementation complexity. Define the problem you are solving and document business requirements for the tool or a model.

    Data

    Know your data. Determine data requirements to:

    • Train the model during the implementation and development.
    • Run the model in production.

    People/Skills

    Define the skills required for the implementation and assemble the team that will support the project from requirements to deployment and support, through its entire lifecycle. Don’t forget about production support and maintenance.

    Choosing an AI-Powered Tool

    No need to reinvent the wheel and build a product you can buy, but be prepared to work around tool limitations, and make sure you understand the data and the model the tool is built on.

    Choosing an AI/ML Model

    Using Off-the-Shelf-AI models enables an agile approach to system development. Faster POC and validation of ideas and approaches, but the model might not be customizable for your requirements.

    Guaranteeing Off-the-Shelf AI Implementation Success

    Info-Tech Insight

    To guarantee the success of your Off-the-Shelf AI implementation and ensure it delivers value, you must start with a clear definition of the business case and an understanding of your data.

    Why do you need AI in your toolset?
    Business Goals

    Clearly defined problem statement and business requirements for the tool or a model will help you select the right solution that will deliver business value even if it does not have all the latest bells and whistles.

    Small chevron pointing right.
    Do you know the data required for implementation?
    Data

    Expected business outcome defines data requirements for implementation. Do you have the right data required to train and run the model?

    Large chevron pointing right.
    Is your organization ready for AI?
    People/Team/ Skills

    New skills and expertise are required through all phases of the implementation: design, build, deployment, support, and maintenance, as well as post-production support, scaling, and adoption.

    Data Architecture/ Infrastructure

    New tool or model will impact your cloud and integration strategy. It will have to integrate with the existing infrastructure, in the cloud or on prem.

    Large chevron pointing right.
    What questions do you need to ask when choosing the solution?
    Product/ Tool or Model Selection

    Do you know what model powers the AI tool? What data was used to train the tool and what data is required to run it? Ask the right questions.

    Small chevron pointing right.
    Are you measuring impact on your processes?
    Business and IT Processes

    Business processes need to be defined or updated to incorporate the output of the tool back into the business processes to deliver value.

    IT governance and support processes need to accommodate the new AI-powered tool.

    Small chevron pointing right.
    Realize and measure business value of your AI investment
    Value

    Do you have a clear understanding of the value that AI will bring to your organization?Optimization?Increased revenue?Operational efficiency?

    Introduction of Off-the-Shelf AI Requires a Strategic Approach

    Business Goals and Value Data People/Team/ Skills Infrastructure Business and IT Processes
    AI/ML–powered tools
    • Define a business problem that can be solved with either an AI-powered tool or an AI/ML pre-built model that will become part of the solution.
    • Define expectations and assumptions around the value that AI can bring.
    • Document business requirements for the tool or model.
    • Define the scope for a prototype or POC.
    • Define data requirements.
    • Define data required for implementation.
    • Determine if the required data can be acquired or captured/generated.
    • Document internal and external sources of data.
    • Validate data quality (define requirements and criteria for data quality).
    • Define where and how the data is stored and will be stored. Does it have to be moved or consolidated?
    • Define all stakeholders involved in the implementation and support.
    • Define skills and expertise required through all phases of the implementation: design, build, deployment, support, and maintenance.
    • Define skills and expertise required to grow AI practice and achieve the next level of adoption, scaling, and development of the tool or model POC.
    • Define infrastructure requirements for either Cloud, Software-as-a-Service, or on-prem deployment of a tool or model.
    • Define how the tool is integrated with existing systems and into existing infrastructure.
    • Determine the cost to deploy and run the tool/model.
    • Define processes that need to be updated to accommodate new functionality.
    • Define how the outcome of the tool or a model (e.g. predictions) are incorporated back into the business processes.
    • Define new business and IT processes that need to be defined around the tool (e.g. chatbot maintenance; analysis of the data generated by the tool).
    Off-the-shelf AI/ML pre-built models
    • Define the business metrics and KPIs to measure success of the implementation against.
    • Determine if there are requirements for a specific data format required for the tool or a model.
    • Determine if there is a need to classify/label the data (supervised learning).
    • Define privacy and security requirements.
    • Define requirements for employee training. This can be vendor training for a tool or platform training in the case of a pre-built model or service.
    • Define if ML/AI expertise is required.
    • Is the organization ready for ML/AI? Conduct an AI literacy survey and understand team’s concerns, fears, and misconceptions and address them.
    • Define requirements for:
      • Data migration.
      • Security.
      • AI/ML pipeline deployment and maintenance.
    • Define requirements for operation and maintenance of the tool or model.
    • Confirm infrastructure readiness.
    • How AI and its output will be used across the organization.

    Define Business Goals and Objectives

    Why do you need AI in your toolset? What value will AI deliver? Have a clear understanding of business benefits and the value AI delivers through the tool.

    • Define a business problem that can be solved with either an AI-powered tool or AI/ML pre-built model.
    • Define expectations and assumptions around the value that AI can bring.
    • Document business requirements for a tool or model.
    • Start with the POC or a prototype to test assumptions, architecture, and components of the solution.
    • Define business metrics and KPIs to measure success of the implementation.

    Info-Tech Insight

    Question the value that AI adds to the tool you are evaluating. Don’t go after the tool simply because it has an AI label attached to it. AI/ML capabilities might add little value but increase implementation complexity. Define the problem you are solving and document business requirements for the tool or a model.

    Venn diagram of 'Applied Artificial Intelligence (AAI)' with a larger circle at the top, 'Machine Learning (ML)', and three smaller ovals intersecting, 'Computer Vision', 'Natural Language Processing (NLP)', and 'Robotic Process Automation (RPA)'.

    AAI solutions and technologies are helping organizations make faster decisions and predict future outcomes such as:

    • Business process automation
    • Intelligent integration
    • Intelligent insights
    • Operational efficiency improvement
    • Increase revenue
    • Improvement of existing products and services
    • Product and process innovation

    1. Use Info-Tech’s Off-the-Shelf AI Analysis Tool to define business drivers and document business requirements

    2-3 hours
    Screenshot of the Off-the-Shelf AI Analysis Tool's Business Drivers tab, a table with columns 'AI/ML Tool or Model', 'Use Case', 'Business problem / goal for AI/ML use case', 'Description', 'Business Owner (Primary Stakeholder)', 'Priority', 'Stakeholder Groups Impacted', 'Requirements Defined? Yes/No', 'Related Data Domains', and 'KPIs'. Use the Business Drivers tab to document:
    • Business objectives of the initiative that might drive the AI/ML use case.
    • The business owner or primary stakeholder who will help to define business value and requirements.
    • All stakeholders who will be involved or impacted.
    • KPIs that will be used to assess the success of the POC.
    • Data required for the implementation.
    • Use the Business Requirements tab to document high-level requirements for a tool or model.
    • These requirements will be used while defining criteria for a tool selection and to validate if the tool or model meets your business goals.
    • You can use either traditional BRD format or a user story to document requirements.
    Screenshot of the Off-the-Shelf AI Analysis Tool's Business Requirements tab, a table with columns 'Requirement ID', 'Requirement Description / user story', 'Requirement Category', 'Stakeholder / User Role', 'Requirement Priority', and 'Complexity (point estimates)'.

    Download the Off-the-Shelf AI Analysis Tool

    1. Define business drivers and document business requirements

    Input

    • Strategic plan of the organization
    • Data strategy that defines target data capabilities required to support enterprise strategic goals
    • Roadmap of business and data initiatives to support target state of data capabilities

    Output

    • Prioritized list of business use cases where an AI-powered tool or AI/ML can deliver business value
    • List of high-level requirements for the selected use case

    Materials

    • Whiteboard/Flip Charts
    • Off-the-Shelf-AI Analysis Tool, “Business Drivers” and “Business Requirements” tabs

    Participants

    • CIO
    • Senior business and IT stakeholders
    • Data owner(s)
    • Data steward(s)
    • Enterprise Architect
    • Data Architect
    • Data scientist/Data analyst

    Understand data required for implementation

    Do you have the right data to implement and run the AI-powered tool or AI/ML model?

    Info-Tech Insight

    Know your data. Determine data requirements to:

    • Train the model during the implementation and development, and
    • Run the model in production
    AvailabilityArrow pointing rightQualityArrow pointing rightPreparationArrow pointing rightBias, Privacy, SecurityArrow pointing rightData Architecture
    • Define what data is required for implementation, e.g. customer data, financial data, product sentiment.
    • If the data is not available, can it be acquired, gathered, or generated?
    • Define the volume of data required for implementation and production.
    • If the model has to be trained, do you have the data required for training (e.g. dictionary of terms)? Can it be created, gathered, or acquired?
    • Document internal and external sources of data.
    • Evaluate data quality for all data sources based on the requirements and criteria defined in the previous step.
    • For datasets with data quality issues, determine if the data issues can be resolved (e.g. missing values are inferred). If not, can this issue be resolved by using other data sources?
    • Engage a Data Governance organization to address any data quality concerns.
    • Determine if there are requirements for a specific data format required for the tool or model.
    • Determine if there is a need to classify/label or tag the data. What are the metadata requirements?
    • Define whether or not the implementation team needs to aggregate or transform the data before it can be used.
    • Define privacy requirements, as these might affect the availability of the data for ML/AI.
    • Define data bias concerns and considerations. Do you have datasheets for datasets that will be used in this project? What datasets cannot be used to prevent bias?
    • What are the security requirements and how will they affect data storage, product selection, and infrastructure requirements for the tool and overall solution?
    • Define where and how the data is currently stored and will be stored.
    • Does it have to be migrated or consolidated? Does it have to be moved to the cloud or between systems?
    • Is a data lake or data warehouse a requirement for this implementation as defined by the solution architecture?

    2. Use Info-Tech’s Off-the-Shelf AI Analysis Tool to document data requirements

    2-3 hours

    Use the Data tab to document the following for each data source or dataset:
    • Data Domain – e.g. Customer data
    • Data Concept – e.g. Customer
    • Data Internally Accessible – Identify datasets that are required for the implementation even if the data might not be available internally. Work on determining if the data ca be acquired externally or collected internally.
    • Source System – define the primary source system for the data, e.g. Salesforce
    • Target System (if applicable) – Define if the data needs to be migrated/transferred. For example, you might use a datalake or data warehouse for the AI/ML solution or migrate data to the cloud.
    • Classification/Taxonomy/Ontology
    • Data Steward
    • Data Owner
    • Data Quality – Data quality indicator
    • Refresh Rate – Frequency of data refresh. Indicate if the data can be accessed in real time or near-real time

    Screenshot of the Off-the-Shelf AI Analysis Tool's Data tab, a spreadsheet table with the columns listed to the left and below.
    • Retention – Retention policy requirements
    • Compliance Requirements – Define if data has to comply with any of the regulatory requirements, e.g. GDPR
    • Privacy, Bias, and Ethics Considerations – Privacy Act, PIPEDA, etc. Identify if the dataset contains sensitive information that should be excluded from the model, such as gender, age, race etc. Indicate fairness metrics, if applicable.

    Download the Off-the-Shelf AI Analysis Tool

    2. Document data requirements

    Input

    • Documented business use cases from Step 1.
    • High-level business requirements from Step 1.
    • Data catalog, data dictionaries, business glossary
    • Data flows and data architecture

    Output

    • High-level data requirements
    • List of data sources and datasets that can be used for the implementation
    • Datasets that need to be collected or acquired externally

    Materials

    • Whiteboard/Flip Charts
    • Off-the-Shelf AI Analysis Tool, “Data” tab

    Participants

    • CIO
    • Business and IT stakeholders
    • Data owner(s)
    • Data steward(s)
    • Enterprise Architect
    • Data Architect
    • Data scientist/Data analyst

    Is Your Organization Ready for AI?

    Assess organizational readiness and define stakeholders impacted by the implementation. Build the team with the right skillset to drive the solution.

    • Implementation of the AI/ML-powered Off-the-Shelf Tool or an AI/ML model will require a team with a combination of skills through all phases of the project, from design of the solution to build, production, deployment, and support.
    • Document the skillsets required and determine the skills gap. Before you start hiring, depending on the role, you might find talent within the organization to join the implementation team with little to no training.
    • AI/ML resources that may be needed on your team driving AI implementation (you might consider bringing part-time resources to fill the gaps or use vendor developers) are:
      • Data Scientist
      • Machine Learning Engineer
      • Data Engineer
      • Data Architect
      • AI/ML Ops engineer
    • Define training requirements. Consider vendor training for a tool or platform.
    • Plan for future scaling and the growing of the solution and AI practice. Assess the need to apply AI in other business areas. Work with the team to analyze use cases and prioritize AI initiatives. As the practice grows, grow your team expertise.
    • Identify the stakeholders who will be affected by the AI implementation.
    • Work with them to understand and address any concerns, fears, or misconceptions around the role of AI and the consequences of bringing AI into the organization.
    • Develop a communication and change management plan to educate everyone within the organization on the application and benefits of using AI and machine learning.

    Info-Tech Insight:

    Define the skills required for the implementation and assemble the team that will support the project through its entire lifecycle. Don’t forget about production, support, and maintenance.

    3. Build your implementation team

    1-2 hours

    Input: Solution conceptual design, Current resource availability

    Output: Roles required for the implementation of the solution, Resources gap analysis, Training and hiring plan

    Materials: Whiteboard/Flip charts, Off-the-Shelf AI Analysis Tool, “People and Team” tab

    Participants: Project lead, HR, Enterprise Architect

    1. Review your solution conceptual design and define implementation team roles.
    2. Document requirements for each role.
    3. Review current org chart and job descriptions and identify skillset gaps. Draft an action plan to fill in the roles.
    4. Use Info-Tech’s Off-the-Shelf AI Analysis Tool's People and Team tab to document team roles for the entire implementation, including design, build/implement, deployment, support and maintenance, and future development.

    Screenshot of the Off-the-Shelf AI Analysis Tool's People and Team tab, a table with columns 'Design', 'Implement', 'Deployment', 'Support and Maintenance', and 'Future Development'.

    Download the Off-the-Shelf AI Analysis Tool

    Cloud, SaaS or On Prem – what are my options and what is the impact?

    Depending on the architecture of the solution, define the impact on the current infrastructure, including system integration, AI/ML pipeline deployment, maintenance, and data storage

    • Data Architecture: use the current data architecture to design the architecture for an AI-powered solution. Assess changes to the data architecture with the introduction of a new tool to make sure it is scalable enough to support the change.
    • Define infrastructure requirements for either Cloud, Software-as-a-Service, or on-prem deployment of a tool or model.
    • Define how the tool will be integrated with existing systems and into existing infrastructure.
    • Define requirements for:
      • Data migration and data storage
      • Security
      • AI/ML pipeline deployment, production monitoring, and maintenance
    • Define requirements for operation and maintenance of the tool or model.
    • Work with your infrastructure architect and vendor to determine the cost of deploying and running the tool/model.
    • Make a decision on the preferred architecture of the system and confirm infrastructure readiness.

    Download the Create an Architecture for AI blueprint

    4. Use Info-Tech’s Off-the-Shelf AI Analysis Tool to document infrastructure decisions

    2-3 hours

    Input: Solution conceptual design

    Output: Infrastructure requirements, Infrastructure readiness assessment

    Materials: Whiteboard/Flip charts, Off-the-Shelf AI Analysis Tool, “Infrastructure” tab

    Participants: Infrastructure Architect, Solution Architect, Enterprise Architect, Data Architect, ML/AI Ops Engineer

    1. Work with Infrastructure, Data, Solution, and Enterprise Architects to define your conceptual solution architecture.
    2. Define integration and storage requirements.
    3. Document security requirements for the solution in general and the data specifically.
    4. Define MLOps requirements and tools required for ML/AI pipeline deployment and production monitoring.
    5. Use Info-Tech’s Off-the-Shelf AI Analysis Tool's Infrastructure tab to document requirements and decisions around Data and Infrastructure Architecture.

    Screenshot of the Off-the-Shelf AI Analysis Tool's Infrastructure tab, a table with columns 'Cloud, SaaS or On-Prem', 'Data Migration Requirements', 'Data Storage Requirements', 'Security Requirements', 'Integrations Required', and 'AI/ML Pipeline Deployment and Maintenance Requirements'.

    Download the Off-the-Shelf AI Analysis Tool

    What questions do you need to ask vendors when choosing the solution?

    Take advantage of Info-Tech’s Rapid Application Selection Framework (RASF) to guide tool selection, but ask vendors the right questions to understand implications of having AI/ML built into the tool or a model

    Data Model Implementation and Integration Deployment Security and Compliance
    • What data (attributes) were used to train the model?
    • Do you have datasheets for the data used?
    • How was data bias mitigated?
    • What are the data labeling/classification requirements for training the model?
    • What data is required for production? E.g. volume; type of data, etc.
    • Were there any open-source libraries used in the model? If yes, how were vulnerabilities and security concerns addressed?
    • What algorithms are implemented in the tool/model?
    • Can model parameters be configured?
    • What is model accuracy?
    • Level of customization required for the implementation to meet our requirements.
    • Does the model require training? If yes, can you provide details? Can you estimate the effort required?
    • Integration capabilities and requirements.
    • Data migration requirements for tool operation and development.
    • Administrator console – is this functionality available?
    • Implementation timeframe.
    • Is the model or tool deployable on premises or in the cloud? Do you support hybrid cloud and multi-cloud deployment?
    • What cloud platforms are your product/model integrated with (AWS, Azure, GCP)?
    • What are the infrastructure requirements?
    • Is the model containerized/ scalable?
    • What product support and product updates are available?
    • Regulatory compliance (GDPR, PIPEDA, HIPAA, PCI DSS, CCPA, SOX, etc.)?
    • How are data security risks addressed?

    Use Info-Tech’s Off-the-Shelf AI Analysis Tool, “Vendor Questionnaire” tab to track vendor responses to these questions.

    Are you measuring impact on your processes?

    Make sure that you understand the impact of the new technology on the existing business and IT processes.

    And make sure your business processes are ready to take advantage of the benefits and new capabilities enabled by AI/ML.

    Process automation, optimization, and improvement enabled by the technology and AI/ML-powered tools allow organizations to reduce manual work, streamline existing business processes, improve customer satisfaction, and get critical insights to assist decision making.

    To take full advantage of the benefits and new capabilities enabled by the technology, make sure that business and IT processes reflect these changes:

    • Processes that need to be updated.
    • How the outcome of the tool or a model (e.g. predictions) is incorporated into the existing business processes and the processes that will monitor the accuracy of the outcome and monitor performance of the tool or model.
    • New business and IT processes that need to be defined for the tool (e.g. chatbot maintenance, analysis of the data generated by the tool, etc.).

    5. Document the Impact on Business and IT Processes

    2-3 hours

    Input: Solution design, Existing business and IT processes

    Output: Documented updates to the existing processes, Documented new business and IT processes

    Materials: Whiteboard/Flip charts, Off-the-Shelf AI Analysis Tool, “Business and IT Processes” tab

    Participants: Project lead, Business stakeholders, Business analyst

    1. Review current business processes affected by the implementation of the AI/ML- powered tool or model. Define the changes that need to be made. The changes might include simplification of the process due to automation of some of the steps. Some processes will need to be redesigned and some processes might become obsolete.
    2. Document high-level steps for any new processes that need to be defined around the AI/ML-powered tool. An example of such a process would be defining new IT and business processes to support a new chatbot.
    3. Use Info-Tech’s Off-the-Shelf AI Analysis Tool's Business and IT Processes tab, to document process changes.

    Screenshot of the Off-the-Shelf AI Analysis Tool's Business and IT Processes tab, a table with columns 'Existing business process affected', 'New business process', 'Stakeholders involved', 'Changes to be made', and 'New Process High-Level Steps'.

    Download the Off-the-Shelf AI Analysis Tool

    AI-powered Tools – Considerations

    PROS:
    • Enhanced functionality, allows the power of AI without specialized skills (e.g., Mathematica – recognizing patterns in data).
    • Might be a cheaper option compared to building a solution in-house (chatbot, for ex.).

    Info-Tech Insight:

    No need to reinvent the wheel and build the product you can buy, but be prepared to work around tool limitations, and make sure you understand the data and the model the tool is built on.

    CONS:
    • Dependency on the service provider.
    • The tool might not meet all the business requirements without customization.
    • Bias can be built into the tool:
      • Work with the vendor to understand what data was used to train the model.
      • From the perspective of ethics and bias, learn what model is implemented in the tool and what data attributes the model uses.

    Pre-built/pre-trained models – what to keep in mind when choosing

    PROS:
    • Lower cost and less time to development compared to creating and training models from scratch (e.g. using image recognition models or pre-trained language models like BERT).
    • If the pre-trained and optimized model perfectly fits your needs, the model accuracy might be high and sufficient for your scenario.
    • Off-the-Shelf AI models are useful for creating prototypes or POCs, for testing a hypothesis, and for validating ideas and requirements.
    • Usage of Off-the-Shelf models shortens the development cycle and reduces investment risks.
    • Language models are particularly useful if you don’t have data to train your own model (a “small data” scenario).
    • Infrastructure and model training cost reduction.
    CONS:
    • Might be a challenge to deploy and maintain the system in production.
    • Lack of flexibility: you might not be able to configure input or output parameters to your requirements. For example, a pre-built sentiment analysis model might return four values (“positive,” “negative,” “neutral,” and “mixed”), but your solution will require only two or three values.
    • Might be a challenge to comply with security and privacy requirements.
    • Compliance with privacy and fairness requirements and considerations: what data was used to pretrain the model?
    • If open-source libraries were used to create the model, how will vulnerabilities, risks, and security concerns be addressed?

    Info-Tech Insight:

    Using Off-the-Shelf AI models enables an agile approach to system development – faster POC and validation of ideas and approaches, but the model might not be customizable for your requirements.

    Metrics

    Metrics and KPIs for this project will depend on the business goals and objectives that you will identify in Step 1 of the tool selection process.

    Metrics might include:

    • Reduction of time spent on a specific business process. If the tool is used to automate certain steps of a business process, this metric will measure how much time was saved, in minutes/hours, compared to the process time before the introduction of the tool.
    • Accuracy of prediction. This metric would measure the accuracy of estimations or predictions compared to the same estimations done before the implementation of the tool. It can be measured by generating the same prediction or estimation using the AI-powered tool or using any methods used before the introduction of the tool and comparing the results.
    • Accuracy of the search results. If the AI-powered tool is a search engine, compare a) how much time it would take a user to find an article or a piece of content they were searching for using new tool vs. previous techniques, b) how many steps it took the user to locate the required article in the search results, and c) the location of the correct piece of content in the search result list (at the top of the search result list or on the tenth page).
    • Time spent on manual tasks and activities. This metric will measure how much time, in minutes/hours, is spent by the employees or users on manual tasks if the tool automates some of these tasks.
    • Reduction of business process steps (if the steps are being automated). To derive this metric, create a map of the business process before the introduction of the AI-powered tool and after, and determine if the tool helped to simplify the process by reducing the number of process steps.

    Bibliography

    Adryan, Boris. “Is it all machine learning?” Badryan, Oct. 20, 2015. Accessed Feb. 2022.

    “AI-Powered Data Management Platform.” Informatica, N.d. Accessed Feb 2022.

    Amazon Rekognition. “Automate your image and video analysis with machine learning.” AWS. N.d. Accessed Feb 2022.

    “Artificial Intelligence (AI).” IBM Cloud Education, 3 June 2020. Accessed Feb 2022.

    “Artificial intelligence (AI) vs machine learning (ML).” Microsoft Azure Documentation. Accessed Feb. 2022.

    “Avante Garde in the Realm of AI” SearchUnify Cognitive Platform. Accessed Feb 2022.

    “Azure Cognitive Services.” Microsoft. N.d. Accessed Feb 2022.

    “Becoming an AI-fueled organization. State of AI in the enterprise, 4th edition,” Deloitte, 2020. Accessed Feb. 2022.

    “Coveo Predictive Search.” Coveo, N.d. Accessed Feb 2022.

    ”Data and AI Leadership. Executive Survey 2022. Executive Summary of Findings.” NewVantage Partners. Accessed Feb 2022.

    “Einstein Discovery in Tableau.” Tableau, N.d. Accessed Feb 2022.

    Korolov, Maria. “9 biggest hurdles to AI adoption.” CIO, Feb 26, 2019. Accessed Feb 2022.

    Meel, Vidushi. “What Is Deep Learning? An Easy to Understand Guide.” visio.ai. Accessed Feb. 2022.

    Mitchell, Tom. “Machine Learning,” McGraw Hill, 1997.

    Stewart, Matthew. “The Actual Difference Between Statistics and Machine Learning.” Towards Data Science, Mar 24, 2019. Accessed Feb 2022.

    “Sentiment analysis with Cognitive Services.” Microsoft Azure Documentation. Accessed February 2022.

    “Three Principles for Designing ML-Powered Products.” Spotify Blog. Oct 2019, Accessed Feb 2022.

    “Video Intelligence API.” Google Cloud Platform. N.d. Accessed Feb 2022

    Lead Staff through Change

    • Buy Link or Shortcode: {j2store}510|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: High Impact Leadership
    • Parent Category Link: /lead
    • Sixty to ninety percent of change initiatives fail, costing organizations dollars off the bottom line and lost productivity.
    • Seventy percent of change initiatives fail because of people-related issues, which place a major burden on managers to drive change initiatives successfully.
    • Managers are often too busy focusing on the process elements of change; as a result, they neglect major opportunities to leverage and mitigate staff behaviors that affect the entire team.

    Our Advice

    Critical Insight

    • Change is costly, but failed change is extremely costly. Managing change right the first time is worth the time and effort.
    • Staff pose the biggest opportunity and risk when implementing a change – managers must focus on their teams in order to maintain positive change momentum.
    • Large and small changes require the same change process to be followed but at different scales.
    • The size of a change must be measured according to the level of impact the change will have on staff, not how executives and managers perceive the change.
    • To effectively lead their staff through change, managers must anticipate staff reaction to change, develop a communication plan, introduce the change well, help their staff let go of old behaviors while learning new ones, and motivate their staff to adopt the change.

    Impact and Result

    • Anticipate and respond to staff questions about the change in order to keep messages consistent, organized, and clear.
    • Manage staff based on their specific concerns and change personas to get the best out of your team during the transition through change.
    • Maintain a feedback loop between staff, executives, and other departments in order to maintain the change momentum and reduce angst throughout the process.

    Lead Staff through Change Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Learn how to manage people throughout the change process

    Set up a successful change adoption.

    • Storyboard: Lead Staff through Change

    2. Learn the intricacies of the change personas

    Correctly identify which persona most closely resembles individual staff members.

    • None

    3. Assess the impact of change on staff

    Ensure enough time and effort is allocated in advance to people change management.

    • Change Impact Assessment Tool

    4. Organize change communications messages for a small change

    Ensure consistency and clarity in change messages to staff.

    • Basic Business Change Communication Worksheet

    5. Organize change communications messages for a large change

    Ensure consistency and clarity in change messages to staff.

    • Advanced Business Change Description Form

    6. Evaluate leadership of the change process with the team

    Improve people change management for future change initiatives.

    • Change Debrief Questionnaire
    [infographic]

    Get the Most Out of Your CRM

    • Buy Link or Shortcode: {j2store}537|cart{/j2store}
    • member rating overall impact: 9.7/10 Overall Impact
    • member rating average dollars saved: $31,749 Average $ Saved
    • member rating average days saved: 22 Average Days Saved
    • Parent Category Name: Customer Relationship Management
    • Parent Category Link: /customer-relationship-management
    • Application optimization is essential to stay competitive and productive in today’s digital environment.
    • Enterprise applications often involve large capital outlay, unquantified benefits, and high risk of failure.
    • Customer relationship management (CRM) application portfolios are often messy with multiple integration points, distributed data, and limited ongoing end-user training.
    • User dissatisfaction is common.

    Our Advice

    Critical Insight

    A properly optimized CRM ecosystem will reduce costs and increase productivity.

    Impact and Result

    • Build an ongoing optimization team to conduct application improvements.
    • Assess your CRM application(s) and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.
    • Validate CRM capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy.
    • Pull this all together to develop a prioritized optimization roadmap.

    Get the Most Out of Your CRM Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should optimize your CRM, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Map current-state capabilities

    Gather information around the application:

    • Get the Most Out of Your CRM Workbook

    2. Assess your current state

    Assess CRM and related environment. Perform CRM process assessment. Assess user satisfaction across key processes, applications, and data. Understand vendor satisfaction

    • CRM Application Inventory Tool

    3. Build your optimization roadmap

    Build your optimization roadmap: process improvements, software capability improvements, vendor relationships, and data improvement initiatives.

    Infographic

    Workshop: Get the Most Out of Your CRM

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define Your CRM Application Vision

    The Purpose

    Define your CRM application vision.

    Key Benefits Achieved

    Develop an ongoing application optimization team.

    Realign CRM and business goals.

    Understand your current system state capabilities.

    Explore CRM and related costs.

    Activities

    1.1 Determine your CRM optimization team.

    1.2 Align organizational goals.

    1.3 Inventory applications and interactions.

    1.4 Define business capabilities.

    1.5 Explore CRM-related costs (optional).

    Outputs

    CRM optimization team

    CRM business model

    CRM optimization goals

    CRM system inventory and data flow

    CRM process list

    CRM and related costs

    2 Map Current-State Capabilities

    The Purpose

    Map current-state capabilities.

    Key Benefits Achieved

    Complete a CRM process gap analysis to understand where the CRM is underperforming.

    Review the CRM application portfolio assessment to understand user satisfaction and data concerns.

    Undertake a software review survey to understand your satisfaction with the vendor and product.

    Activities

    2.1 Conduct gap analysis for CRM processes.

    2.2 Perform an application portfolio assessment.

    2.3 Review vendor satisfaction.

    Outputs

    CRM process gap analysis

    CRM application portfolio assessment

    CRM software reviews survey

    3 Assess CRM

    The Purpose

    Assess CRM.

    Key Benefits Achieved

    Learn which processes you need to focus on.

    Uncover underlying user satisfaction issues to address these areas.

    Understand where data issues are occurring so that you can mitigate this.

    Investigate your relationship with the vendor and product, including that relative to others.

    Identify any areas for cost optimization (optional).

    Activities

    3.1 Explore process gaps.

    3.2 Analyze user satisfaction.

    3.3 Assess data quality.

    3.4 Understand product satisfaction and vendor management.

    3.5 Look for CRM cost optimization opportunities (optional).

    Outputs

    CRM process optimization priorities

    CRM vendor optimization opportunities

    CRM cost optimization

    4 Build the Optimization Roadmap

    The Purpose

    Build the optimization roadmap.

    Key Benefits Achieved

    Understanding where you need to improve is the first step, now understand where to focus your optimization efforts.

    Activities

    4.1 Identify key optimization areas.

    4.2 Build your CRM optimization roadmap and next steps.

    Outputs

    CRM optimization roadmap

    Further reading

    Get the Most Out of Your CRM

    In today’s connected world, continuous optimization of enterprise applications to realize your digital strategy is key.

    Get the Most Out of Your CRM

    In today’s connected world, continuous optimization of enterprise applications to realize your digital strategy is key.

    EXECUTIVE BRIEF

    Analyst Perspective

    Focus optimization on organizational value delivery.

    Customer relationship management (CRM) systems are at the core of a customer-centric strategy to drive business results. They are critical to supporting marketing, sales, and customer service efforts.

    CRM systems are expensive, their benefits are difficult to quantify, and they often suffer from poor user satisfaction. Post implementation, technology evolves, organizational goals change, and the health of the system is not monitored. This is complicated in today’s digital landscape with multiple integration points, siloed data, and competing priorities.

    Too often organizations jump into the selection of replacement systems without understanding the health of their current systems. IT leaders need to stop reacting and take a proactive approach to continually monitor and optimize their enterprise applications. Strategically realign business goals, identify business application capabilities, complete a process assessment, evaluate user adoption, and create an optimization roadmap that will drive a cohesive technology strategy that delivers results.

    This is a picture of Lisa Highfield

    Lisa Highfield
    Research Director,
    Enterprise Applications
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    In today’s connected world, continuous optimization of enterprise applications to realize your digital strategy is key.

    Enterprise applications often involve large capital outlay and unquantified benefits.

    CRM application portfolios are often messy. Add to that poor processes, distributed data, and lack of training – business results and user dissatisfaction is common.

    Technology owners are often distributed across the business. Consolidation of optimization efforts is key.

    Common Obstacles

    Enterprise applications involve large numbers of processes and users. Without a clear focus on organizational needs, decisions about what and how to optimize can become complicated.

    Competing and conflicting priorities may undermine optimization value by focusing on the approaches that would only benefit one line of business rather than the entire organization.

    Teams do not have a framework to illustrate, communicate, and justify the optimization effort in the language your stakeholders understand.

    Info-Tech’s Approach

    Build an ongoing optimization team to conduct application improvements.

    Assess your CRM application(s) and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.

    Validate CRM capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy

    Pull this all together to develop a prioritized optimization roadmap.

    Info-Tech Insight

    CRM implementation should not be a one-and-done exercise. A properly optimized CRM ecosystem will reduce costs and increase productivity.

    This is an image of the thought model: Get the Most Out of Your CRM

    Insight Summary

    Continuous assessment and optimization of customer relationship management (CRM) systems is critical to their success.

    • Applications and the environments in which they live are constantly evolving.
    • Get the Most Out of Your CRM provides business and application managers a method to complete a health assessment on their CRM systems to identify areas for improvement and optimization.
    • Put optimization practices into effect by:
      • Aligning and prioritizing key business and technology drivers.
      • Identifying CRM process classification, and performing a gap analysis.
      • Measuring user satisfaction across key departments.
      • Evaluating vendor relations.
      • Understanding how data fits.
      • Pulling it all together into an optimization roadmap.

    CRM platforms are the applications that provide functional capabilities and data management around the customer experience (CX).

    Marketing, sales, and customer service are enabled through CRM technology.

    CRM technologies facilitate an organization’s relationships with customers, service users, employees, and suppliers.

    CRM technology is critical to managing the lifecycle of these relationships, from lead generation, to sales opportunities, to ongoing support and nurturing of these relationships.

    Customer experience management (CXM)

    CRM platforms sit at the core of a well-rounded customer experience management ecosystem.

    Customer Relationship Management

    • Web Experience Management Platform
    • E-Commerce & Point-of-Sale Solutions
    • Social Media Management Platform
    • Customer Intelligence Platform
    • Customer Service Management Tools
    • Marketing Management Suite

    Customer relationship management suites are one piece of the overall customer experience management ecosystem, alongside tools such as customer intelligence platforms and adjacent point solutions for sales, marketing, and customer service. Review Info-Tech’s CXM blueprint to build a complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components. The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis.

    CRM by the numbers

    1/3

    Statistical analysis of CRM projects indicate failures vary from 18% to 69%. Taking an average of those analyst reports, about one-third of CRM projects are considered a failure.
    Source: CIO Magazine, 2017

    85%

    Companies that apply the principles of behavioral economics outperform their peers by 85% in sales growth and more than 25% in gross margin.
    Source: Gallup, 2012

    40%

    In 2019, 40% of executives name customer experience the top priority for their digital transformation.
    Source: CRM Magazine, 2019

    CRM dissatisfaction

    Drivers of Dissatisfaction

    Business Data People and Teams Technology
    • Misaligned objectives
    • Product fit
    • Changing priorities
    • Lack of metrics
    • Access to data
    • Data hygiene
    • Data literacy
    • One view of the customer
    • User adoption
    • Lack of IT support
    • Training (use of data and system)
    • Vendor relations
    • Systems integration
    • Multichannel complexity
    • Capability shortfall
    • Lack of product support

    Info-Tech Insight

    While technology is the key enabler of building strong customer experiences, there are many other drivers of dissatisfaction. IT must stand shoulder to shoulder with the business to develop a technology framework for customer relationship management.

    Marketing, Sales, and Customer Service, along with IT, can only optimize CRM with the full support of each other. The cooperation of the departments is crucial when trying to improve CRM technology capabilities and customer interaction.

    Application optimization is risky without a plan

    Avoid the common pitfalls.

    • Not considering application optimization as a business and IT partnership that requires continuous formal engagement of all participants.
    • Not having a good understanding of current state, including integration points and data.
    • Not adequately accommodating feedback and changes after digital applications are deployed and employed.
    • Not treating digital applications as a motivator for potential future IT optimization effort, and not incorporating digital assets in strategic business planning.
    • Not involving department leads, management, and other subject matter experts to facilitate the organizational change digital applications bring.

    “A successful application optimization strategy starts with the business need in mind and not from a technological point of view. No matter from which angle you look at it, modernizing a legacy application is a considerable undertaking that can’t be taken lightly. Your best approach is to begin the journey with baby steps.”
    – Ernese Norelus, Sreeni Pamidala, and Oliver Senti
    Medium, 2020

    Info-Tech’s methodology for Get the Most Out of Your CRM

    1. Map Current-State Capabilities 2. Assess Your Current State 3. Build Your Optimization Roadmap
    Phase Steps
    1. Identify stakeholders and build your CRM optimization team
    2. Build a CRM strategy model
    3. Inventory current system state
    4. Define business capabilities
    1. Conduct a gap analysis for CRM processes
    2. Assess user satisfaction
    3. Review your satisfaction with the vendor and product
    1. Identify key optimization areas
    2. Compile optimization assessment results
    Phase Outcomes
    1. Stakeholder map
    2. CRM optimization team
    3. CRM business model
    4. Strategy alignment
    5. Systems inventory and diagram
    6. Business capabilities map
    7. Key CRM processes list
    1. Gap analysis for CRM-related processes
    2. Understanding of user satisfaction across applications and processes
    3. Insight into CRM data quality
    4. Quantified satisfaction with the vendor and product
    1. Application optimization plan

    Get the Most Out of Your CRM Workbook

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

    Key deliverable:

    CRM Optimization Roadmap (Tab 8)

    This image contains a screenshot from Tab 9 of the Get the most out of your CRM WorkshopThis image contains a screenshot from Tab 9 of the Get the most out of your CRM Workshop

    Complete an assessment of processes, user satisfaction, data quality, and vendor management using the Workbook or the APA diagnostic.

    CRM Business Model (Tab 2)

    This image contains a screenshot from Tab 2 of the Get the most out of your CRM Workshop

    Align your business and technology goals and objectives in the current environment.

    Prioritized CRM Optimization Goals (Tab 3)

    This image contains a screenshot from Tab 3 of the Get the most out of your CRM Workshop

    Identify and prioritize your CRM optimization goals.

    Application Portfolio Assessment (APA)

    This image contains a screenshot of the Application Portfolio Assessment

    Assess IT-enabled user satisfaction across your CRM portfolio.

    Prioritized Process Assessment (Tab 5)

    This image contains a screenshot from Tab 5 of the Get the most out of your CRM Workshop

    Understand areas for improvement.

    Case Study

    Align strategy and technology to meet consumer demand.

    INDUSTRY - Entertainment
    SOURCE - Forbes, 2017

    Challenge

    Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.

    Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience

    Solution

    In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.

    Results

    Netflix’s disruptive innovation is built on the foundation of great customer experience management. Netflix is now a $28-billion company, which is tenfold what Blockbuster was worth.

    Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time, video rental industry leader, Blockbuster.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 Phase 2 Phase 3

    Call #1: Scope requirements, objectives, and your specific challenges.

    Call #2:

    Build the CRM team.

    Align organizational goals.

    Call #4:

    Conduct gap analysis for CRM processes.

    Prepare application portfolio assessment.

    Call #5:

    Understand product satisfaction and vendor management.

    Look for CRM cost optimization opportunities (optional).

    Call #7:

    Identify key optimization areas.

    Build out optimization roadmap and next steps.

    Call #3:

    Map current state.

    Inventory CRM processes.

    Explore CRM-related costs.

    Call #6:

    Review APA results.

    A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4 Day 5
    Define Your CRM Application Vision Map Current-State Capabilities Assess CRM Build the Optimization Roadmap Next Steps and Wrap-Up (offsite)

    Activities

    1.1 Determine your CRM optimization team

    1.2 Align organizational goals

    1.3 Inventory applications and interactions

    1.4 Define business capabilities

    1.5 Explore CRM-related costs

    2.1 Conduct gap analysis for CRM processes

    2.2 Perform an application portfolio assessment

    2.3 Review vendor satisfaction

    3.1 Explore process gaps

    3.2 Analyze user satisfaction

    3.3 Assess data quality

    3.4 Understand product satisfaction and vendor management

    3.5 Look for CRM cost optimization opportunities (optional)

    4.1 Identify key optimization areas

    4.2 Build your CRM optimization roadmap and next steps

    5.1 Complete in-progress deliverables from previous four days

    5.2 Set up review time for workshop deliverables and to discuss next steps

    Deliverables
    1. CRM optimization team
    2. CRM business model
    3. CRM optimization goals
    4. CRM system inventory and data flow
    5. CRM process list
    6. CRM and related costs
    1. CRM process gap analysis
    2. CRM application portfolio assessment
    3. CRM software reviews survey
    1. CRM process optimization priorities
    2. CRM vendor optimization opportunities
    3. CRM cost optimization
    1. CRM optimization roadmap

    Phase 1

    Map Current-State Capabilities

    • 1.1 Identify Stakeholders and Build Your Optimization Team
    • 1.2 Build a CRM Strategy Model
    • 1.3 Inventory Current System State
    • 1.4 Define Business Capabilities
    • 1.5 Understand CRM Costs

    Get the Most Out of Your CRM

    This phase will walk you through the following activities:

    • Align your organizational goals
    • Gain a firm understanding of your current state
    • Inventory CRM and related applications
    • Confirm the organization’s capabilities

    This phase involves the following participants:

    • Product Owners
    • CMO
    • Departmental leads – Sales, Marketing, Customer Service, or other
    • Applications Director
    • Senior Business Analyst
    • Senior Developer
    • Procurement Analysts

    Inventory of CRM and related systems

    Develop an integration map to specify which applications will interface with each other.

    This is an image of an integration map, integrating the following Terms to CRM: Telephony Systems; Directory Services; Email; Content Management; Point Solutions; ERP

    Integration is paramount: your CRM application often integrates with other applications within the organization. Create an integration map to reflect a system of record and the exchange of data. To increase customer engagement, channel integration is a must (i.e. with robust links to unified communications solutions, email, and VoIP telephony systems).

    CRM plays a key role in the more holistic customer experience framework. However, it is heavily influenced by and often interacts with many other platforms.

    Data is one key consideration that needs to be considered here. If customer information is fragmented, it will be nearly impossible to build a cohesive view of the customer. Points of integration (POIs) are the junctions between the CRM(s) and other applications where data is flowing to and from. They are essential to creating value, particularly in customer insight-focused and omnichannel-focused deployments.

    Customer expectations are on the rise

    CRM strategy is a critical component of customer experience (CX).

    CUSTOMER EXPERIENCE

    1. Thoughtfulness is in
      Connect with customers on a personal level
    2. Service over products
      The experience is more important than the product
    3. Culture is now number one
      Culture is the most overlooked piece of customer experience strategy
    4. Engineering and service finally join forces
      Companies are combining their technology and service efforts to create
      strong feedback loops
    5. The B2B world is inefficiently served
      B2B needs to step up with more tools and a greater emphasis placed on
      customer experience

    Source: Forbes, 2019

    Build a cohesive CRM strategy that aligns business goals with CRM capabilities.

    Info-Tech Insight

    Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.

    IT is critical to the success of your CRM strategy

    Today’s shared digital landscape of the CIO and CMO

    CIO

    • IT Operations
    • Service Delivery and Management
    • IT Support
    • IT Systems and Application
    • IT Strategy and Governance
    • Cybersecurity

    Collaboration and Partnership

    • Digital Strategy = Transformation
      Business Goals | Innovation | Leadership | Rationalization
    • Customer Experience
      Architecture | Design | Omnichannel Delivery | Management
    • Insight (Market Facing)
      Analytics | Business Intelligence | Machine Learning | AI
    • Marketing Integration + Operating Model
      Apps | Channels | Experiences | Data | Command Center
    • Master Data
      Customer | Audience | Industry | Digital Marketing Assets

    CMO

    • PEO Media
    • Brand Management
    • Campaign Management
    • Marketing Tech
    • Marketing Ops
    • Privacy, Trust, and Regulatory Requirements

    Info-Tech Insight

    Technology is the key enabler of building strong customer experiences: IT must stand shoulder to shoulder with the business to develop a technology framework for customer relationship management.

    Step 1.1

    Identify Stakeholders and Build Your Optimization Team

    Activities

    1.1.1 Identify the stakeholders whose support will be critical to success

    1.1.2 Select your CRM optimization team

    Map Current-State Capabilities

    This step will walk you through the following activities:

    • Identify CRM drivers and objectives.
    • Explore CRM challenges and pain points.
    • Discover CRM benefits and opportunities.
    • Align the CRM foundation with the corporate strategy.

    This step involves the following participants:

    • Stakeholders
    • Project sponsors and leaders

    Outcomes of this step

    • Stakeholder map
    • CRM optimization team composition

    CRM optimization stakeholders

    Understand the roles necessary to get the most out of your CRM.

    Understand the role of each player within your optimization initiative. Look for listed participants on the activity slides to determine when each player should be involved.

    Info-Tech Insight

    Do not limit input or participation. Include subject matter experts and internal stakeholders at stages within the optimization initiative. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to creating your CRM optimization strategy.

    Title

    Roles Within CRM Optimization Initiative

    Optimization Sponsor

    • Owns the project at the management/C-suite level
    • Responsible for breaking down barriers and ensuring alignment with organizational strategy
    • CMO, VP od Marketing, VP of Sales, VP of Customer Care, or similar

    Optimization Initiative Manager

    • Typically IT individual(s) that oversee day-to-day operations
    • Responsible for preparing and managing the project plan and monitoring the project team’s progress
    • Applications Manager or other IT Manager, Business Analyst, Business Process Owner, or similar

    Business Leads/
    Product Owners

    • Works alongside the Optimization Initiative Manager to ensure that the strategy is aligned with business needs
    • In this case, likely to be a marketing, sales, or customer service lead
    • Product Owners
    • Sales Director, Marketing Director, Customer Care Director, or similar

    CRM Optimization Team

    • Comprised of individuals whose knowledge and skills are crucial to optimization success
    • Responsible for driving day-to-day activities, coordinating communication, and making process and design decisions
    • Project Manager, Business Lead, CRM Manager, Integration Manager, Application SMEs, Developers, Business Process Architects, and/or similar SMEs

    Steering Committee

    • Comprised of C-suite/management level individuals that act as the CRM optimization decision makers.
    • Responsible for validating goals and priorities, defining the optimization scope, enabling adequate resourcing, and managing change
    • Project Sponsor, Project Manager, Business Lead, CMO, Business Unit SMEs, or similar

    1.1.1 Identify stakeholders critical to success

    1 hour

    1. Hold a meeting to identify the stakeholders that should be included in the project’s steering committee.
    2. Finalize selection of steering committee members.
    3. Contact members to ensure their willingness to participate.
    4. Document the steering committee members and the milestone/presentation expectations for reporting project progress and results.

    Input

    • Stakeholder interviews
    • Business process owners list

    Output

    • CRM optimization stakeholders
    • Steering committee members

    Materials

    • N/A

    Participants

    • Product Owners
    • CMO
    • Departmental Leads – Sales, Marketing, Customer Service (and others)
    • Applications Director
    • Senior Business Analyst
    • Senior Developer
    • Procurement Analyst

    The CRM optimization team

    Consider the core team functions when composing the CRM optimization team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned CRM optimization strategy.

    Don’t let your core team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the optimization team will enable effective decision making while still including functional business units such as Marketing, Sales, Service, and Customer Service.

    Required Skills/Knowledge

    Suggested Optimization Team Members

    Business

    • Understanding of the customer
    • Departmental processes
    • Sales Manager
    • Marketing Manager
    • Customer Service Manager

    IT

    • Product Owner
    • Application developers
    • Enterprise architects
    • CRM Application Manager
    • Business Process Manager
    • Data Stewards
    Other
    • Operations
    • Administrative
    • Change management
    • Operations Manager
    • CFO
    • Change Management Manager

    1.1.2 Select your CRM optimization team

    30 minutes

    1. Have the CMO and other key stakeholders discuss and determine who will be involved in the CRM optimization project.
      • Depending on the initiative and the size of the organization the size of the team will vary.
      • Key business leaders in key areas – Sales, Marketing, Customer Service, and IT – should be involved.
    2. Document the members of your optimization team in the Get the Most Out of Your CRM Workbook, tab “1. Optimization Team.”
      • Depending on your initiative and size of your organization, the size of this team will vary.

    Get the Most Out of Your CRM Workbook

    Input

    • Stakeholders

    Output

    • List of CRM Optimization Team members

    Materials

    • Get the Most Out of Your CRM Workbook

    Participants

    • Product Owners
    • CMO
    • Departmental Leads – Sales, Marketing, Customer Service
    • Applications Director
    • Senior Business Analyst
    • Senior Developer
    • Procurement Analyst

    Step 1.2

    Build a CRM Strategy Model

    Activities

    • 1.2.1 Explore environmental factors and technology drivers
    • 1.2.2 Discuss challenges and pain points
    • 1.2.3 Discuss opportunities and benefits
    • 1.2.4 Align CRM strategy with organizational goals

    Map Current-State Capabilities

    This step will walk you through the following activities:

    • Identify CRM drivers and objectives.
    • Explore CRM challenges and pain points.
    • Discover the CRM benefits and opportunities.
    • Align the CRM foundation with the corporate strategy.

    This step involves the following participants:

    • CRM Optimization Team

    Outcomes of this step

    • CRM business model
    • Strategy alignment

    Align the CRM strategy with the corporate strategy

    Corporate Strategy

    Your corporate strategy:

    • Conveys the current state of the organization and the path it wants to take.
    • Identifies future goals and business aspirations.
    • Communicates the initiatives that are critical for getting the organization from its current state to the future state.

    Unified Strategy

    • The CRM optimization can be and should be linked, with metrics, to the corporate strategy and ultimate business objectives.

    CRM Strategy

    Your CRM Strategy:

    • Communicates the organization’s budget and spending on CRM.
    • Identifies IT initiatives that will support the business and key CRM objectives.
    • Outlines staffing and resourcing for CRM initiatives.

    CRM projects are more successful when the management team understands the strategic importance and the criticality of alignment. Time needs to be spent upfront aligning business strategies with CRM capabilities. Effective alignment between Sales, Marketing, Customer Service, Operations, IT, and the business should happen daily. Alignment doesn’t just need to occur at the executive level but at each level of the organization.

    Sample CRM objectives

    Increase Revenue

    Enable lead scoring

    Deploy sales collateral management tools

    Improve average cost per lead via a marketing automation tool

    Enhance Market Share

    Enhance targeting effectiveness with a CRM

    Increase social media presence via an SMMP

    Architect customer intelligence analysis

    Improve Customer Satisfaction

    Reduce time-to-resolution via better routing

    Increase accessibility to customer service with live chat

    Improve first contact resolution with customer KB

    Increase Customer Retention

    Use a loyalty management application

    Improve channel options for existing customers

    Use customer analytics to drive targeted offers

    Create Customer-Centric Culture

    Ensure strong training and user adoption programs

    Use CRM to provide 360-degree view of all customer interactions

    Incorporate the voice of the customer into product development

    Identifying organizational objectives of high priority will assist in breaking down business needs and CRM objectives. This exercise will better align the CRM systems with the overall corporate strategy and achieve buy-in from key stakeholders.

    CRM business model Template

    This image contains a screenshot of the CRM business model template

    Understand objectives for creating a strong CRM strategy

    Business Needs

    Business Drivers

    Technology Drivers

    Environmental Factors

    Definition A business need is a requirement associated with a particular business process. Business drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as employee retention, operation excellence, and financial performance. Technology drivers are technological changes that have created the need for a new CRM enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge. External considerations are factors taking place outside of the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business.

    Examples

    • Audit tracking
    • Authorization levels
    • Business rules
    • Data quality
    • Employee engagement
    • Productivity
    • Operational efficiency
    • Deployment model (i.e. SaaS)
    • Integration
    • Reporting capabilities
    • Fragmented technologies
    • Economic and political factors, the labor market
    • Competitive influencers
    • Compliance regulations

    Info-Tech Insight

    One of the biggest drivers for CRM adoption is the ability to make decisions through consolidated data. This driver is a result of external considerations. Many industries today are highly competitive, uncertain, and rapidly changing. To succeed under these pressures, there needs to be timely information and visibility into all components of the organization.

    1.2.1 Explore environmental factors and technology drivers

    30 minutes

    1. Identify business drivers that are contributing to the organization’s need for CRM.
    2. Understand how the company is running today and what the organization’s future will look like. Try to identify the purpose for becoming an integrated organization. Use a whiteboard and markers to capture key findings.
    3. Consider environmental factors: external considerations, organizational drivers, technology drivers, and key functional requirements.
    4. Use the Get the Most Out of Your CRM Workbook, tab “2. Business Model,” to complete this exercise.

    Get the Most Out of Your CRM Workbook

    This is a screenshot of the CRM Business Model the following boxes highlighted in purple boxes.  CRM business Needs; Environmental Factors; Technology Drivers

    External Considerations

    Organizational Drivers

    Technology Considerations

    Functional Requirements

    • Funding Constraints
    • Regulations
    • Compliance
    • Scalability
    • Operational Efficiency
    • Data Accuracy
    • Data Quality
    • Better Reporting
    • Information Availability
    • Integration Between Systems
    • Secure Data

    Create a realistic CRM foundation by identifying the challenges and barriers to the project

    There are several different factors that may stifle the success of an CRM portfolio. Organizations creating an CRM foundation must scan their current environment to identify internal barriers and challenges.

    Common Internal Barriers

    Management Support

    Organizational Culture

    Organizational Structure

    IT Readiness

    Definition The degree of understanding and acceptance towards CRM technology and systems. The collective shared values and beliefs. The functional relationships between people and departments in an organization. The degree to which the organization’s people and processes are prepared for new CRM system(s.)

    Questions

    • Is a CRM project recognized as a top priority?
    • Will management commit time to the project?
    • Are employees resistant to change?
    • Is the organization highly individualized?
    • Is the organization centralized?
    • Is the organization highly formalized?
    • Is there strong technical expertise?
    • Is there strong infrastructure?
    Impact
    • Funding
    • Resources
    • Knowledge sharing
    • User acceptance
    • Flow of knowledge
    • Poor implementation
    • Need for reliance on consultants

    1.2.2 Discuss challenges and pain points

    30 minutes

    1. Identify challenges with current systems and processes.
    2. Brainstorm potential barriers to success. Use a whiteboard and markers to capture key findings.
    3. Consider the project barriers: functional gaps, technical gaps, process gaps, and barriers to CRM success.
    4. Use the Get the Most Out of Your CRM Workbook, tab “2. Business Model,” to complete this exercise.

    Get the Most Out of Your CRM Workbook

    This is a screenshot of the CRM Business Model the following boxes highlighted in purple boxes.  Barriers

    Functional Gaps

    Technical Gaps

    Process Gaps

    Barriers to Success

    • No sales tracking within core CRM
    • Inconsistent reporting – data quality concerns
    • Duplication of data
    • Lack of system integration
    • Cultural mindset
    • Resistance to change
    • Lack of training
    • Funding

    1.2.3 Discuss opportunities and benefits

    30 minutes

    1. Identify opportunities and benefits from an integrated system.
    2. Brainstorm potential enablers for successful CRM enablement and the ideal portfolio.
    3. Consider the project enablers: business benefits, IT benefits, organizational benefits, and enablers of CRM success.
    4. Use the Get the Most Out of Your CRM Workbook, tab “2. Business Model,” to complete this exercise.
    This is a screenshot of the CRM Business Model the following boxes highlighted in purple boxes.  Enablers

    Business Benefits

    IT Benefits

    Organizational Benefits

    Enablers of Success

    • Business-IT alignment
    • Compliance
    • Scalability
    • Operational Efficiency
    • Data Accuracy
    • Data Quality
    • Better Reporting
    • Change Management
    • Training
    • Alignment to Strategic Objectives

    1.2.4 Align CRM strategy with organizational goals

    1 hour

    1. Discuss your corporate objectives (organizational goals). Choose three to five corporate objectives that are a priority for the organization in the current year.
    2. Break into groups and assign each group one corporate objective.
    3. For each objective, produce several ways an optimized CRM system will meet the given objective.
    4. Think about the modules and CRM functions that will help you realize these benefits.
    5. Use the Get the Most Out of Your CRM Workbook, tab “2. Business Model,” to complete this exercise.
    Increase Revenue

    CRM Benefits

    • Increase sales by 5%
    • Expand to new markets
    • Offer new product
    • Identify geographies underperforming
    • Build out global customer strategy
    • Allow for customer segmentation
    • Create targeted marketing campaigns

    Input

    • Organizational goals
    • CRM strategy model

    Output

    • Optimization benefits map

    Materials

    • Get the Most Out of Your CRM Workbook

    Participants

    • Product Owners
    • CMO
    • Departmental Leads – Sales, Marketing, Customer Service
    • Applications Director
    • Senior Business Analyst
    • Senior Developer
    • Procurement Analyst

    Download the Get the Most Out of Your CRM Workbook

    Step 1.3

    Inventory Current System State

    Activities

    1.3.1 Inventory applications and interactions

    Map Current-State Capabilities

    This step will walk you through the following activities:

    • Inventory applications
    • Map interactions between systems

    This step involves the following participants:

    • CRM Optimization Team
    • Enterprise Architect
    • Data Architect

    Outcomes of this step

    • Systems inventory
    • Systems diagram

    1.3.1 Inventory applications and interactions

    1-3 hours

    1. Individually list all electronic systems involved in the organization. This includes anything related to customer information and interactions, such as CRM, ERP, e-commerce, finance, email marketing, and social media, etc.
    2. Document data flows into and out of each system to the ERP. Refer to the example on the next slide (CRM data flow).
    3. Review the processes in place (e.g. reporting, marketing, data moving into and out of systems). Document manual processes. Identify integration points. If flowcharts exist for these processes, it may be useful to provide these to the participants.
    4. If possible, diagram the system. Include information direction flow. Use the sample CRM map, if needed.

    This image contains an example of a CRM Data Flow

    CRM data flow

    This image contains an example of a CRM Data Flow

    Be sure to include enterprise applications that are not included in the CRM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

    When assessing the current application portfolio that supports CRM, the tendency will be to focus on the applications under the CRM umbrella, relating mostly to Marketing, Sales, and Customer Service. Be sure to include systems that act as input to, or benefit due to outputs from, the CRM or similar applications.

    Sample CRM map

    This image contains an example of a CRM map

    Step 1.4

    Define Business Capabilities

    Activities

    1.4.1 Define business capabilities

    1.4.2 List your key CRM processes

    Map Current-State Capabilities

    This step will walk you through the following activities:

    • Define your business capabilities
    • List your key CRM processes

    This step involves the following participants:

    • CRM Optimization Team
    • Business Architect

    Outcomes of this step

    • Business capabilities map
    • Key CRM processes list

    Business capability map (Level 0)

    This image contains a screenshot of a business capability map.  an Arrow labeled CRM points to the Revenue Generation section. Revenue Generation: Marketing; Sales; Customer Service.

    In business architecture, the primary view of an organization is known as a business capability map.

    A business capability defines what a business does to enable value creation, rather than how.

    Business capabilities:

    • Represent stable business functions.
    • Are unique and independent of each other.
    • Typically will have a defined business outcome.

    A business capability map provides details that help the business architecture practitioner direct attention to a specific area of the business for further assessment.

    Capability vs. process vs. feature

    Understanding the difference

    When examining CRM optimization, it is important we approach this from the appropriate layer.

    Capability:

    • The ability of an entity (e.g. organization or department) to achieve its objectives (APQC, 2017).
    • An ability that an organization, person, or system possesses. Typically expressed in general and high-level terms and typically require a combination of organization, people, processes, and technology to achieve (TOGAF).

    Process:

    • Can be manual or technology enabled. A process is a series of interrelated activities that convert inputs into results (outputs). Processes consume resources, require standards for repeatable performance, and respond to control systems that direct the quality, rate, and cost of performance. The same process can be highly effective in one circumstance and poorly effective in another with different systems, tools, knowledge, and people (APQC, 2017).

    Feature:

    • Is a distinguishing characteristic of a software item (e.g. performance, portability, or functionality) (IEEE, 2005).

    In today’s complex organizations, it can be difficult to understand where inefficiencies stem from and how performance can be enhanced.
    To fix problems and maximize efficiencies business capabilities and processes need to be examined to determine gaps and areas of lagging performance.

    Info-Tech’s CRM framework and industry tools such as the APQC’s Process Classification Framework can help make sense of this.

    1.4.1 Define business capabilities

    1-3 hours

    1. Look at the major functions or processes within the scope of CRM.
    2. Compile an inventory of current systems that interact with the chosen processes. In its simplest form, document your application inventory in a spreadsheet (see tab 3 of the CRM Application Inventory Tool). For large organizations, interview representatives of business domains to help create your list of applications.
    3. Make sure to include any processes that are manual versus automated.
    4. Use your current state drawing from activity 1.3.1 to link processes to applications for further effect.

    CRM Application Inventory Tool

    Input

    • Current systems
    • Key processes
    • APQC Framework
    • Organizational process map

    Output

    • List of key business processes

    Materials

    • CRM Application Inventory Tool
    • CRM APQC Framework
    • Whiteboard, PowerPoint, or flip charts
    • Pens/markers

    Participants

    • CRM Optimization Team

    CRM process mapping

    This image contains two screenshots.  one is of the business capability map seen earlier in this blueprint, and the other includes the following operating model: Objectives; Value Streams; Capabilities; Processes

    The operating model

    An operating model is a framework that drives operating decisions. It helps to set the parameters for the scope of CRM and the processes that will be supported. The operating model will serve to group core operational processes. These groupings represent a set of interrelated, consecutive processes aimed at generating a common output.

    The Value Stream

    Value Stream Defined

    Value Streams

    Design Product

    Produce Product

    Sell Product

    Customer Service

    • Manufacturers work proactively to design products and services that will meet consumer demand.
    • Products are driven by consumer demand and governmental regulations.
    • Production processes and labor costs are constantly analyzed for efficiencies and accuracies.
    • Quality of product and services are highly regulated through all levels of the supply chain.
    • Sales networks and sales staff deliver the product from the organization to the end consumer.
    • Marketing plays a key role throughout the value stream connecting consumers wants and needs to the product and services offered.
    • Relationships with consumers continue after the sale of a product and services.
    • Continued customer support and mining is important to revenue streams.

    Value streams connect business goals to the organization’s value realization activities in the marketplace. Those activities are dependent on the specific industry segment in which an organization operates.

    There are two types of value streams: core value streams and support value streams.

    • Core value streams are mostly externally facing. They deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map.
    • Support value streams are internally facing and provide the foundational support for an organization to operate.

    An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers.

    APQC Framework

    Help define your inventory of sales, marketing, and customer services processes.

    Operating Processes

    1. Develop Vision and Strategy
    2. Develop and Manage Products and Services
    3. Market and Sell Products and Services
    4. Deliver Physical Products
    5. Deliver Services

    Management and Support Processes

    1. Manage Customer Service
    2. Develop and Manage Human Capital
    3. Manage Information Technology (IT)
    4. Manage Financial Resources
    5. Acquire, Construct, and Manage Assets
    6. Manage Enterprise Risk, Compliance, Remediation, and Resiliency
    7. Manage External Relationships
    8. Develop and Manage Business Capabilities

    Source: APQC, 2020

    If you do not have a documented process model, you can use the APQC Framework to help define your inventory of sales business processes.

    APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

    Go to this link

    Process mapping hierarchy

    This image includes explanations for the following PCF levels:  Level 1 - Category; Level 2 - Process Group; Level 3 - Process; Level 4 - Activity; Level 5 - Task

    APQC provides a process classification framework. It allows organizations to effectively define their processes and manage them appropriately.

    THE APQC PROCESS CLASSIFICATION FRAMEWORK (PCF)® was developed by non-profit APQC, a global resource for benchmarking and best practices, and its member companies as an open standard to facilitate improvement through process management and benchmarking, regardless of industry, size, or geography. The PCF organizes operating and management processes into 12 enterprise level categories, including process groups and over 1,000 processes and associated activities. To download the full PCF or industry-specific versions of the PCF as well as associated measures and benchmarking, visit www.apqc.org/pcf.

    Cross-industry classification framework

    Level 1 Level Level 3 Level 4

    Market and sell products and services

    Understand markets, customers, and capabilities Perform customer and market intelligence analysis Conduct customer and market research

    Market and sell products and services

    Develop sales strategy Develop sales forecast Gather current and historic order information

    Deliver services

    Manage service delivery resources Manage service delivery resource demand Develop baseline forecasts
    ? ? ? ?

    Info-Tech Insight

    Focus your initial assessment on the level 1 processes that matter to your organization. This allows you to target your scant resources on the areas of optimization that matter most to the organization and minimize the effort required from your business partners.

    You may need to iterate the assessment as challenges are identified. This allows you to be adaptive and deal with emerging issues more readily and become a more responsive partner to the business.

    1.4.2 List your key CRM processes

    1-3 hours

    1. Reflect on your organization’s CRM capabilities and processes.
    2. Refer to tab 4, “Process Importance,” in your Get the Most Out of Your CRM Workbook. You can use your own processes if you prefer. Consult tab 10. “Framework (Reference)” in the Workbook to explore additional capabilities.
    3. Use your CRM goals as a guide.

    Get the Most Out of Your CRM Workbook

    This is a screenshot from the APQC Cross-Industry Process Classification Framework, adapted to list key CRM processes

    *Adapted from the APQC Cross-Industry Process Classification Framework, 2019.

    Step 1.5

    Understand CRM Costs

    Activities

    1.5.1 List CRM-related costs (optional)

    Map Current-State Capabilities

    This step will walk you through the following activities:

    • Define your business capabilities
    • List your key CRM processes

    This step involves the following participants:

    • Finance Representatives
    • CRM Optimization Team

    Outcomes of this step

    • Current CRM and related operating costs

    1.5.1 List CRM-related costs (optional)

    3+ hours

    Before you can make changes and optimization decisions, you need to understand the high-level costs associated with your current application architecture. This activity will help you identify the types of technology and people costs associated with your current systems.

    1. Identify the types of technology costs associated with each current system:
      1. System Maintenance
      2. Annual Renewal
      3. Licensing
    2. Identify the cost of people associated with each current system:
      1. Full-Time Employees
      2. Application Support Staff
      3. Help Desk Tickets
    3. Use the Get the Most Out of Your CRM Workbook, tab “9. Costs (Optional),” to complete this exercise.

    This is a screenshot of an example of a table which lays out CRM and Associated Costs.

    Get the Most Out of Your CRM Workbook

    Phase 2

    Assess Your Current State

    • 2.1 Conduct a Gap Analysis for CRM Processes
    • 2.2 Assess User Satisfaction
    • 2.3 Review Your Satisfaction With the Vendor and Product

    Get the Most Out of Your CRM

    This phase will guide you through the following activities:

    • Determine process relevance
    • Perform a gap analysis
    • Perform a user satisfaction survey
    • Assess software and vendor satisfaction

    This phase involves the following participants:

    • CRM optimization team
    • Users across functional areas of your CRM and related technologies

    Step 2.1

    Conduct a Gap Analysis for CRM Processes

    Activities

    • 2.1.1 Determine process relevance
    • 2.1.2 Perform process gap analysis

    Assess Your Current State

    This step will walk you through the following activities:

    • Determine process relevance
    • Perform a gap analysis

    This step involves the following participants:

    • CRM optimization team

    Outcomes of this step

    • Gap analysis for CRM-related processes (current vs. desired state)

    2.1.1 Determine process relevance

    1-3 hours

    1. Open tab “4. Process Importance,” in the Get the Most Out of Your CRM Workbook.
    2. Rate each process for level of importance to your organization on the following scale:
      • Crucial
      • Important
      • Secondary
      • Unimportant
      • Not applicable

    This image contains a screenshot of tab 4 of the Get the most out of your CRM Workbook.

    Get the Most Out of Your CRM Workbook

    2.1.2 Perform process gap analysis

    1-3 hours

    1. Open tab “5. Process Assessment,” in the Get the Most Out of Your CRM Workbook.
    2. For each line item, identify your current state and your desired state on the following scale:
      • Not important
      • Poor
      • Moderate
      • Good
      • Excellent

    This is a screenshot of Tab 5 of the Get the Most Out of your CRM Workshop

    Get the Most Out of Your CRM Workbook

    Step 2.2

    Assess User Satisfaction

    Activities

    • 2.2.1 Prepare and complete a user satisfaction survey
    • 2.2.2 Enter user satisfaction

    Assess Your Current State

    This step will walk you through the following activities:

    • Preparation and completion of an application portfolio assessment (APA)
    • Entry of the user satisfaction scores into the workbook

    This step involves the following participants:

    • CRM optimization team
    • Users across functional areas of CRM and related technologies

    Outcomes of this step

    • Understanding of user satisfaction across applications and processes
    • Insight into CRM data quality

    Benefits of the Application Portfolio Assessment

    This is a screenshot of the application  Overview tab

    Assess the health of the application portfolio

    • Get a full 360-degree view of the effectiveness, criticality, and prevalence of all relevant applications to get a comprehensive view of the health of the applications portfolio.
    • Identify opportunities to drive more value from effective applications, retire nonessential applications, and immediately address at-risk applications that are not meeting expectations.

    This is a screenshot of the Finance Overview tab

    Provide targeted department feedback

    • Share end-user satisfaction and importance ratings for core IT services, IT communications, and business enablement to focus on the right end-user groups or lines of business, and ramp up satisfaction and productivity.

    This is a screenshot of the application  Overview tab

    Insight into the state of data quality

    • Data quality is one of the key issues causing poor CRM user satisfaction and business results. This can include the relevance, accuracy, timeliness, or usability of the organization’s data.
    • Targeted, open-ended feedback around data quality will provide insight into where optimization efforts should be focused.

    2.2.1 Prepare and complete a user satisfaction survey

    1 hour

    Option 1: Use Info-Tech’s Application Portfolio Assessment to generate your user satisfaction score. This tool not only measures application satisfaction but also elicits great feedback from users regarding support they receive from the IT team.

    1. Download the CRM Application Inventory Tool.
    2. Complete the “Demographics” tab (tab 2).
    3. Complete the “Inventory” tab (tab 3).
      1. Complete the inventory by treating each process within the organization as a separate row. Use the processes identified in the process gap analysis as a reference.
      2. Treat every department as a separate column in the department section. Feel free to add, remove, or modify department names to match your organization.
      3. Include data quality for all applications applicable.

    Option 2: Use the method of choice to elicit current user satisfaction for each of the processes identified as important to the organization.

    1. List processes identified as important (from the Get the Most Out of Your CRM Workbook, tab 4, “Process Importance”).
    2. Gather user contact information by department.
    3. Ask users to rate satisfaction: Extremely Satisfied, Satisfied, Neutral, Dissatisfied, and Extremely Dissatisfied (on Get the Most Out of Your CRM Workbook, tab 5. “Process Assessment”).

    This image contains a screenshot of the CRM Application Inventory Tool Tab

    Understand user satisfaction across capabilities and departments within your organization.

    Download the CRM Application Inventory Tool

    2.2.2 Enter user satisfaction

    20 minutes

    Using the results from the Application Portfolio Assessment or your own user survey:

    1. Open your Get the Most Out of Your CRM Workbook, tab “5. Process Assessment.”
    2. For each process, record up to three different department responses.
    3. Enter the answers to the survey for each line item using the drop-down options:
      • Extremely Satisfied
      • Satisfied
      • Neutral
      • Dissatisfied
      • Extremely Dissatisfied

    This is a screenshot of Tab 5 of the Get the most out of your CRM Workbook

    Understand user satisfaction across capabilities and departments within your organization.

    Get the Most Out of Your CRM Workbook

    Step 2.3

    Review Your Satisfaction With the Vendor and Product

    Activities

    2.3.1 Rate your vendor and product satisfaction

    2.3.2 Enter SoftwareReviews scores from your CRM Product Scorecard (optional)

    Assess Your Current State

    This step will walk you through the following activities:

    • Rate your vendor and product satisfaction
    • Compare with survey data from SoftwareReviews

    This step involves the following participants:

    • CRM Owner(s)
    • Procurement Representative
    • Vendor Contracts Manager

    Outcomes of this step

    • Quantified satisfaction with vendor and product

    Use a SoftwareReviews Product Scorecard to evaluate your satisfaction compared to other organizations.

    This is a screenshot of the SoftwareReviews Product Scorecard

    Source: SoftwareReviews, March 2019

    Where effective IT leaders spend their time

    This image contains two lists.  One list is where CIOs with  data-verified=80% satisfaction score, and the other list is CIOs with <80% satisfaction score.">

    Info-Tech Insight

    The data shows that effective IT leaders invest a significant amount of time (8%) on vendor management initiatives.

    Be proactive in managing you calendar and block time for these important tasks.

    CIOs who prioritize vendor management see improved results

    Analysis of CIOs’ calendars revealed that how CIOs spend their time has a correlation to both stakeholder IT satisfaction and CEO-CIO alignment.

    Those CIOs that prioritized vendor management were more likely to have a business satisfaction score greater than 80%.

    This image demonstrates that CIOs who spend time with the team members of their direct reports delegate management responsibilities to direct reports and spend less time micromanaging, and CIOs who spend time on vendor management align rapidly changing business needs with updated vendor offerings.

    2.3.1 Rate your vendor and product satisfaction

    30 minutes

    Use Info-Tech’s vendor satisfaction survey to identify optimization areas with your CRM product(s) and vendor(s).

    Option 1 (recommended): Conduct a satisfaction survey using SoftwareReviews. This option allows you to see your results in the context of the vendor landscape.

    Download the Get the Most Out of Your CRM Workbook

    Option 2: Use your Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization,” to review your satisfaction with your software.

    SoftwareReviews’ Customer Relationship Management

    This is a screenshot of tab 6 of the Get the most out of your CRM Workbook.

    2.3.2 Enter SoftwareReviews scores (optional)

    30 minutes

    1. Download the scorecard for your CRM product from the SoftwareReviews website. (Note: Not all products are represented or have sufficient data, so a scorecard may not be available.)
    2. Use your Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization,” to record the scorecard results.
    3. Use your Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization,” to flag areas where your score may be lower than the product scorecard. Brainstorm ideas for optimization.

    Download the Get the Most Out of Your CRM Workbook

    SoftwareReviews’ Customer Relationship Management

    This is a screenshot of the optional vendor optimization scorecard

    Phase 3

    Build Your Optimization Roadmap

    • 3.1 Identify Key Optimization Areas
    • 3.2 Compile Optimization Assessment Results

    Get the Most Out of Your CRM

    This phase will walk you through the following activities:

    • Identify key optimization areas
    • Create an optimization roadmap

    This phase involves the following participants:

    • CRM Optimization Team

    Build your optimization roadmap

    Address process gaps

    • CRM and related technologies are invaluable to sales, marketing, and customer service enablement, but they must have supported processes driven by business goals.
    • Identify areas where capabilities need to be improved and work towards.

    Support user satisfaction

    • The best technology in the world won’t deliver business results if it is not working for the users who need it.
    • Understand concerns, communicate improvements, and support users in all roles.

    Improve data quality

    • Data quality is unique to each business unit and requires tolerance, not perfection.
    • Implement a set of data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.

    Proactively manage vendors

    • Vendor management is a critical component of technology enablement and IT satisfaction.
    • Assess your current satisfaction against those of your peers and work towards building a process that is best fit for your organization.

    Info-Tech Insight

    Enabling a high-performing, customer-centric sales, marketing, and customer service operations program requires excellent management practices and continuous optimization efforts.

    Technology portfolio and architecture is important, but we must go deeper. Taking a holistic view of CRM technologies in the environments in which they operate allows for the inclusion of people and process improvements – this is key to maximizing business results.

    Using a formal CRM optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process improvement.

    Step 3.1

    Identify Key Optimization Areas

    Activities

    • 3.1.1 Explore process gaps
    • 3.1.2 Analyze user satisfaction
    • 3.1.3 Assess data quality
    • 3.1.4 Analyze product satisfaction and vendor management

    Build Your Optimization Roadmap

    This step will guide you through the following activities:

    • Explore existing process gaps
    • Identify the impact of processes on user satisfaction
    • Identify the impact of data quality on user satisfaction
    • Review your overall product satisfaction and vendor management

    This step involves the following participants:

    • CRM Optimization Team

    Outcomes of this step

    • Application optimization plan

    3.1.1 Explore process gaps

    1 hour

    1. Review the compiled CRM Process Assessment in the Get the Most Out of Your CRM Workbook, tab “7. Process Prioritization.”
    2. These are processes you should prioritize.
    • The activities in the rest of Step 3.1 help you create optimization strategies for the different areas of improvement these processes relate to: user satisfaction, data quality, product satisfaction, and vendor management.
  • Consolidate your optimization strategies in the Get the Most Out of Your CRM Workbook, tab “8. Optimization Roadmap.” (See next slide for screenshot.)
  • This image consists of the CRM Process Importance Rankings

    Get the Most Out of Your CRM Workbook

    Plan your product optimization strategy for each area of improvement

    This is a screenshot from the Get the most out of your CRM Workbook, with the Areas of Improvement column  highlighted in a red box.

    3.1.2 Analyze user satisfaction

    1 hour

    1. Use the APA survey results from activity 2.2.1 (or your own internal survey) to identify areas where the organization is performing low in user satisfaction across the CRM portfolio.
      1. Understand application portfolio and IT service satisfaction.
      2. Identify cost savings opportunities from unused or unimportant apps.
      3. Build a roadmap for improving user IT services.
      4. Manage needs by department and seniority.
    2. Consolidate your optimization strategies in the Get the Most Out of Your CRM Workbook, tab “8. Optimization Roadmap.” (See next slide for screenshot.)

    this is an image of the Business & IT Communications Overview Tab from the Get the Most Out of Your CRM Workbook

    Get the Most Out of Your CRM Workbook

    Plan your user satisfaction optimization strategy

    This is a screenshot from the Get the most out of your CRM Workbook, with the Optimization Strategies column  highlighted in a red box.

    Next steps in improving your data quality

    Data Quality Management Effective Data Governance Data-Centric Integration Strategy Extensible Data Warehousing
    • Prevention is ten times cheaper than remediation. Stop fixing data quality with band-aid solutions and start fixing it by healing it at the source of the problem.
    • Data governance enables data-driven insight. Think of governance as a structure for making better use of data.
    • Every enterprise application involves data integration. Any change in the application and database ecosystem requires you to solve a data integration problem.
    • A data warehouse is a project; but successful data warehousing is a program. An effective data warehouse requires planning beyond the technology implementation.
    • Data quality is unique to each business unit and requires tolerance, not perfection. If the data allows the business to operate at the desired level, don’t waste time fixing data that may not need to be fixed.
    • Collaboration is critical. The business may own the data, but IT understands the data. Data governance will not work unless the business and IT work together.
    • Data integration is becoming more and more critical for downstream functions of data management and for business operations to be successful. Poor integration holds back these critical functions.
    • Governance, not technology, needs to be the core support system for enabling a data warehouse program.
    • Implement a set of data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.
    • Data governance powers the organization up the data value chain through policies and procedures, master data management, data quality, and data architecture.
    • Build your data integration practice with a firm foundation in governance and reference architecture. Ensure your process is scalable and sustainable.
    • Leverage an approach that focuses on constructing a data warehouse foundation that can address a combination of operational, tactical, and ad hoc business needs.
    • Develop a prioritized data quality improvement project roadmap and long-term improvement strategy.
    • Create a roadmap to prioritize initiatives and delineate responsibilities among data stewards, data owners, and members of the data governance steering committee.
    • Support the flow of data through the organization and meet the organization’s requirements for data latency, availability, and relevancy.
    • Invest time and effort to put together pre-project governance to inform and provide guidance to your data warehouse implementation.
    • Build related practices with more confidence and less risk after achieving an appropriate level of data quality.
    • Ensure buy-in from the business and IT stakeholders. Communicate initiatives to end users and executives to reduce resistance.
    • Data availability must be frequently reviewed and repositioned to continue to grow with the business.
    • Select the most suitable architecture pattern to ensure the data warehouse is “built right” at the very beginning.

    Build Your Data Quality Program

    Establish Data Governance

    Build a Data Integration Strategy

    Build an Extensible Data Warehouse Foundation

    3.1.3 Assess data quality

    1 hour

    1. Use your APA survey results (if available) to identify areas where the organization is performing low in data quality initiatives. Common areas for improvement include:
      • Overall data quality management
      • Effective data governance
      • Poor data integration
      • The need to implement extensible data warehousing
    2. Consolidate your optimization strategies in the Get the Most Out of Your CRM Workbook, tab “8. Optimization Roadmap.” (See next slide for screenshot.)

    This is an image of the Business & IT Communications Overview tab from the Get the most out of your CRM Workbook

    Get the Most Out of Your CRM Workbook

    Plan your data quality optimization strategy

    This is a screenshot from the Get the most out of your CRM Workbook, with the Optimization Strategies column  highlighted in a red box.

    Use Info-Tech’s vendor management initiative (VMI)

    Create a right-size, right-fit strategy for managing the vendors relevant to your organization.

    A crowd chart is depicted, with quadrants for strategic value, and Vendor spend/switching cost.

    Info-Tech Insight

    A VMI is a formalized process within an organization, responsible for evaluating, selecting, managing, and optimizing third-party providers of goods and services.

    The amount of resources you assign to managing vendors depends on the number and value of your organization’s relationships. Before optimizing your vendor management program around the best practices presented in this blueprint, assess your current maturity and build the process around a model that reflects the needs of your organization.

    Info-Tech uses VMI interchangeably with the terms “vendor management office (VMO),” “vendor management function,” “vendor management process,” and “vendor management program.”

    Jump Start Your Vendor Management Initiative

    3.1.4 Analyze product satisfaction and vendor management

    1 hour

    1. Use the Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization.”
    2. Download the SoftwareReviews Vendor Scorecard.
    3. Using the scorecards, compare your results with those of your peers.
    4. Consolidate areas of improvement and optimization strategies in the Get the Most Out of Your CRM Workbook, tab “8. Optimization Roadmap.” (See next slide for screenshot.)

    See previous slide for help around implementing a vendor management initiative.

    This is a screenshot from the Get the most out of your CRM Workbook, with the Areas for Optimization column  highlighted in a red box.

    Get the Most Out of Your CRM Workbook

    Plan your vendor management optimization strategy

    This is a screenshot from the Get the most out of your CRM Workbook, with the Optimization Strategies column  highlighted in a red box.

    Step 3.2

    Compile Optimization Assessment Results

    Activities

    • 3.2.1 Identify key optimization areas

    Build Your Optimization Roadmap

    This step will guide you through the following activities:

    • Use your work from previous activities and prioritization to build your list of optimization activities and lay them out on a roadmap

    This step involves the following participants:

    • CRM Optimization Team

    Outcomes of this step

    • Application optimization plan

    3.2.1 Identify key optimization areas

    1-3 hours

    Before you can make changes and optimization decisions, you need to understand the high-level costs associated with your current application architecture. This activity will help you identify the types of technology and people costs associated with your current systems.

    1. Consolidate your findings and identify optimization priorities (Step 3.1).
    2. Prioritize those most critical to the organization, easiest to change, and whose impact will be highest.
    3. Use the information gathered from exercise 1.5.1 on Get the Most Out of Your CRM Workbook, tab “9. Costs (Optional).”
    4. These costs could affect the priority or timeline of the initiatives. Consolidate your thoughts on your Get the Most Out of Your CRM Workbook, tab 8, “Optimization Roadmap.” Note: There is no column specific to costs on tab 8.

    This is meant as a high-level roadmap. For formal, ongoing optimization project management, refer to “Build a Better Backlog” (Phase 2 of the Info-Tech blueprint Deliver on Your Digital Product Vision).

    This is a screenshot from the Get the most out of your CRM Workbook, with the Priority; Owner; and Timeline columns highlighted in a red box.

    Next steps: Manage your technical debt

    Use a holistic assessment of the “interest” paid on technical debt to quantify and prioritize risk and enable the business make better decisions.

    • Technical debt is an IT risk, which in turn is a category of business risk.
    • The business must decide how to manage business risk.
    • At the same time, business decision makers may not be aware of technical debt or be able to translate technical challenges into business risk. IT must help the business make decisions around IT risk by describing the risk of technical debt in business terms and by outlining the options available to address risk.
    • Measure the ongoing business impact (the “interest” paid on technical debt) to establish the business risk of technical debt. Consider a range of possible impacts including direct costs, lost goodwill, lost flexibility and resilience, and health, safety, and compliance impacts.
    • When weighing these impacts, the business may choose to accept the risk of technical debt if the cost of addressing the debt outweighs the benefit. But it’s critically important that the business accepts that risk – not IT.

    Manage Your Technical Debt

    Take it a step further…

    Deliver on Your Digital Product Vision

    Phase 2: Build a Better Product Backlog

    Build a structure for your backlog that supports your product vision.

    Deliver on Your Digital Product Vision

    Build a better backlog

    An ongoing CRM optimization effort is best facilitated through a continuous Agile process. Use info-Tech’s developed tools to build out your backlog.

    The key to a better backlog is a common structure and guiding principles that product owners and product teams can align to.

    Info-Tech Insight

    Exceptional customer value begins with a clearly defined backlog focused on items that will create the greatest human and business benefits.

    Activity Participants

    Backlog Activity

    Quality Filter

    Product Manager

    Product Owner

    Dev Team

    Scrum Master

    Business

    Architects

    Sprint

    Sprint Planning

    “Accepted”

    Ready

    Refine

    “Ready”

    Qualified

    Analysis

    “Qualified”

    Ideas

    Intake

    “Backlogged”

    A product owner and the product backlog are critical to realize the benefits of Agile development

    A product owner is accountable for defining and prioritizing the work that will be of the greatest value to the organization and its customers. The backlog is the key to facilitating this process and accomplishing the most fundamental goals of delivery.

    For more information on the role of a product owner, see Build a Better Product Owner.

    Highly effective Agile teams spend 28% of their time on product backlog management and roadmapping (Quantitative Software Management, 2015).

    1. Manage Stakeholders

    • Stakeholders need to be kept up to speed on what the future holds for a product, or at least they should be heard. This task falls to the product owner.

    2. Inform and Protect the Team

    • The product owner is a servant leader of the team. They need to protect the team from all the noise and give them the time they need to focus on what they do best: develop.

    3. Maximize Value to the Product

    • Sifting through all of these voices and determining what is valuable, or what is most valuable, falls to the product owner.

    A backlog stores and organizes PBIs at various stages of readiness.

    Your backlog must give you a holistic understanding of demand for change in the product

    A well-formed backlog can be thought of as a DEEP backlog:

    Detailed Appropriately: PBIs are broken down and refined as necessary.

    Emergent: The backlog grows and evolves over time as PBIs are added and removed.

    Estimated: The effort a PBI requires is estimated at each tier.

    Prioritized: The PBI’s value and priority are determined at each tier.

    Ideas; Qualified; Ready

    3 - IDEAS

    Composed of raw, vague, and potentially large ideas that have yet to go through any formal valuation.

    2 - QUALIFIED

    Researched and qualified PBIs awaiting refinement.

    1 - READY

    Discrete, refined PBIs that are ready to be placed in your development teams’ sprint plans.

    Summary of Accomplishment

    Get the Most Out of Your CRM

    CRM technology is critical to facilitate an organization’s relationships with customers, service users, employees, and suppliers. CRM implementation should not be a one-and-done exercise. There needs to be an ongoing optimization to enable business processes and optimal organizational results.

    Get the Most Out of Your CRM allows organizations to proactively implement continuous assessment and optimization of a customer relationship management system. This includes:

    • Alignment and prioritization of key business and technology drivers
    • Identification of CRM processes including classification and gap analysis
    • Measurement of user satisfaction across key departments
    • Improved vendor relations
    • Data quality initiatives

    This formal CRM optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process-improvement.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

    Contact your account representative for more information

    workshops@infotech.com
    1-866-670-8889

    Research Contributors

    Ben Dickie

    Ben Dickie
    Research Practice Lead
    Info-Tech Research Group

    Ben Dickie is a Research Practice Lead at Info-Tech Research Group. His areas of expertise include customer experience management, CRM platforms, and digital marketing. He has also led projects pertaining to enterprise collaboration and unified communications.

    Scott Bickley

    Scott Bickley
    Practice Lead & Principal Research Director
    Info-Tech Research Group

    Scott Bickley is a Practice Lead & Principal Research Director at Info-Tech Research Group focused on vendor management and contract review. He also has experience in the areas of IT asset management (ITAM), software asset management (SAM), and technology procurement, along with a deep background in operations, engineering, and quality systems management.

    Andy Neil

    Andy Neil
    Practice Lead, Applications
    Info-Tech Research Group

    Andy is Senior Research Director, Data Management and BI, at Info-Tech Research Group. He has over 15 years of experience in managing technical teams, information architecture, data modeling, and enterprise data strategy. He is an expert in enterprise data architecture, data integration, data standards, data strategy, big data, and the development of industry-standard data models.

    Bibliography

    Armel, Kate. “Data-driven Estimation, Management Lead to High Quality.” Quantitative Software Management Inc. 2015. Web.

    Chappuis, Bertil, and Brian Selby. “Looking beyond Technology to Drive Sales Operations.” McKinsey & Company, 24 June 2016. Web.

    Cross-Industry Process Classification Framework (PCF) Version 7.2.1. APQC, 26 Sept. 2019. Web.

    Fleming, John, and Hater, James. “The Next Discipline: Applying Behavioral Economics to Drive Growth and Profitability.” Gallup, 22 Sept. 2012. Accessed 6 Oct. 2020.

    Hinchcliffe, Dion. “The evolving role of the CIO and CMO in customer experience.” ZDNet, 22 Jan. 2020. Web.

    Karlsson, Johan. “Backlog Grooming: Must-Know Tips for High-Value Products.” Perforce. 18 May 2018. Web. Feb. 2019.

    Klie, L. “CRM Still Faces Challenges, Most Speakers Agree: CRM systems have been around for decades, but interoperability and data siloes still have to be overcome.” CRM Magazine, vol. 23, no. 5, 2019, pp. 13-14.

    Kumar, Sanjib, et al. “Improvement of CRM Using Data Mining: A Case Study at Corporate Telecom Sector.” International Journal of Computer Applications, vol. 178, no. 53, 2019, pp. 12-20, doi:10.5120/ijca2019919413.

    Morgan, Blake. “50 Stats That Prove The Value Of Customer Experience.” Forbes, 24 Sept. 2019. Web.

    Norelus, Ernese, et al. “An Approach to Application Modernization: Discovery and Assessment Phase.” IBM Garage, Medium, 24 Feb 2020. Accessed 4 Mar. 2020.

    “Process Frameworks.” APQC, 4 Nov. 2020. Web.

    “Process vs. Capability: Understanding the Difference.” APCQ, 2017. Web.

    Rubin, Kenneth S. "Essential Scrum: A Practical Guide to the Most Popular Agile Process." Pearson Education, 2012.

    Savolainen, Juha, et al. “Transitioning from Product Line Requirements to Product Line Architecture.” 29th Annual International Computer Software and Applications Conference (COMPSAC'05), IEEE, vol. 1, 2005, pp. 186-195, doi: 10.1109/COMPSAC.2005.160

    Smith, Anthony. “How To Create A Customer-Obsessed Company Like Netflix.” Forbes, 12 Dec. 2017. Web.

    “SOA Reference Architecture – Capabilities and the SOA RA.” The Open Group, TOGAF. Web.

    Taber, David. “What to Do When Your CRM Project Fails.” CIO Magazine, 18 Sept. 2017. Web.

    “Taudata Case Study.” Maximizer CRM Software, 17 Jan. 2020. Web.

    Data security consultancy

    Data security consultancy

    Based on experience
    Implementable advice
    human-based and people-oriented

    Data security consultancy makes up one of Tymans Group’s areas of expertise as a corporate consultancy firm. We are happy to offer our insights and solutions regarding data security and risk to businesses, both through online and offline channels. Read on and discover how our consultancy company can help you set up practical data security management solutions within your firm.

    How our data security consultancy services can help your company

    Data security management should be an important aspect of your business. As a data security consultancy firm, Tymans Group is happy to assist your small or medium-sized enterprise with setting up clear protocols to keep your data safe. As such, we can advise on various aspects comprising data security management. This ranges from choosing a fit-for-purpose data architecture to introducing IT incident management guidelines. Moreover, we can perform an external IT audit to discover which aspects of your company’s data security are vulnerable and which could be improved upon.

    Security and risk management

    Our security and risk services

    Security strategy

    Security Strategy

    Embed security thinking through aligning your security strategy to business goals and values

    Read more

    Disaster Recovery Planning

    Disaster Recovery Planning

    Create a disaster recovey plan that is right for your company

    Read more

    Risk Management

    Risk Management

    Build your right-sized IT Risk Management Program

    Read more

    Check out all our services

    Discover our practical data security management solutions

    Data security is just one aspect with which our consultancy firm can assist your company. Tymans Group offers its extensive expertise in various corporate management domains, such as quality management and risk management. Our solutions all stem from our vast expertise and have proven their effectiveness. Moreover, when you choose to employ our consultancy firm for your data security management, you benefit from a holistic, people-oriented approach.

    Set up an appointment with our experts

    Do you wish to learn more about our data security management solutions and services for your company? We are happy to analyze any issues you may be facing and offer you a practical solution if you contact us for an appointment. You can book a one-hour online talk or elect for an on-site appointment with our experts. Contact us to set up your appointment now.

    Register to read more …

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Optimize Applications Release Management

      • Buy Link or Shortcode: {j2store}406|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $44,874 Average $ Saved
      • member rating average days saved: 21 Average Days Saved
      • Parent Category Name: Testing, Deployment & QA
      • Parent Category Link: /testing-deployment-and-qa
      • The business demands high service and IT needs to respond. Rapid customer response through efficient release and deployment is critical to maintain high business satisfaction.
      • The lack of process ownership leads to chaotic and uncoordinated releases, resulting in costly rework and poor hand-offs.
      • IT emphasizes tools but release tools and technologies alone will not fix the problem. Tools are integrated into the processes they support – if the process challenges aren’t addressed first, then the tool won’t help.
      • Releases are traditionally executed in silos with limited communication across the entire release pipeline. Culturally, there is little motivation for cross-functional collaboration and holistic process optimization.

      Our Advice

      Critical Insight

      • Release management is not solely driven by tools. It is about delivering high quality releases on time through accountability and governance aided by the support of tools.
      • Release management is independent of your software development lifecycle (SDLC). Release management practices sit as an agnostic umbrella over your chosen development methodology.
      • Ownership of the entire process is vital. Release managers ensure standards are upheld and the pipeline operates efficiently.

      Impact and Result

      • Acquire release management ownership. Ensure there is appropriate accountability for speed and quality of the releases passing through the entire pipeline. A release manager has oversight over the entire release process and facilitates the necessary communication between business stakeholders and various IT roles.
      • Instill holistic thinking. Release management includes all steps required to push release and change requests to production along with the hand-off to Operations and Support. Increase the transparency and visibility of the entire pipeline to ensure local optimizations do not generate bottlenecks in other areas.
      • Standardize and lay a strong release management foundation. Optimize the key areas where you are experiencing the most pain and continually improve.

      Optimize Applications Release Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize release management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review your release management objectives

      Assess the current state and define the drivers behind your release management optimizations.

      • Optimize Applications Release Management – Phase 1: Review Your Release Management Objectives
      • Release Management Process Standard Template
      • Release Management Maturity Assessment

      2. Standardize release management

      Design your release processes, program framework, and release change management standards, and define your release management team.

      • Optimize Applications Release Management – Phase 2: Standardize Release Management
      • Release Manager

      3. Roll out release management enhancements

      Create an optimization roadmap that fits your context.

      • Optimize Applications Release Management – Phase 3: Roll Out Release Management Enhancements
      [infographic]

      Workshop: Optimize Applications Release Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review Your Release Management Objectives

      The Purpose

      Reveal the motivators behind the optimization of release management.

      Identify the root causes of current release issues and challenges.

      Key Benefits Achieved

      Ensure business alignment of optimization efforts.

      Firm grasp of why teams are facing release issues and the impacts they have on the organization.

      Activities

      1.1 Identify the objectives for application release.

      1.2 Conduct a current state assessment of release practices.

      Outputs

      Release management business objectives and technical drivers

      Current state assessment of release processes, communication flows, and tools and technologies

      2 Standardize Release Management

      The Purpose

      Alleviate current release issues and challenges with best practices.

      Standardize a core set of processes, tools, and roles & responsibilities to achieve consistency, cadence, and transparency.

      Key Benefits Achieved

      Repeatable execution of the same set of processes to increase the predictability of release delivery.

      Defined ownership of release management.

      Adaptable and flexible release management practices to changing business and technical environments.

      Activities

      2.1 Strengthen your release process.

      2.2 Coordinate releases with a program framework.

      2.3 Manage release issues with change management practices.

      2.4 Define your release management team.

      Outputs

      Processes accommodating each release type and approach the team is required to complete

      Release calendars and program framework

      Release change management process

      Defined responsibilities and accountabilities of release manager and release management team

      3 Roll Out Release Management Enhancements

      The Purpose

      Define metrics to validate release management improvements.

      Identify the degree of oversight and involvement of the release management team.

      Prioritize optimization roadmap against business needs and effort.

      Key Benefits Achieved

      Easy-to-gather metrics to measure success that can be communicated to stakeholders.

      Understanding of how involved release management teams are in enforcing release management standards.

      Practical and achievable optimization roadmap.

      Activities

      3.1 Define your release management metrics.

      3.2 Ensure adherence to standards.

      3.3 Create your optimization roadmap.

      Outputs

      List of metrics to gauge success

      Oversight and reporting structure of release management team

      Release management optimization roadmap

      The First 100 Days as CISO

      • Buy Link or Shortcode: {j2store}248|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: 50 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Make a good first impression at your new job.
      • Obtain guidance on how you should approach the first 100 days.
      • Assess the current state of the security program and recommend areas of improvement and possible solutions.
      • Develop a high-level security strategy in three months.

      Our Advice

      Critical Insight

      • Every CISO needs to follow Info-Tech’s five-step approach to truly succeed in their new position. The meaning and expectations of a CISO role will differ from organization to organization and person to person, however, the approach to the new position will be relatively the same.
      • Eighty percent of your time will be spent listening. The first 100 days of the CISO role is an information gathering exercise that will involve several conversations with different stakeholders and business divisions. Leverage this collaborative time to understand the business, its internal and external operations, and its people. Unequivocally, active listening will build company trust and help you to build an information security vision that reflects that of the business strategy.
      • Start “working” before you actually start the job. This involves finding out as much information about the company before officially being an employee. Investigate the company website and leverage available organizational documents and initial discussions to better understand your employer’s leadership, company culture ,and business model.

      Impact and Result

      • Hit the ground running with Info-Tech’s ready-made agenda vetted by CISO professionals to impress your colleagues and superiors.
      • Gather details needed to understand the organization (i.e. people, process, technology) and determine the current state of the security program.
      • Track and assess high-level security gaps using Info-Tech’s diagnostic tools and compare yourself to your industry’s vertical using benchmarking data.
      • Deliver an executive presentation that shows key findings obtained from your security evaluation.

      The First 100 Days as CISO Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why the first 100 days of being a CISO is a crucial time to be strategic. Review Info-Tech’s methodology and discover our five-step approach to CISO success.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare

      Review previous communications to prepare for your first day.

      • CISO Diary
      • Introduction Sheet

      2. Build relationships

      Understand how the business operates and develop meaningful relationships with your sphere of influence.

      3. Inventory components of the business

      Inventory company assets to know what to protect.

      4. Assess security posture

      Evaluate the security posture of the organization by leveraging Info-Tech’s IT Security diagnostic program.

      • Diagnostic Benchmarks: Security Governance & Management Scorecard
      • Diagnostic Benchmarks: Security Business Satisfaction Report

      5. Deliver plan

      Communicate your security vision to business stakeholders.

      • The First 100 Days as CISO Executive Presentation Template
      • The First 100 Days as CISO Executive Presentation Example
      [infographic]

      Start Making Data-Driven People Decisions

      • Buy Link or Shortcode: {j2store}427|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Leadership Development Programs
      • Parent Category Link: /leadership-development-programs
      • Ninety-one percent of IT leaders believe that analytics is important for talent management but 59% use no workforce analytics at all, although those who use analytics are much more effective than those who don't.
      • The higher the level of analytics used, the higher the level of effectiveness of the department as a whole.

      Our Advice

      Critical Insight

      • You don't need advanced metrics and analytics to see a return on people data. Begin by getting a strong foundation in place and showing the ROI on a pilot project.
      • Complex analyses will never make up for inadequate data quality. Spend the time up front to audit and improve data quality if necessary, no matter which stage of analytics proficiency you are at.
      • Ensure you collect and analyze only data that is essential to your decision making. More is not better, and excess data can detract from the overall impact of analytics.

      Impact and Result

      • Build a small-scale foundational pilot, which will allow you to demonstrate feasibility, refine your costs estimate, and show the ROI on people analytics for your budgeting meeting.
      • Drive organizational change incrementally by identifying and communicating with the stakeholders for your people analytics pilot.
      • Choose basic analytics suitable for organizations of all sizes and understand the building blocks of data quality to support more further analytics down the line.

      Start Making Data-Driven People Decisions Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should strategically apply people analytics to your IT talent management.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define the problem and apply the checklist

      From choosing the right data for the right problem to evaluating your progress toward data-driven people decisions, follow these steps to build your foundation to people analytics.

      • Start Making Data-Driven People Decisions – Phase 1: Define the Problem and Apply the Checklist
      • People Analytics Strategy Template
      • Talent Metrics Library
      [infographic]

      Identify and Manage Strategic Risk Impacts on Your Organization

      • Buy Link or Shortcode: {j2store}219|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.

      A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential strategic impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes affect strategic plans.
      • Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.

      Impact and Result

      • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Risk Impact Tool.

      Identify and Manage Strategic Risk Impacts on Your Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Manage Strategic Risk Impacts to Your Organization Deck – Use the research to better understand the negative impacts of vendor actions on your strategic plans.

      Use this research to identify and quantify the potential strategic impacts caused by vendors. Use Info-Tech’s approach to look at the strategic impact from various perspectives to better prepare for issues that may arise.

      • Identify and Manage Strategic Risk Impacts on Your Organization Storyboard

      2. What If Vendor Strategic Impact Tool – Use this tool to help identify and quantify the strategic impacts of negative vendor actions

      By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Strategic Risk Impact Tool
      [infographic]

      Further reading

      Identify and Manage Strategic Risk Impacts on Your Organization

      The world is in a perpetual state of change. Organizations need to build adaptive resiliency into their strategic plans to adjust to ever-changing market dynamics.

      Analyst perspective

      Organizations need to build flexible resiliency into their strategic plans to be able to adjust to ever-changing market dynamics.

      This is a picture of Frank Sewell, Research Director, Vendor Management at Info-Tech Research Group

      Like most people, organizations are poor at assessing the likelihood of risk. If the past few years have taught us anything, it is that the probability of a risk occurring is far more flexible in the formula Risk = Likelihood * Impact than we ever thought possible. The impacts of these risks have been catastrophic, and organizations need to be more adaptive in managing them to strengthen their strategic plans.

      Frank Sewell,
      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.

      A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.

      Common Obstacles

      Identifying and managing a vendor’s potential strategic impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes affect strategic plans.

      Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.

      Info-Tech’s Approach

      Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Impacts Tool.

      Info-Tech Insight

      Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market. Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.

      This image depicts a cube divided into six different coloured sections. The sections are labeled: Financial; Reputational; Operational; Strategic; Security; Regulatory & Compliance.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of Scope:

      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      Strategic risk impacts

      Potential losses to the organization due to risks to the strategic plan

      • In this blueprint, we’ll explore strategic risks (risks to the Strategic Plans of the organization) and their impacts.
      • Identify potentially disruptive events to assess the overall impact on organizations and implement adaptive measures to correct strategic plans.
      This image depicts a cube divided into six different coloured sections. The section labeled Strategic is highlighted.

      The world is constantly changing

      The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

      When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

      Below are some things no one expected to happen in the last few years:

      62%

      of IT professionals are more concerned about being a victim of ransomware than they were a year ago.

      82%

      of Microsoft’s non-essential employees shifted to working from home in 2020, joining the 18% already remote.

      89%

      of organizations invested in web conferencing technology to facilitate collaboration.

      Source: Info-Tech Tech Trends Survey 2022

      Strategic risks on a global scale

      Odds are at least one of these is currently affecting your strategic plans

      • Vendor Acquisitions
      • Global Pandemic
      • Global Shortages
      • Gas Prices
      • Poor Vendor Performance
      • Travel Bans
      • War
      • Natural Disasters
      • Supply Chain Disruptions
      • Security Incidents

      Make sure you have the right people at the table to identify and plan to manage impacts.

      Identify & manage strategic risks

      Global Pandemic

      Very few people could have predicted that a global pandemic would interrupt business on the scale experienced today. Organizations should look at their lessons learned and incorporate adaptable preparations into their strategic planning moving forward.

      Vendor Acquisitions

      The IT market is an ever-shifting environment. Larger companies often gobble up smaller ones to control their sectors. Incorporating plans to manage those shifts in ownership will be key to many strategic plans that depend on niche vendor solutions for success. Be sure to monitor the potentially affected markets on an ongoing cadence.

      Global Shortages

      Organizations need to accept that shortages will recur periodically and that preparing for them will significantly increase the success potential of long-term strategic plans. Understand what your business needs to stock for project needs and where those supplies are located, and plan how to rapidly access and distribute them as required if supply chain disruptions occur.

      What to look for in vendors

      Identify strategic risk impacts

      • A vendor acquires many smaller, seemingly irrelevant IT products. Suddenly their revenue model includes aggressive license compliance audits.
        • Ensure that your installed software meets license compliance requirements with good asset management practices.
        • Monitor the market for such acquisitions or news of audits hitting companies.
      • A vendor changes their primary business model from storage and hardware to becoming a self-proclaimed “professional services guru,” relying almost entirely on their name recognition to build their marketing.
        • Be wary of self-proclaimed experts and review their successes and failures with other organizations before adopting them into your business strategy.
        • Review the backgrounds their “experts” have and make sure they have the industry and technical skill sets to perform the services to the required level.

      Not preparing for your growth can delay your goals

      Why can’t I get a new laptop?

      For example:

      • An IT professional services organization plans to take advantage of the growing work-from-home trend to expand its staff by 30% over the coming year.
      • Logically, this should include a review of the necessary tasks involved, including onboarding.
        • Suppose the company does not order enough equipment in preparation to cover the new staff plus routine replacement. In that case, this will delay the output of the new team members immeasurably as they wait for their company equipment and will delay existing staff whose equipment breaks, preventing them from getting back to work efficiently.

      Sometimes an organization has the right mindset to take advantage of the changes in the market but can fail to plan for the particulars.

      When your strategic plan changes, you need to revisit all the steps in the processes to ensure a successful outcome.

      Strategic risks

      Poor or uninformed business decisions can lead to organizational strategic failures

      • Supply chain disruptions and global shortages
        • Geopolitical disruptions and natural disasters have caused unprecedented interruptions to business. Incorporate forecasting of product and ongoing business continuity planning into your strategic plans to adapt as events unfold.
      • Poor vendor performance
        • Consider the impact of a vendor that fails to perform midway through the implementation. Organizations need to be able to manage the impact of replacing that vendor and cutting their losses rather than continuing to throw good money away after bad performance.
      • Vendor acquisitions
        • A lot of acquisition is going on in the market today. Large companies are buying competitors and either imposing new terms on customers or removing the competing products from the market. Prepare options for any strategy tied to a niche product.

      It is important to identify potential risks to strategic plans to manage the risk and be agile enough in planning to adapt to the changing environments.

      Info-Tech Insight
      Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.

      Prepare your strategic risk management for success

      Due diligence will enable successful outcomes

      1. Obtain top-level buy-in; it is critical to success.
      2. Build enterprise risk management (ERM) through incremental improvement.
      3. Focus initial efforts on the “big wins” to prove the process works.
      4. Use existing resources.
      5. Build on any risk management activities that already exist in the organization.
      6. Socialize ERM throughout the organization to gain additional buy‑in.
      7. Normalize the process long term with ongoing updates and continuing education for the organization.

      (Adapted from COSO)

      How to assess strategic risk

      1. Review Organizational Strategy
        Understand the organizational strategy to prepare for the “What If” game exercise.
      2. Identify & Understand Potential Strategic Risks
        Play the “What If” game with the right people at the table.
      3. Create a Risk Profile Packet for Leadership
        Pull all the information together in a presentation document.
      4. Validate the Risks
        Work with leadership to ensure that the proposed risks are in line with their thoughts.
      5. Plan to Manage the Risks
        Lower the overall risk potential by putting mitigations in place.
      6. Communicate the Plan
        It is important not only to have a plan but also to socialize it in the organization for awareness.
      7. Enact the Plan
        Once the plan is finalized and socialized, put it in place with continued monitoring for success.

      Insight summary

      Insight 1

      Organizations build portions of their strategies around chosen vendors and should protect those plans against the risks of unforeseen acquisitions in the market.
      Is your vendor solvent? Does it have enough staff to accommodate your needs? Has its long-term planning been affected by changes in the market? Is it unique in its space?

      Insight 2

      Organizations’ strategic plans need to be adaptable to avoid vendors’ negative actions causing an expedited shift in priorities.
      For example, Philip's recall of ventilators impacted its products and the availability of its competitor’s products as demand overwhelmed the market.

      Insight 3

      Organizations need to become better at risk assessment and actively manage the identified risks to their strategic plans.
      Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.

      Strategic risk impacts are often unanticipated, causing unforeseen downstream effects. Anticipating the potential changes in the global IT market and continuously monitoring vendors’ risk levels can help organizations modify their strategic alignment with the new norms.

      Identifying strategic risk

      Who should be included in the discussion

      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make informed decisions.
      • Getting input from operational experts at your organization will enhance the long-term potential for success of your strategies.
      • Involving those who directly manage vendors and understand the market will aid operational experts in determining the forward path for relationships with your current vendors and identifying new emerging potential strategic partners.

      Review your strategic plans for new risks and evolving likelihood on a regular basis.

      Keep in mind Risk = Likelihood x Impact (R=L*I).

      Impact (I) tends to remain the same, while Likelihood (L) is a very flexible variable.

      See the blueprint Build an IT Risk Management Program

      Managing strategic risk impacts

      What can we realistically do about the risks?

      • Review business continuity plans and disaster recovery testing.
      • Institute proper contract lifecycle management.
      • Re-evaluate corporate policies frequently.
      • Develop IT governance and change control.
      • Ensure strategic alignment in contracts.
      • Introduce continual risk assessment to monitor the relevant vendor markets.
        • Regularly review your strategic plans for new risks and evolving likelihood.
        • Risk = Likelihood x Impact (R=L*I)
          • Impact (I) tends to remain the same and be well understood, while Likelihood (L) turns out to be highly variable.
      • Be adaptable and allow for innovations that arise from the current needs.
        • Capture lessons learned from prior incidents to improve over time, and adjust your strategy based on the lessons.

      Organizations need to be reviewing their strategic risk plans considering the likelihood of incidents in the global market.

      Pandemics, extreme weather, and wars that affect global supply chains are a current reality, not unlikely scenarios.

      Ongoing Improvement

      Incorporating lessons learned

      • Over time, despite everyone’s best observations and plans, incidents will catch us off guard.
      • When it happens, follow your incident response plans and act accordingly.
      • An essential step is to document what worked and what did not – collectively known as the “lessons learned.”
      • Use the lessons learned document to devise, incorporate, and enact a better risk management process.

      Sometimes disasters occur despite our best plans to manage them.

      When this happens, it is important to document the lessons learned and improve our plans going forward.

      The “what if” game

      1-3 hours

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (or if too small, continue as a single group).
      2. Use the Strategic Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potentials but manage the overall process to keep the discussion pertinent and on track.
      3. Collect the outputs and ask the subject matter experts (SMEs) for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Strategic Risk Impact Tool

      Input Output
      • List of identified potential risk scenarios scored by likelihood and financial impact
      • List of potential management of the scenarios to reduce the risk
      • Comprehensive strategic risk profile on the specific vendor solution
      Materials Participants
      • Whiteboard/flip charts
      • Strategic Risk Impact Tool to help drive discussion
      • Vendor Management – Coordinator
      • Organizational Leadership
      • Operations Experts (SMEs)
      • Legal/Compliance/Risk Manager

      Case Study

      Airline Industry Strategic Adaptation

      Industry: Airline

      Impact categories: Pandemic, Lockdowns, Travel Bans, Increased Fuel Prices

      • In 2019 the airline industry yielded record profits of $35.5 billion.
      • In 2020 the pandemic devastated the industry with losses around $371 billion.
      • The industry leaders engaged experts to conduct a study on how the pandemic impacted them and propose measures to ensure the survival of their industry in the future after the pandemic.
      • They determined that “[p]recise decision-making based on data analytics is essential and crucial for an effective Covid-19 airline recovery plan.”

      Results

      The pandemic prompted systemic change to the overall strategic planning of the airline industry.

      Summary

      Be vigilant and adaptable to change

      • Organizations need to learn how to assess the likelihood of potential risks in the changing global world.
      • Those organizations that incorporate adaptive risk management processes can prepare their strategic plans for greater success.
      • Bring the right people to the table to outline potential risks in the market.
      • Socialize the risk management process throughout the organization to heighten awareness and enable employees to help protect the strategic plan.
      • Incorporate lessons learned from incidents into your risk management process to build better plans for future issues.

      Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market.

      Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.

      Related Info-Tech Research

      Identify and Manage Financial Risk Impacts on Your Organization

      This image contains a screenshot from Info-Tech's Identify and Manage Financial Risk Impacts on Your Organization.
      • Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Identify and Reduce Agile Contract Risk

      This image contains a screenshot from Info-Tech's Identify and Reduce Agile Contract Risk
      • Customer maturity levels with Agile are low, with 67% of organizations using Agile for less than five years.
      • Customer competency levels with Agile are also low, with 84% of organizations stating they are below a high level of competency.
      • Contract disputes are the number one or two types of disputes faced by organizations across all industries.

      Build an IT Risk Management Program

      This image contains a screenshot from Info-Tech's Build an IT Risk Management Program
      • Transform your ad hoc IT risk management processes into a formalized, ongoing program, and increase risk management success.
      • Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s greatest risks before they occur.
      • Involve key stakeholders including the business senior management team to gain buy-in and to focus on IT risks most critical to the organization.

      Bibliography

      Olaganathan, Rajee. “Impact of COVID-19 on airline industry and strategic plan for its recovery with special reference to data analytics technology.” Global Journal of Engineering and Technology Advances, vol 7, no 1, 2021, pp. 033-046.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012.

      Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.

      Research Contributors and Experts

      • Frank Sewell
        Research Director, Info-Tech Research Group
      • Steven Jeffery
        Principal Research Director, Info-Tech Research Group
      • Scott Bickley
        Practice Lead, Info-Tech Research Group
      • Donna Glidden
        Research Director, Info-Tech Research Group
      • Phil Bode
        Principal Research Director, Info-Tech Research Group
      • David Espinosa
        Senior Director, Executive Services, Info-Tech Research Group
      • Rick Pittman
        Vice President, Research, Info-Tech Research Group
      • Patrick Philpot
        CISSP
      • Gaylon Stockman
        Vice President, Information Security
      • Jennifer Smith
        Senior Director

      Build Your Enterprise Application Implementation Playbook

      • Buy Link or Shortcode: {j2store}605|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation
      • Given the increasing complexity of software implementations, you are continually challenged with staying above water with your current team.
      • In addition, rapid changes in the business make maintaining project sponsors’ engagement challenging.
      • Project sprawl across the organization has created a situation where each project lead tracks progress in their own way. This makes it difficult for leadership to identify what was successful – and what wasn’t.

      Our Advice

      Critical Insight

      An effective enterprise application implementation playbook is not just a list of steps, but a comprehensive view of what is necessary to support your implementation. This starts with a people-first approach. Start by asking about sponsors, stakeholders, and goals. Without asking these questions first, the implementation will be set up for failure, regardless of the technology, processes, and tools available.

      Impact and Result

      Follow these steps to build your enterprise application playbook:

      • Define your sponsor, map out your stakeholders, and lay out the vision, goals and objectives for your project.
      • Detail the scope, metrics, and the team that will make it happen.
      • Outline the steps and processes that will carry you through the implementation.

      Build Your Enterprise Application Implementation Playbook Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build Your Enterprise Application Implementation Playbook Deck - Your implementation doesn’t start with technology, but with an effective plan that the team can align on.

      This blueprint provides the steps necessary to build your own enterprise application implementation playbook that can be deployed and leveraged by your implementation teams.

      • Build Your Enterprise Application Implementation Playbook – Phases 1-3

      2. Your Enterprise Application Implementation Playbook – The key output from leveraging this research is a completed implementation playbook.

      This is the main playbook that you build through the exercises defined in the blueprint.

      • Your Enterprise Application Implementation Playbook

      3. Your Enterprise Application Implementation Playbook - Timeline Tool – Supporting tool that captures the project timeline information, issue log, and follow-up dashboard.

      This tool provides input into the playbook around project timelines and planning.

      • Your Enterprise Application Implementation Playbook - Timeline Tool

      4. Light Project Change Request Form Template – This tool will help you record the requested change, allow assess the impact of the change and proceed the approval process.

      This provides input into the playbook around managing change requests

      • Light Project Change Request Form Template

      Infographic

      Workshop: Build Your Enterprise Application Implementation Playbook

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Project

      The Purpose

      Lay out the overall objectives, stakeholders, and governance structure for the project.

      Key Benefits Achieved

      Align everyone on the sponsor, key stakeholders, vision, and goals for your project

      Activities

      1.1 Select the project sponsor.

      1.2 Identify your stakeholders.

      1.3 Align on a project vision.

      1.4 List your guiding principles.

      1.5 Confirm your goals and objectives for the implementation project.

      1.6 Define the project governance structure.

      Outputs

      Project sponsor has been selected.

      Project stakeholders have been identified and mapped with their roles and responsibilities.

      Vision has been defined.

      Guiding principles have been defined.

      Articulated goals and objectives.

      Detailed governance structure.

      2 Set up for Success

      The Purpose

      Define the elements of the playbook that provide scope and boundaries for the implementation.

      Key Benefits Achieved

      Align the implementation team on the scope for the project and how the team should operate during the implementation.

      Activities

      2.1 Gather and review requirements, with an agreed to scope.

      2.2 Define metrics for your project.

      2.3 Define and document the risks that can impact the project.

      2.4 Establish team composition and identify the team.

      2.5 Detail your OCM structure, resources, roles, and responsibilities.

      2.6 Define requirements for training.

      2.7 Create a communications plan for stakeholder groups and delivery teams.

      Outputs

      Requirements for enterprise application implementation with an agreed-to scope.

      Metrics to help measure what success looks like for the implementation.

      Articulated list of possible risks during the implementation.

      The team responsible and accountable for implementation is identified.

      Details of your organization’s change management process.

      Outline of training required.

      An agreed-to plan for communication of project status.

      3 Document Your Plan

      The Purpose

      With the structure and boundaries in place, we can now lay out the details on the implementation plan.

      Key Benefits Achieved

      A high-level plan is in place, including next steps and a process on running retrospectives.

      Activities

      3.1 Define your implementation steps.

      3.2 Create templates to enable follow-up throughout the project.

      3.3 Decide on the tracking tools to help during your implementation.

      3.4 Define the follow-up processes.

      3.5 Define project progress communication.

      3.6 Create a Change request process.

      3.7 Define your retrospective process for continuous improvement.

      3.8 Prepare a closure document for sign-off.

      Outputs

      An agreed to high-level implementation plan.

      Follow-up templates to enable more effective follow-ups.

      Shortlist of tracking tools to leverage during the implementation.

      Defined processes to enable follow-up.

      Defined project progress communication.

      A process for managing change requests.

      A process and template for running retrospectives.

      A technique and template for closure and sign-off.

      Further reading

      Build Your Enterprise Application Implementation Playbook

      Your implementation doesn’t start with technology, but with an effective plan that the team can align on.

      Analyst Perspective

      Your implementation is not just about technology, but about careful planning, collaboration, and control.

      Recardo de Oliveira

      A successful enterprise application implementation requires more than great software; it requires a clear line of sight to the people, processes, metrics, and tools that can help make this happen.

      Additionally, every implementation is unique with its own set of challenges. Working through these challenges requires a tailored approach taking many factors into account. Building out your playbook for your implementation is an important initial step before diving head-first into technology.

      Regardless of whether you use an implementation partner, a playbook ensures that you don’t lose your enterprise application investment before you even get started!

      Ricardo de Oliveira

      Research Director,
      Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Given the increasing complexity of software implementations, you are continually challenged with staying above water with your current team.
      • Rapid changes in the business make maintaining project sponsors’ engagement challenging.
      • Project sprawl across the organization has created a situation where project leads track progress in their own way. This makes it difficult for leadership to identify what was successful (and what wasn’t).

      Common Obstacles

      • Your best process experts are the same people you need to keep the business running. The business cannot afford to have its best people pulled into the implementation for long periods of time.
      • Enterprise application implementations generate huge organizational changes and the adoption of the new systems and processes resulting from these projects are quite difficult.
      • People are generally resistant to change, especially large, transformational changes that will impact the day-to-day way of doing things.

      Info-Tech's Approach

      • Build your enterprise application implementation playbook. Follow these steps to build your enterprise application playbook:
        • Define your sponsor, map out your stakeholders, and lay out the vision, goals, and objectives for your project.
        • Detail the scope, metrics, and the team that will make it happen.
        • Detail the steps and processes that will carry you through the implementation

      Info-Tech Insight

      An effective enterprise application implementation playbook is not just a list of steps; it is a comprehensive view of what is necessary to support your implementation. This starts with a people-first approach. Start by asking about sponsors, stakeholders, and goals. Without asking these questions first, the implementation will be set up for failure, regardless of the technology, processes, and tools available.

      Enterprise Applications Lifescycle Advisory Services. Strategy, selection, implementation, optimization and operations.

      Insight summary

      Building an effective playbook starts with asking the right questions, not jumping straight into the technical details.

      • This blueprint provides the steps required to lay out an implementation playbook to align the team on what is necessary to support the implementation.
      • Build your Enterprise Application Implementation Playbook by:
        • Aligning and confirming project’s goals, stakeholders, governance and team.
        • Clearly defining what is in and out of scope for the project and the risks involved.
        • Building up a strong change management process.
        • Providing the tools and processes to keep track of the project.
        • Pulling it all together into an actionable playbook.

      Grapsh showing 39%

      Lack of planning is the reason that 39% of projects fail. Poor project planning can be disastrous: The consequences are usually high costs and time overruns.

      Graph showing 20%

      Almost 20% of IT projects can fail so badly that they can become a threat to a company’s existence. Lack of proper planning, poor communication, and poorly defined goals all contribute to the failure of projects.

      Graph showig 2.5%

      A PwC study of over 10,640 projects found that a tiny portion of companies – 2.5% – completed 100% of their projects successfully. These failures extract a heavy cost – failed IT projects alone cost the United States $50-$150B in lost revenue and productivity.

      Source: Forbes, 2020

      Planning and control are key to enterprise project success

      An estimated 70% of large-scale corporate projects fail largely due to a lack of change management infrastructure, proper oversight, and regular performance check-ins to track progress (McKinsey, 2015).

      Table showing that 88% of projects completed on time, 90% completed within budget and 92% meet original goals. 68% of projects have scope creep, 24% deemed failures and 46% experience budget lose when project fails

      “A survey published in HBR found that the average IT project overran its budget by 27%. Moreover, at least one in six IT projects turns into a ‘black swan’ with a cost overrun of 200% and a schedule overrun of 70%. Kmart’s massive $1.2B failed IT modernization project, for instance, was a big contributor to its bankruptcy.”

      Source: Forbes, 2020

      Sponsor commitment directly improves project success.

      Having the right sponsor significantly improves your chances of success across many different dimensions:

      1. On-time delivery
      2. Delivering within budget
      3. Delivered within an agreed-to scope
      4. Delivered with sufficient quality.
      Graph that shows Project success scores versus sponsor involvement in change communication. Shows increase for projects on time, projects on budget, within scope and overall quality.

      Source: Info-Tech, PPM Current State Scorecard Diagnostic

      Executive Brief Case Study

      Chocolate manufacturer implementing a new ERP

      INDUSTRY

      Consumer Products

      SOURCE

      Carlton, 2021

      Challenge

      Not every ERP ends in success. This case study reviews the failure of Hershey, a 147-year-old confectioner, headquartered in Hershey Pennsylvania. The enterprise saw the implementation of an ERP platform as being central to its future growth.

      Solution

      Consequently, rather than approaching its business challenge on the basis of an iterative approach, it decided to execute a holistic plan, involving every operating center in the company. Subsequently, SAP was engaged to implement a $10 million systems upgrade; however, management problems emerged immediately.

      Results

      The impact of this decision was significant, and the company was unable to conduct business because virtually every process, policy, and operating mechanism was in flux simultaneously. The consequence was the loss of $150 million in revenue, a 19% reduction in share price, and the loss of 12% in international market share.

      Remember: Poor management can scupper implementation, even when you have selected the perfect system.

      A successful software implementation provides more than simply immediate business value…

      It can build competitive advantage.

      • When software projects fail, it can jeopardize an organization’s financial standing and reputation, and in some severe cases, it can bring the company down altogether.
      • Rarely do projects fail for a single reason, but by understanding the pitfalls, developing a risk mitigation plan, closely monitoring risks, and self-evaluating during critical milestones, you can increase the probability of delivering on time, on budget, and with the intended benefits.

      Benefits are not limited to just delivering on time. Some others include:

      • Building organizational delivery competence and overall agility.
      • The opportunity to start an inventory of best practices, eventually building them into a center of excellence.
      • Developing a competitive advantage by maximizing software value and continuously transforming the business.
      • An opportunity to develop a competent pool of staff capable of executing on projects and managing organizational change.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Your Enterprise Application Implementation Playbook – Timeline Tool

      Supporting template that captures the project timeline information, issue log, and follow-up dashboard.

      Info-Tech: Project Planning and Monitoring Tool.
      Light Project Change Request Form Template

      This tool will help you record the requested change, and allow you to assess the impact of the change and proceed with the approval process.

      Info-Tech: Light change request form template.

      Key deliverable:

      Your Enterprise Application Implementation Playbook

      Record the results from the exercises to define the steps for a successful implementation.

      Build your enterprise application implementation playbook.

      Info-Tech’s methodology for Your Enterprise Application Implementation Playbook

      Phase Steps

      1. Understand the Project

      1. Identify the project sponsor
      2. Define project stakeholders
      3. Review project vision and guiding principles
      4. Review project objectives
      5. Establish project governance

      2. Set up for success

      1. Review project scope
      2. Define project metrics
      3. Prepare for project risks
      4. Identify the project team
      5. Define your change management process

      3. Document your plan

      1. Develop a master project plan
      2. Define a follow-up plan
      3. Define the follow-up process
      4. Understand what’s next
      Phase Outcomes
      • Project sponsor has been selected
      • Project stakeholders have been identified and mapped with their roles and responsibilities.
      • Vision, guiding principles, goals objectives, and governance have been defined
      • Project scope has been confirmed
      • Project metrics to identify successful implementation has been defined
      • Risks have been assessed and articulated.
      • Identified project team
      • An agreed-to change management process
      • Project plan covering the overall implementation is in place, including next steps and retrospectives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostic and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      The three phases of guided implementation.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889 Activities and deliverables for each module of the workshop. Module 1: understanding the project, Module 2: Set up for success, Modeule 3: Document your plan, and Post Workshop: Next steps and Wrap-up(offsite).

      Phase 1

      Understand the project

      3 phases, phase 1 is highlighted.

      This phase will walk you through the following activities:

      1.1 Identify the project sponsor

      1.2 Identify project stakeholders

      1.3 Review project vision and guiding principles

      1.4 Review project objectives

      1.5 Establish project governance

      This phase involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Step 1.1

      Identify the project sponsor

      Activities

      1.1.1 Define the project sponsor's responsibilities

      1.1.2 Shortlist potential sponsors

      1.1.3 Select the project sponsor

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Selected sponsor.

      Sponsor commitment directly improves project success.

      Having the right sponsor significantly improves your chances of success across many different dimensions:

      1. On-time delivery
      2. Delivering within budget
      3. Delivered within an agreed-to scope
      4. Delivered with sufficient quality.

      Graph that shows Project success scores versus sponsor involvement in change communication. Shows increase for projects on time, projects on budget, within scope and overall quality.

      Source: Info-Tech, PPM Current State Scorecard Diagnostic

      Typical project sponsor responsibilities

      • Help define the business goals of their projects before they start.
      • Provide guidance and support to the project manager and the project team throughout the project management lifecycle.
      • Ensure that sufficient financial resources are available for their projects.
      • Resolve problems and issues that require authority beyond that of the project manager.
      • Ensure that the business objectives of their projects are achieved and communicated.

      For further discussion on sponsor responsibilities, use Info-Tech’s blueprint, Drive Business Value With a Right-Sized Project Gating Process

      Portrait of head with multiple layers representing the responsibilities of a sponsor. From top down: Define business goals, provide guidance, ensure human ad financial resources, resolve problems and issues.

      1.1.1 Define the project sponsor’s responsibilities

      0.5-1 hour

      1. Discuss the minimum requirements for a sponsor at your organization.
      2. As a group, brainstorm the criteria necessary for an individual to be a project sponsor:
        1. Is there a limit to the number of projects they can sponsor at one time?
        2. Is there a minimum number of hours they must be available to the project team?
        3. Do they have to be at a certain seniority level in the organization?
        4. What is their role at each stage of the project lifecycle?
      3. Document these criteria on a whiteboard.
      4. Record the sponsor’s responsibilities in section 1.1 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • Requirements for a sponsor
      • Your responsibilities as a sponsor

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      1.1.1 Define the project sponsor’s responsibilities (Continued)

      Example

      Project sponsor responsibilities.

      1.1.2 Shortlist potential sponsors

      0.5-1 hour

      1. Based on the responsibilities defined in Exercise 1.1.1, produce a list of the potential sponsors.
      2. Record the sponsor’s shortlist in section 1.2 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • Characteristics of a sponsor
      • Your list of candidates

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      1.1.2 Shortlist potential sponsors (Continued)

      Example

      Shortlist of potential sponsors. 6 names listed with checkmarks on criteria ranking.

      Don’t forget, the project team is there to support the sponsor

      Given the burden of the sponsor role, the project team is committed to doing their best to facilitate a successful outcome.

      Project Success: Follow best practices, escalate issues, stay focused, communicate, adapt to change.

      • Follow the framework set out by the governance group at the organization to drive efficiency on the project.
      • Ensure stakeholders with proper authority are notified of issues that occur during the project.
      • Stay focused on the project tasks to drive quality on the deliverables and avoid rework after the project.
      • Communicate within the project team to drive coordination of tasks, complete deliverables, and avoid resource waste.
      • Changes are more common than not; the team must be prepared to adjust plans and stay agile to adapt to changes for the project.

      Seek the key characteristics of a sponsor

      Man walking up stairs denoting characteristics of a good sponsor. First step: Leader, second step: Strong Communicator, third step: knowledgeable, fourth step: problem solver, fifth step: delegator, final step: dedicated.

      1.1.3 Select the project sponsor

      0.5-1 hour

      1. Review the characteristics and the list of potential candidates.
      2. Assess availability, suitability, and desire of the selected sponsor.
      3. Record the selected sponsor in section 1.3 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • List of candidates
      • Characteristics of a sponsor
      • Your selected sponsor

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      1.1.3 Select the project sponsor (Continued)

      Example

      Name of example sponsor with their key traits listed.

      Step 1.2

      Identify the project stakeholders

      Activities

      1.2.1 Identify your stakeholders

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Stakeholders’ management plan

      How to find the right stakeholders

      Start with the obvious candidates, but keep an open mind.

      How to find stakeholders

      • Talk to your stakeholders and ask who else you should be talking to, to discover additional stakeholders and ensure you don’t miss anyone.
      • Less obvious stakeholders can be found by conducting various types of trace analysis, i.e. following various paths flowing from your initiative through to the path’s logical conclusion.

      Create a stakeholder network map for your application implementation

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Stakeholder network map showing direction of professional influence as well as bidirectional, informal influence relationships.

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your enterprise application operates in. It is every bit as important as the teams who enhance, support, and operate your applications directly.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have substantial informal relationships with your stakeholders.

      Understand how to navigate the complex web of stakeholders

      Identify which stakeholders to include and what their level of involvement should be during requirements elicitation based on relevant topic expertise.

      Graph showing influence vs. interest, divided into 4 quadrants. Low influence and intersest is labeled: Monitor, low influence and high interest is labeled: Keep informed, High influence and low interest is labeled: Keep satisfied, and high influence and high interest is labeled: Involve closely

      Large-scale projects require the involvement of many stakeholders from all corners and levels of the organization, including project sponsors, IT, end users, and business stakeholders. Consider the influence and interest of stakeholders in contributing to the requirements elicitation process and involve them accordingly.

      Map the organization’s stakeholders

      List of various stakeholder titles. As well as a graph showing the influence vs involvement of each stakeholder title. Influence and interest is divided into 4 quadrants: Monitor, Keep informed, keep satisfied, and involve closely.

      1.2.1 Identify your stakeholders

      1-2 hours

      1. As a group, identify all the project stakeholders. A stakeholder may be an individual such as the CEO or CFO, or it may be a group such as front-line employees.
      2. Map each stakeholder on the quadrant based on their expected influence and involvement in the project
      3. Identify stakeholders and add them to the list.
      4. Record the stakeholders list in section 1.4 of Info-Tech’s Your Enterprise Application Implementation Playbook.
      5. Download Your Enterprise Application Implementation Playbook

        Input

        Output

        • Types of stakeholders
        • Your stakeholders initial list

        Materials

        Participants

        • Whiteboard/flip charts
        • Your Enterprise Application Implementation Playbook
        • Project team
        • Operations
        • SMEs
        • Team lead and facilitators
        • IT leaders

      1.2.1 Identify your stakeholders(Continued)

      Example

      Table with rows of stakeholders: Customer, End Users, IT, Vendor and other listed. Columns provide: description, examples, value and involvement level of each stakeholder.

      Step 1.3

      Review project vision and guiding principles

      Activities

      1.3.1 Align on a project vision

      1.3.2 List your guiding principles

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Project vision and guiding principles

      Vision and guiding principles

      GUIDING PRINCIPLES

      Guiding principles are high-level rules of engagement that help to align stakeholders from the outset. Determine guiding principles to shape the scope and ensure stakeholders have the same vision.

      Creating Guiding Principles

      Guiding principles should be constructed as full sentences. These statements should be able to guide decisions.

      EXAMPLES
      • [Organization] is implementing an ERP system to streamline processes and reduce redundancies, saving time and money.
      • [Organization] is implementing an ERP to integrate disparate systems and rationalize the application portfolio.
      • [Organization] is aiming at taking advantage of industry best practices and strives to minimize the level of customization required in solution.

      Questions to Ask

      1. What is a strong statement that will help guide decision making throughout the life of the ERP project?
      2. What are your overarching requirements for business processes?
      3. What do you ultimately want to achieve?
      4. What is a statement that will ensure all stakeholders are on the same page for the project?

      1.3.1 Align on a project vision

      1-2 hours

      1. As a group, discuss whether you want to create a separate project vision statement or restate your corporate vision and/or goals.
        1. A project vision statement will provide project-guiding principles, encompass the project objectives, and give a rationale for the project.
        2. Using the corporate vision/goals will remind the business and IT that the project is to implement an enterprise application that supports and enhances the organizational objectives.
      2. Record the project vision in section 1.5 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • Project vision statement defined during strategy building
      • Your project vision

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      1.3.1 Align on a project vision (Continued)

      Example

      Project Vision

      We, [Organization], will select and implement an integrated software suite that enhances the growth and profitability of the organization through streamlined global business processes, real-time data-driven decisions, increased employee productivity, and IT investment protection.

      Guiding principles examples

      The guiding principles will help guide your decision-making process. These can be adjusted to align with your internal language.

      • Support business agility: A flexible and adaptable integrated business system providing a seamless user experience.
      • Use best practices: Do not recreate or replicate what we have today; focus on modernization. Exercise customization governance by focusing on those customizations that are strategically differentiating.
      • Automate: Take manual work out where we can, empowering staff and improving productivity through automation and process efficiencies.
      • Stay focused: Focus on scope around core business capabilities. Maintain scope control. Prioritize demand in line with the strategy.
      • Strive for "one source of truth": Unify data model and integrate processes where possible. Assess integration needs carefully.

      1.3.2 List your guiding principles

      1-2 hours

      1. Start with the guiding principles defined during the strategy building.
      2. Review each of the sample guiding principles provided and ask the following questions:
        1. Do we agree with the statement?
        2. Is this statement framed in the language we use internally? Does everyone agree on the meaning of the statement?
        3. Will this statement help guide our decision-making process?
      3. Record the guiding principles in section 1.6 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • Guiding principles defined during strategy building
      • Your guiding principles

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      1.3.2 List your guiding principles (Continued)

      Example

      Guiding principals: Support business agility, use best practices, automate, stay focused, strive for `one source truth`.

      Step 1.4

      Review project objectives

      Activities

      1.4.1 Confirm your goals and objectives for the implementation project

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      The objectives of the implementation project

      Review the elements of the project charter

      Leverage completed deliverables to get project managers started down the path of success.

      Deliverables of project chaters for PMs. Project purpose, scope, logistics and sign-off.

      1.4.1 List your guiding principles

      1-2 hours

      1. Articulate the high-level objectives of the project. (What are the goals of the project?)
      2. Elicit the business benefits the sponsor is committed to achieving. (What are the business benefits of the project?)
      3. Record Project goals and objectives in section 1.7 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • Your BizDevOps objectives and metrics
      • Understanding of various collaboration methods, such as Scrum, Kanban, and Scrumban
      • Your chosen collaboration method

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      1.4.1 Confirm your goals and objectives for the implementation project (Continued)

      Example:

      Project Objectives: End-user visibility, New business development, employee experience. Business Benefits for each objective listed.

      Step 1.5

      Establish project governance

      Activities

      1.5.1 Define the project governance structure

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Approach to build an effective project governance

      1.5.1 List your guiding principles

      0.5-1 hour

      1. Identify the IT governance structure in place today and document the high-level function of each body (councils, steering committees, review boards, centers of excellence, etc.).
      2. Identify and document the existing enterprise applications governance structure, roles, and responsibilities (if any exist).
      3. Identify gaps and document the desired enterprise applications governance structure, roles, and responsibilities.
      4. Record the project governance structure in section 1.8 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • IT governance structure
      • Your project governance structure

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Governance is NOT management

      Three levels of governance: Team Level, Steering Committee Level, and Executive Governance Level.

      Info-Tech Insight

      You won’t get engagement unless there is a sense of accountability. Do not leave this vague. Accountability needs to be assigned to specific individuals in your organization to ensure the system development achieves what was intended by your organization and not what your system integrator (SI) intended.

      Who is accountable?

      Too many assumptions are made that the SI is accountable for all implementation activities and deliverables – this is simply untrue. All activities can be better planned for, and misunderstandings can be avoided, with a clear line of sight on roles and responsibilities and the documentation that will support these assumptions.

      Discuss, define, and document roles and responsibilities:
      • For each role (e.g. executive sponsor, delivery manager, test lead, conversion lead), clearly articulate the responsibilities of the role, who is accountable for fulfillment, and whether it’s a client role, SI role, or both.
      • Articulate the purpose of each deliverable clearly, define which individual or team has responsibility for it, and document who is expected to contribute.
      • Empower the team by granting them the authority to make decisions. Ease their reluctance to think outside the box for fear of stakeholder or user backlash.
      • The implementation cannot and will not be transformative if the wrong people are involved or if the right people have not been given the tools required to succeed in their role.

      1.5.2 List your guiding principles

      0.5-1 hour

      1. Assess the skills necessary for an enterprise implementation. Inventory the competencies required for an enterprise implementation team. Map your internal resources to each competency as applicable.
      2. Select your internal implementation team. Determine who needs to be involved closely with the implementation. Key stakeholders should also be considered as members of your implementation team.
      3. Identify the number of external consultants/support required for implementation. Consider your in-house skills, timeline, integration environment complexity, and cost constraints as you make your resourcing plan.
      4. Record governance team roles and responsibilities in 1.9 section of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • Available resources (internal, external, contract)
      • Your governance structure roles and responsibilities

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      1.5.2 Define governance team roles and responsibilities (Continued)

      Example

      Governance team roles and their responsibilities.

      Phase 2

      Set up for success

      3 phases, phase 2 is highlighted.

      This phase will walk you through the following activities:

      2.1. Review project scope

      2.2. Define project metrics

      2.3. Prepare for project risks

      2.4. Identify the project team

      2.5. Define your change management process

      This phase involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Step 2.1

      Review project scope

      Activities

      2.1.1 Gather and review requirements

      2.1.2 Confirm your scope for implementation

      2.1.3 Formulate a scope statement

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      The project scope

      Requirements are key to defining scope

      Project scope management includes the processes required to ensure that the project includes all and only the work required to complete the project successfully. Therefore, managing project scope is about defining and controlling what is and is not included in the project.

      PMBOK defines requirements as “conditions or capabilities that are to be met by the project or present in the product, service, or result to satisfy an agreement or other formally imposed specification.” Detailed requirements should be gathered and elicited in order to provide the basis for defining the project scope.

      70% of projects fail due to poor requirements, organizations using poor practices spent 62% more, 4th highest correlation to high IT performance is requirements gathering.

      Well-executed requirements gathering results in:

      • Consistent approach from project to project, resulting in more predictable outcomes.
      • Solutions that meet the business need on the surface and under the hood.
      • Reduce risk for fast-tracked projects by establishing a right-sized approach.
      • Requirements team that can drive process improvement and improved execution.
      • Confidence when exploring solution alternatives.

      Poorly executed requirements gathering results in:

      • IT receiving the blame for any project shortcomings or failures.
      • Business needs getting lost in the translation between the initial request and final output.
      • Inadequate solutions or cost overruns and dissatisfaction with IT.
      • IT losing its credibility as stakeholders do not see the value and work around the process.
      • Late projects that tie up IT resources longer than planned, and cost overruns that come out of the IT budget.
      • Inconsistent project execution, leading to inconsistent outcomes.

      Strong stakeholder satisfaction with requirements results in higher satisfaction in other areas

      High stakeholder satisfaction with requirements results in higher satisfaction in other areas.

      Note: “High satisfaction” was classified as a score greater or equal to eight, and “low satisfaction” was every organization that scored below eight on the same questions.

      2.1.1 Gather and review requirements

      1-2 hours

      1. Once existing documentation has been gathered, evaluate the effectiveness of the documentation and decide whether you need additional information to proceed to current-state mapping.
      2. The initiative team should avoid spending too much time on the discovery phase, as the goal of discovery is to obtain enough information to produce a level-one current-state map.
      3. Consider reviewing capabilities, business processes, current applications, integration, and data migration.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • Your requirements, capabilities, business processes, current applications, integration, and/or data migration
      • Your requirements, capabilities, business processes, current applications, integration, and/or data migration revisited

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.1.1 Requirements list

      Example

      Requirements with description, category and priority.

      2.1.2 Confirm your scope for implementation

      1-2 hours

      1. Based on the requirements, write down features of the product or services, as well as dependencies with other interfaces.
      2. Write down exclusions to guard against scope creep.
      3. Validate the scope by asking these questions:
        1. Will this scope provide a common understanding for all stakeholders, including those outside of IT, as to what the project will accomplish and what it excludes?
        2. Should any detail be added to prevent scope creep later?
      4. Record the project scope in section 2.1 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook

      Input

      Output

      • What’s in scope
      • What’s out of scope
      • What needs to integrate
      • Your scope areas

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.1.2 Scope detail

      Example

      Example of scope detail. Table with scope levels: In scope, out of scope and existing scope. Each scope level has details about it listed.

      Distill your requirements into a scope statement

      Requirements are about the what and the how.
      Scope specifies the features of the product or service – what is in and what is out
      Table showing Requirement document vs. Scope statement. It lists the audience, content, inputs and outputs for each.

      The Build Your Enterprise Application Implementation Playbook 2.2 Project Scope Statement includes:

      • Scope description (features, how it interfaces with other solution components, dependencies).
      • Exclusions (what is not part of scope).
      • Deliverables (product outputs, documentation).
      • Acceptance criteria (what metrics must be satisfied for the deliverable to be accepted).
      • Final sign-off (owner).
      • Project exclusions (scope item, details).

      The scope statement should communicate the breadth of the project

      To assist in forming your scope statement, answer the following questions:
      • What are the major coverage points?
      • Who will be using the systems?
      • How will different users interact with the systems?
      • What are the objectives that need to be addressed?
      • Where do we start?
      • Where do we draw the line?

      2.1.3 Formulate a scope statement

      1-2 hours

      1. Lay out the scope description (features, how it interfaces with other solution components, dependencies).
      2. Record the exclusions (what is not part of scope).
      3. Fill out the scope statement.
      4. Record the scope statement in section 2.2 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your scope areas
      • Your scope statement

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Scope statement template
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.1.3 Scope statement

      Example

      Examples of scope statements showing the following: Product or service in scope, project deliverables and acceptance criteria, and project exclusions.

      Step 2.2

      Review project scope

      Activities

      2.2.1 Define metrics for your project

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      The project metrics

      Building leading indicators

      Lagging KPIs are relatively simple to identify, whereas leading KPIs can be more elusive.

      For example, take the lagging KPI “Customer Satisfaction.” How do you turn that into a leading KPI? One method is to look at sources of customer complaints. In a retail sales system, backordered items will negatively impact customer satisfaction. As a leading indicator, track the number of orders with backordered lines and the percentage of the total order that was backordered.

      Performance Metrics

      Use leading and lagging metrics, as well as benchmarks, to track the progress of your system.

      Leading KPIs: Input-oriented measures:

      • Number of active users in the system.
      • Time-to-completion for processes that previously experienced efficiency pain points.

      Lagging KPIs: Output-oriented measures:

      • Faster production times.
      • Increased customer satisfaction scores

      Benchmarks: A standard to measure performance against:

      • Number of days to ramp up new users.

      Info-Tech Insight

      Leading indicators make the news; lagging indicators report on the news. Focusing on leading indicators allows you to address challenges before they become large problems with only expensive solutions.

      2.2.1 Define metrics for your project

      1-2 hours

      1. Examine outputs from any feedback mechanisms you have (satisfaction surveys, emails, existing SLAs, burndown charts, resourcing costs, licensing costs per sprint, etc.).
      2. Look at historical trends and figures when available. However, be careful of frequent anomalies, as these may indicate a root cause that needs to be addressed.
      3. Explore the definition of specific metrics across different functional teams to ensure consistency of measurement and reporting.
      4. Record the Project Metrics in section 2.3 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Outputs of any feedback mechanism
      • Historical trends
      • Your project tracking metrics

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.2.1 Metrics

      In addition to delivery metrics and system performance metrics, equip the business with process-based metrics to continuously prove the value of the enterprise software. Review the examples below as a starting point.

      Table showing metrics and desciption. Metrics listed are: Percent of requirements complete, issues found, issues resolved, and percent of processess complete.

      Step 2.3

      Prepare for project risks

      Activities

      2.3.1 Build a risk event menu

      2.3.2 Determine contextual risks

      2.3.3 Determine process risks

      2.3.4 Determine business risks

      2.3.5 Determine change risks

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Steps to create your product canvas and product vision statement

      All risks are not created equal

      Project Risk consists of: Contextual risk, process risk, change risk and business risk.

      For more information on Info-Tech’s Four-Pillar Risk Framework, please see Right-Size Your Project Risk Investment.

      Info-Tech’s Four-Pillar Risk Framework

      Unusual risks should be detected by finding out how each project is different from the norm. Use this framework to start this process by confronting the risks that are more easily anticipated.

      2.3.1 Build a risk event menu

      0.5-1 hour

      1. Build and maintain an active menu of potential risk events across the four risk categories.
      2. Record the risk event menu in section 2.4 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Risk events
      • Your risk events menu

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.3.1 Risk event menu

      Example

      Risk event menu example. A table with: Contextual Risk, process risk, business risk, change risk events with examples for each.

      2.3.2 Determine contextual risks

      0.5-1 hour

      1. Contextual risk factors are those that operate within the context of your department, organization, and/or community.
      2. Fill out contextual risks.
      3. Record the contextual risks in section 2.5 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your risk events menu
      • Your list of people involved in risk management
      • Your contextual risks

      Materials

      Participants

      • Project Risk Management Workbook
      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.3.2 Contextual risks

      Example

      two tables for Contextual risks. Table 1: Risk identification with event name, risk cause, impact and risk owner. Table 2: shows probability of risk, impact, rating, recommended action, and any mitigations.

      2.3.3 Determine process risks

      0.5-1 hour

      1. Process risks are those that involve project sponsorship, project management, business and functional requirements, work assignment, communication, and/or visibility.
      2. Fill out process risks.
      3. Record the process risks in section 2.6 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your risk events menu
      • Your list of people involved in risk management
      • Your process risks

      Materials

      Participants

      • Project Risk Management Workbook
      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.3.3 Process risks

      Example

      two tables for Process risks. Table 1: Risk identification with event name, risk cause, impact and risk owner. Table 2: shows probability of risk, impact, rating, recommended action, and any mitigations.

      2.3.4 Determine business risks

      0.5-1 hour

      1. Business risks are those that affect the bottom line of the organization. They usually have implications on revenue, costs, and/or image.
      2. Fill out business risks.
      3. Record the business risks in section 2.7 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your risk events menu
      • Your list of people involved in risk management
      • Your business risks

      Materials

      Participants

      • Project Risk Management Workbook
      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.3.4 Business risks

      Example

      two tables for Business risks. Table 1: Risk identification with event name, risk cause, impact and risk owner. Table 2: shows probability of risk, impact, rating, recommended action, and any mitigations.

      2.3.5 Determine change risks

      0.5-1 hour

      1. Change risks are those that result from imposing changes on the people and customers of the organization and their daily routines.
      2. Fill change risks.
      3. Record the change risks in section 2.7 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your risk events menu
      • Your list of people involved in risk management
      • Your business risks

      Materials

      Participants

      • Project Risk Management Workbook
      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.3.5 Change risks

      Example

      two tables for Change risks. Table 1: Risk identification with event name, risk cause, impact and risk owner. Table 2: shows probability of risk, impact, rating, recommended action, and any mitigations.

      Step 2.4

      Identify the project team

      Activities

      2.4.1 Establish team composition

      2.4.2 Identify the team

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Steps to get your project team ready

      Understand the unique external resource considerations for the implementation

      Organizations rarely have sufficient internal staffing to resource an enterprise software implementation project entirely on their own. Consider the options for closing the gap in internal resource availability.

      The most common project resourcing structures for enterprise projects are:

      1. Management consultant
      2. Vendor consultant
      3. System integrator

      When contemplating a resourcing structure, consider:

      • Availability of in-house implementation competencies and resources.
      • Timeline and cost constraints.
      • Integration environment complexity.

      CONSIDER THE FOLLOWING

      Internal Vs. External Roles and Responsibilities

      Clearly delineate between internal and external team responsibilities and accountabilities and communicate this to your technology partner upfront.

      Internal Vs. External Accountabilities

      Accountability is different than responsibility. Your vendor or SI partner may be responsible for completing certain tasks, but be careful not to outsource accountability for the implementation – ultimately, the internal team will be accountable.

      Partner Implementation Methodologies

      Often vendors and/or SIs will have their own preferred implementation methodology. Consider the use of your partner’s implementation methodology; however, you know what will work for your organization.

      Info-Tech Insight

      Selecting a partner is not just about capabilities, it’s about compatibility! Ensure you select a partner that has a culture compatible with your own.

      2.4.1 Establish team composition

      0.5-1 hour

      1. Assess the skills necessary for an enterprise implementation.
      2. Select your internal implementation team.
      3. Identify the number of external consultants/support required for implementation.
      4. Document the roles and responsibilities, accountabilities, and other expectations as they relate to each step of the implementation.
      5. Record the team composition in section 2.9 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • List of project team skills
      • Your team composition
      • Your business risks

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.4.1 Team composition

      Example

      Team composition: Role of each team member, and their skills.

      2.4.2 Identify the team

      0.5-1 hour

      1. Identify a candidate for each role and determine their responsibility in the project and their expected time commitment.
      2. The project will require a cross-functional team within IT and business units. Make sure the responsibilities are clearly communicated to the selected project sponsor.
      3. Create a RACI matrix for the project.
      4. Record the team list in section 2.10 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your team composition
      • Your team with responsibilities and commitment

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.4.2 Team list

      Example

      Team list: Role of each team member, candidate, responsibilities, and their commitment in hours per week.

      RACI example

      RACI example. Responsibilities and team member roles that are tasked with each responsibility.

      Step 2.5

      Define your change management process

      Activities

      2.5.1 Define OCM structure and resources

      2.5.2 Define OCM team’s roles and responsibilities

      2.5.3 Define requirements for training

      2.5.4 Create a communications plan for stakeholder groups, and delivery teams

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      A structure and procedures for an effective organizational change management

      Define your change management process to improve quality and adoption

      Organizational change management is the practice through which the PMO can improve user adoption rates and maximize project benefits.

      Correlation of change management effectiveness with meeting results.

      “It’s one thing to provide a new technology tool to your end users.

      It’s quite another to get them to use the tool, and still different for them to use the new tool proficiently.

      When your end users fully use a new technology and make it part of their daily work habits, they have ‘adopted’ the new tool.”

      – “End-User Adoption and Change Management Process” (2022)

      Large projects require organizational change management

      Organizational change management (OCM) governs the introduction of new business processes and technologies to ensure stakeholder adoption. The purpose of OCM is to prepare the business to accept the change.

      OCM is a separate body of knowledge. However, as a practice, it is inseparable from project management.

      In IT, project planning tends to fixate on technology, and it underestimates the behavioral and cultural factors that inhibit user adoption. Whether change is project-specific or continuous, it’s more important to instill the desire to change than to apply specific tools and techniques.

      Accountability for instilling this desire should start with the project sponsor. The project manager should support this with effective stakeholder and communication management plans.

      16% of projects with poor change management met or exceeded objectives. 71% of projects with excellent change management finish on or ahead of schedule. 67% of organizations include project change management in their initiatives.

      For further discussion on organizational change, use Info-Tech’s blueprint, Master Organizational Change Management Practices

      Your application implementation will be best served by centralizing OCM

      A centralized approach to OCM is most effective, and the PMO is already a centralized project office and is already accountable for project outcomes.

      What’s more, in organizations where accountabilities for OCM are not explicitly defined, the PMO will likely already be assumed to be the default change leader by the wider organization.

      It makes sense for the PMO to accept this accountability – in the short term at least – and claim the benefits that will come from coordinating and consistently driving successful project outcomes.

      In the long term, OCM leadership will help the PMO become a strategic partner with the executive layer and the business side.

      Short-term gains made by the PMO can be used to spark dialogues with those who authorize project spending and have the implicit fiduciary obligation to drive project benefits.

      Ultimately, it’s their job to explicitly transfer that obligation along with the commensurate resourcing and authority for OCM activities.

      Organizational resistance to change is cited as the #1 challenge to project success that PMOs face. Companies with mature PMOs that effectively manage change meet expectations 90% of the time.

      For further discussion on organizational change, use Info-Tech’s blueprint, Master Organizational Change Management Practices

      2.5.1 Define OCM structure and resources

      0.5-1 hour

      1. Assess the roles and resources that might be needed to help support these OCM efforts.
      2. Record the OCM structure in section 2.11 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your project objectives
      • Your OCM structure and resources

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.5.1 OCM structure and resources

      Example

      OCM structure example. Table showing OCM activity and resources available to support.

      2.5.2 Define OCM team’s roles and responsibilities

      0.5-1 hour

      1. Assess the tasks required for the team.
      2. Determine roles and responsibilities.
      3. Record the results in the RACI matrix in section 2.13 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your communications timeline
      • Your OCM structure and resources
      • Your OCM plan and RACI matrix

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      OCM team’s roles and responsibilities

      Example

      Responsibilities for OCM team members.

      2.5.3 Define requirements for training

      0.5-1 hour

      1. Analyze HR requirements to ensure efficient use of HR and project stakeholder time.
      2. Outline appropriate HR and training activities.
      3. Define training content and make key logistical decisions concerning training delivery for staff and users.
      4. Record training requirements in section 2.14 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your OCM Plan and RACI matrix
      • Your HR training needs

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      2.5.3 Training requirements

      Example

      Training requirements example: Project milestones, milestone time frame, hr/training activities, activity timing, and notes.

      Project communication plans must address creation, flow, deposition, and security of project information

      A good communication management plan is like the oil that keeps moving parts going. Ensuring smooth information flow is a fundamental aspect of project management.

      Project communication management is more than keeping track of stakeholder requirements. A communication management plan must address timely and appropriate creation, flow, and deposition of information about the project – as well as the security of the information.

      Create:

      • In addition to standardized status reporting elements discussed for level 1 projects, level 2 and 3 projects may require additional information to be disseminated among key stakeholders and the PMO.

      Flow:

      • The plan must address the methods of communication. Distributed project teams require more careful planning, as they pose additional communication challenges.

      Deposit:

      • As the volume of information continues to grow exponentially, retrieving information becomes a challenge. The plan for depositing project information must be consistent with your organization’s content management policies.

      Security:

      • Preventing unauthorized access and information leaks is important for projectsthat are intended to provide the organization with a competitive edge or for projects that deal with confidential data.
      45% of organizations had established mature communications and engagement processes.

      2.5.4 Create a communications timeline

      0.5-1 hour

      1. Base your change communications on your organization’s cultural appetite for change in general.
      2. Document communications plan requirements.
      3. Create a high-level communications timeline.
      4. Tailor a communications strategy for each stakeholder group.
      5. Record the communications timeline in section 2.12 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your OCM structure and resources
      • Your project objectives
      • Your project scope
      • Your stakeholders’ management plan
      • Your communications timeline

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Example of communications timeline

      Project sponsors are the most compelling storytellers to communicate the change

      Example of project communications timeline. Planning, requirements, design, development, QA, deployment, warranty, and benefits/closure.

      Info-Tech Insight

      Communication with stakeholders and sponsors is not a single event, but a continual process throughout the lifecycle of the project implementation – and beyond!

      Phase 3

      Document your plan

      3 phases, phase 3 is highlighted.

      This phase will walk you through the following activities:

      3.1 Develop a master project plan

      3.2. Define a follow-up plan

      3.3. Define the follow-up process

      3.4. Understand what’s next

      This phase involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Step 3.1

      Develop a master project plan

      Activities

      3.1.1 Define your implementation steps

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Steps to create your resourcing and master plans

      Resources Vs. Demand

      Organizations rarely have sufficient internal staffing to resource an enterprise software implementation project entirely on their own. Consider the options for closing the gap in internal resource availability.

      Project demand: Data classification, cloud strategy, application rationalization, recovery planning etc. must be weighted against the organizations internal staffing resources.

      Competing priorities

      Example

      Table for competing priorities: List of projects, their timeline, priority notes, and their implications.

      3.1.1 Define your implementation steps

      0.5-1 hour

      1. Write each phase of the project on a separate sticky note and add it to the whiteboard. Determine what steps make up each phase. Write each step of the phase on a separate sticky note and add it to the whiteboard.
      2. Determine what tasks make up each step. Write each task of the step on a separate sticky note and add it to the whiteboard.
      3. Record the tasks in the Your Enterprise Application Implementation Playbook – Timeline tool. This tool has an example of a typical list of tasks, to help you start your master plan. Use the timeline for project planning and progress tracking.
      4. Record your project’s basic data and work schedule.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Project's work breakdown structure
      • Your project master plan

      Materials

      Participants

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Implementation plan – basic data

      Record your project name, project manager, and stakeholders from previous exercises.

      Example project information form: Project name, estimated start date, estimated end date, project manager, stakeholders, and time off of project.

      Implementation plan – work schedule

      Use this template to keep track of all project tasks, dates, owners, dependencies, etc.

      Use this template to keep track of all project tasks, dates, owners, dependencies, etc.

      “Actual Start Date” and “Actual Completion Date” columns must be updated to be reflected in the Gantt chart.

      This information will also be captured as the source for session 3.2.1 dashboards.

      Step 3.2

      Define a follow up plan

      Activities

      3.2.1 Create templates to enable follow-up throughout the project

      3.2.2 Decide on the tracking tools to help during your implementation

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Steps to create the processes and define the tools to track progress

      Leveraging dashboards

      Build a dashboard that reflects the leading metrics you have identified. Call out requirements that represent key milestones in the implementation.

      For further information on monitoring the project, use Info-Tech’s blueprint, Governance and Management of Enterprise Software Implementation

      Build a dashboard that reflects the leading metrics you have identified. Call out requirements that represent key milestones in the implementation.

      3.2.1 Create templates to enable follow-up throughout the project

      0.5-1 hour

      1. Create status report, dashboards/charts, budget control, risk/issues/gaps templates, and change request forms.
      2. Build a dashboard that reflects the leading metrics you have identified.
      3. Call out requirements that represent key milestones in the implementation.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your projects master plan
      • Your project follow-up kit

      Materials

      Participants

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Dashboards

      Based on the inputs in session 3.1.1 Define Your Implementation Steps, once the “Actual Start Date” and “Actual Completion Date” columns have been updated, this dashboard will present the project status and progress

      Based on the inputs in session 3.1.1 Define Your Implementation Steps, once the “Actual Start Date” and “Actual Completion Date” columns have been updated, this dashboard will present the project status and progress.

      This executive overview of the project's progress is meant to be used during the status meeting.

      Select the right tools

      Use SoftwareReviews to explore product features, vendor experience, and capability satisfaction.

      SoftwareReviews, Requirements Management, 2023

      SoftwareReviews, Project Management, 2023

      SoftwareReviews, Business Intelligence & Analytics, 2023

      3.2.2 Decide on the tracking tools to help during your implementation

      0.5-1 hour

      1. Based on the standards within your organization, select the appropriate project tracking tools to help you track the implementation project.
      2. If you do not have any tools or wish to change them, please see leverage Info-Tech’s SoftwareReviews to help you in making your decision.
      3. Consider tooling across a number of different categories:
        1. Requirements Management
        2. Project Management
        3. Reporting and Analytics
      4. Record the project tracking tools in section 3.3 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your project follow-up kit
      • Your project follow-up kit tools

      Materials

      Participants

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Example: project tools

      Table listing project tools by type, use, and products available.

      Step 3.3

      Define a follow-up process

      Activities

      3.3.1 Define project progress communication

      3.3.2 Create a change request process

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Steps to create your follow-up process

      Project status updates should occur throughout the implementation

      Project status updates can be both formal and informal. Formal status updates provide a standardized means of disseminating information on project progress. It is the lifeblood of project management: Accurate and up-to-date status reporting enables your project manager to ensure that your project can continue to use the resources needed.

      Informal status updates are done over coffee with key stakeholders to address their concerns and discuss key outcomes they want to see. Informal status updates help to build a more personal relationship.

      Ask for feedback during the status update meetings. Use the meeting as an opportunity to align values, goals, and incentives.

      Codify the following considerations:

      • Minimum requirement for a formal status update:
        • Frequency of reporting, as required by the project portfolio
        • Parties to be consulted and informed
        • Recording, producing, and archiving meeting minutes, both formal and informal
      • Procedure for follow-up on feedback generated from status updates:
        • Filing change requests
        • Keeping the change requester/relevant stakeholders in the loop

      3.3.1 Define project progress communication

      0.5-1 hour

      1. Provide a standardized means of disseminating information on project progress.
      2. Create an accurate and up-to-date status report to help keep team engaged and leadership supporting the project.
      3. Record the project progress communication in section 3.5 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your project follow-up process
      • Your project progress communication

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Project progress communication

      Example

      Example table of project progress communication. Audience, purpose, delivery/format, communicator, delivery date, and status/notes.

      Manage project scope changes

      1. Change in project scope is unpredictable and almost inevitable regardless of project size. If changes are not properly managed, the project runs the risk of scope creep and loss of progress. Therefore, changes need to be monitored and controlled.
      2. Scope change can be initiated voluntarily by the project sponsor or other stakeholders, or it could be a mandatory reaction to changing project process.
      3. Scope change may also take place due to internal factors such as a stakeholder requiring more extensive insights or external factors such as changing market conditions.
      4. Scope changes have the potential to affect project outcomes either positively or negatively, depending on how the change is managed and implemented. The project manager should take care to maintain focus on the project’s ultimate objectives; consideration needs to be given as to what to do and what to give up.
      5. If changes arise, project managers should ensure that adequate resources and actions are provided so the project can be completed on time and on budget.
      • The project manager needs to use both hard and soft skills: analytical skills for evaluating and quantifying the impact of potential changes and communication skills for communicating and negotiating with stakeholders.
      • Build trust and credibility by taking an evidence-based approach when presenting changes. This gives you room to respectfully push back on certain changes.
      • Assess changes before crossing them off the list, but don’t be afraid to say no. Greater care must be taken when there is very limited budgetary freedom or when scope changes will interfere with the critical path.
      • All change requests must be received by the project manager first so they can make sure that IT project resources are not approached with multiple ad hoc change requests.

      Document your process to manage project change requests

      1 Initial assessment

      Using the scope statement as the reference point:

      • Why do we need the change?
      • Is the change necessary?
      • What is the business value that the change brings to the project?

      Recommend alternative solutions that are easier to implement while consulting the requester.

      2 Minor change

      If the change has been classified as minor, the project manager and the project team can tackle it directly, since it doesn’t affect project budget or schedule in a significant way. Ensure that the change is documented.

      3 conduct an in-depth assessment

      The project manager should bring major changes to the attention of the project sponsor and carry out a detailed assessment of the change and its impact.

      Additional time and resources are required to do the in-depth assessment because the impact on the project can be complex and affect requirements, resources, budget, and schedule.

      4 Obtain approval from the governing body

      Present the results to the governing body. Since a major change significantly affects the project baseline beyond the authorized contingency, it is the responsibility of the governing body to either approve the change with allocation of additional resources or reject the change and maintain course.

      Flow chart to document your process to manage project change requests.

      For further discussion on change requests, use Info-Tech’s blueprint, Begin Your Projects With the End in Mind

      3.3.2 Create a change request process

      0.5-1 hour

      1. Identify any existing processes that you have for addressing changes for projects.
      2. Discuss whether or not the current change request process will suit the project at hand.
      3. Define the agreed-to change request process that fits your organization’s culture.
      4. For a change request template, you can leverage, refer to section 3.6 of Info-Tech’s Your Enterprise Application Implementation Playbook.
      5. Make any changes to the template as necessary.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your project scope
      • Your change request

      Materials

      Participants

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      3.3.2 Create a change request process (Continued)

      Example of a change request process form.

      Step 3.4

      Understand what's next

      Activities

      3.4.1 Run a “lessons learned” session for continuous improvement

      3.4.2 Prepare a closure document for sign-off

      3.4.3 Document optimization and future release opportunities

      This step involves the following participants:

      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Outcomes of this step

      Lessons learned throughout the project-guiding

      Good project planning is key to smooth project closing

      Begin with the end in mind. Without a clear scope statement and criteria for acceptance, it’s anyone’s guess when or how a project will end.

      During the closing process, the project manager should use planning and execution documents, such as the project charter and the scope statement, to assess project completeness and obtain sign-off based on the acceptance criteria.

      Project completion criteria should be clearly defined. For example, the project is defined as finished when costs are in, vendor receipts are received, financials are reviewed and approved, etc.

      However, there are other steps to be taken after completing the project deliverables. These activities include:

      • Transferring project knowledge and operations to support
      • Completing user training
      • Obtaining business sign-off and acceptance
      • Releasing resources
      • Conducting post-mortem meeting
      • Archiving project assets

      The project manager needs to complete all project management processes, including:

      • Risk management (close out risk assessment and action plan)
      • Quality management (test the final deliverables against acceptance criteria)
      • Stakeholder management (decision log, close out issues, plan and assign owners for resolutions of open issues)
      • Project team management (performance evaluation for team members as well as the project manager)

      3.4.1 Define the process for lessons learned

      0.5-1 hour

      1. Determine the reporting frequency for lessons learned.
      2. Consider attributing lessons learned to project phases.
      3. Coordinate lessons learned check-ins with project milestones to review and reflect.
      4. At each reporting session, the project team should identify challenges and successes informally.
      5. The PM and the PMO should transform the reports from each team member into formalized lessons.
      6. Record lessons learned for each project in section 3.7 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your project's lessons learned

      Materials

      Participants

      • Project Lessons Learned Template
      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Lessons learned

      Example

      Form: Project successes, notes, areas of imporvement, impact, solution.

      Watch for these potential problems with project closure

      Don’t leave the door open for stakeholder dissatisfaction. Properly close out your projects.

      Potential problems with project closure.

      For further information on project closure issues, use Info-Tech’s blueprint, Get Started With Project Management Excellence.

      3.4.2 Prepare a closure document for sign-off

      0.5-1 hour

      1. Create a realistic closure and transition process that gains sign-off from the sponsor.
      2. Prepare a project closure checklist.
      3. Transfer accountability to operations, release project resources, and avoid disrupting other projects that are trying to get started.
      4. Record the project closure document in section 3.8 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your project objectives
      • Your project scope
      • Your project's closure checklist

      Materials

      Participants

      • Project closure checklist Template
      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Closure checklist

      Project closure checklist. project management checklist, deliverables, goals, benefits, outstanding action items and issues, handover of technical documents, knowledge transfer, sign-off.

      For further information on closure procedures, use Info-Tech’s blueprint, Begin Your Projects With the End in Mind.

      3.4.3 Document optimization and future release opportunities

      0.5-1 hour

      Consider the future opportunities for improvement post-release:

      1. Product and vendor satisfaction opportunities
      2. Capability and feature optimization opportunities
      3. Process optimization opportunities
      4. Integration optimization opportunities
      5. Data optimization opportunities
      6. Cost-saving opportunities
      7. Record optimization and future release opportunities in section 3.9 of Info-Tech’s Your Enterprise Application Implementation Playbook.

      Download

      Your Enterprise Application Implementation Playbook.

      Input

      Output

      • Your project objectives
      • Your project scope
      • Your optimization opportunities list

      Materials

      Participants

      • Whiteboard/flip charts
      • Your Enterprise Application Implementation Playbook.
      • Project team
      • Operations
      • SMEs
      • Team lead and facilitators
      • IT leaders

      Optimization opportunities

      Example

      Optimization types and opportunities.

      Related Info-Tech Research

      Build upon your foundations

      Build an ERP Strategy and Roadmap

      • A business-led, top-management-supported initiative partnered with IT has the greatest chance of success. This blueprint provides business and IT the methodology for getting the right level of detail for the business processes that the ERP supports thus avoiding getting lost in the details.

      Governance and Management of Enterprise Software Implementation

      • Implementing enterprise software is hard. You need a framework that will greatly improve your chance of success. Traditional Waterfall project implementations have a demonstrated a low success rate for on-time, on-budget delivery.

      Select and Implement a Human Resource Information System

      • Your organization is in the midst of a selection and implementation process for a human resource information system (HRIS), and there is a need to disambiguate the market and arrive at a shortlist of vendors.

      Select and Implement an ERP Solution

      • Selecting and implementing an ERP is one of the most expensive and time-consuming technology transformations an organization can undertake. ERP projects are notorious for time and budget overruns, with only a margin of the anticipated benefits being realized.

      Right-Size Your Project Risk Investment

      • Avoid the all-or-nothing mindset; even modest investments in risk will provide a return. Learn from and record current and historical risk events so lessons learned can easily be embedded into future projects. Assign someone to own the risk topic and make it their job to keep a relevant menu of risks.

      Related Info-Tech Research

      Build upon your foundations

      Drive Business Value With a Right-Sized Project Gating Process

      • Many organizations have implemented gating as part of their project management process. So, what separates those who are successful from those who are not? For starters, successful gating requires that each gate is treated as an essential audit. That means there need to be clear roles and responsibilities in the framework.

      Master Organizational Change Management Practices

      • Organizational change management (OCM) is often an Achilles’ heel for IT departments and business units, putting projects and programs at risk – especially large, complex, transformational projects.

      Get Started With Project Management Excellence

      • Lack of proper scoping at the beginning of the project leads to constant rescoping, rescheduling, and budget overruns.

      ERP Requirements Picklist Tool

      • Use this tool to collect ERP requirements in alignment with the major functional areas of ERP. Review the existing set of ERP requirements as a starting point to compiling your organization's requirements.

      Begin Your Projects With the End in Mind

      • Stakeholders are dissatisfied with IT’s inability to meet or even provide consistent, accurate estimates. The business’ trust in IT erodes every time a project is late, lost, or unable to start.

      Get Started With IT Project Portfolio Management

      • Most companies are struggling to get their project work done. This is due in part to the fact that many prescribed remedies are confusing, disruptive, costly, or ineffective.

      Bibliography

      7 Shocking Project Management Statistics and Lessons We Should Learn.” TeamGantt, Jan. 2017.

      Akrong, Godwin Banafo, et al. "Overcoming the Challenges of Enterprise Resource Planning (ERP): A Systematic Review Approach." IJEIS vol.18, no.1 2022: pp.1-41.

      Andriole, S. “Why No One Can Manage Projects, Especially Technology Projects.” Forbes, 1 Dec. 2020.

      Andriole, Steve. “Why No One Can Manage Projects, Especially Technology Projects.” Forbes, 1 Dec. 2020.

      Beeson, K. “ERP Implementation Plan (ERP Implementation Process Guide).” ERP Focus, 8 Aug. 2022.

      Biel, Justin. “60 Critical ERP Statistics: 2022 Market Trends, Data and Analysis.” Oracle Netsuite, 12 July 2022.

      Bloch, Michael, et al. “Delivering Large-Scale IT Projects on Time, on Budget, and on Value.” McKinsey & Company, 2012.

      Buverud, Heidi. ERP System Implementation: How Top Managers' Involvement in a Change Project Matters. 2019. Norwegian School of Economics, Ph.D. thesis.

      Carlton, R. “Four ERP Implementation Case Studies You Can Learn From.” ERP Focus, 15 July 2015.

      Gopinath, S. Project Management in the Emerging World of Disruption. PMI India Research and Academic Conference 2019. Kozhikode Publishers.

      Grabis, J. “On-Premise or Cloud Enterprise Application Deployment: Fit-Gap Perspective.” Enterprise Information Systems. Edited by Filipe, J., Śmiałek, M., Brodsky, A., Hammoudi, S. ICEIS, 2019.

      Harrin, E. The Definitive Guide to Project Sponsors. RGPM, 13 Dec. 2022.

      Jacobs-Long, Ann. “EPMO’s Can Make A Difference In Your Organization.” 9 May 2012.

      Kotadia, C. “Challenges Involved in Adapting and Implementing an Enterprise Resource Planning (ERP) Systems.” International Journal of Research and Review vol. 7 no. 12 December 2020: 538-548.

      Panorama Consulting Group. "2018 ERP Report." Panorama Consulting Group, 2018. Accessed 12 Oct. 2021.

      Panorama Consulting Group. "2021 ERP Report." Panorama Consulting Group, 2021. Accessed 12 Oct. 2021.

      PM Solutions. (2014). The State of the PMO 2014.

      PMI. Pulse of the Profession. 2017.

      Podeswa, H. “The Business Case for Agile Business Analysis.” Requirements Engineering Magazine, 21 Feb. 2017.

      Project Delivery Performance in Australia. AIPM and KPMG, 2020.

      Prosci. (2020). Prosci 2020 Benchmarking Data from 2007, 2009, 2011, 2013, 2015, 2017, 2019.

      Swartz, M. “End User Adoption and Change Management Process.” Swartz Consulting LLC, 11 July 2022.

      Trammell, H. “28 Important Project Management KPIs (& How To Track Them).” ClearPoint Strategy, 2022.

      “What are Business Requirements?" Requirements.com, 18 Oct. 2018.

      “What Is the Role of a Project Sponsor?” Six Sigma Daily, 18 May 2022.

      “When Will You Think Differently About Programme Delivery?” 4th Global Portfolio and Programme Management Survey. PricewaterhouseCoopers, Sept. 2014.

      Become a Transformational CIO

      • Buy Link or Shortcode: {j2store}86|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Business transformations are happening, but CIOs are often involved only when it comes time to implement change. This makes it difficult for the CIO to be perceived as an organizational leader.
      • CIOs find it difficult to juggle operational activities, strategic initiatives, and involvement in business transformation.
      • CIOs don’t always have the IT organization structured and mobilized in a manner that facilitates the identification of transformation opportunities, and the planning for and the implementation of organization-wide change.

      Our Advice

      Critical Insight

      • Don’t take an ad hoc approach to transformation.
      • You’re not in it alone.
      • Your legacy matters

      Impact and Result

      • Elevate your stature as a business leader.
      • Empower the IT organization to act with a business mind first, and technology second.
      • Create a high-powered IT organization that is focused on driving lasting change, improving client experiences, and encouraging collaboration across the entire enterprise.
      • Generate opportunities for organizational growth, as manifested through revenue growth, profit growth, new market entry, new product development, etc.

      Become a Transformational CIO Research & Tools

      Start here – read the Executive Brief

      Read our Executive Brief to find out why you should undergo an evolution in your role as a business leader, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Are you ready to lead transformation?

      Determine whether you are ready to focus your attention on evolving your role.

      • Become a Transformational CIO – Phase 1: Are You Ready to Lead Transformation?

      2. Build business partnerships

      Create a plan to establish key business partnerships and position IT as a co-leader of transformation.

      • Become a Transformational CIO – Phase 2: Build Business Partnerships
      • Partnership Strategy Template

      3. Develop the capability to transform

      Mobilize the IT organization and prepare for the new mandate.

      • Become a Transformational CIO – Phase 3: Develop the Capability to Transform
      • Transformation Capability Assessment

      4. Shift IT’s focus to the customer

      Align IT with the business through a direct, concentrated focus on the customer.

      • Become a Transformational CIO – Phase 4: Shift IT’s Focus to the Customer
      • Transformational CIO Value Stream Map Template
      • Transformational CIO Business Capability Map Template

      5. Adopt a transformational approach to leadership

      Determine the key behaviors necessary for transformation success and delegate effectively to make room for new responsibilities.

      • Become a Transformational CIO – Phase 5: Adopt a Transformational Approach to Leadership
      • Office of the CIO Template

      6. Sustain the transformational capability

      Track the key success metrics that will help you manage transformation effectively.

      • Become a Transformational CIO – Phase 6: Sustain the Transformational Capability
      • Transformation Dashboard
      [infographic]

      Workshop: Become a Transformational CIO

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Determine Readiness to Become a Transformational CIO

      The Purpose

      Understand stakeholder and executive perception of the CIO’s performance and leadership.

      Determine whether the CIO is ready to lead transformation.

      Key Benefits Achieved

      Decision to evolve role or address areas of improvement as a pre-requisite to becoming a transformational CIO.

      Activities

      1.1 Select data collection techniques.

      1.2 Conduct diagnostic programs.

      1.3 Review results and define readiness.

      Outputs

      Select stakeholder and executive perception of the CIO

      Decision as to whether to proceed with the role evolution

      2 Build Business Partnerships

      The Purpose

      Identify potential business partners and create a plan to establish key partnerships.

      Key Benefits Achieved

      An actionable set of initiatives that will help the CIO create valuable partnerships with internal or external business stakeholders.

      Activities

      2.1 Identify potential business partners.

      2.2 Evaluate and prioritize list of potential partners.

      2.3 Create a plan to establish the target partnerships.

      Outputs

      Partnership strategy

      3 Establish IT’s Ability to Transform

      The Purpose

      Make the case and plan for the development of key capabilities that will enable the IT organization to handle transformation.

      Key Benefits Achieved

      A maturity assessment of critical capabilities.

      A plan to address maturity gaps in preparation for a transformational mandate.

      Activities

      3.1 Define transformation as a capability.

      3.2 Assess the current and target transformation capability maturity.

      3.3 Develop a roadmap to address gaps.

      Outputs

      Transformation capability assessment

      Roadmap to develop the transformation capability

      4 Shift IT’s Focus to the Customer

      The Purpose

      Gain an understanding of the end customer of the organization.

      Key Benefits Achieved

      A change in IT mindset away from a focus on operational activities or internal customers to external customers.

      A clear understanding of how the organization creates and delivers value to customers.

      Opportunities for business transformation.

      Activities

      4.1 Analyze value streams that impact the customer.

      4.2 Map business capabilities to value streams.

      Outputs

      Value stream maps

      Business capability map

      5 Establish Transformation Leadership and Sustain the Capability

      The Purpose

      Establish a formal process for empowering employees and developing new leaders.

      Create a culture of continuous improvement and a long-term focus.

      Key Benefits Achieved

      Increased ability to sustain momentum that is inherent to business transformations.

      Better strategic workforce planning and a clearer career path for individuals in IT.

      A system to measure IT’s contribution to business transformation.

      Activities

      5.1 Set the structure for the office of the CIO.

      5.2 Assess current leadership skills and needs.

      5.3 Spread a culture of self-discovery.

      5.4 Maintain the transformation capability.

      Outputs

      OCIO structure document

      Transformational leadership dashboard

      Review and Improve Your IT Policy Library

      • Buy Link or Shortcode: {j2store}193|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $34,724 Average $ Saved
      • member rating average days saved: 14 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Your policies are out of date, disorganized, and complicated. They don’t reflect current regulations and don’t actually mitigate your organization’s current IT risks.
      • Your policies are difficult to understand, aren’t easy to find, or aren’t well monitored and enforced for compliance. As a result, your employees don’t care about your policies.
      • Policy issues are taking up too much of your time and distracting you from the real issues you need to address.

      Our Advice

      Critical Insight

      A dynamic and streamlined policy approach will:

      1. Right-size policies to address the most critical IT risks.
      2. Clearly lay out a step-by-step process to complete daily tasks in compliance.
      3. Obtain policy adherence without having to be “the police.”

      To accomplish this, the policy writer must engage their audience early to gather input on IT policies, increase policy awareness, and gain buy-in early in the process.

      Impact and Result

      • Develop more effective IT policies. Clearly express your policy goals and objectives, standardize the approach to employee problem solving, and write policies your employees will actually read.
      • Improve risk coverage. Ensure full coverage on the risk landscape, including legal regulations, and establish a method for reporting, documenting, and communicating risks.
      • Improve employee compliance. Empathize with your employees and use policy to educate, train, and enable them instead of restricting them.

      Review and Improve Your IT Policy Library Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to write better policies that mitigate the risks you care about and get the business to follow them, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess

      Assess your risk landscape and design a plan to update your policy network based on your most critical risks.

      • Review and Improve Your IT Policy Library – Phase 1: Assess
      • Policy Management RACI Chart Template
      • Policy Management Tool
      • Policy Action Plan

      2. Draft and implement

      Use input from key stakeholders to write clear, consistent, and concise policies that people will actually read and understand. Then publish them and start generating policy awareness.

      • Review and Improve Your IT Policy Library – Phase 2: Draft and Implement
      • Policy Template
      • Policy Communication Plan Template

      3. Monitor, enforce, revise

      Use your policies to create a compliance culture in your organization, set KPIs, and track policy effectiveness.

      • Review and Improve Your IT Policy Library – Phase 3: Monitor, Enforce, Revise
      [infographic]

      Workshop: Review and Improve Your IT Policy Library

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish & Assess

      The Purpose

      Identify the pain points associated with IT policies.

      Establish the policy development process.

      Begin formulating a plan to re-design the policy network.

      Key Benefits Achieved

      Establish the policy process.

      Highlight key issues and pain points regarding policy.

      Assign roles and responsibilities.

      Activities

      1.1 Introduce workshop.

      1.2 Identify the current pain points with policy management.

      1.3 Establish high-level goals around policy management.

      1.4 Select metrics to measure achievement of goals.

      1.5 Create an IT policy working group (ITPWG).

      1.6 Define the scope and purpose of the ITPWG.

      Outputs

      List of issues and pain points for policy management

      Set of six to ten goals for policy management

      Baseline and target measured value

      Amended steering committee or ITPWG charter

      Completed RACI chart

      Documented policy development process

      2 Assess Your Risk Landscape & Map Policies to Risks; Create a Policy Action Plan

      The Purpose

      Identify key risks.

      Develop an understanding of which risks are most critical.

      Design a policy network that best mitigates those risks.

      Key Benefits Achieved

      Use a risk-driven approach to decide which policies need to be written or updated first.

      Activities

      2.1 Identify risks at a high level.

      2.2 Assess each identified risk scenario on impact and likelihood.

      2.3 Map current and required policies to risks.

      2.4 Assess policy effectiveness.

      2.5 Create a policy action plan.

      2.6 Select policies to be developed during workshop.

      Outputs

      Ranked list of IT’s risk scenarios

      Prioritized list of IT risks (simplified risk register)

      Policy action plan

      3 Develop Policies

      The Purpose

      Outline what key features make a policy effective and write policies that mitigate the most critical IT risks.

      Key Benefits Achieved

      Write policies that work and get them approved.

      Activities

      3.1 Define the policy audience, constraints, and in-scope and out-of-scope requirements for a policy.

      3.2 Draft two to four policies

      Outputs

      Drafted policies

      4 Create a Policy Communication and Implementation Plan and Monitor & Reassess the Portfolio

      The Purpose

      Build an understanding of how well the organization’s value creation activities are being supported.

      Key Benefits Achieved

      Identify an area or capability that requires improvement.

      Activities

      4.1 Review draft policies and update if necessary.

      4.2 Create a policy communication plan.

      4.3 Select KPIs.

      4.4 Review root-cause analysis techniques.

      Outputs

      Final draft policies

      Policy communications plan

      KPI tracking log

      Portfolio Management

      • Buy Link or Shortcode: {j2store}47|cart{/j2store}
      • Related Products: {j2store}47|crosssells{/j2store}
      • member rating overall impact: 9.6/10
      • member rating average dollars saved: $40,234
      • member rating average days saved: 30
      • Parent Category Name: Applications
      • Parent Category Link: /applications

      The challenge

      • Typically your business wants much more than your IT development organization can deliver with the available resources at the requested quality levels.
      • Over-damnd has a negative influence on delivery throughput. IT starts many projects (or features) but has trouble delivering most of them within the set parameters of scope, time, budget, and quality. Some requested deliverables may even be of questionable value to the business.
      • You may not have the right project portfolio management (PPM) strategy to bring order in IT's delivery activities and to maximize business value.

      Our advice

      Insight

      • Many in IT mix PPM and project management. Your project management playbook does not equate to the holistic view a real PPM practice gives you.
      • Some organizations also mistake PPM for a set of processes. Processes are needed, but a real strategy works towards tangible goals.
      • PPM works at the strategic level of the company; hence executive buy-in is critical. Without executive support, any effort to reconcile supply and demand will be tough to achieve.

      Impact and results 

      • PPM is a coherent business-aligned strategy that maximizes business value creation across the entire portfolio, rather than in each project.
      • Our methodology tackles the most pressing challenge upfront: get executive buy-in before you start defining your goals. With senior management behind the plan, implementation will become easier.
      • Create PPM processes that are a cultural fit for your company. Define your short and long-term goals for your strategy and support them with fully embedded portfolio management processes.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand why you should develop a PPM strategy and understand how our methodology can help you. We show you how we can support you.

      Obtain executive buy-in for your strategy

      Ensure your strategy is a cultural fit or cultural-add for your company.

      • Develop a Project Portfolio Management Strategy – Phase 1: Get Executive Buy-In for Your PPM Strategy (ppt)
      • PPM High-Level Supply-Demand Calculator (xls)
      • PPM Strategic Plan Template (ppt)
      • PPM Strategy-Process Goals Translation Matrix Template (xls)

      Align the PPM processes to your company's strategic goals

      Use the advice and tools in this stage to align the PPM processes.

      • Develop a Project Portfolio Management Strategy – Phase 2: Align PPM Processes to Your Strategic Goals (ppt)
      • PPM Strategy Development Tool (xls)

      Refine and complete your plan

      Use the inputs from the previous stages and add a cost-benefit analysis and tool recommendation.

      • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities (ppt)

      Streamline your maintenance delivery

      Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.

      • Develop a Project Portfolio Management Strategy – Phase 3: Complete Your PPM Strategic Plan (ppt)
      • Project Portfolio Analyst / PMO Analyst (doc)

       

       

      Optimize Your SQA Practice Using a Full Lifecycle Approach

      • Buy Link or Shortcode: {j2store}405|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Testing, Deployment & QA
      • Parent Category Link: /testing-deployment-and-qa
      • Your software quality assurance (SQA) program is using the wrong set of metrics to measure how process improvements influence product quality improvements.
      • Roles & responsibilities and quality assurance initiatives are not well defined and need to be allocated to individuals that can be held responsible for quality-related issues.
      • You are finding it hard to determine a causation between SQA process improvements and an improvement in product quality.

      Our Advice

      Critical Insight

      • Your product is only as good as your process. A robust development and SQA process creates artifacts that are highly testable, easily maintained, and strongly traceable across the development lifecycle, ensuring that the product delivered meets expectations set out by the business.
      • A small issue within your development process can have a ripple effect on the level of product quality. Discover what you don’t know and identify areas within your SQA practice that require attention.

      Impact and Result

      • SQA must be viewed as more than defect analysis and testing. Instead, place greater emphasis on preventative measures to ensure application quality across the entire development lifecycle.
      • IT must create a comprehensive SQA plan that delineates roles and responsibilities as they relate to quality assurance. Ensure tasks and procedures improve process efficiency and quality, and formalize metrics that help to implement a continuous improvement cycle for SQA.
      • Our methodology provides simple-to-follow steps to develop an SQA plan that provides clear insight into your current quality assurance practices.
      • Establish a synchronous relationship between the business and IT to help stakeholders understand the importance and relative value of quality assurance tasks to current costs.

      Optimize Your SQA Practice Using a Full Lifecycle Approach Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize your SQA practice using a full lifecycle approach, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess your current SQA capabilities

      Evaluate and understand your current SQA capabilities, as well as the degree to which metric objectives are being met.

      • Optimize Your SQA Practice Using a Full Lifecycle Approach – Phase 1: Assess Your Current SQA Capabilities
      • Software Quality Assurance Current State Assessment Tool
      • Software Quality Assurance Assessment Workbook

      2. Define SQA target state processes

      Identify and define SQA processes and metrics needed to meet quality objectives set by development teams and the business.

      • Optimize Your SQA Practice Using a Full Lifecycle Approach – Phase 2: Define SQA Target State Processes

      3. Determine optimization initiatives for improving your SQA practice

      Build your SQA plan and optimization roadmap.

      • Optimize Your SQA Practice Using a Full Lifecycle Approach – Phase 3: Determine Optimization Initiatives
      • Software Quality Assurance Plan Template
      • Software Quality Assurance Optimization Roadmap Tool
      • Software Quality Assurance Communication Template
      [infographic]

      Workshop: Optimize Your SQA Practice Using a Full Lifecycle Approach

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Your Current SQA Capabilities

      The Purpose

      To help you assess and understand your current SQA capabilities as well as the degree to which metric objectives are being met.

      Key Benefits Achieved

      An analysis of current SQA practices to provide insight into potential inefficiencies, opportunities, and to provide the business with sufficient rationale for improving current quality assurance initiatives.

      Activities

      1.1 Conduct a high-level assessment of where to focus your current state analysis.

      1.2 Document your high-level development process.

      1.3 Create a RACI chart to understand roles and responsibilities.

      1.4 Perform a SIPOC-MC analysis for problem areas identified in your SDLC.

      1.5 Identify the individual control points involved with passing software artifacts through SDLC stages being assessed.

      1.6 Identify problem areas within your SDLC as they relate to SQA.

      Outputs

      Understanding of current overall development process and where it is most weak in the context of quality assurance

      Understanding of assigned roles and responsibilities across development teams, including individuals who are involved with making quality-related decisions for artifact hand-off

      Identification of problem areas within SQA process for further analysis

      2 Define SQA Target State Processes

      The Purpose

      To help you identify and define SQA processes and metrics needed to meet quality objectives set out by development teams and the business.

      Key Benefits Achieved

      A revised list of key SQA tasks along with metrics and associated tolerance limits used universally for all development projects.

      Activities

      2.1 Establish SQA metrics and tolerance limits across your SDLC.

      2.2 Determine your target state for SQA processes within the define/design stage of the SDLC.

      2.3 Determine your target state for SQA processes within the development stage of the SDLC.

      2.4 Determine your target state for SQA processes within the testing stage of the SDLC.

      2.5 Determine your target state for SQA processes within the deploy/release stage of the SDLC.

      Outputs

      Identification of the appropriate metrics and their associated tolerance limits to provide insights into meeting quality goals and objectives during process execution

      Identification of target state SQA processes that are required for ensuring quality across all development projects

      3 Prioritize SQA Optimization Initiatives and Develop Optimization Roadmap

      The Purpose

      Based on discovered inefficiencies, define optimization initiatives required to improve your SQA practice.

      Key Benefits Achieved

      Optimization initiatives and associated tasks required to address gaps and improve SQA capabilities.

      Activities

      3.1 Determine optimization initiatives for improving your SQA process.

      3.2 Gain the full scope of effort required to implement your SQA optimization initiatives.

      3.3 Identify the enablers and blockers of your SQA optimization.

      3.4 Define your SQA optimization roadmap.

      Outputs

      Prioritized list of optimization initiatives for SQA

      Assessment of level of effort for each SQA optimization initiative

      Identification of enablers and blockers for optimization initiatives

      Identification of roadmap timeline for implementing optimization initiatives

      Develop Meaningful Service Metrics

      • Buy Link or Shortcode: {j2store}399|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $20,308 Average $ Saved
      • member rating average days saved: 30 Average Days Saved
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • IT organizations measure services from a technology perspective but rarely from a business goal or outcome perspective.
      • Most organizations do a poor job of identifying and measuring service outcomes over the duration of a service’s lifecycle – never ensuring the services remain valuable and meet expected long-term ROI.

      Our Advice

      Critical Insight

      • Service metrics are critical to ensuring alignment of IT service performance and business service value achievement.
      • Service metrics reinforce positive business and end-user relationships by providing user-centric information that drives responsiveness and consistent service improvement.
      • Poorly designed metrics drive unintended and unproductive behaviors that have negative impacts on IT and produce negative service outcomes.

      Impact and Result

      Effective service metrics will provide the following service gains:

      • Confirm service performance and identify gaps.
      • Drive service improvement to maximize service value.
      • Validate performance improvements while quantifying and demonstrating business value.
      • Ensure service reporting aligns with end-user experience.
      • Achieve and confirm process and regulatory compliance.

      Which will translate into the following relationship gains:

      • Embed IT into business value achievement.
      • Improve the relationship between the business and IT.
      • Achieve higher customer satisfaction (happier end users receiving expected service, the business is able to identify how things are really performing).
      • Reinforce desirable actions and behaviors from both IT and the business.

      Develop Meaningful Service Metrics Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop meaningful service metrics, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Develop Meaningful Service Metrics – Executive Brief
      • Develop Meaningful Service Metrics – Phases 1-3

      1. Design the metrics

      Identify the appropriate service metrics based on stakeholder needs.

      • Develop Meaningful Service Metrics to Ensure Business and User Satisfaction – Phase 1: Design the Metrics
      • Metrics Development Workbook

      2. Design reports and dashboards

      Present the right metrics in the most interesting and stakeholder-centric way possible.

      • Develop Meaningful Service Metrics to Ensure Business and User Satisfaction – Phase 2: Design Reports and Dashboards
      • Metrics Presentation Format Selection Guide

      3. Implement, track, and maintain

      Run a pilot with a smaller sample of defined service metrics, then continuously validate your approach and make refinements to the processes.

      • Develop Meaningful Service Metrics to Ensure Business and User Satisfaction – Phase 3: Implement, Track, and Maintain
      • Metrics Tracking Tool
      [infographic]

      Workshop: Develop Meaningful Service Metrics

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Design the Metrics

      The Purpose

      Define stakeholder needs for IT based on their success criteria and identify IT services that are tied to the delivery of business outcomes.

      Derive meaningful service metrics based on identified IT services and validate that metrics can be collected and measured.

      Key Benefits Achieved

      Design meaningful service metrics from stakeholder needs.

      Validate that metrics can be collected and measured.

      Activities

      1.1 Determine stakeholder needs, goals, and pain points.

      1.2 Determine the success criteria and related IT services.

      1.3 Derive the service metrics.

      1.4 Validate the data collection process.

      1.5 Validate metrics with stakeholders.

      Outputs

      Understand stakeholder priorities

      Adopt a business-centric perspective to align IT and business views

      Derive meaningful business metrics that are relevant to the stakeholders

      Determine if and how the identified metrics can be collected and measured

      Establish a feedback mechanism to have business stakeholders validate the meaningfulness of the metrics

      2 Design Reports and Dashboards

      The Purpose

      Determine the most appropriate presentation format based on stakeholder needs.

      Key Benefits Achieved

      Ensure the metrics are presented in the most interesting and stakeholder-centric way possible to guarantee that they are read and used.

      Activities

      2.1 Understand the different presentation options.

      2.2 Assess stakeholder needs for information.

      2.3 Select and design the metric report.

      Outputs

      Learn about infographic, scorecard, formal report, and dashboard presentation options

      Determine how stakeholders would like to view information and how the metrics can be presented to aid decision making

      Select the most appropriate presentation format and create a rough draft of how the report should look

      3 Implement, Track, and Maintain Your Metrics

      The Purpose

      Run a pilot with a smaller sample of defined service metrics to validate your approach.

      Make refinements to the implementation and maintenance processes prior to activating all service metrics.

      Key Benefits Achieved

      High user acceptance and usability of the metrics.

      Processes of identifying and presenting metrics are continuously validated and improved.

      Activities

      3.1 Select the pilot metrics.

      3.2 Gather data and set initial targets.

      3.3 Generate the reports and validate with stakeholders.

      3.4 Implement the service metrics program.

      3.5 Track and maintain the metrics program.

      Outputs

      Select the metrics that should be first implemented based on urgency and impact

      Complete the service intake form for a specific initiative

      Create a process to gather data, measure baselines, and set initial targets

      Establish a process to receive feedback from the business stakeholders once the report is generated

      Identify the approach to implement the metrics program across the organization

      Set up mechanism to ensure the success of the metrics program by assessing process adherence and process validity

      Further reading

      Develop Meaningful Service Metrics

      Select IT service metrics that drive business value.

      ANALYST PERSPECTIVE

      Are you measuring and reporting what the business needs to know?

      “Service metrics are one of the key tools at IT’s disposal in articulating and ensuring its value to the business, yet metrics are rarely designed and used for that purpose.

      Creating IT service metrics directly from business and stakeholder outcomes and goals, written from the business perspective and using business language, is critical to ensuring that the services that IT provides are meeting business needs.

      The ability to measure, manage, and improve IT service performance in relation to critical business success factors, with properly designed metrics, embeds IT in the value chain of the business and ensures IT’s focus on where and how it enables business outcomes.”

      Valence Howden,
      Senior Manager, CIO Advisory
      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:
      • CIO
      • IT VPs
      This Research Will Help You:
      • Align business/IT objectives (design top-down or outside-in)
      • Significantly improve the relationship between the business and IT aspects of the organization
      • Reinforce desirable actions and behaviors
      This Research Will Also Assist:
      • Service Level Managers
      • Service Owners
      • Program Owners
      This Research Will Help Them
      • Identify unusual deviations from the normal operating state
      • Drive service improvement to maximize service value
      • Validate the value of performance improvements while quantifying and demonstrating benefits realization

      Executive summary

      Situation

      • IT organizations measure services from a technology perspective yet rarely measure services from a business goal/outcome perspective.
      • Most organizations do a poor job of identifying and measuring service outcomes over the duration of a service’s lifecycle – never ensuring the services remain valuable and meet expected long-term ROI.

      Complication

      • IT organizations have difficulty identifying the right metrics to demonstrate the value of IT services to the business in tangible terms.
      • IT metrics, as currently designed, reinforce division between the IT and business perspectives of service performance. They drive siloed thinking and finger-pointing within the IT structure, and prevent IT resources from understanding how their work impacts business value.

      Resolution

      • Our program enables IT to develop the right service metrics to tie IT service performance to business value and user experience.
      • Ensure the metrics you implement have immediate stakeholder value, reinforcing alignment between IT and the business while influencing behavior in the desired direction.
      • Make sure that your metrics are defined in relation to the business goals and drivers, ensuring they will provide actionable outcomes.

      Info-Tech Insight

      1. Service metrics are critical to ensuring alignment of IT service performance and business service value achievement.
      2. Service metrics reinforce positive business and end-user relationships by providing user-centric information that drives responsiveness and consistent service improvement.
      3. Poorly designed metrics drive unintended and unproductive behaviors, which have negative impacts on IT and produce negative service outcomes.

      Service metrics 101

      What are service metrics?

      Service metrics measure IT services in a way that relates to a business outcome. IT needs to measure performance from the business perspective using business language.

      Why do we need service metrics?

      To ensure the business cares about the metrics that IT produces, start with business needs to make sure you’re measuring the right things. This will give IT the opportunity talk to the right stakeholders and develop metrics that will meet their business needs.

      Service metrics are designed with the business perspective in mind, so they are fully aligned with business objectives.

      Perspectives Matter

      Different stakeholders will require different types of metrics. A CEO may require metrics that provide a snapshot of the critical success of the company while a business manager is more concerned about the performance metrics of their department.

      What are the benefits of implementing service metrics?

      Service metrics help IT communicate with the business in business terms and enables IT to articulate how and where they provide business value. Business stakeholders can also easily understand how IT services contribute to their success.

      The majority of CIOs feel metrics relating to business value and stakeholder satisfaction require significant improvement

      A significantly higher proportion of CIOs than CEOs feel that there is significant improvement necessary for business value metrics and stakeholder satisfaction reporting. Stacked horizontal bar chart presenting survey results from CIOs and CXOs of 'Business Value Metrics'. Answer options are 'Effective', 'Some Improvement Necessary', 'Significant Improvement Necessary', and 'Not Required'.N=364

      Stacked horizontal bar chart presenting survey results from CIOs and CXOs of 'Stakeholder Satisfaction Reporting'. Answer options are 'Effective', 'Some Improvement Necessary', 'Significant Improvement Necessary', and 'Not Required'.N=364

      (Source: Info-Tech CIO-CXO Alignment Diagnostic Survey)

      Meaningless metrics are a headache for the business

      A major pitfall of many IT organizations is that they often provide pages of technical metrics that are meaningless to their business stakeholders.

      1. Too Many MetricsToo many metrics are provided and business leaders don’t know what to do with these metrics.
      2. Metrics Are Too TechnicalIT provides technical metrics that are hard to relate to business needs, and methods of calculating metrics are not clearly understood, articulated, and agreed on.
      3. Metrics Have No Business ValueService metrics are not mapped to business goals/objectives and they drive incorrect actions or spend.
      When considering only CEOs who said that stakeholder satisfaction reporting needed significant improvement, the average satisfaction score goes down to 61.6%, which is a drop in satisfaction of 12%.

      A bar that says 73% dropping to a bar that says 61%. Description above.

      (Source: Info-Tech Research Group CIO-CXO Alignment Diagnostic Survey)

      Poorly designed metrics hurt IT’s image within the organization

      By providing metrics that do not articulate the value of IT services, IT reinforces its role as a utility provider and an outsider to strategic decisions.

      When the CIOs believe business value metrics weren’t required, 50% of their CEOs said that significant improvements were necessary.

      Pie Chart presenting the survey results from CEOs regarding 'Business Value Metrics'. Description above.

      (Source: Info-Tech Research Group CIO-CXO Alignment Diagnostic Survey)
      1. Reinforce the wrong behaviorThe wrong metrics drive us-against-them, siloed thinking within IT, and meeting metric targets is prioritized over providing meaningful outcomes.
      2. Do not reflect user experienceMetrics don’t align with actual business/user experience, reinforcing a poor view of IT services.
      3. Effort ≠ ValueInvesting dedicated resources and effort to the achievement of the wrong metrics will only leave IT more constrained for other important initiatives.

      Articulate meaningful service performance that supports the achievement of business outcomes

      Service metrics measure the performance of IT services and how they enable or drive the activity outcomes.

      A business process consists of multiple business activities. In many cases, these business activities require one or more supporting IT services.

      A 'Business Process' broken down to its parts, multiple 'Business Activities' and their 'IT Services'. For each business process, business stakeholders and their goals and objectives should be identified.

      For each business activity that supports the completion of a business process, define the success criteria that must be met in order to produce the desirable outcome.

      Identify the IT services that are used by business stakeholders for each business activity. Measure the performance of these services from a business perspective to arrive at the appropriate service metrics.

      Differentiate between different types of metrics

      Stakeholders have different goals and objectives; therefore, it is critical to identify what type of metrics should be presented to each stakeholder.

      Business Metrics

      Determine Business Success

      Business metrics are derived from a pure business perspective. These are the metrics that the business stakeholders will measure themselves on, and business success is determined using these metrics.

      Arrow pointing right.

      Service Metrics

      Manage Service Value to the Business

      Service metrics are used to measure IT service performance against business outcomes. These metrics, while relating to IT services, are presented in business terms and are tied to business goals.

      Arrow pointing right.

      IT Metrics

      Enable Operational Excellence

      IT metrics are internal to the IT organization and used to manage IT service delivery. These metrics are technical, IT-specific, and drive action for IT. They are not presented to the business, and are not written in business language.

      Implementing service metrics is a key step in becoming a service provider and business partner

      As a prerequisite, IT organizations must have already established a solid relationship with the business and have a clear understanding of its critical business-facing services.

      At the very least, IT needs to have a service-oriented view and understand the specific needs and objectives associated with each stakeholder.

      Visualization of 'Business Relationship Management' with an early point on the line representing 'Service Provider: Establish service-oriented culture and business-centric service delivery', and the end of the line being 'Strategic Partner'.

      Once IT can present service metrics that the business cares about, it can continue on the service provider journey by managing the performance of services based on business needs, determine and influence service demand, and assess service value to maximize benefits to the business.

      Which processes drive service metrics?

      Both business relationship management (BRM) and service level management (SLM) provide inputs into and receive outputs from service metrics.

      Venn Diagram of 'Business Relationship Management', 'Service Metrics', and 'Service Level Management'.

      Business Relationship Management

      BRM works to understand the goals and objectives of the business and inputs them into the design of the service metrics.

      Service Metrics

      BRM leverages service metrics to help IT organizations manage the relationship with the business.

      BRM articulates and manages expectations and ensures IT services are meeting business requirements.

      Which processes drive service metrics?

      Both BRM and SLM provide inputs into and receive outputs from service metrics.

      Venn Diagram of 'Business Relationship Management', 'Service Metrics', and 'Service Level Management'.

      Service Level Management

      SLM works with the business to understand service requirements, which are key inputs in designing the service metrics.

      Service Metrics

      SLM leverages service metrics in overseeing the day-to-day delivery of IT services. It ensures they are provided to meet expected service level targets and objectives.

      Effective service metrics will deliver both service gains and relationship gains

      Effective service metrics will provide the following service gains:

      • Confirm service performance and identify gaps
      • Drive service improvement to maximize service value
      • Validate performance improvements while quantifying and demonstrating business value
      • Ensure service reporting aligns with end-user experience
      • Achieve and confirm process and regulatory compliance
          Which will translate into the following relationship gains:
          • Embed IT into business value achievement
          • Improve relationship between the business and IT
          • Achieve higher customer satisfaction (happier end users receiving expected service, the business is able to identify how things are really performing)
          • Reinforce desirable actions and behaviors from both IT and the business

      Don’t let conventional wisdom become your roadblock

      Conventional Wisdom

      Info-Tech Perspective

      Metrics are measured from an application or technology perspective Metrics need to be derived from a service and business outcome perspective.
      The business doesn’t care about metrics Metrics are not usually designed to speak in business terms about business outcomes. Linking metrics to business objectives creates metrics that the business cares about.
      It is difficult to have a metrics discussion with the business It is not a metrics/number discussion, it is a discussion on goals and outcomes.
      Metrics are only presented for the implementation of the service, not the ongoing outcome of the service IT needs to focus on service outcome and not project outcome.
      Quality can’t be measured Quality must be measured in order to properly manage services.

      Our three-phase approach to service metrics development

      Let Info-Tech guide you through your service metrics journey

      1

      2

      3

      Design Your Metrics Develop and Validate Reporting Implement, Track, and Maintain
      Sample of Phase 1 of Info-Tech's service metric development package, 'Design Your Metrics'. Sample of Phase 2 of Info-Tech's service metric development package, 'Develop and Validate Reporting'. Sample of Phase 3 of Info-Tech's service metric development package, 'Implement, Track, and Maintain'.
      Start the development and creation of your service metrics by keeping business perspectives in mind, so they are fully aligned with business objectives. Identify the most appropriate presentation format based on stakeholder preference and need for metrics. Track goals and success metrics for your service metrics programs. It allows you to set long-term goals and track your results over time.

      CIOs must actively lead the design of the service metrics program

      The CIO must actively demonstrate support for the service metrics program and lead the initial discussions to determine what matters to business leaders.

      1. Lead the initiative by defining the need
        Show visible support and demonstrate importance
      2. Articulate the value to both IT and the business
        Establish the urgency and benefits
      3. Select and assemble an implementation group
        Find the best people to get the job done
      4. Drive initial metrics discussions: goals, objectives, actions
        Lead brainstorming with senior business leaders
      5. Work with the team to determine presentation formats and communication methods
        Identify the best presentation approach for senior stakeholders
      6. Establish a feedback loop for senior management
        Solicit feedback on improvements
      7. Validate the success of the metrics
        Confirm service metrics support business outcomes

      Measure the success of your service metrics

      It is critical to determine if the designed service metrics are fulfilling their intended purpose. The process of maintaining the service metrics program and the outcomes of implementing service metrics need to be monitored and tracked.

      Validating Service Metrics Design

      Target Outcome

      Related Metrics

      The business is enabled to identify and improve service performance to their end customer # of improvement initiatives created based on service metrics
      $ cost savings/revenue generated due to actions derived from service metrics

      Procedure to validate the usefulness of IT metrics

      # / % of service metrics added/removed per year

      Alignment between IT and business objectives and processes Business’ satisfaction with IT

      Measure the success of your service metrics

      It is critical to determine if the designed service metrics are fulfilling their intended purpose. The process of maintaining the service metrics program and the outcomes of implementing service metrics need to be monitored and tracked.

      Validating Service Metrics Process

      Target Outcome

      Related Metrics

      Properly defined service metrics aligned with business goals/outcomes
      Easy understood measurement methodologies
      % of services with (or without) defined service metrics

      % of service metrics tied to business goals

      Consistent approach to review and adjust metrics# of service metrics adjusted based on service reviews

      % of service metrics reviewed on schedule

      Demonstrate monetary value and impact through the service metrics program

      In a study done by the Aberdeen Group, organizations engaged in the use of metrics benchmarking and measurement have:
      • 88% customer satisfaction rate
      • 60% service profitability
      • 15% increase in workforce productivity over the last 12 months

      Stock image of a silhouette of three people's head and shoulders.
      (Source: Aberdeen Group. “Service Benchmarking and Measurement.”)

      A service metric is defined for: “Response time for Business Application A

      The expected response time has not been achieved and this is visible in the service metrics. The reduced performance has been identified as having an impact of $250,000 per month in lost revenue potential.

      The service metric drove an action to perform a root-cause analysis, which identified a network switch issue and drove a resolution action to fix the technology and architect redundancy to ensure continuity.

      The fix eliminated the performance impact, allowing for recovery of the $250K per month in revenue, improved end-user confidence in the organization, and increased use of the application, creating additional revenue.

      Implementing and measuring a video conferencing service

      CASE STUDY
      Industry: Manufacturing | Source: CIO interview and case material
      Situation

      The manufacturing business operates within numerous countries and requires a lot of coordination of functions and governance oversight. The company has monthly meetings, both regional and national, and key management and executives travel to attend and participate in the meetings.

      Complication

      While the meetings provide a lot of organizational value, the business has grown significantly and the cost of business travel has started to become prohibitive.

      Action

      It was decided that only a few core meetings would require onsite face-to-face meetings, and for all other meetings, the company would look at alternative means. The face-to-face aspect of the meetings was still considered critical so they focused on options to retain that aspect.

      The IT organization identified that they could provide a video conferencing service to meet the business need. The initiative was approved and rolled out in the organization.

      Result:

      IT service metrics needed to be designed to confirm that the expected value outcome of the implementation of video conferencing was achieved.

      Under the direction of the CIO, the business goals and needs driving use of the service (i.e. reduction in travel costs, efficiency, no loss of positive outcome) were used to identify success criteria and key questions to confirm success.

      With this information, the service manager was able to implement relevant service metrics in business language and confirmed an 80% adoption rate and a 95% success rate in term meetings running as expected and achieving core outcomes.

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Develop meaningful service metrics to ensure business and user satisfaction

      1. Design the Metrics 2. Design Reports and Dashboards 3. Implement, Track, and Maintain
      Supporting Tool icon

      Best-Practice Toolkit

      1. Defining stakeholder needs for IT based on their success criteria
      2. Derive meaningful service metrics based on identified IT services and validate with business stakeholders
      3. Validate metrics can be collected and measured
      4. Determine calculation methodology
      1. Presentation format selected based on stakeholder needs and preference for information
      2. Presentation format validated with stakeholders
      1. Identify metrics that will be presented first to the stakeholders based on urgency or impact of the IT service
      2. Determine the process to collect data, select initial targets, and integrate with SLM and BRM functions
      3. Roll out the metrics implementation for a broader audience
      4. Establish roles and timelines for metrics maintenance

      Guided Implementations

      • Design metrics based on business needs
      • Validate the metrics
      • Select presentation format
      • Review metrics presentation design
      • Select and implement pilot metrics
      • Determine rollout process and establish maintenance/tracking mechanism
      Associated Activity icon

      Onsite Workshop

      Module 1:
      Derive Service Metrics From Business Goals
      Module 2:
      Select and Design Reports and Dashboards
      Module 3:
      Implement, Track, and Maintain Your Metrics to Ensure Success
      Phase 1 Outcome:
      • Meaningful service metrics designed from stakeholder needs
      Phase 2 Outcome:
      • Appropriate presentation format selected for each stakeholder
      Phase 3 Outcome:
      • Metrics implemented and process established to maintain and track program success

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.
      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
      Design the Metrics
      Determine Presentation Format and Implement Metrics
      Gather Service Level Requirements
      Monitor and Improve Service Levels

      Activities

      • 1.1 Determine stakeholder needs
      • 1.2 Determine success criteria and key performance indicators
      • 1.3 Derive metrics
      • 1.4 Validate the metric collection
      • 2.1 Discuss stakeholder needs/preference for data and select presentation format
      • 2.2 Select and design the metric report
      • Requirements
      • 3.1 Determine the business requirements
      • 3.2 Negotiate service levels
      • 3.3 Align operational level agreements (OLAs) and supplier contracts
      • 4.1 Conduct service report and perform service review
      • 4.2 Communicate service review
      • 4.3 Remediate issues using action plan
      • 4.4 Proactive prevention

      Deliverables

      1. Metrics Development Workbook
      1. Metrics Presentation Format Selection Guide
      2. Metrics Tracking Tool
      1. Service Level Management SOP
      2. Service Level Agreement
      1. Service Level Report
      2. Service Level Review
      3. Business Satisfaction Report

      Develop Meaningful Service Metrics to Ensure Business and User Satisfaction

      PHASE 1

      Design the Metrics

      Step (1): Design the Metrics

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Derive the Service Metrics

      1.2

      Validate the Metrics

      2.1

      Determine Reporting Format

      3.1

      Select Pilot Metrics

      3.2

      Activate and Maintain Metrics

      This step involves the following participants:

      • CIO
      • Business Relationship Manager (BRM)
      • Service Level Manager (SLM)

      Outcomes of this step

      • Defined stakeholder needs for IT based on their success criteria
      • Identified IT services that are tied to the delivery of business outcomes
      • Derived meaningful service metrics based on identified IT services and validated with business stakeholders
      • Validated that metrics can be collected and measured
      • Determined calculation methodology

      Phase 1 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Design the Metrics

      Proposed Time to Completion (in weeks): 4 weeks
      Step 1.1: Design Metrics Step 1.2: Validate the Metrics
      Start with an analyst kick-off call:
      • Determine the stakeholder and their needs
      • Identify IT services that are tied to the delivery of business outcomes
      • Derive the service metrics
      Review findings with analyst:
      • For the selected metrics, identify the data source for collection
      • Validate whether or not the data can be created
      • Create a calculation method for the metrics
      Then complete these activities…
      • Using the methodology provided, identify additional stakeholders and map out their success criteria, including KPIs to determine the appropriate service metrics
      Then complete these activities…
      • Determine whether the designed metrics are measurable, and if so, how
      With these tools & templates:
      • Metrics Development Workbook
      With these tools & templates:
      • Metrics Development Workbook

      Design your service metrics – overview

      Figure representing 'CIO'. Step 1
      Derive your service metrics

      Metrics Worksheet

      Figure representing 'SLM' and/or 'BRM'. Step 2
      Validate your metrics

      Metrics Worksheet

      Figures representing 'CIO', 'SLM', and/or 'BRM'. Step 3
      Confirm with stakeholders

      Metrics Tracking Sheet

      A star.

      Defined IT Service Metrics

      Deriving the right metrics is critical to ensuring that you will generate valuable and actionable service metrics.

      Derive your service metrics from business objectives and needs

      Service metrics must be designed with the business perspective in mind so they are fully aligned with business objectives.

      Thus, IT must start by identifying specific stakeholder needs. The more IT understands about the business, the more relevant the metrics will be to the business stakeholders.

      1. Who are your stakeholders?
      2. What are their goals and pain points?
      3. What do the stakeholders need to know?
      4. What do I need to measure?
      5. Derive your service metrics

      Derive your service metrics

      Supporting Tool icon 1.1 Metrics Development Workbook

      This workbook guides the development and creation of service metrics that are directly tied to stakeholder needs.

      This process will ensure that your service metrics are designed with the business perspective in mind so they are fully aligned with business objectives.

      1. Who are the relevant stakeholders?
      2. What are the goals and pain points of your stakeholders?
      3. What do the stakeholders need to know?
      4. What does IT need to measure?
      5. What are the appropriate IT metrics?

      Download the Metrics Development Workbook.

      Sample of Info-Tech's Metrics Development Workbook.

      Determine your stakeholders

      Supporting Tool icon 1.1 0.5 Hour

      Who are your stakeholders?

      1. Identify the primary stakeholders of your service metrics. Stakeholders are the people who have a very specific need to know about how IT services affect their business outcomes. Different stakeholders can have different perspective on the same IT service metric.Most often, the primary target of service metrics are the business stakeholders, e.g. VP of a business unit.
      2. Identify any additional stakeholders. The CIO is also a stakeholder since they are effectively the business relationship manager for the senior leaders.

      Video Conferencing Case Study
      Manufacturing company

      For this phase, we will demonstrate how to derive the service metrics by going through the steps in the methodology.

      At a manufacturing company, the CIO’s main stakeholder is the CEO, whose chief concern is to improve the financial position of the company.

      Identify goals and pain points of your stakeholders

      Supporting Tool icon 1.2 0.5 Hour

      What are their goals and pain points?

      1. Clearly identify each stakeholder’s business goals and outcomes. These would be particular business goals related to a specific business unit.
      2. Identify particular pain points for each business unit to understand what is preventing them from achieving the desirable business outcome.

      VC Case Study

      One of the top initiatives identified by the company to improve financial performance was to reduce expense.

      Because the company has several key locations in different states, company executives used to travel extensively to carry out meetings at each location.

      Therefore, travel expenses represent a significant proportion of operational expenses and reducing travel costs is a key goal for the company’s executives.

      What do the stakeholders need to know?

      Supporting Tool icon 1.3 0.5 Hour

      What do the stakeholders need to know?

      1. Identify the key things that the stakeholders would need to know based on the goals and pain points derived from the previous step.These are your success criteria and must be met to successfully achieve the desired goals.

      VC Case Study

      The CEO needs to have assurance that without executives traveling to each location, remote meetings can be as effective as in-person meetings.

      These meetings must provide the same outcome and allow executives to collaborate and make similar strategic decisions without the onsite, physical presence.

      Therefore, the success criteria are:

      • Reduced travel costs
      • Effective collaboration
      • High-quality meetings

      What do I need to measure?

      Supporting Tool icon 1.4 1 Hour

      What does IT need to measure?

      1. Identify the IT services that are leveraged to achieve the business goals and success criteria.
      2. Identify the users of those services and determine the nature of usage for each group of users.
      3. Identify the key indicators that must be measured for those services from an IT perspective.

      VC Case Study

      The IT department decides to implement the video conferencing service to reduce the number of onsite meetings. This technology would allow executives to meet remotely with both audio and video and is the best option to replicate a physical meeting.

      The service is initially available to senior executives and will be rolled out to all internal users once the initial implementation is deemed successful.

      To determine the success of the service, the following needs to be measured:

      1. Outcomes of VC meetings
      2. Quality of the VC meetings
      3. Reduction in travel expenses

      Derive service metrics

      Supporting Tool icon 1.5 0.5 Hour

      Derive your service metrics

      1. Derive the service metrics that are meaningful to business stakeholders based on the IT services and the key indicators identified in the previous steps.
      2. Distinguish between service metrics and business metrics. You may identify some business metrics in addition to the IT metrics, and although these are important, IT doesn’t own the process of tracking and reporting business metrics.

      VC Case Study

      In the previous step, IT identified that it must measure the outcomes of VC meetings, quality of the VC meetings, and the reduction in travel expenses. From these, the appropriate service metrics can be derived to answer the needs of the CEO.

      IT needs to measure:

      1. Percent of VC meetings successfully delivered
      2. Growth of number of executive meetings conducted via VC
      Outcomes

      IT also identified the following business metrics:

      1. Reduction in percent of travel expense/spend
      2. Reduction in lost time due to travel

      Validate your metrics

      Once appropriate service metrics are derived from business objectives, the next step is to determine whether or not it is viable to actually measure the metrics.

      Can you measure it? The first question IT must answer is whether the metric is measurable. IT must identify the data source, validate its ability to collect the data, and specify the data requirement. Not all metrics can be measured!
      How will you measure it? If the metric is measurable, the next step is to create a way to measure the actual data. In most cases, simple formulas that can be easily understood are the best approach.
      Define your actions Metrics must be used to drive or reinforce desirable outcomes and behaviors. Thus, IT must predetermine the necessary actions associated with the different metric levels, thresholds, or trends.

      Determine if you can measure the identified metric

      Supporting Tool icon 1.6 0.5 Hour

      INSTRUCTIONS

      1. Determine what data sources are available. Make sure that you know where the information you need is captured, or will need to be captured. This would include:
        • A ticket/request system
        • An auto discovery tool
        • A configuration management database ( CMDB)
      2. Confirm that IT has the ability to collect the information.
        • If the necessary data is already contained in an identified data source, then you can proceed.
        • If not, consider whether it’s possible to gather the information using current sources and systems.
        • Understand the constraints and cost/ROI to implement new technology or revise processes and data gathering to produce the data.

      VC Case Study

      Using the metric derived from the video conferencing service example, IT wants to measure the % of VC meetings successfully delivered.

      What are the data sources?

      • Number of VC meetings that took place
      • Number of service incidents
      • User survey

      Determine if you can measure the identified metric

      Supporting Tool icon 1.6 0.5 Hour

      INSTRUCTIONS

      1. Understand your data requirements
        • To produce relevant metrics from your data, you need to ensure the level of quality and currency that provides you with useful information. You need to define:
          • The level of detail that has to be captured to make the data useful.
          • The consistency of the data, and how it needs to be entered or gathered.
          • The accuracy of the data. This includes how current the data needs to be, how quickly changes have to be made, and how data quality will be verified.

      VC Case Study

      Data requirement for percent of successful VC meetings:

      • Level of detail – user category, location, date/time,
      • Consistency – how efficiently are VC-related incidents opened and closed? Is the data collected and stored consistently?
      • Accuracy – is the information entered accurately?

      Create the calculation to measure it

      Supporting Tool icon 1.7 0.5 Hour

      Determine how to calculate the metrics.

      INSTRUCTIONS
      1. Develop the calculations that will be used for each accepted metric. The measurement needs to be clear and straightforward.
      2. Define the scope and assumptions for each calculation, including:
        • The defined measurement period (e.g. monthly, weekly)
        • Exclusions (e.g. nonbusiness hours, during maintenance windows)

      VC Case Study

      Metric: Percent of VC meetings delivered successfully

      IT is able to determine the total number of VC meetings that took place and the number of VC service requests to the help desk.

      That makes it possible to use the following formula to determine the success percentage of the VC service:

      ((total # VC) – (# of VC with identified incidents)) / (total # VC) * 100

      Define the actions to be taken for each metric

      Supporting Tool icon 1.7 1.5 Hour

      INSTRUCTIONS

      Centered on the defined metrics and their calculations, IT can decide on the actions that should be driven out of each metric based on one of the following scenarios:
      • Scenario 1: Ad hoc remedial action and root-cause investigation. If the reason for the result is unknown, determining root cause or identifying trends is required to determine required actions.
      • Scenario 2: Predefined remedial action. A set of predetermined actions associated with different results. This is useful when the meaning of the results is clear and points to specific issues within the environment.
      • Scenario 3: Nonremedial action. The metrics may produce a result that reinforces or supports company direction and strategy, or identifies an opportunity that may drive a new initiative or idea.

      VC Case Study

      If the success rate of the VC meetings is below 90%, IT needs to focus on determining if there is a common cause and identify if this is a consistent downward trend.

      A root-cause analysis is performed that identifies that network issues are causing difficulties, impacting the connection quality and usability of the VC service.

      Validate the confirmed metrics with the business

      Supporting Tool icon 1.8 1 Hour

      INPUT: Selected service metrics, Discussion with the business

      OUTPUT: Validated metrics with the business

      Materials: Metrics with calculation methodology

      Participants: IT and business stakeholders, Service owners

      INSTRUCTIONS

      1. Once you have derived the appropriate metrics and established that the metrics are measurable, you must go back to the targeted stakeholders and validate that the selected metrics will provide the right information to meet their identified goals and success criteria.
      2. Add confirmed metrics to the Metrics Tracking Tool, in the Metrics Tracking Plan tab.
      Service Metric Corresponding
      Business Goal
      Measurement
      Method
      Defined Actions

      Example: Measuring the online banking service at a financial institution

      Who are IT’s stakeholders? The financial institution provides various banking solutions to its customers. Retail banking is a core service offered by the bank and the VP of retail banking is a major stakeholder of IT.
      What are their goals and pain points? The VP of retail banking’s highest priorities are to increase revenue, increase market share, and maintain the bank’s brand and reputation amongst its customers.
      What do they need to know? In order to measure success, the VP of retail banking needs to determine performance in attracting new clients, retaining clients, expanding into new territory, and whether they have increased the number of services provided to existing clients.
      What does IT need to measure? The recent implementation of an online banking service is a key initiative that will keep the bank competitive and help retail banking meet its goals. The key indicators of this service are: the total number of clients, the number of products per client, percent of clients using online banking, number of clients by segment, service, territory.
      Derive the service metrics Based on the key indicators, IT can derive the following service metrics:
      1. Number of product applications originated from online banking
      2. Customer satisfaction/complaints
      As part of the process, IT also identified some business metrics, such as the number of online banking users per month or the number of times a client accesses online banking per month.

      Design service metrics to track service performance and value

      CASE STUDY
      Industry: Manufacturing | Source: CIO
      Challenge Solution Results
      The IT organization needed to generate metrics to show the business whether the video conferencing service was being adopted and if it was providing the expected outcome and value.

      Standard IT metrics were technical and did not provide a business context that allowed for easy understanding of performance and decision making.

      The IT organization, working through the CIO and service managers, sat down with the key business stakeholders of the video conferencing service.

      They discussed the goals for the meeting and defined the success criteria for those goals in the context of video conference meeting outcomes.

      The success criteria that were discussed were then translated into a set of questions (key performance indicators) that if answered, would show that the success criteria were achieved.

      The service manager identified what could be measured to answer the defined questions and eliminated any metrics that were either business metrics or non-IT related.

      The remaining metrics were identified as the possible service metrics, and the ability to gather the information and produce the metric was confirmed.

      Service metrics were defined for:

      1. Percent of video conference meetings delivered successfully
      2. Growth in the number of executive meetings conducted via video conference

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of Valence Howden, Senior Manager, CIO Advisory, Info-Tech Research Group.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1

      Sample of activity 1.1 'Determine your stakeholders'. Determine stakeholder needs, goals, and pain points

      The onsite analyst will help you select key stakeholders and analyze their business objectives and current pain points.

      1.2

      Sample of activity 1.2 'Identify goals and pain points of your stakeholders'. Determine the success criteria and related IT services

      The analyst will facilitate a discussion to uncover the information that these stakeholders care about. The group will also identify the IT services that are supporting these objectives.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      1.5

      Sample of activity 1.5 'Derive service metrics'. Derive the service metrics

      Based on the key performance indicators obtained in the previous page, derive meaningful business metrics that are relevant to the stakeholders.

      1.6

      Sample of activity 1.6 'Determine if you can measure the identified metric'. Validate the data collection process

      The analyst will help the workshop group determine whether the identified metrics can be collected and measured. If so, a calculation methodology is created.

      1.7

      Sample of activity 1.7 'Create the caluclation to measure it'. Validate metrics with stakeholders

      Establish a feedback mechanism to have business stakeholders validate the meaningfulness of the metrics.

      Develop Meaningful Service Metrics to Ensure Business and User Satisfaction

      PHASE 2

      Design Reports and Dashboards

      Step (2): Design Reports and Dashboards

      PHASE 1PHASE 2PHASE 3

      1.1

      Derive the Service Metrics

      1.2

      Validate the Metrics

      2.1

      Determine Reporting Format

      3.1

      Select Pilot Metrics

      3.2

      Activate and Maintain Metrics

      This step involves the following participants:

      • Business Relationship Manager
      • Service Level Manager
      • Business Stakeholders

      Outcomes of this step

      • Presentation format selected based on stakeholder needs and preference for information
      • Presentation format validated with stakeholders

      Phase 2 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Design Reports and Dashboards

      Proposed Time to Completion (in weeks): 3 weeks
      Step 2.1: Select Presentation Format Step 2.2: Review Design
      Start with an analyst kick-off call:
      • Review the different format of metrics presentation and discuss the pros/cons of each format
      • Discuss stakeholder needs/preference for data
      • Select the presentation format
      Review findings with analyst:
      • Discuss stakeholder feedback based on selected presentation format
      • Modify and adjust the presentation format as needed
      Then complete these activities…
      • Design the metrics using the selected format
      Then complete these activities…
      • Finalize the design for metrics presentation
      With these tools & templates:
      • Metrics Presentation Format Selection Guide
      With these tools & templates:
      • Metrics Presentation Format Selection Guide

      Design the reports – overview

      Figure representing 'SLM' and/or 'BRM'. Step 1
      Understand the pros and cons of different reporting styles
      Figure representing 'SLM' and/or 'BRM'. Step 2
      Determine your reporting and presentation style

      Presentation Format Selection

      Figure representing 'SLM' and/or 'BRM'. Step 3
      Design your metrics reports
      A star.

      Validated Service Reports

      The design of service metrics reporting is critically important. The reporting style must present the right information in the most interesting and stakeholder-centric way possible to ensure that it is read and used.

      The reports must also display information in a way that generates actions. If your stakeholders cannot make decisions, kick off activities, or ask questions based on your reports, then they have no value.

      Determine the right presentation format for your metrics

      Most often, metrics are presented in the following ways:

      Dashboard
      (PwC. “Mega-Trends and Implications.”)
      Sample of the 'Dashboard' metric presentation format.
      Infographic
      (PwC. “Healthcare’s new entrants.”)
      Sample of the 'Infographic' metric presentation format.
      Report
      (PwC Blogs. “Northern Lights.”)
      Sample of the 'Report' metric presentation format.
      Scorecard
      (PwC. “Annual Report 2015.”)
      Sample of the 'Scorecard' metric presentation format.

      Understand the advantages and disadvantages of each reporting style – Dashboard

      A dashboard is a reporting method that provides a dynamic at-a-glance view of key metrics from the perspective of key stakeholders. It provides a quick graphical way to process important performance information in real time.

      Features

      Typically web-based

      Dynamic data that is updated in real time

      Advantage

      Aggregates a lot of information into a single view

      Presents metrics in a simplistic style that is well understood

      Provides a quick point-in-time view of performance

      Easy to consume visual presentation style

      Disadvantage

      Complicated to set up well.
      Requires additional technology support: programming, API, etc.

      Promotes a short-term outlook – focus on now, no historical performance and no future trends. Doesn’t provide the whole picture and story.

      Existing dashboard tools are often not customized enough to provide real value to each stakeholder.

      Dashboards present real-time metrics that can be accessed and viewed at any time

      Sample of the 'Dashboard' metric presentation format.
      (Source: PwC. “Mega-Trends and Implications.”)
      Metrics presented through online dashboards are calculated in real time, which allows for a dynamic, current view into the performance of IT services at any time.

      Understand the advantages and disadvantages of each reporting style – Infographic

      An infographic is a graphical representation of metrics or data, which is used to show information quickly and clearly. It’s based on the understanding that people retain and process visual information more readily than written details.

      Features

      Turns dry into attractive –transforms data into eye-catching visual memory that is easier to retain

      Can be used as the intro to a formal report

      There are endless types of infographics

      Advantage

      Easily consumable

      Easy to retain

      Eye catching

      Easily shared

      Spurs conversation

      Customizable

      Disadvantage

      Require design expertise and resources

      Can be time consuming to generate

      Could be easily misinterpreted

      Message can be lost with poor design

      Infographics allow for completely unique designs

      Sample of the 'Infographic' metric presentation format.
      (Source: PwC. “Healthcare’s new entrants…”)
      There is no limit when it comes to designing an infographic. The image used here visually articulates the effects of new entrants pulling away the market.

      Understand the advantages and disadvantages of each reporting style – Formal Report

      A formal report is a more structured and official reporting style that contains detailed research, data, and information required to enable specific business decisions, and to help evaluate performance over a defined period of time.

      Definition

      Metrics can be presented as a component of a periodic, formal report

      A physical document that presents detailed information to a particular audience

      Advantage

      More detailed, more structured and broader reporting period

      Formal, shows IT has put in the effort

      Effectively presents a broader and more complete story

      Targets different stakeholders at the same time

      Disadvantage

      Requires significant effort and resources

      Higher risk if the report does not meet the expectation of the business stakeholder

      Done at a specific time and only valuable for that specific time period

      Harder to change format

      Formal reports provide a detailed view and analysis of performance

      Sample of the 'Formal Report' metric presentation format.
      (Source: PwC Blogs. “Northern Lights: Where are we now?”)
      An effective report incorporates visuals to demonstrate key improvements.

      Formal reports can still contain visuals, but they are accompanied with detailed explanations.

      Understand the advantages and disadvantages of each reporting style – Scorecard

      A scorecard is a graphic view of the progress and performance over time of key performance metrics. These are in relation to specified goals based on identified critical stakeholder objectives.

      Features

      Incorporates multiple metrics effectively.

      Scores services against the most important organizational goals and objectives. Scorecards may tie back into strategy and different perspectives of success.

      Advantage

      Quick view of performance against objectives

      Measure against a set of consistent objectives

      Easily consumable

      Easy to retain

      Disadvantage

      Requires a lot of forethought

      Scorecards provide a time-bound summary of performance against defined goals

      Sample of the 'Scorecard' metric presentation format.
      (PwC. “Annual Report 2015.”)
      Scorecards provide a summary of performance that is directly linked to the organizational KPIs.

      Determine your report style

      Supporting Tool icon 2.1 Metrics Presentation Format Selection Guide

      In this section, you will determine the optimal reporting style for the service metrics.

      This guide contains four questions, which will help IT organizations identify the most appropriate presentation format based on stakeholder preference and needs for metrics.

      1. Who is the relevant stakeholder?
      2. What are the defined actions for the metric?
      3. How frequently does the stakeholder need to see the metric?
      4. How does the stakeholder like to receive information?
      Sample of Info-Tech's Metrics Presentation Format Selection Guide.
      Download the Metrics Presentation Format Selection Guide.

      Determine your best presentation option

      Supporting Tool icon 2.1 2 Hours

      INPUT: Identified stakeholder and his/her role

      OUTPUT: Proper presentation format based on need for information

      Materials: Metrics Presentation Format Selection Guide

      Participants: BRM, SLM, Program Manager

      After deciding on the report type to be used to present the metric, the organization needs to consider how stakeholders will consume the metric.

      There are three options based on stakeholder needs and available presentation options within IT.

      1. Paper-based presentation is the most traditional form of reporting and works well with stakeholders who prefer physical copies. The report is produced at a specific time and requires no additional IT capability.
      2. Online documents stored on webpages, SharePoint, or another knowledge management system could be used to present the metrics. This allows the report to be linked to other information and easily shared.
      3. Online dashboards and graphics can be used to have dynamic, real-time reporting and anytime access. These webpages can be incorporated into an intranet and allow the user to view the metrics at any time. This will require IT to continuously update the data in order to maintain the accuracy of the metrics.

      Design your metric reports with these guidelines in mind

      Supporting Tool icon 2.2 30 Minutes
      1. Stakeholder-specificThe report must be driven by the identified stakeholder needs and preferences and articulate the metrics that are important to them.
      2. ClarityTo enable decision making and drive desired actions, the metrics must be clear and straightforward. They must be presented in a way that clearly links the performance measurement to the defined outcome without leading to different interpretations of the results.
      3. SimplicityThe report must be simple to read, understand, and analyze. The language of the report must be business-centric and remove as much complexity as possible in wording, imaging, and context.

      Be sure to consider access rights for more senior reports. Site and user access permissions may need to be defined based on the level of reporting.

      Metrics reporting on the video conferencing service

      CASE STUDY
      Industry: Manufacturing | Source: CIO Interview
      The Situation

      The business had a clear need to understand if the implementation of video conferencing would allow previously onsite meetings to achieve the same level of effectiveness.

      Reporting Context

      Provided reports had always been generated from an IT perspective and the business rarely used the information to make decisions.

      The metrics needed to help the business understand if the meetings were remaining effective and be tied into the financial reporting against travel expenses, but there would be limited visibility during the executive meetings.

      Approach

      The service manager reviewed the information that he had gathered to confirm how often they needed information related to the service. He also met with the CIO to get some insight into the reports that were already being provided to the business, including the ones that were most effective.

      Considerations

      The conversations identified that there was no need for a dynamic real-time view of the performance of the service, since tracking of cost savings and utility would be viewed monthly and quarterly. They also identified that the item would be discussed within a very small window of time during the management meetings.

      The Solution

      It was determined that the best style of reporting for the metric was an existing scorecard that was produced monthly, using some infographics to ensure that the information is clear at a glance to enable quick decision making.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of Valence Howden, Senior Manager, CIO Advisory, Info-Tech Research Group.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1

      Sample of presentation format option slide 'Determine the right presentation format for your metrics'. Understand the different presentation options

      The onsite analyst will introduce the group to the communication vehicles of infographic, scorecard, formal report, and dashboard.

      2.1

      Sample of activity 2.1 'Determine your best presentation option'. Assess stakeholder needs for information

      For selected stakeholders, the analyst will facilitate a discussion on how stakeholders would like to view information and how the metrics can be presented to aid decision making.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      2.2

      Sample of activity 2.2 'Design your metric reports with these guidelines in mind'. Select and design the metric report

      Based on the discussion, the working group will select the most appropriate presentation format and create a rough draft of how the report should look.

      Develop Meaningful Service Metrics to Ensure Business and User Satisfaction

      PHASE 3

      Implement, Track, and Maintain Your Metrics

      Step (3): Implement, Track, and Maintain Your Metrics

      PHASE 1PHASE 2PHASE 3

      1.1

      Derive the Service Metrics

      1.2

      Validate the Metrics

      2.1

      Determine Reporting Format

      3.1

      Select Pilot Metrics

      3.2

      Activate and Maintain Metrics

      This step involves the following participants:

      • Service Level Manager
      • Business Relationship Manager
      • Service Metrics Program Manager

      Activities in this step

      • Determine the first batch of metrics to be implemented as part of the pilot program
      • Create a process to collect and validate data, determine initial targets, and integrate with SLM and BRM functions
      • Present the metric reports to the relevant stakeholders and incorporate the feedback into the metric design
      • Establish a standard process and roll out the implementation of metrics in batches
      • Establish a process to monitor and track the effectiveness of the service metrics program and make adjustments when necessary

      Phase 3 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Implement, Track, and Maintain Your Metrics

      Proposed Time to Completion (in weeks): 4 weeks
      Step 3.1: Select and Launch Pilot Metrics Step 3.2: Track and Maintain the Metrics
      Start with an analyst kick-off call:
      • Identify metrics that will be presented first to the stakeholders based on urgency or impact of the IT service
      • Determine the process to collect data, select initial targets, and integrate with SLM and BRM functions
      Review findings with analyst:
      • Review the success of metrics and discuss feedback from stakeholders
      • Roll out the metrics implementation to a broader audience
      • Establish roles and timelines for metrics maintenance
      Then complete these activities…
      • Document the first batch of metrics
      • Document the baseline, initial targets
      • Create a plan to integrate with SLM and BRM functions
      Then complete these activities…
      • Create a document that defines how the organization will track and maintain the success of the metrics program
      • Review the metrics program periodically
      With these tools & templates:
      • Metrics Tracking Tool
      With these tools & templates:
      • Metrics Tracking Tool

      Implement, Track, and Maintain the Metrics

      Figure representing 'SLM' and/or 'BRM'. Step 1
      Run your pilot

      Metrics Tracking Tool

      Figure representing 'SLM' and/or 'BRM'. Step 2
      Validate success

      Metrics Tracking Tool

      Figure representing 'SLM' and/or 'BRM'. Step 3
      Implement your metrics program in batches

      Metrics Tracking Tool

      A star.

      Active Service Metrics Program

      Once you have defined the way that you will present the metrics, you are ready to run a pilot with a smaller sample of defined service metrics.

      This allows you to validate your approach and make refinements to the implementation and maintenance processes where necessary, prior to activating all service metrics.

      Track the performance of your service metrics

      Supporting Tool icon 3.1

      The Metrics Tracking Tool will enable you to track goals and success metrics for your service metrics programs. It allows you to set long-term goals and track your results over time.

      There are three sections in this tool:
      1. Metrics Tracking Plan. Identify the metrics to be tracked and their purpose.
      2. Metrics Tracking Actuals. Monitor and track the actual performance of the metrics.
      3. Remediation Tracking. Determine and document the steps that need to be taken to correct a sub-performing metric.
      Sample of Info-Tech's Metrics Tracking Tool.

      Select pilot metrics

      Supporting Tool icon 3.1 30 Minutes

      INPUT: Identified services, Business feedback

      OUTPUT: Services with most urgent need or impact

      Materials: Service catalog or list of identified services

      Participants: BRM, SLM, Business representatives

      To start the implementation of your service metrics program and drive wider adoption, you need to run a pilot using a smaller subset of metrics.

      INSTRUCTIONS

      To determine the sample for the pilot, consider metrics that:

      • Are related to critical business services and functions
      • or
      • Address known/visible pain points for the business
      • or
      • Were designed for supportive or influential stakeholders

      Metrics that meet two or more criteria are ideal for the pilot

      Collect and validate data

      Supporting Tool icon 3.2 1 Hour

      INPUT: Identified metrics

      OUTPUT: A data collection mythology, Metrics tracking

      Materials: Metrics

      Participants: SLM, BRM, Service owner

      You will need to start collection and validation of your identified data in order to calculate the results for your pilot metrics.

      INSTRUCTIONS

      1. Initiate data collection
        • Use the data sources identified during the design phase and initiate the data collection process.
      2. Determine start date
        • If historical data can be retrieved and gathered, determine how far back you want your measurements to start.
      3. Compile data and validate
        • Ensure that the information is accurate and up to date. This will require some level of data validation and audit.
      4. Run the metric
        • Use the defined calculation and source data to generate the metrics result.
      5. Record metrics results
        • Use the metrics tracking sheet to track the actual results.

      Determine initial targets

      Supporting Tool icon 3.3 1 Hour

      INPUT: Historical data/baseline data

      OUTPUT: Realistic initial target for improvement

      Materials: Metrics Tracking Tool

      Participants: BRM, SLM, Service owner

      INSTRUCTIONS

      Identify an initial service objective based on one or more of the following options:

      1. Establish an initial target using historical data and trends of performance.
      2. Establish an initial target based on stakeholder-identified requirements and expectations.
      3. Run the metrics report over a defined period of time and use the baseline level of achievement to establish an initial target.

      The target may not always be a number - it could be a trend. The initial target will be changed after review with stakeholders

      Integrate with SLM and BRM processes

      Supporting Tool icon 3.4 1 Hour

      INPUT: SLM and BRM SOPs or responsibility documentations

      OUTPUT: Integrate service metrics into the SLM/BRM role

      Materials: SLM / BRM reports

      Participants: SLM, BRM, CIO, Program manager, Service manager

      The service metrics program is usually initiated, used, and maintained by the SLM and BRM functions.

      INSTRUCTIONS

      Ensure that the metrics pilot is integrated with those functions by:

      1. Engaging with SLM and BRM functions/resources
        • Identify SLM and BRM resources associated with or working on the services where the metrics are being piloted
        • Obtain their feedback on the metrics/reporting
      2. Integrating with the existing reporting and meeting cycles
        • Ensure the metrics will be calculated and available for discussion at standing meetings and with existing reports
      3. Establishing the metrics review and validation cycle for these metrics
        • Confirm the review and validation period for the metrics in order to ensure they remain valuable and actionable

      Generate reports and present to stakeholders

      Supporting Tool icon 3.5 1 Hour

      INPUT: Identified metrics, Selected presentation format

      OUTPUT: Metrics reports that are ready for distribution

      Materials: Metrics Presentation Format Selection Guide

      Participants: BRM, SLM, CIO, Business representatives

      INSTRUCTIONS

      Once you have completed the calculation for the pilot metrics:

      1. Confirm the report style for the selected metrics (as defined in Phase 2)
      2. Generate the reporting for the pilot metrics
      3. Present the pilot metric reports to the identified BRM and SLM resources who will present the reporting to the stakeholders
      4. Gather feedback from Stakeholders on metrics - results and process
      5. Create and execute remediation plans for any actions identified from the metrics
      6. Initiate the review cycle for metrics (to ensure they retain value)

      Plan the rollout and implementation of the metrics reporting program

      Supporting Tool icon 3.6 1 Hour

      INPUT: Feedback from pilot, Services in batch

      OUTPUT: Systematic implementation of metrics

      Materials: Metrics Tracking Tool

      Participants: BRM, SLM, Program manager

      Upon completion of the pilot, move to start the broader implementation of metrics across the organization:

      INSTRUCTIONS

      1. Identify the service metrics that you will implement. They can be selected based on multiple criteria, including:
        • Organizational area/business unit
        • Service criticality
        • Pain points
        • Stakeholder engagement (detractors, supporters)
      2. Create a rollout plan for implementation in batches, identifying expected launch timelines, owners, targeted stakeholders, and communications plans
      3. Use the implementation plan from the pilot to roll out each batch of service metrics:
        • Collect and validate data
        • Determine target(s)
        • Integrate with BRM and SLM
        • Generate and communicate reports to stakeholders

      Maintain the service metrics

      Supporting Tool icon 3.7 1.5 Hour

      INPUT: Feedback from business stakeholders

      OUTPUT: Modification to individual metrics or to the process

      Materials: Metrics Tracking Tool, Metrics Development Workbook

      Participants: CIO, BRM, SLM, Program manager, Service owner

      Once service metrics and reporting become active, it is necessary to determine the review time frame for your metrics to ensure they remain useful.

      INSTRUCTIONS

      1. Confirm and establish a review time frame with stakeholders (e.g. annually, bi-annually, after organizational or strategic changes).
      2. Meet with stakeholders by the review date to discuss the value of existing metrics and validate:
        • Whether the goals associated with the metrics are still valid
        • If the metric is still necessary
        • If there is a more effective way to present the metrics
      3. Track actions based on review outcomes and update the remediation tracking sheet.
      4. Update tracking sheet with last complete review date.

      Maintain the metrics

      Supporting Tool icon 3.7

      Based on the outcome of the review meeting, decide what needs to be done for each metric, using the following options:

      Add

      A new metric is required or an existing metric needs large-scale changes (example: calculation method or scope).
      Triggers metrics design as shown in phases 1 and 2.

      Change

      A minor change is required to the presentation format or data. Note: a major change in a metric would be performed through the Add option.

      Remove

      The metric is no longer required, and it needs to be removed from reporting and data gathering. A final report date for that metric should be determined.

      Maintain

      The metric is still useful and no changes are required to the metric, its measurement, or how it’s reported.

      Ensuring metrics remain valuable

      VC CASE STUDY
      Industry: Manufacturing | Source: CIO Interview

      Reviewing the value of active metrics

      When the video conferencing service was initially implemented, it was performed as a pilot with a group of executives, and then expanded for use throughout the company. It was understood that prior to seeing the full benefit in cost reduction and increased efficiency and effectiveness, the rate of use and adoption had to be understood.

      The primary service metrics created for the service were based on tracking the number of requests for video conference meetings that were received by the IT organization. This identified the growth in use and could be used in conjunction with financial metrics related to travel to help identify the impact of the service through its growth phase.

      Once the service was adopted, this metric continued to be tracked but no longer showed growth or expanded adoption.

      The service manager was no longer sure this needed to be tracked.

      Key Activity

      The metrics around requests for video conference meetings were reviewed at the annual metrics review meeting with the business. The service manager asked if the need for the metric, the goal of tracking adoption, was still important for the business.

      The discussion identified that the adoption rate was over 80%, higher than anticipated, and that there was no value in continuing to track this metric.

      Based on the discussion, the adoption metrics were discontinued and removed from data gathering and reporting, while a success rate metric was added (how many meetings ran successfully and without issue) to ensure the ongoing value of the video conferencing service.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of Valence Howden, Senior Manager, CIO Advisory, Info-Tech Research Group.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1

      Sample of activity 3.1 'Select pilot metrics'. Select the pilot metrics

      The onsite analyst will help the workshop group select the metrics that should be first implemented based on the urgency and impact of these metrics.

      3.2

      Sample of activity 3.2 'Collect and validate data'. Gather data and set initial targets

      The analyst will help the group create a process to gather data, measure baselines, and set initial targets.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      3.5

      Sample of activity 3.5 'Generate reports and present to stakeholders'. Generate the reports and validate with stakeholders

      The Info-Tech analyst will help the group establish a process to receive feedback from the business stakeholders once the report is generated.

      3.6

      Sample of activity 3.6 'Plan the rollout and implementation of the metrics reporting program'. Implement the service metrics program

      The analyst will facilitate a discussion on how to implement the metrics program across the organization.

      3.7

      Sample of activity 3.7 'Maintain the service metrics'. Track and maintain the metrics program

      Set up a mechanism to ensure the success of the metrics program by assessing process adherence and process validity.

      Insight breakdown

      Insight 1

      Service metrics are critical to ensuring alignment of IT service performance and business service value achievement.

      Insight 2

      Service metrics reinforce positive business and end-user relationships by providing user-centric information that drives responsiveness and consistent service improvement.

      Insight 3

      Poorly designed metrics drive unintended and unproductive behaviors that have negative impacts on IT and produce negative service outcomes.

      Summary of accomplishment

      Knowledge Gained

      • Follow a methodology to identify metrics that are derived from business objectives.
      • Understand the proper presentation format based on stakeholder needs for information.
      • Establish a process to ensure the metrics provided will continue to provide value and aid decision making.

      Processes Optimized

      • Metrics presentation to business stakeholders
      • Metrics maintenance and tracking

      Deliverables Completed

      • Metrics Development Workbook
      • Metrics Presentation Format Selection Guide
      • Metrics Tracking Tool

      Research contributors and experts

      Name Organization
      Joe Evers Joe Evers Consulting
      Glen Notman Associate Partner, Citihub
      David Parker Client Program Manager, eHealth Ontario
      Marianne Doran Collins CIO, The CIO-Suite, LLC
      Chris Kalbfleisch Manager, Service Management, eHealth Ontario
      Joshua Klingenberg BHP Billiton Canada Inc.

      Related Info-Tech research

      Stock image of a menu. Design & Build a User-Facing Service Catalog
      The user-facing service catalog is the go-to place for IT service-related information.
      Stock image of a laptop keyboard. Unleash the True Value of IT by Transforming Into a Service Provider
      Earn your seat at the table and influence business strategy by becoming an IT service provider.

      Bibliography

      Pollock, Bill. “Service Benchmarking and Measurement: Using Metrics to Drive Customer Satisfaction and Profits.” Aberdeen Group. June 2009. http://722consulting.com/ServiceBenchmarkingandMeasurement.pdf

      PwC. “Mega-Trends and Implications.” RMI Discussion. LinkedIn SlideShare. September 2015. http://www.slideshare.net/AnandRaoPwC/mega-trends-and-implications-to-retirement

      PwC. “Healthcare’s new entrants: Who will be the industry’s Amazon.com?” Health Research Institute. April 2014. https://www.pwc.com/us/en/health-industries/healthcare-new-entrants/assets/pwc-hri-new-entrant-chart-pack-v3.pdf

      PwC. “Northern Lights: Where are we now?” PwC Blogs. 2012. http://pwc.blogs.com/files/12.09.06---northern-lights-2--summary.pdf

      PwC. “PwC’s key performance indicators

      Execute an Emergency Remote Work Plan

      • Buy Link or Shortcode: {j2store}421|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • Many organizations do not have developed plans for how to turn on-premises employees into remote workers in an emergency.
      • In an emergency situation, such as a pandemic, sending employees home to work remotely without time to prepare presents daunting challenges, such as trying to comprehend and prioritize the myriad of tasks that need accomplishing for human resources, the business, and IT in a VUCA (volatile, uncertain, complex, and ambiguous) world.
      • Security issues may arise from employees not used to working remotely. Indeed, employees sent home to work remotely in an emergency may not have been eligible otherwise. This creates security risks, including the proliferation of shadow IT.

      Our Advice

      Critical Insight

      • The emergency will restructure the business: make sure it’s done right. While your organization may need quick fixes for day one of an emergency remote work plan, these are not viable long-term solutions. The emergency will vividly reinforce to the business side that more resources need to be directed to IT to enable strong business continuity and employee safety. Make sure the right plan is put in place during the crucial first weeks. The next emergency is just around the corner.
      • Prioritize key business processes. Before getting into the details of a work from home policy, identify which crucial business processes need to continue for the company to survive. Build the remote work policy around supporting those workflows.
      • Where the “carrot” is not possible, emergencies may require the “stick.” To ensure secure endpoints and prevent proliferation of shadow IT, you may need to enforce certain rules through policy. However, disenfranchising employees is not a long-term solution: once the emergency subsides, use this basis to explore end-user requirements properly and ensure employee-driven adoption plans. Where possible, for this latter scenario, always use the carrot.

      Impact and Result

      • A prioritized plan for IT processes through Info-Tech’s cascading responsibility checklists for emergency remote work.
      • A codified emergency remote work policy document to better prepare for future emergencies.

      Execute an Emergency Remote Work Plan Research & Tools

      Start here

      Read our concise Executive Brief for why you need prioritized emergency remote work checklists and an accompanying policy document and review Info-Tech’s methodology.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Execute an Emergency Remote Work Plan Storyboard

      1. Day one preparations

      Prioritize key action items on day one of sending your employees home to remotely work during an emergency.

      • Emergency Remote Work Plan Checklists
      • Home Office Survey
      • Checklist for Securing Remote Workers
      • None
      • Remote Access Policy
      • Equipment Loan Policy
      • None
      • Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2
      • Remote Work Assignment Log
      • Wiki Collection for Collaboration Tools
      • Pandemic Preparation: The People Playbook

      2. One-to-two weeks preparations

      Address key action items in the one-to-two weeks following an emergency that forced your employees to work remotely.

      • None

      3. Codify an emergency remote work policy

      Turn your emergency remote work checklists into policy.

      • Emergency Remote Work Policy
      • Execute an Emergency Remote Work Plan Executive Presentation
      [infographic]

      Cost-Optimize Your Security Budget

      • Buy Link or Shortcode: {j2store}250|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $2,078 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • The security budget has been slashed and the team needs to do more with less.
      • Mitigating risk is still the top priority, only now we need to reassess effectiveness and efficiency to ensure we are getting the greatest level of protection for the least amount of money.

      Our Advice

      Critical Insight

      A cost-optimized security budget is one that has the greatest impact on risk for the least amount of money spent.

      Impact and Result

      • Focus on business needs and related risks. Review the risk-reduction efficacy of your people, processes, and technology and justify what can be cut and what must stay.
      • Info-Tech will guide you through this process, and by the end of this blueprint you will have a cost-optimized security budget and an executive presentation to explain your revised spending.

      Cost-Optimize Your Security Budget Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should cost-optimize your security budget, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Cost-optimize your technology and managed services

      This phase will help you assess the efficacy of your current technology and service providers.

      • Threat and Risk Assessment Tool
      • In-House vs. Outsourcing Decision-Making Tool

      2. Cost-optimize your staffing

      This phase will help you assess if layoffs are necessary.

      • Security Employee Layoff Selection Tool

      3. Cost-optimize your security strategy

      This phase will help you revise the pending process-based initiatives in your security strategy.

      • Security Cost Optimization Workbook
      • Security Cost Optimization Executive Presentation
      [infographic]

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management

      • Buy Link or Shortcode: {j2store}209|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      • Moreso than at any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.
      • It is increasingly likely that one of an organization's vendors, or their n-party support vendors, will cause an incident. Organizations must protect themselves by creating better mechanisms to hold their n-party vendors accountable and validate that they comply.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential risk impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect your organization.
      • Organizational leadership is often taken unaware by changes, and their plans lack the flexibility to adjust to significant regulatory upheavals.

      Impact and Result

      • Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks with our Comprehensive Risk Impact Tool to manage potential impacts.

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management – Use the research to better understand the negative impacts of vendor actions to your organization

      Use this research to identify and quantify the potential risk impacts caused by vendors. Utilize Info-Tech's approach to look at the impact from various perspectives to better prepare for issues that may arise.

      • Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management Storyboard

      2. Comprehensive Risk Impact Tool – Use this tool to help identify and quantify the impacts of negative vendor actions.

      By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Comprehensive Risk Impact Tool
      [infographic]

      Further reading

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management

      Approach vendor risk impact assessments from all perspectives.

      Analyst Perspective

      Organizations must comprehensively understand the impacts vendors may cause through different potential actions.

      Frank Sewell

      The risks from the vendor market have become more prevalent as the technologies and organizational strategies shift to a global direction. With this shift in risk comes a necessary perspective change to align with the greater likelihood of an incident occurring from vendors' (or one of their downstream support vendor's) negative actions.

      Organizational leadership must become more aware of the increasing risks that engaging vendors impose. To do so, they need to make informed decisions, which can only be provided by engaging expert resources in their organizations to compile a comprehensive look at potential risk impacts.

      Frank Sewell

      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      More so than at any other time, our world is changing. As a result organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

      It is increasingly likely that one of your vendors, or their n-party support vendors, will cause an incident. Organizations must protect themselves by creating better mechanisms to hold their n-party vendors accountable and validate that they comply.

      Common Obstacles

      Identifying and managing a vendor’s potential risk impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect your organization.

      Organizational leadership is often taken unaware by changes, and their plans lack the flexibility to adjust to significant regulatory upheavals.

      Info-Tech's Approach

      Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks with our Comprehensive Risk Impact Tool to manage potential impacts.

      Info-Tech Insight

      Organizations must evolve their risk assessments to be more adaptive to respond to changes in the global market. Ongoing monitoring and continual assessment of vendors’ risks is crucial to avoiding negative impacts.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.`

      6 components of vendor risk beyond cybersecurity.  Financial, Reputational, Operational, Strategic, Security, Regulatory & Compliance.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of Scope:
      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      The world is constantly changing

      The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

      When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

      Below are some things no one expected to happen in the last few years:

      62%

      of IT professionals are more concerned about being a victim of ransomware than they were a year ago.

      Info-Tech Tech Trends Survey 2022

      82%

      of Microsoft non-essential employees shifted to working from home in 2020, joining the 18% already remote.

      Info-Tech Tech Trends Survey 2022

      89%

      of organizations invested in web conferencing technology to facilitate collaboration.

      Info-Tech Tech Trends Survey 2022

      Looking at Risk in a New Light:

      the 6 Pillars of Vendor Risk Management

      Vendor Risk

      • Financial

      • Strategic

      • Operational

      • Security

      • Reputational

      • Regulatory

      • Organizations must review their risk appetite and tolerance levels, considering their complete landscape.
      • Changing regulations, acquisitions, and events that affect global supply chains are current realities, not unlikely scenarios.
      • Prepare your vendor risk management for success using due diligence and scenario- based “What If” discussions to bring all the relevant parties to the table and educate your whole organization on risk factors.
      Assessing Financial Risk Impacts

      Strategic risks on a global scale

      Odds are at least one of these is currently affecting your strategic plans

      • Vendor Acquisitions
      • Global Pandemic
      • Global Shortages
      • Gas Prices
      • Poor Vendor Performance
      • Travel Bans
      • War
      • Natural Disasters
      • Supply Chain Disruptions
      • Security Incidents

      Make sure you have the right people at the table to identify and plan to manage impacts.

      Assess internal and external operational risk impacts

      Two sides of the same coin

      Internal

      • Poorly vetted supplemental staff
      • Bad system configurations
      • Lack of relevant skills
      • Poor vendor performance
      • Failure to follow established processes
      • Weak contractual accountability
      • Unsupportable or end-of-life system components

      External

      • Cyberattacks
      • Supply Chain Issues
      • Geo-Political Disruptions
      • Vendor Acquisitions
      • N-Party Non-Compliance
      • Vendor Fraud

      Operational risk is the risk of losses caused by flawed or failed processes, policies, systems, or events that disrupt business operations.

      Identify and manage security risk impacts on your organization

      Due diligence will enable successful outcomes

      • Poor vendor performance
      • Vendor acquisition
      • Supply chain disruptions and shortages
      • N-party risk
      • Third-party risk

      What your vendor associations say about you

      Reputations that affect your brand: Bad customer reviews, breach of data, poor security posture, negative news articles, public lawsuits, poor performance.

      Regulatory compliance

      Consider implementing vendor management initiatives and practices in your organization to help gain compliance with your expanding vendor landscape.

      Your organizational risks may be monitored but are your n-party vendors?

      6 components of vendor risk beyond cybersecurity.  Financial, Reputational, Operational, Strategic, Security, Regulatory & Compliance.

      Review your expectations with your vendors and hold them accountable

      Regulatory entities are looking beyond your organization’s internal compliance these days. Instead, they are more and more diving into your third-party and downstream relationships, particularly as awareness of downstream breaches increases globally.

      • Are you assessing your vendors regularly?
      • Are you validating those assessments?
      • Do your vendors have a map of their downstream support vendors?
      • Do they have the mechanisms to hold those downstream vendors accountable to your standards?

      Identify and manage risks

      Regulatory

      Regulatory agencies are putting more enforcement around ESG practices across the globe. As a result, organizations will need to monitor the changing regulations and validate that their vendors and n-party support vendors are adhering to these regulations or face penalties for non-compliance.

      Security-Data protection

      Data protection remains an issue. Organizations should ensure that the data their vendors obtain remains protected throughout the vendor’s lifecycle, including post-termination. Otherwise, they could be monitoring for a data breach in perpetuity.

      Mergers and acquisitions

      More prominent vendors continuously buy smaller companies to control the market in the IT industry. Organizations should put protections in their contracts to ensure that an IT vendor’s acquisition does not put them in a relationship with someone that could cause them an issue.

      Identify and manage risks

      Poor vendor performance

      Consider the impact of a vendor that fails to perform midway through the implementation. Organizations need to be able to manage the impact of replacing that vendor and cutting their losses rather than continuing to throw good money away after bad performance.

      Supply chain disruptions and global shortages

      Geopolitical disruptions and natural disasters have caused unprecedented interruptions to business. Incorporate forecasting of product and ongoing business continuity planning into your strategic plans to adapt as events unfold.

      Poorly configured systems

      Failing to ensure that your vendor-supported systems are properly configured and that your vendors are meeting your IT change control and configuration standards is more commonplace than expected. Proper oversight and management of your support vendors is crucial to ensure they are meeting expectations in this regard.

      What to look for

      Identify potential risk impacts

      • Is there a record of complaints against the vendor from their employees or customers?
      • Is the vendor financially sound, with the resources to support your needs?
      • Has the vendor been cited for regulatory compliance issues in the past?
      • Does the vendor have a comprehensive list of their n-party vendor partners?
        • Are they willing to accept appropriate contractual protections regarding them?
      • Does the vendor self-audit, or do they use a vetted third-party audit firm to issue a SOC report annually?
      • Does the vendor operate in regions known for instability?
      • Is the vendor willing to make concessions on contractual protections, or are they only offering one-sided agreements with as-is warranties?

      Prepare your vendor risk management for success

      Due diligence will enable successful outcomes.

      1. Obtain top-level buy-in; it is critical to success.
      2. Build enterprise risk management (ERM) through incremental improvement.
      3. Focus initial efforts on the “big wins” to prove the process works.
      4. Use existing resources.
      5. Build on any risk management activities that already exist in the organization.
      6. Socialize ERM throughout the organization to gain additional buy-in.
      7. Normalize the process long term with ongoing updates and continuing education for the organization.
      8. (Adapted from COSO)

      How to assess third-party risk

      1. Review organizational risks

        Understand the organizations risks to prepare for the “What If” game exercise.
      2. Identify and understand potential risks

        Play the “What If” game with the right people at the table.
      3. Create a risk profile packet for leadership

        Pull all the information together in a presentation document.
      4. Validate the risks

        Work with leadership to ensure that the proposed risks are in line with their thoughts.
      5. Plan to manage the risks

        Lower the overall risk potential by putting mitigations in place.
      6. Communicate the plan

        It is important not only to have a plan but also to socialize it in the organization for awareness.
      7. Enact the plan

        Once the plan is finalized and socialized, put it in place with continued monitoring for success.

      Adapted from Harvard Law School Forum on Corporate Governance

      Insight summary

      Risk impacts often come from unexpected places and have significant consequences.

      Knowing who your vendors are using for their support and supply chain could be crucial in eliminating the risk of non-compliance for your organization.

      Having a plan to identify and validate the regulatory compliance of your vendors is a must for any organization to avoid penalties.

      Insight 1

      Organizations’ strategic plans need to be adaptable to avoid vendors’ negative actions causing an expedited shift in priorities.

      For example, Philips’ recall of ventilators impacted its products and the availability of its competitors’ products as demand overwhelmed the market.

      Insight 2

      Organizations often fail to understand how n-party vendors could place them in non-compliance.

      Even if you know your complete third-party vendor landscape, you may not be aware of the downstream vendors in play. Ensure that you get visibility into this space as well, and hold your direct vendors accountable for the actions of their vendors.

      Insight 3

      Organizations need to know where their data lives and ensure it is protected.

      Make sure you know which vendors are accessing/storing your data, where they are keeping it, and that you can get it back and have the vendors destroy it when the relationship is over. Without adequate protections throughout the lifecycle of the vendor, you could be monitoring for breaches in perpetuity.

      Insight summary

      Assessing financial impacts is an ongoing, educative, and collaborative multidisciplinary process that vendor management initiatives are uniquely designed to coordinate and manage for organizations.

      Operational risk impacts often come from unexpected places and have unforeseen impacts. Knowing where your vendors place in critical business processes and those vendors' business continuity plans concerning your organization should be a priority for those managing the vendors.

      Insight 4

      Organizations need to learn how to assess the likelihood of potential risks in the rapidly changing online environments and recognize how their partnerships and subcontractors’ actions can affect their brand.

      For example, do you understand how a simple news article raises your profile for short-term and long-term adverse events?

      Insight 5

      Organizations fail to plan for vendor acquisitions appropriately.

      Vendors routinely get acquired in the IT space. Does your organization have appropriate safeguards from inadvertently entering a negative relationship? Do you have plans for replacing critical vendors purchased in such a manner?

      Insight 6

      Vendors are becoming more and more crucial to organizations’ overall operations, and most organizations have a poor understanding of the potential impacts they represent.

      Is your vendor solvent? Do they have enough staff to accommodate your needs? Has their long-term planning been affected by changes in the market? Are they unique in their space?

      Identifying vendor risk

      Who should be included in the discussion?

      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make informed decisions.
      • Getting input from operational experts at your organization will enhance your business's long-term potential for success.
      • Involving those who directly manage vendors and understand the market will aid operational experts in determining the forward path for relationships with your current vendors and identifying emerging potential strategic partners.
      • Make sure security, risk, and compliance are all at the table. These departments all look at risk from different angles for the business and give valuable insight collectively.
      • Organizations have a wealth of experience in their marketing departments that can help identify real-world scenarios of negative actions.

      See the blueprint Build an IT Risk Management Program

      Review your risk management plans for new risks on a regular basis.

      Keep in mind Risk =
      Likelihood x Impact

      (R=L*I).

      Impact (I) tends to remain the same, while Likelihood (L) is becoming closer to 100% as threat actors become more prevalent.

      Managing vendor risk impacts

      How could your vendors impact your organization?

      • Review vendors’ downstream connections to understand thoroughly who you are in business with
      • Institute continuous vendor lifecycle management
      • Develop IT risk governance and change control
      • Introduce continual risk assessment to monitor the relevant vendor markets
      • Monitor and schedule contract renewals and new service/module negotiations
      • Perform business alignment meetings to reassess relationships
      • Ensure strategic alignment in contracts
      • Review vendors’ business continuity plans and disaster recovery testing
      • Re-evaluate corporate policies frequently
      • Monitor your company’s and associated vendors’ online presence
      • Be adaptable and allow for innovations that arise from the current needs
        • Capture lessons learned from prior incidents to improve over time, and adjust your plans accordingly

      Organizations must review their risk appetite and tolerance levels, considering their complete landscape.

      Changing regulations, acquisitions, new security issues, and events that affect global supply chains are current realities, not unlikely scenarios.

      Ongoing Improvement

      Incorporating lessons learned.

      • Over time, despite everyone’s best observations and plans, incidents will catch us off guard.
      • When that happens, follow your incident response plans and act accordingly.
      • An essential step is to document what worked and what did not – collectively known as the “lessons learned.”
      • Use the lessons learned document to devise, incorporate, and enact a better risk management process.

      Sometimes disasters occur despite our best plans to manage them.

      When this happens, it is important to document the lessons learned and improve our plans going forward.

      The "what if" game

      1-3 hours

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (if too small, continue as a single group).
      2. Use the Comprehensive Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potentials but manage the overall process to keep the discussion pertinent and on track.
      3. Collect the outputs and ask the subject matter experts (SMEs) for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Comprehensive Risk Impact Tool

      Input

      • List of identified potential risk scenarios scored by impact
      • List of potential mitigations of the scenarios to reduce the risk

      Output

      • Comprehensive risk profile on the specific vendor solution

      Materials

      • Whiteboard/flip charts
      • Comprehensive Risk Impact Tool to help drive discussion

      Participants

      • Vendor Management – Coordinator
      • Organizational Leadership
      • Operations Experts (SMEs)
      • Business Process Experts
      • Legal/Compliance/Risk Manager

      High risk example from tool

      High risk example from Tool.  Shows sample questions to ask to identify impacts, their associated score, weight, and comments or notes.

      Note: Even though a few items are “scored” they have not been added to the overall weight, signaling that the company has noted but does not necessarily hold them against the vendor.

      How to mitigate:

      • Contractually insist that the vendor have a third-party security audit performed annually with the stipulation that they will not denigrate below your acceptable standards.
      • At renewal negotiate better contractual terms and protections for your organization.

      Low risk example from tool

      Low risk example from Tool.  Shows sample questions to ask to identify impacts, their associated score, weight, and comments or notes.

      Summary

      Seek to understand all potential risk impacts to better prepare your organization for success.

      • Organizations need to understand and map out their entire vendor landscape.
      • Understand where all your data lives and how you can control it throughout the vendor lifecycle.
      • Organizations need to be realistic about the likelihood of potential risks in the changing global world.
      • Those organizations that consistently follow their established risk-assessment and due-diligence processes are better positioned to avoid penalties.
      • Understand how your vendors prioritize your organization in their business continuity processes.
      • Bring the right people to the table to outline potential risks in the market and your organization.
      • Socialize the third-party vendor risk management process throughout the organization to heighten awareness and enable employees to help protect the organization.
      • Organizations need to learn how to assess the likelihood of potential risks in the changing global markets and recognize how their partnerships and subcontracts affect their brand.
      • Incorporate lessons learned from prior incidents into your risk management process to build better plans for future issues.

      Organizations must evolve their risk assessments to be more meaningful to respond to global changes in the market.

      Organizations should increase the resources dedicated to monitoring the market as regulatory agencies continue to hold them more and more accountable.

      Bibliography

      Olaganathan, Rajee. “Impact of COVID-19 on airline industry and strategic plan for its recovery with special reference to data analytics technology.” Global Journal of Engineering and Technology Advances, vol 7, no 1, 2021, pp. 033-046.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012.

      Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.

      Weak Cybersecurity is taking a toll on Small Businesses (tripwire.com)

      SecureLink 2022 White Paper SL_Page_EA+PAM (rocketcdn.me)

      Shared Assessments Member Poll March 2021 "Guide: Evolving Work Environments Impact of Covid-19 on Profile and Management of Third Parties“

      “Cybersecurity only the tip of the iceberg for third-party risk management”. Help Net Security, April 21, 2021. Accessed: 2022-07-29.

      “Third-Party Risk Management (TPRM) Managed Services”. Deloitte, 2022. Accessed: 2022-07-29.

      “The Future of TPRM: Third Party Risk Management Predictions for 2022”. OneTrust, December 20th2021. Accessed 2022-07-29.

      “Third Party Vendor definition”. Law Insider, Accessed 2022-07-29.

      “Third Party Risk”. AWAKE Security, Accessed 2022-07-29.

      Glidden, Donna. "Don't Underestimate the Need to Protect Your Brand in Publicity Clauses", Info-Tech Research Group, June 2022.

      Greenaway, Jordan. "Managing Reputation Risk: A start-to-finish guide", Transmission Private, July 2022. Accessed June 2022.

      Jagiello, Robert D, and Thomas T Hills. “Bad News Has Wings: Dread Risk Mediates Social Amplification in Risk Communication. ”Risk analysis : an official publication of the Society for Risk Analysis vol. 38,10 (2018): 2193-2207.doi:10.1111/risa.13117

      Kenton, Will. "Brand Recognition", Investopedia, August 2021. Accessed June 2022. Lischer, Brian. "How Much Does it Cost to Rebrand Your Company?", Ignyte, October 2017. Accessed June 2022.

      "Powerful Examples of How to Respond to Negative Reviews", Review Trackers, February 2022. Accessed June 2022.

      "The CEO Reputation Premium: Gaining Advantage in the Engagement Era", Weber Shadwick, March 2015. Accessed on June 2022.

      "Valuation of Trademarks: Everything You Need to Know",UpCounsel, 2022. Accessed June 2022.

      Related Info-Tech Research

      Identify and Manage Financial Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential financial impacts that vendors may incur and suggest systems to help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Identify and Manage Reputational Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

      Identify and Manage Strategic Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Risk Impact Tool.

      Regulatory guidance and industry standards

      Maintain an Organized Portfolio

      • Buy Link or Shortcode: {j2store}432|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $3,059 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • All too often, the portfolio of programs and projects looks more like a random heap than a strategically organized and balanced collection of investments that will drive the business forward.
      • Portfolio managers know that with the right kind of information and the right level of process maturity they can get better results through the portfolio; however, organizations often assume (falsely) that the required level of maturity is out of reach from their current state and perpetually delay improvements.

      Our Advice

      Critical Insight

      • The information needed to define clear and usable criteria for organizing the portfolio of programs and projects already exists. Portfolio managers only need to identify the sources of that information and institute processes for regularly reviewing that information in order to define those criteria.
      • Once a portfolio manager has a clear idea of the goals and constraints that shape what ought to be included (or removed) from the portfolio and once these have been translated into clear and usable portfolio criteria, basic portfolio management processes can be instituted to ensure that these criteria are used consistently throughout the various stages of the project lifecycle.
      • Portfolio management frameworks and processes do not need to be built from scratch. Well-known frameworks – such as the one outlined in COBIT 5 APO05 – can be instituted in a way that will allow even low-maturity organizations to start organizing their portfolio.
      • Organizations do not need to grow into portfolio management frameworks to get the benefits of an organized portfolio; instead, they can grow within such frameworks.

      Impact and Result

      • An organized portfolio will ensure that the projects and programs included in it are strategically aligned and can actually be executed within the finite constraints of budgetary and human resource capacity.
      • Portfolio managers are better empowered to make decisions about which projects should be included in the portfolio (and when) and are better empowered to make the very tough decisions about which projects should be removed from the portfolio (i.e. cancelled).
      • Building and maturing a portfolio management framework will more fully integrate the PMO into the broader IT management and governance frameworks, making it a more integral part of strategic decisions and a better business partner in the long run.

      Maintain an Organized Portfolio Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should maintain an organized portfolio of programs and projects, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess the current state of the portfolio and PPM processes

      Analyze the current mix of programs and projects in your portfolio and assess the maturity of your current PPM processes.

      • Maintain an Organized Portfolio – Phase 1: Assess the Current State of the Portfolio and PPM Processes
      • Project Portfolio Organizer
      • COBIT APO05 (Manage Portfolio) Alignment Workbook

      2. Enhance portfolio organization through improved PPM criteria and processes

      Enhance and optimize your portfolio management processes to ensure portfolio criteria are clearly defined and consistently applied across the project lifecycle when making decisions about which projects to include or remove from the portfolio.

      • Maintain an Organized Portfolio – Phase 2: Enhance Portfolio Organization Through Improved PPM Criteria and Processes
      • Portfolio Management Standard Operating Procedures

      3. Implement improved portfolio management practices

      Implement your portfolio management improvement initiatives to ensure long-term sustainable adoption of new PPM practices.

      • Maintain an Organized Portfolio – Phase 3: Implement Improved Portfolio Management Practices
      • Portfolio Management Improvement Roadmap Tool
      [infographic]

      Workshop: Maintain an Organized Portfolio

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Portfolio Mix and Portfolio Process Current State

      The Purpose

      Analyze the current mix of the portfolio to determine how to better organize it according to organizational goals and constraints.

      Assess which PPM processes need to be enhanced to better organize the portfolio.

      Key Benefits Achieved

      An analysis of the existing portfolio of projects (highlighting areas of concern).

      An analysis of the maturity of current PPM processes and their ability to support the maintenance of an organized portfolio.

      Activities

      1.1 Pre-work: Prepare a complete project list.

      1.2 Define existing portfolio categories, criteria, and targets.

      1.3 Analyze the current portfolio mix.

      1.4 Identify areas of concern with current portfolio mix.

      1.5 Review the six COBIT sub-processes for portfolio management (APO05.01-06).

      1.6 Assess the degree to which these sub-processes have been currently achieved at the organization.

      1.7 Assess the degree to which portfolio-supporting IT governance and management processes exist.

      1.8 Perform a gap analysis.

      Outputs

      Analysis of the current portfolio mix

      Assessment of COBIT alignment and gap analysis.

      2 Define Portfolio Target Mix, Criteria, and Roadmap

      The Purpose

      Define clear and usable portfolio criteria.

      Record/design portfolio management processes that will support the consistent use of portfolio criteria at all stages of the project lifecycle.

      Key Benefits Achieved

      Clearly defined and usable portfolio criteria.

      A portfolio management framework that supports the consistent use of the portfolio criteria across all stages of the project lifecycle.

      Activities

      2.1 Identify determinants of the portfolio mix, criteria, and constraints.

      2.2 Define the target mix, portfolio criteria, and portfolio metrics.

      2.3 Identify sources of funding and resourcing.

      2.4 Review and record the portfolio criteria based upon the goals and constraints.

      2.5 Create a PPM improvement roadmap.

      Outputs

      Portfolio criteria

      Portfolio metrics for intake, monitoring, closure, termination, reprioritization, and benefits tracking

      Portfolio Management Improvement Roadmap

      3 Design Improved Portfolio Sub-Processes

      The Purpose

      Ensure that the portfolio criteria are used to guide decision making at each stage of the project lifecycle when making decisions about which projects to include or remove from the portfolio.

      Key Benefits Achieved

      Processes that support decision making based upon the portfolio criteria.

      Processes that ensure the portfolio remains consistently organized according to the portfolio criteria.

      Activities

      3.1 Ensure that the metrics used for each sub-process are based upon the standard portfolio criteria.

      3.2 Establish the roles, accountabilities, and responsibilities for each sub-process needing improvement.

      3.3 Outline the workflow for each sub-process needing improvement.

      Outputs

      A RACI chart for each sub-process

      A workflow for each sub-process

      4 Change Impact Analysis and Stakeholder Engagement Plan

      The Purpose

      Ensure that the portfolio management improvement initiatives are sustainably adopted in the long term.

      Key Benefits Achieved

      Stakeholder engagement.

      Sustainable long-term adoption of the improved portfolio management practices.

      Activities

      4.1 Conduct a change impact analysis.

      4.2 Create a stakeholder engagement plan.

      Outputs

      Change Impact Analysis

      Stakeholder Engagement Plan

      Completed Portfolio Management SOP

      Build an Application Integration Strategy

      • Buy Link or Shortcode: {j2store}198|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Enterprise Integration
      • Parent Category Link: /enterprise-integration
      • Even though organizations are now planning for Application Integration (AI) in their projects, very few have developed a holistic approach to their integration problems resulting in each project deploying different tactical solutions.
      • Point-to-point and ad hoc integration solutions won’t cut it anymore: the cloud, big data, mobile, social, and new regulations require more sophisticated integration tooling.
      • Loosely defined AI strategies result in point solutions, overlaps in technology capabilities, and increased maintenance costs; the correlation between business drivers and technical solutions is lost.

      Our Advice

      Critical Insight

      • Involving the business in strategy development will keep them engaged and align business drivers with technical initiatives.
      • An architectural approach to AI strategy is critical to making appropriate technology decisions and promoting consistency across AI solutions through the use of common patterns.
      • Get control of your AI environment with an appropriate architecture, including policies and procedures, before end users start adding bring-your-own-integration (BYOI) capabilities to the office.

      Impact and Result

      • Engage in a formal AI strategy and involve the business when aligning business goals with AI value; each double the AI success rate.
      • Benefits from a formal AI strategy largely depend on how gaps will be filled.
      • Create an Integration Center of Competency for maintaining architectural standards and guidelines.
      • AI strategies are continuously updated as new business drivers emerge from changing business environments and/or essential technologies.

      Build an Application Integration Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for AI Strategy

      Obtain organizational buy-in and build a standardized and formal AI blueprint.

      • Storyboard: Build an Application Integration Strategy

      2. Assess the organization's readiness for AI

      Assess your people, process, and technology for AI readiness and realize areas for improvement.

      • Application Integration Readiness Assessment Tool

      3. Develop a Vision

      Fill the required AI-related roles to meet business requirements

      • Application Integration Architect
      • Application Integration Specialist

      4. Perform a Gap Analysis

      Assess the appropriateness of AI in your organization and identify gaps in people, processes, and technology as it relates to AI.

      • Application Integration Appropriateness Assessment Tool

      5. Build an AI Roadmap

      Compile the important information and artifacts to include in the AI blueprint.

      • Application Integration Strategy Template

      6. Build the Integration Blueprint

      Keep a record of services and interfaces to reduce waste.

      • Integration Service Catalog Template

      Infographic

      Workshop: Build an Application Integration Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Make the Case for AI Strategy

      The Purpose

      Uncover current and future AI business drivers, and assess current capabilities.

      Key Benefits Achieved

      Perform a current state assessment and create a future vision.

      Activities

      1.1 Identify Current and Future Business Drivers

      1.2 AI Readiness Assessment

      1.3 Integration Service Catalog Template

      Outputs

      High-level groupings of AI strategy business drivers.

      Determine the organization’s readiness for AI, and identify areas for improvement.

      Create a record of services and interfaces to reduce waste.

      2 Know Current Environment

      The Purpose

      Identify building blocks, common patterns, and decompose them.

      Key Benefits Achieved

      Develop an AI Architecture.

      Activities

      2.1 Integration Principles

      2.2 High-level Patterns

      2.3 Pattern decomposition and recomposition

      Outputs

      Set general AI architecture principles.

      Categorize future and existing interactions by pattern to establish your integration framework.

      Identification of common functional components across patterns.

      3 Perform a Gap Analysis

      The Purpose

      Analyze the gaps between the current and future environment in people, process, and technology.

      Key Benefits Achieved

      Uncover gaps between current and future capabilities and determine if your ideal environment is feasible.

      Activities

      3.1 Gap Analysis

      Outputs

      Identify gaps between the current environment and future AI vision.

      4 Build a Roadmap for Application Integration

      The Purpose

      Define strategic initiatives, know your resource constraints, and use a timeline for planning AI.

      Key Benefits Achieved

      Create a plan of strategic initiatives required to close gaps.

      Activities

      4.1 Identify and prioritize strategic initiatives

      4.2 Distribute initiatives on a timeline

      Outputs

      Use strategic initiatives to build the AI strategy roadmap.

      Establish when initiatives are going to take place.

      Cost and Budget Management

      • Buy Link or Shortcode: {j2store}8|cart{/j2store}
      • Related Products: {j2store}8|crosssells{/j2store}
      • Up-Sell: {j2store}8|upsells{/j2store}
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $2,000
      • member rating average days saved: 5
      • Parent Category Name: Financial Management
      • Parent Category Link: /financial-management

      The challenge

      • IT is seen as a cost center in most organizations. Your IT spend is fuelled by negative sentiment instead of contributing to business value.

      • Budgetary approval is difficult, and in many cases, the starting point is lowering the cost-income ratio without looking at the benefits.
      • Provide the right amount of detail in your budgets to tell your investment and spending story. Align it with the business story. Too much detail only increases confusion, too little suspicion.

      Our advice

      Insight

      An effective IT budget complements the business story with how you will achieve the expected business targets.

      • Partner with the business to understand the strategic direction of the company and its future needs.
      • Know your costs and the value you will deliver.
      • Present your numbers and story clearly and credibly. Excellent delivery is part of good communication.
      • Guide your company by clearly explaining the implications of different choices they can make.

      Impact and results 

      • Get a head-start on your IT forecasting exercise by knowing the business strategy and what initiatives they will launch.
      • The coffee corner works! Pre-sell your ideas in quick chats.
      • Do not make innovation budgets bigger than they need to be. It undermines your credibility.
      • You must know your history to accurately forecast your IT operations cost and how it will evolve based on expected business changes.
      • Anticipate questions. IT discretionary proposals are often challenged. Think ahead of time about what areas your business partners will focus on and be ready with researched and credible responses.
      • When you have an optimized budget, tie further cost reductions to consequences in service delivery or deferred projects, or a changed operating model.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started

      Our concise executive brief shows you why you should develop a budget based on value delivery. We'll show you our methodology and the ways we can help you in completing this.

      Plan for budget success

      • Build an IT Budget That Demonstrates Value Delivery – Phase 1: Plan (ppt)
      • IT Budget Interview Guide (doc)

      Build your budget.

      • Build an IT Budget That Demonstrates Value Delivery – Phase 2: Build (ppt)
      • IT Cost Forecasting Tool (xls)

      Sell your budget

      • Build an IT Budget That Demonstrates Value Delivery – Phase 3: Sell (ppt)
      • IT Budget Presentation (ppt)

       

      Activate Your Augmented Reality Initiative

      • Buy Link or Shortcode: {j2store}465|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Augmented reality is a new technology and use cases are still emerging. Organizations have to work hard to stay ahead of the curve and predict how they will be impacted.
      • There are limited off-the-shelf augmented reality solutions in terms of business applications. IT not only needs to understand the emerging augmented reality hardware, but also the plethora of development platforms.

      Our Advice

      Critical Insight

      • Augmented reality presents a new avenue to solve problems that cannot be addressed efficiently with existing technology. It is a new tool that will impact the way you work.
      • Beyond addressing existing problems, augmented reality will provide the ability to differently execute business processes. Current processes have been designed with existing systems and capabilities in mind. Augmented reality impacts organizational design processes that are more complex.
      • As a technology with an evolving set of use cases, IT and the business must anticipate some of the challenges that may arise with the use of augmented reality (e.g. health and safety, application development, regulatory).

      Impact and Result

      • Our methodology addresses the possible issues by using a case-study approach to demonstrate the “art of the possible” for augmented reality.
      • With an understanding of augmented reality, it is possible to find applicable use cases for this emerging technology and get a leg up on competitors.
      • By utilizing Info-Tech’s Augmented Reality Use Case Picklist and the Augmented Reality Stakeholder Presentation Template, the IT team and their business stakeholders can confidently approach augmented reality adoption.

      Activate Your Augmented Reality Initiative Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why your organization should care about augmented reality’s potential to transform the workplace and how Info-Tech will support you as you identify and build your augmented reality use case.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand augmented reality

      Analyze the four key benefits of augmented reality to understand how the technology can resolve industry issues.

      • Activate Your Augmented Reality Initiative – Phase 1: Understand Augmented Reality
      • Augmented Reality Glossary

      2. Finding space for augmented reality

      Develop and prioritize use cases for augmented reality using Info-Tech’s AR Initiative Framework.

      • Activate Your Augmented Reality Initiative – Phase 2: Finding Space for Augmented Reality
      • Augmented Reality Use Case Picklist

      3. Communicate project decisions to stakeholders

      Present the augmented reality initiative to stakeholders and understand the way forward for the AR initiative.

      • Activate Your Augmented Reality Initiative – Phase 3: Communicate Project Decisions to Stakeholders
      • Augmented Reality Stakeholder Presentation Template
      [infographic]

      Workshop: Activate Your Augmented Reality Initiative

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Augmented Reality and Its Use Cases

      The Purpose

      Understand the fundamentals of augmented reality technology and its real-world business applications.

      Key Benefits Achieved

      A prioritized list of augmented reality use cases.

      Activities

      1.1 Introduce augmented reality technology.

      1.2 Understand augmented reality use cases.

      1.3 Review augmented reality case studies.

      Outputs

      An understanding of the history and current state of augmented reality technology.

      An understanding of “the art of the possible” for augmented reality.

      An enhanced understanding of augmented reality.

      2 Conduct an Environmental Scan and Internal Review

      The Purpose

      Examine where the organization stands in the current competitive environment.

      Key Benefits Achieved

      Understanding of what is needed from an augmented reality initiative to differentiate your organization from its competitors.

      Activities

      2.1 Environmental analysis (PEST+SWOT).

      2.2 Competitive analysis.

      2.3 Listing of interaction channels and disposition.

      Outputs

      An understanding of the internal and external propensity for augmented reality.

      An understanding of comparable organizations’ approach to augmented reality.

      A chart with the disposition of each interaction channel and its applicability to augmented reality.

      3 Parse Critical Technology Drivers

      The Purpose

      Determine which business processes will be affected by augmented reality.

      Key Benefits Achieved

      Understanding of critical technology drivers and their KPIs.

      Activities

      3.1 Identify affected process domains.

      3.2 Brainstorm impacts of augmented reality on workflow enablement.

      3.3 Distill critical technology drivers.

      3.4 Identify KPIs for each driver.

      Outputs

      A list of affected process domains.

      An awareness of critical technology drivers for the augmented reality initiative.

      Demystify the New PMBOK Guide and PMI Certifications

      • Buy Link or Shortcode: {j2store}446|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • There is lots of confusion with the latest edition of A Guide to The Project Management Body of Knowledge (PMBOK Guide).
      • The Project Management Professional (PMP) certification is not satisfying the needs of PMOs.
      • There is still a divide on whether the focus should be on the PMP or an Agile-related certification.
      • The PMP certification has lost its sizzle while other emerging certifications have started to penetrate the market. It’s hard to distinguish which certifications still hold weight.

      Our Advice

      Critical Insight

      • The PMP certification is still valuable and worth your time in 2023.
      • There are still over a million active PMP-certified individuals worldwide.
      • PMP can make you more money.

      Impact and Result

      • Study the market trends for certification options as they emerge and evolve.
      • Go with longstanding, reputable certifications, but be ready to pivot if they are not adding value.
      • Look at the job market as an indicator of certification demands.
      • There are a lot of certification options out there, and every day there seems to be a new one that pops up. Wait and see how the market reacts before investing your time and money in a new certification.

      Demystify the New PMBOK Guide and PMI Certifications Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Demystify the New PMBOK and PMI Certifications Storyboard – A guide to validate if the PMP is still valuable. It will also provide clarity related to the updated PMBOK 7th edition.

      This publication will validate if the PMP certification is still valuable and worth your time. In addition, you will gain different perspectives related to other PMI and non-PMI certifications. You will gain a better understanding of the evolution of the PMBOK Guide, and the significant changes made from PMBOK 6th edition to the 7th edition.

      • Demystify the New PMBOK and PMI Certifications Storyboard
      [infographic]

      Further reading

      Demystify the New PMBOK Guide and the PMI Certifications

      The PMP certification is still valuable and worth your time in 2023.

      Analyst Perspective

      The PMP (Project Management Professional) certification is still worth your time.

      Long Dam

      I often get asked, “Is the PMP worth it?” I then proceed with a question of my own: “If it gets you an interview or a foot in the door or bolsters your salary, would it be worth it?” Typically, the answer is a resounding “YES!”

      CIO magazine ranked the PMP as the top project management certification in North America because it demonstrates that you have the specific skills employers seek, dedication to excellence, and the capacity to perform at the highest levels.

      Given its popularity and the demand in the marketplace, I strongly believe it is still worth your time and investment. The PMP is a globally recognized certification that has dominated for decades. It is hard to overlook the fact that the Project Management Institute (PMI) has more than 1.2 million PMP certification holders worldwide and is still considered the gold standard for project management.

      Yes, it’s worth it. It gets you interviews, a foot in the door, and bolsters your salary. Oh, and it makes you a more complete project manager.

      Long Dam, PMP, PMI-ACP, PgMP, PfMP

      Principal Research Director, Project Portfolio Management Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • There is lots of confusion with the latest A Guide to The Project Management Body of Knowledge (aka PMBOK Guide).
      • The Project Management Professional (PMP) certification is not satisfying the needs of PMOs.
      • There is still a divide on whether the focus should be on the PMP or an Agile-related certification.

      The PMP certification has lost its sizzle while other emerging certifications have started to penetrate the market. It’s hard to distinguish which certification still holds weight.

      Common Obstacles

      • Poor understanding and lack of awareness of other PMI certifications outside of the PMP.
      • There are too many competing certifications out there, and it’s hard to decipher which ones to choose.
      • PMI certifications typically take a lot of effort to obtain and maintain.

      There are other, less intensive certifications available. It’s unclear what will be popular in the future.

      Info-Tech's Approach

      • Study the market trends for certification options as they emerge and evolve.
      • Go with longstanding reputable certifications, but be ready to pivot if they are not adding value.
      • Look at the job market as an indicator for certification demands.

      There are a lot of certification options out there, and every day there seems to be a new one that pops up. Wait and see how the market reacts before investing your time and money in a new certification.

      Info-Tech Insight

      The PMP certification is still valuable and worthy of your time in 2023.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guide Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or knowledge to take this project on. We need assistance through the entirety of the this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      The PMP dominated the market for decades and got over 1 million people certified

      Total active project management professional holders from December 2021 versus July 2022

      Info-Tech Insight

      The PMI’s flagship PMP certification numbers have not significantly increased from 2021 to 2022. However, PMP substantially outpaces all competitors with over 1.2 million certified PMPs.

      Source: projectmanagement.com

      The PMP penetrated over 200 countries

      PMP is the global project management gold standard.

      • CIO magazine ranked the PMP as the top project management certification because it demonstrates you have the specific skills employers seek, dedication to excellence, and the capacity to perform at the highest levels.
      • It delivers real value in the form of professional credibility, deep knowledge, and increased earning potential. Those benefits have staying power.
      • The PMP now includes predictive, Agile, and hybrid approaches.
      • The PMP demonstrates expertise across the wide array of planning and work management styles.

      Source: PMI, “PMP Certification.” PMI, “Why You Should Get the PMP.”

      The PMP was valuable in the past specifically because it was the standard

      79% of project managers surveyed have the PMP certification out of 30,000 respondents in 40 countries.

      The PMP became table stakes for jobs in project management and PMO’s.

      Work desk with project management written in middle. Arrows point to: Goals, planning, risks, control, teamwork, cost, communication, and problem solving.

      Source: PMI’s Earning Power: Project Management Salary Survey—Twelfth Edition (2021)

      The PMP put itself on a collision course with Agile

      • The Agile Certified Practitioner (PMI-ACP) was introduced in 2012 which initially clashed with the PMP for project management supremacy from the PMI.
      • Then the Disciplined Agile (DA) was introduced in 2019, which further compounded the issue and caused even more confusion with both the PMP and the PMI-ACP certification.
      • Instead of complementing the PMP, these certifications began to inadvertently compete with it head-to-head.

      There is a new PMBOK Guide Seventh Edition in town

      The PMI made its most significant changes between 2017 and 2021.

      Chart showing editions of the PMBOK guide from 1996 to 2021.

      Timeline adapted from Wikipedia, “Project Management Body of Knowledge.”

      Roughly every 3-5 years, the PMI has released a new PMBOK version. It’s unclear if there will be an eighth edition.

      The market got confused by PMBOK Guide – Seventh Edition

      PMBOK guide version 5 considered the gold standard, version 6 first included Agile and version 7 was the most radical change.

      • Die-hard traditional project managers have a hard time grasping why the PMI messed around with the PMBOK Guide. There is sentiment that the PMBOK Guide V7 got diluted.
      • Naysayers do not think that the PMBOK Guide V7 hit the mark and found it to be a concession to Agilists.
      • The PMBOK Guide V7 was significantly trimmed down by almost two-thirds to 274 pages whereas the PMBOK V6 ballooned to 756 pages!
      • Some Agile practitioners found this to be a refreshing, bold move from the PMI. Most, however, ignored or resisted it.
      PMBOK Guide: A guide to the Project Management Body of Knowledge Seventh Edition.  AND The Standard for Project Management.

      PMBOK Guide – Seventh edition released in 2021

      • The PMBOK Guide – Seventh Edition was released in late 2021. It was the most radical change since 1987. For the first time, the PMI went from a process-based standard to a principles-based standard, and the guide went from knowledge areas to project performance domains. This may have diluted the traditional predictive project management practices. However, it was offset by incorporating more iterative, Agile, and hybrid approaches.
      • The market is confused and is clearly shifting toward Agile and away from the rigor that is typically associated with the PMI.
      • The PMI transitioned most of the process-based standards & ITTO to their new digital PMIStandards+ online platform, which can be found here (access for PMI members only).
      • The PMBOK Guide is not the sole basis of the certification exam; however, it can be used as one of several reference resources. Using the exam content outline (ECO) is the way forward, which can be found here.

      The Agile certification seems to be the focus for the PMI in the coming years

      • The PMI started to get into the Agile game with the introduction of Agile certifications, which is where all the confusion started. Although the PMI-ACP & the DASM have seen a steady uptake recently, it appears to be at the expense of the PMP certification.
      • The PMI acquired the Discipline Agile (DA) in late 2019, which expanded their offerings and capabilities for project managers and teams to choose their “way of working.”
      • This was an important milestone for the PMI to address the new way of working for Agile practitioners with this offering to provide more options and to better support enterprise agility.
      PMI-ACP & the DASM have seen a steady uptake recently.

      Source: projectmanagement.com as of July 2022

      The PMI has lost more certified PMPs than they have gained so far in 2022

      The PMI has lost more certified PMPs than they have gained so far in 2022.

      PMP

      PMP – Project Management Professional

      It is a concerning trend that their bread and butter, the PMP flagship certification, has largely stalled in 2022. We are unsure if this was attributed to them being displaced by competitors such as the Agile Alliance, their own Agile offerings, or the market’s lackluster reaction to PMBOK Guide – Seventh Edition.

      Source: projectmanagement.com as of July 2022

      The PMI’s total memberships have stalled since September 2021

      The PMIs total memberships have stalled since September 2021.

      PMI: Project Management Insitute

      The PMI’s membership appears to have a direct correlation to the PMP numbers. As the PMP number stalls, so do the PMI’s memberships.

      Source: projectmanagement.com as of July 2022

      The PMP and the PMBOK Guide are more focused on project management

      The knowledge and skills were not all that helpful for running programs, portfolios, and PMOs.
      • It became evident that other certifications were more tightly aligned to program and portfolio management for the PMOs. The PMI provides the following:
        • Program Management Professional (PgMP)
        • Portfolio Management Professional (PfMP)
      • Axelos also has certifications for program management and portfolio management, such as:
        • Managing Successful Programmes (MSP)
        • Management of Portfolios (MoP)
        • Portfolio, Programme, and Project Offices (P3O)

      The market didn’t know what to do with the PgMP or the PfMP

      These were relatively unknown certifications for Program and Portfolio Management.

      • The PMI’s story was that you would start as a project manager with the PMP certification and then the natural progression would be toward either Program Management (PgMP) or Portfolio Management (PfMP).
      • The uptake for the PgMP and the PfMP certification has been insignificant and underwhelming. The appetite and the demand for PMO-aligned certifications has been lackluster since their inception.
      PgMP - Program Management Professional and PfMP - Portfolio Management Professioanal Certifications are relatively unkown. PgMP only has 3780 members since 2007, and PfMP has 1266 since 2014.

      Source: projectmanagement.com as of July 2022

      There are other non-PMI certifications to consider

      Depending on your experience level

      List of non-PMI certifications based on specialization. List of non-PMI certifications based on years of experience.  Divided into 3 categories: 0-3 years, 3+ years, and 8+ years of experience.

      Other non-PMI project management certifications

      Non-PMI project management certifications

      PRINCE2 and CSM appear to be the more popular ones in the market.

      In April 2022, CIO.com outlined other popular project management certifications outside of the PMI.

      Source: CIO.com

      Project managers have an image problem among senior leaders

      There is a perception that PMs are just box-checkers and note-takers.

      • Project managers are seen as tactical troubleshooters rather than strategic partners. This suggests a widespread lack of understanding of the value and impact of project management at the C-suite level.
      • Very few C-suite executives associate project managers with "realizing visions," being "essential," or being "changemakers."
      • Strong strategic alignment between the PMO and the C-suite helps to reinforce the value of project management capabilities in achieving wider strategic aims.

      Source: PMI, Narrowing The Talent Gap, 2021

      Hiring practices have yet to change in response to the PMI’s moves

      The PMP is still the standard, even for organizations transitioning to Agile and PMO/portfolio jobs.

      • Savvy business leaders are still unsure about how Agile will impact them in the long term.
      • According to the Narrowing the Talent Gap report, PMI and PwC’s latest global research indicates that talent strategies haven’t changed much. There’s a widespread lack of focus on developing and retaining existing project managers, and a lack of variety and innovation in attracting and recruiting new talent. The core problem is that there isn’t a business case for investment in talent.

      Noteworthy Agile certifications to consider

      AGILE Certified Practioner(PMI-ACP) and Certified ScrumMaster(CSM) certification details.

      Source: PMI, “Agile Certifications,” and ScrumAlliance, “Become a Certified ScrumMaster.”

      Info-Tech Insight

      There is a lot of chatter about which Agile certification is better, and the jury is still out with no consensus. There are pros and cons to both certifications. We believe the PMI-ACP will give you more mileage and flexibility because of its breath of coverage in the Agile practice compared to the CSM.

      The talent shortage is a considerable risk to organizations

      • According to the PMI’s 2021 Talent Gap report1, the talent gap is likely to impact every region. By 2030, at least 13 million project managers are expected to have retired, creating additional challenges for recruitment. To close the gap, 25 million new project professionals are needed by 2030.
      • Young project managers will change the profession. Millennials and Generation Z are bringing fresh perspectives to projects. Learning to work alongside these younger generations isn't optional, as they increasingly dominate the labor force and extend their influence.
      • Millennials have already arrived: According to Pew Research2, this group surpassed Gen X in 2016 and is now the largest generation in the US labor force.

      1. PMI, Talent Gap, 2021.
      2. PM Network, 2019.

      Money talks – the PMP is still your best payoff

      It is a financially rewarding profession!

      The median salary for PMP holders in the US is 25% higher than those without PMP certification.

      On a global level, the Project Management Professional (PMP) certification has been shown to bolster salary levels. Holders of the PMP certification report higher median salaries than those without a PMP certification – 16% higher on average across the 40 countries surveyed.

      Source: PMI, Earning Power, 2021

      Determine which skills and capabilities are needed in the coming years

      • A scan of 2022 PM and PMO postings still shows continued dominance of the PMP certification requirement.
      • People and relationships have become more important than predicting budgets and timelines.
      • The PMI and PwC Global Survey on Transformation and Project Management 2021 identified the top five skills/capabilities for project managers (in order of priority):
        1. Relationship building
        2. Collaborative leadership
        3. Strategic thinking
        4. Creative problem solving
        5. Commercial awareness

      Source: PMI, Narrowing The Talent Gap, 2021.

      Prepare for product delivery by focusing on top digital-age skills

      According to the PMI Megatrends 2022 report, they have identified six areas as the top digital-age skills for product delivery:

      1. Innovative mindset
      2. Legal and regulatory compliance knowledge
      3. Security and privacy knowledge
      4. Data science skills
      5. Ability to make data-driven decisions
      6. Collaborative leadership skills

      Many organizations aren’t considering candidates who don’t have project-related qualifications. Indeed, many more are increasing the requirements for their qualifications than those who are reducing it.

      Source: PMI, Narrowing The Talent Gap, 2021

      Prioritize training and development at the C-suite level

      Currently, there is an imbalance with more emphasis of training on tools, processes, techniques, and methodologies rather than business acumen skills, collaboration, and management skills. With the explosion of remote work, training needs to be revamped and, in some cases, redesigned altogether to accommodate remote employees.

      Train of gears Labeled: Training. Gears from left to right are labeled: Knowledge, coaching, skills, developement, and experience.

      Lack of strategic prioritization is evident in how training and development is being done, with organizations largely not embracing a diversity of learning preferences and opportunities.

      Source: PMI, Narrowing The Talent Gap, 2021

      PM is evolving into a more strategic role

      • Ensure program and portfolio management roles are supported by the most appropriate certifications.
      • For project managers that have evolved beyond the iron triangle of managing projects, there is applicability to the PgMP and the PfMP for program managers, portfolio managers, and those in charge of PMOs.
      • Although these certifications have not been widely adopted due to lack of awareness and engagement at the decision-maker level, they still hold merit and prestige within the project management community.

      Project managers are evolving. No longer creatures of scope, schedule, and budget alone, they are now – enabled by new technology – focusing on influencing outcomes, building relationships, and achieving the strategic goals of their organizations.

      Source: PMI, Narrowing the Talent Gap, 2021

      Overhaul your recruitment practices to align with skills/capabilities

      World map with cartoon profile images, linked in a network.

      Talent managers will need to retool their toolbox to fill the capability gap and to look beyond where the role is geographically based by embracing flexible staffing models.

      They will need to evolve their talent strategies in line with changing business priorities.

      Organizations should be actively working to increase the diversity of candidates and upskilling young people in underrepresented communities as a priority.

      Most organizations are still relying on traditional approaches to recruit talent. Although we are prioritizing power skills and business acumen, we are still searching in the same, shrinking pool of talent.

      Source: PMI, Narrowing the Talent Gap, 2021.

      Bibliography

      “Agile Certifications for Every Step in Your Career.” PMI. Web.

      “Become a Certified ScrumMaster and Help Your Team Thrive.” ScrumAlliance. Web.

      “Become a Project Manager.” PMI. Accessed 14 Sept. 2022.

      Bucero, A. “The Next Evolution: Young Project Managers Will Change the Profession: Here's What Organizations Need to Know.” PM Network, 2019, 33(6), 26–27.

      “Certification Framework.” PMI. Accessed 14 Sept. 2022.

      “Certifications.” PMI. Accessed 14 Sept. 2022.

      DePrisco, Mike. Global Megatrends 2022. “Foreword.” PMI, 2022. Accessed 14 Sept. 2022.

      Earning Power: Project Management Salary Survey. 12th ed. PMI, 2021. Accessed 14 Sept. 2022.

      “Global Research From PMI and PwC Reveals Attributes and Strategies of the World’s Leading Project Management Offices.” PMI, 1 Mar. 2022. Press Release. Accessed 14 Sept. 2022.

      Narrowing the Talent Gap. PMI, 2021. Accessed 14 Sept. 2022.

      “PMP Certification.” PMI. Accessed 4 Aug. 2022.

      “Project Management Body of Knowledge.” Wikipedia, Wikimedia Foundation, 29 Aug. 2022.

      “Project Portfolio Management Pulse Survey 2021.” PwC. Accessed 30 Aug. 2022.

      Talent Gap: Ten-Year Employment Trends, Costs, and Global Implications. PMI. Accessed 14 Sept. 2022.

      “The Critical Path.” ProjectManagement.com. Accessed 14 Sept. 2022.

      “True Business Agility Starts Here.” PMI. Accessed 14 Sept. 2022.

      White, Sarah K. and Sharon Florentine. “Top 15 Project Management Certifications.” CIO.com, 22 Apr. 2022. Web.

      “Why You Should Get the PMP.” PMI. Accessed 14 Sept. 2022.

      Essentials of Vendor Management for Small Business

      • Buy Link or Shortcode: {j2store}229|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Each year, SMB IT organizations spend more money “outsourcing” tasks, activities, applications, functions, and other items.
      • Many SMBs lack the affordability of implementing a sophisticated vendor management initiative or office.
      • The increased spend and associated outsourcing leads to less control, and more risk for IT organizations. Managing this becomes a higher priority for IT, but many IT organizations are ill-equipped to do this proactively.

      Our Advice

      Critical Insight

      • Vendor management is not “plug and play” – each organization’s vendor management initiative (VMI) needs to fit its culture, environment, and goals. There are commonalities among vendor management initiatives, but the key is to adapt vendor management principles to fit your needs, not the other way around.
      • All vendors are not of equal importance to an organization. Internal resources are a scarce commodity and should be deployed so that they provide the best return on the organization’s investment. Classifying or segmenting your vendors allows you to focus your efforts on the most important vendors first, allowing your VMI to have the greatest impact possible.
      • Having a solid foundation is critical to the VMI’s ongoing success. Whether you will be creating a formal vendor management office or using vendor management techniques, tools, and templates “informally”, starting with the basics is essential. Make sure you understand why the VMI exists and what it hopes to achieve, what is in and out of scope for the VMI, what strengths the VMI can leverage and the obstacles it will have to address, and how it will work with other areas within your organization.

      Impact and Result

      • Build and implement a vendor management initiative tailored to your environment.
      • Create a solid foundation to sustain your vendor management initiative as it evolves and matures.
      • Leverage vendor management-specific tools and templates to manage vendors more proactively and improve communication.
      • Concentrate your vendor management resources on the right vendors.
      • Build a roadmap and project plan for your vendor management journey to ensure you reach your destination.
      • Build collaborative relationships with critical vendors.

      Essentials of Vendor Management for Small Business Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand how changes in the vendor landscape and customer reliance on vendors have made a vendor management initiative indispensible.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plan

      This phase helps you organize your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, a baseline VMI maturity level, and a desired future state for the VMI.

      • Essentials of Vendor Management for Small Business – Phase 1: Plan
      • Phase 1 Small Business Tools and Templates Compendium

      2. Build

      This phase helps you configure and create the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan.

      • Essentials of Vendor Management for Small Business – Phase 2: Build
      • Phase 2 Small Business Vendor Classification Tool
      • Phase 2 Small Business Risk Assessment Tool
      • Phase 2 Small Business Tools and Templates Compendium

      3. Run

      This phase helps you begin operating the VMI. The main outcomes from this phase are guidance and the steps required to implement your VMI.

      • Essentials of Vendor Management for Small Business – Phase 3: Run

      4. Review

      This phase helps the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      • Essentials of Vendor Management for Small Business – Phase 4: Review
      [infographic]

      Further reading

      Essentials of Vendor Management for Small Business

      Create and implement a vendor management framework to begin obtaining measurable results in 90 days.


      EXECUTIVE BRIEF

      Analyst Perspective

      Vendor Management Challenge

      Small businesses are often challenged by the growth and complexity of their vendor ecosystem, including the degree to which the vendors control them. Vendors are increasing, obtaining more and more budget dollars, while funding for staff or headcount is decreasing as a result of cloud-based applications and an increase in our reliance on Managed Service Providers. Initiating a vendor management initiative (VMI) vs. creating a fully staffed vendor management office will get you started on the path of proactively controlling your vendors instead of consistently operating in a reactionary mode. This blueprint is designed with that very thought: to assist small businesses in creating the essentials of a vendor management initiative.

      This is a picture of Steve Jeffery

      Steve Jeffery
      Principal Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Each year, IT organizations "outsource" tasks, activities, functions, and other items. During 2021:

      • Spend on as-a-service providers increased 38% over 2020.*
      • Spend on managed service providers increased 16% over 2020.*
      • IT service providers increased their merger and acquisition numbers by 47% over 2020.*

      This leads to more spend, less control, and more risk for IT organizations. Managing this becomes a higher priority for IT, but many IT organizations are ill-equipped to do this proactively.

      Common Obstacles

      As new contracts are negotiated and existing contracts are renegotiated or renewed, there is a perception that the contracts will yield certain results, output, performance, solutions, or outcomes. The hope is that these will provide a measurable expected value to IT and the organization. Oftentimes, much of the expected value is never realized. Many organizations don't have a VMI to help:

      • Ensure at least the expected value is achieved.
      • Improve on the expected value through performance management.
      • Significantly increase the expected value through a proactive VMI.

      Info-Tech's Approach

      Vendor Management is a proactive, cross-functional lifecycle. It can be broken down into four phases:

      • Plan
      • Build
      • Run
      • Review

      The Info-Tech process addresses all four phases and provides a step-by-step approach to configure and operate your VMI. The content in this blueprint helps you quickly establish your VMI and sets a solid foundation for its growth and maturity.

      Info-Tech Insight

      Vendor management is not a one-size-fits-all initiative. It must be configured:

      • For your environment, culture, and goals.
      • To leverage the strengths of your organization and personnel.
      • To focus your energy and resources on your critical vendors.

      Executive Summary

      Your challenge

      Spend on managed service providers and as-a-service providers continues to increase. In addition, IT services vendors continue to be active in the mergers and acquisitions arena. This increases the need for a VMI to help with the changing IT vendor landscape.

      38%

      2021

      16%

      2021

      47%

      2021

      Spend on as-a-service providers

      Spend on managed services providers

      IT services merger & acquisition growth (transactions)

      Source: Information Services Group, Inc., 2022.

      Executive Summary

      Common obstacles

      When organizations execute, renew, or renegotiate a contract, there is an "expected value" associated with that contract. Without a robust VMI, most of the expected value will never be realized. With a robust VMI, the realized value significantly exceeds the expected value during the contract term.

      A contract's realized value with and without a vendor management initiative

      This is an image of a bar graph showing the difference in value between those with and without a VMI, with and for those with a VMI, with Vendor Collaboration and with Vendor Performance Management. The data for those with a VMI have substantially more value.

      Source: Based on findings from Geller & Company, 2003.

      Executive Summary

      Info-Tech's approach

      A sound, cyclical approach to vendor management will help you create a VMI that meets your needs and stays in alignment with your organization as they both change (i.e. mature and grow).

      This is an image of the 4 Step Vendor Management Process. The four steps are: 1. Plan; 2. Build; 3. Run; 4. Review.

      Info-Tech's methodology for creating and operating your vmi

      Phase 1 - Plan Phase 2 - Build Phase 3 - Run Phase 4 - Review
      Phase Steps

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      Phase Outcomes This phase helps you organize your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, a baseline VMI maturity level, and a desired future state for the VMI. This phase helps you configure and create the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan. This phase helps you begin operating the VMI. The main outcomes from this phase are guidance and the steps required to implement your VMI. This phase helps the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      Insight Summary

      Insight 1

      Vendor management is not "plug and play" – each organization's vendor management initiative (VMI) needs to fit its culture, environment, and goals. While there are commonalities and leading practices associated with vendor management, your initiative won't look exactly like another organization's. The key is to adapt vendor management principles to fit your needs.

      Insight 2

      All vendors are not of equal importance to your organization. Internal resources are a scarce commodity and should be deployed so that they provide the best return on the organization's investment. Classifying or segmenting your vendors allows you to focus your efforts on the most important vendors first, allowing your VMI to have the greatest impact possible.

      Insight 3

      Having a solid foundation is critical to the VMI's ongoing success. Whether you will be creating a formal vendor management office or using vendor management techniques, tools, and templates "informally", starting with the basics is essential. Make sure you understand why the VMI exists and what it hopes to achieve, what is in and out of scope for the VMI, what strengths the VMI can leverage and the obstacles it will have to address, and how it will work with other areas within your organization.

      Blueprint benefits

      IT benefits

      • Identify and manage risk proactively.
      • Reduce costs and maximize value.
      • Increase visibility with your critical vendors.
      • Improve vendor performance.
      • Create a collaborative environment with key vendors.
      • Segment vendors to allocate resources more effectively and more efficiently.

      Business benefits

      • Improve vendor accountability.
      • Increase collaboration between departments.
      • Improve working relationships with your vendors.
      • Create a feedback loop to address vendor/customer issues before they get out of hand or are more costly to resolve.
      • Increase access to meaningful data and information regarding important vendors.

      Phase 1 - Plan

      Phase 1

      Phase 2 Phase 3 Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Organizing your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, and a desired future state for the VMI.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Procurement/Sourcing
      • IT
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 1 – Plan

      Get Organized

      Phase 1 – Plan focuses on getting organized. Foundational elements (Mission Statement, Goals, Scope, Strengths and Obstacles, Roles and Responsibilities, and Process Mapping) will help you define your VMI. These and the other elements of this Phase will follow you throughout the process of starting up your VMI and running it.

      Spending time up front to ensure that everyone is on the same page will help avoid headaches down the road. The tendency is to skimp (or even skip) on these steps to get to "the good stuff." To a certain extent, the process provided here is like building a house. You wouldn't start building your dream home without having a solid blueprint. The same is true with vendor management. Leveraging vendor management tools and techniques without the proper foundation may provide some benefit in the short term, but in the long term it will ultimately be a house of cards waiting to collapse.

      Step 1.1 – Mission statement and goals

      Identify why the VMI exists and what it will achieve

      Whether you are starting your vendor management journey or are already down the path, it is important to know why the vendor management initiative exists and what it hopes to achieve. The easiest way to document this is with a written declaration in the form of a Mission Statement and Goals. Although this is the easiest way to proceed, it is far from easy.

      The Mission Statement should identify at a high level the nature of the services provided by the VMI, who it will serve, and some of the expected outcomes or achievements. The Mission Statement should be no longer than one or two sentences.

      The complement to the Mission Statement is the list of goals for the VMI. Your goals should not be a reassertion of your Mission Statement in bullet format. At this stage it may not be possible to make them SMART (Specific, Measurable, Achievable/Attainable, Relevant, Time-Bound/Time-Based), but consider making them as SMART as possible. Without some of the SMART parameters attached, your goals are more like dreams and wishes. At a minimum, you should be able to determine the level of success achieved for each of the VMI goals.

      Although the VMI's Mission Statement will stay static over time (other than for significant changes to the VMI or organization as a whole), the goals should be reevaluated periodically using a SMART filter, and adjusted as needed.

      1.1.1 – Mission statement and goals

      20 – 40 Minutes

      1. Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the reasons why the VMI will exist.
      2. Review external mission statements for inspiration.
      3. Review internal mission statements from other areas to ensure consistency.
      4. Draft and document your Mission Statement in the Phase 1 Tools and Templates Compendium – Tab 1.1 Mission Statement and Goals.
      5. Continue brainstorming and identify the high-level goals for the VMI.
      6. Review the list of goals and make them as SMART (Specific, Measurable, Achievable/Attainable, Relevant, Time-Bound/Time-Based) as possible.
      7. Document your goals in the Phase 1 Tools and Templates Compendium– Tab 1.1 Mission Statement and Goals.
      8. Obtain signoff on the Mission Statement and goals from stakeholders and executives as required.

      Input

      • Brainstorming results
      • Mission statements from other internal and external sources

      Output

      • Completed Mission Statement and Goals

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.1 Mission Statement and Goals

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.2 – Scope

      Determine what is in scope and out of scope for the VMI

      Regardless of where your VMI resides or how it operates, it will be working with other areas within your organization. Some of the activities performed by the VMI will be new and not currently handled by other groups or individuals internally; at the same time, some of the activities performed by the VMI may be currently handled by other groups or individuals internally. In addition, executives, stakeholders, and other internal personnel may have expectations or make assumptions about the VMI. As a result, there can be a lot of confusion about what the VMI does and doesn't do, and the answers cannot always be found in the VMI's Mission Statement and Goals.

      One component of helping others understand the VMI landscape is formalizing the VMI Scope. The Scope will define boundaries for the VMI. The intent is not to fence itself off and keep others out but provide guidance on where the VMI's territory begins and ends. Ultimately, this will help clarify the VMI's roles and responsibilities, improve workflow, and reduce errant assumptions.

      When drafting your VMI scoping document, make sure you look at both sides of the equation (similar to what you would do when following best practices for a statement of work). Identify what is in scope and what is out of scope. Be specific when describing the individual components of the VMI Scope, and make sure executives and stakeholders are onboard with the final version.

      1.2.1 – Scope

      20 - 40 Minutes

      1. Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the activities and functions in scope and out of scope for the VMI.
        1. Be specific to avoid ambiguity and improve clarity.
        2. Go back and forth between in scope and out of scope as needed; it is not necessary to list all the in-scope items and then turn your attention to the out-of-scope items.
      2. Review the lists to make sure there is enough specificity. An item may be in scope or out of scope, but not both.
      3. Use the Phase 1 Tools and Templates Compendium – Tab 1.2 Scope to document the results.
      4. Obtain signoff on the Scope from stakeholders and executives as required.

      Input

      • Brainstorming results
      • Mission Statement and Goals

      Output

      • Completed list of items in and out of scope for the VMI

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.2 Scope

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.3 – Strengths and obstacles

      Pinpoint the VMI's strengths and obstacles

      A SWOT analysis (strengths, weaknesses, opportunities, and threats) is a valuable tool, but it is overkill for your VMI at this point. However, using a modified and simplified form of this tool (strengths and obstacles) will yield significant results and benefit the VMI as it grows and matures.

      Your output will be two lists: the strengths associated with the VMI and the obstacles the VMI is facing. For example, strengths could include items such as smart people working within the VMI and executive support. Obstacles could include items such as limited headcount and training required for VMI staff.

      The goals are 1) to harness the strengths to help the VMI be successful and 2) to understand the impact of the obstacles and plan accordingly. The output can also be used to enlighten executives and stakeholders about the challenges associated with their directives or requests (e.g. human bandwidth may not be sufficient to accomplish some of the vendor management activities and there is a moratorium on hiring until the next budget year).

      For each strength identified, determine how you will or can leverage it when things are going well or when the VMI is in a bind. For each obstacle, list the potential impact on the VMI (e.g. scope, growth rate, and number of vendors that can actively be part of the VMI).

      As you do your brainstorming, be as specific as possible and validate your lists with stakeholders and executives as needed.

      1.3.1 – Strengths and obstacles

      20 - 40 Minutes

      Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the VMI's strengths and obstacles.

      Be specific to avoid ambiguity and improve clarity.

      Go back and forth between strengths and obstacles as needed; it is not necessary to list all the strengths first and then all the obstacles.

      It is possible for an item to be a strength and an obstacle; when this happens, add details to distinguish the situations.

      Review the lists to make sure there is enough specificity.

      Determine how you will leverage each strength and how you will manage each obstacle.

      Use the Phase 1 Tools and Templates Compendium – Tab 1.3 Strengths and Obstacles to document the results.

      Obtain signoff on the strengths and obstacles from stakeholders and executives as required.

      Input

      • Brainstorming
      • Mission Statement and Goals
      • Scope

      Output

      • Completed list of items impacting the VMI's ability to be successful: strengths the VMI can leverage and obstacles the VMI must manage

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.3 Strengths and Obstacles

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.4 – Roles and responsibilities

      Obtain consensus on who is responsible for what

      One crucial success factor for VMIs is gaining and maintaining internal alignment. There are many moving parts to an organization, and a VMI must be clear on the various roles and responsibilities related to the relevant processes. Some of this information can be found in the VMI's Scope referenced in Step 1.2, but additional information is required to avoid stepping on each other's toes; many of the processes require internal departments to work together. (For example, obtaining requirements for a request for proposal takes more than one person or department). While it is not necessary to get too granular, it is imperative that you have a clear understanding of how the VMI activities will fit within the larger vendor management lifecycle (which is comprised of many sub processes) and who will be doing what.

      As we have learned through our workshops and guided implementations, a traditional RACI* or RASCI* Chart does not work well for this purpose. These charts are not intuitive, and they lack the specificity required to be effective. For vendor management purposes, a higher-level view and a slightly different approach provide much better results.

      This step will lead your through the creation of an OIC* Chart to determine vendor management lifecycle roles and responsibilities. Afterward, you'll be able to say, "Oh, I see clearly who is involved in each part of the process and what their role is."

      *RACI – Responsible, Accountable, Consulted, Informed

      *RASCI – Responsible, Accountable, Support, Consulted, Informed

      *OIC – Owner, Informed, Contributor

      This is an image of a table, where the row headings are: Role 1-5, and the Column Headings are: Step 1-5.

      Step 1.4 – Roles and responsibilities (cont'd)

      Obtain consensus on who is responsible for what

      To start, define the vendor management lifecycle steps or process applicable to your VMI. Next, determine who participates in the vendor management lifecycle. There is no need to get too granular – think along the lines of departments, subdepartments, divisions, agencies, or however you categorize internal operational units. Avoid naming individuals other than by title; this typically happens when a person oversees a large group (e.g. the CIO [chief information officer] or the CPO [chief procurement officer]). Be thorough, but don't let the chart get out of hand. For each role and step of the lifecycle, ask whether the entry is necessary; does it add value to the clarity of understanding the responsibilities associated with the vendor management lifecycle? Consider two examples, one for roles and one for lifecycle steps. 1) Is IT sufficient or do you need IT Operations and IT Development? 2) Is "negotiate contract documents" sufficient or do you need negotiate the contract and negotiate the renewal? The answer will depend on your culture and environment but be wary of creating a spreadsheet that requires an 85-inch monitor to view it.

      After defining the roles (departments, divisions, agencies) and the vendor management lifecycle steps or process, assign one of three letters to each box in your chart:

      • O – Owner – who owns the process; they may also contribute to it.
      • I – Informed – who is informed about the progress or results of the process.
      • C – Contributor – who contributes or works on the process; it can be tangible or intangible contributions.

      This activity can be started by the VMI or done as a group with representatives from each of the named roles. If the VMI starts the activity, the resulting chart should be validated by the each of the named roles.

      1.4.1 – Roles and responsibilities

      1 – 6 hours

      1. Meet with the participants and configure the OIC Chart in the Phase 1 Tools and Templates Compendium – Tab 1.4 OIC Chart.
        1. Review the steps or activities across the top of the chart and modify as needed.
        2. Review the roles listed along the left side of the chart and modify as needed.
      2. For each activity or step across the top of the chart, assign each role a letter – O for owner of that activity or step, I for informed, or C for contributor. Use only one letter per cell.
      3. Work your way across the chart. Every cell should have an entry or be left blank if it is not applicable.
      4. Review the results and validate that every activity or step has an O assigned to it; there must be an owner for every activity or step.
      5. Obtain signoff on the OIC Chart from stakeholders and executives as required.

      Input

      • A list of activities or steps to complete a project starting with requirements gathering and ending with ongoing risk management.
      • A list of internal areas (departments, divisions, agencies, etc.) and stakeholders that contribute to completing a project.

      Output

      • Completed OCI chart indicating roles and responsibilities for the VMI and other internal areas.

      Materials

      • Phase 1 Tools and Templates Compendium – Tab 1.4 OIC Chart

      Participants

      • VMI team
      • Procurement/Sourcing
      • IT
      • Representatives from other areas as needed
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Phase 2 - Build

      Create and configure tools, templates, and processes

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activities:

      • Configuring and creating the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Human Resources
      • Legal
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 2 – Build

      Create and configure tools, templates, and processes

      Phase 2 – Build focuses on creating and configuring the tools and templates that will help you run your VMI. Vendor management is not a plug and play environment, and unless noted otherwise, the tools and templates included with this blueprint require your input and thought. The tools and templates must work in concert with your culture, values, and goals. That will require teamwork, insights, contemplation, and deliberation.

      During this Phase you'll leverage the various templates and tools included with this blueprint and adapt them for your specific needs and use. In some instances, you'll be starting with mostly a blank slate; while in others, only a small modification may be required to make it fit your circumstances. However, it is possible that a document or spreadsheet may need heavy customization to fit your situation. As you create your VMI, use the included materials for inspiration and guidance purposes rather than as absolute dictates.

      Step 2.1 – Classification model

      Configure the COST vendor classification tool

      One of the functions of a VMI is to allocate the appropriate level of vendor management resources to each vendor since not all vendors are of equal importance to your organization. While some people may be able intuitively to sort their vendors into vendor management categories, a more objective, consistent, and reliable model works best. Info-Tech's COST model helps you assign your vendors to the appropriate vendor management category so that you can focus your vendor management resources where they will do the most good.

      COST is an acronym for Commodity, Operational, Strategic, and Tactical. Your vendors will occupy one of these vendor management categories, and each category helps you determine the nature of the resources allocated to that vendor, the characteristics of the relationship desired by the VMI, and the governance level used.

      The easiest way to think of the COST model is as a 2 x 2 matrix or graph. The model should be configured for your environment so that the criteria used for determining a vendor's classification align with what is important to you and your organization. However, at this point in your VMI's maturation, a simple approach works best. The Classification Model included with this blueprint requires minimal configuration to get your started, and that is discussed on the activity slide associated with this Step 2.1.

      This is an image of the COST Vendor Classification Tool.

      Step 2.1 – Classification model (cont'd)

      Configure the COST vendor classification tool

      Common characteristics by vendor management category

      Operational

      Strategic
      • Low to moderate risk and criticality; moderate to high spend and switching costs
      • Product or service used by more than one area
      • Price is a key negotiation point
      • Product or service is valued by the organization
      • Quality or the perception of quality is a differentiator (i.e. brand awareness)
      • Moderate to high risk and criticality; moderate to high spend and switching costs
      • Few competitors and differentiated products and services
      • Product or service significantly advances the organization's vision, mission, and success
      • Well-established in their core industry

      Commodity

      Tactical
      • Low risk and criticality; low spend and switching costs
      • Product or service is readily available from many sources
      • Market has many competitors and options
      • Relationship is transactional
      • Price is the main differentiator
      • Moderate to high risk and criticality; low to moderate spend and switching costs
      • Vendor offerings align with or support one or more strategic objectives
      • Often IT vendors "outside" of IT (i.e. controlled and paid for by other areas)
      • Often niche or new vendors

      Source: Compiled in part from Guth, Stephen. "Vendor Relationship Management Getting What You Paid for (And More)." 2015.

      2.1.1 – Classification model

      15 – 30 Minutes

      1. Meet with the participants to configure the spend ranges in Phase 2 Vendor Classification Tool – Tab 1. Configuration for your environment.
      2. Collect your vendors and their annual spend to sort by largest to lowest.
      3. Update cells F14-J14 in the Classification Model based on your actual data.
        1. Cell F14 – Set the boundary at a point between the spend for your 10th and 11th ranked vendors. For example, if the 10th vendor by spend is $1,009, 850 and the 11th vendor by spend is $980,763, the range for F14 would be $1,000,00+.
        2. Cell G14 – Set the bottom of the range at a point between the spend for your 30th and 31st ranked vendors; the top of the range will be $1 less than the bottom of the range specified in F14.
        3. Cell H14 – Set the bottom of the range slightly below the spend for your 50th ranked vendor; the top of the range will be $1 less than the bottom of the range specified in G14.
        4. Cells I14 and J14 – Divide the remaining range in half and split it between the two cells; for J14 the range will be $0 to $1 less than the bottom range in I14.
      4. Ignore the other variables at this time.

      Input

      • Phase 1 List of Vendors by Annual Spend

      Output

      • Configured Vendor Classification Tool

      Materials

      • Phase 2 Vendor Classification Tool – Tab 1. Configuration

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Vendor Classification Tool

      Step 2.2 – Risk assessment tool

      Identify risks to measure, monitor, and report on

      One of the typical drivers of a VMI is risk management. Organizations want to get a better handle on the various risks their vendors pose. Vendor risks originate from many areas: financial, performance, security, legal, and others. However, security risk is the high-profile risk, and the one organizations often focus on almost exclusively, which leaves the organization vulnerable in other areas.

      Risk management is a program, not a project; there is no completion date. A proactive approach works best and requires continual monitoring, identification, and assessment. Reacting to risks after they occur can be costly and have other detrimental effects on the organization. Any risk that adversely affects IT will adversely affect the entire organization.

      While the VMI won't necessarily be quantifying or calculating the risk directly, it generally is the aggregator of risk information across the risk categories, which it then includes in its reporting function (see Steps 2.12 and 3.8).

      At a minimum, your risk management strategy should involve:

      • Identifying the risks you want to measure and monitor.
      • Identifying your risk appetite (the amount of risk you are willing to live with).
      • Measuring, monitoring, and reporting on the applicable risks.
      • Developing and deploying a risk management plan to minimize potential risk impact.

      Vendor risk is a fact of life, but you do have options for how to handle it. Be proactive and thoughtful in your approach, and focus your resources on what is important.

      2.2.1 – Risk assessment tool

      30 - 90 Minutes

      1. Meet with the participants to configure the risk indicators in Phase 2 Vendor Risk Assessment Tool – Tab 1. Set parameters for your environment.
      2. Review the risk categories and determine which ones you will be measuring and monitoring.
      3. Review the risk indicators under each risk category and determine whether the indicator is acceptable as written, is acceptable with modifications, should be replaced, or should be deleted.
      4. Make the necessary changes to the risk indicators; these changes will cascade to each of the vendor tabs. Limit the number of risk indicators to no more than seven per risk category.
      5. Gain input and approval as needed from sponsors, stakeholders, and executives as required.

      Input

      • Scope
      • OIC Chart
      • Process Maps
      • Brainstorming

      Output

      • Configured Vendor Risk Assessment Tool

      Materials

      • Phase 2 Vendor Risk Assessment Tool – Tab 1. Set Parameters

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Vendor Classification Tool

      Step 2.3 – Scorecards and feedback

      Design a two-way feedback loop with your vendors

      A vendor management scorecard is a great tool for measuring, monitoring, and improving relationship alignment. In addition, it is perfect for improving communication between you and the vendor.

      Conceptually, a scorecard is similar to a school report card. At the end of a learning cycle, you receive feedback on how well you do in each of your classes. For vendor management, the scorecard is also used to provide periodic feedback, but there are some nuances and additional benefits and objectives when compared to a report card.

      Although scorecards can be used in a variety of ways, the focus here will be on vendor management scorecards – contract management, project management, and other types of scorecards will not be included in the materials covered in this Step 2.3 or in Step 3.4.

      This image contains a table with the score for objectives A-D. The scores are: A4, B3, C5, D4.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Anatomy

      The Info-Tech scorecard includes five areas:

      • Measurement categories. Measurement categories help organize the scorecard. Limit the number of measurement categories to three to five; this allows the parties to stay focused on what's important. Too many measurement categories make it difficult for the vendor to understand the expectations.
      • Criteria. The criteria describe what is being measured. Create criteria with sufficient detail to allow the reviewers to fully understand what is being measured and to evaluate it. Criteria can be objective or subjective. Use three to five criteria per measurement category.
      • Measurement category weights. Not all your measurement categories may be of equal importance to you; this area allows you to give greater weight to a measurement category when compiling the overall score.
      • Rating. Reviewers will be asked to assign a score to each criteria using a 1 to 5 scale.
      • Comments. A good scorecard will include a place for reviewers to provide additional information regarding the rating, or other items that are relevant to the scorecard.

      An overall score is calculated based on the rating for each criteria and the measurement category weights.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Goals and objectives

      Scorecards can be used for a variety of reasons. Some of the common ones are:

      • Improving vendor performance.
      • Conveying expectations to the vendor.
      • Identifying and recognizing top vendors.
      • Increasing alignment between the parties.
      • Improving communication with the vendor.
      • Comparing vendors across the same criteria.
      • Measuring items not included in contract metrics.
      • Identifying vendors for "strategic alliance" consideration.
      • Helping the organization achieve specific goals and objectives.

      Identifying and resolving issues before they impact performance or the relationship.

      Identifying your scorecard drivers first will help you craft a suitable scorecard.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Info-Tech recommends starting with simple scorecards to allow you and the vendors to acclimate to the new process and information. As you build your scorecards, keep in mind that internal personnel will be scoring the vendors and the vendors will be reviewing the scorecard. Make your scorecard easy for your personnel to fill out, and containing meaningful content to drive the vendor in the right direction. You can always make the scorecard more complex in the future.

      Our recommendation of five categories is provided below. Choose three to five of the categories that help you accomplish your scorecard goals and objectives:

      1. Timeliness – Responses, resolutions, fixes, submissions, completions, milestones, deliverables, invoices, etc.
      2. Cost – Total cost of ownership, value, price stability, price increases/decreases, pricing models, etc.
      3. Quality – Accuracy, completeness, mean time to failure, bugs, number of failures, etc.
      4. Personnel – Skilled, experienced, knowledgeable, certified, friendly, trustworthy, flexible, accommodating, etc.
      5. Risk – Adequate contractual protections, security breaches, lawsuits, finances, audit findings, etc.

      Some criteria may be applicable in more than one category. The categories above should cover at least 80% of the items that are important to your organization. The general criteria listed for each category is not an exhaustive list, but most things break down into time, money, quality, people, and risk issues.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Additional Considerations

      • Even a good rating system can be confusing. Make sure you provide some examples or a way for reviewers to discern the differences between a 1, 2, 3, 4, and 5. Don't assume your "rating key" will be intuitive.
      • When assigning weights, don't go lower than 10% for any measurement category. If the weight is too low, it won't be relevant enough to have an impact on the total score. If it doesn't "move the needle", don't include it.
      • Final sign-off on the scorecard template should occur outside the VMI. The heavy lifting can be done by the VMI to create it, but the scorecard is for the benefit of the organization overall, and those impacted by the vendors specifically. You may end up playing arbiter or referee, but the scorecard is not the exclusive property of the VMI. Try to reach consensus on your final template whenever possible.
      • You should notice improved ratings and total scores over time for your vendors. One explanation for this is the Pygmalion Effect: "The Pygmalion [E]ffect describes situations where someone's high expectations improves our behavior and therefore our performance in a given area. It suggests that we do better when more is expected of us."* Convey your expectations and let the vendors' competitive juices take over.
      • While creating your scorecard and materials to explain the process to internal personnel, identify those pieces that will help you explain it to your vendors during vendor orientation (see Steps 2.6 and 3.4). Leveraging pre-existing materials is a great shortcut.

      *Source: The Decision Lab, n.d.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Vendor Feedback

      After you've built your scorecard, turn your attention to the second half of the equation – feedback from the vendor. A communication loop cannot be successful without dialogue flowing both ways. While this can happen with just a scorecard, a mechanism specifically geared toward the vendor providing you with feedback improves communication, alignment, and satisfaction.

      You may be tempted to create a formal scorecard for the vendor to use; avoid that temptation until later in your maturity or development of the VMI. You'll be implementing a lot of new processes, deploying new tools and templates, and getting people to work together in new ways. Work on those things first.

      For now, implement an informal process for obtaining information from the vendor. Start by identifying information that you will find useful – information that will allow you to improve overall, to reduce waste or time, to improve processes, to identify gaps in skills. Incorporate these items into your business alignment meetings (see Steps 2.4 and 3.5). Create three to five good questions to ask the vendor and include these in the business alignment meeting agenda. The goal is to get meaningful feedback, and that starts with asking good questions.

      Keep it simple at first. When the time is right, you can build a more formal feedback form or scorecard. Don't be in a rush; as long as the informal method works, keep using it.

      2.3.1 – Scorecards and feedback

      30 – 60 Minutes

      1. Meet with the participants and brainstorm ideas for your scorecard measurement categories:
        1. What makes a vendor valuable to your organization?
        2. What differentiates a "good" vendor from a "bad" vendor?
        3. What items would you like to measure and provide feedback on to the vendor to improve performance, the relationship, risk, and other areas?
      2. Select three, but no more than five, of the following measure categories: timeliness, cost, quality, personnel, and risk.
      3. Within each measurement category, list two or three criteria that you want to measure and track for your vendors. Choose items that are as universal as possible rather than being applicable to one vendor or one vendor type.
      4. Assign a weight to each measurement category, ensuring that the total weight is 100% for all measurement categories.
      5. Document your results as you go in Phase 2 Tools and Templates Compendium – Tab 2.3 Scorecard.

      Input

      • Brainstorming

      Output

      • Configured Scorecard template

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.3 Scorecard

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      2.3.2 – Scorecards and feedback

      15 to 30 Minutes

      1. Meet with the participants and brainstorm ideas for feedback to seek from your vendors during your business alignment meetings. During the brainstorming, identify questions to ask the vendor about your organization that will:
        1. Help you improve the relationship.
        2. Help you improve your processes or performance.
        3. Help you improve ongoing communication.
        4. Help you evaluate your personnel.
      2. Identify the top five questions you want to include in your business alignment meeting agenda. (Note: you may need to refine the actual questions from the brainstorming activity before they are ready to include in your business alignment meeting agenda.)
      3. Document both your brainstorming activity and your final results in Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback. The brainstorming questions can be used in the future as your VMI matures and your feedback transforms from informal to formal. The results will be used in Steps 2.4 and 3.5.

      Input

      • Brainstorming

      Output

      • Feedback questions to include with the business alignment meeting agenda

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.4 – Business alignment meeting agenda

      Craft an agenda that meets the needs of the VMI

      A business alignment meeting (BAM) is a multi-faceted tool to ensure the customer and the vendor stay focused on what is important to the customer at a high level. BAMs are not traditional operational meetings where the parties get into the details of the contracts, deal with installation problems, address project management issues, or discuss specific cost overruns. The focus of the BAM is the scorecard (see Step 2.3), but other topics are discussed, and other purposes are served. For example:

      • You can use the BAM to develop the relationship with the vendor's leadership team so that if escalation is ever needed, your organization is more than just a name on a spreadsheet or customer list.
      • You can learn about innovations the vendor is working on (without the meeting turning into a sales call).
      • You can address high-level performance trends and request corrective action as needed.
      • You can clarify your expectations.
      • You can educate the vendor about your industry, culture, and organization.
      • You can learn more about the vendor.

      As you build your BAM Agenda, someone in your organization may say, "Oh, that's just a quarterly business review (QBR) or top-to-top meeting." In most instances, an existing QBRs or top-to-top meeting is not the same as a BAM. Using the term QBR or top-to-top meeting instead of BAM can lead to confusion internally. The VMI may say to the business unit, procurement, or another department, "We're going to start running some QBRs for our strategic vendors." The typical response is, "There's no need; we already run QBRs/top-to-top meetings with our important vendors." This may be accompanied by an invitation to join their meeting, where you may be an afterthought, have no influence, and get five minutes at the end to talk about your agenda items. Keep your BAM separate so that it meets your needs.

      Step 2.4 – Business alignment meeting agenda (cont'd)

      Craft an agenda that meets the needs of the VMI

      As previously noted, using the term BAM more accurately depicts the nature of the VMI meeting and prevents confusion internally with other meetings already occurring. In addition, hosting the BAM yourself rather than piggybacking onto another meeting ensures that the VMI's needs are met. The VMI will set and control the BAM agenda and determine the invite list for internal personnel and vendor personnel. As you may have figured out by now, having the right customer and vendor personnel attend will be essential.

      BAMs are conducted at the vendor level, not the contract level. As a result, the frequency of the BAMs will depend on the vendor's classification category (see Steps 2.1 and 3.1). General frequency guidelines are provided below, but they can be modified to meet your goals:

      • Commodity vendors – Not applicable
      • Operational vendors – Biannually or annually
      • Strategic vendors – Quarterly
      • Tactical vendors – Quarterly or biannually

      BAMs can help you achieve some additional benefits not previously mentioned:

      • Foster a collaborative relationship with the vendor.
      • Avoid erroneous assumptions by the parties.
      • Capture and provide a record of the relationship (and other items) over time.

      Step 2.4 – Business alignment meeting agenda (cont'd)

      Craft an agenda that meets the needs of the VMI

      As with any meeting, building the proper agenda will be one of the keys to an effective and efficient meeting. A high-level BAM agenda with sample topics is set out below:

      BAM Agenda

      • Opening remarks
        • Welcome and introductions
        • Review of previous minutes
      • Active discussion
        • Review of open issues
        • Scorecard and feedback
        • Current status of projects to ensure situational awareness by the vendor
        • Roadmap/strategy/future projects
        • Accomplishments
      • Closing remarks
        • Reinforce positives (good behavior, results, and performance, value added, and expectations exceeded)
        • Recap
      • Adjourn

      2.4.1 – Business alignment meeting agenda

      20 – 45 Minutes

      1. Meet with the participants and review the sample agenda in Phase 2 Tools and Templates Compendium – Tab 2.4 BAM Agenda.
      2. Using the sample agenda as inspiration and brainstorming activities as needed, create a BAM agenda tailored to your needs.
        1. Select the items from the sample agenda applicable to your situation.
        2. Add any items required based on your brainstorming.
        3. Add the feedback questions identified during Activity 2.3.2 and documented in Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback.
      3. Gain input and approval from sponsors, stakeholders, and executives as required or appropriate.
      4. Document the final BAM agenda in Phase 2 Tools and Templates Compendium –Tab 2.4 BAM Agenda.

      Input

      • Brainstorming
      • Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback

      Output

      • Configured BAM agenda

      Materials

      • Phase 2 Tools and Templates Compendium – Tab2 .4 BAM Agenda

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.5 – Relationship alignment document

      Draft a document to convey important VMI information to your vendors

      Throughout this blueprint, alignment is mentioned directly (e.g. business alignment meetings [Steps 2.4 and 3.3]) or indirectly implied. Ensuring you and your vendors are on the same page, have clear and transparent communication, and understand each other's expectations is critical to fostering strong relationships. One component of gaining and maintaining alignment with your vendors is the Relationship Alignment Document (RAD). Depending upon the Scope of your VMI and what your organization already has in place, your RAD will fill in the gaps on various topics.

      Early in the VMI's maturation, the easiest approach is to develop a short document (1 one page) or a pamphlet (i.e. the classic trifold) describing the rules of engagement when doing business with your organization. The RAD can convey expectations, policies, guidelines, and other items. The scope of the document will depend on:

      1. What you believe is important for the vendors to understand.
      2. Any other similar information already provided to the vendors.

      The first step to drafting a RAD is to identify what information vendors need to know to stay on your good side. You may want vendors to know about your gift policy (e.g. employees may not accept vendor gifts above a nominal value, such as a pen or mousepad). Next, compare your list of what vendors need to know and determine if the content is covered in other vendor-facing documents such as a vendor code of conduct or your website's vendor portal. Lastly, create your RAD to bridge the gap between what you want and what is already in place. In some instances, you may want to include items from other documents to reemphasize them with the vendor community.

      Info-Tech Insight

      The RAD can be used with all vendors regardless of classification category. It can be sent directly to the vendors or given to them during vendor orientation (see Step 3.3)

      2.5.1 – Relationship alignment document

      1 to 4 Hours

      1. Meet with the participants and review the RAD sample and checklist in Phase 2 Tools and Templates Compendium – Tab 2.5 Relationship Alignment Doc.
      2. Determine:
        1. Whether you will create one RAD for all vendors or one RAD for strategic vendors and another RAD for tactical and operational vendors; whether you will create a RAD for commodity vendors.
        2. The concepts you want to include in your RAD(s).
        3. The format for your RAD(s) – traditional, pamphlet, or other.
        4. Whether signoff or acknowledgement will be required by the vendors.
      3. Draft your RAD(s) and work with other internal areas, such as Marketing to create a consistent brand for the RADS, and Legal to ensure consistent use and preservation of trademarks or other intellectual property rights and other legal issues.
      4. Review other vendor-facing documents (e.g. supplier code of conduct, onsite safety and security protocols) for consistencies between them and the RAD(s).
      5. Obtain signoff on the RAD(s) from stakeholders, sponsors, executives, Legal, Marketing, and others as needed.

      Input

      • Brainstorming
      • Vendor-facing documents, policies, and procedures

      Output

      • Completed Relationship Alignment Document(s)

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.5 Relationship Alignment Doc

      Participants

      • VMI team
      • Marketing, as needed
      • Legal, as needed

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.6 – Vendor orientation

      Create a VMI awareness process to build bridges with your vendors

      Your organization is unique. It may have many similarities with other organizations, but your culture, risk tolerance, mission, vision, and goals, finances, employees, and "customers" (those that depend on you) make it different. The same is true of your VMI. It may have similar principles, objectives, and processes to other organizations' VMIs, but yours is still unique. As a result, your vendors may not fully understand your organization and what vendor management means to you.

      Vendor orientation is another means to helping you gain and maintain alignment with your important vendors, educate them on what is important to you, and provide closure when/if the relationship with the vendor ends. Vendor orientation is comprised of three components, each with a different function:

      • Orientation
      • Reorientation
      • Debrief

      Vendor orientation focuses on the vendor management pieces of the puzzle (e.g. the scorecard process) rather than the operational pieces (e.g. setting up a new vendor in the system to ensure invoices are processed smoothly).

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      Reorientation

      • Reorientation is either identical or similar to orientation, depending upon the circumstances. Reorientation occurs for several reasons, and each reason will impact the nature and detail of the reorientation content. Reorientation occurs whenever:
      • There is a significant change in the vendor's products or services.
      • The vendor has been through a merger, acquisition, or divestiture.
      • A significant contract renewal/renegotiation has recently occurred.
      • Sufficient time has passed from orientation; commonly 2 to 3 years.
      • The vendor has been placed in a "performance improvement plan" or "relationship improvement plan" protocol.
      • Significant turnover has occurred within your organization (executives, key stakeholders, and/or VMI personnel).
      • Substantial turnover has occurred at the vendor at the executive or account management level.
      • The vendor has changed vendor classification categories after the most current classification.
      • As the name implies, the goal is to refamiliarize the vendor with your current VMI situation, governances, protocols, and expectations. The drivers for reorientation will help you determine the reorientation's scope, scale, and frequency.

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      Debrief

      To continue the analogy from orientation, debrief is like an exit interview for an employee when their employment is terminated. In this case, debrief occurs when the vendor is no longer an active vendor with your organization - all contracts have terminated or expired, and no new business with the vendor is anticipated within the next three months.

      Similar to orientation and reorientation, debrief activities will be based on the vendor's classification category within the COST model. Strategic vendors don't go away very often; usually, they transition to operational or tactical vendors first. However, if a strategic vendor is no longer providing products or services to you, dig a little deeper into their experiences and allocate extra time for the debrief meeting.

      The debrief should provide you with feedback on the vendor's experience with your organization and their participation in your VMI. Additionally, it can provide closure for both parties since the relationship is ending. Be careful that the debrief does not turn into a finger-pointing meeting or therapy session for the vendor. It should be professional and productive; if it is going off the rails, terminate the meeting before more damage can occur.

      End the debrief on a high note if possible. Thank the vendor, highlight its key contributions, and single out any personnel who went above and beyond. You never know when you will be doing business with this vendor again – don't burn bridges!

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      As you create your vendor orientation materials, focus on the message you want to convey.

      • For orientation and reorientation:
        • What is important to you that vendors need to know?
        • What will help the vendors understand more about your organization and your VMI?
        • What and how are you different from other organizations overall, and in your "industry"?
        • What will help them understand your expectations?
        • What will help them be more successful?
        • What will help you build the relationship?
      • For debrief:
        • What information or feedback do you want to obtain?
        • What information or feedback to you want to give?

      The level of detail you provide strategic vendors during orientation and reorientation may be different from the information you provide tactical and operational vendors. Commodity vendors are not typically involved in the vendor orientation process. The orientation meetings can be conducted on a one-to-one basis for strategic vendors and a one-to-many basis for operational and tactical vendors; reorientation and debrief are best conducted on a one-to-one basis. Lastly, face-to-face or video meetings work best for vendor orientation; voice-only meetings, recorded videos, or distributing only written materials seldom hit their mark or achieve the desired results.

      Step 2.7 – Three-year roadmap

      Plot your path at a high level

      1. The VMI exists in many planes concurrently:
      2. It operates both tactically and strategically.

      It focuses on different timelines or horizons (e.g., the past, the present, and the future). Creating a three-year roadmap facilitates the VMI's ability to function effectively across these multiple landscapes.

      The VMI roadmap will be influenced by many factors. The work product from Phase 1 – Plan, input from executives, stakeholders, and internal clients, and the direction of the organization are great sources of information as you begin to build your roadmap.

      To start, identify what you would like to accomplish in year 1. This is arguably the easiest year to complete: budgets are set (or you have a good idea what the budget will look like), personnel decisions have been made, resources have been allocated, and other issues impacting the VMI are known with a higher degree of certainty than any other year. This does not mean things won't change during the first year of the VMI, but expectations are usually lower, and the short event horizon makes things more predictable during the year-1 ramp-up period.

      Years 2 and 3 are more tenuous, but the process is the same: identify what you would like to accomplish or roll out in each year. Typically, the VMI maintains the year-1 plan into subsequent years and adds to the scope or maturity. For example, you may start year 1 with BAMs and scorecards for three of your strategic vendors; during year 2, you may increase that to five vendors; and during year 3, you may increase that to nine vendors. Or, you may not conduct any market research during year 1, waiting to add it to your roadmap in year 2 or 3 as you mature.

      Breaking things down by year helps you identify what is important and the timing associated with your priorities. A conservative approach is recommended. It is easy to overcommit, but the results can be disastrous and painful.

      2.7.1 – Three-year roadmap

      45 – 90 Minutes

      1. Meet with the participants and decide how to coordinate year 1 of your three-year roadmap with your existing fiscal year or reporting year. Year 1 may be shorter or longer than a calendar year.
      2. Review the VMI activities listed in Phase 2 Tools and Templates Compendium – Tab 2.7 Three-year roadmap. Use brainstorming and your prior work product from Phase 1 and Phase 2 to identify additional items for the roadmap and add them at the bottom of the spreadsheet.
      3. Starting with the first activity, determine when that activity will begin and put an X in the corresponding column; if the activity is not applicable, leave it blank or insert N/A.
      4. Go back to the top of the list and add information as needed.
        1. For any year-1 or year-2 activities, add an X in the corresponding columns if the activity will be expanded/continued in subsequent periods (e.g., if a Year 2 activity will continue in year 3, put an X in year 3 as well).
        2. Use the comments column to provide clarifying remarks or additional insights related to your plans or "X's". For example, "Scorecards begin in year 1 with three vendors and will roll out to five vendors in year 2 and nine vendors in year 3."
      5. Obtain signoff from stakeholders, sponsors, and executives as needed.

      Input

      • Phase 1 work product
      • Steps 2.1 – 2.6 work product
      • Brainstorming

      Output

      • High level three-year roadmap for the VMI

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.7 Three-Year Roadmap

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.8 – 90-day plan

      Pave your short-term path with a series of detailed quarterly plans

      Now that you have prepared a three-year roadmap, it's time to take the most significant elements from the first year and create action plans for each three-month period. Your first 90-day plan may be longer or shorter if you want to sync to your fiscal or calendar quarters. Aligning with your fiscal year can make it easier for tracking and reporting purposes; however, the more critical item is to make sure you have a rolling series of four 90-day plans to keep you focused on the important activities and tasks throughout the year.

      The 90-day plan is a simple project plan that will help you measure, monitor, and report your progress. Use the Info-Tech tool to help you track:

      Activities.

      • Tasks comprising each activity.
      • Who will be performing the tasks.
      • An estimate of the time required per person per task.
      • An estimate of the total time to achieve the activity.
      • A due date for the activity.
      • A priority of the activity.

      The first 90-day plan will have the greatest level of detail and should be as thorough as possible; the remaining three 90-day plans will each have less detail for now. As you approach the middle of the first 90-day plan, start adding details to the next 90-day plan; toward the end of the first quarter add a high-level 90-day plan to the end of the chain. Continue repeating this cycle each quarter and consult the three-year roadmap and the leadership team, as necessary.

      2.8.1 – 90-day plan

      45 – 90 Minutes

      1. Meet with the participants and decide how to coordinate the first "90-day" plan with your existing fiscal year or reporting cycles. Your first plan may be shorter or longer than 90 days.
      2. Looking at the year-1 section of the three-year roadmap, identify the activities that will be started during the next 90 days.
      3. Using the Phase 2 Tools and Templates Compendium – Tab 2.8 90-Day Plan, enter the following information into the spreadsheet for each activity to be accomplished during the next 90 days:
        1. Activity description.
        2. Tasks required to complete the activity (be specific and descriptive).
        3. The people who will be performing each task.
        4. The estimated number of hours required to complete each task.
        5. The start date and due date for each task or the activity.
      4. Validate the tasks are a complete list for each activity and the people performing the tasks have adequate time to complete the tasks by the due date(s).
      5. Assign a priority to each Activity.

      Input

      • Three-Year Roadmap
      • Phase 1 work product
      • Steps 2.1 – 2.7 work product
      • Brainstorming

      Output

      • Detailed plan for the VMI for the next quarter or "90" days

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.8 90-Day Plan

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.9 – Quick wins

      Identify potential short-term successes to gain momentum and show value immediately

      As the final step in the timeline trilogy, you are ready to identify some quick wins for the VMI. Using the first 90-day plan and a brainstorming activity, create a list of things you can do in 15 to 30 days that add value to your initiative and build momentum.

      As you evaluate your list of potential candidates, look for things that:

      • Are achievable within the stated timeline.
      • Don't require a lot of effort.
      • Involve stopping a certain process, activity, or task; this is sometimes known as a "stop doing stupid stuff" approach.
      • Will reduce or eliminate inefficiencies; this is sometimes known as the war on waste.
      • Have a moderate to high impact or bolster the VMI's reputation.

      As you look for quick wins, you may find that everything you identify does not meet the criteria. That's okay; don't force the issue. Return your focus to the 90-day plan and three-year roadmap and update those documents if the brainstorming activity associated with Step 2.9 identified anything new.

      2.9.1 – Quick wins

      15 - 30 Minutes

      1. Meet with the participants and review the three-year roadmap and 90-day plan. Determine if any item on either document can be completed:
        1. Quickly (30 days or less).
        2. With minimal effort.
        3. To provide or show moderate to high levels of value or provide the VMI with momentum.
      2. Brainstorm to identify any other items that meet the criteria in step 1 above.
      3. Compile a comprehensive list of these items and select up to five to pursue.
      4. Document the list in the Phase 2 Tools and Templates Compendium – Tab 2.9 Quick Wins.
      5. Manage the quick wins list and share the results with the VMI team and applicable stakeholders and executives.

      Input

      • Three-Year Roadmap
      • 90-Day Plan
      • Brainstorming

      Output

      • A list of activities that require low levels of effort to achieve moderate to high levels of value in a short period

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.9 Quick Wins

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.10 – Reports

      Construct your reports to resonate with your audience

      Issuing reports is a critical piece of the VMI since the VMI is a conduit of information for the organization. It may be aggregating risk data from internal areas, conducting vendor research, compiling performance data, reviewing market intelligence, or obtaining relevant statistics, feedback, comments, facts, and figures from other sources. Holding onto this information minimizes the impact a VMI can have on the organization; however, the VMI's internal clients, stakeholders, and executives can drown in raw data and ignore it completely if it is not transformed into meaningful, easily-digested information.

      Before building a report, think about your intended audience:

      • What information are they looking for? What will help them understand the big picture?
      • What level of detail is appropriate, keeping in mind the audience may not be like-minded?
      • What items are universal to all the readers and what items are of interest to one or two readers?
      • How easy or hard will it be to collect the data? Who will be providing it, and how time consuming will it be?
      • How accurate, valid, and timely will the data be?
      • How frequently will each report need to be issued?

      Step 2.10 – Reports (cont'd)

      Construct your reports to resonate with your audience

      Use the following guidelines to create reports that will resonate with your audience:

      • Value information over data, but sometimes data does have a place in your report.
      • Use pictures, graphics, and other representations more than words, but words are often necessary in small, concise doses.
      • Segregate your report by user; for example, general information up top, CIO information below that on the right, CFO information to the left of CIO information, etc.
      • Send a draft report to the internal audience and seek feedback, keeping in mind you won't be able to cater to or please everyone.

      2.10.1 – Reports

      15 – 45 Minutes

      1. Meet with the participants and review the applicable work product from Phase 1 and Phase 2; identify qualitative and quantitative items the VMI measures, monitors, tracks, or aggregates.
      2. Determine which items will be reported and to whom (by category):
        1. Internally to personnel within the VMI.
        2. Internally to personnel outside the VMI.
        3. Externally to vendors.
      3. Within each category above, determine your intended audiences/recipients. For example, you may have a different list of recipients for a risk report than you do a scorecard summary report. This will help you identify the number of reports required.
      4. Create a draft structure for each report based on the audience and the information being conveyed. Determine the frequency of each report and person responsible for creating for each report.
      5. Document your final choices in Phase 2 Tools and Templates Compendium – Tab 2.10 Reports.

      Input

      • Brainstorming
      • Phase 1 work product
      • Steps 2.1 – 2.11 work product

      Output

      • A list of reports used by the VMI
      • For each report
        • The conceptual content
        • A list of who will receive or have access
        • A creation/distribution frequency

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.10 Reports

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Phase 3 - Run

      Implement your processes and leverage your tools and templates

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Beginning to operate the VMI. The main outcomes from this phase are guidance and the steps required to initiate your VMI.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 3 – Run

      Implement your processes and leverage your tools and templates

      All the hard work invested in Phase 1 – Plan and Phase 2 – Build begins to pay off in Phase 3 – Run. It's time to stand up your VMI and ensure that the proper level of resources is devoted to your vendors and the VMI itself. There's more hard work ahead, but the foundational elements are in place. This doesn't mean there won't be adjustments and modifications along the way, but you are ready to use the tools and templates in the real world; you are ready to begin reaping the fruits of your labor.

      Phase 3 – Run guides you through the process of collecting data, monitoring trends, issuing reports, and conducting effective meetings to:

      • Manage risk better.
      • Improve vendor performance.
      • Improve vendor relationships.
      • Identify areas where the parties can improve.
      • Improve communication between the parties.
      • Increase the value proposition with your vendors.

      Step 3.1 – Classify vendors

      Begin classifying your top 25 vendors by spend

      Step 3.1 sets the table for many of the subsequent steps in Phase 3 – Run. The results of your classification process will determine which vendors go through the scorecarding process (Step 3.2); which vendors participate in BAMs (Step 3.3), and which vendors you will devote relationship-building resources to (Step 3.6).

      As you begin classifying your vendors, Info-Tech recommends using an iterative approach initially to validate the results from the classification model you configured in Step 2.1.

      1. Identify your top 25 vendors by spend.
      2. Run your top 10 vendors by spend through the classification model and review the results.
        1. If the results are what you expected and do not contain any significant surprises, go to 3. on the next page.
        2. If the results are not what you expected or do contain significant surprises, look at the configuration page of the tool (Tab 1) and adjust the weights or the spend categories slightly. Be cautious in your evaluation of the results before modifying the configuration page - some legitimate results are unexpected, or are surprises based on bias. If you modify the weighting, review the new results and repeat your evaluation. If you modify the spend categories, review the answers on the vendor tabs to ensure that the answers are still accurate; review the new results and repeat your evaluation.

      Step 3.1 – Classify vendors (cont'd)

      Review your results and adjust the classification tool as needed

      1. Run your top 11-through-25 vendors by spend through the classification model and review the results. Identify any unexpected results. Determine if further configuration makes sense and repeat the process outlined in 2.b., previous page, as necessary. If no further modifications are required, continue to 4., below.
      2. Share the preliminary results with the leadership team, executives, and stakeholders to obtain their approval or adjustments to the results.
        1. They may have questions and want to understand the process before approving the results.
        2. They may request that you move a vendor from one quadrant to another based on your organization's roadmap, the vendor's roadmap, or other information not available to you.
      3. Identify the vendors that will be part of the VMI at this stage – how many and which ones. Based on this number and the VMI's scope (Step 1.2), make sure you have the resources necessary to accommodate the number of vendors participating in the VMI. Proceed cautiously and gradually increase the number of vendors participating in the VMI.

      Step 3.1 – Classify vendors (cont'd)

      Finalize the results and update VMI tools and templates

      1. Update the vendor inventory tool (Step 1.7) to indicate the current classification status for the top 25 vendors by spend. Once your vendors have been classified, you can sort the vendor inventory tool by classification status to see all the vendors in that category at once.
      2. Review your three-year roadmap (Step 2.9) and 90-day plans (Step 2.6) to determine if any modifications are needed to the activities and timelines.

      Additional classification considerations:

      • You should only have a few vendors that fit in the strategic category. As a rough guideline, no more than 5% to 10% of your IT vendors should end up in the strategic category. If you have many vendors, even 5% may be too many. the classification model is an objective start to the classification process, but common sense must prevail over the "math" at the end of the day.
      • At this point, there is no need to go beyond the top 25 by spend. Most VMIs starting out can't handle more than three to five strategic vendors initially. Allow the VMI to run a pilot program with a small sample size, work out any bugs, make adjustments, and then ramp up the VMI's rollout in waves. Vendors can be added quarterly, biannually, or annually, depending upon the desired goals and available resources.

      Step 3.1 – Classify vendors (cont'd)

      Align your vendor strategy to your classification results

      As your VMI matures, additional vendors will be part of the VMI. Review the table below and incorporate the applicable strategies into your deployment of vendor management principles over time. Stay true to your mission, goals, and scope, and remember that not all your vendors are of equal importance.

      Operational

      Strategic
      • Focus on spend containment
      • Concentrate on lowering total cost of ownership
      • Invest moderately in cultivating the relationship
      • Conduct BAMs biannually or annually
      • Compile scorecards quarterly or biannually
      • Identify areas for performance and cost improvement
      • Focus on value, collaboration, and alignment
      • Review market intelligence for the vendor's industry
      • Invest significantly in cultivating the relationship
      • Initiate executive-to-executive relationships
      • Conduct BAMs quarterly
      • Compile scorecards quarterly
      • Understand how the vendors view your organization

      Commodity

      Tactical
      • Investigate vendor rationalization and consolidation
      • Negotiate for the best-possible price
      • Leverage competition during negotiations
      • Streamline the purchasing and payment process
      • Allocate minimal VMI resources
      • Assign the lowest priority for vendor management metrics
      • Conduct risk assessments biannually or annually
      • Cultivate a collaborative relationship based on future growth plans or potential with the vendor
      • Conduct BAMs quarterly or biannually
      • Compile scorecards quarterly
      • Identify areas of performance improvement
      • Leverage innovation and creative problem solving

      Step 3.1 – Classify vendors (cont'd)

      Be careful when using the word "partner" with your strategic and other vendors

      For decades, vendors have used the term "partner" to refer to the relationship they have with their clients and customers. This is often an emotional ploy used by the vendors to get the upper hand. To fully understand the terms "partner" and "partnership", let's evaluate them through two more objective, less cynical lenses.

      If you were to talk to your in-house or outside legal counsel, you may be told that partners share in profits and losses, and they have a fiduciary obligation to each other. Unless there is a joint venture between the parties, you are unlikely to have a partnership with a vendor from this perspective.

      What about a "business" partnership — one that doesn't involve sharing profits and losses? What would that look like? Here are some indicators of a business partnership (or preferably a strategic alliance):

      • Trust and transparent communication exist.
      • You have input into the vendor's roadmap for products and services.
      • The vendor is aligned with your desired outcomes and helps you achieve success.
      • You and the vendor are accountable for actions and inactions, with both parties being at risk.
      • There is parity in the peer-to-peer relationships between the organizations (e.g. C-Level to C-Level).
      • The vendor provides transparency in pricing models and proactively suggests ways for you to reduce costs.
      • You and the vendor work together to make each party better, providing constructive feedback on a regular basis.
      • The vendor provides innovative suggestions for you to improve your processes, performance, the bottom line, etc.
      • Negotiations are not one-sided; they are meaningful and productive, resulting in an equitable distribution of money and risk.

      Step 3.1 – Classify vendors (cont'd)

      Understand the implications and how to leverage the words "partner" and "partnership"

      By now you might be thinking, "What's all the fuss? Why does it matter?" At Info-Tech, we've seen firsthand how referring to the vendor as a partner can have the following impact:

      • Confidences are disclosed unnecessarily.
      • Negotiation opportunities and leverage are lost.
      • Vendors no longer have to earn the customer's business.
      • Vendor accountability is missing due to shared responsibilities.
      • Competent skilled vendor resources are assigned to other accounts.
      • Value erodes over time since contracts are renewed without being competitively sourced.
      • One-sided relationships are established, and false assurances are provided at the highest levels within the customer organization.

      Proceed with caution when using partner or partnership with your vendors. Understand how your organization benefits from using these terms and mitigate the negatives outlined above by raising awareness internally to ensure people understand the psychology behind the terms. Finally, use the term to your advantage when warranted by referring to the vendor as a partner when you want or need something that the vendor is reluctant to provide. Bottom line: be strategic in how you refer to vendors and know the risks.

      Step 3.2 – Compile scorecards

      Begin scoring your top vendors

      The scorecard process typically is owned and operated by the VMI, but the actual rating of the criteria within the measurement categories is conducted by those with day-to-day interactions with the vendors, those using or impacted by the services and products provided by the vendors, and those with the skills to research other information on the scorecard (e.g. risk). Chances are one person will not be able to complete an entire scorecard by themselves. As a result, the scorecard process is a team sport comprised of sub-teams where necessary.

      The VMI will compile the scores, calculate the final results, and aggregate all the comments into one scorecard. There are two common ways to approach this task:

      1. Send out the scorecard template to those who will be scoring the vendor and ask them to return it when completed, providing them with a due date a few days before you need it; you'll need time to compile, calculate, and aggregate.
      2. Invite those who will be scoring the vendor to a meeting and let the contributors use that time to score the vendors; make VMI team members available to answer questions and facilitate the process.

      Step 3.2 – Compile scorecards (cont'd)

      Gather input from stakeholders and others impacted by the vendors

      Since multiple people will be involved in the scorecarding process or have information to contribute, the VMI will have to work with the reviewers to ensure he right mix of data is provided. For example:

      • If you are tracking lawsuits filed by or against the vendor, one person from Legal may be able to provide that, but they may not be able to evaluate any other criteria on the scorecard.
      • If you are tracking salesperson competencies, multiple people from multiple areas may have valuable insights.
      • If you are tracking deliverable timeliness, several project managers may want to contribute across several projects.

      Where one person is contributing exclusively to limited criteria, make it easy for them to identify the criteria they are to evaluate. When multiple people from the same functional area will provide insights, they can contribute individually (and the VMI will average their responses) or they can respond collectively after reaching consensus as a group.

      After the VMI has compiled, calculated, and aggregated, share the results with executives, impacted stakeholders, and others who will be attending the BAM for that vendor. Depending upon the comments provided by internal personnel, you may need to create a sanitized version of the scorecard for the vendor.

      Make sure your process timeline has a buffer built in. You'll be sending the final scorecard to the vendor three to five days before the BAM, and you'll need some time to assemble the results. The scorecarding process can be perceived as a low-priority activity for people outside of the VMI, and other "priorities" will arise for them. Without a timeline buffer, the VMI may find itself behind schedule and unprepared, due to things beyond its control.

      Step 3.3 – Conduct business alignment meetings

      Determine which vendors will participate and how long the meetings will last

      At their core, BAMs aren't that different from any other meeting. The basics of running a meeting still apply, but there are a few nuances that apply to BAMs. Set out below are leading practices for conducing your BAMs; adapt them to meet your needs and suit your environment.

      Who

      Initially, BAMs are conducted with the strategic vendors in your pilot program. Over time you'll add vendors until all your strategic vendors are meeting with you quarterly. After that, roll out the BAMs to those tactical and operational vendors located close to the strategic quadrant in the classification model (Steps 2.1 and 3.1) and as VMI resources allow. It may take several years before you are holding regular BAMs with all your strategic, tactical, and operational vendors.

      Duration

      Keep the length of your meetings reasonable. The first few with a vendor may need to be 60 to 90 minutes long. After that, you should be able to trim them to 45 minutes to 60 minutes. The BAM does not have to fill the entire time. When you are done, you are done.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Identify who will be invited and send out invitations

      Invitations

      Set up a recurring meeting whenever possible. Changes will be inevitable but keeping the timeline regular works to your advantage. Also, the vendors included in your initial BAMs won't change for twelve months. For the first BAM with a vendor, provide adequate notice; four weeks is usually sufficient, but calendars will fill up quickly for the main attendees from the vendor. Treat the meeting as significant and make sure your invitation reflects this. A simple meeting request will often be rejected, treated as optional, or ignored completely by the vendor's leadership team (and maybe yours as well!).

      Invitees

      Internal invitees should include those with a vested interest in the vendor's performance and the relationship. Other functional areas may be invited based on need or interest. Be careful the attendee list doesn't get too big. Based on this, internal BAM attendees often include representatives from IT, Sourcing/Procurement, and the applicable business units. At times, Finance and Legal are included.

      From the vendor's side, strive to have decision makers and key leaders attend. The salesperson/account manager is often included for continuity, but a director or vice president of sales will have more insights and influence. The project manager is not needed at this meeting due to the nature of the meeting and its agenda; however, a director or vice president from the product or service delivery area is a good choice. Bottom line: get as high into the vendor's organization as possible whenever possible; look at the types of contracts you have with that vendor to provide guidance on the type of people to invite.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Prepare for the Meetings and Maintain Control

      Preparation

      Send the scorecard and agenda to the vendor five days prior to the BAM. The vendor should provide you with any information you require for the meeting five days prior, as well.

      Decide who will run the meeting. Some customers like to lead, and others let the vendor present. How you craft the agenda and your preferences will dictate who runs the show.

      Make sure the vendor knows what materials they should bring to the meeting or have access to. This will relate to the agenda and any specific requests listed under the discussion points. You don't want the vendor to be caught off guard and unable to discuss a matter of importance to you.

      Running the BAM

      Regardless of which party leads, make sure you manage the agenda to stay on topic. This is your meeting – not the vendor's, not IT's, not Procurement's or Sourcing's. Don't let anyone hijack it.

      Make sure someone is taking notes. If you are running this virtually, consider recording the meeting. Check with your legal department first for any concerns, notices, or prohibitions that may impact your recording the session.

      Remember, this is not a sales call, and it is not a social activity. Innovation discussions are allowed and encouraged, but that can quickly devolve into a sales presentation. People can be friendly toward one another, but the relationship building should not overwhelm the other purposes.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Follow these additional guidelines to maximize your meetings

      More leading practices

      • Remind everyone that the conversation may include items covered by various confidentiality provisions or agreements.
      • Publish the meeting minutes on a timely basis (within 48 hours).
      • Focus on the bigger picture by looking at trends over time; get into the details only when warranted.
      • Meet internally immediately beforehand to prepare – don't go in cold. Review the agenda and the roles and responsibilities for the attendees.
      • Physical meetings are better than virtual meetings, but travel constraints, budgets, and pandemics may not allow for physical meetings.

      Final thoughts

      • When performance or the relationship is suffering, be constructive in your feedback and conversations rather than trying to assign blame; lead with the carrot rather than the stick.
      • Look for collaborative solutions whenever possible and avoid referencing the contract if possible. Communicate your willingness to help resolve outstanding issues.
      • Use inclusive language and avoid language that puts the vendor on the defensive.
      • Make sure that your meetings are not focused exclusively on the negative, but don't paint a rosy picture where one doesn't exist.
      • A vendor that is doing well should be commended. This is an important part of relationship building.

      Step 3.4 – Work the 90-day plan

      Monitor your progress and share your results

      Having a 90-day plan is a good start, but assuming the tasks on the plan will be accomplished magically or without any oversight can lead to failure. While it won't take a lot of time to work the plan, following a few basic guidelines will help ensure the 90-day plan gets results and wasn't created in vain.

      1. Measure and track your progress against the initial/current 90-day plan at least weekly; with a short timeline, any delay can have a huge impact.
      2. If adjustments are needed to any elements of the plan, understand the cause and the impact of those adjustments before making them.
      3. Make adjustments ONLY when warranted. The temptation will be to push activities and tasks further out on the timeline (or to the next 90-day plan!) when there is any sort of hiccup along the way, especially when personnel outside the VMI are involved. Hold true to the timeline whenever possible; once you start slipping, it often becomes a habit.
      4. Report on progress every week and hold people accountable for their assignments and contributions.
      5. Take the 90-day plan seriously and treat it as you would any significant project. This is part of the VMI's branding and image.

      Step 3.5 – Manage the three-year roadmap

      Keep an eye on the future since it will feed the present

      The three-year roadmap is a great planning tool, but it is not 100% reliable. There are inherent flaws and challenges. Essentially, the roadmap is a set of three "crystal balls" attempting to tell you what the future holds. The vision for year 1 may be clear, but for each subsequent year, the crystal ball becomes foggier. In addition, the timeline is constantly changing; before you know it, tomorrow becomes today and year 2 becomes year 1.

      To help navigate through the roadmap and maximize its potential, follow these principles:

      • Manage each year of the roadmap differently.
        • Review the year-1 map each quarter to update your 90-day plans (See steps 2.10 and 3.4).
        • Review the year-2 map every six months to determine if any changes are necessary. As you cycle through this, your vantage point of year 2 will be 6 months or 12 months away from the beginning of year 2, and time moves quickly.
        • Review the year-3 map annually, and determine what needs to be added, changed, or deleted. Each time you review year 3, it will be a "new" year 3 that needs to be built.
      • Analyze the impact on the proposed modifications from two perspectives: 1) What is the impact if a requested modification is made? 2) What is the impact if a requested modification is not made?
      • Validate all modifications with leadership and stakeholders before updating the three-year roadmap to ensure internal alignment.

      Step 3.6 – Develop/improve vendor relationships

      Drive better performance through better relationships

      One of the key components of a VMI is relationship management. Good relationships with your vendors provide many benefits for both parties, but they don't happen by accident. Do not assume the relationship will be good or is good merely because your organization is buying products and services from a vendor.

      In many respects, the VMI should mirror a vendor's sales organization by establishing relationships at multiple levels within the vendor organizations, not just with the salesperson or account manager. Building and maintaining relationships is hard work, but the return on investment makes it worthwhile.

      Business relationships are comprised of many components, not all of which must be present to have a great relationship. However, there are some essential components. Whether you are trying to develop, improve, or maintain a relationship with a vendor, make sure you are conscious of the following:

      • Focusing your energies on strategic vendors first and then tactical and operational vendors.
      • Being transparent and honest in your communications.
      • Continuously building trust by being responsive and honoring commitments (timely).
      • Creating a collaborative environment and build upon common ground.
      • Thanking the vendor when appropriate.
      • Resolving disputes early, avoiding the "blame game", and being objective when there are disagreements.

      Phase 4 - Review

      Keep your VMI up to date and running smoothly

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Helping the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 4 – Review

      Keep your VMI up to date and running smoothly

      As the adage says, "The only thing constant in life is change." This is particularly true for your VMI. It will continue to mature, people inside and outside of the VMI will change, resources will expand or contract from year to year, your vendor base will change. As a result, your VMI needs the equivalent of a physical every year. In place of bloodwork, x-rays, and the other paces your physician may put you through, you'll assess compliance with your policies and procedures, incorporate leading practices, leverage lessons learned, maintain internal alignment, and update governances.

      Be thorough in your actions during this Phase to get the most out of it. It requires more than the equivalent of gauging a person's health by taking their temperature, measuring their blood pressure, and determining their body mass index. Keeping your VMI up-to-date and running smoothly takes hard work.

      Some of the items presented in this Phase require an annual review; others may require quarterly review or timely review (i.e. when things are top of mind and current). For example, collecting lessons learned should happen on a timely basis rather than annually, and classifying your vendors should occur annually rather than every time a new vendor enters the fold.

      Ultimately, the goal is to improve over time and stay aligned with other areas internally. This won't happen by accident. Being proactive in the review of your VMI further reinforces the nature of the VMI itself – proactive vendor management, not reactive!

      Step 4.1 – Incorporate leading practices

      Identify and evaluate what external VMIs are doing

      The VMI's world is constantly shifting and evolving. Some changes will take place slowly, while others will occur quickly. Think about how quickly the cloud environment has changed over the past five years versus the 15 years before that; or think about issues that have popped up and instantly altered the landscape (we're looking at you COVID and ransomware). As a result, the VMI needs to keep pace, and one of the best ways to do that is to incorporate leading practices.

      At a high level, a leading practice is a way of doing something that is better at producing a particular outcome or result or performing a task or activity than other ways of proceeding. The leading practice can be based on methodologies, tools, processes, procedures, and other items. Leading practices change periodically due to innovation, new ways of thinking, research, and other factors. Consequently, a leading practice is to identify and evaluate leading practices each year.

      Step 4.1 – Incorporate leading practices (cont'd)

      Update your VMI based on your research

      • A simple approach for incorporating leading practices into your regular review process is set out below:
      • Research:
        • What other VMIs in your industry are doing.
        • What other VMIs outside your industry are doing.
        • Vendor management in general.
      • Based on your results, list specific leading practices others are doing that would improve your VMI (be specific – e.g. other VMIs are incorporating risk into their classification process).
      • Evaluate your list to determine which of these potential changes fit or could be modified to fit your culture and environment.
      • Recommend the proposed changes to leadership (with a short business case or explanation/justification, as needed) and gain approval.

      Remember: Leading practices or best practices may not be what is best for you. In some instances, you will have to modify them to fit in your culture and environment; in other instances, you will elect not to implement them at all (in any form).

      Step 4.2 – Leverage lessons learned

      Tap into the collective wisdom and experience of your team members

      There are many ways to keep your VMI running smoothly, and creating a lessons learned library is a great complement to the other ways covered in this Phase 4 - Review. By tapping into the collective wisdom of the team and creating a safe feedback loop, the VMI gains the following benefits:

      • Documented institutional wisdom and knowledge normally found only in the team members' brains.
      • The ability for one team member to gain insights and avoid mistakes without having to duplicate the events leading to the insights or mistakes.
      • Improved methodologies, tools, processes, procedures, skills, and relationships.

      Many of the processes raised in this Phase can be performed annually, but a lessons learned library works best when the information is deposited in a timely manner. How you choose to set up your lessons learned process will depend on the tools you select and your culture. You may want to have regular input meetings to share the lessons as they are being deposited, or you may require team members to deposit lessons learned on a regular basis (within a week after they happen, monthly, or quarterly). Waiting too long can lead to vague or lost memories and specifics; timeliness of the deposits is a crucial element.

      Step 4.2 – Leverage lessons learned (cont'd)

      Create a library to share valuable information across the team

      Lessons learned are not confined to identifying mistakes or dissecting bad outcomes. You want to reinforce good outcomes, as well. When an opportunity for a lessons-learned deposit arises, identify the following basic elements:

      • A brief description of the situation and outcome.
      • What went well (if anything) and why did it go well?
      • What didn't go well (if anything) and why didn't it go well?
      • What would/could you do differently next time?
      • A synopsis of the lesson(s) learned.

      Info-Tech Insights

      The lessons learned library needs to be maintained. Irrelevant material needs to be culled periodically, and older or duplicate material may need to be archived.

      the lessons learned process should be blameless. The goal is to share insightful information, not to reward or punish people based on outcomes or results.

      Step 4.3 – Maintain internal alignment

      Review the plans of other internal areas to stay in sync

      Maintaining internal alignment is essential for the ongoing success of the VMI. Over time, it is easy to lose sight of the fact that the VMI does not operate in a vacuum; it is an integral component of a larger organization whose parts must work well together to function optimally. Focusing annually on the VMI's alignment within the enterprise helps reduce any breakdowns that could derail the organization.

      To ensure internal alignment:

      • Review the key components of the applicable materials from Phase 1 - Plan and Phase 2 - Build with the appropriate members of the leadership team (e.g. executives, sponsors, and stakeholders). Not every item from those Phases and Steps needs to be reviewed but err on the side of caution for the first set of alignment discussions, and be prepared to review each item. You can gauge the audience's interest on each topic and move quickly when necessary or dive deeper when needed. Identify potential changes required to maintain alignment.
      • Review the strategic plans (e.g. 1-, 3-, and 5- year plans) for various portions of the organization if you have access to them or gather insights if you don't have access.
        • If the VMI is under the IT umbrella, review the strategic plans for IT and its departments.
        • Review the strategic plans for the areas the VMI works with (e.g. Procurement, Business Units).
        • The organization itself.
      • Create and vet a list of modifications to the VMI and obtain approval.
      • Develop a plan for making the necessary changes.

      Summary of Accomplishment

      Problem solved

      Vendor management is a broad, often overwhelming, comprehensive spectrum that encompasses many disciplines. By now, you should have a great idea of what vendor management can or will look like in your organization. Focus on the basics first: Why does the VMI exist and what does it hope to achieve? What is it's scope? What are the strengths you can leverage, and what obstacles must you manage? How will the VMI work with others? From there, the spectrum of vendor management will begin to clarify and narrow.

      Leverage the tools and templates from this blueprint and adapt them to your needs. They will help you concentrate your energies in the right areas and on the right vendors to maximize the return on your organization's investment in the VMI of time, money, personnel, and other resources. You may have to lead by example internally and with your vendors at first, but they will eventually join you on your path if you stay true to your course.

      At the heart of a good VMI is the relationship component. Don't overlook its value in helping you achieve your vendor management goals. The VMI does not operate in a vacuum, and relationships (internal and external) will be critical.

      Lastly, seek continual improvement from the VMI and from your vendors. Both parties should be held accountable, and both parties should work together to get better. Be proactive in your efforts, and you, the VMI, and the organization will be rewarded.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop

      Contact your account representative for more information

      workshops@infotech.com
      1-888-670-8889

      Related Info-Tech Research

      Prepare for Negotiations More Effectively
      Don't leave negotiation preparations and outcomes to chance. Learn how to prepare for negotiations more effectively and improve your results.

      Understand Common IT Contract Provisions to Negotiate More Effectively
      Info-Tech's guidance and insights will help you navigate the complex process of contract review and identify the key details necessary to maximize the protections for your organization.

      Capture and Market the ROI of Your VMO
      Calculating the impact or value of a vendor management office (VMO) can be difficult without the right framework and tools. Let Info-Tech's tools and templates help you account for the contributions made by your VMO.

      Bibliography

      Slide 5 – ISG Index 4Q 2021, Information Services Group, Inc., 2022.

      Slide 6 – ISG Index 4Q 2021, Information Services Group, Inc., 2022.

      Slide 7 – Geller & Company. "World-Class Procurement — Increasing Profitability and Quality." Spend Matters. 2003. Web. Accessed 4 Mar. 2019.

      Slide 26 – Guth, Stephen. The Vendor Management Office: Unleashing the Power of Strategic Sourcing. Lulu.com, 2007. Print. Protiviti. Enterprise Risk Management. Web. 16 Feb. 2017.

      Slide 34 – "Why Do We Perform Better When Someone Has High Expectations of Us?" The Decision Lab. Accessed January 31, 2022.

      Slide 56 - Top 10 Tips for Creating Compelling Reports," October 11, 2019, Design Eclectic. Accessed March 29, 2022.

      Slide 56 – "Six Tips for Making a Quality Report Appealing and Easy To Skim," Agency for Health Research and Quality. Accessed March 29, 2022.

      Slide 56 –Tucker, Davis. Marketing Reporting: Tips to Create Compelling Reports, March 28, 2020, 60 Second Marketer. Accessed March 29, 2022.

      Combine Security Risk Management Components Into One Program

      • Buy Link or Shortcode: {j2store}376|cart{/j2store}
      • member rating overall impact: 9.1/10 Overall Impact
      • member rating average dollars saved: $37,798 Average $ Saved
      • member rating average days saved: 32 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Companies are aware of the need to discuss and assess risk, but many struggle to do so in a systematic and repeatable way.
      • Rarely are security risks analyzed in a consistent manner, let alone in a systematic and repeatable method to determine project risk as well as overall organizational risk exposure.

      Our Advice

      Critical Insight

      • The best security programs are built upon defensible risk management. With an appropriate risk management program in place, you can ensure that security decisions are made strategically instead of based on frameworks and gut feelings. This will optimize any security planning and budgeting.
      • All risks can be quantified. Security, compliance, legal, or other risks can be quantified using our methodology.

      Impact and Result

      • Develop a security risk management program to create a standardized methodology for assessing and managing the risk that information systems face.
      • Build a risk governance structure that makes it clear how security risks can be escalated within the organization and who makes the final decision on certain risks.
      • Use Info-Tech’s risk assessment methodology to quantifiably evaluate the threat severity for any new or existing project or initiative.
      • Tie together all aspects of your risk management program, including your information security risk tolerance level, threat and risk assessments, and mitigation effectiveness models.

      Combine Security Risk Management Components Into One Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop and implement a security risk management program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish the risk environment

      Lay down the foundations for security risk management, including roles and responsibilities and a defined risk tolerance level.

      • Combine Security Risk Management Components Into One Program – Phase 1: Establish the Risk Environment
      • Security Risk Governance Responsibilities and RACI Template
      • Risk Tolerance Determination Tool
      • Risk Weighting Determination Tool

      2. Conduct threat and risk assessments

      Define frequency and impact rankings then assess the risk of your project.

      • Combine Security Risk Management Components Into One Program – Phase 2: Conduct Threat and Risk Assessments
      • Threat and Risk Assessment Process Template
      • Threat and Risk Assessment Tool

      3. Build the security risk register

      Catalog an inventory of individual risks to create an overall risk profile.

      • Combine Security Risk Management Components Into One Program – Phase 3: Build the Security Risk Register
      • Security Risk Register Tool

      4. Communicate the risk management program

      Communicate the risk-based conclusions and leverage these in security decision making.

      • Combine Security Risk Management Components Into One Program – Phase 4: Communicate the Risk Management Program
      • Security Risk Management Presentation Template
      • Security Risk Management Summary Template
      [infographic]

      Workshop: Combine Security Risk Management Components Into One Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Risk Environment

      The Purpose

      Build the foundation needed for a security risk management program.

      Define roles and responsibilities of the risk executive.

      Define an information security risk tolerance level.

      Key Benefits Achieved

      Clearly defined roles and responsibilities.

      Defined risk tolerance level.

      Activities

      1.1 Define the security executive function RACI chart.

      1.2 Assess business context for security risk management.

      1.3 Standardize risk terminology assumptions.

      1.4 Conduct preliminary evaluation of risk scenarios to determine your risk tolerance level.

      1.5 Decide on a custom risk factor weighting.

      1.6 Finalize the risk tolerance level.

      1.7 Begin threat and risk assessment.

      Outputs

      Defined risk executive functions

      Risk governance RACI chart

      Defined quantified risk tolerance and risk factor weightings

      2 Conduct Threat and Risk Assessments

      The Purpose

      Determine when and how to conduct threat and risk assessments (TRAs).

      Complete one or two TRAs, as time permits during the workshop.

      Key Benefits Achieved

      Developed process for how to conduct threat and risk assessments.

      Deep risk analysis for one or two IT projects/initiatives.

      Activities

      2.1 Determine when to initiate a risk assessment.

      2.2 Review appropriate data classification scheme.

      2.3 Identify system elements and perform data discovery.

      2.4 Map data types to the elements.

      2.5 Identify STRIDE threats and assess risk factors.

      2.6 Determine risk actions taking place and assign countermeasures.

      2.7 Calculate mitigated risk severity based on actions.

      2.8 If necessary, revisit risk tolerance.

      2.9 Document threat and risk assessment methodology.

      Outputs

      Define scope of system elements and data within assessment

      Mapping of data to different system elements

      Threat identification and associated risk severity

      Defined risk actions to take place in threat and risk assessment process

      3 Continue to Conduct Threat and Risk Assessments

      The Purpose

      Complete one or two TRAs, as time permits during the workshop.

      Key Benefits Achieved

      Deep risk analysis for one or two IT projects/initiatives, as time permits.

      Activities

      3.1 Continue threat and risk assessment activities.

      3.2 As time permits, one to two threat and risk assessment activities will be performed as part of the workshop.

      3.3 Review risk assessment results and compare to risk tolerance level.

      Outputs

      One to two threat and risk assessment activities performed

      Validation of the risk tolerance level

      4 Establish a Risk Register and Communicate Risk

      The Purpose

      Collect, analyze, and aggregate all individual risks into the security risk register.

      Plan for the future of risk management.

      Key Benefits Achieved

      Established risk register to provide overview of the organizational aggregate risk profile.

      Ability to communicate risk to other stakeholders as needed.

      Activities

      4.1 Begin building a risk register.

      4.2 Identify individual risks and threats that exist in the organization.

      4.3 Decide risk responses, depending on the risk level as it relates to the risk tolerance.

      4.4 If necessary, revisit risk tolerance.

      4.5 Identify which stakeholders sign off on each risk.

      4.6 Plan for the future of risk management.

      4.7 Determine how to present risk to senior management.

      Outputs

      Risk register, with an inventory of risks and a macro view of the organization’s risk

      Defined risk-based initiatives to complete

      Plan for securing and managing the risk register

      Select the Optimal Disaster Recovery Deployment Model

      • Buy Link or Shortcode: {j2store}413|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $10,247 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • DR deployment has many possibilities. It becomes overwhelming and difficult to sift through all of the options and understand what makes sense for your organization.
      • The combination of high switching costs and the pressure to move applications to cloud leaves managers overwhelmed and complacent with their current DR model.

      Our Advice

      Critical Insight

      1. Cut to the chase and evaluate the feasibility of cloud first. Gauge your organization’s current capabilities for DR in the cloud before becoming infatuated with the idea.
      2. A mixed model gives you the best of both worlds. Diversify your strategy by identifying fit for purpose and balancing the work required to maintain various models.
      3. Begin with the end in mind. Commit to mastering the selected model and leverage your vendor relationship for effective DR.

      Impact and Result

      • By efficiently eliminating models that are not suited for your organization and narrowing the scope of DR deployment possibilities, you spend more time focusing on what works rather than what doesn’t.
      • Taking a funneled approach ensures that you are not wasting time evaluating application-level considerations when organizational constraints prevent you from moving forward.
      • Comparing the total cost of ownership among candidate models helps demonstrate to the business the reason behind choosing one method over another.

      Select the Optimal Disaster Recovery Deployment Model Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build the optimal DR deployment model, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Target the relevant DR options for your organization

      Complete Phase 1 to outline your DR site requirements, review any industry or organizational constraints on your DR strategy, and zero in on relevant DR models.

      • Select the Optimal Disaster Recovery Deployment Model – Phase 1: Target Relevant DR Options for Your Organization
      • DR Decision Tree (Visio)
      • DR Decision Tree (PDF)
      • Application Assessment Tool for Cloud DR

      2. Conduct a comprehensive analysis and vet the DR vendors

      Complete Phase 2 to explore possibilities of deployment models, conduct a TCO comparison analysis, and select the best-fit model.

      • Select the Optimal Disaster Recovery Deployment Model – Phase 2: Conduct a Comprehensive Analysis and Vet the DR Vendors
      • DR Solution TCO Comparison Tool

      3. Make the case and plan your transition

      Complete Phase 3 to assess outsourcing best practices, address implementation considerations, and build an executive presentation for business stakeholders.

      • Select the Optimal Disaster Recovery Deployment Model – Phase 3: Make the Case and Plan Your Transition
      • DR Solution Executive Presentation Template
      [infographic]

      Workshop: Select the Optimal Disaster Recovery Deployment Model

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Target Relevant DR Options for Your Organization

      The Purpose

      Identify potential DR models

      Key Benefits Achieved

      Take a funneled approach and avoid getting lost among all of the DR models available

      Activities

      1.1 Define DR site requirements

      1.2 Document industry and organizational constraints

      1.3 Identify potential DR models

      Outputs

      Determine the type of site, replication, and risk mitigation initiatives required

      Rule out unfit models

      DR Decision Tree

      Application Assessment Tool for Cloud DR

      2 Conduct a Comprehensive Analysis of Appropriate Models

      The Purpose

      Explore relevant DR models

      Key Benefits Achieved

      Develop supporting evidence for the various options

      Activities

      2.1 Explore pros and cons of potential solutions

      2.2 Understand the use case for DRaaS

      2.3 Review DR model diagrams

      Outputs

      Qualitative analysis on candidate models

      Evaluate the need for DRaaS

      DR diagrams for candidate models

      3 Build the DR Solution TCO Comparison Tool

      The Purpose

      Determine best cost models

      Key Benefits Achieved

      Save money by selecting the most cost effective option to meet your DR requirements

      Activities

      3.1 Gather hardware requirements for production site

      3.2 Define capacity requirements for DR

      3.3 Compare cost across various models

      Outputs

      Populate the production summary tab in TCO tool

      Understand how much hardware will need to be on standby and how much will be procured at the time of disaster

      Find the most cost effective method

      4 Make the Case and Plan Your Transition

      The Purpose

      Build support from business stakeholders by having a clear and defendable proposal for DR

      Key Benefits Achieved

      Effective and ready DR deployment model

      Activities

      4.1 Address implementation considerations for network, capacity, and day-to-day operations

      4.2 Build presentation for business stakeholders

      Outputs

      Define implementation projects necessary for deployment and appoint staff to execute them

      PowerPoint presentation to summarize findings from the course of the project

      Cost Optimization

      • Buy Link or Shortcode: {j2store}14|cart{/j2store}
      • Related Products: {j2store}14|crosssells{/j2store}
      • Up-Sell: {j2store}14|upsells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Financial Management
      • Parent Category Link: /financial-management
      Minimize the damage of IT cost cuts

      Right-Size the Service Desk for Small Enterprise

      • Buy Link or Shortcode: {j2store}487|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk

      The service desk is a major function within IT. Small enterprises with constrained resources need to look at designing a service desk that enables consistency in supporting the business and finds the right balance of documentation.

      Determining the right level of documentation to provide backup and getting the right level of data for good reporting may seem like a waste of time when the team is small, but this is key to knowing when to invest in more people, upgraded technology, and whether your efforts to improve service are successful.

      Our Advice

      Critical Insight

      It’s easy to lose sight of the client experience when working as a small team supporting a variety of end users. Changing from a help desk to a service desk requires a focus on what it means to be a customer centric service desk and a change to the way the technicians think about providing support.

      • Make the best use of the team. Clearly define roles and responsibilities and monitor those wearing multiple hats to make sure they don’t burn out.
      • Build cross training and documentation into your culture to preserve service levels while giving team members time off to recharge.
      • Don’t discount the benefit of good tools. As volume increases, so does the likelihood of issues and requests getting missed. Look for tools that will help to keep a customer focus.

      Impact and Result

      • Improved workload distribution for technicians and enable prioritization based on work type, urgency, and impact.
      • Improved communications methods and messaging will help the technicians to set expectations appropriately and reduce friction between each other and their supported end users.
      • Best practices and use of industry standard tools will reduce administrative overhead while improving workload management.

      Right-Size the Service Desk for Small Enterprise Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Right-Size the Service Desk for Small Enterprise Storyboard – A step-by-step guide to help you identify and prioritize initiatives to become more customer centric.

      This blueprint provides a framework to quickly identify a plan for service desk improvements. It also provides references to build out additional skills and functionality as a continual improvement initiative.

      • Right-Size the Service Desk for Small Enterprise Storyboard

      2. Maturity Assessment – An assessment to determine baseline maturity.

      The maturity assessment will provide a baseline and identify areas of focus based on level of current and target maturity.

      • IT Service Desk Maturity Assessment for Small Enterprise

      3. Standard Operating Procedure – A template to build out a clear, concise SOP right-sized for a small enterprise.

      The SOP provides an excellent guide to quickly inform new team members or contractors of your support approach.

      • Incident Management and Service Desk SOP for Small Enterprise

      4. Categorization Scheme – A template to build out an effective categorization scheme.

      The categorization scheme template provides examples of asset-based categories, resolution codes and status.

      • Service Desk Asset-Based Categories Template

      5. Improvement Plan – A template to present the improvement plan to stakeholders.

      This template provides a starting point for building your communications on planned improvements.

      • Service Desk Improvement Initiative
      [infographic]

      Further reading

      Right-Size the Service Desk for Small Enterprise

      Turn your help desk into a customer-centric service desk.

      Analyst Perspective

      Small enterprises have many of the same issues as large ones, but with far fewer resources. Focus on the most important aspects to improve customer service.

      The service desk is a major function within IT. Small enterprises with constrained resources need to look at designing a service desk that enables consistency in supporting the business and finds the right balance of documentation.

      Evaluate documentation to ensure there is always redundancy built in to cover absences. Determining coverage will be an important factor, especially if vendors will be brought into the organization to assist during shortages. They will not have the same level of knowledge as teammates and may have different requirements for documentation.

      It is important to be customer centric, thinking about how services are delivered and communicated with a focus on providing self-serve at the appropriate level for your users and determining what information the business needs for expectation-setting and service level agreements, as well as communications on incidents and changes.

      And finally, don’t discount the value of good reporting. There are many reasons to document issues besides just knowing the volume of workload and may become more important as the organization evolves or grows. Stakeholder reporting, regulatory reporting, trend spotting, and staff increases are all good reasons to ensure minimum documentation standards are defined and in use.

      Photo of Sandi Conrad, Principal Research Director, Info-Tech Research Group. Sandi Conrad
      Principal Research Director
      Info-Tech Research Group

      Table of Contents

      Title Page Title Page
      Blueprint benefits 6 Incident management 25
      Start / Stop / Continue exercise 10 Prioritization scheme 27
      Complete a maturity assessment 11 Define SLAs 29
      Select an ITSM tool 13 Communications 30
      Define roles & responsibilities 15 Reporting 32
      Queue management 17 What can you do to improve? 33
      Ticket handling best practices 18 Staffing 34
      Customer satisfaction surveys 19 Knowledge base & self-serve 35
      Categorization 20 Customer service 36
      Separate ticket types 22 Ticket analysis 37
      Service requests 23 Problem management 38
      Roadmap 39

      Insight summary

      Help desk to service desk

      It’s easy to lose sight of the client experience when working as a small team supporting a variety of end users. Changing from a help desk to a service desk requires a focus on what it means to be a customer-centric service desk and a change to the way the technicians think about providing support.

      Make the best use of the team

      • Clearly define primary roles and responsibilities, and identify when and where escalations should occur.
      • Divide the work in a way that makes the most sense based on intake patterns and categories of incidents or service requests.
      • Recognize who is wearing multiple hats, and monitor to make sure they don’t burn out or struggle to keep up.
      • Determine the most appropriate areas to outsource based on work type and skills required.

      Build cross-training into your culture

      • Primary role holders need time off and need to know the day-to-day work won’t be waiting for them when they come back.
      • The knowledge base is your first line of defense to make sure incidents don’t have to wait for resolution and to avoid having technicians remote in on their day off.
      • When volumes spike for incidents and service requests, everyone needs to be prepared to pitch in. Train the team to recognize and step up to the call to action.

      Don’t discount the benefit of good tools

      • When volume increases, so does the likelihood of missing issues and requests.
      • Designate a single solution to manage the workload, so there is one place to go for work orders, incident reporting, asset data, and more.
      • Set up self-serve for users so they have access to how-to articles and can check the status of tickets themselves.
      • Create a service catalog to make it easy for them to request the most frequent items easily.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Standard Operating Procedures

      Sample of the Standard Operating Procedures deliverable.

      Maturity Assessment

      Sample of the Maturity Assessment deliverable.

      Categorization scheme

      Sample of the Categorization scheme deliverable.

      Improvement Initiative

      Sample of the Improvement Initiative deliverable.
      Create a standard operating procedure to ensure the support team has a consistent understanding of how they need to engage with the business.

      Blueprint benefits

      IT benefits

      • Improve workload distribution for technicians and enable prioritization based on work type, urgency, and impact.
      • Improved communications methods and messaging will help the technicians set expectations appropriately and reduce friction between each other and their supported end users.
      • Best practices and use of industry-standard tools will reduce administrative overhead while improving workload management.

      Business benefits

      • IT taking a customer-centric approach will improve access to support and reduce interruptions to the way they do business.
      • Expectation setting and improved communications will allow the business to better plan their work around new requests and will have a better understanding of service level agreements.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is six to ten calls over the course of three to four months.

      The current state discussion will determine the path.

      What does a typical GI on this topic look like?

      Current State & Vision

      Best Practices

      Service Requests & Incidents

      Communications

      Next Steps & Roadmap

      Call #1: Discuss current state & create a vision

      Call #2: Document roles & responsibilities

      Call #3:Review and define best practices for ticket handling Call #4: Review categorization

      Call #5: Discuss service requests & self-serve

      Call #6: Assess incident management processes
      Call #7: Assess and document reporting and metrics

      Call #8: Discuss communications methods

      Call #9: Review next steps

      Call #10: Build roadmap for updates

      For a workshop on this topic, see the blueprint Standardize the Service Desk

      Executive Brief Case Study

      Southwest CARE Center
      Logo for Southwest Care.
      INDUSTRY
      Healthcare

      Service Desk Project

      After relying on a managed service provider (MSP) for a number of years, the business hired Kevin to repatriate IT. As part of that mandate, his first strategic initiative was to build a service desk. SCC engaged Info-Tech Research Group to select and build a structure; assign roles and responsibilities; implement incident management, request fulfilment, and knowledge management processes; and integrate a recently purchased ITSM tool.

      Over the course of a four-day onsite engagement, SCC’s IT team worked with two Info-Tech analysts to create and document workflows, establish ticket handling guidelines, and review their technological requirements.

      Results

      The team developed a service desk standard operating procedure and an implementation roadmap with clear service level agreements.

      Southwest CARE Center (SCC) is a leading specialty healthcare provider in New Mexico. They offer a variety of high-quality services with a focus on compassionate, patient-centered healthcare.

      “Info-Tech helped me to successfully rebrand from an MSP help desk to an IT service desk. Sandi and Michel provided me with a customized service desk framework and SOP that quickly built trust within the organization. By not having to tweak and recalibrate my service desk processes through trial and error, I was able to save a year’s worth of work, resulting in cost savings of $30,000 to $40,000.” (Kevin Vigil, Director of Information Technology, Southwest CARE Center)

      The service desk is the cornerstone for customer satisfaction

      Bar charts comparing 'Dissatisfied' vs 'Satisfied End Users' in both 'Service Desk Effectiveness' and 'Timeliness'.
      N=63, small enterprise organizations from the End-User Satisfaction Diagnostic, at December 2021
      Dissatisfied was classified as those organizations with an average score less than 7.
      Satisfied was classified as those organizations with an average score greater or equal to 8.
      • End users who were satisfied with service desk effectiveness rated all other IT processes 36% higher than dissatisfied end users.
      • End users who were satisfied with service desk timeliness rated all other IT processes 34% higher than dissatisfied end-users.

      Improve the service desk with a Start, Stop, Continue assessment

      Use this exercise as an opportunity to discuss what’s working and what isn’t with your current help desk. Use this to define your goals for the improvement project, with a plan to return to the results and rerun the exercise on a regular basis.

      STOP

      • What service desk processes are counterproductive?
      • What service blockers exist that consistently undermine good results?
      • Are end-user relationships with individual team members negatively impacting satisfaction?
      • Make notes on initial ideas for improvement.

      START

      • What service process improvements could be implemented immediately?
      • What technical qualifications do individual staff members need to improve?
      • What opportunities exist to improve service desk communications with end users?
      • How can escalation and triage be more efficient?

      CONTINUE

      • What aspects of your current service desk are positive?
      • What processes are efficient and can be emulated elsewhere?
      • Where can you identify high levels of end-user satisfaction?

      Complete a maturity assessment to create a baseline and areas of focus

      The Service Desk Maturity Assessment tool helps organizations assess their service desk process maturity and focus the project on the activities that matter most.

      The tool will help guide improvement efforts and measure your progress.

      • The second tab of the tool walks through a qualitative assessment of your service desk practices. Questions will prompt you to evaluate how you are executing key activities. Select the answer in the drop-down menus that most closely aligns with your current state.
      • The third tab displays your rate of process completeness and maturity. You will receive a score for each phase, an overall score, and advice based on your performance.
      • Document the results of the efficiency assessment in the Service Desk Improvement Initiative.
      • The tool is intended for periodic use. Review your answers each year and devise initiatives to improve the process performance where you need it most.
      Sample of the Service Desk Maturity Assessment.

      Define your vision for the support structure

      Use this vision for communicating with the business and your IT team

      Consider service improvements and how those changes can be perceived by the organization. For example, offering multiple platforms, such as adding Macs to end-user devices, could translate to “Providing the right IT solutions for the way our employees want to work.”

      To support new platforms, you might need to look at the following steps to get there:
      • Evaluate skills needed – can you upskill generalists quickly, or will specialists be required? Determine training needs for support staff on new platforms.
      • Estimate uptake of the new platform and adjusting budgets – will these mostly be role-based decisions?
      • Determine what applications will work on the new platform and which will have a parity offering, which will require a solution like Parallels or VirtualBox, and which might need substitute applications.
      • What utilities will be needed to secure your solutions such as for encryption, antivirus, and firewalls?
      • What changes in the way you deploy and patch machines?
      • What level of support do you need to provide – just platform, or applications as well? What self-serve training can be made available?
      If you need to change the way you deploy equipment, you may want to review the blueprint Simplify Remote Deployment With Zero-Touch Provisioning

      Info-Tech Insight

      Identify some high-level opportunities and plan out how these changes will impact the way you provide support today. Document steps you’ll need to follow to make it happen. This may include new offerings and product sourcing, training, and research.

      Facilitate service desk operations with an ITSM tool

      You don’t need to spend a fortune. Many solutions are free or low-cost for a small number of users, and you don’t necessarily have to give up functionality to save money.

      Encourage users to submit requests through email or self-serve to keep organized. Ensure that reporting will provide you with the basics without effort, but ensure report creation is easy enough if you need to add more.

      Consider tools that do more than just store tickets. ITSM tools for small enterprises can also assist with:
      • Equipment and software license management
      • Self-serve for password reset and improving the experience for end users to submit tickets
      • Software deployment
      • Onboarding and offboarding workflows
      • Integration with monitoring tools
      Info-Tech Insight Buying rather than building allows you the greatest flexibility and can provide enterprise-level functionality at small-enterprise pricing. Use Info-Tech’s IT Service Management Selection Guide to create a business case and list of requirements for your ITSM purchase.
      Logo for Spiceworks.
      Logo for ZenDesk. Logo for SysAid.
      Logo for ManageEngine.
      Logo for Vector Networks.
      Logo for Freshworks.
      Logo for Squadcast.
      Logo for Jira Software.
      Logos contain links

      ITSM implementations are the perfect time to fix processes

      Consider engaging a partner for the installation and setup as they will have the expertise to troubleshoot and get you to value quickly.

      Even with a partner, don’t rely on them to set up categories, prioritizations, and workflows. If you have unique requirements, you will need to bring your design work to the table to avoid getting a “standard install” that will need to be modified later.

      When we look at what makes a strong and happy product launch, it boils down to a few key elements:
      • Improving customer service, or at least avoiding a decline
      • Improving access to information for technical team and end users
      • Successfully taking advantage of workflows, templates, and other features designed to improve the technician and user experience
      • Using existing processes with the new tools, without having to completely reengineer how things are done
      For a complete installation guide, visit the blueprint Build an ITSM Implementation Plan
      To prepare for a quick time to value in setting up the new ITSM tool, prioritize in this order:
      1. Categorization and status codes
      2. Prioritization
      3. Divide tickets into incidents and service requests
      4. Create workflows for onboarding and offboarding (automate where you can)
      5. Track escalations to vendors
      6. Reporting
      7. Self-serve
      8. Equipment inventory (leading to hardware asset management)

      Define roles looking to balance between customer service and getting things done

      The team will need to provide backfill for each other with high volume, vacations, and leave, but also need to proactively manage interruptions appropriately as they work on projects.
      Icon of a bullseye. First contact – customer service, general knowledge
      Answers phones, chats, responds to email, troubleshooting, creates knowledge articles for end users.
      Icon of a pie chart. Analyst – experienced troubleshooter, general knowledge
      Answers phone when FC isn’t available, responds to email, troubleshooting, creates knowledge articles for first contact, escalates to other technicians or vendors.
      Icon of a lightbulb. Analyst – experienced troubleshooter, specialist
      Answers phones only when necessary, troubleshooting, creates knowledge articles for anyone in IT, consults with peers, escalates to vendors.
      Icon of gear on a folder. Engineer – deep expertise, specialist
      Answers phones only when necessary, troubleshooting, creates knowledge articles for anyone in IT, consults with peers, escalates to vendors.
      Icon of a handshake. Vendor, Managed Service Providers
      Escalation point per contract terms, must meet SLAs, communicate regularly with analysts and management as appropriate. Who escalates and who manages them?
      Row of colorful people.

      Note roles in the Incident Management and Service Desk – Standard Operating Procedure Template

      Keep customers happy and technicians calm by properly managing your queue

      If ticket volume is too high or too dispersed to effectively have teams self-select tickets, assign a queue manager to review tickets throughout the day to ensure they’re assigned and on the technician’s schedule. This is particularly important for technicians who don’t regularly work out of the ticketing system. Follow up on approaching or missed SLAs.

      • Separate incidents (break fix) and service requests: Prioritize incidents over service requests to focus on getting users doing business as soon as possible. Schedule service requests for slower times or assign to technicians who are not working the front lines.
      • First in/first out…mostly: We typically look to prioritize incidents over service requests and only prioritize incidents if there are multiple people or VIPs affected. Where everything is equal, deal with the oldest first. Pause occasionally to deal with quick wins such as password resets.
      • Update ticket status and notes: Knowing what tickets are in progress and which ones are waiting on information or parts is important for anyone looking to pick up the next ticket. Make sure everyone is aware of the benefits of keeping this information up to date, so technicians know what to work on next without duplicating each other’s work.
      • Implement solutions quickly by using knowledge articles: Continue to build out the knowledge base to be able to resolve end-user issues quickly, check to see if additional information is needed before escalating tickets to other technicians.
      • Encourage end users to create tickets through the portal: Issues called in are automatically moved to the front of the queue, regardless of urgency. Make it easy for users to report issues using the portal and save the phone for urgent issues to allow appropriate prioritization of tickets.
      • Create a process to add additional resources on a regular basis to keep control of the backlog: A few extra hours once a week may be enough if the team is focused without interruptions.
      • Determine what backlog is acceptable to your users: Set that as a maximum time to resolve. Ideally, set up automated escalations for tickets that are approaching target SLAs, and build flexibility into schedules to have an “all hands on deck” option if the volume gets too high.

      Info-Tech Insight

      Make sure your queue manager has an accurate escalation list and has the authority to assign tickets and engage with the technical team to manage SLAs; otherwise, SLAs will never be consistently managed.

      Best practices for ticket handling

      Accurate data leads to good decisions. If working toward adding staff members, reducing recurring incidents, gaining access to better tools, or demonstrating value to the business, tickets will enable reporting and dashboards to manage your day-to-day business and provide reports to stakeholders.
      • Provide an easy way for end users to electronically submit tickets and encourage them to do so. This doesn’t mean you shouldn’t still accept phone calls, but that should be encouraged for time sensitive issues.
      • Create and update tickets, but not at the expense of good customer service. Agents can start the ticket but shouldn’t spend five minutes creating the ticket when they should be troubleshooting the problem.
      • Update the ticket when the issue is resolved or needs to be escalated. If agents are escalating, they should make sure all relevant information is passed along to the next technician.
      • Update user of ETA if issue cannot be resolved quickly.
      • Update categories to reflect the actual issue and resolution.
      • Reference or link to the knowledge base article as the documented steps taken to resolve the incident.
      • Validate incident is resolved with client. Automate this process with ticket closure after a certain time.
      • Close or resolve the ticket on time.
      Ticket templates (or quick tickets) for common incidents can lead to fast creation, data input, and categorizations. Templates can reduce the time it takes to create tickets from two minutes to 30 seconds.
      Sample ticket template.

      Create a right-sized self-service portal

      Review tickets and talk to the team to find out the most frequent requests and the most frequent incidents that could be solved by the end user if there were clear instructions. Check with your user community to see what they would like to see in the portal.

      A portal is only as attractive as it is useful. Enabling ticket creation and review is the bare minimum and may not entice users to the portal if email is just as easy to use for ticket creation.

      Consider opening the portal to groups other than IT. HR, finance, and others may have information they want to share or forms to fill in or download where an employee portal rather than an IT portal could be helpful. Work with other departments to see if they would find value. Make sure your solution is easy to use when adding content. Low-code options are useful for this.

      Portals could be built in the ITSM solution or SharePoint/Teams and should include:

      • Easy ways to create and see status on all tickets
      • Manuals, how-to articles, links to training
      • Answers to common questions, could be a wiki or Q&A for users to help each other as well as IT
      • Could have a chatbot to help people find documents or to create a ticket

      Info-Tech Insight

      Consider using video capture software to create short how-to videos for common questions. Vendors such as TechSmith Snagit , Vimeo Screen Recorder, Screencast-O-Matic Video Recording, and Movavi Screen Recording may be quick and easy to learn.

      49%

      49% of employees have trouble finding information at work

      35%

      Employees can cut time spent looking for information by 35% with quality intranet

      (Source: Liferay)

      Use customer satisfaction surveys to monitor service levels

      Transactional surveys are tied to specific interactions and provide a means of communication to help users communicate satisfaction or dissatisfaction with single interactions.
      • Keep it simple: One question to rate the service with opportunity to add a comment is enough to understand the sentiment and potential issues, and it will be more likely that the user will fill it out.
      • Follow up: Feedback will only be provided if customers think it’s being read and actioned. Set an alert to receive notification of any negative feedback and follow up within one or two business days to show you’re listening.

      A simple customer feedback form with smiley face scale.

      Relationship surveys can be run annually to obtain feedback on the overall customer experience.

      Inform yourself of how well you are doing or where you need improvement in the broad services provided.

      Provide a high-level perspective on the relationship between the business and IT.

      Help with strategic improvement decisions.

      Should be sent over a duration of time and to the entire customer base after they’ve had time to experience all the services provided by the service desk. This can be done on an annual basis.

      For example: Info-Tech’s End User Satisfaction Diagnostic. Included in your membership.

      Keep categorizations simple

      Asset categorization provides reports that are straightforward and useful for IT and that are typically used where the business isn’t demanding complex reports.

      Too many options can cause confusion; too few options provide little value. Try to avoid using “miscellaneous” – it’s not useful information. Test your tickets against your new scheme to make sure it works for you. Effective classification schemes are concise, easy to use correctly, and easy to maintain.

      Build out the categories with these questions:
      • What kind of asset am I working on? (type)
      • What general asset group am I working on? (category)
      • What particular asset am I working on? (sub-category)

      Create resolution codes to further modify the data for deeper reporting. This is typically a separate field, as you could use the same code for many categories. Keep it simple, but make sure it’s descriptive enough to understand the type of work happening in IT.

      Create and define simple status fields to quickly review tickets and know what needs to be actioned. Don’t stop the clock for any status changes unless you’re waiting on users. The elapsed time is important to measure from a customer satisfaction perspective.

      Info-Tech Insight

      Think about how you will use the data to determine which components need to be included in reports. If components won’t be used for reporting, routing, or warranty, reporting down to the component level adds little value.

      Example table of categorizations.


      Need to make quick progress? Use Info-Tech Research Group’s Service Desk Asset-Based Categories template.

      1.1 Build or review your categories

      1-3 hours

      Input: Existing tickets

      Output: Categorization scheme

      Materials: Whiteboard/Flip charts, Markers, Sample categorization scheme

      Participants: CIO, Service desk manager, Technicians

      Discuss:

      • How can you use categories and resolution information to enhance reporting?
      • What level of detail do you need to be able to understand the data and take action? What level of detail is too much?
      • Are current status fields allowing you to accurately assess pending work at a glance?

      Draft:

      1. Start with existing categories and review, identifying duplicates and areas of inconsistency.
      2. Write out proposed resolution codes and status fields and critically assess their value.
      3. Test categories and resolution codes against a few recent tickets.
      4. Record the ticket categorization scheme in the Incident Management and Service Desk – Standard Operating Procedure.

      Download the Incident Management and Service Desk – Standard Operating Procedure Template

      Separate tickets into service requests and incidents

      Tickets should be separated into different ticket types to be able to see briefly what needs to be prioritized. This may seem like a non-issue if you have a small team, but if you ever need to report how quickly you’re solving break-fix issues or whether you’re doing root cause analysis, this will save on future efforts. Separating ticket types may make it easier to route tickets automatically or to a new provider in the future.

      INCIDENTS

      SERVICE REQUESTS

      Icon of a bullseye.

      PRIORITIZATION

      Incidents will be prioritized based on urgency and impact to the organization. Service requests will be scheduled and only increase in prioritization if there is an issue with the request process (e.g. new hire start).
      Icon of a handshake.

      SLAs

      Did incidents get resolved according to prioritization rules? REPONSE & RESOLUTION Did service requests get completed on time? SCHEDULING & FULFILMENT
      Icon of a lightbulb.

      TRIAGE & ROOT CAUSE ANALYSIS

      Incidents will typically need triage at the service desk unless something is set up to go directly to a specialist. Service requests don’t need triage and can be routed automatically for approvals and fulfillment.

      “For me, the first key question is, is this keeping you from doing business? Is this a service request? Is it actually something that's broken? Well, okay. Now let's have the conversation about what's broken and keeping you from doing business.” (Anonymous CIO)

      Determine how service requests will be fulfilled

      Process steps for service requests: 'Request, Approve, Schedule, Fulfill, Notify requester, Close ticket'.

      • Identify standard requests, meaning any product approved for use and deployment in the organization.
      • Determine whether this should be published and how. Consider a service catalog with the ability to create tickets right from the request page. If there is an opportunity to automate fulfillment, build that into your workflow and project plans.
      • Create workflows for complicated requests such as onboarding, and build them into a template in the service desk tool. This will allow you to reduce the administrative work to deploy tasks.
      • Who will fulfill requests? There may be a need for more than one technician to be able to fulfill if volume dictates, but it’s important to determine what will be done by each level to quickly assign those tickets for scheduling. Define what will be done by each group of technicians.
      • Determine reasonable SLAs for most service requests. Identify which ones will not meet “normal” SLAs. As you build out a service catalog or automate fulfillment, SLAs can be refined.

      Info-Tech Insight

      Service requests are not as urgent as incidents and should be scheduled.

      Set the SLA based on time to fulfill, plus a buffer to schedule around more urgent service requests.

      1.2 Identify service requests and routing needs

      2-3 hours

      Input: Ticket data, Existing workflow diagrams

      Output: Workflow diagrams

      Materials: Whiteboard/Flip charts, Markers, Visio

      Participants: CIO, Service desk manager, Technicians

      Identify:

      1. Create your list of typical service requests and identify the best person to fulfill, based on complexity, documentation, specialty, access rights.
      2. Review service requests which include multiple people or departments, such as onboarding and offboarding
      3. Draw existing processes.
      4. Discuss challenges and critique existing process.
      5. Document proposed changes and steps that will need to be taken to improve the process.

      Download the Incident Management and Service Desk – Standard Operating Procedure Template

      Incident management

      Critical incidents and normal incidents

      Even with a small team, it’s important to define a priority for response and resolution time for SLA and uptime reporting and extracting insights for continual improvement efforts.

      • Mission-critical systems or problems that affect many people should always come first (i.e. Severity Level 1).
      • The bulk of reported problems, however, are often individual problems with desktop PCs (i.e. Severity Level 3 or 4).
      • Some questions to consider when deciding on problem severity include:
        • How is productivity affected?
        • How many users are affected?
        • How many systems are affected?
        • How critical are the affected systems to the organization?
      • Decide how many severity levels the organization needs the service desk to have. Four levels of severity is ideal for most organizations.
      Go to incident management for SE

      Super-specialization of knowledge is also a common factor in smaller teams and is caused by complex architectures. While helpful, if that knowledge isn’t documented, it can walk out the door with the resource and the rest of the team is left scrambling.

      Lessons learned may be gathered for critical incidents but often are not propagated, which impacts the ability to solve recurring incidents.

      Over time, repeated incidents can have a negative impact on the customer’s perception that the service desk is a credible and essential service to the business.

      Cover image for 'Incident Management for Small Enterprise'.
      Click picture for a link to the blueprint

      1.3 Activity: Identify critical systems

      1 hour

      Input: Ticket data, Business continuity plan

      Output: Service desk SOP

      Materials: Whiteboard/Flip charts, Markers

      Participants: CIO, Service desk manager, Technicians

      Discuss and document:

      1. Create a list of the most critical systems, and identify and document the escalation path.
      2. Review inventory of support documents for critical systems and identify any that require runbooks to ensure quick resolution in the event of an outage or major performance issue. Refer to the blueprint Incident Management for Small Enterprise to prioritize and document runbooks as needed.
      3. Review vendor agreements to determine if SLAs are appropriate to support needs. If there is a need for adjustments, determine options for modifying or renegotiating SLAs.

      Download the Incident Runbook Prioritization Tool

      Prioritization scheme

      Keep the priority scheme simple and meaningful, using this framework to communicate and report to stakeholders and set SLAs for response and resolution.
      1. Focus primarily on incidents. Service requests should always be medium urgency, unless there is a valid reason to move one to high level.
      2. Separate major outages from all other tickets as these are a major factor in business impact.
      3. Decide how many levels of severity are appropriate for your organization.
      4. Build a prioritization matrix, breaking down priority levels by impact and urgency.
      5. Build out the definitions of “impact” and “urgency” to complete the prioritization matrix.
      6. Run through examples of each priority level to make sure everyone is on the same page.
      A matrix of prioritization with rows as levels of 'IMPACT' and columns as levels of 'URGENCY'. Ratings range from 'Critical' at 'Extensive/Critical' to 'Low' at 'Low Impact/Low'.

      Document escalation rules and contacts

      Depending on the size of the team, escalations may be mostly to internal technical colleagues or could be primarily to vendors.

      • Ensure the list of escalation rules and contacts is accurate and available, adding expected SLAs for quick reference
      • If tickets are being escalated but shouldn’t be, ensure knowledge articles and training materials are up to date
      • Follow up on all external escalations, ensuring SLAs are respected
      • Publish an escalation path for clients if service is not meeting their needs (for internal and external providers) and automate escalations for tickets breaching SLAs
      Escalation rules strung together.
      User doesn’t know who will fix the issue but expects to see it done in a reasonable time. If issue cannot be resolved right away, set expectations for resolution time.
      • Document information so next technician doesn’t need to ask the same questions.
      • Escalate to the right technician the first time.
      • Check notes to catch up on the issue.
      • Run tests if necessary.
      • Contact user to troubleshoot and fix.
      • Meet SLAs or update client on new ETA.
      • Provide complete information to vendor.
      • Monitor resolution.
      • Follow up with vendor if delays.
      • Update client as needed.
      • Vendor will provide support according to agreement.
      • Encourage vendor to provide regular updates to IT.
      • Review vendor performance regularly.
      • IT will validate issue is resolved and close ticket.
      Validate user is happy with the experience

      Define, measure, and report on service level agreements

      Improving communications is the most effective way to improve customer service
      1. Set goals for time to respond and time to resolve for different incident levels, communicate to the technical team, and test ability to meet these goals.
      2. Set goals for time to fulfil for most service requests, document exceptions (e.g. onboarding).
      3. Create reports to measure against goals and determine what information will be most effective for reporting to the business.
      4. Management: Communicate expectations to the business leaders and end users.
      5. Management: Set regular cadence to meet with stakeholders to discuss expectations and review relevant metrics.
      6. Management: Determine how metrics will be tracked and reviewed to manage technical partners.
      Keep messaging simple
      • Be prepared with detailed reporting if needed, but focus on a few key metrics to inform stakeholders of progress against goals.
      • Use trending to tell a story, especially when presenting success stories.
      • Use appropriate media for each type of message. For example: SLAs can be listed on automated ticket responses or in a banner on the portal.

      Determine what communications are most important and who will do them

      Icon of a bperson ascending a staircase.

      PROACTIVE, PLANNED CHANGES

      From: Service Desk

      Messaging provided by engineer or director, sent to all employees; proactive planning with business unit leaders.

      Icon of a bullseye.

      OUTAGES & UPDATES

      From: Service Desk

      Use templates to send out concise messaging and updates hourly, with input from technical team working on restoring services to all; director to liaise with business stakeholders.

      Icon of a lightbulb.

      UPDATES TO SERVICES, SELF-SERVE

      From: Director

      Send announcements no more than monthly about new services and processes.

      Icon of a handshake.

      REGULAR STAKEHOLDER COMMUNICATIONS

      From: Director

      Monthly reporting to business and IT stakeholders on strategic and project goals, manage escalations.

      1.4 Create communications plan

      2 hours

      Input: Sample past communications

      Output: Communications templates

      Materials: Whiteboard/flip charts, Markers

      Participants: CIO, Service desk manager, Technicians

      Determine where templates are needed to ensure quick and consistent communications. Review sample templates and modify to suit your needs:

      1. Proactive, planned changes
      2. Outages and updates
      3. Updates to services, self-serve
      4. Regular stakeholder communications

      Download the communications templates

      Create reports that are useful and actionable

      Reporting serves two purposes:

      1. Accountability to stakeholders
      2. Identification of items that need action

      To determine what reports are needed, ask yourself:

      • What are your goals?
      • What story are you trying to tell?
      • What do you need to manage day to day?
      • What do you need to report to get funding?
      • What do you need to report to your stakeholders for service updates?

      Determine which metrics will be most useful to suit your strategic and operational goals

      STRATEGIC GOAL (stakeholders): Improve customer service evidenced by:

      TIME

      • Aged backlog
      • Service requests solved within SLA (could also look for quick ones, e.g. tickets solved in one day, % solved within one hour)
      • Volume of incidents and time to solve each type
      • Critical incidents solved in 4 hours
      • Incidents solved same day

      QUALITY

      • Percentage of tickets solved at first contact
      • SLAs missed
      • Percentage of services available to request through catalog
      • Percentage of tickets created through portal (speaks to quality of experience)
      • Customer satisfaction survey results – transactional and annual

      RESOURCES

      • Knowledge articles used by technicians
      • Knowledge articles used by end users
      • Tickets resolved at each technician level (volume)
      • Non-standard requests evaluated and fulfilled by volume & time served
      • Volume of recurring incidents
      OPERATIONAL GOALS: Report to director & technicians

      What else can you do to improve service?

      Review the next few pages to see if you need additional blueprints to help you:
      • Evaluate staffing and training needs to ensure the right number of resources are available and they have the skills they need for your environment.
      • Create self-service for end users to get quick answers and create tickets.
      • Create a knowledge base to ensure backup for technical expertise.
      • Develop customer service skills through training.
      • Perform ticket analysis to better understand your technical environment.

      Be agile in your approach to service

      It’s easy for small teams to get overwhelmed when covering for vacations, illness, or leave. Determine where priorities may be adjusted during busy or short-staffed times.

      • Have a plan to cross-train technicians and create comprehensive knowledge articles for coverage during vacations and unexpected absences.
      • Know where it makes sense to bring in vendors, such as for managed print services, or to cover for extended absences.
      • Look for opportunities to automate functions or reduce administrative overhead through workflows.
      • Identify any risks and determine how to mitigate, such as managing or changing administrative passwords.
      • Create self-serve to enable ticket creation and self-solve for those users who wish to use it.

      Staff the service desk to meet demand

      • With increasing complexity of support and demand on service desks, staff are often left feeling overwhelmed and struggling to keep up with ticket volume, resulting in long resolution times and frustrated end users.
      • However, it’s not as simple as hiring more staff to keep up with ticket volume. IT managers must have the data to support their case for increasing resources or even maintaining their current resources in an environment where many executives are looking to reduce headcount.
      • Without changing resources to match demand, IT managers will need to determine how to maximize the use of their resources to deliver better service.

      Cover image for 'Staff the Service Desk to Meet Demand'.
      Click picture for a link to the blueprint

      Create and manage a knowledge base

      With a small team, it may seem redundant to create a knowledge base, but without key system and process workflows and runbooks, an organization is still at risk of bottlenecks and knowledge failure.

      • Use a knowledge base to document pre-escalation troubleshooting steps, known errors and workarounds, and runbook solutions.
      • Where incidents may have many root causes, document which are the most frequent solutions and where variations are typically used.
      • Start with an inventory of personal documents, compare and consolidate into the knowledge base, and ensure they are accurate and up to date.
      • Assign someone to review articles on a regular basis and flag for editing and archiving as the technical environment changes.
      • Supplement with vendor-provided or purchased content. Two options for purchased content include RightAnswers or Netformx.

      Info-Tech Insight

      Appeal to a broad audience. Use non-technical language whenever possible to help less technical readers. Identify error messages and use screenshots where it makes sense. Take advantage of social features like voting buttons to increase use.

      Optimize the service desk with a shift-left strategy

      • “Shift left” is a strategy which moves appropriate technical work to users through knowledge articles, automation and service catalogs, freeing up time for technicians to work on more complex issues.
      • Many organizations have built a great knowledge base but fail to see the value of it over time as it becomes overburdened with overlapping and out-of-date information. Knowledge capture, updating, and review must be embedded into your processes if you want to keep the knowledge base useful.
      • Similarly, the self-service portal is often deployed out of the box with little input from end users and fails to deliver its intended benefits. The portal needs to be designed from the end user’s point of view with the goal of self-resolution if it will serve its purpose of deflecting tickets.

      Cover image for 'Optimize the Service Desk With a Shift-Left Strategy'.
      Click picture for a link to the blueprint

      Customer service isn’t just about friendliness

      Your team will all need to deal with end users at some point, and that may occur in times of high stress. Ensure the team has the skills they need to actively listen, stay positive, and de-escalate.

      Info-Tech’s customer service program is a modular approach to improve skills one area at a time. Delivering good customer service means being effective in these areas:
      • Customer focus – Focus on the customer and use a positive, caring, and helpful attitude.
      • Listening and verbal communication skills – Demonstrate empathy and patience, actively listen, and speak in user-friendly ways to help get your point across.
      • Written communication skills – Use appropriate tone, language, and terms in writing (whether via chat, email, or other).
      • Manage difficult situations – Remain calm and in control when dealing with difficult customers and situations.
      • Go the extra mile – Go beyond simply resolving the request to make each interaction positive and memorable.

      Deliver a customer service training program to your IT department

      • There’s a common misconception that customer service skills can’t be taught, so no effort is made to improve those skills.
      • Even when there is a desire to improve customer service, it’s hard for IT teams to make time for training and improvement when they’re too busy trying to keep up with tickets.
      • A talented service desk agent with both great technical and customer service skills doesn’t have to be a rare unicorn, and an agent without innate customer service skills isn’t a lost cause. Relevant and impactful customer service habits, techniques, and skills can be taught through practical, role-based training.
      • IT leaders can make time for this training through targeted, short modules along with continual on-the-job coaching and development.

      Cover image for 'Deliver Customer Service Training Program to Your IT Department'.
      Click picture for a link to the blueprint

      Improve your ticket analysis

      Once you’ve got great data coming into the ticketing system, it’s important to rethink your metrics and determine if there are more insights to be found.

      Analyzing ticket data involves:
      • Collecting ticket data and keeping it clean. Based on the metrics you’re analyzing, define ticket expectations and keep the data up to date.
      • Showing the value of the service desk. SLAs are meaningless if they are not met consistently. The prerequisite to implementing proper SLAs is fully understanding the proper workload of the service desk.
      • Understanding – and improving – the user experience. You cannot improve the user experience without meaningful metrics that allow you to understand the user experience. Different user groups will have different needs and different expectations of the level of service. Your metrics should reflect those needs and expectations.

      Analyze your service desk ticket data

      Properly analyzing ticket data is challenging for the following reasons:
      • Poor ticket hygiene and unclear ticket handling
      • Service desk personnel are not sure where to start with analysis
      • Too many metrics are tracked to parse actionable data from the noise
      Ticket data won’t give you a silver bullet, but it can help point you in the right direction.

      Cover image for 'Analyze Your Service Desk Ticket Data'.
      Click picture for a link to the blueprint

      Start doing problem management

      Proactively focusing on root cause analysis will reduce the most disruptive incidents to the organization.

      • A focus on elimination of critical incidents and the more disruptive recurring incidents will reduce future workloads for the team and improve customer satisfaction.
      • This can be challenging when the team is already struggling with workload; however, setting a regular cadence to review tickets, looking for trends, and identifying at least one focus area a month can be a positive outcome for everyone.
      • Focus on the most impactful ticket or service first. The initial goal should be to reduce or eliminate critical and high-impact incidents. Once the high-stress situations are reduced, proactively scheduling the smaller but still time-consuming repeatable incidents can be done.
      • Where you have vendors involved, work with them to determine when root cause analysis must happen and where they’ll need to coordinate with your team or other supporting vendors.

      Problem management

      Problem management can be challenging because it requires skills and knowledge to go deep into a problem and troubleshoot the root cause of an issue, but it also requires uninterrupted time.
      • Problem management, however, can be taught, and the issue isn’t always hard to spot if you have time to look.
      • Using tried and true methods for walking through an issue step by step will enable the team to improve their investigative and troubleshooting skills.
      • Reduction of one or two major incidents and recurring incidents per month will pay off quickly in reducing reactive ticket volume and improve customer satisfaction.

      Cover image for 'Problem Management'.
      Click picture for a link to the blueprint

      Create your roadmap with high-level requirements

      Determine what tasks and projects need to be completed to meet your improvement goals. Create a high-level project plan and balance with existing resources.

      Roadmap of high-level requirements with 'Goals' as row headers and their timelines mapped out across fiscal quarters.

      Bibliography

      Taylor, Sharon and Ivor Macfarlane. ITIL Small Scale Implementation. Office of Government Commerce, 2005.

      “Share, Collaborate, and Communicate on One Consistent Platform.” Liferay, n.d. Accessed 19 July 2022.

      Rodela, Jimmy. “A Beginner’s Guide to Customer Self-Service.” The Ascent, 18 May 2022. Web.

      Implement Software Asset Management

      • Buy Link or Shortcode: {j2store}313|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $107,154 Average $ Saved
      • member rating average days saved: 39 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management
      • Organizations are aware of the savings that result from implementing software asset management (SAM), but are unsure of where to start the process.
      • Poor data capture procedures and lack of a centralized repository produce an incomplete picture of software assets and licenses, preventing accurate forecasting and license optimization.
      • Audit protocols are ad hoc, resulting in sloppy reporting and time-consuming work and lack of preparedness for external software audits.

      Our Advice

      Critical Insight

      • A strong SAM program will benefit all aspects of the business. Data and reports gained through SAM will enable data-driven decision making for all areas of the business.
      • Don’t just track licenses; manage them to create value from data. Gathering and monitoring license data is just the beginning. What you do with that data is the real test.
      • Win the audit battle without fighting. Conduct internal audits to minimize surprises when external audits are requested.

      Impact and Result

      • Conduct a current state assessment of existing SAM processes to form an appropriate plan for implementing or improving your SAM program.
      • Define standard policies, processes, and procedures for each stage of the software asset lifecycle, from procurement through to retirement.
      • Develop an internal audit policy to mitigate the risk of costly external audits.

      Implement Software Asset Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement software asset management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess & plan

      Assess current state and plan the scope of the SAM program, team, and budget.

      • Implement Software Asset Management – Phase 1: Assess & Plan
      • SAM Maturity Assessment
      • SAM Standard Operating Procedures
      • SAM Budget Workbook

      2. Procure, receive & deploy

      Define processes for software requests, procurement, receiving, and deployment.

      • Implement Software Asset Management – Phase 2: Procure, Receive & Deploy
      • SAM Process Workflows (Visio)
      • SAM Process Workflows (PDF)

      3. Manage, redeploy & retire

      Define processes for software inventory, maintenance, harvest and redeployment, and retirement.

      • Implement Software Asset Management – Phase 3: Manage, Redeploy & Retire
      • Patch Management Policy

      4. Build supporting processes

      Build processes for audits and plan the implementation.

      • Implement Software Asset Management – Phase 4: Build Supporting Processes & Tools
      • Software Audit Scoping Email Template
      • Software Audit Launch Email Template
      • SAM Communication Plan
      • SAM FAQ Template
      • Software Asset Management Policy
      [infographic]

      Workshop: Implement Software Asset Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess & Plan

      The Purpose

      Assess current state and plan the scope of the SAM program, team, and budget.

      Key Benefits Achieved

      Current state assessment

      Defined roles and responsibilities

      SAM budget plan

      Activities

      1.1 Outline SAM challenges and objectives.

      1.2 Assess current state.

      1.3 Identify roles and responsibilities for SAM team.

      1.4 Identify metrics and reports.

      1.5 Identify SAM functions to centralize vs. decentralize.

      1.6 Plan SAM budget process.

      Outputs

      Current State Assessment

      RACI Chart

      Defined metrics and reports

      SAM Budget Workbook

      2 Procure, Receive & Deploy

      The Purpose

      Define processes for software requests, procurement, receiving, and deployment.

      Key Benefits Achieved

      Defined standards for software procurement

      Documented processes for software receiving and deployment

      Activities

      2.1 Determine software standards.

      2.2 Define procurement process for new contracts.

      2.3 Define process for contract renewals and additional procurement scenarios.

      2.4 Design process for receiving software.

      2.5 Design deployment workflow.

      2.6 Define process for non-standard software requests.

      Outputs

      Software standards

      Standard Operating Procedures

      SAM Process Workflows

      3 Manage, Redeploy & Retire

      The Purpose

      Define processes for software inventory, maintenance, harvest and redeployment, and retirement.

      Key Benefits Achieved

      Defined process for conducting software inventory

      Maintenance and patch policy

      Documented workflows for software harvest and redeployment as well as retirement

      Activities

      3.1 Define process for conducting software inventory.

      3.2 Define policies for software maintenance and patches.

      3.3 Map software license harvest and reallocation process.

      3.4 Define policy for retiring software.

      Outputs

      Standard Operating Procedures

      Patch management policy

      SAM Process Workflows

      4 Build Supporting Processes & Tools

      The Purpose

      Build processes for audits, identify tool requirements, and plan the implementation.

      Key Benefits Achieved

      Defined process for internal and external audits

      Tool requirements

      Communication and implementation plan

      Activities

      4.1 Define and document the internal audit process.

      4.2 Define and document the external audit process.

      4.3 Document tool requirements.

      4.4 Develop a communication plan.

      4.5 Prepare an FAQ list.

      4.6 Identify SAM policies.

      4.7 Develop a SAM roadmap to plan your implementation.

      Outputs

      Audit response templates

      Tool requirements

      Communication plan

      End-user FAQ list

      Software Asset Management Policy

      Implementation roadmap

      Further reading

      Implement Software Asset Management

      Go beyond tracking licenses to proactively managing software throughout its lifecycle.

      Table of contents

      1. Title
      2. Executive Brief
      3. Execute the Project/DIY Guide
      4. Next Steps
      5. Appendix

      Analyst Perspective

      “Organizations often conflate software asset management (SAM) with license tracking. SAM is not merely knowing how many licenses you require to be in compliance; it’s asking the deeper budgetary questions to right-size your software spend.

      Software audits are a growing concern for businesses, but proactive reporting and decision making supported by quality data will mitigate audit risks. Value is left on the table through underused or poor-quality data, so active data management must be in play. A dedicated ITAM tool can assist with extracting value from your license data.

      Achieving an optimized SAM program is a transformative effort, but the people, processes, and technology need to be in place before that can happen.” (Sandi Conrad, Senior Director, Infrastructure & Operations Practice, Info-Tech Research Group)

      Software license complexity and audit frequency are increasing: are you prepared to manage the risk?

      This Research Is Designed For:

      • CIOs that want to improve IT’s reputation with the business.
      • CIOs that want to eliminate the threat of a software audit.
      • Organizations that want proactive reporting that benefits the entire business.
      • IT managers who want visibility into their software usage.

      This Research Will Help You:

      • Establish a standardized software management process.
      • Track and manage software throughout its lifecycle, from procurement through to retirement or redeployment.
      • Rationalize your software license estate.
      • Improve your negotiations with software vendors.
      • Improve the quality of your SAM data gathering and reporting.

      Executive summary

      Situation

      • Organizations are aware of the savings that result from implementing software asset management (SAM), but are unsure of where to start the process. With no formal standards in place for managing licenses, organizations are constantly at risk for costly software audits and poorly executed software spends.

      Complication

      • Poor data-capture procedures produce an incomplete picture of software lifecycles.
      • No centralized repository exists, resulting in fragmented reporting.
      • Audit protocols are ad hoc, resulting in sloppy reporting and time-consuming work.

      Resolution

      • Conduct a current state assessment of existing SAM processes to form an appropriate plan for implementing or improving your SAM program.
      • Build and involve a SAM team in the process from the beginning to help embed the change.
      • Define standard policies, processes, and procedures for each stage of the software asset lifecycle, from procurement through to retirement. Pace yourself; a staged implementation will make your ITAM program a success.
      • Develop an internal audit program to mitigate the risk of costly audits.
      • Once a standardized SAM program and data are in place, you will be able to use the data to optimize and rationalize your software licenses.

      Info-Tech Insight

      A strong SAM program will benefit all aspects of the business.
      Data and reports gained through SAM will enable data-driven decision making for all areas of the business.

      Don’t just track licenses; manage them to create value from data.
      Gathering and monitoring license data is just the beginning. What you do with that data is the real test.

      Win the audit battle without fighting.
      Conduct internal audits to minimize surprises when external audits are requested.

      Build the business case for SAM on cost and risk avoidance

      You can estimate the return even without tools or data.

      Benefit Calculate the return
      Compliance

      How many audits did you have in the past three years?

      How much time did you spend in audit response?

      Suppose you had two audits each year for the last three years, each with an average $250,000 in settlements.

      A team of four with an average salary of $75,000 each took six months to respond each year, allocating 20% of their work time to the audit.

      You could argue annual audits cost on average $530,000. Increasing ITAM maturity stands to reduce that cost significantly.

      Efficiency

      How much do you spend on software and maintenance by supplier?

      Suppose you spent $1M on software last year. What if you could reduce the spend by just 10% through better practices?

      SAM can help reduce the annual spend by simplifying support, renegotiating contracts based on asset data, reducing redundancy, and reducing spend.

      The Business Benefits of SAM

      • Compliance: Managing audits and meeting legal, contractual, and regulatory obligations.
      • Efficiency: Reducing costs and making the best use of assets while maintaining service.
      • Agility: Anticipate requirements using asset data for business intelligence and analytics.

      Poor software asset management practices increase costs and risks

      Failure to implement SAM can lead to:

      High cost of undiscovered IT assets
      • Needless procurement of software for new hires can be costly.
      Licensing, liability, and legal violations
      • Legal actions and penalties that result from ineffective SAM processes and license incompliance can severely impact an organization’s financial performance and corporate brand image.
      Compromised security
      • Not knowing what assets you have, who is using them and how, can compromise the security of sensitive information.
      Increased management costs
      • Not having up-to-date software license information impacts decision making, with many management teams failing to respond quickly and efficiently to operational demands.
      Increased disruptions
      • Vendors seek out organizations who don’t manage their software assets effectively; it is likely that you could be subject to major operational disruptions as a result of an audit.
      Poor supplier/vendor relationship
      • Most organizations fear communicating with vendors and are anxious about negotiating new licenses.

      54% — A study by 1E found that only 54% of organizations believe they can identify all unused software in their organization.

      28% — On average, 28% of deployed software is unused, with a wasted cost of $224 per PC on unused software (1E, 2014).

      53% — Express Metrix found that 53% of organizations had been audited within the past two years. Of those, 72% had been audited within the last 12 months.

      SAM delivers cost savings beyond the procurement stage

      SAM delivers cost savings in several ways:

      • Improved negotiating position
        • Certainty around software needs and licensing terms can put the organization in a better negotiating position for new contracts or contract renewals.
      • Improved purchasing position
        • Centralized procurement can allow for improved purchasing agreements with better pricing.
      • More accurate forecasting and spend
        • With accurate data on what software is installed vs. used, more accurate decisions can be made around software purchasing needs and budgeting.
      • Prevention of over deployment
        • Deploy software only where it is needed based on what end users actively use.
      • Software rationalization
        • SAM data may reveal multiple applications performing similar functions that can be rationalized into a single standard software that is used across the enterprise.
      • License harvesting
        • Identify unused licenses that can be harvested and redeployed to other users rather than purchasing new licenses.

      SAM delivers many benefits beyond cost savings

      Manage risk. If licensing terms are not properly observed, the organization is at risk of legal and financial exposure, including illegal software installation, loss of proof of licenses purchased, or breached terms and conditions.

      Control and predict spend. Unexpected problems related to software assets and licenses can significantly impact cash flow.

      Less operational interruptions. Poor software asset management processes could lead to failed deployments, software update interruptions, viruses, or a shutdown of unlicensed applications.

      Avoid security breaches. If data is not secure through software patches and security, confidential information may be disclosed.

      More informed decisions. More accurate data on software assets improves transparency and informs decision making.

      Improved contract management. Automated tools can alert you to when contracts are up for renewal to allow time to plan and negotiate, then purchase the right amount of licenses.

      Avoid penalties. Conduct internal audits and track compliance to avoid fees or penalties if an external audit occurs.

      Reduced IT support. Employees should require less support from the service desk with proper, up to date, licensed software, freeing up time for IT Operations to focus on other work.

      Enhanced productivity. By rationalizing and standardizing software offerings, more staff should be using the same software with the same versioning, allowing for better communication and collaboration.

      Asset management is especially correlated with the following processes

      Being highly effective at asset management means that you are more likely to be highly effective at almost all IT processes, especially:

      Icon for process 'BAI10 Configuration Management'. Configuration Management
      76% more effective
      Icon for process 'ITRG03 Manage Service Catalogs'. Service Catalog
      74% more effective
      Icon for process 'APO11 Quality Management'. Quality Management
      63% more effective
      Icon for process 'ITRG08 Data Quality'. Data Quality
      62% more effective
      Icon for process 'MEA01 Performance Measurement'. Performance Measurement
      61% more effective
      Icon for process 'BAI05 Organizational Change Management'. Organizational Change Management
      60% more effective
      Icon for process 'APO05 Portfolio Management'. Portfolio Management
      59% more effective
      Icon for process 'APO03 Enterprise Architecture'. Enterprise Architecture
      58% more effective

      Why? Good SAM processes are integral to both service management and configuration management

      (Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=972 organizations) (High asset management effectiveness was defined as those organizations with an effectiveness score of 8 or above.)

      To accelerate progress, Info-Tech Research Group parses software asset management into its essential processes

      Focus on software asset management essentials

      Software Procurement:

      • Define procurement standards for software and related warranties and support options.
      • Develop processes and workflows for purchasing and work out financial implications to inform budgeting later.

      Software Deployment and Maintenance:

      • Define policies, processes, and workflows for software receiving, deployment, and maintenance practices.
      • Develop processes and workflows for managing imaging, harvests and redeployments, service requests, and large-scale rollouts.

      Software Harvest and Retirement:

      • Manage the employee termination and software harvest cycle.
      • Develop processes, policies, and workflows for software security and retirement.

      Software Contract and Audit Management:

      • Develop processes for data collection and validation to prepare for an audit.
      • Define metrics and reporting processes to keep asset management processes on track.
      A diagram that looks like a tier circle with 'Implement SAM' at the center. The second ring has 'Request & Procure', 'Receive & Deploy', 'Manage & Maintain', and 'Harvest & Retire'. The third ring seems to be a cycle beginning with 'Plan', 'Request', 'Procure', 'Deploy', 'Manage', 'Retire', and back to 'Plan'.

      Asset management is a key piece of Info-Tech’s COBIT-based IT Management and Governance Framework

      The Info-Tech / COBIT5 IT Management & Governance Framework, a number of IT process icons arranged like a periodic table. A magnifying glass highlights process 'BAI09 Asset Management' in the 'Infrastructure & Operations' category.

      Follow Info-Tech's methodology to build a plan to implement software asset management

      Phase 1
      Assess & Plan
      Phase 2
      Procure, Receive & Deploy
      Phase 3
      Manage, Redeploy & Retire
      Phase 4
      Build supporting processes

      1.1

      Assess current state

      2.1

      Request & procure

      3.1

      Manage & maintain contracts

      4.1

      Compliance & audits

      1.2

      Build team and define metrics

      2.2

      Receive & deploy

      3.2

      Harvest or retire

      4.2

      Communicate & build roadmap

      1.3

      Plan & budget
      Deliverables
      Standard Operating Procedures (SOP)
      SAM maturity assessment Process workflows Process workflows Audit response templates
      RACI chart Software standards Patch management policy Communication plan & FAQ template
      SAM metrics SAM policies
      SAM budget workbook

      Thanks to SAM, Visa saved $200 million in three years

      Logo for VISA.

      Case Study

      Industry: Financial Services
      Source: International Business Software Managers Association

      Visa, Inc.

      Visa, Inc. is the largest payment processing company in the world, with a network that can handle over 40,000 transactions every minute.

      Software Asset Management Program

      In 2006, Visa launched a formal IT asset management program, but it was not until 2011 that it initiated a focus on SAM. Joe Birdsong, the SAM director, first addressed four major enterprise license agreements (ELAs) and compliance issues. The SAM team implemented a few dedicated SAM tools in conjunction with an aggressive approach to training.

      Results

      The proactive approach taken by Visa used a three-pronged strategy: people, process, and tools. The process included ELA negotiations, audit responses, and software license rationalization exercises.

      According to Birdsong, “In the past three years, SAM has been credited with saving Visa over $200 million.”

      An timeline arrow with benchmarks, in order: 'Tool purchases', 'ELA negotiations', 'License rationalization', 'Audit responses', '$200 million in savings in just three years thanks to optimized SAM processes'.

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      Thumbnail of Info-Tech's 'SAM Standard Operating Procedures (SOP)'.
      SAM Standard Operating Procedures (SOP)
      Thumbnail of Info-Tech's 'SAM Maturity Assessment'.
      SAM Maturity Assessment
      Thumbnail of Info-Tech's 'SAM Visio Process Workflows'.
      SAM Visio Process Workflows
      Thumbnail of Info-Tech's 'SAM Budget Workbook'.
      SAM Budget Workbook
      Thumbnail of Info-Tech's 'Additional SAM Policy Templates'.
      Additional SAM Policy Templates
      Thumbnail of Info-Tech's 'Software Asset Management Policy'.
      Software Asset Management Policy
      Thumbnail of Info-Tech's 'SAM Communication Plan'.
      SAM Communication Plan
      Thumbnail of Info-Tech's 'SAM FAQ Template'.
      SAM FAQ Template

      Use these insights to help guide your understanding of the project

      • SAM provides value to other processes in IT.
        Data, reports, and savings gained through SAM will enable data-driven decision making for all areas of the business.
      • Don’t just track licenses; manage them to create value from data.
        Gathering and monitoring license data is just the beginning. What you do with that data is the real test.
      • SAM isn’t about managing costs; it’s about understanding your environment to make better decisions.
        Capital tied up in software can impact the progress of other projects.
      • Managing licenses can impact the entire organization.
        Gain project buy-in from stakeholders by articulating the impact that managing licenses can have on other projects and the prevalence of shadow IT.

      Measure the value of a guided implementation (GI)

      Engaging in GIs doesn’t just offer valuable project advice, it also results in significant cost savings.

      GI Measured Value (Assuming 260 workdays in a year)
      Phase 1: Assess & Plan
      • Time, value, and resources saved by using Info-Tech’s methodology to assess current state and create a defined SAM team with actionable metrics
      • For example, 2 FTEs * 5 days * $80,000/year = $6,400
      Phase 2: Procure, Receive & Deploy
      • Time, value, and resources saved by using Info-Tech’s methodology to streamline request, procurement, receiving, and deployment processes for software assets.
      • For example, 2 FTEs * 5 days * $80,000/year = $6,400
      Phase 3: Manage, Redeploy & Retire
      • Time, value, and resources saved by using Info-Tech’s methodology to streamline the maintenance, inventory, license redeployment, and software retiring processes.
      • For example, 2 FTEs * 5 days * $80,000/year = $6,400
      Phase 4: Build Supporting Processes and Tools
      • Time, resources, and potential audit fines saved by using Info-Tech’s methodology to improve audit defense processes ($298,325 average audit penalty (Based on the results of Cherwell Software’s 2013 Software Audit Industry Report)) and design a communication and implementation plan.
      • For example, 2 FTEs * 5days * $80,000/year = $6,400 + $298,325 = $304,725
      Total savings $330,325

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Implement Software Asset Management – project overview

      Phase 1: Assess & plan Phase 2: Procure, receive & deploy Phase 3: Manage, redeploy & retire Phase 4: Build supporting processes
      Supporting Tool icon Best-Practice Toolkit

      Step 1.1: Assess current state

      Step 1.2: Build team and define metrics

      Step 1.3: Plan and budget

      Step 2.1: Request and procure

      Step 2.2: Receive and deploy

      Step 3.1: Manage and maintain contracts

      Step 3.2: Harvest, redeploy, or retire

      Step 4.1: Compliance and audits

      Step 4.2: Communicate and build roadmap

      Guided Implementations
      • Assess current state and challenges.
      • Define roles and responsibilities as well as metrics.
      • Discuss SAM budgeting.
      • Define software standards and procurement process.
      • Build processes for receiving software and deploying software.
      • Define process for conducting software inventory and maintenance and patches.
      • Build software harvest and redeployment processes and retirement.
      • Define process for internal and external audits.
      • Develop communication and implementation plan.
      Associated Activity icon Onsite Workshop Module 1:
      Assess & Plan
      Module 2:
      Map Core Processes: Procure, Receive & Deploy
      Module 3:
      Map Core Processes: Manage, Redeploy & Retire
      Module 4:
      Prepare for audit, build roadmap and communications

      Workshop Overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
      Activities
      Assess & Plan

      1.1 Outline SAM challenges and objectives

      1.2 Assess current state

      1.3 Identify roles and responsibilities for SAM team

      1.4 Identify metrics and reports

      1.5 Identify SAM functions to centralize vs. decentralize

      1.6 Plan SAM budget process

      Map Core Processes: Procure, Receive & Deploy

      2.1 Determine software standards

      2.2 Define procurement process for new contracts

      2.3 Define process for contract renewals and additional procurement scenarios

      2.4 Design process for receiving software

      2.5 Design deployment workflow

      2.6 Define process for non-standard software requests

      Map Core Processes: Manage, Redeploy & Retire

      3.1 Define process for conducting software inventory

      3.2 Define policies for software maintenance and patches

      3.3 Map software license harvest and reallocation process

      3.4 Define policy for retiring software

      Build Supporting Processes

      4.1 Define and document the internal audit process

      4.2 Define and document the external audit process

      4.3 Develop a communication plan

      4.4 Prepare an FAQ list

      4.5 Identify SAM policies

      4.6 Develop a SAM roadmap to plan your implementation

      Deliverables
      • SAM maturity assessment
      • RACI chart
      • Defined metrics and reports
      • Budget workbook
      • Process workflows
      • Software standards
      • Process workflows
      • Patch management policy
      • Standard operating procedures
      • Audit response templates
      • Communication plan
      • FAQ template
      • Additional policy templates
      • Roadmap of initiatives

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Phase 1: Assess Current State

      VISA fought fire with fire to combat costly software audits

      Logo for VISA.

      Case Study

      Industry: Financial Services
      Source: SAM Summit 2014

      Challenge

      Visa implemented an IT asset management program in 2006. After years of software audit teams from large firms visiting and leaving expensive software compliance bills, the world’s leading payment processing company decided it was time for a change.

      Upper management recognized that it needed to combat audits. It had the infrastructure in place and the budget to purchase SAM tools that could run discovery and tracking functions, but it was lacking the people and processes necessary for a mature SAM program.

      Solution

      Visa decided to fight fire with fire. It initially contracted the same third-party audit teams to help build out its SAM processes. Eventually, Visa formed a new SAM team that was led by a group of former auditors.

      The former auditors recognized that their role was not technology based, so a group of technical individuals were hired to help roll out various SAM tools.

      The team rolled out tools like BDNA Discover and Normalize, Flexera FlexNet Manager, and Microsoft SCCM.

      Results

      To establish an effective SAM team, diverse talent is key. Visa focused on employees that were consultative but also technical. Their team needed to build relationships with teams within the organization and externally with vendors.

      Most importantly, the leaders of the team needed to think like auditors to better prepare for audits. According to Joe Birdsong, SAM Director at Visa, “we want to be viewed as a team that can go in and help right-size their environment and better understand licensing to help teams make better decisions.”

      The SAM team was only the beginning.

      Step 1.1 Assess current state and plan scope

      Phase 1:
      Assess & Plan
      This step will walk you through the following activities:This step involves the following participants:

      1.1

      Assess current state
      • 1.1.1 Outline the organization’s SAM challenges
      • 1.1.2 Identify objectives of SAM program
      • 1.1.3 Determine the maturity of your SAM program
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and SAM Manager

      1.2

      Build team and define metrics

      1.3

      Plan & budget

      Step Outcomes

      • An outline of the challenges related to SAM
      • A clear direction for the program based on drivers, anticipated benefits, and goals
      • A completed maturity assessment of current SAM processes

      Sketch out challenges related to software asset management to shape the direction of the project

      Common SAM challenges

      • Audits are disruptive, time-consuming, and costly
      • No audit strategy and response in place
      • Software non-compliance risk is too high
      • Lacking data to forecast software needs
      • No central repository of software licenses
      • Untracked or unused software licenses results in wasted spend
      • Software license and maintenance costs account for a large percentage of the budget
      • Lacking data to know what software is purchased and deployed across the organization
      • Lack of software standards make it difficult to collect consistent information about software products
      • New software licenses are purchased when existing licenses remain on the shelf or multiple similar software products are purchased
      • Employees or departments make ad hoc purchases, resulting in overspending and reduced purchasing power
      • License renewal dates come up unexpectedly without time for adequate decision making
      • No communication between departments to coordinate software purchasing
      • Difficult to stay up to date with software licensing rule changes to remain in compliance
      • Processes and policies are unstandardized and undocumented

      Outline the organization’s SAM challenges

      Associated Activity icon 1.1.1 Brainstorm SAM challenges

      Participants: CIO/CFO, IT Director, Asset Manager, Purchasing, Service Desk Manager, Security (optional), Operations (optional)

      1. Distribute sticky notes to participants. Have everyone start by identifying challenges they face as a result of poor software asset management.
      2. As group, discuss and outline the software asset management challenges facing the organization. These may be challenges caused by poor SAM processes or simply by a lack of process. Group the challenges into key pain points to inform the current state discussion and assessment to follow.

      To be effective with software asset management, understand the drivers and potential impact to the organization

      Drivers of effective SAM Results of effective SAM
      Contracts and vendor licensing programs are complex and challenging to administer without data related to assets and their environment. Improved access to accurate data on contracts, licensing, warranties, installed software for new contracts, renewals, and audit requests.
      Increased need to meet compliance requires a formal approach to tracking and managing assets. Encryption, software application controls, and change notifications all contribute to better asset controls and data security.
      Cost cutting is on the agenda, and management is looking to reduce overall IT spend in the organization in any possible way. Reduction of software spend through data for better forecasting, planning, and licensing rationalization and harvesting.
      Audits are time consuming, disruptive to project timelines and productivity, and costly. Respond to audits with a formalized process, accurate data, and minimal disruption using always-available reporting.

      Determine goals to focus the direction of your SAM program

      Associated Activity icon 1.1.2 Identify objectives of the SAM program

      Participants: CIO/CFO, IT Director, Asset Manager, Service Manager (optional)

      Document: Document in the Standard Operating Procedures.

      1. Identify the drivers behind the software asset management implementation or improvement project. List on a whiteboard or flip chart.
      2. Using the project drivers as input, brainstorm the goals of the SAM project. Discuss the goals as a group and finalize into a list of objectives for the SAM program.
      3. Record the objectives in the SOP and keep them in mind as you work through the rest of the project.

      Sample Objectives:

      1. A single data repository to efficiently manage assets for their entire lifecycle.
      2. Formalizing a methodology for documenting assets to make data retrieval easy and accurate.
      3. Defining and documenting processes to determine where improvements can be made.
      4. Improving customer experience in accessing, using, and maintaining assets.
      5. Centralizing contract information.
      6. Providing access to information for all technical teams as needed.

      Implementing SAM processes will support other IT functions

      By improving how you manage your licenses and audit requests, you will not only provide benefits through a mature SAM program, you will also improve your service desk and disaster recovery functions.

      Service Desk Disaster Recovery
      • Effective service desk tickets require a certain degree of technical detail for completion that a SAM program often provides.
      • Many tools are available that can handle both ITSM and ITAM functions. Your SAM data can be integrated into many of your service desk functions.
      • For example, if a particular application is causing a high number of tickets, SAM data could show the application’s license is almost expired and its usage has decreased due to end-user frustrations. The SAM team could review the application and decide to purchase software that better meets end-user needs.
      • If you don’t know what you have, you don’t know what needs to be back online first.
      • The ability to restore system functionality is heavily dependent on the ability to locate or reproduce master media documentation and system configuration information.
      • If systems/software are permanently lost, the ability to recover software licensing information is crucial to preserving compliance.
      • License agreement and software are needed to demonstrate software ownership. Unless the proof of ownership is present, there is no proof of compliance.
      Short description of Info-Tech blueprint 'Standardize the Service Desk'. Short description of Info-Tech blueprint 'Create a Right-Sized Disaster Recovery Plan'.

      Each level of SAM maturity comes with its own unique challenges

      Maturity People & Policies Processes Technology
      Chaos
      • No dedicated staff
      • No policies published
      • Procedures not documented or standardized
      • Licenses purchased randomly
      • Help desk images machines, but users can buy and install software
      • Minimal tracking tools in place
      Reactive
      • Semi-focused SAM manager
      • No policies published
      • Reliance on suppliers to provide reports for software purchases
      • Buy licenses as needed
      • Software installations limited to help desk
      • Discovery tools and spreadsheets used to manage software
      Controlled
      • Full-time SAM manager
      • End-user policies published and requiring sign-off
      • License reviews with maintenance and support renewals
      • SAM manager involved in budgeting and planning sessions
      • Discovery and inventory tools used to manage software
      • Compliance reports run as needed
      Proactive
      • Extended SAM team, including help desk and purchasing
      • Corporate anti-piracy statement in place and enforced
      • Quarterly license reviews
      • Centralized view into software licenses
      • Software requests through service catalog with defined standard and non-standard software
      • Product usage reports and alerts in place to harvest and reuse licenses
      • Compliance and usage reports used to negotiate software contracts
      Optimized
      • SAM manager trained and certified
      • Working with HR, Legal, Finance, and IT to enforce policies
      • Full support and maintenance analysis for all license reviews
      • Quarterly meetings with SAM team to review policies, procedures, upcoming contracts, and rollouts
      • Software deployed automatically through service catalog/apps store
      • Detailed savings reports provided to executive team annually
      • Automated policy enforcement and process workflows

      Determine the maturity of your SAM program

      Supporting Tool icon 1.1.3 Use the SAM Maturity Assessment Tool
      1. Download the SAM Maturity Assessment Tool and go to tab 2.
      2. Complete the self-assessment in all seven categories:
        1. Control Environment
        2. Roles & Responsibilities
        3. Policies & Procedures
        4. Competence
        5. Planning & Implementation Process
        6. Monitoring & Review
        7. Inventory Processes
      3. Go to tab 3 and examine the graphs produced. Identify the areas in your SAM program that require the most attention and which are already relatively mature.
      4. Use the results of this maturity assessment to focus the efforts of the project moving forward. Return to the assessment after a pre-determined time (e.g. one year later) to track improvement in maturity over time.
      Screenshot of the results page from the SAM Maturity Assessment Tool. Screenshot of the processes page from the SAM Maturity Assessment Tool.

      Step 1.2 Build team and define metrics

      Phase 1:
      Assess & Plan
      This step will walk you through the following activities:This step involves the following participants:

      1.1

      Assess current state
      • 1.2.1 Identify roles and responsibilities for SAM team
      • 1.2.2 Identify metrics and KPIs to track the success of your SAM program
      • 1.2.3 Define SAM reports to track metrics
      • CIO/CFO
      • IT Director
      • SAM Manager
      • SAM Team
      • Service Desk Manager

      1.2

      Build team and define metrics

      1.3

      Plan & budget

      Step Outcomes

      • A description of the roles and responsibilities of IT staff involved in SAM
      • A list of metrics and reports to track to measure the success of the software asset management program

      Define roles and responsibilities for the SAM program

      Roles and responsibilities should be adapted to fit specific organizational requirements based on its size, structure, and distribution and the scope of the program. Not all roles are necessary and in small organizations, one or two people may fulfill multiple roles.

      Senior Management Sponsor – Ensures visibility and support for the program.

      IT Asset Manager – Responsible for management of all assets and maintaining asset database.

      Software Asset Manager – Responsible for management of all software assets (a subset of the overall responsibility of the IT Asset Manager).

      SAM Process Owner – Responsible for overall effectiveness and efficiency of SAM processes.

      Asset Analyst – Maintains up-to-date records of all IT assets, including software version control.

      Additional roles that interact with SAM:

      • Security Manager
      • Auditors
      • Procurement Manager
      • Legal Council
      • Change Manager
      • Configuration Manager
      • Release and Deployment Manager
      • Service Desk Manager

      Form a software asset management team to drive project success

      Many organizations simply do not have a large enough staff to hire a full-time software asset manager. The role will need to be championed by an internal employee.

      Avoid filling this position with a temporary contract; one of the most difficult operational factors in SAM implementation and continuity is constant turnover and organizational shifts. Hiring a software asset manager on contract might get the project going faster, but without the knowledge gained by doing the processes, the program won’t have enough momentum to sustain itself.

      Software Asset Manager Duties

      • Gather proof of license.
      • Record and track all assets within the SAM repository.
      • Produce compliance reports.
      • Preparation of budget requests.
      • Administration of software renewal process.
      • Contract and support analysis.
      • Document procedures.
      • Ensure project is on track.

      SAM Team Member Duties

      • Record license and contract data in SAM tool.
      • Assist in production of SAM reports.
      • Data analysis.
      • Match tickets to SAM data.
      • Assist in documentation.
      • Assist in compliance reports.
      • Gather feedback from end users.

      Info-Tech Best Practice

      Make sure your SAM team is diverse. The SAM team will need to be skilled at achieving compliance, but there is also a need for technically skilled individuals to maximize the function of the SAM tool(s) at your organization.

      Identify roles and responsibilities for SAM

      Associated Activity icon 1.2.1 Complete a RACI chart for your organization

      Participants: CIO/CFO, IT Director, SAM Manager, SAM Team, Service Desk Manager

      Document: Document in the Standard Operating Procedures.

      Determine the roles and responsibilities for your SAM program. Record the results in a RACI (responsible, accountable, consulted, informed) chart such as the example below.

      SAM Processes and Tasks CIO CFO SAM Manager IT Director Service Management Team IT Ops Security Finance Legal Project Manager
      Policies/Governance A C R R I I C I R I
      Strategy A C R R I I I I C
      Risk Management/Asset Security A C R R C R C C C
      Data Entry/Quality I I A R R
      Compliance Auditing R C A R I I I I
      Education & Training R I A C I I
      Contract Lifecycle Management R R A R C C C C R C
      Workflows R C A R I I I R I C/I
      Budgeting R R R A C R
      Software Acquisition R I A R I C R C C
      Controls/Reporting R I A R I I C I
      Optimize License Harvesting I I A R I C C

      Identify metrics to form the framework of the project

      Trying to achieve goals without metrics is like trying to cook without measuring your ingredients. You might succeed, but you’ll have no idea how to replicate it.

      SAM metrics should measure one of five categories:

      • Quantity → How many do we have? How many do we want?
      • Compliance → What is the level of compliance in a specific area?
      • Duration → How long does it take to achieve the desired result?
      • Financial → What is the cost/value? What is our comparative spend?
      • Quality → How good was the end result? E.g. Completeness, accuracy, timeliness

      The metrics you track depend on your maturity level. As your organization shifts in maturity, the metrics you prioritize for tracking will shift to reflect that change. Example:

      Metric category Low maturity metric High maturity metric
      Compliance % of software installed that is unauthorized % of vendors in effective licensing position (ELP) report
      Quantity % of licenses documented in ITAM tool % of requests made through unauthorized channels

      Associate KPIs and metrics with SAM goals

      • Identify the critical success factors (CSFs) for your software asset management program based on strategic goals.
      • For each success factor, identify the key performance indicators (KPIs) to measure success, as well as specific metrics that will be tracked and reported on.
      • Sample metrics are below:

      CSF = Goal, or what success looks like

      KPI = How achievement of goal will be defined

      Metric = Numerical measure to determine if KPI has been achieved

      CSF/Goal KPI Metrics
      Improve accuracy of software budget and forecasting
      • Reduce software spend by 5%
      • Total software asset spending
      • Budgeted software spend vs. actual software spend
      Avoid over purchasing software licenses and optimize use of existing licenses
      • Reduce number of unused and underused licenses by 10%
      • Number of unused licenses
      • Money saved from harvesting licenses instead of purchasing new ones
      Improve accuracy of data
      • Data in SAM tool matches what is deployed with 95% accuracy
      • Percentage of entitlements recorded in SAM tool
      • Percentage of software titles recognized by SAM tool
      Improved service delivery
      • Reduce time to deploy new software by 10%
      • Mean time to purchase new software
      • Mean time to fulfill new software requests

      Identify metrics and KPIs to track the success of your SAM program

      Associated Activity icon 1.2.2 Brainstorm metrics and KPIs

      Participants: CIO, IT Director, SAM Manager, SAM Team

      Document: Document in the Standard Operating Procedures.

      1. Discuss the goals and objectives of implementing or improving software asset management, based on challenges identified earlier.
      2. From the goals, identify the critical success factors for the SAM program.
      3. For each CSF, identify one to three key performance indicators (KPIs) to evaluate achievement of the success factor.
      4. For each KPI, identify one to three metrics that can be tracked and reported on to measure success. Ensure that the metrics are tangible and measurable.

      Use the table below as an example.

      Goal/CSF KPI Metric
      Improve license visibility Increase accuracy and completeness of SAM data
      • % of total titles included in ITAM tool
      • % of licenses documented in ITAM tool
      Reduce software costs Reduce number of unused software licenses by 20%
      • % of licenses assigned to ex-employees
      • % of deployed licenses that have not been used in the past six months
      Reduce shadow IT Reduce number of unauthorized software purchases and installations by 10%
      • % of software requests made through unauthorized channels
      • % of software installed that is unauthorized

      Tailor metrics and reports to specific stakeholders

      Asset Managers

      Asset managers require data to manage how licenses are distributed throughout the organization. Are there multiple versions of the same application deployed? What proportion of licenses deployed are assigned to employees who are no longer at the organization? What are the usage patterns for applications?

      Service Desk Technicians

      Service desk technicians need real-time data on licenses currently available to deploy to machines that need to be imaged/updated, otherwise there is a risk of breaching a vendor agreement.

      Business Managers and Executives

      Business managers and executives need reports to make strategic decisions. The reports created for business stakeholders need to help them align business projects or business processes with SAM metrics. To determine which reports will provide the most value, start by looking at business goals and determining the tactical data that will help inform and support these goals and their progress.

      Additional reporting guidelines:

      • Dashboards should provide quick-glance information for daily maintenance.
      • Alerts should be set for all contract renewals to provide enough advanced notice (e.g. 90 days).
      • Reports should be automated to provide actionable information to appropriate stakeholders as needed.

      Define SAM reports to track metrics

      Associated Activity icon 1.2.3 Identify reports and metrics to track regularly

      Participants: CIO, IT Director, SAM Manager, SAM Team

      Document: Document in the Standard Operating Procedures.

      1. Identify key stakeholders requiring SAM reports. For each audience, identify their goals and requirements from reporting.
      2. Using the list of metrics identified previously, sort metrics into reports for each audience based on their requirements and goals. Add any additional metrics required.
      3. Identify a reporting frequency for each report.

      Example:

      Stakeholder Purpose Report Frequency
      Asset Manager
      • Manage budget
      • Manage contracts and cash flow
      • Ensure processes are being followed
      Operational budget spent to date Monthly
      Capital budget spent to date Monthly
      Contracts coming due for renewal Quarterly
      Software harvested for redeployment Quarterly
      Number of single applications being managed Annually
      CFO
      • Manage budget
      • Manage cash flow
      Software purchased, operational & capital Monthly
      Software accrued for future purchases Monthly
      Contracts coming due for renewal
      • Include dollar value, savings/spend
      Quarterly
      CIO
      • Resource planning
      • Progress reporting
      Software deployments and redeployments Monthly
      Software rollouts planned Quarterly
      % of applications patched Quarterly
      Money saved Annually
      Number of contracts & apps managed Quarterly

      Step 1.3 Plan the SAM program and budget

      Phase 1:
      Assess & Plan
      This step will walk you through the following activities:This step involves the following participants:

      1.1

      Assess current state
      • 1.3.1 Identify SAM functions to centralize vs. decentralize
      • 1.3.2 Complete the SAM budget tool
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and SAM Manager
      • CFO

      1.2

      Build team and define metrics

      1.3

      Plan & budget

      Step Outcomes

      • Defined scope for the SAM program in terms of the degree of centralization of core functions and contracts
      • A clearer picture of software spend through the use of a SAM budgeting tool.

      Asset managers need to be involved in infrastructure projects at the decision-making stage

      Ensure that your software asset manager is at the table when making key IT decisions.

      Many infrastructure managers and business managers are unaware of how software licensing can impact projects. For example, changes in core infrastructure configuration can have big impacts from a software licensing perspective.

      Mini Case Study

      • When a large healthcare organization’s core infrastructure team decided to make changes to their environment, they failed to involve their asset manager in the decision-making process.
      • When the healthcare organization decided to make changes to their servers, they were running Oracle software on their servers, but the licenses were not being tracked.
      • When the change was being made to the servers, the business contacted Oracle to notify them of the change. What began as a tech services call quickly devolved into a licensing error; the vendor determined that the licenses deployed in the server environment were unauthorized.
      • For breaching the licensing agreement, Oracle fined the healthcare organization $250,000.
      • Had the asset manager been involved in the process, they would have understood the implications that altering the hardware configuration would have on the licensing agreement and a very expensive mistake could have been avoided.

      Decide on the degree of centralization for core SAM functions

      • Larger organizations with multiple divisions or business units will need to decide which SAM functions will be centralized and which, if any, will be decentralized as they plan the scope of their SAM program. Generally, certain core functions should be centralized for the SAM program to deliver the greatest benefits.
      • The degree of centralization may also be broken down by contract, with some contracts centralized and some decentralized.
      • A centralized SAM database gives needed visibility into software assets and licenses across the organization, but operation of the database may also be done locally.

      Centralization

      • Allows for more strategic planning
      • Visibility into software licenses across the organization promotes rationalization and cost savings
      • Ensure common products are used
      • More strategic sourcing of vendors and resellers
      • Centrally negotiate pricing for better deals
      • Easier to manage risk and prepare for audits
      • Greater coordination of resources

      Decentralization

      • May allow for more innovation
      • May be easier to demonstrate local compliance if the organization is geographically decentralized
      • May be easier to procure software if offices are in different countries
      • Deployment and installation of software on user devices may be easier

      Identify SAM functions to centralize vs. decentralize

      Associated Activity icon 1.3.1 Identify functions for centralization

      Participants: CIO, IT Director, SAM Manager, SAM Team

      Document: Document in the Standard Operating Procedures.

      1. If applicable, identify SAM functions that will need to be centralized and evaluate the implications of centralization to ensure it is feasible.
      2. If applicable, identify SAM functions that will be decentralized, if resources are available to manage those functions locally.

      Example:

      Centralized Functions
      • Operation of SAM database
      • SAM budget
      • Vendor selection
      • Contract negotiation and purchasing
      • Data analysis
      • Software receiving and inventory
      • Audits and risk management
      Decentralized functions
      • Procurement
      • Deployment and installation

      Software comprises the largest part of the infrastructure and operations budget

      After employee salaries (38%), the four next largest spend buckets have historically been infrastructure related. Adding salaries and external services, the average annual infrastructure and operations spend is over 50% of all IT spend.

      The largest portion of that spend is on software license and maintenance. As of 2016, software accounted for the roughly the same budget total as voice communications, data communications, and hardware combined. Managing software contracts is a crucial part of any mature budgeting process.

      Graph showing the percentage of all IT spend used for 'Ongoing software license and maintenance' annually. In 2010 it was 17%; in 2018 it was 21%. Graph showing the percentage of all IT spend used for 'Hardware maintenance / upgrades' annually. In 2010 it was 7%; in 2018 it was 8%. Graph showing the percentage of all IT spend used for 'Data communications' annually. In 2010 it was 7%; in 2018 it was 7%. Graph showing the percentage of all IT spend used for 'Voice communications' annually. In 2010 it was 5%; in 2018 it was 7%.

      Gain control of the budget to increase the success of SAM

      A sophisticated software asset management program will be able to uncover hidden costs, identify opportunities for rationalization, save money through reharvesting unused licenses, and improve forecasting of software usage to help control IT spending.

      While some asset managers may not have experience managing budgets, there are several advantages to the ITAM function owning the budget:

      • Be more involved in negotiating pricing with vendors.
      • Build better relationships with stakeholders across the business.
      • Gain greater purchasing power and have a greater influence on purchasing decisions.
      • Forecast software requirements more accurately.
      • Inform benchmarks and metrics with more data.
      • Directly impact the reduction in IT spend.
      • Manage the asset database more easily and have a greater understanding of software needs.
      • Identify opportunities for cost savings through rationalization.

      Examine your budget from a SAM perspective to optimize software spend

      How does examining your budget from a SAM perspective benefit the business?

      • It provides a chance to examine vendor contracts as they break down contracts by projects and services, which gives a clearer picture of where software fits into the budget.
      • It also gives organizations a chance to review vendor agreements and identify any redundancies present in software supporting services.

      Review the budget:

      • When reviewing your budget, implement a contingency fund to mitigate risk from a possible breach of compliance.
      • If your organization incurs compliance issues that relate to specific services, these fines may be relayed back to the departments that own those services, affecting how much money each department has.
      • The more sure you are of your compliance position, the less likely you are to need a contingency fund, and vice versa.

      Info-Tech Best Practice

      Finance needs to be involved. Their questions may cover:

      • Where are the monthly expenditures? Where are our financial obligations? Do we have different spending amounts based on what time of year it is?

      Use the SAM Budget Workbook to uncover insights about your software spend

      Supporting Tool icon 1.3.2 Complete the SAM budget tool

      The SAM Budget Workbook is designed to assist in developing and justifying the budget for software assets for the upcoming year.

      Instructions

      1. Work through tabs 2-6, following the instructions as you go.
      2. Tab 2 involves selecting software vendors and services provided by software.
      3. Tab 3 involves classifying services by vendor and assigning a cost to them. Tab 3 also allows you to classify the contract status.
      4. Tab 4 is a cost variance tracking sheet for software contracts.
      5. Tabs 5 and 6 are monthly budget sheets that break down software costs by vendor and service, respectively.
      6. Tab 7 provides graphs to analyze the data generated by the tool.
      7. Use the results found on tab 7 to analyze your budget: are you spending too much with one service? Is there vendor overlap based on what project or service that software is reporting?
      Screenshots of the 'Budget of Services Supported by Software Vendors' and 'Software Expense cashflow reports by Vendor' pages from the SAM Budget Workbook. Screenshot of the 'Analysis of Data' page from the SAM Budget Workbook.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.3

      Sample of activity 1.1.3 'Determine the maturity of your SAM program'. Determine the maturity of your SAM program

      Using the SAM Maturity Assessment Tool, fill out a series of questions in a survey to assess the maturity of your current SAM program. The survey assesses seven categories that will allow you to align your strategy to your results.

      1.2.3

      Sample of activity 1.2.3 'Define SAM reports to track metrics'. Define SAM reports to track metrics

      Identify key stakeholders with reporting needs, metrics to track to fulfill reporting requirements, and a frequency for producing reports.

      Phase 1 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Assess and Plan

      Proposed Time to Completion (in weeks): 4
      Step 1.1: Assess current state Step 1.2: Build team and define metrics Step 1.3: Plan and budget
      Start with an analyst kick-off call:
      • Outline SAM challenges
      • Overview of the project
      • Assess current maturity level
      Review findings with analyst:
      • Define roles and responsibilities of SAM staff
      • Identify metrics and reports to track
      Review findings with analyst:
      • Plan centralization of SAM program
      • Discuss SAM budgeting
      Then complete these activities…
      • Identify challenges
      • Identify objectives of SAM program
      • Assess maturity of current state
      Then complete these activities…
      • Define roles and responsibilities
      • Identify metrics and KPIs
      • Plan reporting
      Then complete these activities…
      • Identify SAM functions to centralize
      • Complete the SAM budgeting tool
      With these tools & templates:
      • SAM Maturity Assessment
      • Standard Operating Procedures
      With these tools & templates:
      • Standard Operating Procedures
      With these tools & templates:
      • SAM Budget Workbook

      Phase 2: Procure, Receive, and Deploy

      VISA used high-quality SAM data to optimize its software licensing

      Logo for VISA.

      Case Study

      Industry: Financial Services
      Source: SAM Summit 2014

      Challenge

      Visa formed a SAM team in 2011 to combat costly software audits.

      The team’s first task was to use the available SAM data and reconcile licenses deployed throughout the organization.

      Organizations as large as Visa constantly run into issues where they are grossly over or under licensed, causing huge financial risk.

      Solution

      Data collection and analysis were used as part of the license rationalization process. Using a variety of tools combined with a strong team allowed Visa to perform the necessary steps to gather license data and analyze usage.

      One of the key exercises was uniting procurement and deployment data and the teams responsible for each.

      End-to-end visibility allowed the data to be uniform. As a result, better decisions about license rationalization can be made.

      Results

      By improving its measurement of SAM data, Visa was able to dedicate more time to analyze and reconcile its licenses. This led to improved license management and negotiations that reflected actual usage.

      By improving license usage through rationalization, Visa reduced the cost of supporting additional titles.

      The SAM team also performed license reclamation to harvest and redistribute licenses to further improve usage. The team’s final task was to optimize audit responses.

      Step 2.1 Request and procure software

      Phase 2:
      Procure, Receive & Deploy
      This step will walk you through the following activities:This step involves the following participants:

      2.1

      Request & Procure
      • 2.1.1 Determine which software contracts should be centralized vs. localized
      • 2.1.2 Determine your software standards
      • 2.1.3 Define procurement policy
      • 2.1.4 Identify approvals and requests for authorization thresholds
      • 2.1.5 Build software procurement workflow for new contracts
      • 2.1.6 Define process for contract renewals and additional procurement scenarios
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team

      2.2

      Receive & Deploy

      Step Outcomes

      • Defined standards for software requests
      • A documented policy for software procurement including authorization thresholds
      • Documented process workflows for new contracts and contract renewals

      Procurement and SAM teams must work together to optimize purchasing

      Procurement and SAM must collaborate on software purchases to ensure software purchases meet business requirements and take into account all data on existing software and licenses to optimize the purchase and contract. Failure to work together can lead to unnecessary software purchases, overspending on purchases, and undesirable contract terms.

      SAM managers must collaborate with Procurement when purchasing software.

      SAM managers should:

      • Receive requests for software licenses
      • Ensure a duplicate license isn’t already purchased before going through with purchase
      • Ensure the correct license is purchased for the correct individuals
      • Ensure the purchasing information is tracked in the ITAM/SAM tool
      • Report on software usage to inform purchases
      Two cartoon people in work attire each holding a piece of a puzzle that fits with the other. Procurement must commit to be involved in the asset management process.

      Procurement should:

      • Review requests and ensure all necessary approvals have been received before purchasing
      • Negotiate optimal contract terms
      • Track and manage purchasing information and invoices and handle financial aspects
      • Use data from SAM team on software usage to decide on contract terms and optimize value

      Centralize procurement to decrease the likelihood of overspending

      Centralized negotiation and purchasing of software can ensure that the SAM team has visibility and control over the procurement process to help prevent overspending and uncontrolled agreements.

      Benefits of centralized procurement

      • Ability to easily manage software demand.
      • Provides capability to effectively manage your relationships with suppliers.
      • Allows for decreased contract processing times.
      • Provides easy access to data with a single consolidated system for tracking assets at an early stage.
      • Reduces number of rogue purchases by individual departments.
      • Efficiency through automation and coordinated effort to examine organization’s compliance and license position.
      • Higher degree of visibility and transparency into asset usage in the organization.

      Info-Tech Insights

      It may be necessary to procure some software locally if organizations have multiple locations, but try to centrally procure and manage the biggest contracts from vendors that are likely to audit the organization. Even with a decentralized model, ensure all teams communicate and that contracts remain visible centrally even if managed locally.

      Standards for software procurement help prevent overspending

      Software procurement is often more difficult for organizations than hardware procurement because:

      • Key departments that need to be involved in the purchasing process do not communicate or interact enough.
      • A fear of software auditing causes organizations to overspend to mitigate risk.
      • Standards are often not in place, with most purchases being made outside of the gold imaging standard.
      • A lack of discovery results in gross overspending on software licenses that are already present and underused.

      Info-Tech Insight

      One of the major challenges involved in implementing SAM is uniting multiple datasets and data sources across the enterprise. A conversation with each major business unit will help with the creation of software procurement standards that are acceptable to all.

      Determine which software contracts should be centralized vs. localized (optional)

      Associated Activity icon 2.1.1 Identify central standard enterprise offerings

      Participants: CIO, IT Director, SAM Manager, SAM Team

      Document: Document in the Standard Operating Procedures.

      1. As a group, list as many software contracts that are in place across the organization as can easily be identified, focusing on top vendors.
      2. Identify which existing software contracts are standard enterprise offerings that are procured and managed centrally and which are non-standard or localized applications.
      3. Looking at the list of non-standard software, identify if any can or should be rationalized or replaced with a standard offering.
      Standard enterprise offerings
      • Microsoft
      • IBM
      • Adobe
      • Dell
      • Cisco
      • VMware
      • Barracuda
      Localized or non-standard software

      Classify your approved software into tiers to improve workflow efficiency

      Not all titles are created equal; classifying your pre-approved and approved software titles into a tiered system will provide numerous benefits for your SAM program.

      The more prestigious the asset tier, the higher the degree of data capture, support, and maintenance required.

      • Mission-critical, high-priority applications are classified as gold standard.
      • Secondary applications or high priority are silver standard.
      • Low-usage applications or normal priority are bronze standard.

      E.g. An enterprise application that needs to be available 24/7, such as a learning management system, should be classified as a gold tier to ensure it has 24/7 support.

      Creating tiers assists stakeholders in justifying the following set of decision points:

      • Which assets will require added maintenance (e.g. software assurance for Microsoft)
      • Technical support requirements to meet business requirements
      • Lifecycle and upgrade cycle of the software assets.
      • Monitoring usage to determine whether licenses can be harvested
      • Authorizations required for purchase requests

      Determine your software standards

      Associated Activity icon 2.1.2 Identify standard software images for your organization

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      1. As a group, discuss and identify the relevant software asset tiers and number of tiers.
      2. For each tier, define:
        • Support requirements (hours and payments)
        • Maintenance requirements (mandatory or optional)
        • Lifecycle (when to upgrade, when to patch)
        • Financial requirements (CapEx/OpEx expenses)
        • Request authorizations (requestors and approvers)
      3. Sort the software contracts identified in the previous category into tiers, for example:
        • Mission-critical software (gold tier)
        • High-priority software (silver tier)
        • Normal-priority software (bronze tier)
      4. Use the SOP as an example.

      Determine which licensing options and methodologies fit into future IT strategy

      Not everyone is ready to embrace the cloud for all solutions; make sure to align cloud strategy to business requirements. Work closely with IT executives to determine appropriate contract terms, licensing options, and tracking processes.

      Vendors make changes to bundles and online services terms on a regular basis. Ensure you document your agreed upon terms to save your required functionality as vendor standard offerings change.

      • Any contracts getting moved to the cloud will need to undergo a contract comparison first.
      • The contract you signed last month could be completely different this month. Many cloud contracts are dynamic in nature.
      • Keep a copy of the electronic contract that you signed in a secure, accessible location.
      • Consider reaching a separate agreement with the vendor that they will ensure you maintain the results of the original agreement to prevent scope creep.

      Not all on-premises to cloud options transition linearly:

      • Features of perpetual licenses may not map to subscriptions
      • Product terms may differ from online services terms
      • Licensing may change from per device to per user
      • Vendor migrations may be more complex than anticipated

      Download the Own the Cloud: Strategy and Action Plan blueprint for more guidance

      Understand the three primary models of software usage agreements

      Licensed Open Source Shareware
      License Structure A software supplier is paid for the permission to use their software. The software is provided free of charge, but is still licensed. The software is provided free of charge, but is still licensed. Usage may be on a trial basis, with full usage granted after purchase.
      Source Code The source code is still owned by the supplier. Source code is provided, allowing users to change and share the software to suit their needs. Source code is property of the original developer/supplier.
      Technical Support Technical support is included in the price of the contract. Technical support may be provided, often in a community-based format from other developers of the open-source software in question. Support may be limited during trial of software, but upgraded once a purchase is made.

      Info-Tech Insight

      Open-source software should be managed in the same manner as commercial software to understand licensing requirements and be aware of any changes to these agreements, such as commercialization of such products, as well as any rules surrounding source code.

      Coordinate with purchasing department to define software procurement policy

      Associated Activity icon 2.1.3 Define procurement policy

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      Define and document policies that will apply to IT software purchases, including policies around:

      • Software purchase approvals
      • Licenses for short-term contractors
      • On-premises vs. SaaS purchases
      • Shareware and freeware fees
      • Open-source software

      Use the example below as guidance and document in the SOP.

      • Software will not be acquired through user corporate credit cards, office supply, petty cash, or personal expense budgets. Purchases made outside of the acceptable processes will not be reimbursed and will be removed from company computers.
      • Contractors who are short term and paid through vendor contracts and invoices will supply their own licenses.
      • Software may be purchased as on-premises or as-a-service solutions as IT deems appropriate for the solution.
      • Shareware and freeware authors will be paid the fee they specify for use of their products.
      • Open-source software will be managed in the same manner as commercial software to understand licensing requirements and be aware of any changes to these agreements, such as commercialization of such products.

      Identify approvals and requests for authorization thresholds

      Associated Activity icon 2.1.4 Identify financial thresholds for approvals and requests

      Participants: Asset Manager, Purchasing, CIO, CFO, IT Director

      Document: Document in the Standard Operating Procedures.

      Identify and classify financial thresholds for contracts requiring approval. For each category of contract value, identify who needs to authorize the request. Discuss and document any other approvals necessary. An example is provided below.

      Example:
      Requests for authorization will need to be directed based on the following financial thresholds:

      Contract value Authorization
      <$50,000 IT Director
      $50,000 to $250,000 CIO
      $250,000 to $500,000 CIO and CFO
      >$500,000 Legal review

      Develop a defined process for software procurement

      A poorly defined software procurement workflow can result in overspending on unnecessary software licensing throughout the year. This can impact budgeting and any potential software refreshes, as businesses will often rely on purchasing what they can afford, not what they need.

      Benefits of a defined workflow

      • Standardized understanding of the authorization processes results in reduced susceptibility to errors and quicker processing times.
      • Compliance with legal regulations.
      • Protection from compliance violations.
      • Transparency with the end user by communicating the process of software procurement to the business.

      Elements to include in procurement workflows:

      • RFP
      • Authorizations and approvals
      • Contract review
      • Internal references to numbers, cost centers, locations, POs, etc.

      Four types of procurement workflows:

      1. New contract – Purchasing brand new software
      2. Add to contract – Adding new POs or line items to an existing contract
      3. Contract renewal – Renewing an existing contract
      4. No contract required – Smaller purchases that don’t require a signed contract

      Outline the procurement process for new contracts

      The procurement workflow may involve the Service Desk, procurement team, and asset manager.

      The following elements should be accounted for:

      • Assignee
      • Requestor
      • Category
      • Type
      • Model or version
      • Requisition number
      • Purchase order number
      • Unit price
      A flowchart outlining the procurement process for new contracts. There are three levels, at the top is 'Tier 2 or Tier 3', the middle is 'IT Procurement', the bottom is 'Asset Manager'. It begins in 'Tier 2 or Tier 3' with 'Approved request received', and if it is not declined it moves on to 'Purchasing request forwarded to Procurement' on the 'IT Procurement' level. If an RFP is required, it eventually moves to 'Receives contract' on the 'Asset Manager' level and ends with 'Document license requirements, notify IT Product Owner'.

      Build software procurement workflow for new contracts

      Associated Activity icon 2.1.5 Build new contract procurement workflow

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      1. As a team, outline each of the tasks in the process of procuring a new software asset using cue cards, sticky notes, or a whiteboard.
      2. Use the sample procurement workflow on the previous slide as an example if needed.
      3. Ensure the following elements required for the asset procurement process have been accounted for:
        • Assignee
        • Requestor
        • Category
        • Type
        • Model or version
        • Requisition number
        • Purchase order number
        • Unit price
      4. Review the workflow and make any adjustments necessary to improve the process. Document using Visio and add to the SOP.

      Review vendor contracts to right-size licensing procurement

      Many of your applications come from the same vendor, and a view into the business services provided by each software vendor contract will prove beneficial to the business.

      • You may uncover overlaps in services provided by software across departments.
      • The same service may be purchased from different vendors simply because two departments never compared notes!
      • This leaves a lot of money on the table from a lack of volume discounts.
      A graphic depicting a Venn diagram in which the 'Software' and 'Services' circles overlap, both of which stem from a 'Vendor Contract'.
      • Be cautious about approaching license budgeting strictly from a cost perspective. SAM is designed to right-size your licenses to properly support your organization.
      • One trap organizations often fall into is bundling discounts. Vendors will offer steep discounts if clients purchase multiple titles. On the surface, this might seem like a great offer.
      • However, what often happens is that organizations will bundle titles to get a steep discount on their prize title of the group.
      • The other titles become shelfware, and when the time comes to renew the contract, the maintenance fees on the shelfware titles will often make the contract more expensive than if only the prize title was purchased.

      Additionally, information regarding what licenses are being used for certain services may yield insight into potential redundancies. For example, two separate departments may have each have a different application deployed that supports the same service. This presents an opportunity for savings based on bulk licensing agreements, not to mention a simplified support environment by reducing the number of titles deployed in your environment.

      Define a procedure for tracking and negotiating contract renewals

      Participants: IT Director/CIO, Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      Discuss and document a policy for tracking and negotiating contract renewals. Answer the following questions as guides:

      • How will renewal dates be tracked and monitored?
      • How soon should contracts be reviewed prior to renewal to determine appropriateness for use and compliance?
      • What criteria will be used to determine if the product should be renewed?
      • Who will be consulted for contract renewal decisions for major contracts?
      • How will licensing and support decisions be made?

      Optional contract review:

      1. Take a sample contract to renew. Create a list of services that are supported by the software. Look for overlaps, redundancies, shelfware, and potential bundling opportunities. Recall the issues outlined when purchasing bundled software.
      2. Create a list of action items to bring into the next round of contract negotiations with that vendor and identify a start date to begin reviewing these items.

      Define process for contract renewals and additional procurement scenarios

      Associated Activity icon 2.1.6 Build additional procurement workflows

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      Build procurement workflows and define policies and procedures for additional purchasing scenarios beyond new contracts.

      This may include:

      1. Contract renewals
      2. Single purchase, non-contract procurement
      3. Adding to contracts

      Use the sample workflows in the Standard Operating Procedures as a guide.

      A flowchart outlining the procurement process for 'Software Contract Renewal'.

      A flowchart outlining the procurement process for 'Software single purchase, non-contract'.

      Negotiate for value to ensure quality license agreements

      Approach negotiating from a value-first, price-second perspective.

      Contract negotiations too often come down to a question of price. While you want to avoid overpaying for licenses, a worse offense is getting a steep discount for a bundle of applications where the majority will go unused.

      Vendors will try to sell a full stack of software at a steep discount to give the illusion of value. Often organizations bite off more than they can chew. When auditors come knocking, the business may be in compliance, but being over-licensed is a dangerous state to be in. Organizations end up over-licensed and in possession of numerous “shelfware” apps that sit on the proverbial shelf collecting dust while drawing expensive maintenance and licensing fees from the business.
      • Pressure from the business is also an issue. Negotiations can be rushed in an effort to fulfill an immediate need.
      • Make sure you clearly outline the level of compliance expected from the vendor.
      • Negotiate reduced-fee software support services. Your Service Desk can already handle the bulk of requests, and investing in a mature Service Desk will provide more lasting value than paying for expensive maintenance and support services that largely go unused.

      Learn to negotiate effectively to optimize contract renewals

      Leverage Info-Tech’s research, Master Contract Review and Negotiation for Software Agreements, to review your software contracts to leverage your unique position during negotiations and find substantial cost savings.

      This blueprint includes the following tools and templates:

      • RASCI Chart
      • Vendor Communication Management Plan
      • Software Business Use Case Template
      • SaaS TCO Calculator
      • Software Terms & Conditions Evaluation Tool
      • Software Buyer’s Checklist
      • Controlled Vendor Communications Letter
      • Key Vendor Fiscal Year End Calendar
      • Contract Negotiation Tactics Playbook

      Step 2.2 Receive and deploy software

      Phase 2:
      Procure, Receive & Deploy
      This step will walk you through the following activities:This step involves the following participants:

      2.1

      Request & Procure
      • 2.2.1 Identify storage locations for software information and media
      • 2.2.2 Design the workflow for receiving software
      • 2.2.3 Design and document the deployment workflow(s)
      • 2.2.4 Create a list of pre-approved, approved, and unapproved software titles
      • 2.2.5 Document the request and deployment process for non-standard software requests
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team
      • Purchasing (optional)
      • Service Desk Manager (optional)
      • Operations (optional)
      • Release & Deployment manager (optional)

      2.2

      Receive & Deploy

      Step Outcomes

      • A strategy for storing software information and media in the ITAM database and DML
      • A documented workflow for the software receiving process
      • Documented process workflows for software requests and deployment, including for large quantities of software
      • A list of pre-approved, approved, and unapproved software titles for deployment
      • A process for responding to non-standard software requests

      Verify product and information upon receipt

      Upon receipt of procured software:

      • Verify that the product is correct
      • Reconcile with purchase record to ensure the order has been completed
      • Verify that the invoice is correct
      • Update financial information such as budget and accounting records
      • Update ITAM database to show status as received
      • Record/attach license keys and software codes in ITAM database
      • Attach relevant documents to record in the ITAM database (license reports, invoices, end-user agreement, etc.)
      • Download and store any installation files, DVDs, and CDs
      • Once software has been installed, verify license is matched to discovered installed software within the ITAM database

      Info-Tech Best Practice

      While most software will be received through email and download, in some cases physical software may be received through courier or mail. Ensure processes and procedures are defined for both cases.

      Establish a secure repository for licenses and documentation

      All licenses, documentation, and digital media for authorized and supported software should be collected and stored in a central, secure location to minimize risk of theft, loss, or unauthorized installation or duplication of software.

      Where to store software data?

      The ITAM database should contain an up-to-date record of all software assets, including their associated:

      • Serial numbers
      • License keys and codes
      • Contracts and agreements

      The database allows you to view software that is installed and associated licenses.

      A definitive media library (DML) is a single logical storage area, which may consist of one or more locations in which definitive authorized versions of all software configuration items are securely stored and protected.

      The DML consists of file storage as well as physical storage of CDs and DVDs and must be continually updated to contain the latest information about each configuration item.

      The DML is used to organize content and link to automated deployment to easily install software.

      Use a definitive media library (DML) to assist in storage of software packages for deployment

      The DML will usually contain the most up-to-date versions to minimize errors created by having unauthorized, old, or problematic software releases being deployed into the live IT environment. The DML can be used for both full-packed product (FPP) software and in-house developed software, providing formalized data around releases of in-house software.

      The DML should consist of two main storage areas:

      1. Secure file storage
      2. Secure physical storage for any master CD/DVDs

      Additional Recommendations:

      • The process of building, testing, adapting, and final pre-production testing should provide your IT department with a solid final deployment package, but the archive will enable you to quickly pull in a previous version if necessary.
      • When upgrading software packages to include new patches or configurations, use the DML to ensure you're referencing a problem-free version.
      • Include the DML in your disaster recovery plan (DRP) and include testing of the DML as part of your DRP testing. If you need to rebuild servers from these files, offsite, you'll want to know your backup DML is sound.

      Ensure you have a strategy to create and update your DML

      Your DML should have a way to separate archived, new, and current software to allow for optimal organization of files and code, to ensure the correct software is installed, and to prepare for automated deployment through the service catalog.

      New software hasn’t been tested yet. Make it available for testing, but not widely available.

      Keep a record for archived software, but do not make it available for install.

      Current software is regularly used and should be available for install.

      Deployment

      • Are you using tools to integrate with the DML for deployment?
      • Store files that are ready for automated deployment in a separate location.

      Identify storage locations for software information and media

      Associated Activity icon 2.2.1 Identify software storage locations

      Participants: Asset Manager, IT Director

      Document: Document in the Standard Operating Procedures.

      1. Identify storage locations for asset data that is received (i.e. ITAM database, DML).
      2. Identify information that should be stored with each asset (i.e. license, serial number, invoice, end-user license agreement) and where this information should be stored.
      3. Identify fields that should be populated in the DML for each record:
        • Product name
        • Version
        • Description
        • Authorized by
        • Received by/date
        • Configuration item on which asset is installed
        • Media
        • Physical and backup locations
        • Verified by/date

      Define the standard process for receiving software

      Define the following in your receiving process:

      • Process for software received by email/download
      • Process for physical material received at Service Desk
      • Information to be recorded and where
      • Process following discrepancy of received software
      A flowchart outlining the standard process for receiving software. There are two levels, at the top is 'Desktop Support Team' and the bottom is 'Procurement'. It begins in 'Desktop Support Team' with 'Received at Service Desk' or 'Receive by email/download'. If the reconciliation is correct it eventually moves on to 'Fulfill service request, deliver and close ticket'. If the reconciliation is not correct it moves to 'Contact vendor with discrepancy details' in 'Procurement'. If a return is required 'Repackage and ship', or if not 'Notify Desktop Support Team of resolution'.

      Design the workflow for receiving software

      Associated Activity icon 2.2.2 Design the workflow for receiving software

      Participants: Asset Manager, Purchasing, Service Desk Manager, Operations (optional)

      Document: Document in the Standard Operating Procedures.

      Option 1: Whiteboard

      1. Discuss the workflow and draw it on the whiteboard.
      2. Assess whether you are using the best workflow. Modify it if necessary.
      3. Use the sample workflow from this step as a guide if starting from scratch.
      4. Engage the team in refining the process workflow.
      5. Transfer data to Visio and add to the SOP.

      Option 2: Tabletop Exercise

      1. Distribute index cards to each member of the team.
      2. Have each person write a single task they perform on the index card. Be granular. Include the title or the name of the person responsible.
      3. Mark cards that are decision points. Use a card of a different color or use a marker to make a colored dot.
      4. Arrange the index cards in order, removing duplicates.
      5. Assess whether you are using the best workflow. Engage the team to refine it if necessary.
      6. Transfer data to Visio and add to the SOP.

      Build release management into your software deployment process

      A sound software deployment process is tied to sound release management practices.

      Releases: A collection of authorized changes to an IT service. Releases are divided into:

      • Major software releases/upgrades: Normally containing large areas of new functionality, some of which may make intervening fixes to redundant problems.
      • Minor software releases/upgrades: Normally containing small enhancements and fixes, some of which may have already been issued as emergency fixes.
      • Emergency software fixes: Contain the corrections to a small number of known problems.

      Ensure that release management processes work with SAM processes:

      • If a release will impact licensing, the SAM manager must be made aware to make any necessary adjustments.
      • Deployment models should be in line with SAM strategy (i.e. is software rolled out to everyone or individually when upgrades are needed?).
      • How will user requests for upgrades be managed?
      • Users should be on the same software version to ensure file compatibility and smooth patch management.
      • Ideally, software should be no more than two versions back.

      Document the process workflow for software deployment

      Define the process for deploying software to users.

      Include the following in your workflow:

      • All necessary approvals
      • Source of software
      • Process for standard vs. non-standard software requests
      • Update ITAM database once software has been installed with license data and install information
      A flowchart outlining the process workflow for software deployment. There are four levels, at the top is 'Business', then 'Desktop Support Team', 'Procurement', and the bottom is 'Asset Manager'. It begins in 'Business' with 'Request for software', and if it is approved by the manager it moves to 'Check DB: Can a volume serial # be used?' in 'Desktop Support Team'. If yes, it eventually moves on to 'Close ticket' on the same level, if not it eventually moves to 'Initiate procurement process' in 'Procurement', 'Initiate receiving process' in 'Asset Manager', and finally to 'Run quarterly license review to purchase volume licenses'.

      Large-scale software rollouts should be run as projects

      Rollouts or upgrades of large quantities of software will likely be managed as projects.

      These projects should include project plans, including resources, timelines, and detailed procedures.

      Define the process for large-scale deployment if it will differ from the regular deployment process.

      A flowchart outlining large-scale software rollouts. There are three levels, at the top is 'IT Procurement', then 'Asset Manager', and the bottom is 'Software Packager'. It begins in 'IT Procurement' with 'Project plan approved', and if a bid is not required it skips to 'Sign contract/Create purchase order'. This eventually moves to 'Receive access to eLicense site/receive access to new product' in 'Asset Manager', and either to 'Approve invoice for payment, forward to accounting' on the same level or to 'Download software, license keys' in 'Software Packager' then eventually to 'Deploy'.

      Design and document the deployment workflow(s)

      Associated Activity icon 2.2.3 Document deployment workflows for desktop and large-scale deployment

      Participants: Asset Manager, Service Desk Manager, Release & Deployment Manager

      Document: Document in the Standard Operating Procedures.

      1. Outline each step in the process of software deployment using notecards or on a whiteboard. Be as granular as possible. On each card, describe the step and the individual responsible for each step.
        • Be sure to identify the type of release for standard software releases and patches.
        • Additionally, identify how additional software outside the scope of the base image will be addressed.
      2. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
      3. Examine each challenge or pain point. Discuss whether there is a clear solution to the problem. If so, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, considering people, processes, and available technology.
      4. Document separately the process for large-scale software deployment if required.

      Develop standards to streamline your software estate

      Software should be approved and deployed based on approved standards to minimize over-deployed software and manage costs appropriately. A list of standard software improves the efficiency of the software approval process.

      • Pre-approved titles include basic platforms like Office or Adobe Reader that are often available in enterprise-wide license packages.
      • Approved titles include popular titles with license numbers that need to be managed on a role-by-role basis. For example, if most of your marketing team uses the Adobe Creative Suite, a user still needs to get approval before they can get a license.
      • Unapproved titles are managed on a case-by-case basis and are up to the discretion of the asset manager and other involved parties.

      Additionally, create a list of unauthorized software including titles not to be installed under any circumstances. This list should be designed with feedback from your end users and technical support staff. Front-line knowledge is crucial to identifying which titles are causing major problems.

      Create a list of pre-approved, approved, and unapproved software titles

      Associated Activity icon 2.2.4 Determine software categories for deployment

      Participants: IT Director, Asset Manager, Purchasing (optional), Service Desk Manager (optional), Release & Deployment Manager (optional)

      Document: Document in the Standard Operating Procedures.

      1. Define software categories that will be used to build software standards.
      2. Include definitions of each category.
      3. Add examples of software to each category to begin building list of approved software titles for deployment.

      Use the following example as a guide.

      Category Definition Software titles
      Pre-approved/standard
      • Supported and approved for install for all end users
      • Included on most, if not all devices
      • Typically installed as a base image
      • Microsoft Office (Outlook, Word, Excel, PowerPoint)
      • Adobe Reader
      • Windows
      Approved by role
      • Supported and approved for install, but only for certain groups of end users
      • Popular titles with license numbers that need to be managed on a role-by-role basis
      • Pre-approved for purchase with business manager’s approval
      • Adobe Creative Cloud Suite
      • Adobe Acrobat Pro
      • Microsoft Visio
      Unapproved/requires review
      • Not previously approved or installed by IT
      • Special permission required for installation based on demonstrable business need
      • Managed on a case-by-case basis
      • Up to the discretion of the asset manager and other involved parties
      • Dynamics
      • Zoom Text
      • Adaptive Insights
      Unauthorized
      • Not to be installed under any circumstances
      • Privately owned software
      • Pirated copies of any software titles
      • Internet downloads

      Define the review and approval process for non-standard software

      Software requiring review will need to be managed on a case-by-case basis, with approval dependent on software evaluation and business need.

      The evaluation and approval process may require input from several parties, including business analysts, Security, technical team, Finance, Procurement, and the manager of the requestor’s department.

      A flowchart outlining the review and approval process for non-standard software. There are five levels, at the top is 'Business Analyst/Project Manager', then 'Security Team', 'Technical Team', 'Financial & Contract Review' and the bottom is 'Procurement'. It begins in 'Business Analyst/Project Manager' with 'Request for non-standard software', and if the approved product is available it moves to 'Evaluate tool for security, data, and privacy compliance' in 'Security Team'. If more evaluation is necessary it moves to 'Evaluate tool for infrastructure and integration requirements' in 'Technical Team', and then 'Evaluate terms and conditions' in 'Financial & Contract Review'. At any point in the evaluation process it can move back to the 'Business Analyst/Project Manager' level for 'Assemble requirements details', and finally down to the 'Procurement' level for 'Execute purchase'.

      Document the request and deployment process for non-standard software

      Associated Activity icon 2.2.5 Document process for non-standard software requests

      Participants: Asset Manager, Service Desk Manager, Release & Deployment Manager

      Document: Document in the Standard Operating Procedures.

      Define the review and approval process for non-standard software requests.

      Use the workflow on the previous slide as a guide to map your own workflow process and document the steps in the Standard Operating Procedures.

      The following assessments may need to be included in the process:

      • Functionality and use requirements: May include suggestion back to the business before proceeding any further to see if similar, already approved software could be used in its place.
      • Technical specifications: Cloud, data center, hardware, backups, integrations (Active Directory, others), file, and program compatibility.
      • Security: Security team may need to assess to ensure nothing will install that will compromise data or systems security.
      • Privacy policy: Security and compliance team may need to evaluate the solution to ensure data will be secured and accessed only by authorized users.
      • Terms and conditions: The contracts team may evaluate terms and conditions to ensure contracts and end-user agreements do not violate existing standards.
      • Accessibility and compliance: Software may be required to meet accessibility requirements in accordance with company policies.

      BMW deployed a global data centralization program to achieve 100% license visibility

      Logo for BMW.

      Case Study

      Industry: Financial Services
      Source: SAM Summit 2014

      Challenge

      BMW is a large German automotive manufacturer that employs over 100,000 people. It has over 7,000 software products deployed across 106,000 clients and servers in over 150 countries.

      When the global recession hit in 2008, the threat of costly audits increased, so BMW decided to boost its SAM program to cut licensing costs. It sought to centralize inventory data from operations across the globe.

      Solution

      A new SAM office was established in 2009 in Germany. The SAM team at BMW began by processing all the accumulated license and installation data from operations in Germany, Austria, and the UK. Within six months, the team had full visibility of all licenses and software assets.

      Compliance was also a priority. The team successfully identified where they could make substantial reductions in support and maintenance costs as well as remove surplus costs associated with duplicate licensing.

      Results

      BMW overcame a massive data centralization project to achieve 100% visibility of its global licensing estate, an incredible achievement given the scope of the operation.

      BMW experienced efficiency gains due to transparency and centralized management of licenses through the new SAM office.

      Additionally, internal investment in training and technical knowledge has helped BMW continuously improve the program. This has resulted in ongoing cost reductions for the manufacturer.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.5

      Sample of activity 2.1.5 'Build software procurement workflow for new contracts'. Build software procurement workflow for new contracts

      Use the sample workflow to document your own process for procurement of new software contracts.

      2.2.4

      Sample of activity 2.2.4 'Create a list of pre-approved, approved, and unapproved software titles'. Create a list of pre-approved, approved, and unapproved software titles

      Build definitions of software categories to inform software standards and brainstorm examples of each category.

      Phase 2 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Procure, receive, and deploy

      Proposed Time to Completion (in weeks): 6
      Step 2.1: Request and procureStep 2.2: Receive and deploy
      Start with an analyst kick-off call:
      • Define standards for software requests
      • Build procurement policy
      • Define procurement processes
      Review findings with analyst:
      • Build processes for software receiving
      • Build processes for software requests and deployment
      • Define process for non-standard requests
      Then complete these activities…
      • Determine software standards
      • Define procurement policy
      • Identify authorization thresholds
      • Build procurement workflows for new contracts and renewals
      Then complete these activities…
      • Identify storage locations for software information
      • Design workflow for receiving software
      • Design workflow for software deployment
      • Create a list of approved and non-standard requests
      • Define process for non-standard requests
      With these tools & templates:
      • Standard Operating Procedures
      With these tools & templates:
      • Standard Operating Procedures

      Phase 3: Manage, Redeploy, and Retire

      Step 3.1 Manage and maintain software contracts

      Phase 3:
      Manage, Redeploy & Retire
      This step will walk you through the following activities:This step involves the following participants:

      3.1

      Manage & Maintain Software
      • 3.1.1 Define process for conducting software inventory
      • 3.1.2 Define policies for software maintenance and patches
      • 3.1.3 Document your patch management policy
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team
      • Release Manager (optional)
      • Security (optional)

      3.2

      Harvest, Redeploy, or Retire

      Step Outcomes

      • A process for conducting regular software inventory checks and analyzing the data to continually manage software assets and license compliance.
      • An understanding of software maintenance requirements
      • A policy for conducting regular software maintenance and patching
      • A documented patch management policy

      Manage your software licenses to decrease your risk of overspending

      Many organizations fail to track their software inventory effectively; the focus often remains on hardware due to its more tangible nature. However, annual software purchases often account for a higher IT spend than annual hardware purchases, so it’s important to track both.

      Benefits of managing software licenses

      • Better control of the IT footprint. Many companies already employ hardware asset management, but when they employ SAM, there is potential to save millions of dollars through optimal use of all technology assets.
      • Better purchasing decisions and negotiating leverage. Enhanced visibility into actual software needs means not only can companies procure and deploy the right increments of software in the right areas, but they can also do so more cost-effectively through tools such as volume purchase agreements or bundled services.
      • No refund policy combined with shelfware (software that sits unused “on the shelf”) is where software companies make their money.
      • Managing licenses will help prevent costly audit penalties. Special attention should be paid to software purchased from large vendors such as Microsoft, Oracle, Adobe, SAP, or IBM.

      Maintain a comprehensive, up-to-date software inventory to manage licenses effectively

      A clearly defined process for inventory management will reduce the risk of over buying licenses and falling out of compliance.

      • A detailed software inventory and tracking system should act as a single point of contact for all your license data.
      • Maintain a comprehensive inventory of installed software through complete and accurate records of all licenses, certifications, and software purchase transactions, storing these in a secure repository.
      • Periodically review installed software and accompanying licenses to ensure only legal and supported software is in use and to ensure ongoing compliance with the software management policy.

      Info-Tech Best Practice

      Have and maintain a list of supported software to guide what new software will be approved for purchase and what current software should be retained on the desktops, servers, and other processing devices.

      Conduct a baseline inventory of deployed software to know what you have

      You have to know what you have before you can manage it.

      A baseline inventory tells you exactly what software you have deployed and where it is being used. This can help to determine how to best optimize software and license usage.

      A software inventory will allow you to:

      • Identify all software residing on computers.
      • Compare existing software to the list of supported software.
      • Identify and delete illegal or unsupported software.
      • Identify and stop software use that violates license agreements, copyright law, or organizational policies.

      Two methods for conducting a software inventory:

      1. If you have several computers to analyze, use automated tools to conduct inventory for greater accuracy and efficiency. Software inventory or discovery tools scan installed software and generate inventory reports, while asset management tools will help you manage that data.
      2. Manual inventory may be possible if your organization has few computers.

      How to conduct a manual software inventory:

      1. Record serial number of device being analyzed.
      2. Record department and employee to whom the computer is assigned.
      3. Inspect contents of hard drive and/or server to identify software as well as hidden files and directories.
      4. Record licensing information for software found on workstation and server.
      5. Compare findings with list of supported software and licenses stored in repository.

      Keep the momentum going through regular inventory and licensing checks

      Take preventive action to avoid unauthorized software usage through regular software inventory and license management:

      • Regularly update the list of supported software and authorized use.
      • Monitor and optimize software license usage.
      • Continually communicate with and train employees around software needs and policies.
      • Maintain a regular inventory schedule to keep data up to date and remain compliant with licensing requirements – your specific schedule will depend on the size of the company and procurement schedule.
      • Conduct random spot inventories – even if you are using a tool, periodic spot checks should still be performed to ensure accuracy of inventory.
      • Periodically review software procurement records and ensure procurement process is being followed.
      • Continuously monitor software installations on networked computers through automated tools.
      • Ensure software licensing documentation and data is secure.

      Define process for conducting software inventory

      Associated Activity icon 3.1.1 Define process for regular software inventory

      Participants: IT Director, Asset Manager

      Document: Document in the Standard Operating Procedures.

      1. If a baseline software inventory has not been conducted, discuss and document a plan for completing the inventory.
        • Will the inventory be conducted manually or through automated tools?
        • If manually, what information will be collected and recorded? Which devices will be analyzed? Where will data be stored?
        • If automatically, which tools will be used? Will any additional information need to be collected? Who will have access to the inventory?
        • When will the inventory be conducted and by whom?
          • Monthly inventory may be required if there is a lot of change and movement, otherwise quarterly is usually sufficient.
      2. Document how inventory data will be analyzed.
        • How will data be compared against supported software?
        • How will software violations be addressed?
      3. Develop a plan for continual inventory spot checks and maintenance.
        • How often will inventory be conducted and/or analyzed?
        • How often will spot checks be performed?

      Don’t forget that software requires maintenance

      While maintenance efforts are typically focused around hardware, software maintenance – including upgrades and patches – must be built into the software asset management process to ensure software remains compliant with security and regulatory requirements.

      Software maintenance guidelines:

      • Maintenance agreements should be stored in the ITAM database.
      • Software should be kept as current as possible. It is recommended that software remain no more than two versions off.
      • Unsupported software should be uninstalled or upgraded as required.
      • Upgrades should be tested, especially for high-priority or critical applications or if integrated with other applications.
      • Change and release management best practices should be applied for all software upgrades and patches.
      • A process should be defined for how often patches will be applied to end-user devices.

      Integrate patch management with your SAM practice to improve security and reduce downtime

      The integration between patch management and asset management is incredibly valuable from a technology point of view. IT asset management (ITAM) tools create reports on the characteristics of deployed software. By combining these reports with a generalized software updater, you can automate most simple patches to save your team’s efforts for more-critical incidents. Usage reports can also help determine which applications should be reviewed and removed from the environment.

      • In recent years, patch management has grown in popularity due to widespread security threats, the resultant downtime, and expenses associated with them.
      • The main objective of patch management is to create a consistently configured environment that is secure against known vulnerabilities in operating systems and application software.

      Assessing new patches should include questions such as:

      • What’s the risk of releasing the patch? What is the criticality of the system? What end users will be affected?
      • How will we manage business disruption during an incident caused by a failed patch deployment?
      • In the event of service outage as a result of a failed patch deployment, how will we recover services effectively in business priority order?
      • What’s the risk of expediting the patch? Of not releasing the patch at all?

      Define policies for software maintenance and patches

      Associated Activity icon 3.1.2 Define software maintenance and patching policies

      Participants: IT Director, Asset Manager, Release Manager (optional), Security (optional)

      Document: Document in the Standard Operating Procedures.

      Software maintenance:

      Review the software maintenance guidelines in this section and in the SOP template. Discuss each policy and revise and document in accordance with your policies.

      Patch management:

      Discuss and document patch management policies:

      1. How often will end-user devices receive patches?
      2. How often will servers be patched?
      3. How will patches be prioritized? See example below.
        • Critical patches will be applied within two days of release, with testing prioritized to meet this schedule.
        • High-priority patches will be applied within 30 days of release, with testing scheduled to meet this requirement.
        • Normal-priority patches will be evaluated for appropriateness and will be installed as needed.

      Document your patch management policy

      Supporting Tool icon 3.1.3 Use the Patch Management Policy template to document your policy

      The patch management policy helps to ensure company computers are properly patched with the latest appropriate updates to reduce system vulnerability and to enhance repair application functionality. The policy aids in establishing procedures for the identification of vulnerabilities and potential areas of functionality enhancements, as well as the safe and timely installation of patches. The patch management policy is key to identifying and mitigating any system vulnerabilities and establishing standard patch management practices.

      Use Info-Tech’s Patch Management Policy template to get started.

      Sample of the 'Patch Management Policy' template.

      Step 3.2 Harvest, Redeploy, or Retire Software

      Phase 3:
      Manage, Redeploy & Retire
      This step will walk you through the following activities:This step involves the following participants:

      3.1

      Manage & Maintain Software
      • 3.2.1 Map your software license harvest and reallocation process
      • 3.2.2 Define the policy for retiring software
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team

      3.2

      Harvest, Redeploy, or Retire

      Step Outcomes

      • A defined process for harvesting and reallocating unused software licenses
      • A defined policy for how and when to retire unused or outdated software

      Harvest and reallocate software to optimize license usage

      Using a defined process for harvesting licenses will yield a crop of savings throughout the organization.

      Unused software licenses are present in nearly every organization and result in wasted resources and software spend. Recycling and reharvesting licenses is a critical process within software asset management to save your organization money.

      Licensing Recycling

      When computers are no longer in use and retired, the software licenses installed on the machines may be able to be reused.

      License recycling involves reusing these licenses on machines that are still in use or for new employees.

      License Harvesting

      License harvesting involves more actively identifying machines with licenses that are either not in use or under utilized, and recovering them to be used elsewhere, thus reducing overall software spend on new licenses.

      Use software monitoring data to identify licenses for reallocation in alignment with policies and agreements

      1. Monitor software usage
        Monitor and track software license usage to gain a clear picture of where and how existing software licenses are being used and identify any unused or underused licenses.
      2. Identify licenses for reharvesting
        Identify software licenses that can be reharvested and reallocated according to your policy.
      3. Uninstall software
        Notify user, schedule a removal time if approved, uninstall software, and confirm it has been removed.
      4. Reallocate license when needed

      Sources of surplus licenses for harvest:

      • Projects that required a license during a particular time period, but now do not require a license (i.e. the free version of the software will suffice)
      • Licenses assigned to users no longer with the organization
      • Software installed on decommissioned hardware
      • Installed software that hasn’t been used by the user in the last 90 days (or other defined period)
      • Over-purchased software due to poorly controlled software request, approval, or provisioning processes

      Info-Tech Insight

      Know the stipulations of your end-user license agreement (EULA) before harvesting and reallocating licenses. There may be restrictions on how often a license can be recycled in your agreement.

      Create a defined process for software license harvesting

      Define a standard reharvest timeline. For example, every 90 days, your SAM team can perform an internal audit using your SAM tool to gather data on software usage. If a user has not used a title in that time period, your team can remove that title from that user’s machine. Depending on the terms and conditions of the contract, the license can either be retired or harvested and reallocated.

      Ensure you have exception rules built in for software that’s cyclical in its usage. For example, Finance may only use tax software during tax season, so there’s no reason to lump it under the same process as other titles.

      It’s important to note that in addition to this process, you will need a software usage policy that supports your license harvest process.

      The value of license harvesting

      • Let’s say you paid for 1,000 licenses of a software title at a price of $200 per license.
      • Of this total, 950 have been deployed, and of that total, 800 are currently being used.
      • This means that 16% of deployed licenses are not in use – at a cost of $30,000.
      • With a defined license harvest process, this situation would have been prevented.

      Build a workflow to document the software harvest process

      Include the following in your process:

      • How will unused software be identified?
      • How often will usage reports be reviewed?
      • How will the user be notified of software to be removed?
      • How will the software be removed?
      A flowchart documenting the software harvest process. There are two levels, at the top is 'IT Asset Manager', and the bottom is 'Desktop Support Team'. It begins in 'IT Asset Manager' with 'Create/Review Usage Report', and if the client agrees to removal it moves to 'License deactivation required?' in 'Desktop Support Team'. Eventually you 'Close ticket' and it moves back up to 'Discovery tool will register change automatically' in 'IT Asset Manager'.

      Map your software license harvest and reallocation process

      Associated Activity icon 3.2.1 Build license harvest and reallocation workflow

      Participants: IT Director, Asset Manager, Service Desk Manager

      Document: Document in the Standard Operating Procedures.

      1. Outline each step in the process of software harvest and reallocation using notecards or a whiteboard. Be as granular as possible. On each card, describe the step and the individual responsible for each step.
      2. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
      3. Examine each challenge or pain point. Discuss whether there is a clear solution to the problem. If so, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, considering people, processes, and available technology.
      4. Use the sample workflow on the previous slide as a guide if needed.

      The same flowchart documenting the software harvest process from the previous section.

      Improve your software retirement process to drive savings for the whole business

      Business Drivers for Software Disposal

      • Cost Reduction
        • Application retirement allows the application and the supporting hardware stack to be decommissioned.
        • This eliminates recurring costs such as licensing, maintenance, and application administration costs, representing potentially significant savings
      • Consolidation
        • Many legacy applications are redundant systems. For example, many companies have ten or more legacy financial systems from mergers/acquisitions.
        • Systems can be siloed, running incompatible software. Moving data to a common accessible repository streamlines research, audits, and reporting.
      • Compliance
        • An increased focus on regulations places renewed emphasis on e-discovery policies. Keeping legacy applications active just to retain data is an expensive proposition.
        • During application retirement, data is classified, assigned retention policies, and disposed of according to data/governance initiatives.
      • Risk Mitigation
        • Relying on IT to manage legacy systems is problematic. The lack of IT staff familiar with the application increases the potential risk of delayed responses to audits and e-discovery.
        • Retiring application data to a common platform lets you leverage skills you have current investments in. This enables you to be responsive to audit or litigation results.

      Retire your outdated software to decrease IT spend on redundant applications

      Benefits of software retirement:

      1. Assists the service desk in not having to support every release, version, or edition of software that your company might have used in the past.
      2. Stay current with product releases so your company is better placed to take advantage of improvements built-in to such products, rather than being limited by the lack of a newly introduced function.
      3. Removing software that is no longer of commercial benefit can offer a residual value through assets.

      Consequences of continuing to support outdated software:

      • Budgets are tied up to support existing applications and infrastructure, which leaves little room to invest in new technologies that would otherwise help grow business.
      • Much of this software includes legacy systems that were acquired or replaced when new applications were deployed. The value of these outdated systems decreases with every passing year, yet organizations often continue to support these applications.
        • Fear of compliance and data access are the most common reasons.
      • Unfortunately, the cost of doing so can consume over 50% of an overall IT budget.

      The solution to this situation is to retire outdated software.

      “Time and time again, I keep hearing stories from schools on how IT budgets are constantly being squeezed, but when I dig a little deeper, little or no effort is being made on accounting for software that might be on the kit we are taking away.” (Phil Goldsmith, Managing Director – ScrumpyMacs)

      Define the policy for retiring software

      Associated Activity icon 3.2.2 Document process for software retirement

      Participants: IT Director, Asset Manager, Operations

      Document: Document in the Standard Operating Procedures.

      1. Discuss and document the process for retiring software that has been deemed redundant due to changing business needs or an improvement in competitive options.
      2. Consider the following:
        • What criteria will determine when software is suited for retirement?
        • The contract should always be reviewed before making a decision to ensure proper notice is given to the vendor.
        • Notice should be provided as soon as possible to ensure no additional billing arrives for renewals.
        • How will software be removed from all devices? How soon must the software be replaced, if applicable?
        • How long will records be archived in the ITAM database?
      3. Document decisions in the Standard Operating Procedures.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.2

      Sample of activity 3.1.2 'Define policies for software maintenance and patches'. Define policies for software maintenance and patches

      Discuss best practices and define policies for conducting regular software maintenance and patching.

      3.2.1

      Sample of activity 3.3.1 'Assess the maturity of audit management processes and policies'. Map your software license harvest and reallocation process

      Build a process workflow for harvesting and reallocating unused software licenses.

      Phase 3 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Manage, redeploy, and retire

      Proposed Time to Completion (in weeks): 4
      Step 3.1: Manage and maintain softwareStep 3.2: Harvest, redeploy, or retire
      Start with an analyst kick-off call:
      • Define a process for conducting software inventory
      • Define a policy for software maintenance
      • Build a patch management policy
      Review findings with analyst:
      • Build a process for harvesting and reallocating software licenses
      • Define a software retirement policy
      Then complete these activities…
      • Define process for conducting software inventory
      • Define policies for software maintenance
      • Document patch management policy
      Then complete these activities…
      • Map software harvest and reallocation process
      • Define software retirement policy
      With these tools & templates:
      • Standard Operating Procedures
      • Patch Management Policy
      With these tools & templates:
      • Standard Operating Procedures

      Phase 4: Build Supporting Processes & Tools

      Visa used an internal SAM strategy to win the audit battle

      Logo for VISA.

      Case Study

      Industry: Financial Services
      Source: SAM Summit 2014

      Challenge

      The overarching goal of any SAM program is compliance to prevent costly audit fines. The SAM team at Visa was made up of many individuals who were former auditors.

      To deal with audit requests from vendors, “understand how auditors do things and understand their approach,” states Joe Birdsong, SAM Director at Visa.

      Vendors are always on the lookout for telltale signs of a lucrative audit. For Visa, the key was to understand these processes and learn how to prepare for them.

      Solution

      Vendors typically look for the following when evaluating an organization for audit:

      1. A recent decrease in customer spend
      2. How easy the licensed software is to audit
      3. Organizational health

      Ultimately, an audit is an attack on the relationship between the vendor and organization. According to Birdsong: “Maybe they haven’t really touched base with your teams and had good contact and relationship with them, and they don’t really know what’s going on in your enterprise.”

      Results

      By understanding the motivations behind potential audits, Visa was able to form a strategy to increase transparency with the vendor.

      Regular data collection, almost real-time reporting, and open, quick communication with the vendor surrounding audits made Visa a low-risk client for vendors.

      Buy-in from management is also important, and the creation of an official SAM strategy helps maintain support. Thanks to its proactive SAM program, Visa saved $200 million in just three years.

      Step 4.1 Ensure compliance for audits

      Phase 4:
      Build supporting processes & tools
      This step will walk you through the following activities:This step involves the following participants:

      4.1

      Compliance & audits
      • 4.1.1 Define and document the internal audit process
      • 4.1.2 Define and document the external audit process
      • 4.1.3 Prepare an audit scoping email template
      • 4.1.4 Prepare an audit launch email template
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team

      4.2

      Communicate & build roadmap

      Step Outcomes

      • An understanding of the audit process and importance of audit preparation
      • A defined process for conducting regular internal audits to prepare for and defend against external audits
      • A strategy and documented process for responding to external audit requests

      Take a lifecycle approach to your software compliance process

      Internal audits are an effective way for organizations to regularly assess their licensing position in preparation for an audit.

      1. Gather License Data
        Use your SAM tool to run a discovery check to determine the current state of your software estate.
      2. Improve Data Quality
        Scan the data for red flags. Improve its completeness, consistency, and quality.
      3. Identify Audit Risks
        Using corrected license data, examine your reports and identify areas of risk within the organization.
      4. Identify priority titles
        Determine which titles need attention first by using the output of the license rationalization step.
      5. Reconcile to eliminate gaps
        Ensure that the correct number of licenses are deployed for each title.
      6. Draft Vendor Response
        Prepare response to vendor for when an audit has been requested.

      Improve audit response maturity by leveraging technology and contract data

      By improving your software asset management program’s maturity, you will drive savings for the business that go beyond the negotiating table.

      Recognize the classic signs of each stage of audit response maturity to identify where your organization currently stands and where it can go.

      • Optimized: Automated tools generate compliance, usage, and savings reports. Product usage reports and alerts in place to harvest and reuse licenses. Detailed savings reports provided to executive team.
      • Proactive: Best practices enforced. Compliance positions are checked quarterly, and compliance reports are used to negotiate software contracts.
      • Reactive: Best practices identified but unused. Manual tools still primarily in use. Compliance reports are time-consuming and often inaccurate.
      • Chaotic: Purchases are ad hoc and transaction based. Minimal tracking in place, leading to time-consuming manual processes.

      Implement a proactive internal audit strategy to defend against external audits

      Audits – particularly those related to software – have been on the rise as vendors attempt to recapture revenue.

      Being prepared for an audit is critical. Internal preparation will not only help your organization reduce the risk associated with an audit but will also improve daily operations through focusing on diligent documentation and data collection.

      Conducting routine internal audits will help prepare your organization for the real deal and may even prevent the audit from happening altogether. Hundreds of thousands of dollars can be saved through a proactive audit strategy with routine documentation in place.

      In addition to the fines incurred from a failed audit, numerous other negative consequences can arise:

      • Multiple audits: Failing an audit makes the organization more likely to be audited again.
      • Poor perception of IT: Unless non-compliance was previously disclosed to the business, IT can be deemed responsible.
      • Punitive injunctions: If a settlement is not reached, vendors will apply for an injunction, inhibiting use of their software.
      • Inability to justify purchases: IT can have difficulty justifying the purchase of additional resources after a failed audit.
      • Disruption to business: Precious time and resources will be spent dealing with the results of the audit.

      Perform routine internal compliance reports to decrease audit risk

      The intent of an internal audit is to stop the battle from happening before it starts. Waiting for a knock at the door from a vendor can be stressful, and it can do harm beyond a costly fine.

      • Internal audits help to ensure you’re keeping track of any software changes to keep your data and licensing up to date and avoid costly surprises if an external audit is requested.
      • Identify areas where processes are breaking down and address them before there’s a potential negative impact.
      • Identify control points in processes ahead of time to more easily identify access points where information should be verified.

      “You want to get [the] environment to a level where you’re comfortable sharing information with [a] vendor. Inviting them in to have a chat and exposing numbers means there’s no relationship there where they’re coming to audit you. They only come to audit you when they know there’s a gain to be had, otherwise what’s the point of auditing?
      I want customers to get comfortable with licensing and what they’re spending, and then there’s no problem exposing that to vendors. Vendors actually appreciate that.”
      (Ben Brand, SAM Practice Manager, Insight)

      Info-Tech Insight

      “The supreme art of war is to subdue the enemy without fighting.” – Sun Tzu

      Performing routine checks on your license compliance will drastically reduce the risk that your organization gets hit with a costly fine. Maintaining transparency and demonstrating compliance will fend off audit-hungry vendors.

      Define and document the internal audit process

      Associated Activity icon 4.1.1 Document process and procedures for internal audits

      Participants: CIO and/or IT Director, Asset Manager, IT Managers

      Document: Document in the Standard Operating Procedures.

      Define and document a process for conducting internal software audits.
      Include the following:

      1. How often will audits be completed for each software published?
      2. When will audits be conducted?
      3. Who will conduct the audit? Who will be consulted?
      4. What will be included in the scope of the audit?

      Example:

      • Annual audits will be completed for each software publisher, scheduled as part of the license or maintenance agreement renewals.
      • Where annual purchases are not required, vendor audits for compliance will be conducted annually, with a date predetermined based on minimizing scheduling conflicts with larger audits.
      • Audit will be completed with input from product managers.
      • Audit will include:
        • Software compliance review: Licenses owned compared to product installed.
        • Version review: Determine if installed versions match company standards. If there is a need for upgrades, does the license permit upgrading?
        • Maintenance review: Does the maintenance match requirements for the next year’s plans and licenses in use?
        • Support review: Is the support contract appropriate for use?
        • Budget: Has budget been allocated; is there an adjustment required due to increases?

      Identify organizational warning signs to decrease audit risk

      Being prepared for an audit is critical. Internal preparation will not only help your organization reduce the risk associated with an audit but will also improve daily operations through focusing on diligent documentation and data collection.

      Certain triggers exist that indicate a higher risk of an audit occurring. It is important to recognize these warning signs so you can prepare accordingly.

      Health of organization
      If your organization is putting out fires and a vendor can sense it, they’ll see an audit as a highly lucrative exercise.

      Decrease in customer spend
      A decrease in spend means that an organization has a high chance of being under-licensed.

      License complexity
      The more complex the license, the harder it is to remain in compliance. Some vendors are infamous for their complex licensing agreements.

      Audit Strategy

      • Audits should neither be feared nor embraced.
      • An audit is an attack on your relationship with your vendor; your vendor needs to defend its best interests, but it would also rather maintain a satisfied relationship with its client.
      • A proactive approach to audits through routine reporting and transparency with vendors will alleviate all fear surrounding the audit process. It provides your vendor with compliance assurance and communicates that an audit won’t net the vendor enough revenue to justify the effort.

      Focus on three key tactics for success before responding to an audit

      Taking these due diligence steps will pay dividends downstream, reducing the risk of negative results such as release of confidential information.

      Form an Audit Team

      • Once an audit letter is received from a vendor or third party, a virtual team needs to be formed.
      • The team should be cross-functional, representing various core areas of the business.
      • Don’t forget legal counsel: they will assist in the review of audit provision(s) to determine your contractual rights and obligations with respect to the audit.

      Sign an NDA

      • An NDA should be signed by all parties, the organization, the vendor, and the auditor.
      • Don’t wait on a vendor to provide its NDA. The organization should have its own and provide it to both parties.
      • If the auditor is a third party, negotiate a three-way NDA. This will prevent data being shared with other third parties.

      Examine Contract History

      • Vendors will attempt to alter terms of contracts when new products are purchased.
      • Maintain your current agreement if they are more favorable by “grandfathering” your original agreement.
      • Oracle master level agreements are an example: master level agreements offer more favorable terms than more recent versions.

      Info-Tech Insight

      Even if you cannot get a third-party NDA signed, the negotiation process should delay the overall audit process by at least a month, buying your organization valuable time to gather license data.

      Be prepared for external audit requests with a defined process for responding

      1. Vendor-initiated audit request received and brought to attention of IT Asset Manager and CIO.
      2. Acknowledge receipt of audit notice.
      3. Negotiate timing and scope of the audit (including software titles, geographic locations, entities, and completion date).
      4. Notify staff not to remove or acquire licenses for software under audit.
      5. Gather documentation and create report of all licensed software within audit scope.
        • Include original contract, most recent contract, and any addendums, purchase receipts, or reseller invoices, and publisher documentation such as manuals or electronic media.
      6. Compare documentation to installed software according to ITAM database.
      7. Validate any unusual or non-compliant software.
      8. Complete documentation requested by auditor and review results.

      Define and document the external audit process

      Associated Activity icon 4.1.2 Define external audit process

      Participants: CIO and/or IT Director, Asset Manager, IT Managers

      Document: Document in the Standard Operating Procedures.

      Define and document a process for responding to external software audit requests.
      Include the following:

      1. Who must be notified of the audit request when it is received?
      2. When must acknowledgement of the notice be sent and by whom?
      3. What must be defined under the scope of the audit (e.g. software titles, geographic locations, entities, completion date)?
      4. What communications must be sent to IT staff and end users to ensure compliance?
      5. What documentation should be gathered to review?
      6. How will documentation be verified against data?
      7. How will unusual or non-compliant software be identified and validated?
      8. Who needs to be informed of the results?

      Control audit scope with an audit response template

      Supporting Tool icon 4.1.3 Prepare an audit scoping email template

      Use the Software Audit Scoping Email Template to create an email directed at your external (or internal) auditors. Send the audit scoping email several weeks before an audit to determine the audit’s scope and objectives. The email should include:

      • Detailed questions about audit scope and objectives.
      • Critical background information on your organization/program.

      The email will help focus your preparation efforts and initiate your relationship with the auditors.

      Control scope by addressing the following:

      • Products covered by a properly executed agreement
      • Geographic regions
      • User groups
      • Time periods
      • Specific locations
      • A subset of users’ computers
      Sample of the 'Software Audit Scoping Email Template'.

      Keep leadership informed with an audit launch email

      Supporting Tool icon 4.1.4 Prepare an audit launch email template

      Approximately a week before the audit, you should email the internal leadership to communicate information about the start of the audit. Use the Software Audit Launch Email Template to create this email, including:

      • Staffing
      • Functional requirements
      • Audit contact person information
      • Scheduling details
      • Audit report estimated delivery time

      For more guidance on preparing for a software audit, see Info-Tech’s blueprint: Prepare and Defend Against a Software Audit.

      Sample of the 'Software Audit Launch Email Template'.

      A large bank employed proactive, internal audits to experience big savings

      Case Study

      Industry: Banking
      Source: Pomeroy

      Challenge

      A large American financial institution with 1,300 banking centers in 12 states, 28,000 end users, and 108,000 assets needed to improve its asset management program.

      The bank had employed numerous ITAM tools, but IT staff identified that its asset data was still fragmented. There was still incomplete insight into what assets the banked owned, the precise value of those assets, their location, and what they’re being used for.

      The bank decided to establish an asset management program that involved internal audits to gather more-complete data sets.

      Solution

      With the help of a vendor, the bank implemented cradle-to-grave asset tracking and lifecycle management, which provided discovery of almost $80 million in assets.

      The bank also assembled an ITAM team and a dedicated ITAM manager to ensure that routine internal audits were performed.

      The team was instrumental in establishing standardization of IT policies, hardware configuration, and service requirements.

      Results

      • The bank identified and now tracks over 108,000 assets.
      • The previous level of 80% accuracy in inventory tracking was raised to 96%.
      • Nearly $500,000 was saved through asset recovery and repurposing of 600 idle assets.
      • There are hundreds of thousands of dollars in estimated savings as the result of avoiding costly penalties from failed audits thanks to proactive internal audits.

      Step 4.2 Build communication plan and roadmap

      Phase 4:
      Build supporting processes & tools
      This step will walk you through the following activities:This step involves the following participants:

      4.1

      Compliance & audits
      • 4.2.1 Develop a communication plan to convey the right messages
      • 4.2.2 Anticipate end-user questions by preparing an FAQ list
      • 4.2.3 Build a software asset management policy
      • 4.2.4 Build additional SAM policies
      • 4.2.5 Develop a SAM roadmap to plan your implementation
      • IT Director, CIO
      • IT Managers and SAM Manager
      • SAM Team

      4.2

      Communicate & build roadmap

      Step Outcomes

      • A documented communications plan for relevant stakeholders to understand the benefits and changes the SAM program will bring
      • A list of anticipated end-user questions with responses
      • Documented software asset management policies
      • An implementation roadmap

      Communicate SAM processes to gain acceptance and support

      Communication is crucial to the integration and overall implementation of your SAM program. If staff and users do not understand the purpose of processes and policies, they will fail to provide the desired value.

      An effective communication plan will:

      • Gain support from management at the project proposal phase.
      • Create end-user buy-in once the program is set to launch.
      • Maintain the presence of the program throughout the business.
      • Instill ownership throughout the business from top-level management to new hires.

      Communicate the following:

      1. Advertise successes

        • Regularly demonstrate the value of the SAM program with descriptive statistics focused on key financial benefits.
        • Share data with the appropriate personnel; promote success to obtain further support from senior management.
      2. Report and share asset data

        • Sharing detailed asset-related reports frequently gives decision makers useful data to aid in their strategy.
        • These reports can help your organization prepare for audits, adjust budgeting, and detect unauthorized software.
      3. Communicate the value of SAM

        • Educate management and end users about how they fit into the bigger picture.
        • Individuals need to know which behaviors may put the organization at risk or adversely affect data quality.

      Educate staff and end users through SAM training to increase program success

      As part of your communication plan and overall SAM implementation, training should be provided to both staff and end users within the organization.

      • ITAM solutions are complex by nature with both business process and technical knowledge required to use them correctly.
      • All facets of the business, from management to new hires, should be provided with training to help them understand their role in the program’s success.
      • Keep the message appropriate to the audience – end users don’t need to know the complete process, but will need to know policy and how to request.
      • Even after the SAM program has been fully implemented, keep employees up to date with policies and processes through ongoing training sessions for both new hires and existing employees:
        • New hires: Provide new hires with all relevant SAM policies and ensure they understand the importance of software asset management.
        • Existing employees: Continually remind them of how SAM is involved in their daily operations and inform them of any changes to policies.

      Create your communications plan to anticipate challenges, remove obstacles, and ensure buy-in

      Provide separate communications to key stakeholder groups

      Why:
      • What problems are you trying to solve?
      What:
      • What processes will it affect (that will affect me)?
      Who:
      • Who will be affected?
      • Who do I go to if I have issues with the new process?
      Three circular arrows each linking t the next in a downward daisy chain. The type arrow has 'IT Staff' in the middle, the second 'Management', and the third 'End Users' When:
      • When will this be happening?
      • When will it affect me?
      How:
      • How will these changes manifest themselves?
      Goal:
      • What is the final goal?
      • How will it benefit me?

      Develop a communication plan to convey the right messages

      Associated Activity icon 4.2.1 Develop a communication plan to convey the right messages

      Participants: CIO, IT Director, Asset Manager, Service Desk Manager

      Document: Document in the SAM Communication Plan.

      1. Identify the groups that will be affected by the SAM program.
      2. For each group requiring a communication plan, identify the following:
      3. Benefits of SAM for that group of individuals (e.g. more efficient software requests).
      4. The impact the change will have on them (e.g. change in the way a certain process will work).
      5. Communication method (i.e. how you will communicate).
      6. Timeframe (i.e. when and how often you will communicate the changes).
      7. Complete this information in a table like the one below and document in the Communication Plan.
      Group Benefits Impact Method Timeline
      Executives
      • Improved audit compliance
      • Improved budgeting and forecasting
      • Review and sign off on policies
      End Users
      • Streamlined software request process
      • Follow software installation and security policies
      IT
      • Faster access to data and one source of truth
      • Modified processes
      • Ensure audits are completed regularly

      Anticipate end-user questions by preparing an FAQ list

      Associated Activity icon 4.2.2 Prepare an FAQ list

      Document: Document FAQ questions and answers in the SAM FAQ Template.

      ITAM imposes changes to end users throughout the business and it’s normal to expect questions about the new program. Prepare your team ahead of time by creating a list of FAQs.

      Some common questions include:

      • Why are you changing from the old processes?
      • Why now?
      • What are you going to ask me to do differently?
      • Will I lose any of my software?

      The benefits of preparing a list of answers to FAQs include:

      • A reduction in time spent creating answers to questions. If you focus on the most common questions, you will make efficient use of your team’s time.
      • Consistency in your team’s responses. By socializing the answers to FAQs, you ensure that no one on your team is out of the loop and the message remains consistent across the board.

      Include policy design and enforcement in your communication plan

      • Software asset management policies should define the actions to be taken to support software asset management processes and ensure the effective and efficient management of IT software assets across the asset lifecycle.
      • Implementing asset management policies enforces the notion that the organization takes its IT assets and the management of them seriously and will help ensure the benefits of SAM are achieved.
      • Designing, approving, documenting, and adopting one set of standard SAM policies for each department to follow will ensure the processes are enforced equally across the organization.

      Info-Tech Insight

      Use policy templates to jumpstart your policy development and ensure policies are comprehensive, but be sure to modify and adapt policies to suit your corporate culture or they will not gain buy-in from employees. For a policy to be successful, it must be a living document and have participation and involvement from the committees and departments to whom it will pertain.

      Build a software asset management policy

      Supporting Tool icon 4.2.3 Document a SAM policy

      Use Info-Tech’s Software Asset Management Policy template to define and document the purpose, scope, objectives, and roles and responsibilities for your organization's software asset management program.

      The template allows you to customize policy requirements for:

      • Procurement
      • Installation and Removal
      • Maintenance
      • Mergers and Acquisitions
      • Company Divestitures
      • Audits

      …as well as consequences for non-compliance.

      Sample of the 'Software Asset Management Policy' template.

      Use Info-Tech’s policy templates to build additional policies

      Supporting Tool icon 4.2.4 Build additional SAM policies

      Asset Security Policy
      The IT asset security policy will describe your organization's approach to ensuring the physical and digital security of your IT assets throughout their entire lifecycle.

      End-User Devices Acceptable Use Policy
      This policy should describe how business tools provided to employees are to be used in a responsible, ethical, and compliant manner, as well as the consequences of non-compliance.

      Purchasing Policy
      The purchasing policy helps to establish company standards, guidelines, and procedures for the purchase of all information technology hardware, software, and computer-related components as well as the purchase of all technical services.

      Release Management Policy
      Use this policy template to define and document the purpose, scope, objectives, and roles and responsibilities for your organization's release management program.

      Internet Acceptable Use Policy
      Use this template to help keep the internet use policy up to date. This policy template includes descriptions of acceptable and unacceptable use, security provisions, and disclaimers on the right of the organization to monitor usage and liability.

      Samples of additional SAM policies, listed to the left.

      Implement SAM in a phased, constructive approach

      One of the most difficult decisions to make when implementing a SAM program is: “where do we start?”

      It’s not necessary to deploy a comprehensive SAM program to start. Build on the essentials to become more mature as you grow.

      SAM Program Maturity (highest to lowest)

      • Audits and reporting
        Gather and analyze data about software assets to ensure compliance for audits and to continually improve the business.
      • Contracts and budget
        Analyze contracts and licenses for software across the enterprise and optimize planning to enable cost reduction.
      • Lifecycle standardization
        Define standards and processes for all asset lifecycle phases from request and procurement through to retirement and redistribution.
      • Inventory and tracking
        Define assets you will procure, distribute, and track. Know what you have, where it is deployed, and keep track of contracts and all relevant data.

      Integrate your SAM program with the organization to assist its implementation

      SAM cannot perform on its own – it must be integrated with other functional areas of the organization to maintain its stability and support.

      • Effective SAM is supported by a comprehensive set of processes as part of its implementation.
      • For example, integration with the procurement team’s processes and tools is required to track software purchases to mitigate software license compliance risk.
      • Integration with Finance is required to support internal cost allocations and chargebacks.
      • Integration with the service desk is required to track and deploy software requests.

      Info-Tech Best Practice

      To integrate SAM effectively, a clear implementation roadmap needs to be designed. Prioritize “quick wins” to demonstrate success to the business early and to gain buy-in from your team. Short-term gains should be designed to support long-term goals of your SAM program.

      Sample short-term goals
      • Identify inventory classification and tool
      • Create basic SAM policies and processes
      • Implement SAM auto-discovery tools
      Sample long-term goals
      • Software contract data integration
      • Continual improvement through review and revision
      • Software compliance reports, internal audits

      Develop a SAM roadmap to plan your implementation

      Associated Activity icon 4.2.5 Build a project roadmap
      1. Identify and review all initiatives that will be taken to implement or improve the software asset management program. These may fall under people, process, or technology-related tasks.
      2. Assign a priority level to each task (Quick Win, Low, Medium, High).
      3. Use the priority to sort tasks into start dates, breaking down by:
        1. Short, medium, or long-term
        2. 1 month, 3 months, 6 months, 12+ months
        3. Q1, Q2, Q3, Q4
      4. Review tasks and adjust start dates for some, if needed to set realistic and achievable timelines.
      5. Transfer tasks to a project plan or Gantt chart to formalize.
      Examples:
      Q1 Q2 Q3 Q4
      • Hire software asset manager
      • Document SOP
      • Define policies
      • Select a SAM tool
      • Create list of approved services and software
      • Define metrics
      • Inventory existing software and contracts
      • Build a patch policy
      • Build a service catalog
      • Contract renewal alignment
      • Run internal audit
      • Security review

      Review and maintain the SAM program to reach optimal maturity

      • SAM is a dynamic process. It must adapt to keep pace with the direction of the organization. New applications, different licensing needs, and a constant stream of new end users all contribute to complicating the licensing process.
      • As part of your organization’s journey to an optimized SAM program, put in place continual improvement practices to maintain momentum.

      A suggested cycle of review and maintenance for your SAM: 'Plan', 'Do', 'Check', 'Act'.

      Info-Tech Insight

      Advertising the increased revenue that is gained from good SAM practices is a powerful way to gain project buy-in.

      Keep the momentum going:

      • Clearly define ongoing responsibilities for each role.
      • Develop a training and awareness program for new employees to be introduced to SAM processes and policies.
      • Continually review and revise existing processes as necessary.
      • Measure the success of the program to identify areas for improvement and demonstrate successes.
      • Measure adherence to process and policies and enforce as needed.

      Reflect on the outcomes of implementing SAM to target areas for improvement and share knowledge gained within and beyond the SAM team. Some questions to consider include:

      1. How did the data compare to our expectations? Was the project a success?
      2. What obstacles were present that impacted the project?
      3. How can we apply lessons learned through this project to others in the future?

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.2.1

      Sample of activity 4.2.1 'Develop a communication plan to convey the right messages'. Develop a communication plan to convey the right messages

      Identify stakeholders requiring communication and formulate a message and delivery method for each.

      4.2.5

      Sample of activity 4.2.5 'Develop a SAM roadmap to plan your implementation'. Develop a SAM roadmap to plan your implementation

      Outline the tasks necessary for the implementation of this project and prioritize to build a project roadmap.

      Phase 4 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Build supporting processes & tools

      Proposed Time to Completion (in weeks): 4
      Step 4.1: Compliance & audits Step 4.2: Communicate & build roadmap
      Start with an analyst kick-off call:
      • Discuss audit process
      • Define a process for internal audits
      • Define a process for external audit response
      Review findings with analyst:
      • Build communication plan
      • Discuss policy needs
      • Build a roadmap
      Then complete these activities…
      • Document internal audit process
      • Document external audit process
      • Prepare audit templates
      Then complete these activities…
      • Develop communication plan
      • Prepare an FAQ list for end users
      • Build SAM policies
      • Develop a roadmap
      With these tools & templates:
      • Standard Operating Procedures
      • Software Audit Scoping Email Template
      • Software Audit Launch Email Template
      With these tools & templates:
      • SAM Communication Plan
      • Software Asset Management FAQ Template
      • Software Asset Management Policy
      • Additional Policy Templates

      Bibliography

      2013 Software Audit Industry Report.” Express Metrix, 2013. Web.

      7 Vital Trends Disrupting Today’s Workplace: Results and Data from 2013 TINYpulse Employee Engagement Survey.” TINYpulse, 2013. Web.

      Beaupoil, Christof. “How to measure data quality and protect against software audits.” Network World, 6 June 2011.

      Begg, Daniel. “Effective Licence Position (ELP) – What is it really worth?” LinkedIn, 19 January 2016.

      Boehler, Bernhard. “Advanced License Optimization: Go Beyond Compliance for Maximum Cost Savings.” The ITAM Review, 24 November 2014.

      Bruce, Warren. “SAM Baseline – process & best practice.” Microsoft. 2013 Australia Partner Conference.

      Case Study Top 20 U.S. Bank Tackles Asset Management.” Pomeroy, 2012. Web.

      Cherwell Software Software Audit Industry Report.” Cherwell Software, 2015. Web.

      Conrad, Sandi. “SAM starter kit: everything you need to get started with software asset management. Conrad & Associates, 2010.

      Corstens, Jan, and Diederik Van der Sijpe. “Contract risk & compliance software asset management (SAM).” Deloitte, 2012.

      Deas, A., T. Markowitzm and E. Black. “Software asset management: high risk, high reward.” Deloitte, 2014.

      Doig, Chris. “Why you should always estimate ROI before buying enterprise software” CIO, 13 August 2015.

      Fried, Chuck. “America Needs An Education On Software Asset Management (SAM).” LinkedIn. 16 June 2015.

      Lyons, Gwen. “Understanding the Drivers Behind Application Rationalization Critical to Success.” Flexera Software Blog, 31 October 2012.

      Bibliography

      Metrics to Measure SAM Success: eight ways to prove your SAM program is delivering business benefits.” Snow Software White Paper, 2015.

      Microsoft. “The SAM Optimization Model.” Microsoft Corporation White Paper, 2010.

      Miller, D. and M. Oliver. “Engaging Stakeholders for Project Success.” Project Management Institute White Paper, 2015.

      Morrison, Dan. “5 Common Misconceptions of Software Asset Management.” SoftwareOne. 12 May 2015.

      O’Neill, Leslie T. “Visa Case Study: SAM in the 21st Century.” International Business Software Managers Association (IBSMA), 30 July 2014.

      Reducing Hidden Operating Costs Through IT Asset Discovery.” NetSupport Inc., 2011.

      SAM Summit 2014, 23-25 June 2014, University of Chicago Gleacher Center Conference Facilities, Chicago, MI.

      Saxby, Heather. “20 Things Every CIO Needs to Know about Software Asset Management.” Crayon Software Experts, 13 May 2015.

      The 2016 State of IT: Managing the money monsters for the coming year.” Spiceworks, 2016.

      The Hidden Cost of Unused Software.” A 1E Report, 1E.com: 2014. Web.

      What does it take to achieve software license optimization?” Flexera White Paper, 2013.

      Research contributors and experts

      Photo of Michael Dean, Director, User Support Services, Des Moines University Michael Dean
      Director, User Support Services
      Des Moines University
      Simon Leuty
      Co-Founder
      Livingstone Tech
      Photo of Simon Leuty, Co-Founder, Livingstone Tech
      Photo of Clare Walsh, PR Consultant, Adesso Tech Ltd. Clare Walsh
      PR Consultant
      Adesso Tech Ltd.
      Alex Monaghan
      Director, Presales EMEA
      Product Support Solutions
      Photo of Alex Monaghan, Director, Presales EMEA, Product Support Solutions

      Research contributors and experts

      Photo of Ben Brand, SAM Practice Manager, Insight Ben Brand
      SAM Practice Manager
      Insight
      Michael Swanson
      President
      ISAM
      Photo of Michael Swanson, President, ISAM
      Photo of Bruce Aboudara, SVP, Marketing & Business Development, Scalable Software Bruce Aboudara
      SVP, Marketing & Business Development
      Scalable Software
      Will Degener
      Senior Solutions Consultant
      Scalable Software
      Photo of Will Degener, Senior Solutions Consultant, Scalable Software

      Research contributors and experts

      Photo of Peter Gregorowicz, Associate Director, Network & Client Services, Vancouver Community College Peter Gregorowicz
      Associate Director, Network & Client Services
      Vancouver Community College
      Peter Schnitzler
      Operations Team Lead
      Toyota Canada
      Photo of Peter Schnitzler, Operations Team Lead, Toyota Canada
      Photo of David Maughan, Head of Service Transition, Mott MacDonald Ltd. David Maughan
      Head of Service Transition
      Mott MacDonald Ltd.
      Brian Bernard
      Infrastructure & Operations Manager
      Lee County Clerk of Court
      Photo of Brian Bernard, Infrastructure & Operations Manager, Lee County Clerk of Court

      Research contributors and experts

      Photo of Leticia Sobrado, IT Data Governance & Compliance Manager, Intercept Pharmaceuticals Leticia Sobrado
      IT Data Governance & Compliance Manager
      Intercept Pharmaceuticals

      Effective IT Communications

      • Buy Link or Shortcode: {j2store}429|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Lead
      • Parent Category Link: /lead

      IT communications are often considered ineffective. This is demonstrated by:

      • A lack of inclusion or time to present in board meetings.
      • Confusion around IT priorities and how they align to organizational objectives.
      • Segregating IT from the rest of the organization.
      • The inability to secure the necessary funding for IT-led initiatives.
      • IT employees not feeling supported or engaged.

      Our Advice

      Critical Insight

      • No one is born a good communicator. Every IT employee needs to spend the time and effort to grow their communication skills; with constant change and worsening IT crises, IT cannot afford to communicate poorly anymore.
      • The skills needed to communicate effectively as a front=line employee or CIO are the same. It is important to begin the development of these skills from the beginning of one's career.
      • Time is a non-renewable resource. Any communication needs to be considered valuable and engaging by the audience or they will be unforgiving.

      Impact and Result

      Communications is a responsibility of all members of IT. This is demonstrated through:

      • Engaging in two-way communications that are continuous and evolving.
      • Establishing a communications strategy – and following the plan.
      • Increasing the skills of all IT employees when it comes to communications.
      • Identifying audiences and their preferred means of communication.

      Effective IT Communications Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Effective IT Communications Capstone Deck – A resource center to ensure you never start communications from a blank page again.

      This capstone blueprint highlights the components, best practices, and importance of good communication for all IT employees.

      • Effective IT Communications Storyboard

      2. IT Townhall Template – A ready-to-use template to help you engage with IT employees and ensure consistent access to information.

      IT town halls must deliver value to employees, or they will withdraw and miss key messages. To engage employees, use well-crafted communications in an event that includes crowd-sourced contents, peer involvement, recognition, significant Q&A time allotment, organizational discussions, and goal alignment.

      • IT Townhall Template

      3. IT Year in Review Template – A ready-to-use template to help communicate IT successes and future objectives.

      This template provides a framework to build your own IT Year In Review presentation. An IT Year In Review presentation typically covers the major accomplishments, challenges, and initiatives of an organization's information technology (IT) department over the past year.

      • IT Year in Review Template

      Infographic

      Further reading

      Effective IT Communications

      Empower IT employees to communicate well with any stakeholder across the organization.

      Analyst perspective

      There has never been an expectation for IT to communicate well.

      Brittany Lutes

      Brittany Lutes
      Research Director
      Info-Tech Research Group

      Diana MacPherson

      Diana MacPherson
      Senior Research Analyst
      Info-Tech Research Group

      IT rarely engages in proper communications. We speak at, inform, or tell our audience what we believe to be important. But true communications seldom take place.

      Communications only occur when channels are created to ensure the continuous opportunity to obtain two-way feedback. It is a skill that is developed over time, with no individual having an innate ability to be better at communications. Each person in IT needs to work toward developing their personal communications style. The problem is we rarely invest in development or training related to communications. Information and technology fields spend time and money developing hard skills within IT, not soft ones.

      The benefits associated with communications are immense: higher business satisfaction, funding for IT initiatives, increased employee engagement, better IT to business alignment, and the general ability to form ongoing partnerships with stakeholders. So, for IT departments looking to obtain these benefits through true communications, develop the necessary skills.

      Executive summary

      Your Challenge Common Obstacles Info-Tech’s Approach
      IT communications are often considered ineffective. This is demonstrated by:
      • A lack of inclusion or time to present in board meetings.
      • Confusion around IT priorities and how they align to organizational objectives.
      • Segregating IT from the rest of the organization.
      • An inability to secure the necessary funding for IT-led initiatives.
      • IT employees not feeling supported or engaged.
      Frequently, these barriers have prevented IT communications from being effective:
      • Using technical jargon when a universal language is needed.
      • Speaking at organization stakeholders rather than engaging through dialogue.
      • Understanding the needs of the audience.
      Overall, IT has not been expected to engage in good communications or taken a proactive approach to communicate effectively.
      Communications is a responsibility of all members of IT. This is demonstrated through:
      • Engaging in two-way communications that are continuous and evolving.
      • Establishing a communications strategy – and following the plan.
      • Increasing the skills of all IT employees when it comes to communications.
      • Identifying audiences and their preferred means of communication.

      Info-Tech Insight
      No one is born a good communicator. Every IT employee needs to spend the time and effort to grow their communication skills as constant change and worsening IT crises mean that IT cannot afford to communicate poorly anymore.

      Your challenge

      Overall satisfaction with IT is correlated to satisfaction with IT communications

      Chart showing satisfaction with it and communications

      The bottom line? For every 10% increase in communications there 8.6% increase in overall IT satisfaction. Therefore, when IT communicates with the organization, stakeholders are more likely to be satisfied with IT overall.

      Info-Tech Diagnostic Programs, N=330 organizations

      IT struggles to communicate effectively with the organization:

      • CIOs are given minimal time to present to the board or executive leaders about IT’s value and alignment to business goals.
      • IT initiatives are considered complicated and confusing.
      • The frequency and impact of IT crises are under planned for, making communications more difficult during a major incident.
      • IT managers do not have the skills to communicate effectively with their team.
      • IT employees do not have the skills to communicate effectively with one another and end users.

      Common obstacles

      IT is prevented from communicating effectively due to these barriers:

      • Difficulty assessing the needs of the audience to inform the language and means of communication that should be used.
      • Using technical jargon rather than translating the communication into commonly understood terms.
      • Not receiving the training required to develop communication skills across IT employees.
      • Frequently speak at organization stakeholders rather than engaging through dialogue.
      • Beginning many communications from a blank page, especially crisis communications.
      • Difficulty presenting complex concepts in a short time to an audience in a digestible and concise manner without diluting the point.

      Effective IT communications are rare:

      53% of CXOs believe poor communication between business and IT is a barrier to innovation.
      Source: Info-Tech CEO-CIO Alignment Survey, 2022

      69% of those in management positions don’t feel comfortable even communicating with their staff.”
      Source: TeamStage, 2022

      Info-Tech’s approach

      Effective communications is not a broadcast but a dialogue between communicator and audience in a continuous feedback loop.

      Continuous loop of dialogue

      The Info-Tech difference:

      1. Always treat every communication as a dialogue, enabling the receiver of the message to raise questions, concerns, or ideas.
      2. Different audiences will require different communications. Be sure to cater the communication to the needs of the receiver(s).
      3. Never assume the communication was effective. Create measures and adjust the communications to get the desired outcome.

      Common IT communications

      And the less common but still important communications

      Communicating Up to Board or Executives

      • Board Presentations
      • Executive Leadership Committee Meetings
      • Technology Updates
      • Budget Updates
      • Risk Updates
      • Year in Review

      Communicating Across the Organization

      • Townhalls – external to IT
      • Year in Review
      • Crisis Email
      • Intranet Communication
      • Customer/Constituent Requests for Information
      • Product Launches
      • Email
      • Watercooler Chat

      Communicating Within IT

      • Townhalls – internal to IT
      • Employee 1:1s
      • Team Meetings
      • Project Updates
      • Project Collaboration Sessions
      • Year in Review
      • All-Hands Meeting
      • Employee Interview
      • Onboarding Documentation
      • Vendor Negotiation Meetings
      • Vendor Product Meetings
      • Email
      • Watercooler Chat

      Insight Summary

      Overarching insight
      IT cannot afford to communicate poorly given the overwhelming impact and frequency of change related to technology. Learn to communicate well or get out of the way of someone who can.

      Insight 1: The skills needed to communicate effectively as a frontline employee or a CIO are the same. It’s important to begin the development of these skills from the beginning of one’s career.
      Insight 2: Time is a non-renewable resource. Any communication needs to be considered valuable and engaging by the audience or they will be unforgiving.
      Insight 3: Don’t make data your star. It is a supporting character. People can argue about the collection methods or interpretation of the data, but they cannot argue the story you share.
      Insight 4: Measure if the communication is being received and resulting in the desired outcome. If not, modify what and how the message is being expressed.
      Insight 5: Messages are also non-verbal. Practice using your voice and body to set the right tone and impact your audience.

      Communication principles

      Follow these principles to support all IT communications.

      Two-Way

      Incorporate feedback loops into your communication efforts. Providing stakeholders with the opportunity to voice their opinions and ideas will help gain their commitment and buy-in.

      Timely

      Frequent communications mitigate rumors and the spread of misinformation. Provide warning before the implementation of any changes whenever possible. Communicate as soon as possible after decisions have been made.

      Consistent

      Make sure the messaging is consistent across departments, mediums, and presenters. Provide managers with key phrases to support the consistency of messages.

      Open & Honest

      Transparency is a critical component of communication. Always tell employees that you will share information as soon as you can. This may not be as soon as you receive the information but as soon as sharing it is acceptable.

      Authentic

      Write messages in a way that embodies the personality of the organization. Don’t spin information; position it within the wider organizational context.

      Targeted

      Use your target audience profiles to determine which audiences need to consume which messages and what mediums should be employed.

      Importance of IT being a good communicator

      Don’t pay the price for poor communication.

      IT needs to communicate well because:

      • IT risk mitigation and technology initiative funding are dependent on critical stakeholders comprehending the risk impact and initiative benefit in easy-to-understand terms.
      • IT employees need clear and direct information to feel empowered and accountable to do their jobs well.
      • End users who have a good experience engaging in communications with IT employees have an overall increase in satisfaction with IT.
      • Continuously demonstrating IT’s value to the organization comes when those initiatives are clearly aligned to overall objectives.
      • Communication prevents assumptions and further miscommunication from happening among IT employees who are usually impacted and fear change the most.

      “Poor communication results in employee misunderstanding and errors that cost approximately $37 billion.”
      – Intranet Connections, 2019

      Effective communication enables organizational strategy and facilitates a two-way exchange

      Effective communication facilitates a two-way exchange

      What makes internal communications effective?

      To be effective, internal communications must be strategic. They should directly support organizational objectives, reinforce key messages to make sure they drive action, and facilitate two-way dialogue, not just one-way messaging.

      Measure the value of the communication

      Communication effectiveness can be measured through a variety of metrics:

      • Increase in Productivity
      • “When employees are offered better communication technology and skills, productivity can increase by up to 30%” (Expert Market, 2022).
      • Increase in Understanding Decision Rationale
      • Employees who report understanding the rationale behind the business decisions made by the executive leadership team (ELT) are 3.6x more likely to be engaged, compared to those who were not (McLean & Company Engagement Survey Database, 2022; N=133,167 responses, 187 organizations).
      • Increase in Revenue
      • Collaboration amongst C-suite executives led to a 27% increase in revenue compared to low collaborating C-suites (IBM, 2021).
      • Increase in End-User Satisfaction
      • 80.9% of end users are satisfied with IT’s ability to communicate with them regarding the information they need to perform their job (Info-Tech’s End-User Satisfaction Survey Database, N=20,617 end users from 126 organizations).

      Methods to determine effectiveness:

      • CIO Business Vision Survey
      • Engagement surveys
      • Focus groups
      • Suggestion boxes
      • Team meetings
      • Random sampling
      • Informal feedback
      • Direct feedback
      • Audience body language
      • Repeating the message back

      How to navigate the research center

      This research center is intended to ensure that IT never starts their communications from a blank page again:

      Tools to help IT be better communicators

      “‘Effectiveness’ can mean different things, and effectiveness for your project is going to look different than it would for any other project.”
      – Gale McCreary in WikiHow, 2022

      Audience: Organizational leadership

      Speaking with Board and executive leaders about strategy, risk, and value

      Keep in mind:

      1 2 3
      Priorities Differ Words Matter The Power of Three
      What’s important to you as CIO is very different from what is important to a board or executive leadership team or even the individual members of these groups. Share only what is important or relevant to the stakeholder(s). Simplify the message into common language whenever possible. A good test is to ensure that someone without any technical background could understand the message. Keep every slide to three points with no more than three words. You are the one to translate this information into a worth-while story to share.

      “Today’s CIOs have a story to tell. They must change the old narrative and describe the art of the (newly) possible. A great leader rises to the occasion and shares a vision that inspires the entire organization.”
      – Dan Roberts, CIO, 2019

      Communications for board presentations

      Secure funding and demonstrate IT as a value add to business objectives.

      DEFINING INSIGHT

      Stop presenting what is important to you as the CIO and present to the board what is important to them.

      Why does IT need to communicate with the board?

      • To get their buy-in and funding for critical IT initiatives.
      • To ensure that IT risks are understood and receive the funding necessary to mitigate.
      • To change the narrative of IT as a service provider to a business enabler.

      FRAMEWORK

      Framework for board presentations

      CHECKLIST

      Do’s & Don’ts of Communicating Board Presentations:

      Do: Ensure you know all the members of the board and their strengths/areas of focus.

      Do: Ensure the IT objectives and initiatives align to the business objectives.

      Do: Avoid using any technical jargon.

      Do: Limit the amount of data you are using to present information. If it can’t stand alone, it isn’t a strong enough data point.

      Do: Avoid providing IT service metrics or other operational statistics.

      Do: Demonstrate how the organization’s revenue is impacted by IT activities.

      Do: Tell a story that is compelling and excited.

      OUTCOME

      Organization Alignment

      • Approved organization objectives and IT objectives are aligned and supporting one another.

      Stakeholder Buy-In

      • Board members all understand what the future state of IT will look like – and are excited for it!

      Awareness on Technology Trends

      • It is the responsibility of the CIO to ensure the board is aware of critical technology trends that can impact the future of the organization/industry.

      Risks

      • Risks are understood, the impact they could have on the organization is clear, and the necessary controls required to mitigate the risk are funded.

      Communications for business updates

      Continuously build strong relationships with all members of business leadership.

      DEFINING INSIGHT

      Business leaders care about themselves and their goals – present ideas and initiatives that lean into this self-interest.

      Why does IT need to communicate business updates?

      • The key element here is to highlight how IT is impacting the organization’s overall ability to meet goals and targets.
      • Ensure all executive leaders know about and understand IT’s upcoming initiatives – and how they will be involved.

      FRAMEWORK

      Framework for business updates

      CHECKLIST

      Do’s & Don’ts of Communicating Business Updates:

      Do: Ensure IT is given sufficient time to present with the rest of the business leaders.

      Do: Ensure the goals of IT are clear and can be depicted visually.

      Do: Tie every IT goal to the objectives of different business leaders.

      Do: Avoid using any technical jargon.

      Do: Reinforce the positive benefits business leaders can expect.

      Do: Avoid providing IT service metrics or other operational statistics.

      Do: Demonstrate how IT is driving the digital transformation of the organization.

      OUTCOME

      Better Reputation

      • Get other business leaders to see IT as a value add to any initiative, making IT an enabler not an order taker.

      Executive Buy-In

      • Executives are concerned about their own budgets; they want to embrace all the innovation but within reason and minimal impact to their own finances.

      Digital Transformation

      • Indicate and commit to how IT can help the different leaders deliver on their digital transformation activities.

      Relationship Building

      • Establish trust with the different leaders so they want to engage with you on a regular basis.

      Audience: Organization wide

      Speaking with all members of the organization about the future of technology – and unexpected crises.

      1 2 3
      Competing to Be Heard Measure Impact Enhance the IT Brand
      IT messages are often competing with a variety of other communications simultaneously taking place in the organization. Avoid the information-overload paradox by communicating necessary, timely, and relevant information. Don’t underestimate the benefit of qualitative feedback that comes from talking to people within the organization. Ensure they read/heard and absorbed the communication. IT might be a business enabler, but if it is never communicated as such to the organization, it will only be seen as a support function. Use purposeful communications to change the IT narrative.

      Less than 50% of internal communications lean on a proper framework to support their communication activities.
      – Philip Nunn, iabc, 2020

      Communications for strategic IT initiatives

      Communicate IT’s strategic objectives with all business stakeholders and users.

      DEFINING INSIGHT

      IT leaders struggle to communicate how the IT strategy is aligned to the overall business objectives using a common language understood by all.

      Why does IT need to communicate its strategic objectives?

      • To ensure a clear and consistent view of IT strategic objectives can be understood by all stakeholders within the organization.
      • To demonstrate that IT strategic objectives are aligned with the overall mission and vision of the organization.

      FRAMEWORK

      Framework for IT strategic initiatives

      CHECKLIST

      Do’s & Don’ts of Communicating IT Strategic Objectives:

      Do: Ensure all IT leaders are aware of and understand the objectives in the IT strategy.

      Do: Ensure there is a visual representation of IT’s goals.

      Do: Ensure the IT objectives and initiatives align to the business objectives.

      Do: Avoid using any technical jargon.

      Do: Provide metrics if they are relevant, timely, and immediately understandable.

      Do: Avoid providing IT service metrics or other operational statistics.

      Do: Demonstrate how the future of the organization will benefit from IT initiatives.

      OUTCOME

      Organization Alignment

      • All employees recognize the IT strategy as being aligned, even embedded, into the overall organization strategy.

      Stakeholder Buy-In

      • Business and IT stakeholders alike understand what the future state of IT will look like – and are excited for it!

      Role Clarity

      • Employees within IT are clear on how their day-to-day activities impact the overall objectives of the organization.

      Demonstrate Growth

      • Focus on where IT is going to be maturing in the coming one to two years and how this will benefit all employees.

      Communications for crisis management

      Minimize the fear and chaos with transparent communications.

      DEFINING INSIGHT

      A crisis communication should fit onto a sticky note. If it’s not clear, concise, and reassuring, it won’t be effectively understood by the audience.

      Why does IT need to communicate when a crisis occurs?

      • To ensure all members of the organization have an understanding of what the crisis is, how impactful that crisis is, and when they can expect more information.
      • “Half of US companies don’t have a crisis communication plan” (CIO, 2017).

      FRAMEWORK

      Framework for crisis management

      CHECKLIST

      Do’s & Don’ts of Communicating During a Crisis:

      Do: Provide timely and regular updates about the crisis to all stakeholders.

      Do: Involve the Board or ELT immediately for transparency.

      Do: Avoid providing too much information in a crisis communication.

      Do: Have crisis communication statements ready to be shared at any time for possible or common IT crises.

      Do: Highlight that employee safety and wellbeing is top priority.

      Do: Work with members of the public relations team to prepare any external communications that might be required.

      OUTCOME

      Ready to Act

      • Holding statements for possible crises will eliminate the time and effort required when the crisis does occur.

      Reduce Fears

      • Prevent employees from spreading concerns and not feeling included in the crisis.

      Maintain Trust

      • Ensure Board and ELT members trust IT to respond in an appropriate manner to any crisis or major incident.

      Eliminate Negative Reactions

      • Any crisis communication should be clear and concise enough when done via email.

      Audience: IT employees

      IT employees need to receive and obtain regular transparent communications to better deliver on their expectations.

      Keep in mind:

      1 2 3
      Training for All Listening Is Critical Reinforce Collaboration
      From the service desk technician to CIO, every person within IT needs to have a basic ability to communicate. Invest in the training necessary to develop this skill set. It seems simple, but as humans we do an innately poor job at listening to others. It’s important you hear employee concerns, feedback, and recommendations, enabling the two-way aspect of communication. IT employees will reflect the types of communications they see. If IT leaders and managers cannot collaborate together, then teams will also struggle, leading to productivity and quality losses.

      “IT professionals who […] enroll in communications training have a chance to both upgrade their professional capabilities and set themselves apart in a crowded field of technology specialists.”
      – Mark Schlesinger, Forbes, 2021

      Communications for IT activities and tactics

      Get IT employees aligned and clear on their daily objectives.

      DEFINING INSIGHT

      Depending on IT goals, the structure might need to change to support better communication among IT employees.

      Why does IT need to communicate IT activities?

      • To ensure all members of the project team are aligned with their tasks and responsibilities related to the project.
      • To be able to identify, track, and mitigate any problems that are preventing the successful delivery of the project.

      FRAMEWORK

      Framework for IT activities & tactics

      CHECKLIST

      Do’s & Don’ts of Communicating IT Activities:

      Do: Provide metrics that define how success of the project will be measured.

      Do: Demonstrate how each project aligns to the overarching objectives of the organization.

      Do: Avoid having large meetings that include stakeholders from two or more projects.

      Do: Consistently create a safe space for employees to communicate risks related to the project(s).

      Do: Ensure the right tools are being leveraged for in-office, hybrid, and virtual environments to support project collaboration.

      Do: Leverage a project management software to reduce unnecessary communications.

      OUTCOME

      Stakeholder Adoption

      • Create a standard communication template so stakeholders can easily find and apply communications.

      Resource Allocation

      • Understand what the various asks of IT are so employees can be adequately assigned to tasks.

      Meet Responsibly

      • Project status meetings are rarely valuable or insightful. Use meetings for collaboration, troubleshooting, and knowledge sharing.

      Encourage Engagement

      • Recognize employees and their work against critical milestones, especially for projects that have a long timeline.

      Communications for everyday IT

      Engage employees and drive results with clear and consistent communications.

      DEFINING INSIGHT

      Employees are looking for empathy to be demonstrated by those they are interacting with, from their peers to managers. Yet, we rarely provide it.

      Why does IT need to communicate on regularly with itself?

      • Regular communication ensures employees are valued, empowered, and clear about their expectations.
      • 97% of employees believe that their ability to perform their tasks efficiently is impacted by communication (Expert Market, 2022).

      FRAMEWORK

      Framework for everyday IT

      CHECKLIST

      Do’s & Don’ts of Communicating within IT:

      Do: Have responses for likely questions prepared and ready to go.

      Do: Ensure that all leaders are sharing the same messages with their teams.

      Do: Avoid providing irrelevant or confusing information.

      Do: Speak with your team on a regular basis.

      Do: Reinforce the messages of the organization every chance possible.

      Do: Ensure employees feel empowered to do their jobs effectively.

      Do: Engage employees in dialogue. The worst employee experience is when they are only spoken at, not engaged with.

      OUTCOME

      Increased Collaboration

      • Operating in a vacuum or silo is no longer an option. Enable employees to successfully collaborate and deliver holistic results.

      Role Clarity

      • Clear expectations and responsibilities eliminate confusion and blame game. Engage employees and create a positive work culture with role clarity.

      Prevent Rumors

      • Inconsistent communication often leads to information sharing and employees spreading an (in)accurate narrative.

      Organizational Insight

      • Employees trust the organization’s direction because they are aware of the different activities taking place and provided with a rationale about decisions.

      Case Study

      Amazon

      INDUSTRY
      E-Commerce

      SOURCE
      Harvard Business Review

      Jeff Bezos has definitely taken on unorthodox approaches to business and leadership, but one that many might not know about is his approach to communication. Some of the key elements that he focused on in the early 2000s when Amazon was becoming a multi-billion-dollar empire included:

      • Banning PowerPoint for all members of the leadership team. They had to learn to communicate without the crutch of the most commonly used presentation tool.
      • Leveraging memos that included specific action steps and clear nouns
      • Reducing all communication to an eighth-grade reading level, including pitches for new products (e.g. Kindle).

      Results

      While he was creating the Amazon empire, 85% of Jeff Bezos’ communication was written in a way that an eighth grader could read. Communicating in a way that was easy to understand and encouraging his leadership team to do so as well is one of the many reasons this business has grown to an estimated value of over $800B.

      “If you cannot simplify a message and communicate it compellingly, believe me, you cannot get the masses to follow you.”
      – Indra Nooyi, in Harvard Business Review, 2022

      Communication competency expectations

      Communication is a business skill; not a technical skill.

      Demonstrated Communication Behavior
      Level 1: Follow Has sufficient communication skills for effective dialogue with others.
      Level 2: Assist Has sufficient communication skills for effective dialogue with customers, suppliers, and partners.
      Level 3: Apply Demonstrates effective communication skills.
      Level 4: Enable Communicates fluently, orally, and in writing and can present complex information to both technical and non-technical audiences.
      Level 5: Ensure, Advise Communicates effectively both formally and informally.
      Level 6: Initiate, Influence Communicates effectively at all levels to both technical and non-technical audiences.
      Level 7: Set Strategy, Inspire, Mobilize Understands, explains, and presents complex ideas to audiences at all levels in a persuasive and convincing manner.

      Source: Skills Framework for the Information Age, 2021

      Key KPIs for communication with any stakeholder

      Measuring communication is hard; use these to determine effectiveness.

      Goal Key Performance Indicator (KPI) Related Resource
      Obtain board buy-in for IT strategic initiatives X% of IT initiatives that were approved to be funded. Number of times technical initiatives were asked to be explained further. Using our Board Presentation Review service
      Establish stronger relationships with executive leaders X% of business leadership satisfied with the statement “IT communicates with your group effectively.” Using the CIO Business Vision Diagnostic
      Organizationally, people know what products and services IT provides X% of end users who are satisfied with communications around changing services or applications. Using the End-User Satisfaction Survey
      Organizational reach and understanding of the crisis. Number of follow-up tickets or requests related to the crisis after the initial crisis communication was sent. Using templates and tools for crisis communications
      Project stakeholders receive sufficient communication throughout the initiative. X% overall satisfaction with the quality of the project communications. Using the PPM Customer Satisfaction Diagnostic
      Employee feedback is provided, heard, and acted on X% of satisfaction employees have with managers or IT leadership to act on employee feedback. Using the Employee Engagement Diagnostic Program

      Standard workshop communication activities

      Introduction
      Communications overview.

      Plan
      Plan your communications using a strategic tool.

      Compose
      Create your own message.

      Deliver
      Practice delivering your own message.

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Research contributors and experts

      Anuja Agrawal, National Communications Director, PwC

      Anuja Agrawal
      National Communications Director
      PwC

      Anuja is an accomplished global communications professional, with extensive experience in the insurance, banking, financial, and professional services industries in Asia, the US, and Canada. She is currently the National Communications Director at PwC Canada. Her prior work experience includes communication leadership roles at Deutsche Bank, GE, Aviva, and Veritas. Anuja works closely with senior business leaders and key stakeholders to deliver measurable results and effective change and culture building programs. Anuja has experience in both internal and external communications, including strategic leadership communication, employee engagement, PR and media management, digital and social media, and M&A/change and crisis management. Anuja believes in leveraging digital tools and technology-enabled solutions, combined with in-person engagement, to help improve the quality of dialogue and increase interactive communication within the organization to help build an inclusive culture of belonging.

      Nastaran Bisheban, Chief Technology Officer, KFC Canada

      Nastaran Bisheban
      Chief Technology Officer
      KFC Canada

      A passionate technologist, and seasoned transformational leader. A software engineer and computer scientist by education, a certified Project Manager that holds an MBA in Leadership with Honors and Distinction from University of Liverpool. A public speaker on various disciplines of technology and data strategy with a Harvard Business School executive leadership program training to round it all. Challenges status quo and conventional practices; is an advocate for taking calculated risk and following the principle of continuous improvement. With multiple computer software and project management publications she is a strategic mentor and board member on various non-profit organizations. Nastaran sees the world as a better place only when everyone has a seat at the table and is an active advocate for diversity and inclusion.

      Heidi Davidson, Co-Founder & CEO, Galvanize Worldwide and Galvanize On Demand

      Heidi Davidson
      Co-Founder & CEO
      Galvanize Worldwide and Galvanize On Demand

      Dr. Heidi Davidson is the co-founder and CEO of Galvanize Worldwide, the largest distributed network of marketing and communications experts in the world. She also is the co-founder and CEO of Galvanize On Demand, a tech platform that matches marketing and communications freelancers with client projects. Now with 167 active experts, the Galvanize team delivers startup advisory work, outsourced marketing, training, and crisis communications to organizations of all sizes. Before Galvanize, Heidi spent four years as part of the turnaround team at BlackBerry as the Chief Communications Officer and SVP of Corporate Marketing, where she helped the company move from a device manufacturer to a security software provider.

      Eli Gladstone, Co-Founder, Speaker Labs

      Eli Gladstone
      Co-Founder
      Speaker Labs

      Eli is a co-founder of Speaker Labs. He has spent over six years helping countless individuals overcome their public speaking fears and communicate with clarity and confidence. When he’s not coaching others on how to build and deliver the perfect presentation, you’ll probably find him reading some weird books, teaching his kids how to ski or play tennis, or trying to develop a good-enough jumpshot to avoid being a liability on the basketball court.

      Francisco Mahfuz, Keynote Speaker & Storytelling Coach

      Francisco Mahfuz
      Keynote Speaker & Storytelling Coach

      Francisco Mahfuz has been telling stories in front of audiences for a decade and even became a National Champion of public speaking. Today, Francisco is a keynote speaker and storytelling coach and offers communication training to individuals and international organizations and has worked with organizations like Pepsi, HP, the United Nations, Santander, and Cornell University. He’s the author of Bare: A Guide to Brutally Honest Public Speaking and the host of The Storypowers Podcast, and he’s been part of the IESE MBA communications course since 2020. He’s received a BA in English Literature from Birkbeck University in London.

      Sarah Shortreed, EVP & CTO, ATCO Ltd.

      Sarah Shortreed
      EVP & CTO
      ATCO Ltd.

      Sarah Shortreed is ATCO’s Executive Vice President and Chief Technology Officer. Her responsibilities include leading ATCO’s Information Technology (IT) function as it continues to drive agility and collaboration throughout ATCO’s global businesses and expanding and enhancing its enterprise IT strategy, including establishing ATCO’s technology roadmap for the future. Ms. Shortreed’s skill and expertise are drawn from her more than 30-year career that spans many industries and includes executive roles in business consulting, complex multi-stakeholder programs, operations, sales, customer relationship management, and product management. She was recently the Chief Information Officer at Bruce Power and has previously worked at BlackBerry, IBM, and Union Gas. She sits on the Board of Governors for the University of Western Ontario and is the current Chair of the Chief Information Officer (CIO) Committee at the Conference Board of Canada.

      Eric Silverberg, Co-Founder, Speaker Labs

      Eric Silverberg
      Co-Founder
      Speaker Labs

      Eric is a co-founder of Speaker Labs and has helped thousands of people build their public speaking confidence and become more dynamic and engaging communicators. When he’s not running workshops to help people grow in their careers, there’s a good chance you’ll find him with his wife and dog, drinking Diet Coke, and rewatching iconic episodes of the reality TV show Survivor! He’s such a die-hard fan, that you’ll probably see him playing the game one day.

      Stephanie Stewart, Communications Officer & DR Coordinator, Info Security Services Simon Fraser University

      Stephanie Stewart
      Communications Officer & DR Coordinator
      Info Security Services Simon Fraser University

      Steve Strout, President, Miovision Technologies

      Steve Strout
      President
      Miovision Technologies

      Mr. Strout is a recognized and experienced technology leader with extensive experience in delivering value. He has successfully led business and technology transformations by leveraging many dozens of complex global SFDC, Oracle, and SAP projects. He is especially adept at leading what some call “Project Rescues” – saving people’s careers where projects have gone awry; always driving “on-time and on-budget.” Mr. Strout is the current President of Miovision Technologies and the former CEO and board member of the Americas’ SAP Users” Group (ASUG). His wealth of practical knowledge comes from 30 years of extensive experience in many CxO and executive roles at some prestigious organizations such as Vonage, Sabre, BlackBerry, Shred-it, The Thomson Corporation (now Thomson Reuters), and Morris Communications. He has served on boards including Customer Advisory Boards of Apple, AgriSource Data, Dell, Edgewise, EMC, LogiSense, Socrates.ai, Spiro Carbon Group, and Unifi.

      Info-Tech Research Group Contributors:

      Sanchia Benedict, Research Lead
      Antony Chan Executive Counsellor
      Janice Clatterbuck, Executive Counsellor
      Ahmed Jowar, Research Specialist
      Dave Kish, Practice Lead
      Nick Kozlo, Senior Research Analyst
      Heather Leier Murray, Senior Research Analyst
      Amanda Mathieson, Research Director
      Carlene McCubbin, Practice Lead
      Joe Meier, Executive Counsellor
      Andy Neill, AVP Research
      Thomas Randall, Research Director

      Plus an additional two contributors who wish to remain anonymous.

      Related Info-Tech Research

      Boardroom Presentation Review

      • You will come away with a clear, concise, and compelling board presentation that IT leaders can feel confident presenting in front of their board of directors.
      • Add improvements to your current board presentation in terms of visual appeal and logical flow to ensure it resonates with your board of directors.
      • Leverage a best-of-breed presentation template.

      Build a Better Manager

      • Management skills training is needed, but organizations are struggling to provide training that makes a long-term difference in the skills managers actually use in their day to day.
      • Many training programs are ineffective because they offer the wrong content, deliver it in a way that is not memorable, and are not aligned with the IT department’s business objectives.

      Crisis Communication Guides

      During a crisis it is important to communicate to employees through messages that convey calm and are transparent and tailored to your audience. Use the Crisis Communication Guides to:

      • Draft a communication strategy.
      • Tailor messages to your audience.
      • Draft employee crisis communications.
      Use this guide to equip leadership to communicate in times of crisis.

      Bibliography

      “Communication in the Workplace Statistics: Importance and Effectiveness in 2022.” TeamStage, 2022.

      Gallo, Carmine. “How Great Leaders Communicate.” Harvard Business Review, 23 November 2022

      Guthrie, Georgina. “Why Good Internal Communications Matter Now More than Ever.” Nulab, 15 December 2021.

      Lambden, Duncan. “The Importance of Effective Workplace Communication – Statistics for 2022.” Expert Market, 13 June 2022.

      “Mapping SFIA Levels of Responsibilities to Behavioural Factors.” Skills Framework for the Information Age, 2021.

      McCreary, Gale. “How to Measure the Effectiveness of Communication: 14 Steps.” WikiHow, 31 March 2023.

      Nowak, Marcin. “Top 7 Communication Problems in the Workplace.” MIT Enterprise Forum CEE, 2021.

      Nunn, Philip. “Messaging That Works: A Unique Framework to Maximize Communication Success.” iabc, 26 October 2020.

      Picincu, Andra. “How to Measure Effective Communications.” Small Business Chron. 12 January 2021.

      Price. David A. “Pixar Story Rules.” Stories From the Frontiers of Knowledge, 2011.

      Roberts, Dan. “How CIOs Become Visionary Communicators.” CIO, 2019.

      Schlesinger, Mark. “Why building effective communication skill in IT is incredibly important.” Forbes, 2021.

      Stanten, Andrew. “Planning for the Worst: Crisis Communications 101.” CIO, 25 May 2017.

      State of the American Workplace Report. Gallup, 6 February 2020.

      “The CIO Revolution.” IBM, 2021.

      “The State of High Performing Teams in Tech 2022.” Hypercontex, 2022.

      Walters, Katlin. “Top 5 Ways to Measure Internal Communication.” Intranet Connections, 30 May 2019.

      Align Projects With the IT Change Lifecycle

      • Buy Link or Shortcode: {j2store}464|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Coordinate IT change and project management to successfully push changes to production.
      • Manage representation of project management within the scope of the change lifecycle to gather requirements, properly approve and implement changes, and resolve incidents that arise from failed implementations.
      • Communicate effectively between change management, project management, and the business.

      Our Advice

      Critical Insight

      Improvement can be incremental. You do not have to adopt every recommended improvement right away. Ensure every process change you make will create value and slowly add improvements to ease buy-in.

      Impact and Result

      • Establish pre-set touchpoints between IT change management and project management at strategic points in the change and project lifecycles.
      • Include appropriate project representation at the change advisory board (CAB).
      • Leverage standard change resources such as the change calendar and request for change form (RFC).

      Align Projects With the IT Change Lifecycle Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Align Projects With the IT Change Lifecycle Deck – A guide to walk through integrating project touchpoints in the IT change management lifecycle.

      Use this storyboard as a guide to align projects with your IT change management lifecycle.

      • Align Projects With the IT Change Lifecycle Storyboard

      2. The Change Management SOP – This template will ensure that organizations have a comprehensive document in place that can act as a point of reference for the program.

      Use this SOP as a template to document and maintain your change management practice.

      • Change Management Standard Operating Procedure
      [infographic]

      Further reading

      Align Projects With the IT Change Lifecycle

      Increase the success of your changes by integrating project touchpoints in the change lifecycle.

      Analyst Perspective

      Focus on frequent and transparent communications between the project team and change management.

      Benedict Chang

      Misalignment between IT change management and project management leads to headaches for both practices. Project managers should aim to be represented in the change advisory board (CAB) to ensure their projects are prioritized and scheduled appropriately. Advanced notice on project progress allows for fewer last-minute accommodations at implementation. Widespread access of the change calendar can also lead project management to effectively schedule projects to give change management advanced notice.

      Moreover, alignment between the two practices at intake allows for requests to be properly sorted, whether they enter change management directly or are governed as a project.

      Lastly, standardizing implementation and post-implementation across everyone involved ensures more successful changes and socialized/documented lessons learned for when implementations do not go well.

      Benedict Chang
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      To align projects with the change lifecycle, IT leaders must:

      • Coordinate IT change and project management to successfully push changes to production.
      • Manage representation of project management within the scope of the change lifecycle to gather requirements, properly approve and implement changes, and resolve incidents that arise from failed implementations.
      • Communicate effectively between change management, project management, and the business.

      Loose definitions may work for clear-cut examples of changes and projects at intake, but grey-area requests end up falling through the cracks.

      Changes to project scope, when not communicated, often leads to scheduling conflicts at go-live.

      Too few checkpoints between change and project management can lead to conflicts. Too many checkpoints can lead to delays.

      Set up touchpoints between IT change management and project management at strategic points in the change and project lifecycles.

      Include appropriate project representation at the change advisory board (CAB).

      Leverage standard change resources such as the change calendar and request for change form (RFC).

      Info-Tech Insight

      Improvement can be incremental. You do not have to adopt every recommended improvement right away. Ensure every process change you make will create value, and slowly add improvements to ease buy-in.

      Info-Tech’s approach

      Use the change lifecycle to identify touchpoints.

      The image contains a screenshot of Info-Tech's approach.

      The Info-Tech difference:

      1. Start with your change lifecycle to define how change control can align with project management.
      2. Make improvements to project-change alignment to benefit the relationship between the two practices and the practices individually.
      3. Scope the alignment to your organization. Take on the improvements to the left one by one instead of overhauling your current process.

      Use this research to improve your current process

      This deck is intended to align established processes. If you are just starting to build IT change processes, see the related research below.

      Align Projects With the IT Change Lifecycle

      02 Optimize IT Project Intake, Approval, and Prioritization

      01 Optimize IT Change Management

      Increase the success of your changes by integrating project touchpoints in your change lifecycle.

      (You are here)

      Decide which IT projects to approve and when to start them.

      Right-size IT change management to protect the live environment.

      Successful change management will provide benefits to both the business and IT

      Respond to business requests faster while reducing the number of change-related disruptions.

      IT Benefits

      Business Benefits

      • Fewer incidents and outages at project go-live
      • Upfront identification of project and change requirements
      • Higher rate of change and project success
      • Less rework
      • Fewer service desk calls related to failed go-lives
      • Fewer service disruptions
      • Faster response to requests for new and enhanced functionalities
      • Higher rate of benefits realization when changes are implemented
      • Lower cost per change
      • Fewer “surprise” changes disrupting productivity

      IT satisfaction with change management will drive business satisfaction with IT. Once the process is working efficiently, staff will be more motivated to adhere to the process, reducing the number of unauthorized changes. As fewer changes bypass proper evaluation and testing, service disruptions will decrease and business satisfaction will increase.

      Change management improves core benefits to the business: the four Cs

      Most organizations have at least some form of change control in place, but formalizing change management leads to the four Cs of business benefits:

      Control

      Collaboration

      Consistency

      Confidence

      Change management brings daily control over the IT environment, allowing you to review every relatively new change, eliminate changes that would have likely failed, and review all changes to improve the IT environment.

      Change management planning brings increased communication and collaboration across groups by coordinating changes with business activities. The CAB brings a more formalized and centralized communication method for IT.

      Request-for-change templates and a structured process result in implementation, test, and backout plans being more consistent. Implementing processes for pre-approved changes also ensures these frequent changes are executed consistently and efficiently.

      Change management processes will give your organization more confidence through more accurate planning, improved execution of changes, less failure, and more control over the IT environment. This also leads to greater protection against audits.

      1. Alignment at intake

      Define what is a change and what is a project.

      Both changes and projects will end up in change control in the end. Here, we define the intake.

      Changes and projects will both go to change control when ready to go live. However, defining the governance needed at intake is critical.

      A change should be governed by change control from beginning to end. It would typically be less than a week’s worth of work for a SME to build and come in at a nominal cost (e.g. <$20k over operating costs).

      Projects on the other hand, will be governed by project management in terms of scope, scheduling, resourcing, etc. Projects typically take over a week and/or cost more. However, the project, when ready to go live, should still be scheduled through change control to avoid any conflicts at implementation. At triage and intake, a project can be further scoped based on projected scale.

      This initial touchpoint between change control and project management is crucial to ensure tasks and request are executed with the proper governance. To distinguish between changes and projects at intake, list examples of each and determine what resourcing separates changes from projects.

      Need help scoping projects? Download the Project Intake Classification Matrix

      Change

      Project

      • Smaller scale task that typically takes a short time to build and test
      • Generates a single change request
      • Governed by IT Change Management for the entire lifecycle
      • Larger in scope
      • May generate multiple change requests
      • Governed by PMO
      • Longer to build and test

      Info-Tech Insight

      While effort and cost are good indicators of changes and projects, consider evaluating risk and complexity too.

      1 Define what constitutes a change

      1. As a group, brainstorm examples of changes and projects. If you wish, you may choose to also separate out additional request types such as service requests (user), operational tasks (backend), and releases.
      2. Have each participant write the examples on sticky notes and populate the following chart on the whiteboard/flip chart.
      3. Use the examples to draw lines and determine what defines each category.
      • What makes a change distinct from a project?
      • What makes a change distinct from a service request?
      • What makes a change distinct from an operational task?
      • When do the category workflows cross over with other categories? (For example, when does a project interact with change management?
    • Record the definitions of requests and results in section 2.3 of the Change Management Standard Operating Procedure (SOP).
    • Change

      Project

      Service Request (Optional)

      Operational Task (Optional)

      Release (Optional)

      Changing Configuration

      New ERP

      Add new user

      Delete temp files

      Software release

      Download the Change Management Standard Operating Procedure (SOP).

      Input Output
      • List of examples of each category of the chart
      • Definitions for each category to be used at change intake
      Materials Participants
      • Whiteboard/flip charts (or shared screen if working remotely)
      • Service catalog (if applicable)
      • Sticky notes
      • Markers/pens
      • Change Management SOP
      • Change Manager
      • Project Managers
      • Members of the Change Advisory Board

      2. Alignment at build and test

      Keep communications open by pre-defining and communicating project milestones.

      CAB touchpoints

      Consistently communicate the plan and timeline for hitting these milestones so CAB can prioritize and plan changes around it. This will give change control advanced notice of altered timelines.

      RFCs

      Projects may have multiple associated RFCs. Keeping CAB appraised of the project RFC or RFCs gives them the ability to further plan changes.

      Change Calendar

      Query and fill the change calendar with project timelines and milestones to compliment the CAB touchpoints.

      Leverage the RFC to record and communicate project details

      The request for change (RFC) form does not have to be a burden to fill out. If designed with value in mind, it can be leveraged to set standards on all changes (from projects and otherwise).

      When looking at the RFC during the Build and Test phase of a project, prioritize the following fields to ensure the implementation will be successful from a technical and user-adoption point of view.

      Filling these fields of the RFC and communicating them to the CAB at go-live approval gives the approvers confidence that the project will be implemented successfully and measures are known for when that implementation is not successful.

      Download the Request for Change Form Template

      Communication Plan

      The project may be successful from a technical point of view, but if users do not know about go-live or how to interact with the project, it will ultimately fail.

      Training Plan

      If necessary, think of how to train different stakeholders on the project go-live. This includes training for end users interacting with the project and technicians supporting the project.

      Implementation Plan

      Write the implementation plan at a high enough level that gives the CAB confidence that the implementation team knows the steps well.

      Rollback Plan

      Having a well-formulated rollback plan gives the CAB the confidence that the impact of the project is well known and the impact to the business is limited even if the implementation does not go well.

      Provide clear definitions of what goes on the change calendar and who’s responsible

      Inputs

      • Freeze periods for individual business departments/applications (e.g. finance month-end periods, HR payroll cycle, etc. – all to be investigated)
      • Maintenance windows and planned outage periods
      • Project schedules, and upcoming major/medium changes
      • Holidays
      • Business hours (some departments work 9-5, others work different hours or in different time zones, and user acceptance testing may require business users to be available)

      Guidelines

      • Business-defined freeze periods are the top priority.
      • No major or medium normal changes should occur during the week between Christmas and New Year’s Day.
      • Vendor SLA support hours are the preferred time for implementing changes.
      • The vacation calendar for IT will be considered for major changes.
      • Change priority: High > Medium > Low.
      • Minor changes and preapproved changes have the same priority and will be decided on a case-by-case basis.

      Roles

      • The Change Manager will be responsible for creating and maintaining a change calendar.
      • Only the Change Manager can physically alter the calendar by adding a new change after the CAB has agreed upon a deployment date.
      • All other CAB members, IT support staff, and other impacted stakeholders should have access to the calendar on a read-only basis to prevent people from making unauthorized changes to deployment dates.

      Info-Tech Insight

      Make the calendar visible to as many parties as necessary. However, limit the number of personnel who can make active changes to the calendar to limit calendar conflicts.

      3. Alignment at approval

      How can project management effectively contribute to CAB?

      As optional CAB members

      Project SMEs may attend when projects are ready to go live and when invited by the change manager. Optional members provide details on change cross-dependencies, high-level testing, rollback, communication plans, etc. to inform prioritization and scheduling decisions.

      As project management representatives

      Project management should also attend CAB meetings to report in on changes to ongoing projects, implementation timelines, and project milestones. Projects are typically high-priority changes when going live due to their impact. Advanced notice of timeline and milestone changes allow the rest of the CAB to properly manage other changes going into production.

      As core CAB members

      The core responsibilities of CAB must still be fulfilled:

      1. Protect the live environment from poorly assessed, tested, and implemented changes.

      2. Prioritize changes in a way that fairly reflects change impact, urgency, and likelihood.

      3. Schedule deployments in a way the minimizes conflict and disruption.

      If you need to define the authority and responsibilities of the CAB, see Activity 2.1.3 of the Optimize IT Change Management blueprint.

      4. Alignment at implementation

      At this stage, the project or project phase is treated as any other change.

      Verification

      Once the change has been implemented, verify that all requirements are fulfilled.

      Review

      Ensure all affected systems and applications are operating as predicted.

      Update change ticket and change log

      Update RFC status and CMDB as well (if necessary).

      Transition

      Once the change implementation is complete, it’s imperative that the team involved inform and train the operational and support groups.

      If you need to define transitioning changes to production, download Transition Projects to the Service Desk

      5. Alignment at post-implementation

      Tackle the most neglected portion of change management to avoid making the same mistake twice.

      1. Define RFC statuses that need a PIR
      2. Conduct PIRs for failed changes. Successful changes can simply be noted and transitioned to operations.

      3. Conduct a PIR for every failed change
      4. It’s best to perform a PIR once a change-related incident is resolved.

      5. Avoid making the same mistake twice
      6. Include a root-cause analysis, mitigation actions/timeline, and lessons learned in the documentation.

      7. Report to CAB
      8. Socialize the findings of the PIR at the subsequent CAB meeting.

      9. Circle back on previous PIRs
      10. If a similar change is conducted, append the related PIR to avoid the same mistakes.

      Info-Tech Insight

      Include your PIR documentation right in the RFC for easy reference.

      Download the RFC template for more details on post-implementation reviews

      2 Implement your alignments stepwise

      1. As a group, decide on which implementations you need to make to align change management and project management.
      2. For each improvement, list a timeline for implementation.
      3. Update section 3.5 in the Change Management Standard Operating Procedure (SOP). to outline the responsibilities of project management within IT Change Management.

      The image contains a screenshot of the Change Management SOP

      Download the Change Management Standard Operating Procedure (SOP).

      Input Output
      • This deck
      • SOP update
      Materials Participants
      • Whiteboard/flip charts (or shared screen if working remotely)
      • Service catalog (if applicable)
      • Sticky notes
      • Markers/pens
      • Change Management SOP
      • Change Manager
      • Project Managers
      • Members of the Change Advisory Board

      Related Info-Tech Research

      Optimize IT Change Management

      Right-size IT change management to protect the live environment.

      Optimize IT Project Intake, Approval, and Prioritization

      Decide which IT projects to approve and when to start them.

      Maintain an Organized Portfolio

      Align portfolio management practices with COBIT (APO05: Manage Portfolio).

      Optimize the Service Desk With a Shift-Left Strategy

      • Buy Link or Shortcode: {j2store}478|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $21,171 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Tier 2 and 3 specialists lose time and resources working on tickets instead of more complex projects.
      • The service desk finds themselves resolving the same incidents over and over, wasting manual work on tasks that could be automated.
      • Employees expect modern, consumer-like experiences when they need help; they want to access information and resources from wherever they are and have the tools to solve their problems themselves without waiting for help.

      Our Advice

      Critical Insight

      • It can be difficult to overcome the mindset that difficult functions need to be escalated. Shift left involves a cultural change to the way the service desk works, and overcoming objections and getting buy-in up front is critical.
      • Many organizations have built a great knowledgebase but fail to see the value of it over time as it becomes overburdened with overlapping and out-of-date information. Knowledge capture, updating, and review must be embedded into your processes if you want to keep the knowledgebase useful.
      • Similarly, the self-service portal is often deployed out of the box with little input from end users and fails to deliver its intended benefits. The portal needs to be designed from the end user’s point of view with the goal of self-resolution if it will serve its purpose of deflecting tickets.

      Impact and Result

      • Embrace a shift-left strategy by moving repeatable service desk tasks and requests into lower-cost delivery channels such as self-help tools and automation.
      • Shift work from Tier 2 and 3 support to Tier 1 through good knowledge management practices that empower the first level of support with documented solutions to recurring issues and free up more specialized resources for project work and higher value tasks.
      • Shift knowledge from the service desk to the end user by enabling them to find their own solutions. A well-designed and implemented self-service portal will result in fewer logged tickets to the service desk and empowered, satisfied end users.
      • Shift away manual repetitive work through the use of AI and automation.
      • Successfully shifting this work left can reduce time to resolve, decrease support costs, and increase end-user satisfaction.

      Optimize the Service Desk With a Shift-Left Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand why a shift-left strategy can help to optimize your service desk, review Info-Tech's methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare to shift left

      Assess whether you’re ready to optimize the service desk with a shift-left strategy, get buy-in for the initiative, and define metrics to measure success.

      • Optimize the Service Desk With a Shift-Left Strategy – Phase 1: Prepare to Shift Left
      • Shift-Left Prerequisites Assessment
      • Shift-Left Strategy
      • Shift-Left Stakeholder Buy-In Presentation

      2. Design shift-left model

      Build strategy and identify specific opportunities to shift service support left to Level 1 through knowledge sharing and other methods, to the end-user through self-service, and to automation and AI.

      • Optimize the Service Desk With a Shift-Left Strategy – Phase 2: Design Shift Left Model
      • Shift-Left Action Plan
      • Knowledge Management Workflows (Visio)
      • Knowledge Management Workflows (PDF)
      • Self-Service Portal Checklist
      • Self-Service Resolution Workflow (Visio)
      • Self-Service Resolution Workflow (PDF)

      3. Implement and communicate

      Identify, track, and implement specific shift-left opportunities and document a communications plan to increase adoption.

      • Optimize the Service Desk With a Shift-Left Strategy – Phase 3: Implement & Communicate
      • Incident Management Workflow (Visio)
      • Incident Management Workflow (PDF)
      [infographic]

      Workshop: Optimize the Service Desk With a Shift-Left Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Prepare to Shift Left

      The Purpose

      Define how shift left would apply in your organization, get buy-in for the initiative, and define metrics to measure success.

      Key Benefits Achieved

      Defined scope and objectives for the shift-left initiative

      Buy-in for the program

      Metrics to keep the project on track and evaluate success

      Activities

      1.1 Review current service desk structure

      1.2 Discuss challenges

      1.3 Review shift-left model and discuss how it would apply in your organization

      1.4 Complete the Shift-Left Prerequisites Assessment

      1.5 Complete a RACI chart for the project

      1.6 Define and document objectives

      1.7 Review the stakeholder buy-in presentation

      1.8 Document critical success factors

      1.9 Define KPIs and metrics

      Outputs

      Shift-left scope

      Completed shift-left prerequisites assessment

      RACI chart

      Defined objectives

      Stakeholder buy-in presentation

      Critical success factors

      Metrics to measure success

      2 Plan to Shift to Level 1

      The Purpose

      Build strategy and identify specific opportunities to shift service support left to Level 1 through knowledge sharing and other methods.

      Key Benefits Achieved

      Identified initiatives to shift work to Level 1

      Documented knowledge management process workflows and strategy

      Activities

      2.1 Identify barriers to Level 1 resolution

      2.2 Discuss knowledgebase challenges and areas for improvement

      2.3 Optimize KB input process

      2.4 Optimize KB usage process

      2.5 Optimize KB review process

      2.6 Discuss and document KCS strategy and roles

      2.7 Document knowledge success metrics

      2.8 Brainstorm additional methods of increasing FLR

      Outputs

      KB input workflow

      KB usage workflow

      KB review workflow

      KCS strategy and roles

      Knowledge management metrics

      Identified opportunities to shift to Level 1

      3 Plan to Shift to End User and Automation

      The Purpose

      Build strategy and identify specific opportunities to shift service support left to the end user through self-service and to automation and AI.

      Key Benefits Achieved

      Identified initiatives to shift work to self-service and automation

      Evaluation of self-service portal and identified opportunities for improvement

      Activities

      3.1 Review existing self-service portal and discuss vision

      3.2 Identify opportunities to improve portal accessibility, UI, and features

      3.3 Evaluate the user-facing knowledgebase

      3.4 Optimize the ticket intake form

      3.5 Document plan to improve, communicate, and evaluate portal

      3.6 Map the user experience with a workflow

      3.7 Document your AI strategy

      3.8 Identify candidates for automation

      Outputs

      Identified opportunities to improve portal

      Improvements to knowledgebase

      Improved ticket intake form

      Strategy to communicate and measure success of portal

      Self-service resolution workflow

      Strategy to apply AI and automation

      Identified opportunities to shift tasks to automation

      4 Build Implementation and Communication Plan

      The Purpose

      Build an action plan to implement shift left, including a communications strategy.

      Key Benefits Achieved

      Action plan to track and implement shift-left opportunities

      Communications plan to increase adoption

      Activities

      4.1 Examine process workflows for shift-left opportunities

      4.2 Document shift-left-specific responsibilities for each role

      4.3 Identify and track shift-left opportunities in the action plan

      4.4 Brainstorm objections and responses

      4.5 Document communications plan

      Outputs

      Incident management workflow with shift-left opportunities

      Shift left responsibilities for key roles

      Shift-left action plan

      Objection handling responses

      Communications plan

      Build and Deliver an Optimized IT Update Presentation

      • Buy Link or Shortcode: {j2store}269|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Manage Business Relationships
      • Parent Category Link: /manage-business-relationships
      • IT update presentation success comes with understanding the business and the needs of your stakeholders. It often takes time and effort to get it right.
      • Many IT updates are too technically focused and do not engage nor demonstrate value in the eyes of the business.
      • This is not the time to boast about technical metrics that lack relevance.
      • Too often IT updates are prepared without the necessary pre-discussions required to validate content and hone priorities.

      Our Advice

      Critical Insight

      • CIOs need to take charge of the IT value proposition, increasing the impact and strategic role of IT.
      • Use your IT update to focus decisions, improve relationships, find new sources of value, and drive credibility.
      • Evolve the strategic partnership with your business using key metrics to help guide the conversation.

      Impact and Result

      • Build and deliver an IT update that focuses on what is most important.
      • Achieve the buy-in you require while driving business value.
      • Gain clarity on your scope, goals, and outcomes.
      • Validate IT’s role as a strategic business partner.

      Build and Deliver an Optimized IT Update Presentation Research & Tools

      Start here – read the Executive Brief

      Read our Executive Brief to find out how an optimized IT update presentation is your opportunity to drive business value.Review Info-Tech’s methodology and understand how we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Scope and goals

      Confirm the “why” of the IT update presentation by determining its scope and goals.

      • Build and Deliver an Optimized IT Update Presentation – Phase 1: Scope and Goals

      2. Assess and build

      Confirm the “what” of the presentation by focusing on business requirements, metrics, presentation creation, and stakeholder validation.

      • Build and Deliver an Optimized IT Update Presentation – Phase 2: Assess and Build
      • IT Update Stakeholder Interview Guide
      • IT Metrics Prioritization Tool

      3. Deliver and inspire

      Confirm the “how” of the presentation by focusing on engaging your audience, getting what you need, and creating a feedback cycle.

      • Build and Deliver an Optimized IT Update Presentation – Phase 3: Deliver and Inspire
      • IT Update Open Issues Tracking Tool
      [infographic]

      Workshop: Build and Deliver an Optimized IT Update Presentation

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope, Goals, and Requirements

      The Purpose

      Determine the IT update’s scope and goals and identify stakeholder requirements

      Key Benefits Achieved

      IT update scope and goals

      Business stakeholder goals and requirements

      Activities

      1.1 Determine/validate the IT update scope

      1.2 Determine/validate the IT update goals

      1.3 Business context analysis

      1.4 Determine stakeholder needs and expectations

      1.5 Confirm business goals and requirements

      Outputs

      Documented IT update scope

      Documented IT update goals

      Validated business context

      Stakeholder requirements analysis

      Confirmed business goals and requirements

      2 Validate Metrics With Business Needs

      The Purpose

      Analyze metrics and content and validate against business needs

      Key Benefits Achieved

      Selection of key metrics

      Metrics and content validated to business needs

      Activities

      2.1 Analyze current IT metrics

      2.2 Review industry best-practice metrics

      2.3 Align metrics and content to business stakeholder needs

      Outputs

      Identification of key metrics

      Finalization of key metrics

      Metrics and content validated to business stakeholder needs

      3 Create an optimized IT update

      The Purpose

      Create an IT update presentation that is optimized to business needs

      Key Benefits Achieved

      Optimized IT update presentation

      Activities

      3.1 Understand the audience and how to best engage them

      3.2 Determine how to present the pertinent data

      3.3 IT update review with key business stakeholders

      3.4 Final edits and review of IT update presentation

      3.5 Pre-presentation checklist

      Outputs

      Clarity on update audience

      Draft IT update presentation

      Business stakeholder feedback

      Finalized IT update presentation

      Confirmation on IT update presentation readiness

      Manage Requirements in an Agile Environment

      • Buy Link or Shortcode: {j2store}522|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Requirements & Design
      • Parent Category Link: /requirements-and-design

      The process of navigating from waterfall to Agile can be incredibly challenging. Even more problematic; how do you operate your requirements management practices once there? There traditionally isn’t a role for a business analyst, the traditional keeper of requirements. It isn’t like switching on a light.

      You likely find yourself struggling to deliver high quality solutions and requirements in Agile. This is a challenge for many organizations, regardless of how long they’ve leveraged Agile.

      But you aren’t here for assurances. You’re here for answers and help.

      Our Advice

      Critical Insight

      Agile and requirements management are complementary, not competitors.

      Impact and Result

      Info-Tech’s advice? Why choose? Why have to pick between traditional waterfall and Agile delivery? If Agile without analysis is a recipe for disaster, Agile with analysis is the solution. How can you leverage the Info-Tech approach to align your Agile and requirements management efforts into a powerful combination?

      Manage Requirements in an Agile Environment is your guide.

      Use the contents and exercises of this blueprint to gain a shared understanding of the two disciplines, to find your balance in your approach, to define your thresholds, and ultimately, to prepare for new ways of working.

      Manage Requirements in an Agile Environment Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Manage Requirements in an Agile Environment Blueprint – Agile and Requirements Management are complementary, not competitors

      Provides support and guidance for organizations struggling with their requirements management practices in Agile environments.

      • Manage Requirements in an Agile Environment Storyboard

      2. Agile Requirements Playbook – A practical playbook for aligning your teams, and articulating the guidelines for managing your requirements in Agile.

      The Agile Requirements Playbook becomes THE artifact for your Agile requirements practices. Great for onboarding, reviewing progress, and ensuring a shared understanding of your ways of working.

      • Agile Requirements Playbook

      3. Documentation Calculator – A tool for determining the right level of documentation for your organization, and whether you’re spending too much, or even not enough, on Agile Requirements documentation.

      The Documentation Calculator can inform your documentation decison making, ensuring you're investing just the right amount of time, money, and effort.

      • Documentation Calculator

      4. Agile Requirements Workbook – Supporting tools and templates in advancing your Agile Requirements practice, to be used in conjunction with the Agile Requirements Blueprint, and the Playbook.

      This workbook is designed to capture the results of your exercises in the Manage Requirements in an Agile Environment Storyboard. Each worksheet corresponds to an exercise in the storyboard. This is a tool for you, so customize the content and layout to best suit your product. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

      • Agile Requirements Workbook

      5. Agile Requirements Assessment – Establishes your current Agile requirements maturity, defines your target maturity, and supports planning to get there.

      The Agile Requirements Assessment is a great tool for determining your current capabilities and maturity in Agile and Business Analysis. You can also articulate your target state, which enables the identification of capability gaps, the creation of improvement goals, and a roadmap for maturing your Agile Requirements practice.

      • Agile Requirements Assessment

      Infographic

      Workshop: Manage Requirements in an Agile Environment

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Framing Agile and Business Analysis

      The Purpose

      Sets the context for the organization, to ensure a shared understanding of the benefits of both Agile and business analysis/requirements management.

      Key Benefits Achieved

      Have a shared definition of Agile and business analysis / requirements.

      Understand the current state of Agile and business analysis in your organization.

      Activities

      1.1 Define what Agile and business analysis mean in your organization.

      1.2 Agile requirements assessment.

      Outputs

      Alignment on Agile and business analysis / requirements in your organization.

      A current and target state assessment of Agile and business analysis in your organization.

      2 Tailoring Your Approach

      The Purpose

      Confirm you’re going the right way for effective solution delivery.

      Key Benefits Achieved

      Confirm the appropriate delivery methodology.

      Activities

      2.1 Confirm your selected methodology.

      Outputs

      Confidence in your selected project delivery methodology.

      3 Defining Your Requirements Thresholds

      The Purpose

      Provides the guardrails for your Agile requirements practice, to define a high-level process, roles and responsibilities, governance and decision-making, and how to deal with change.

      Key Benefits Achieved

      Clearly defined interactions between the BA and their partners

      Define a plan for management and governance at the project team level

      Activities

      3.1 Define your agile requirements process.

      3.2 Define your agile requirements RACI.

      3.3 Define your governance.

      3.4 Define your change and backlog refinement plan.

      Outputs

      Agile requirements process.

      Agile requirements RACI.

      A governance and documentation plan.

      A change and backlog refinement approach.

      4 Planning Your Next Steps

      The Purpose

      Provides the action plan to achieve your target state maturity

      Key Benefits Achieved

      Recognize and prepare for the new ways of working for communication, stakeholder engagement, within the team, and across the organization.

      Establish a roadmap for next steps to mature your Agile requirements practice.

      Activities

      4.1 Define your stakeholder communication plan.

      4.2 Identify your capability gaps.

      4.3 Plan your agile requirements roadmap.

      Outputs

      A stakeholder communication plan.

      A list of capability gaps to achieve your desired target state.

      A prioritized roadmap to achieve the target state.

      5 Agile Requirements Techniques (Optional)

      The Purpose

      To provide practical guidance on technique usage, which can enable an improved experience with technical elements of the blueprint.

      Key Benefits Achieved

      An opportunity to learn new tools to support your Agile requirements practice.

      Activities

      5.1 Managing requirements' traceability.

      5.2 Creating and managing user stories.

      5.3 Managing your requirements backlog.

      5.4 Maintaining a requirements library.

      Outputs

      Support and advice for leveraging a given tool or technique.

      Support and advice for leveraging a given tool or technique.

      Support and advice for leveraging a given tool or technique.

      Support and advice for leveraging a given tool or technique.

      Further reading

      Manage Requirements in an Agile Environment

      Agile and requirements management are complementary, not competitors

      Analyst's Perspective

      The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business then you have failed, regardless of how fast you've gone.

      Delivery in Agile doesn't mean you stop needing solid business analysis. In fact, it's even more critical, to ensure your products and projects are adding value. With the rise of Agile, the role of the business analyst has been misunderstood.

      As a result, we often throw out the analysis with the bathwater, thinking we'll be just fine without analysis, documentation, and deliberate action, as the speed and dexterity of Agile is enough.

      Consequently, what we get is wasted time, money, and effort, with solutions that fail to deliver value, or need to be re-worked to get it right.

      The best organizations find balance between these two forces, to align, and gain the benefits of both Agile and business analysis, working in tandem to manage requirements that bring solutions that are "just right".

      This is a picture of Vincent Mirabelli

      Vincent Mirabelli
      Principal Research Director, Applications Delivery and Management
      Info-Tech Research Group

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      The process of navigating from waterfall to Agile can be incredibly challenging. And even more problematic; how do you operate your requirements management practices once there? Since there traditionally isn't a role for a business analyst; the traditional keeper of requirements. it isn't like switching on a light.

      You likely find yourself struggling to deliver high quality solutions and requirements in Agile. This is a challenge for many organizations, regardless of how long they've leveraged Agile.

      But you aren't here for assurances. You're here for answers and help.

      Common Obstacles

      many organizations and teams face is that there are so busy doing Agile that they fail to be Agile.

      Agile was supposed to be the saving grace of project delivery but is misguided in taking the short-term view of "going quickly" at the expense of important elements, such as team formation and interaction, stakeholder engagement and communication, the timing and sequencing of analysis work, decision-making, documentation, and dealing with change.

      The idea that good requirements just happen because you have user stories is wrong. So, requirements remain superficial, as you "can iterate later"…but sometimes later never comes, or doesn't come fast enough.

      Organizations need to be very deliberate when aligning their Agile and requirements management practices. The work is the same. How the work is done is what changes.

      Info-Tech's Approach

      Infotech's advice? Why choose? Why have to pick between traditional waterfall and Agile delivery? If Agile without analysis is a recipe for disaster, Agile with analysis is the solution. And how can you leverage the Info-Tech approach to align your Agile and requirements management efforts into a powerful combination?

      Manage Requirements in an Agile Environment is your guide.

      Use the contents and exercises of this blueprint to gain a shared understanding of the two disciplines, to find your balance in your approach, to define your thresholds, and ultimately, to prepare for new ways of working.

      Info-Tech Insight

      Agile and requirements management are complementary, not competitors.

      The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business, then you have failed, regardless of how fast you've gone.

      Insight summary

      Overarching insight

      Agile and requirements management are complementary, not competitors.

      The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business, then you have failed, regardless of how fast you've gone

      Phase 1 insight

      • The purpose of requirements in waterfall is for approval. The purpose in Agile is for knowledge management, as Agile has no memory.
      • When it comes to the Agile manifesto, "over" does not mean "instead of".
      • In Agile, the what of business analysis does doesn't change. What does change is the how and when that work happens.

      Phase 2 insight

      • Understand your uncertainties; it's a great way to decide what level of Agile (if any) is needed.
      • Finding your "Goldilocks" zone will take time. Be patient.

      Phase 3 insight

      • Right-size your governance, based on team dynamics and project complexity. A good referee knows when to step in, and when to let the game flow.
      • Agile creates a social contract amongst the team, and with their leaders and organization.
      • Documentation needs to be valuable. Do what is acceptable and necessary to move work to future steps. Not documenting also comes with a cost, but one you pay in the future. And that bill will come due, with interest (aka, technical debt, operational inefficiencies, etc.).
      • A lack of acceptable documentation makes it more difficult to have agility. You're constantly revalidating your current state (processes, practices and structure) and re-arguing decisions already made. This slows you down more than maintaining documentation ever would.

      Phase 4 insight

      • Making Agile predictable is hard, because people are not predictable; people are prone to chaos.

      There have been many challenges with waterfall delivery

      It turns out waterfall is not that great at reducing risk and ensuring value delivery after all

      • Lack of flexibility
      • Difficulty in measuring progress
      • Difficulties with scope creep
      • Limited stakeholder involvement
      • Long feedback loops

      48%
      Had project deadlines more than double

      85%
      Exceeded their original budget by at least 20%

      25%
      At least doubled their original budget

      This is an image of the waterfall project results

      Source: PPM Express.

      Agile was meant to address the shortcomings of waterfall

      The wait for solutions was too long for our business partners. The idea of investing significant time, money, and resources upfront, building an exhaustive and complete vision of the desired state, and then waiting months or even years to get that solution, became unpalatable for them. And rightfully so. Once we cast a light on the pains, it became difficult to stay with the status quo. Given that organizations evolve at a rapid pace, what was a pain at the beginning of an initiative may not be so even 6 months later.

      Agile became the answer.

      Since its' first appearance nearly 20 years ago, Agile has become the methodology of choice for a many of organizations. According to the 15th Annual State of Agile report, Agile adoption within software development teams increased from 37% in 2020 to 86% in 2021.

      Adopting Agile led to challenges with requirements

      Requirements analysis, design maturity, and management are critical for a successful Agile transformation.

      "One of the largest sources of failure we have seen on large projects is an immature Agile implementation in the context of poorly defined requirements."
      – "Large Scale IT Projects – From Nightmare to Value Creation"

      "Requirements maturity is more important to project outcomes than methodology."
      – "Business Analysis Benchmark: Full Report"

      "Mature Agile practices spend 28% of their time on analysis and design."
      – "Quantitative Analysis of Agile Methods Study (2017): Twelve Major Findings"

      "There exists a Requirements Premium… organizations using poor practices spent 62% more on similarly sized projects than organizations using the best requirements practices."
      – "The Business Case for Agile Business Analysis" - Requirements Engineering Magazine

      Strong stakeholder satisfaction with requirements results in higher satisfaction in other areas

      This is an image of a bar graph comparing the percentage of respondents with high stakeholder satisfaction, to the percentage of respondents with low stakeholder satisfaction for four different categories.  these include: Availability of IT Capacity to Complete Projects; Overall IT Projects; IT Projects Meet Business Needs; Overall IT Satisfaction

      N= 324 small organizations from Info-Tech Research Group's CIO Business Vision diagnostic.

      Note: High satisfaction was classified as organizations with a score greater or equal to eight and low satisfaction was every organization that scored below eight on the same questions.

      Info-Tech's Agile requirements framework

      This is an image of Info-Tech's Agile requirements framework.  The three main categories are: Sprint N(-1); Sprint N; Sprint N(+1)

      Agile requirements are a balancing act

      Collaboration

      Many subject matter experts are necessary to create accurate requirements, but their time is limited too.

      Communication

      Stakeholders should be kept informed throughout the requirements gathering process, but you need to get the right information to the right people.

      Documentation

      Recording, organizing, and presenting requirements are essential, but excessive documentation will slow time to delivery.

      Control

      Establishing control points in your requirements gathering process can help confirm, verify, and approve requirements accurately, but stage gates limit delivery.

      What changes for the business analyst?

      In Agile, the what of business analysis does not change.

      What does change is the how and when that work happens.

      Business analysts need to focus on six key elements when managing requirements in Agile.

      • Team formation and interaction
      • Stakeholder engagement and communication
      • The timing and sequencing of their work
      • Decision-making
      • Documentation
      • Dealing with change

      Where does the business analysis function fit on an Agile team?

      Team formation is key, as Agile is a team sport

      A business analyst in an Agile team typically interacts with several different roles, including:

      • The product owner,
      • The Sponsor or Executive
      • The development team,
      • Other stakeholders such as customers, end-users, and subject matter experts
      • The Design team,
      • Security,
      • Testing,
      • Deployment.

      This is an image the roles who typically interact with a Business Analyst.

      How we do our requirements work will change

      • Team formation and interaction
      • Stakeholder engagement and communication
      • The timing and sequencing of their work
      • Decision-making
      • Documentation
      • Dealing with change

      As a result, you'll need to focus on;

      • Emphasizing flexibility
      • Enabling continuous delivery
      • Enhancing collaboration and communication
      • Developing a user-centered approach

      Get stakeholders on board with Agile requirements

      1. Stakeholder feedback and management support are key components of a successful Agile Requirements.
      2. Stakeholders can see a project's progression and provide critical feedback about its success at critical milestones.
      3. Management helps teams succeed by trusting them to complete projects with business value at top of mind and by removing impediments that are inhibiting their productivity.
      4. Agile will bring a new mindset and significant numbers of people, process, and technology changes that stakeholders and management may not be accustomed to. Working through these issues in requirements management enables a smoother rollout.
      5. Management will play a key role in ensuring long-term Agile requirements success and ultimately rolling it out to the rest of the organization.
      6. The value of leadership involvement has not changed even though responsibilities will. The day-to-day involvement in projects will change but continual feedback will ultimately dictate the success or failure of a project.

      Measuring your success

      Tracking metrics and measuring your progress

      As you implement the actions from this Blueprint, you should see measurable improvements in;

      • Team and stakeholder satisfaction
      • Requirements quality
      • Documentation cost

      Without sacrificing time to delivery

      Metric Description and motivation
      Team satisfaction (%) Expect team satisfaction to increase as a result of clearer role delineation and value contribution.
      Stakeholder satisfaction (%) Expect Stakeholder satisfaction to similarly increase, as requirements quality increases, bringing increased value
      Requirements rework Measures the quality of requirements from your Agile Projects. Expect that the Requirements Rework will decrease, in terms of volume/frequency.
      Cost of documentation Quantifies the cost of documentation, including Elicitation, Analysis, Validation, Presentation, and Management
      Time to delivery Balancing Metric. We don't want improvements in other at the expense of time to delivery

      Info-Tech's methodology for Agile requirements

      1. Framing Agile and Business Analysis

      2. Tailoring Your Approach

      3. Defining Your Requirements Thresholds

      4. Planning Your Next Steps

      Phase Activities

      1.1 Understand the benefits and limitations of Agile and business analysis

      1.2 Align Agile and business analysis within your organization

      2.1 Decide the best-fit approach for delivery

      2.2 Manage your requirements backlog

      3.1 Define project roles and responsibilities

      3.2 Define your level of acceptable documentation

      3.3 Manage requirements as an asset

      3.4 Define your requirements change management plan

      4.1 Preparing new ways of working

      4.2 Develop a roadmap for next steps

      Phase Outcomes

      Recognize the benefits and detriments of both Agile and BA.

      Understand the current state of Agile and business analysis in your organization.

      Confirm the appropriate delivery methodology.

      Manage your requirements backlog.

      Connect the business need to user story.

      Clearly defined interactions between the BA and their partners.

      Define a plan for management and governance at the project team level.

      Documentation and tactics that are right-sized for the need.

      Recognize and prepare for the new ways of working for communication, stakeholder engagement, within the team, and across the organization.

      Establish a roadmap for next steps to mature your Agile requirements practice.

      Blueprint tools and templates

      Key deliverable:

      This is a screenshot from the Agile Requirements Playbook

      Agile Requirements Playbook

      A practical playbook for aligning your teams and articulating the guidelines for managing your requirements in Agile

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      This is a screenshot from the Documentation Calculator

      Documentation Calculator

      A tool to help you answer the question: What is the right level of Agile requirements documentation for my organization?

      This is a screenshot from the Agile Requirements Assessment

      Agile Requirements Assessment

      Establishes your current maturity level, defines your target state, and supports planning to get there.

      This is a screenshot from the Agile Requirements Workbook

      Agile Requirements Workbook

      Supporting tools and templates in advancing your Agile requirements practice, to be used with the Agile Requirements Blueprint and Playbook.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      1. Framing Agile and Business Analysis / 2. Tailoring Your Approach 3. Defining Your Requirements
      Thresholds
      3. Defining Your Requirements Thresholds / 4. Planning Your Next Steps (OPTIONAL) Agile Requirements Techniques (a la carte) Next Steps and Wrap-Up (Offsite)

      Activities

      What does Agile mean in your organization? What do requirements mean in your organization?

      Agile Requirements Assessment

      Confirm your selected methodology

      Define your Agile requirements process

      Define your Agile requirements RACI (Optional)

      Define your Agile requirements governance

      Defining your change management plan

      Define your

      communication plan

      Capability gap list

      Planning your Agile requirements roadmap

      Managing requirements traceability

      Creating and managing user stories

      Managing your requirements backlog

      Maintaining a requirements library

      Develop Agile Requirements Playbook

      Complete in-progress deliverables from previous four days.

      Set up review time for workshop deliverables and next steps

      Outcomes

      Shared definition of Agile and business analysis / requirements

      Understand the current state of Agile and business analysis in your organization

      Agile requirements process

      Agile requirements RACI (Optional)

      Defined Agile requirements governance and documentation plan

      Change and backlog refinement plan

      Stakeholder communication plan

      Action plan and roadmap for maturing your Agile requirements practice

      Practical knowledge and practice about various tactics and techniques in support of your Agile requirements efforts

      Completed Agile Requirements Playbook

      Guided Implementation

      Phase 1 Phase 2 Phase 3 Phase 4

      Call #1: Scope objectives, and your specific challenges.

      Call #4: Define your approach to project delivery.

      Call #6: Define your Agile requirements process.

      Call #9: Identify gaps from current to target state maturity.

      Call #2: Assess current maturity.

      Call #5: Managing your requirements backlog.

      Call #7: Define roles and responsibilities.

      Call #10: Pprioritize next steps to mature your Agile requirements practice.

      Call #3: Identify target-state capabilities.

      Call #8: Define your change and backlog refinement approach.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 10 calls over the course of 4 to 6 months.

      Framing Agile and Business Analysis

      Phase 1

      Framing Agile and Business Analysis

      Phase 1Phase 2Phase 3Phase 4

      1.1 Understand the benefits and limitations of Agile and business analysis

      1.2 Align Agile and business analysis within your organization

      2.1 Confirm the best-fit approach for delivery

      2.2 manage your requirements backlog

      3.1 Define project roles and responsibilities

      3.2 define your level of acceptable documentation

      3.3 Manage requirements as an asset

      3.4 Define your requirements change management plan

      4.1 Preparing new ways of working

      4.2 Develop a roadmap for next steps

      This phase will walk you through the following activities:

      • EXERCISE: What do Agile and requirements mean in your organization?
      • ASSESSMENT: Agile requirements assessment
      • KEY DELIVERABLE: Agile Requirements Playbook

      This phase involves the following participants:

      • Business analyst and project team
      • Stakeholders
      • Sponsor/Executive

      Managing Requirements in an Agile Environment

      Step 1.1

      Understand the benefits and limitations of Agile and business analysis

      Activities

      1.1.1 Define what Agile and business analysis mean in your organization

      This step involves the following participants:

      • Business analyst and project team
      • Sponsor/Executive

      Outcomes of this step

      • Recognize the benefits and detriments of both Agile and business analysis

      Framing Agile and Business Analysis

      There have been many challenges with waterfall delivery

      It turns out waterfall is not that great at reducing risk and ensuring value delivery after all

      • Lack of flexibility
      • Difficulty in measuring progress
      • Difficulties with scope creep
      • Limited stakeholder involvement
      • Long feedback loops

      48%
      Had project deadlines more than double

      85%
      Exceeded their original budget by at least 20%

      25%
      At least doubled their original budget

      This is an image of the Waterfall Project Results

      Source: PPM Express.

      Business analysis had a clear home in waterfall

      Business analysts had historically been aligned to specific lines of business, in support of their partners in their respective domains. Somewhere along the way, the function was moved to IT. Conceptually this made sense, in that it allowed BAs to provide technical solutions to complex business problems. This had the unintended result of lost domain knowledge, and connection to the business.

      It all starts with the business. IT enables business goals. The closer you can get to the business, the better.

      Business analysts were the main drivers of helping to define the business requirements, or needs, and then decompose those into solution requirements, to develop the best option to solve those problems, or address those needs. And the case for good analysis was clear. The later a poor requirement was caught, the more expensive it was to fix. And if requirements were poor, there was no way to know until much later in the project lifecycle, when the cost to correct them was exponentially higher, to the tune of 10-100x the initial cost.

      This is an image of a graph showing the cost multiplier for Formulating Requirements, Architecture Design, Development, Testing and, Operations

      Adapted from PPM Express. "Why Projects Fail: Business Analysis is the Key".

      Agile was meant to address the shortcomings of waterfall

      The wait for solutions was too long for our business partners. The idea of investing significant time, money, and resources upfront, building an exhaustive and complete vision of the desired state, and then waiting months or even years to get that solution became unpalatable for them. And rightfully so. Once we cast a light on the pains, it became difficult to stand pat in the current state. And besides, organizations evolve at a rapid pace. What was a pain at the beginning of an initiative may not be so even six months later.

      Agile became the answer.

      Since its first appearance nearly 20 years ago, Agile has become the methodology of choice for a huge swathe of organizations. According to the 15th Annual State of Agile report, Agile adoption within software development teams increased from 37% in 2020 to 86% in 2021.

      To say that's significant is an understatement.

      The four core values of Agile helped shift focus

      According to the Agile manifesto, "We value. . ."

      This is an image of what is valued according to the Agile Manifesto.

      "…while there is value in the items on the right, we value the items on the left more."

      Source: Agilemanifesto, 2001

      Agile has made significant inroads in IT and beyond

      94% of respondents report using Agile practices in their organization

      according to Digital.AI's "The 15th State of Agile Report"

      That same report notes a steady expansion of Agile outside of IT, as other areas of the organization seek to benefit from increased agility and responsiveness, including Human Resources, Finance and Marketing.

      While it addressed some problems…

      This is an image of the Waterfall Project Results, compared to Agile Product Results.

      "Agile projects are 37% faster to market than [the] industry average"

      (Requirements Engineering Magazine, 2017)

      • Business requirements documents are massive and unreadable
      • Waterfall erects barriers and bottlenecks between the business and the development team
      • It's hard to define the solution at the outset of a project
      • There's a long turnaround between requirements work and solution delivery
      • Locking in requirements dictates an often-inflexible solution. And the costs to make changes tend to add up.

      …Implementing Agile led to other challenges

      This is an image of a series of thought bubbles, each containing a unique challenge resulting from implementing Agile.

      Adopting Agile led to challenges with requirements

      Requirements analysis, design maturity, and management are critical for a successful Agile transformation.

      "One of the largest sources of failure we have seen on large projects is an immature Agile implementation in the context of poorly defined requirements."
      – BCG, 2015

      "Requirements maturity is more important to project outcomes than methodology."
      – IAG Consulting, 2009.

      "Mature Agile practices spend 28% of their time on analysis and design."
      – InfoQ, 2017."

      "There exists a Requirements Premium… organizations using poor practices spent 62% more on similarly sized projects than organizations using the best requirements practices."
      – Requirements Engineering Magazine, 2017

      Strong stakeholder satisfaction with requirements results in higher satisfaction in other areas

      This is an image of a bar graph comparing the percentage of respondents with high stakeholder satisfaction, to the percentage of respondents with low stakeholder satisfaction for four different categories.  these include: Availability of IT Capacity to Complete Projects; Overall IT Projects; IT Projects Meet Business Needs; Overall IT Satisfaction

      N= 324 small organizations from Info-Tech Research Group's CIO Business Vision diagnostic.

      Note: High satisfaction was classified as organizations with a score greater or equal to eight and low satisfaction was every organization that scored below eight on the same questions.

      Agile is being misinterpreted as an opportunity to bypass planning and analysis activities

      Agile is a highly effective tool.

      This isn't about discarding Agile. It is being used for things completely outside of what was originally intended. When developing products or code, it is in its element. However, outside of that realm, its being used to bypass business analysis activities, which help define the true customer and business need.

      Business analysts were forced to adapt and shift focus. Overnight they morphed into product owners, or no longer had a place on the team. Requirements and analysis took a backseat.

      The result?

      Increased rework, decreased stakeholder satisfaction, and a lot of wasted money and effort.

      "Too often, the process of two-week sprints becomes the thing, and the team never gets the time and space to step back and obsess over what is truly needed to delight customers."
      Harvard Business Review, 9 April 2021.

      Info-Tech Insight

      Requirements in Agile are the same, but the purpose of requirements changes.

      • The purpose of requirements in waterfall is for stakeholder approval.
      • The purpose of requirements in Agile is knowledge management; to maintain a record of the current state.

      Many have misinterpreted the spirit of Agile and waterfall

      The stated principles of waterfall say nothing of how work is to be linear.

      This is an image of a comparison between using Agile and Being Prescriptive.This is an image of Royce's 5 principles for success.

      Source: Royce, Dr. Winston W., 1970.

      For more on Agile methodology, check out Info-Tech's Agile Research Centre

      How did the pendulum swing so far?

      Shorter cycles of work made requirements management more difficult. But the answer isn't to stop doing it.

      Organizations went from engaging business stakeholders up front, and then not until solution delivery, to forcing those partners to give up their resources to the project. From taking years to deliver a massive solution (which may or may not even still fit the need) to delivering in rapid cycles called sprints.

      This tug-of-war is costing organizations significant time, money, and effort.

      Your approach to requirements management needs to be centered. We can start to make that shift by better aligning our Agile and business analysis practices. Outside of the product space, Agile needs to be combined with other disciplines (Harvard Business Review, 2021) to be effective.

      Agility is important. Though it is not a replacement for approach or strategy (RCG Global Services, 2022). In Agile, team constraints are leveraged because of time. There is a failure to develop new capabilities to address the business needs Harvard Business Review, 2021).

      Agility needs analysis.

      Agile requirements are a balancing act

      Collaboration

      Many subject matter experts are necessary to create accurate requirements, but their time is limited too.

      Communication

      Stakeholders should be kept informed throughout the requirements gathering process, but you need to get the right information to the right people.

      Documentation

      Recording, organizing, and presenting requirements are essential, but excessive documentation will slow time to delivery.

      Control

      Establishing control points in your requirements gathering process can help confirm, verify, and approve requirements accurately, but stage gates limit delivery.

      Start by defining what the terms mean in your organization

      We do this because there isn't even agreement by the experts on what the terms "Agile" and "business analysis" mean, so let's establish a definition within the context of your organization.

      1.1.1 What do Agile and business analysis mean in your organization?

      Estimated time: 30 Minutes

      1. Explore the motivations behind the need for aligning Agile with business analysis. Are there any current challenges related to outputs, outcomes, quality? How can the team and organization align the two more effectively for the purposes of requirements management?
      2. Gather the appropriate stakeholders to discuss their definition of the terms "Agile" and "business analysis" It can be related to their experience, practice, or things they've read or heard.
      3. Brainstorm and document all shared thoughts and perspectives.
      4. Synthesize those thoughts and perspectives into a shared definition of each term, of a sentence or two.
      5. Revisit this definition as needed, and as your Agile requirements efforts evolve.

      Input

      • Challenges and experiences/perspectives related to Agile and business requirements

      Output

      • A shared definition of Agile and business analysis, to help guide alignment on Agile requirements management

      Materials

      • Agile Requirements Workbook

      Participants

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Build your Agile Requirements Playbook

      Keep the outcomes of this blueprint in a single document

      Share at the beginning of a new project, as part of team member onboarding, and revisit as your practice matures.

      This is a series of three screenshots from the Agile Requirements Playbook.

      Your Agile Requirements Playbook will include

      • Your shared definition of Agile and business analysis for your organization
      • The Agile Requirements Maturity Assessment
      • A Methodology Selection Matrix
      • Agile requirements RACI
      • A defined Agile requirements process
      • Documentation Calculator
      • Your Requirements Repository Information
      • Capability Gap List (from current to target state)
      • Target State Improvement Roadmap and Action Plan

      Step 1.2

      Align Agile and Business Analysis Within Your Organization

      Activities

      1.2.1 Assess your Agile requirements maturity

      This step involves the following participants:

      • Business Analyst and Project Team
      • Stakeholders
      • Sponsor/Executive

      Outcomes of this step

      • Complete the Agile Requirements Maturity Assessment to establish your current and target states

      Framing Agile and Business Analysis

      Consider the question: "Why Agile?"

      What is the driving force behind that decision?

      There are many reasons to leverage the power of Agile within your organization, and specifically as part of your requirements management efforts. And it shouldn't just be to improve productivity. That's only one aspect.
      Begin by asking, "Why Agile?" Are you looking to improve:

      • Time to market
      • Team engagement
      • Product quality
      • Customer satisfaction
      • Stakeholder engagement
      • Employee satisfaction
      • Consistency in delivery of value
      • Predictably of your releases

      Or a combination of the above?

      Info-Tech Insight

      Project delivery methodologies aren't either/or. You don't have to be 100% waterfall or 100% Agile. Select the right approach for your project, product, or service.

      In the end, your business partners don't want projects delivered faster, they want value faster!

      For more on understanding Agile, check out the Implement Agile Practices That Work Blueprint

      Responses to a 2019 KPMG survey:

      13% said that their top management fully supports Agile transformation.

      76% of organizations did not agree that their organization supports Agile culture.

      62% of top management believe Agile has no implications for them.

      What changes for the business analyst?

      Business analysts need to focus on six key elements when managing requirements in Agile.

      • Team formation and interaction
      • Stakeholder engagement and communication
      • The timing and sequencing of their work
      • Decision-making
      • Documentation
      • Dealing with change

      In Agile, the what of business analysis does not change.

      What does change is the how and when that work happens.

      1.2.1 Assess your Agile requirements maturity

      This is a series of screenshots from the Agile Requirements Maturity Assessment.

      1.2.1 Assess your Agile requirements maturity

      Estimated time: 30 Minutes

        1. Using the Agile Requirements Maturity Assessment, gather all appropriate stakeholders, and discuss and score the current state of your practice. Scoring can be done by:
          1. Consensus: Generally better with a smaller group, where the group agrees the score and documents the result
          2. Average: Have everyone score individually, and aggregate the results into an average, which is then entered.
          3. Weighted Average: As above, but weight the individual scores by individual or line of business to get a weighted average.
        2. When current state is complete, revisit to establish target state (or hold as a separate session) using the same scoring approach as in current state.
          1. Recognize that there is a cost to maturity, so don't default to the highest score by default.
          2. Resist the urge at this early stage to generate ideas to navigate from current to target state. We will re-visit this exercise in Phase 4, once we've defined other pieces of our process and practice.

      Input

      • Participant knowledge and experience

      Output

      • A current and target state assessment of your Agile requirements practice

      Materials

      • Agile Requirements Maturity Assessment

      Participants

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Tailoring Your Approach

      Phase 2

      Phase 1Phase 2Phase 3Phase 4

      1.1 Understand the benefits and limitations of Agile and business analysis

      1.2 Align Agile and business analysis within your organization

      2.1 Confirm the best-fit approach for delivery

      2.2 manage your requirements backlog

      3.1 Define project roles and responsibilities

      3.2 define your level of acceptable documentation

      3.3 Manage requirements as an asset

      3.4 Define your requirements change management plan

      4.1 Preparing new ways of working

      4.2 Develop a roadmap for next steps

      This phase will walk you through the following activities:

      • Selecting the appropriate delivery methodology
      • Managing your requirements backlog
      • Tracing from business need to user story

      This phase involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Managing Requirements in an Agile Environment

      Step 2.1

      Confirm the Best-fit Approach for Delivery

      Activities

      2.1.1 Confirm your methodology

      This step involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Outcomes of this step

      • A review of potential delivery methodologies to select the appropriate, best-fit approach to your projects

      Confirming you're using the best approach doesn't have be tricky

      Selecting the right approach (or confirming you're on the right track) is easier when you assess two key inputs to your project; your level of certainty about the solution, and the level of complexity among the different variables and inputs to your project, such as team experience and training, the number of impacted stakeholders or context. lines of business, and the organizational

      Solution certainty refers to the level of understanding of the problem and the solution at the start of the project. In projects with high solution certainty, the requirements and solutions are well defined, and the project scope is clear. In contrast, projects with low solution certainty have vague or changing requirements, and the solutions are not well understood.

      Project complexity refers to the level of complexity of the project, including the number of stakeholders, the number of deliverables, and the level of technical complexity. In projects with high complexity, there are many stakeholders with different priorities, many deliverables, and high technical complexity. In contrast, projects with low complexity have fewer stakeholders, fewer deliverables, and lower technical complexity.

      "Agile is a fantastic approach when you have no clue how you're going to solve a problem"

      • Ryan Folster, Consulting Services Manager, Business Analysis, Dimension Data

      Use Info-Tech's methodology selection matrix

      Waterfall methodology is best suited for projects with high solution certainty and high complexity. This is because the waterfall model follows a linear and sequential approach, where each phase of the project is completed before moving on to the next. This makes it ideal for projects where the requirements and solutions are well-defined, and the project scope is clear.

      On the other hand, Agile methodology is best suited for projects with low solution certainty. Agile follows an iterative and incremental approach, where the requirements and solutions are detailed and refined throughout the project. This makes it ideal for projects where the requirements and solutions are vague or changing.

      Note that there are other models that exist for determining which path to take, should this approach not fit within your organization.

      Use info-tech's-methodology-selection-matrix

      This is an image of Info-Tech’s methodology selection matrix

      Adapted from The Chaos Report, 2015 (The Standish Group)

      Download the Agile Requirements Workbook

      2.1.1 Confirm your methodology

      Estimated time: 30 Minutes

      1. Using the Agile Requirements Workbook, find the tab labelled "Methodology Assessment" and answer the questions to establish your complexity and certainty scores, where;

      1 = Strongly disagree
      2 = Disagree
      3 = Neutral
      4 = Agree
      5 = Strongly agree.

      1. In the same workbook, plot the results in the grid on the tab labelled "Methodology Matrix".
      2. Projects falling into Green are good fits for Agile. Yellow are viable. And Red may not be a great fit for Agile.
      3. Note: Ultimately, the choice of methodology is yours. Recognize there may be additional challenges when a project is too complex, or uncertainty is high.

      Input

      • Current project complexity and solution certainty

      Output

      • A clear choice of delivery methodology

      Materials

      • Agile Requirements Workbook

      Participants

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Step 2.2

      Manage Your Requirements Backlog

      Activities

      2.2.1 Create your user stories

      This step involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Outcomes of this step

      • Understand how to convert requirements into user stories, which populate the Requirements Backlog.

      Tailoring Your Approach

      There is a hierarchy to requirements

      This is a pyramid, with the base being: Solution Requirements; The middle being: Stakeholder Requirements; and the Apex being: Business Requirements.
      • Higher-level statements of the goals, objectives, or needs of the enterprise.
      • Business requirements focus on the needs of the organization, and not the stakeholders within it.

      Defines

      Intended benefits and outcomes

      • Statements of the needs of a particular stakeholder or class of stakeholders, and how that stakeholder will interact with a solution.

      Why it is needed, and by who

      • Describes the characteristics of a solution that meets business requirements and stakeholder requirements. Functional describes the behavior and information that the solution will manage. They describe capabilities the system will be able to perform in terms of behaviors or operations. Non-functional represents constraints on the ultimate solution and tends to be less negotiable.

      What is needed, and how its going to be achieved

      Connect the dots with a traceability matrix

      Business requirements describe what a company needs in order to achieve its goals and objectives. Solution requirements describe how those needs will be met. User stories are a way to express the functionality that a solution will provide from the perspective of an end user.

      A traceability matrix helps clearly connect and maintain your requirements.

      To connect business requirements to solution requirements, you can start by identifying the specific needs that the business has and then determining how those needs can be met through technology or other solutions; or what the solution needs to do to meet the business need. So, if the business requirement is to increase online sales, a solution requirement might include implementing a shopping cart feature on your company website.

      Once you have identified the solution requirements, you can then use those to create user stories. A user story describes a specific piece of functionality that the solution will provide from the perspective of a user.

      For example, "As a customer, I want to be able to add items to my shopping cart so that I can purchase them." This user story is directly tied to the solution requirement of implementing a shopping cart feature.

      Tracing from User Story back up to Business Requirement is essential in ensuring your solutions support your organization's strategic vison and objectives.

      This is an image of a traceability matrix for Business Requirements.

      Download the Info-Tech Requirements Traceability Matrix

      Improve the quality of your solution requirements

      A solution requirement is a statement that clearly outlines the functional capability that the business needs from a system or application.

      There are several attributes to look for in requirements:

      Verifiable

      Unambiguous

      Complete

      Consistent

      Achievable

      Traceable

      Unitary

      Agnostic

      Stated in a way that can be easily tested

      Free of subjective terms and can only be interpreted in one way

      Contains all relevant information

      Does not conflict with other requirements

      Possible to accomplish with budgetary and technological constraints

      Trackable from inception through to testing

      Addresses only one thing and cannot be decomposed into multiple requirements

      Doesn't pre-suppose a specific vendor or product

      For more on developing high quality requirements, check out the Improve Requirements Gathering Blueprint

      Prioritize your requirements

      When everything is a priority, nothing is a priority.

      Prioritization is the process of ranking each requirement based on its importance to project success. Each requirement should be assigned a priority level. The delivery team will use these priority levels to ensure efforts are targeted toward the proper requirements as well as to plan features available on each release. Use the MoSCoW Model of Prioritization to effectively order your requirements.

      The MoSCoW Model of Prioritization

      This is an image of The MoSCoW Model of Prioritization

      The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994

      (Source: ProductPlan).

      Base your prioritization on the right set of criteria

      Criteria Description
      Regulatory and legal compliance These requirements will be considered mandatory.
      Policy compliance Unless an internal policy can be altered or an exception can be made, these requirements will be considered mandatory.
      Business value significance Give a higher priority to high-value requirements.
      Business risk Any requirement with the potential to jeopardize the entire project should be given a high priority and implemented early.
      Likelihood of success Especially in proof-of-concept projects, it is recommended that requirements have good odds.
      Implementation complexity Give a higher priority to low implementation difficulty requirements.
      Alignment with strategy Give a higher priority to requirements that enable the corporate strategy.
      Urgency Prioritize requirements based on time sensitivity.
      Dependencies A requirement on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.

      Info-Tech Insight

      It is easier to prioritize requirements if they have already been collapsed, resolved, and rewritten. There is no point in prioritizing every requirement that is elicited up front when some of them will eventually be eliminated.

      Manage solution requirements in a Product backlog

      What is a backlog?

      Agile teams are familiar with the use of a Sprint Backlog, but in Requirements Management, a Product Backlog is a more appropriate choice.

      A product backlog and a Sprint backlog are similar in that they are both lists of items that need to be completed in order to deliver a product or project, but there are some key differences between the two.

      A product backlog is a list of all the features, user stories, and requirements that are needed for a product or project. It is typically created and maintained by the business analyst or product owner and is used to prioritize and guide the development of the product.

      A Sprint backlog, on the other hand, is a list of items specifically for an upcoming sprint, which is an iteration of work in Scrum. The Sprint backlog is created by the development team and is used to plan and guide the work that will be done during the sprint. The items in the Sprint backlog are typically taken from the product backlog and are prioritized based on their importance and readiness.

      For more on building effective product backlogs, visit Deliver on Your Digital Product Vision

      A backlog stores and organizes requirements at various stages

      Your backlog must give you a holistic understanding of demand for change in the product.

      A well-formed backlog can be thought of as a DEEP backlog

      Detailed appropriately: Requirements are broken down and refined as necessary

      Emergent: The backlog grows and evolves over time as requirements are added and removed.

      Estimated: The effort to deliver a requirement is estimated at each tier.

      Prioritized: A requirement's value and priority are determined at each tier.

      This is an image of an inverted funnel, with the top being labeled: Ideas; The middle being labeled: Qualified; and the bottom being labeled: Ready.

      Adapted from Essential Scrum

      Ensure requests and requirements are ready for development

      Clearly define what it means for a requirement, change, or maintenance request to be ready for development.

      This will help ensure the value and scope of each functionality and change are clear and well understood by both developers and stakeholders before the start of the sprint. The definition of ready should be two-fold: ready for the backlog, and ready for coding.

      1. Create a checklist that indicates when a requirement or request is ready for the development backlog. Consider the following questions:
        1. Is the requirement or request in the correct format?
        2. Does the desired functionality or change have significant business value?
        3. Can the requirement or request be reasonably completed within defined release timelines under the current context?
        4. Does the development team agree with the budget and points estimates?
        5. Is there an understanding of what the requirement or request means from the stakeholder or user perspective?
      2. Create a checklist that indicates when a requirement or request is ready for development. Consider the following questions:
        1. Have the requirements and requests been prioritized in the backlog?
        2. Has the team sufficiently collaborated on how the desired functionality or change can be completed?
        3. Do the tasks in each requirement or request contain sufficient detail and direction to begin development?
        4. Can the requirement or request be broken down into smaller pieces?

      Converting solution requirements into user stories

      Define the user

      Who will be interacting with the product or feature being developed? This will help to focus the user story on the user's needs and goals.

      Create the story

      Create the user story using the following template: "As a [user], I want [feature] so that [benefit]."
      This helps articulate the user's need and the value that the requirement will provide.

      Decompose

      User stories are typically too large to be implemented in a single sprint, so they should be broken down into smaller, more manageable tasks.

      Prioritize

      User stories are typically too large to be implemented in a single sprint, so they should be broken down into smaller, more manageable tasks.

      2.2.1 Create your user stories

      Estimated time: 60 Minutes

      1. Gather the project team and relevant stakeholders. Have access to your current list of solution requirements.
      2. Leverage the approach on previous slide "Converting Solution Requirements into User Stories" to generate a collection of user stories.

      NOTE: There is not a 1:1 relationship between requirements and user stories.
      It is possible that a single requirement will have multiple user stories, and similarly, that a single user story will apply to multiple solution requirements.

      Input

      • Requirements
      • Use Case Template

      Output

      • A collection of user stories

      Materials

      • Current Requirements

      Participants

      • Business Analyst(s)
      • Project Team
      • Relevant Stakeholders

      Use the INVEST model to create good user stories

      At this point your requirements should be high-level stories. The goal is to refine your backlog items, so they are . . .

      A vertical image of the Acronym: INVEST, taken from the first letter of each bolded word in the column to the right of the image.

      Independent: Ideally your user stories can be built in any order (i.e. independent from each other). This allows you to prioritize based on value and not get caught up in sequencing and prerequisites.
      Negotiable: As per the Agile principle, collaboration over contracts. Your user stories are meant to facilitate collaboration between the developer and the business. Therefore, they should be built to allow negotiation between all parties.
      Valuable: A user story needs to state the value so it can be effectively prioritized, but also so developers know what they are building.
      Estimable: As opposed to higher-level approximation given to epics, user stories need more accuracy in their estimates in order to, again, be effectively prioritized, but also so teams can know what can fit into a sprint or release plans.
      Small: User stories should be small enough for a number of them to fit into a sprint. However, team size and velocity will impact how many can be completed. A general guideline is that your teams should be able to deliver multiple stories in a sprint.
      Testable: Your stories need to be testable, which means they must have defined acceptance criteria and any related test cases as defined in your product quality standards.
      Source: Agile For All

      Defining Your Requirements Thresholds

      Phase 3

      Defining Your Requirements Thresholds

      Phase 1Phase 2Phase 3Phase 4

      1.1 Understand the benefits and limitations of Agile and business analysis

      1.2 Align Agile and business analysis within your organization

      2.1 Confirm the best-fit approach for delivery

      2.2 manage your requirements backlog

      3.1 Define project roles and responsibilities

      3.2 define your level of acceptable documentation

      3.3 Manage requirements as an asset

      3.4 Define your requirements change management plan

      4.1 Preparing new ways of working

      4.2 Develop a roadmap for next steps

      This phase will walk you through the following activities:

      • Assigning roles and responsibilities optional (Tool: RACI)
      • Define your Agile requirements process
      • Calculate the cost of your documentation (Tool: Documentation Calculator)
      • Define your backlog refinement plan

      This phase involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Managing Requirements in an Agile Environment

      Step 3.1

      Define Project Roles and Responsibilities

      Activities

      3.1.1 Define your Agile requirements RACI (optional)

      3.1.2 Define your Agile requirements process

      Defining Your Requirements Thresholds

      This step involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Outcomes of this step

      • A defined register of roles and responsibilities, along with a defined process for how Agile requirements work is to be done.

      Defining Your Requirements Thresholds

      Where does the BA function fit on an Agile team?

      Team formation is key, as Agile is a team sport

      A business analyst in an Agile team typically interacts with several different roles, including the product owner, development team, and many other stakeholders throughout the organization.

      This is an image the roles who typically interact with a Business Analyst.

      • The product owner, to set the priorities and direction of the project, and to gather requirements and ensure they are being met. Often, but not always, the BA and product owner are the same individual.
      • The development team, to provide clear and concise requirements that they can use to build and test the product.
      • Other stakeholders, such as customers, end-users, and subject matter experts to gather their requirements, feedback and validate the solution.
        • Design, to ensure that the product meets user needs. They may provide feedback and ensure that the design is aligned with requirements.
        • Security, to ensure that the solution meets all necessary security requirements and to identify potential risks and appropriate use of controls.
        • Testing, to ensure that the solution is thoroughly tested before it is deployed. They may create test cases or user scenarios that validate that everything is working as intended.
        • Deployment, to ensure that the necessary preparations have been made, including testing, security, and user acceptance.

      Additionally, during the sprint retrospectives, the team will review their performance and find ways to improve for the next sprint. As a team member, the business analyst helps to identify areas where the team could improve how they are working with requirements and understand how the team can improve communication with stakeholders.

      3.1.1 (Optional) Define Your Agile Requirements RACI

      Estimated Time: 60 Minutes

      1. Identify the project deliverables: The first step is to understand the project deliverables and the tasks that are required to complete them. This will help you to identify the different roles and responsibilities that need to be assigned.
      2. Define the roles and responsibilities: Identify the different roles that will be involved in the project and their associated responsibilities. These roles may include project manager, product owner, development team, stakeholders, and any other relevant parties.
      3. Assign RACI roles: Assign a RACI role to each of the identified tasks. The RACI roles are:
        1. Responsible: the person or team who is responsible for completing the task
        2. Accountable: the person who is accountable for the task being completed on time and to the required standard
        3. Consulted: the people or teams who need to be consulted to ensure the task is completed successfully
        4. Informed: the people or teams who need to be informed of the task's progress and outcome
      4. Create the RACI chart: Use the information gathered in the previous steps to create a matrix or chart that shows the tasks, the roles, and the RACI roles assigned to each task.
      5. Review and refine: Review the RACI chart with the project team and stakeholders to ensure that it accurately reflects the roles and responsibilities of everyone involved. Make any necessary revisions and ensure that all parties understand their roles and responsibilities.
      6. Communicate and implement: Communicate the RACI chart to all relevant parties and ensure that it is used as a reference throughout the project. This will help to ensure that everyone understands their role and that tasks are completed on time and to the required standard.

      Input

      • A list of required tasks and activities
      • A list of stakeholders

      Output

      • A list of defined roles and responsibilities for your project

      Materials

      • Agile Requirements Workbook

      Participants

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      A Case Study in Team Formation

      Industry: Anonymous Organization in the Energy sector
      Source: Interview

      Challenge

      Agile teams were struggling to deliver within a defined sprint, as there were consistent delays in requirements meeting the definition of ready for development. As such, sprints were often delayed, or key requirements were descoped and deferred to a future sprint.

      During a given two-week sprint cycle, the business analyst assigned to the team would be working along multiple horizons, completing elicitation, analysis, and validation, while concurrently supporting the sprint and dealing with stakeholder changes.

      Solution

      As a part of addressing this ongoing pain, a pilot program was run to add a second business analyst to the team.

      The intent was, as one is engaged preparing requirements through elicitation, analysis, and validation for a future sprint, the second is supporting the current sprint cycle, and gaining insights from stakeholders to refine the requirements backlog.

      Essentially, these two were leap-frogging each other in time. At all times, one BA was focused on the present, and one on the future.

      Result

      A happier team, more satisfied stakeholders, and consistent delivery of features and functions by the Agile teams. The pilot team outperformed all other Agile teams in the organization, and the "2 BA" approach was made the new standard.

      Understanding the Agile requirements process

      Shorter cycles make effective requirements management more necessary, not less

      Short development cycles can make requirements management more difficult because they often result in a higher rate of change to the requirements. In a shorter timeframe, there is less time to gather and verify requirements, leading to a higher likelihood of poor or incomplete requirements. Additionally, there may be more pressure to make decisions quickly, which can lead to less thorough analysis and validation of requirements. This can make it more challenging to ensure that the final solution meets the needs of the stakeholders.
      When planning your requirements cycles, it's important to consider;

      • Your sprint logistics (how long?)
      • Your release plan (at the end of every sprint, monthly, quarterly?)
      • How the backlog will be managed (as tickets, on a visual medium, such as a Kanban board?)
      • How will you manage communication?
      • How will you monitor progress?
      • How will future sprint planning happen?

      Info-Tech's Agile requirements framework

      Sprint N(-1)

      Sprint N

      Sprint N(+1)

      An image of Sprint N(-1) An image of Sprint N An image of Sprint N(+1)

      Changes from waterfall to Agile

      Gathering and documenting requirements: Requirements are discovered and refined throughout the project, rather than being gathered and documented up front. This can be difficult for business analysts who are used to working in a waterfall environment where all requirements are gathered and documented before development begins.
      Prioritization of requirements: Requirements are prioritized based on their value to the customer and the team's ability to deliver them. This can be difficult for business analysts who are used to prioritizing requirements based on the client's needs or their own understanding of what is important.

      Defining acceptance criteria: Acceptance criteria are defined for each user story to ensure that the team understands what needs to be delivered. Business analysts need to understand how to write effective acceptance criteria and how to use them to ensure that the team delivers what the customer needs.
      Supporting Testing and QA: The business analyst plays a role in ensuring that testing (and test cases) are completed and of proper quality, as defined in the requirements.

      Managing changing requirements: It is expected that requirements will change throughout the project. Business analysts need to be able to adapt quickly to changing requirements and ensure that the team is aware of the changes and how they will impact the project.
      Collaboration with stakeholders: Requirements are gathered from a variety of stakeholders, including customers, users, and team members. Business analysts need to be able to work effectively with all stakeholders to gather and refine requirements and ensure that the team is building the right product.

      3.1.2 Define your Agile requirements process

      Estimated time: 60 Minutes

      1. Gather all relevant stakeholders to discuss and define your process for requirements management.
      2. Have a team member facilitate the session to define the process. The sample in the Agile Requirements Workbook can be used optionally as a starting point. You can also use any existing processes and procedures as a baseline.
      3. Gain agreement on the process from all involved stakeholders.
      4. Revisit the process periodically to review its performance and make adjustments as needed.

      NOTE: The process is intended to be at a high enough level to leave space and flexibility for team members to adapt and adjust, but at a sufficient depth that everyone understands the process and workflows. In other words, the process will be both flexible and rigid, and the two are not mutually exclusive.

      Input

      • Project team and RACI
      • Existing Process (if available)

      Output

      • A process for Agile requirements that is flexible yet rigid

      Materials

      • Agile Requirements Workbook

      Participants

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Establish the right level of governance and decision-making

      Establishing the right level of governance and decision making is important in Agile requirements because there is a cost to decision making, as time plays an important factor. Even the failure to decide can have significant impacts.

      Good governance and decision-making practices can help to minimize risks, ensure that requirements are well understood and managed, and that project progress is tracked and reported effectively.

      In Agile environments, this often involves establishing clear roles and responsibilities, implementing effective communication and collaboration practices, and ensuring that decision-making processes are efficient and effective.

      Good requirements management practices can help to ensure that projects are aligned with organizational goals and strategy, that stakeholders' needs are understood and addressed, and that deliverables are of high quality and meet the needs of the business.

      By ensuring that governance and decision-making is effective, organizations can improve the chances of project success, and deliver value to the business. Risks and costs can be mitigated by staying small and nimble.

      Check out Make Your IT Governance Adaptable

      Develop an adaptive governance process

      A pyramid, with the number 4 at the apex, and the number 1 at the base.  In order from base-apex, the following titles are found to the right of the pyramid: Ad-Hoc governance; Controlled Governance; Agile Governance; Embedded/Automated governance.

      Maturing governance is a journey

      Organizations should look to progress in their governance stages. Ad-hoc and controlled governance tends to be slow, expensive, and a poor fit for modern practices.

      The goal as you progress through your stages is to delegate governance and empower teams to make optimal decisions in real-time, knowing that they are aligned with the understood best interests of the organization.

      Automate governance for optimal velocity, while mitigating risks and driving value.

      This puts your organization in the best position to be adaptive and able to react effectively to volatility and uncertainty.

      A graph charting Trust and empowerment on the x-axis, and Progress Integration on the Y axis.

      Five key principles for building an adaptive governance framework

      Delegate and empower

      Decision making must be delegated down within the organization, and all resources must be empowered and supported to make effective decisions.

      Define outcomes

      Outcomes and goals must be clearly articulated and understood across the organization to ensure decisions are in line and stay within reasonable boundaries.

      Make risk- informed decisions

      Integrated risk information must be available with sufficient data to support decision making and design approaches at all levels of the organization.

      Embed / automate

      Governance standards and activities need to be embedded in processes and practices. Optimal governance reduces its manual footprint while remaining viable. This also allows for more dynamic adaptation.

      Establish standards and behavior

      Standards and policies need to be defined as the foundation for embedding governance practices organizationally. These guardrails will create boundaries to reinforce delegated decision making.

      Sufficient decision-making power should be given to your Agile teams

      Push the decision-making process down to your pilot teams.

      • Bring your business stakeholders and subject matter experts together to identify the potential high-level risks.
      • Bring your business stakeholders and subject matter experts together to identify the potential high-level risks.
      • Discuss with the business the level of risk they are willing to accept.
      • Define the level of authority project teams have in making critical decisions.

      "Push the decision making down as far as possible, down to the point where sprint teams completely coordinate all the integration, development, and design. What I push up the management chain is risk taking. [Management] decides what level of risk they are willing to take and [they] demonstrate that by the amount of decision making you push down."
      – Senior Manager, Canadian P&C Insurance Company, Info-Tech Interview

      Step 3.2

      Define Your Level of Acceptable Documentation

      Activities

      3.2.1 Calculate the cost of documentation

      This step involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Relevant Stakeholders

      Outcomes of this step

      • Quantified cost of documentation produced for your Agile project.

      Defining Your Requirements Thresholds

      Right-size Your Documentation

      Why do we need it, and what purpose does it serve?

      Before creating any documentation, consider why; why are you creating documentation, and what purpose is it expected to serve?
      Is it:

      • … to gain approval?
      • … to facilitate decision-making?
      • .. to allow the team to think through a challenge or compare solution options?

      Next, consider what level of documentation would be acceptable and 'enough' for your stakeholders. Recognize that 'enough' will depend on your stakeholder's personal definition and perspective.
      There may also be considerations for maintaining documentation for the purposes of compliance, and auditability in some contexts and industries.
      The point is not to eliminate all documentation, but rather, to question why we're producing it, so that we can create just enough to deliver value.

      "What does the next person need to do their work well, to gain or create a shared understanding?"
      - Filip Hendrickx, Innovating BA and Founder, altershape

      Documentation comes at a cost

      We need to quantify the cost of documentation, against the expected benefit

      All things take time, and that would imply that all things have an inherent cost. We often don't think in these terms, as it's just the work we do, and costs are only associated with activities requiring additional capital expenditure. Documentation of requirements can come at a cost in terms of time and resources. Creating and maintaining detailed documentation requires effort from project team members, which could be spent on other aspects of the project such as development or testing. Additionally, there may be costs associated with storing and distributing the documentation.

      When creating documentation, we are making a decision. There is an opportunity cost of investing time to create, and concurrently, not working on other activities. Documentation of requirements can come at a cost in terms of time and resources. Creating and maintaining detailed documentation requires effort from project team members, which could be spent on other aspects of the project such as development or testing. Additionally, there may be costs associated with storing and distributing the documentation.

      In order to make better informed decisions about the types, quantity and even quality of the documentation we are producing, we need to capture that data. To ensure we are receiving good value for our documentation, we should compare the expected costs to the expected benefits of a sprint or project.

      3.2.1 Calculate the cost of documentation

      Estimated time: as needed

      1. Use this tool to quantify the cost of creating and maintaining current state documentation for your Agile requirements team. It provides an indication, via the Documentation Cost Index, of when your project is documenting excessively, relative to the expected benefits of the sprint or project.
      2. In Step 1, enter the hourly rate for the person (or persons) completing the business analysis function for your Agile team. NB: This does not have to be a person with the title of business analyst. If there are multiple people fulfilling this role, enter the average rate (if their rates are same or similar) or a weighted average (if there is a significant range in the hourly rate)
      3. In Step 2, enter the expected benefit (in $) for the sprint or project.
      4. In Step 3, enter the total number of hours spent on each task/activity during the sprint or project. Use blank spaces as needed to add tasks and activities not listed.
      5. In Step 4, you'll find the Documentation Cost Index, which compares your total documentation cost to the expected benefits. The cell will show green when the value is < 0.8, yellow between 0.8 and 1, and red when >1.
      6. Use the information to plan future sprints and documentation needs, identify opportunities for improvement in your requirements practice, and find balance in "just enough" documentation.

      Input

      • Project team and RACI
      • Existing Process (if available)

      Output

      • A process for Agile requirements that is flexible yet rigid

      Materials

      • Agile Requirements Workbook

      Participants

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Lack of documentation also comes at a cost

      Lack of documentation can bring costs to Agile projects in a few different ways.

      • Onboarding new team members
      • Improving efficiency
      • Knowledge management
      • Auditing and compliance
      • Project visibility
      • Maintaining code

      Info-Tech Insight

      Re-using deliverables (documentation, process, product, etc.) is important in maintaining the velocity of work. If you find yourself constantly recreating your current state documentation at the start of a project, it's hard to deliver with agility.

      Step 3.3

      Manage Requirements as an Asset

      Activities

      3.3.1 Discuss your current perspectives on requirements as assets

      This step involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Relevant Stakeholders

      Outcomes of this step

      • Awareness of the value in, and tactics for enabling effective management of requirements as assets

      Defining Your Requirements Thresholds

      What do we mean by "assets"?

      And when do requirements become assets?

      In order to delivery with agility, you need to maximize the re-usability of artifacts. These artifacts could take the form of current state documentation, user stories, test cases, and yes, even requirements for re-use.
      Think of it like a library for understanding where your organization is today. Understanding the people, processes, and technology, in one convenient location. These artifacts become assets when we choose to retain them, rather than discard them at the end of a project, when we think they'll no longer be needed.
      And just like finding a single book in a vast library, we need to ensure our assets can be found when we need them. And this means making them searchable.
      We can do this by establishing criteria for requirements and artifact reuse;

      • What business need and benefit is it aligned to?
      • What metadata needs to be attached, related to source, status, subject, author, permissions, type, etc.?
      • Where will it be stored for ease of retrieval?

      Info-Tech Insight

      When writing requirements for products or services, write them for the need first, and not simply for what is changing.

      The benefits of managing requirements as assets

      Retention of knowledge in a knowledge base that allows the team to retain current business requirements, process documentation, business rules, and any other relevant information.
      A clearly defined scope to reduce stakeholder, business, and compliance conflicts.
      Impact analysis of changes to the current organizational assets.

      Source: Requirement Engineering Magazine, 2017.

      A case study in creating an asset repository

      Industry: Anonymous Organization in the Government sector
      Source: Interview

      Challenge

      A large government organization faced a challenge with managing requirements, processes, and project artifacts with any consistency.

      Historically, their documentation was lacking, with multiple versions existing in email sent folders and manila folders no one could find. Confirming the current state at any given time meant the heavy lift of re-documenting and validating, so that effort was avoided for an excessive period.

      Then there was a request for audit and compliance, to review their existing documentation practices. With nothing concrete to show, drastic recommendations were made to ensure this practice would end.

      Solution

      A small but effective team was created to compile and (if not available) document all existing project and product documentation, including processes, requirements, artifacts, business cases, etc.

      A single repository was built and demonstrated to key stakeholders to ensure it would satisfy the needs of the audit and compliance group.

      Result

      A single source of truth for the organization, which was;

      • Accessible (view access to the entire organization).
      • Transparent (anyone could see and understand the process and requirements as intended).
      • A baseline for continuous improvement, as it was clear what the one defined "best way" was.
      • Current, where no one retained current documentation outside of this library.

      3.3.1 Discuss your current perspectives on requirements as assets

      Estimated time: 30 Minutes

      1. Gather all relevant stakeholder to share perspectives on the use of requirements as assets, historically in the organization.
      2. Have a team member facilitate the session. It is optional to document the findings.
      3. After looking at the historical use of requirements as assets, discuss the potential uses, benefits, and drawbacks of managing as assets in the target state.

      Input

      • Participant knowledge and experience

      Output

      • A shared perspective and history on requirements as assets

      Materials

      • A method for data capture (optional)

      Participants

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Apply changes to baseline documentation

      Baseline + Release Changes = New Baseline

      • Start from baseline documentation dramatically to reduce cost and risk
      • Treat all scope as changes to baseline requirements
      • Sum of changes in the release scope
      • Sum of changes and original baseline becomes the new baseline
      • May take additional time and effort to maintain accurate baseline

      What is the right tool?

      While an Excel spreadsheet is great to start off, its limitations will become apparent as your product delivery process becomes more complex. Look at these solutions to continue your journey in managing your Agile requirements:

      Step 3.4

      Define Your Requirements Change Management Plan

      Activities

      3.4.1 Triage your requirements

      This step involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Relevant Stakeholders

      Outcomes of this step

      • An approach for determining the appropriate level of governance over changes to requirements.

      Expect and embrace change

      In Agile development, change is expected and embraced. Instead of trying to rigidly follow a plan that may become outdated, Agile teams focus on regularly reassessing their priorities and adapting their plans accordingly. This means that the requirements can change often, and it's important for the team to have a process in place for managing these changes.

      A common approach to managing change in Agile is to use a technique called "backlog refinement." Where previously we populated our backlog with requirements to get them ready for development and deployment, this involves regularly reviewing and updating the list of work to be done. The team will prioritize the items on the evolving backlog, and the prioritized items will be worked on during the next sprint. This allows the team to quickly respond to changes in requirements and stay focused on the most important work.

      Another key aspect of managing change in Agile is effective communication. The team should have regular meetings, such as daily stand-up meetings or weekly sprint planning meetings, to discuss any changes in requirements and ensure that everyone is on the same page.

      Best practices in change and backlog refinement

      Communicate

      Clearly communicate your change process, criteria, and any techniques, tools, and templates that are part of your approach.

      Understand impacts/risks

      Maintain consistent control and communication and ensure that an impact assessment is completed. This is key to managing risks.

      Leverage tools

      Leverage tools when you have them available. This could be a Requirements Management system, a defect/change log, or even by turning on "track changes" in your documents.

      Cross-reference

      For every change, define the source of the change, the reason for the change, key dates for decisions, and any supporting documentation.

      Communicate the reason, and stay on message throughout the change

      Leaders of successful change spend considerable time developing a powerful change message: a compelling narrative that articulates the desired end state and makes the change concrete and meaningful to staff. They create the change vision with staff to build ownership and commitment.

      • The change message should:
      • Explain why the change is needed.
      • Summarize the things that will stay the same.
      • Highlight the things that will be left behind.
      • Emphasize the things that are being changed.
      • Explain how the change will be implemented.
      • Address how the change will affect the various roles in the organization.
      • Discuss staff's role in making the change successful.

      The five elements of communicating the reason for the change:

      An image of a cycle, including the five elements for communicating the reason for change.  these include: What will the role be for each department and individual?; What is the change?; Why are we doing it?; How are we going to go about it?; How long will it take us?

      How to make the management of changes more effective

      Key decisions and considerations

      How will changes to requirements be codified?
      How will intake happen?

      • What is the submission process?
      • Who has approval to submit?
      • What information is needed to submit a request?

      How will potential changes be triaged and evaluated?

      • What criteria will be used to assess the impact and urgency of the potential change?
      • How will you treat material and non-material changes?

      What is the review and approval process?

      • How will acceptance or rejection status be communicated to the submitter?

      3.4.1 Triage Your requirements

      An image of an inverted triangle, with the top being labeled: No Material Impact, the middle being labeled: Material impact; and the bottom being labeled: Governance Impact.  To the right of the image, are text boxes elaborating on each heading.

      If there's no material impact, update and move on

      An image of an inverted triangle, with the top being labeled: No Material Impact, the middle being labeled: Material impact; and the bottom being labeled: Governance Impact. To the right of the image, is a cycle including the following terms: Validate change; Update requirements; Track change (log); Package and communicate

      Material changes require oversight and approval

      An image of an inverted triangle, with the top being labeled: No Material Impact, the middle being labeled: Material impact; and the bottom being labeled: Governance Impact. To the right of the image, is a cycle including the following terms: Define impact; Revise; Change control needed?; Implement change.

      Planning Your Next Steps

      Phase 4

      Planning Your Next Steps

      Phase 1Phase 2Phase 3Phase 4

      1.1 Understand the benefits and limitations of Agile and business analysis

      1.2 Align Agile and business analysis within your organization

      2.1 Confirm the best-fit approach for delivery

      2.2 manage your requirements backlog

      3.1 Define project roles and responsibilities

      3.2 define your level of acceptable documentation

      3.3 Manage requirements as an asset

      3.4 Define your requirements change management plan

      4.1 Preparing new ways of working

      4.2 Develop a roadmap for next steps

      This phase will walk you through the following activities:

      • Completing Your Agile Requirements Playbook
      • EXERCISE: Capability Gap List

      This phase involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Managing Requirements in an Agile Environment

      Step 4.1

      Preparing New Ways of Working

      Activities

      4.1.1 Define your communication plan

      Planning Your Next Steps

      This step involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Outcomes of this step

      • Recognize the changes required on the team and within the broader organization, to bring stakeholders on board.

      How we do requirements work will change

      • Team formation and interaction
      • Stakeholder engagement and communication
      • The timing and sequencing of their work
      • Decision-making
      • Documentation
      • Dealing with change

      As a result, you'll need to focus on;

      Emphasizing flexibility: In Agile organizations, there is a greater emphasis on flexibility and the ability to adapt to change. This means that requirements may evolve over time and may not be fully defined at the beginning of the project.
      Enabling continuous delivery: Agile organizations often use continuous delivery methods, which means that new features and functionality are delivered to users on a regular basis. This requires a more iterative approach to requirements management, as new requirements may be identified and prioritized during the delivery process.
      Enhancing collaboration and communication: Agile organizations place a greater emphasis on collaboration and communication between team members, stakeholders, and customers.
      Developing a user-centered approach: Agile organizations often take a user-centered approach to requirements gathering, which means that the needs and goals of the end-user are prioritized.

      Change within the team, and in the broader organization

      How to build an effective blend Agile and requirements management

      Within the team

      • Meetings should happen as needed
      • Handoffs should be clear and concise
      • Interactions should add value
      • Stand-ups should similarly add value, and shouldn't be for status updates

      Within the organization

      • PMO inclusion, to ensure alignment across the organization
      • Business/Operating areas, to recognize what they are committing to for time, resources, etc.
      • Finance, for how your project or product is funded
      • Governance and oversight, to ensure velocity is maintained

      "Whether in an Agile environment or not, collaboration and relationships are still required and important…how you collaborate, communicate, and how you build relationships are key."
      - Paula Bell, CEO, Paula A. Bell Consulting

      Get stakeholders on board with Agile requirements

      1. Stakeholder feedback and management support are key components of successful Agile requirements.
      2. Stakeholders can see a project's progression and provide critical feedback about its success at critical milestones.
      3. Management helps teams succeed by trusting them to complete projects with business value at top of mind and by removing impediments that are inhibiting their productivity.
      4. Agile will bring a new mindset and significant amounts of people, process, and technology changes that stakeholders and management may not be accustomed to. Working through these issues in requirements management enables a smoother rollout.
      5. Management will play a key role in ensuring long-term Agile requirements success and ultimately rolling it out to the rest of the organization.
      6. The value of leadership involvement has not changed even though responsibilities will. The day-to-day involvement in projects will change but continual feedback will ultimately dictate the success or failure of a project.

      4.1.1 Define your communication plan

      Estimated time: 60 Minutes

        1. Gather all relevant stakeholder to create a communication plan for project or product stakeholders.
        2. Have a team member facilitate the session.
        3. Identify
        4. ;
          1. Each stakeholder
          2. The nature of information they are interested in
          3. The channel or medium best to communicate with them
          4. The frequency of communication
        5. (Optional) Consider validating the results with the stakeholders, if not present.
        6. Document the results in the Agile Requirements Workbook and include in Agile Requirements Playbook.
        7. Revisit as needed, whether at the beginning of a new initiative, or over time, to ensure the content is still valid.

      Input

      • Participant knowledge and experience

      Output

      • A plan for communicating with stakeholders

      Materials

      • Agile Requirements Workbook

      Participants

      • Business Analyst(s)
      • Project Team

      Step 4.2

      Develop a Roadmap for Next Steps

      Activities

      4.2.1 Develop your Agile requirements action plan

      4.2.2 Prioritize with now, next, later

      This step involves the following participants:

      • Business Analyst(s)
      • Project Team
      • Sponsor/Executive
      • Relevant Stakeholders

      Outcomes of this step

      • A comprehensive and prioritized list of opportunities and improvements to be made to mature the Agile requirements practice.

      Planning Your Next Steps

      Identify opportunities to improve and close gaps

      Maturing at multiple levels

      With a mindset of continuous improvement, there is always some way we can get better.

      As you mature your Agile requirements practice, recognize that those gaps for improvement can come from multiple levels, from the organizational down to the individual.

      Each level will bring challenges and opportunities.

      The organization

      • Organizational culture
      • Organizational behavior
      • Political will
      • Unsupportive stakeholders

      The team

      • Current ways of working
      • Team standards, norms and values

      The individual

      • Practitioner skills
      • Practitioner experience
      • Level of training received

      Make sure your organization is ready to transition to Agile requirements management

      A cycle is depicted, with the following Terms: Learning; Automation; Integrated teams; Metrics and governance; Culture.

      Learning:

      Agile is a radical change in how people work
      and think. Structured, facilitated learning is required throughout the transformation to
      help leaders and practitioners go from

      doing Agile to being Agile.

      Automation:

      While Agile is tool-agnostic at its roots, Agile work management tools and DevOps inspired SDLC tools that have become a key part of Agile practices.

      Integrated Teams:


      While temporary project teams can get some benefits from Agile, standing, self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of Agile.

      Metrics and Governance:

      Successful Agile implementations
      require the disciplined use

      of delivery and operations
      metrics that support governance focused on developing better teams.

      Culture:

      Agile teams believe that value is best created by standing, self-organizing cross-functional teams who deliver sustainably in frequent,
      short increments supported by leaders
      who coach them through challenges.

      Info-Tech Insight

      Agile gaps may only have a short-term, perceived benefit. For example, coding without a team mindset can allow for maximum speed to market for a seasoned developer. Post-deployment maintenance initiatives, however, often lock the single developer as no one else understands the rationale for the decisions that were made.

      4.2.1 Develop your Agile requirements action plan

      Estimated time: 60 Minutes

      1. Gather all relevant stakeholder to create a road map and action plan for requirements management.
      2. Have a team member facilitate the session using the results of the Agile Requirements Maturity Assessment.
      3. Identify gaps from current to future state and brainstorm possible actions that can be taken to address those gaps. Resist the urge to analyze or discuss the feasibility of each idea at this stage. The intent is idea generation.
      4. When the group has exhausted all ideas, the facilitator should group like ideas together, with support from participants. Discuss any ideas that are unclear or ambiguous.
      5. Document the results in the Agile Requirements Workbook.

      Note: the feasibility and timing of the ideas will happen in the following "Now, Next, Later" exercise.

      Prioritize your roadmap

      Taking steps to mature your Agile requirements practice.

      An image of the Now; Next; Later technique.

      The "Now, Next, Later" technique is a method for prioritizing and planning improvements or tasks. This involves breaking down a list of tasks or improvements into three categories:

      • "Now" tasks are those that must be completed immediately. These tasks are usually urgent or critical, and they must be completed to keep the project or organization running smoothly.
      • "Next" tasks are those that should be completed soon. These tasks are not as critical as "now" tasks, but they are still important and should be tackled relatively soon.
      • "Later" tasks are those that can be completed later. These tasks are less critical and can be deferred without causing major problems.

      By using this technique, you can prioritize and plan the most important tasks first, while also allowing for flexibility and the ability to adjust plans as necessary.
      This process also helps you get a clear picture on what needs to be done first and what can be done later. This way you can work on the most important things first, and keep track of what you need to do next, for keeping the development/improvement process smooth and efficient.

      Monitor your progress

      Monitoring progress is important in achieving your target state. Be deliberate with your actions, to continue to mature your Agile requirements practice.

      As you navigate toward your target state, continue to monitor your progress, your successes, and your challenges. As your Agile requirements practice matures, you should see improvements in the stated metrics below.

      Establish a cadence to review these metrics, as well as how you are progressing on your roadmap, against the plan.

      This is not about adding work, but rather, about ensuring you're heading in the right direction; finding the balance in your Agile requirements practice.

      Metric
      Team satisfaction (%) Expect team satisfaction to increase as a result of clearer role delineation and value contribution.
      Stakeholder satisfaction (%) Expect stakeholder satisfaction to similarly increase, as requirements quality increases, bringing increased value.
      Requirements rework Measures the quality of requirements from your Agile projects. Expect that the requirements rework will decrease, in terms of volume/frequency.
      Cost of documentation Quantifies the cost of documentation, including elicitation, analysis, validation, presentation, and management.
      Time to delivery Balancing metric. We don't want improvements in other at the expense of time to delivery.

      Appendix

      Research Contributors and Experts

      This is a picture of Emal Bariali

      Emal Bariali
      Business Architect & Business Analyst
      Bariali Consulting

      Emal Bariali is a Senior Business Analyst and Business Architect with 17 years of experience, executing nearly 20 projects. He has experience in both waterfall and Agile methodologies and has delivered solutions in a variety of forms, including custom builds and turnkey projects. He holds a Master's degree in Information Systems from the University of Toronto, a Bachelor's degree in Information Technology from York University, and a post-diploma in Software & Database Development from Seneca College.

      This is a picture of Paula Bell

      Paula Bell
      Paula A. Bell Consulting, LLC

      Paula Bell is the CEO of Paula A Bell Consulting, LLC. She is a Business Analyst, Leadership and Career Development coach, consultant, speaker, and author with 21+ years of experience in corporate America in project roles including business analyst, requirements manager, business initiatives manager, business process quality manager, technical writer, project manager, developer, test lead, and implementation lead. Paula has experience in a variety of industries including media, courts, manufacturing, and financial. Paula has led multiple highly-visible multi-million-dollar technology and business projects to create solutions to transform businesses as either a consultant, senior business analyst, or manager.

      Currently she is Director of Operations for Bridging the Gap, where she oversees the entire operation and their main flagship certification program.

      This is a picture of Ryan Folster

      Ryan Folster
      Consulting Services Manager, Business Analysis
      Dimension Data

      Ryan Folster is a Business Analyst Lead and Product Professional from Johannesburg, South Africa. His strong focus on innovation and his involvement in the business analysis community have seen Ryan develop professionally from a small company, serving a small number of users, to large multi-national organizations. Having merged into business analysis through the business domain, Ryan has developed a firm grounding and provides context to the methodologies applied to clients and projects he is working on. Ryan has gained exposure to the Human Resources, Asset Management, and Financial Services sectors, working on projects that span from Enterprise Line of Business Software to BI and Compliance.

      Ryan is also heavily involved in the local chapter of IIBA®; having previously served as the chapter president, he currently serves as a non-executive board member. Ryan is passionate about the role a Business Analyst plays within an organization and is a firm believer that the role will develop further in the future and become a crucial aspect of any successful business.

      This is a picture of Filip Hendrickx

      Filip Hendrickx
      Innovating BA, Visiting Professor @ VUB
      altershape

      Filip loves bridging business analysis and innovation and mixes both in his work as speaker, trainer, coach, and consultant.

      As co-founder of the BA & Beyond Conference and IIBA Brussels Chapter president, Filip helps support the BA profession and grow the BA community in and around Belgium. For these activities, Filip received the 2022 IIBA® EMEA Region Volunteer of the Year Award.

      Together with Ian Richards, Filip is the author ofBrainy Glue, a business novel on business analysis, innovation and change. Filip is also co-author of the BCS book Digital Product Management and Cycles, a book, method and toolkit enabling faster innovation.

      This is a picture of Fabricio Laguna

      Fabricio Laguna
      Professional Speaker, Consultant, and Trainer
      TheBrazilianBA.com

      Fabrício Laguna, aka The Brazilian BA, is the main reference on business analysis in Brazil. Author and producer of videos, articles, classes, lectures, and playful content, he can explain complex things in a simple and easy-to-understand way. IIBA Brazil Chapter president between 2012-2022. CBAP, AAC, CPOA, PMP, MBA. Consultant and instructor for more than 25 years working with business analysis, methodology, solution development, systems analysis, project management, business architecture, and systems architecture. His online courses are approved by students from 65 countries.

      This is a picture of Ryland Leyton

      Ryland Leyton
      Business Analyst and Agile Coach
      Independent Consultant

      Ryland Leyton, CBAP, PMP, CSM, is an avid Agile advocate and coach, business analyst, author, speaker, and educator. He has worked in the technology sector since 1998, starting off with database and web programming, gradually moving through project management and finding his passion in the BA and Agile fields. He has been a core team member of the IIBA Extension to the BABOK and the IIBA Agile Analysis Certification. Ryland has written popular books on agility, business analysis, and career. He can be reached at www.RylandLeyton.com.

      This is a picture of Steve Jones

      Steve Jones
      Supervisor, Market Support Business Analysis
      ISO New England

      Steve is a passionate analyst and BA manager with more than 20 years of experience in improving processes, services and software, working across all areas of software development lifecycle, business change and business analysis. He rejoices in solving complex business problems and increasing process reproducibility and compliance through the application of business analysis tools and techniques.

      Steve is currently serving as VP of Education for IIBA Hartford. He is a CBAP, certified SAFe Product Owner/Product Manager, Six Sigma Green Belt, and holds an MS in Information Management and Communications.

      This is a picture of Angela Wick

      Angela Wick
      Founder
      BA-Squared and BA-Cube

      Founder of BA-Squared and BA-Cube.com, Angela is passionate about teaching practical, modern product ownership and BA skills. With over 20 years' experience she takes BA skills to the next level and into the future!
      Angela is also a LinkedIn Learning instructor on Agile product ownership and business analysis, an IC-Agile Authorized Trainer, Product Owner and BA highly-rated trainer, highly-rated speaker, sought-after workshop facilitator, and contributor to many industry publications, including:

      • IIBA BABOK v3 Core Team, leading author on the BABOK v3
      • Expert Reviewer, IIBA Agile Extension to the BABOK
      • PMI BA Practice Guide – Expert Reviewer
      • PMI Requirements Management Practice Guide – Expert Reviewer
      • IIBA Competency Model – Lead Author and Team Lead, V1, V2, and V3.

      This is a picture of Rachael Wilterdink

      Rachael Wilterdink
      Principal Consultant
      Infotech Enterprises

      Rachael Wilterdink is a Principal Consultant with Infotech Enterprises. With over 25 years of IT experience, she holds multiple business analysis and Agile certifications. As a consultant, Rachael has served clients in the financial, retail, manufacturing, healthcare, government, non-profit, and insurance industries. Giving back to the professional community, Ms. Wilterdink served on the boards of her local IIBA® and PMI® chapters. As a passionate public speaker, Rachael presents various topics at conferences and user groups across the country and the world. Rachael is also the author of the popular eBook "40 Agile Transformation Pain Points (and how to avoid or manage them)."

      Bibliography

      "2021 Business Agility Report: Rising to the Challenge." Business Agility, 2021. Accessed 13 June 2022.
      Axure. "The Pitfalls of Agile and How We Got Here". Axure. Accessed 14 November 2022.
      Beck, Kent, et al. "Manifesto for Agile Software Development." Agilemanifesto. 2001.
      Brock, Jon, et al. "Large-Scale IT Projects: From Nightmare to Value Creation." BCG, 25 May 2015.
      Bryar, Colin and Bill Carr. "Have We Taken Agile Too Far?" Harvard Business Review, 9 April 2021. Accessed 11 November, 2022.
      Clarke, Thomas. "When Agile Isn't Responsive to Business Goals" RCG Global Services, Accessed 14 November 2022.
      Digital.ai "The 15th State of Agile Report". Digital.ai. Accessed 21 November 2022.
      Hackshall, Robin. "Product Backlog Refinement." Scrum Alliance. 9 Oct. 2014.
      Hartman, Bob. "New to Agile? INVEST in good user stories." Agile For All.
      IAG Consulting. "Business Analysis Benchmark: Full Report." IAG Consulting, 2009.
      Karlsson, Johan. "Backlog Grooming: Must-Know Tips for High-Value Products." Perforce. 18 May 2018
      KPMG. Agile Transformation (2019 Survey on Agility). KPMG. Accessed November 29.
      Laguna, Fabricio "REQM guidance matrix: A framework to drive requirements management", Requirements Engineering Magazine. 12 September 2017. Accessed 10 November 2022.
      Miller, G. J. (2013). Agile problems, challenges, & failures. Paper presented at PMI® Global Congress 2013—North America, New Orleans, LA. Newtown Square, PA: Project Management Institute.
      Product Management: MoSCoW Prioritization." ProductPlan, n.d. Web.
      Podeswa, Howard "The Business Case for Agile Business Analysis" Requirements Engineering Magazine. 21 February 2017. Accessed 7 November 2022.
      PPM Express. "Why Projects Fail: Business Analysis is the Key". PPM Express. Accessed 16 November 2022.
      Reifer, Donald J. "Quantitative Analysis of Agile Methods Study: Twelve Major Findings." InfoQ, 6 February, 2017.
      Royce, Dr. Winston W. "Managing the Development of Large Software Systems." Scf.usc.edu. 1970. (royce1970.pdf (usc.edu))
      Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education. 2012.
      Singer, Michael. "15+ Surprising Agile Statistics: Everything You Need To Know About Agile Management". Enterprise Apps Today. 22 August 2022.
      The Standish Group. The Chaos Report, 2015. The Standish Group.

      Where do I go next?

      Improve Requirements Gathering

      Back to basics: great products are built on great requirements.

      Make the Case for Product Delivery

      Align your organization on the practices to deliver what matters most.

      Requirements for Small and Medium Enterprises

      Right-size the guidelines of your requirements gathering process.

      Implement Agile Practices that Work

      Improve collaboration and transparency with the business to minimize project failure.

      Create an Agile-Friendly Gating and Governance Model

      Use Info-Tech's Agile Gating Framework as a guide to gating your Agile projects following a "trust but verify" approach.

      Make Your IT Governance Adaptable

      Governance isn't optional, so keep it simple and make it flexible.

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Build a Service Desk Consolidation Strategy

      • Buy Link or Shortcode: {j2store}479|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Incompatible technologies. Organizations with more than one service desk are likely to have many legacy IT service management (ITSM) solutions. These come with a higher support cost, costly skill-set maintenance, and the inability to negotiate volume licensing discounts.
      • Inconsistent processes. Organizations with more than one service desk often have incompatible processes, which can lead to inconsistent service support across departments, less staffing flexibility, and higher support costs.
      • Lack of data integration. Without a single system and consistent processes, IT leaders often have only a partial view of service support activities. This can lead to rigid IT silos, limit the ability to troubleshoot problems, and streamline process workflows.

      Our Advice

      Critical Insight

      • Every step should put people first. It’s tempting to focus the strategy on designing processes and technologies for the target architecture. However, the most common barrier to success is workforce resistance to change.
      • A consolidated service desk is an investment, not a cost-reduction program. Focus on efficiency, customer service, and end-user satisfaction. There will be many cost savings, but viewing them as an indirect consequence of the pursuit of efficiency and customer service is the best approach.

      Impact and Result

      • Conduct a comprehensive assessment of existing service desk people, processes, and technology.
      • Identify and retire resources and processes that are no longer meeting business needs, and consolidate and modernize resources and processes that are worth keeping.
      • Identify logistic and cost considerations and create a roadmap of consolidation initiatives.
      • Communicate the change and garner support for the consolidation initiative.

      Build a Service Desk Consolidation Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a service desk consolidation strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop a shared vision

      Engage stakeholders to develop a vision for the project and perform a comprehensive assessment of existing service desks.

      • Build a Service Desk Consolidation Strategy – Phase 1: Develop a Shared Vision
      • Stakeholder Engagement Workbook
      • Consolidate Service Desk Executive Presentation
      • Consolidate Service Desk Assessment Tool
      • IT Skills Inventory and Gap Assessment Tool

      2. Design the consolidated service desk

      Outline the target state of the consolidated service desk and assess logistics and cost of consolidation.

      • Build a Service Desk Consolidation Strategy – Phase 2: Design the Consolidated Service Desk
      • Consolidate Service Desk Scorecard Tool
      • Consolidated Service Desk SOP Template
      • Service Desk Efficiency Calculator
      • Service Desk Consolidation TCO Comparison Tool

      3. Plan the transition

      Build a project roadmap and communication plan.

      • Build a Service Desk Consolidation Strategy – Phase 3: Plan the Transition
      • Service Desk Consolidation Roadmap
      • Service Desk Consolidation Communications and Training Plan Template
      • Service Desk Consolidation News Bulletin & FAQ Template
      [infographic]

      Workshop: Build a Service Desk Consolidation Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Engage Stakeholders to Develop a Vision for the Service Desk

      The Purpose

      Identify and engage key stakeholders.

      Conduct an executive visioning session to define the scope and goals of the consolidation.

      Key Benefits Achieved

      A list of key stakeholders and an engagement plan to identify needs and garner support for the change.

      A common vision for the consolidation initiative with clearly defined goals and objectives.

      Activities

      1.1 Identify key stakeholders and develop an engagement plan.

      1.2 Brainstorm desired service desk attributes.

      1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk.

      1.4 Define project goals, principles, and KPIs.

      Outputs

      Stakeholder Engagement Workbook

      Executive Presentation

      2 Conduct a Full Assessment of Each Service Desk

      The Purpose

      Assess the overall maturity, structure, organizational design, and performance of each service desk.

      Assess current ITSM tools and how well they are meeting needs.

      Key Benefits Achieved

      A robust current state assessment of each service desk.

      An understanding of agent skills, satisfaction, roles, and responsibilities.

      An evaluation of existing ITSM tools and technology.

      Activities

      2.1 Review the results of diagnostics programs.

      2.2 Map organizational structure and roles for each service desk.

      2.3 Assess overall maturity and environment of each service desk.

      2.4 Assess current information system environment.

      Outputs

      Consolidate Service Desk Assessment Tool

      3 Design Target Consolidated Service Desk

      The Purpose

      Define the target state for consolidated service desk.

      Identify requirements for the service desk and a supporting solution.

      Key Benefits Achieved

      Detailed requirements and vision for the consolidated service desk.

      Gap analysis of current vs. target state.

      Documented standardized processes and procedures.

      Activities

      3.1 Identify requirements for target consolidated service desk.

      3.2 Build requirements document and shortlist for ITSM tool.

      3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state.

      3.4 Document standardized processes for new service desk.

      Outputs

      Consolidate Service Desk Scorecard Tool

      Consolidated Service Desk SOP

      4 Plan for the Transition

      The Purpose

      Break down the consolidation project into specific initiatives with a detailed timeline and assigned responsibilities.

      Plan the logistics and cost of the consolidation for process, technology, and facilities.

      Develop a communications plan.

      Key Benefits Achieved

      Initial analysis of the logistics and cost considerations to achieve the target.

      A detailed project roadmap to migrate to a consolidated service desk.

      A communications plan with responses to anticipated questions and objections.

      Activities

      4.1 Plan the logistics of the transition.

      4.2 Assess the cost and savings of consolidation to refine business case.

      4.3 Identify initiatives and develop a project roadmap.

      4.4 Plan communications for each stakeholder group.

      Outputs

      Consolidation TCO Tool

      Consolidation Roadmap

      Executive Presentation

      Communications Plan

      News Bulletin & FAQ Template

      Further reading

      Build a Service Desk Consolidation Strategy

      Manage the dark side of growth.

      ANALYST PERSPECTIVE

      A successful service desk consolidation begins and ends with people.

      "It’s tempting to focus strategic planning on the processes and technology that will underpin the consolidated service desk. Consistent processes and a reliable tool will cement the consolidation, but they are not what will hold you back.

      The most common barrier to a successful consolidation is workforce resistance to change. Cultural difference, perceived risks, and organizational inertia can hinder data gathering, deter collaboration, and impede progress from the start.

      Building a consolidated service desk is first and foremost an exercise in organizational change. Garner executive support for the project, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often. The key is to create a shared vision for the project and engage those who will be most affected."

      Sandi Conrad

      Senior Director, Infrastructure Practice

      Info-Tech Research Group

      Our understanding of the problem

      This Research is Designed For:

      • CIOs who need to reduce support costs and improve customer service.
      • IT leaders tasked with the merger of two or more IT organizations.
      • Service managers implementing a shared service desk tool.
      • Organizations rationalizing IT service management (ITSM) processes.

      This Research Will Help You:

      • Develop a shared vision for the consolidated service desk.
      • Assess key metrics and report on existing service desk architecture.
      • Design a target service desk architecture and assess how to meet the new requirements.
      • Deploy a strategic roadmap to build the consolidated service desk architecture.

      Executive summary

      Situation

      Every organization must grow to survive. Good growth makes an organization more agile, responsive, and competitive, which leads to further growth.

      The proliferation of service desks is a hallmark of good growth when it empowers the service of diverse end users, geographies, or technologies.

      Complication

      Growth has its dark side. Bad growth within a business can hinder agility, responsiveness, and competitiveness, leading to stagnation.

      Supporting a large number of service desks can be costly and inefficient, and produce poor or inconsistent customer service, especially when each service desk uses different ITSM processes and technologies.

      Resolution

      Manage the dark side of growth. Consolidating service desks can help standardize ITSM processes, improve customer service, improve service desk efficiency, and reduce total support costs. A consolidation is a highly visible and mission critical project, and one that will change the public face of IT. Organizations need to get it right.

      Building a consolidated service desk is an exercise in organizational change. The success of the project will hinge on how well the organization engages those who will be most affected by the change. Build a guiding coalition for the project, create a shared vision, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often.

      Use a structured approach to facilitate the development of a shared strategic vision, design a detailed consolidated architecture, and anticipate resistance to change to ensure the organization reaps project benefits.

      Info-Tech Insight

      1. Every step should put people first. It’s tempting to focus the strategy on designing processes and technologies for the target architecture. However, the most common barrier to success is workforce resistance to change.
      2. A consolidated service desk is an investment, not a cost-reduction program. Focus on efficiency, customer service, and end-user satisfaction. Cost savings, and there will be many, should be seen as an indirect consequence of the pursuit of efficiency and customer service.

      Focus the service desk consolidation project on improving customer service to overcome resistance to change

      Emphasizing cost reduction as the most important motivation for the consolidation project is risky.

      End-user satisfaction is a more reliable measure of a successful consolidation.

      • Too many variables affect the impact of the consolidation on the operating costs of the service desk to predict the outcome reliably.
      • Potential reductions in costs are unlikely to overcome organizational resistance to change.
      • Successful service desk consolidations can increase ticket volume as agents capture tickets more consistently and increase customer service.

      The project will generate many cost savings, but they will take time to manifest, and are best seen as an indirect consequence of the pursuit of customer service.

      Info-Tech Insight

      Business units facing a service desk consolidation are often concerned that the project will lead to a loss of access to IT resources. Focus on building a customer-focused consolidated service desk to assuage those fears and earn their support.

      End users, IT leaders, and process owners recognize the importance of the service desk.

      2nd out of 45

      On average, IT leaders and process owners rank the service desk 2nd in terms of importance out of 45 core IT processes. Source: Info-Tech Research Group, Management and Governance Diagnostic (2015, n = 486)

      42.1%

      On average, end users who were satisfied with service desk effectiveness rated all other IT services 42.1% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey 2015, n = 133)

      38.0%

      On average, end users who were satisfied with service desk timeliness rated all other IT services 38.0% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey (2015, n = 133)

      Overcome the perceived barriers from differing service unit cultures to pursue a consolidated service desk (CSD)

      In most organizations, the greatest hurdles that consolidation projects face are related to people rather than process or technology.

      In a survey of 168 service delivery organizations without a consolidated service desk, the Service Desk Institute found that the largest internal barrier to putting in place a consolidated service desk was organizational resistance to change.

      Specifically, more than 56% of respondents reported that the different cultures of each service unit would hinder the level of collaboration such an initiative would require.

      The image is a graph titled Island cultures are the largest barrier to consolidation. The graph lists Perceived Internal Barriers to CSD by percentage. The greatest % barrier is Island cultures, with executive resistance the next highest.

      Service Desk Institute (n = 168, 2007)

      Info-Tech Insight

      Use a phased approach to overcome resistance to change. Focus on quick-win implementations that bring two or three service desks together in a short time frame and add additional service desks over time.

      Avoid the costly proliferation of service desks that can come with organizational growth

      Good and bad growth

      Every organization must grow to survive, and relies heavily on its IT infrastructure to do that. Good growth makes an organization more agile, responsive, and competitive, and leads to further growth.

      However, growth has its dark side. Bad growth hobbles agility, responsiveness, and competitiveness, and leads to stagnation.

      As organizations grow organically and through mergers, their IT functions create multiple service desks across the enterprise to support:

      • Large, diverse user constituencies.
      • Rapidly increasing call volumes.
      • Broader geographic coverage.
      • A growing range of products and services.

      A hallmark of bad growth is the proliferation of redundant and often incompatible ITSM services and processes.

      Project triggers:

      • Organizational mergers
      • ITSM tool purchase
      • Service quality or cost-reduction initiatives
      Challenges arising from service desk proliferation:
      Challenge Impact
      Incompatible Technologies
      • Inability to negotiate volume discounts.
      • Costly skill set maintenance.
      • Increased support costs.
      • Increased shadow IT.
      Inconsistent Processes
      • Low efficiency.
      • High support costs.
      • Inconsistent support quality.
      • Less staffing flexibility.
      Lack of Data Integration
      • Only partial view of IT.
      • Inefficient workflows.
      • Limited troubleshooting ability.
      Low Customer Satisfaction
      • Fewer IT supporters.
      • Lack of organizational support.

      Consolidate service desks to integrate the resources, processes, and technology of your support ecosystem

      What project benefits can you anticipate?

      • Consolidated Service Desk
        • End-user group #1
        • End-user group #2
        • End-user group #3
        • End-user group #4

      A successful consolidation can significantly reduce cost per transaction, speed up service delivery, and improve the customer experience through:

      • Single point of contact for end users.
      • Integrated ITSM solution where it makes sense.
      • Standardized processes.
      • Staffing integration.
      Project Outcome

      Expected Benefit

      Integrated information The capacity to produce quick, accurate, and segmented reports of service levels across the organization.
      Integrated staffing Flexible management of resources that better responds to organizational needs.
      Integrated technology Reduced tool procurement costs, improved data integration, and increased information security.
      Standardized processes Efficient and timely customer service and a more consistent customer experience.

      Standardized and consolidated service desks will optimize infrastructure, services, and resources benefits

      • To set up a functioning service desk, the organization will need to invest resources to build and integrate tier 1, tier 2, and tier 3 capabilities to manage incidents and requests.
      • The typical service desk (Figure 1) can address a certain number of tickets from all three tiers. If your tickets in a given tier are less than that number, you are paying for 100% of service costs but consuming only a portion of it.
      • The consolidated model (Figure 2) reduces the service cost by reducing unused capacity.
      • Benefits of consolidation include a single service desk solution, a single point of contact for the business, data integration, process standardization, and consolidated administration, reporting, and management.

      The image is a graphic showing 2 figures. The first shows ring graphs labelled Service Desk 1 and Service Desk 2, with the caption Service provisioning with distinct service desks. Figure 2 shows one graphic, captioned Service provisioning with Consolidated service providers. At the bottom of the image, there is a legend.

      Info-Tech’s approach to service desk consolidation draws on key metrics to establish a baseline and a target state

      The foundation of a successful service desk consolidation initiative is a robust current state assessment. Given the project’s complexity, however, determining the right level of detail to include in the evaluation of existing service desks can be challenging.

      The Info-Tech approach to service desk consolidation includes:

      • Envisioning exercises to set project scope and garner executive support.
      • Surveys and interviews to identify the current state of people, processes, technologies, and service level agreements (SLAs) in each service desk, and to establish a baseline for the consolidated service desk.
      • Service desk comparison tools to gather the results of the current state assessment for analysis and identify current best practices for migration to the consolidated service desk.
      • Case studies to illustrate the full scope of the project and identify how different organizations deal with key challenges.

      The project blueprint walks through a method that helps identify which processes and technologies from each service desk work best, and it draws on them to build a target state for the consolidated service desk.

      Inspiring your target state from internal tools and best practices is much more efficient than developing new tools and processes from scratch.

      Info-Tech Insight

      The two key hurdles that a successful service desk consolidation must overcome are organizational complexity and resistance to change.

      Effective planning during the current state assessment can overcome these challenges.

      Identify existing best practices for migration to the consolidated service desk to foster agent engagement and get the consolidated service desk up quickly.

      A consolidation project should include the following steps and may involve multiple transition phases to complete

      Phase 1: Develop a Shared Vision

      • Identify stakeholders
      • Develop vision
      • Measure baseline

      Phase 2: Design the Consolidation

      • Design target state
      • Assess gaps to reach target
      • Assess logistics and cost

      Phase 3: Plan the Transition

      • Develop project plan and roadmap
      • Communicate changes
      • Make the transition
        • Evaluate and prepare for next transition phase (if applicable)
        • Evaluate and stabilize
          • CSI

      Whether or not your project requires multiple transition waves to complete the consolidation depends on the complexity of the environment.

      For a more detailed breakdown of this project’s steps and deliverables, see the next section.

      Follow Info-Tech’s methodology to develop a service desk consolidation strategy

      Phases Phase 1: Develop a Shared Vision Phase 2: Design the Consolidated Service Desk Phase 3: Plan the Transition
      Steps 1.1 - Identify and engage key stakeholders 2.1 - Design target consolidated service desk 3.1 - Build the project roadmap
      1.2 - Develop a vision to give the project direction
      1.3 - Conduct a full assessment of each service desk 2.2 - Assess logistics and cost of consolidation 3.2 - Communicate the change
      Tools & Templates Executive Presentation Consolidate Service Desk Scorecard Tool Service Desk Consolidation Roadmap
      Consolidate Service Desk Assessment Tool Consolidated Service Desk SOP Communications and Training Plan Template
      Service Desk Efficiency Calculator News Bulletin & FAQ Template
      Service Desk Consolidation TCO Comparison Tool

      Service desk consolidation is the first of several optimization projects focused on building essential best practices

      Info-Tech’s Service Desk Methodology aligns with the ITIL framework

      Extend

      Facilitate the extension of service management best practices to other business functions to improve productivity and position IT as a strategic partner.

      Standardize

      Build essential incident, service request, and knowledge management processes to create a sustainable service desk that meets business needs.

      Improve

      Build a continual improvement plan for the service desk to review and evaluate key processes and services, and manage the progress of improvement initiatives.

      Adopt Lean

      Build essential incident, service request, and knowledge management processes to create a sustainable service desk that boosts business value.

      Select and Implement

      Review mid-market and enterprise service desk tools, select an ITSM solution, and build an implementation plan to ensure your investment meets your needs.

      Consolidate

      Build a strategic roadmap to consolidate service desks to reduce end-user support costs and sustain end-user satisfaction.

      Our Approach to the Service Desk

      Service desk optimization goes beyond the blind adoption of best practices.

      Info-Tech’s approach focuses on controlling support costs and making the most of IT’s service management expertise to improve productivity.

      Complete the projects sequentially or in any order.

      Info-Tech draws on the COBIT framework, which focuses on consistent delivery of IT services across the organization

      The image shows Info-Tech's IT Management & Governance Framework. It is a grid of boxes, which are colour-coded by category. The framework includes multiple connected categories of research, including Infrastructure & Operations, where Service Desk is highlighted.

      Oxford University IT Service Desk successfully undertook a consolidation project to merge five help desks into one

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Background

      Until 2011, three disparate information technology organizations offered IT services, while each college had local IT officers responsible for purchasing and IT management.

      ITS Service Desk Consolidation Project

      Oxford merged the administration of these three IT organizations into IT Services (ITS) in 2012, and began planning for the consolidation of five independent help desks into a single robust service desk.

      Complication

      The relative autonomy of the five service desks had led to the proliferation of different tools and processes, licensing headaches, and confusion from end users about where to acquire IT service.

      Oxford University IT at a Glance

      • One of the world’s oldest and most prestigious universities.
      • 36 colleges with 100+ departments.
      • Over 40,000 IT end users.
      • Roughly 350 ITS staff in 40 teams.
      • 300 more distributed IT staff.
      • Offers more than 80 services.

      Help Desks:

      • Processes → Business Services & Projects
      • Processes → Computing Services
      • Processes → ICT Support Team

      "IT Services are aiming to provide a consolidated service which provides a unified and coherent experience for users. The aim is to deliver a ‘joined-up’ customer experience when users are asking for any form of help from IT Services. It will be easier for users to obtain support for their IT – whatever the need, service or system." – Oxford University, IT Services

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Build a Service Desk Consolidation Strategy – project overview

      1. Develop shared vision 2. Design consolidation 3. Plan transition
      Best-Practice Toolkit

      1.1 Identify and engage key stakeholders

      1.2 Develop a vision to give the project direction

      1.3 Conduct a full assessment of each service desk

      2.1 Design target consolidated service desk

      2.2 Assess logistics and cost of consolidation

      3.1 Build project roadmap

      3.2 Communicate the change

      Guided Implementations
      • Build the project team and define their roles and responsibilities, then identify key stakeholders and formulate an engagement plan
      • Develop an executive visioning session plan to formulate and get buy-in for the goals and vision of the consolidation
      • Use diagnostics results and the service desk assessment tool to evaluate the maturity and environment of each service desk
      • Define the target state of the consolidated service desk in detail
      • Identify requirements for the consolidation, broken down by people, process, technology and by short- vs. long-term needs
      • Plan the logistics of the consolidation for process, technology, and facilities, and evaluate the cost and cost savings of consolidation with a TCO tool
      • Identify specific initiatives for the consolidation project and evaluate the risks and dependencies for each, then plot initiatives on a detailed project roadmap
      • Brainstorm potential objections and questions and develop a communications plan with targeted messaging for each stakeholder group
      Onsite Workshop

      Module 1: Engage stakeholders to develop a vision for the service desk

      Module 2: Conduct a full assessment of each service desk

      Module 3: Design target consolidated service desk Module 4: Plan for the transition

      Phase 1 Outcomes:

      • Stakeholder engagement and executive buy-in
      • Vision for the consolidation
      • Comprehensive assessment of each service desk’s performance

      Phase 2 Outcomes:

      • Defined requirements, logistics plan, and target state for the consolidated service desk
      • TCO comparison

      Phase 3 Outcomes:

      • Detailed consolidation project roadmap
      • Communications plan and FAQs

      Info-Tech delivers: Use our tools and templates to accelerate your project to completion

      • Service Desk Assessment Tool (Excel)
      • Executive Presentation (PowerPoint)
      • Service Desk Scorecard Comparison Tool (Excel)
      • Service Desk Efficiency Calculator (Excel)
      • Service Desk Consolidation Roadmap (Excel)
      • Service Desk Consolidation TCO Tool (Excel)
      • Communications and Training Plan (Word)
      • Consolidation News Bulletin & FAQ Template (PowerPoint)

      Measured value for Guided Implementations (GIs)

      Engaging in GIs doesn’t just offer valuable project advice, it also results in significant cost savings.

      GI Measured Value
      Phase 1:
      • Time, value, and resources saved by using Info-Tech’s methodology to engage stakeholders, develop a project vision, and assess your current state.
      • For example, 2 FTEs * 10 days * $80,000/year = $6,200
      Phase 2:
      • Time, value, and resources saved by using Info-Tech’s tools and templates to design the consolidated service desk and evaluate cost and logistics.
      • For example, 2 FTEs * 5 days * $80,000/year = $3,100
      Phase 3:
      • Time, value, and resources saved by following Info-Tech’s tools and methodology to build a project roadmap and communications plan.
      • For example, 1 FTE * 5 days * $80,000/year = $1,500
      Total savings $10,800

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Pre-Workshop Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
      Activities

      Module 0: Gather relevant data

      0.1 Conduct CIO Business Vision Survey

      0.2 Conduct End-User Satisfaction Survey

      0.3 Measure Agent Satisfaction

      Module 1: Engage stakeholders to develop a vision for the service desk

      1.1 Identify key stakeholders and develop an engagement plan

      1.2 Brainstorm desired service desk attributes

      1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk

      1.4 Define project goals, principles, and KPIs

      Module 2: Conduct a full assessment of each service desk

      2.1 Review the results of diagnostic programs

      2.2 Map organizational structure and roles for each service desk

      2.3 Assess overall maturity and environment of each service desk

      2.4 Assess current information system environment

      Module 3: Design target consolidated service desk

      3.1 Identify requirements for target consolidated service desk

      3.2 Build requirements document and shortlist for ITSM tool

      3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state

      3.4 Document standardized processes for new service desk

      Module 4: Plan for the transition

      4.1 Plan the logistics of the transition

      4.2 Assess the cost and savings of consolidation to refine business case

      4.3 Identify initiatives and develop a project roadmap

      4.4 Plan communications for each stakeholder group

      Deliverables
      1. CIO Business Vision Survey Diagnostic Results
      2. End-User Satisfaction Survey Diagnostic Results
      1. Stakeholder Engagement Workbook
      2. Executive Presentation
      1. Consolidate Service Desk Assessment Tool
      1. Consolidate Service Desk Scorecard Tool
      2. Consolidated Service Desk SOP
      1. Consolidation TCO Tool
      2. Executive Presentation
      3. Consolidation Roadmap
      4. Communications Plan
      5. News Bulletin & FAQ Template

      Insight breakdown

      Phase 1 Insight

      Don’t get bogged down in the details. A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting and evaluating unnecessary information that will only distract and slow down the project, losing management interest and buy-in.

      How we can help

      Leverage the Consolidate Service Desk Assessment Tool to gather the data you need to evaluate your existing service desks.

      Phase 2 Insight

      Select the target state that is right for your organization. Don’t feel pressured to move to a complete consolidation with a single point of contact if it wouldn’t be compatible with your organization’s needs and abilities, or if it wouldn’t be adopted by your end users. Design an appropriate level of standardization and centralization for the service desk and reinforce and improve processes moving forward.

      How we can help

      Leverage the Consolidate Service Desk Scorecard Tool to analyze the gap between your existing processes and your target state.

      Phase 3 Insight

      Getting people on board is key to the success of the consolidation, and a communication plan is essential to do so. Develop targeted messaging for each stakeholder group, keeping in mind that your end users are just as critical to success as your staff. Know your audience, communicate to them often and openly, and ensure that every communication has a purpose.

      How we can help

      Leverage the Communications Plan and Consolidation News Bulletin & FAQ Template to plan your communications.

      Phase 1

      Develop a Shared Vision

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Develop shared vision

      Proposed Time to Completion (in weeks): 4-8

      Step 1.1: Identify and engage key stakeholders

      Discuss with an analyst:

      • Build the project team and define their roles and responsibilities
      • Identify key stakeholders and formulate an engagement plan

      Then complete these activities…

      • Assign project roles and responsibilities
      • Identify key stakeholders
      • Formalize an engagement plan and conduct interviews

      With these tools & templates:

      Stakeholder Engagement Workbook

      Step 1.2: Develop a vision to give the project direction

      Discuss with an analyst:

      • Develop an executive visioning session plan to formulate and get buy-in for the goals and vision of the consolidation

      Then complete these activities…

      • Host an executive visioning exercise to define the scope and goals of the consolidation

      With these tools & templates:

      Consolidate Service Desk Executive Presentation

      Step 1.3: Conduct a full assessment of each service desk

      Discuss with an analyst:

      • Use diagnostics results and the service desk assessment tool to evaluate the maturity and environment of each service desk
      • Assess agent skills, satisfaction, roles and responsibilities

      Then complete these activities…

      • Analyze organizational structure
      • Assess maturity and environment of each service desk
      • Assess agent skills and satisfaction

      With these tools & templates:

      Consolidate Service Desk Assessment Tool

      IT Skills Inventory and Gap Assessment Tool

      Phase 1 Outcome:

      • A common vision for the consolidation initiative, an analysis of existing service desk architectures, and an inventory of existing best practices.

      Step 1.1: Get buy-in from key stakeholders

      Phase 1

      Develop a shared vision

      1.1 Identify and engage key stakeholders

      1.2 Develop a vision to give the project direction

      1.3 Conduct a full assessment of each service desk

      This step will walk you through the following activities:
      • 1.1.1 Assign roles and responsibilities
      • 1.1.2 Identify key stakeholders for the consolidation
      • 1.1.3 Conduct stakeholder interviews to understand needs in more depth, if necessary
      This step involves the following participants:
      • Project Sponsor
      • CIO or IT Director
      • Project Manager
      • IT Managers and Service Desk Manager(s)
      Step Outcomes:
      • A project team with clearly defined roles and responsibilities
      • A list of key stakeholders and an engagement plan to identify needs and garner support for the change

      Oxford consulted with people at all levels to ensure continuous improvement and new insights

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Motivation

      The merging of Oxford’s disparate IT organizations was motivated primarily to improve end-user service and efficiency.

      Similarly, ITS positioned the SDCP as an “operational change,” not to save costs, but to provide better service to their customers.

      "The University is quite unique in the current climate in that reduction in costs was not one of the key drivers behind the project. The goal was to deliver improved efficiencies and offer a single point of contact for their user base." – Peter Hubbard, ITSM Consultant Pink Elephant

      Development

      Oxford recognized early that they needed an open and collaborative environment to succeed.

      Key IT and business personnel participated in a “vision workshop” to determine long- and short-term objectives, and to decide priorities for the consolidated service desk.

      "Without key support at this stage many projects fail to deliver the expected outcomes. The workshop involved the key stakeholders of the project and was deemed a successful and positive exercise, delivering value to this stage of the project by clarifying the future desired state of the Service Desk." – John Ireland, Director of Customer Service & Project Sponsor

      Deployment

      IT Services introduced a Service Desk Consolidation Project Blog very early into the project, to keep everyone up-to-date and maintain key stakeholder buy-in.

      Constant consultation with people at all levels led to continuous improvement and new insights.

      "We also became aware that staff are facing different changes depending on the nature of their work and which toolset they use (i.e. RT, Altiris, ITSM). Everyone will have to change the way they do things at least a little – but the changes depend on where you are starting from!" – Jonathan Marks, Project Manager

      Understand and validate the consolidation before embarking on the project

      Define what consolidation would mean in the context of your organization to help validate and frame the scope of the project before proceeding.

      What is service desk consolidation?

      Service desk consolidation means combining multiple service desks into one centralized, single point of contact.

      • Physical consolidation = personnel and assets are combined into a single location
      • Virtual consolidation = service desks are combined electronically

      Consolidation must include people, process, and technology:

      1. Consolidation of some or all staff into one location
      2. Consolidation of processes into a single set of standardized processes
      3. One consolidated technology platform or ITSM tool

      Consolidation can take the form of:

      1. Merging multiple desks into one
      2. Collapsing multiple desks into one
      3. Connecting multiple desks into a virtual desk
      4. Moving all desks to one connected platform

      Service Desk 1 - Service Desk 2 - Service Desk 3

      Consolidated Service Desk

      Info-Tech Insight

      Consolidation isn’t for everyone.

      Before you embark on the project, think about unique requirements for your organization that may necessitate more than one service desk, such as location-specific language. Ask yourself if consolidation makes sense for your organization and would achieve a benefit for the organization, before proceeding.

      1.1 Organize and build the project team to launch the project

      Solidify strong support for the consolidation and get the right individuals involved from the beginning to give the project the commitment and direction it requires.

      Project Sponsor
      • Has direct accountability to the executive team and provides leadership to the project team.
      • Legitimatizes the consolidation and provides necessary resources to implement the project.
      • Is credible, enthusiastic, and understands the organization’s culture and values.
      Steering Committee
      • Oversees the effort.
      • Ensures there is proper support from the organization and provides resources where required.
      • Resolves any conflicts.
      Core Project Team
      • Full-time employees drawn from roles that are critical to the service desk, and who would have a strong understanding of the consolidation goals and requirements.
      • Ideal size: 6-10 full-time employees.
      • May include roles defined in the next section.

      Involve the right people to drive and facilitate the consolidation

      Service desk consolidations require broad support and capabilities beyond only those affected in order to deal with unforeseen risks and barriers.

      • Project manager: Has primary accountability for the success of the consolidation project.
      • Senior executive project sponsor: Needed to “open doors” and signal organization’s commitment to the consolidation.
      • Technology SMEs and architects: Responsible for determining and communicating requirements and risks of the technology being implemented or changed, especially the ITSM tool.
      • Business unit leads: Responsible for identifying and communicating impact on business functions, approving changes, and helping champion change.
      • Product/process owners: Responsible for identifying and communicating impact on business functions, approving changes, and helping champion change.
      • HR specialists: Most valuable when roles and organizational design are affected, i.e. the consolidation requires staff redeployment or substantial training (not just using a new system or tool but acquiring new skills and responsibilities) or termination.
      • Training specialists: If you have full-time training staff in the organization, you will eventually need them to develop training courses and material. Consulting them early will help with scoping, scheduling, and identifying the best resources and channels to deliver the training.
      • Communications specialists (internal): Valuable in crafting communications plan, required if communications function owns internal communications.

      Use a RACI table (e.g. in the following section) to clarify who is to be accountable, responsible, consulted, and informed.

      Info-Tech Insight

      The more transformational the change, the more it will affect the organizational chart – not just after the implementation but through the transition.

      Take time early in the project to define the reporting structure for the project/transition team, as well as any teams and roles supporting the transition.

      Assign roles and responsibilities

      1.1.1 Use a RACI chart to assign overarching project responsibilities

      Participants
      • Project Sponsor
      • IT Director, CIO
      • Project Manager
      • IT Managers and Service Desk Manager(s)
      What You'll Need
      • RACI chart

      RACI = Responsible, Accountable, Consulted, Informed

      The RACI chart will provide clarity for overarching roles and responsibilities during the consolidation.

      1. Confirm and modify the columns to match the stakeholders in your organization.
      2. Confirm and modify the roles listed as rows if there are obvious gaps or opportunities to consolidate rows.
      3. Carefully analyze and document the roles as a group.
      Task Project Sponsor Project Manager Sr. Executives SMEs Business Lead Service Desk Managers HR Trainers Communications
      Meeting project objectives A R A R R
      Identifying risks and opportunities R A A C C C C I I
      Assessing current state I A I R C R
      Defining target state I A I C C R
      Planning logistics I A I R R C R
      Building the action plan I A C R R R R R R
      Planning and delivering communications I A C C C C R R A
      Planning and delivering training I A C C C C R R C
      Gathering and analyzing feedback and KPIs I A C C C C C R R

      Identify key stakeholders to gather input from the business, get buy-in for the project, and plan communications

      Identify the key stakeholders for the consolidation to identify the impact consolidation will have on them and ensure their concerns don’t get lost.

      1. Use a stakeholder analysis to identify the people that can help ensure the success of your project.
      2. Identify an Executive Sponsor
        • A senior-level project sponsor is someone who will champion the consolidation project and help sell the concept to other stakeholders. They can also ensure that necessary financial and human resources will be made available to help secure the success of the project. This leader should be someone who is credible, tactful, and accessible, and one who will not only confirm the project direction but also advocate for the project.

      Why is a stakeholder analysis essential?

      • Ignoring key stakeholders is an important cause of failed consolidations.
      • You can use the opinions of the most influential stakeholders to shape the project at an early stage.
      • Their support will secure resources for the project and improve the quality of the consolidation.
      • Communicating with key stakeholders early and often will ensure they fully understand the benefits of your project.
      • You can anticipate the reaction of key stakeholders to your project and plan steps to win their support.

      Info-Tech Insight

      Be diverse and aware. When identifying key stakeholders for the project, make sure to include a rich diversity of stakeholder expertise, geography, and tactics. Also, step back and add silent members to your list. The loudest voices and heaviest campaigners are not necessarily your key stakeholders.

      Identify key stakeholders for the consolidation

      1.1.2 Identify project stakeholders, particularly project champions

      Participants
      • CIO/IT Director
      • Project Sponsor
      • Project Manager
      • IT Managers
      What You’ll Need
      • Whiteboard or flip chart and markers

      Goal: Create a prioritized list of people who are affected or can affect your project so you can plan stakeholder engagement and communication.

      • Use an influence/commitment matrix to determine where your stakeholders lie.
      • High influence, high commitment individuals should be used in conjunction with your efforts to help bring others on board. Identify these individuals and engage with them immediately.
      • Beware of the high influence, low commitment individuals. They should be the first priority for engagement.
      • High commitment, low influence individuals can be used to help influence the low influence, low commitment individuals. Designate a few of these individuals as “champions” to help drive engagement on the front lines.

      Outcome: A list of key stakeholders to include on your steering committee and your project team, and to communicate with throughout the project.

      The image is a matrix, with Influence on the Y-axis and Commitment to change on the X-axis. It is a blank template.

      Overcome the value gap by gathering stakeholder concerns

      Simply identifying and engaging your stakeholders is not enough. There needs to be feedback: talk to your end users to ensure their concerns are heard and determine the impact that consolidation will have on them. Otherwise, you risk leaving value on the table.

      • Talk to the business end users who will be supported by the consolidated service desk.
      • What are their concerns about consolidation?
      • Which functions and services are most important to them? You need to make sure these won't get lost.
      • Try to determine what impact consolidation will have on them.

      According to the Project Management Institute, only 25% of individuals fully commit to change. The remaining 75% either resist or simply accept the change. Gathering stakeholder concerns is a powerful way to gain buy-in.

      The image is a graph with Business Value on the Y-Axis and Time on the X-Axis. Inside the graph, there is a line moving horizontally, separated into segments: Installation, Implementation, and Target Value. The line inclines during the first two segments, and is flat during the last. Emerging from the space between Installation and Implementation is a second line marked Actual realized value. The space between the target value line and the actual realized value line is labelled: Value gap.

      Collect relevant quantitative and qualitative data to assess key stakeholders’ perceptions of IT across the organization

      Don’t base your consolidation on a hunch. Gather reliable data to assess the current state of IT.

      Solicit direct feedback from the organization to gain critical insights into their perceptions of IT.

      • CIO Business Vision: Understanding the needs of your stakeholders is the first and most important step in building a consolidation strategy. Use the results of this survey to assess the satisfaction and importance of different IT services.
      • End-User Satisfaction: Solicit targeted department feedback on core IT service capabilities, IT communications, and business enablement. Use the results to assess the satisfaction of end users with each service broken down by department and seniority level.

      We recommend completing at least the End-User Satisfaction survey as part of your service desk consolidation assessment and planning. An analyst will help you set up the diagnostic and walk through the report with you.

      To book a diagnostic, or get a copy of our questions to inform your own survey, visit Info-Tech’s Benchmarking Tools, contact your account manager, or call toll-free 1-888-670-8889 (US) or 1-844-618-3192 (CAN).

      Data-Driven Diagnostics:

      End-User Satisfaction Survey

      CIO Business Vision

      Review the results of your diagnostics in step 1.3

      Formalize an engagement plan to cultivate support for the change from key stakeholders

      Use Info-Tech’s Stakeholder Engagement Workbook to formalize an engagement strategy

      If a more formal engagement plan is required for this project, use Info-Tech’s Stakeholder Engagement Workbook to document an engagement strategy to ensure buy-in for the consolidation.

      The engagement plan is a structured and documented approach for gathering requirements by eliciting input and validating plans for change and cultivating sponsorship and support from key stakeholders early in the project lifecycle.

      The Stakeholder Engagement Workbook situates stakeholders on a grid that identifies which ones have the most interest in and influence on your project, to assist you in developing a tailored engagement strategy.

      You can also use this analysis to help develop a communications plan for each type of stakeholder in step 3.2.

      Conduct stakeholder interviews to understand needs in more depth, if necessary

      1.1.3 Interview key stakeholders to identify needs

      • If the consolidation will be a large and complex project and there is a need to understand requirements in more depth, conduct stakeholder interviews with “high-value targets” who can help generate requirements and promote communication around requirements at a later point.
      • Choose the interview method that is most appropriate based on available resources.
      Method Description Assessment and Best Practices Stakeholder Effort Business Analyst Effort
      Structured One-on-One Interview In a structured one-on-one interview, the business analyst has a fixed list of questions to ask the stakeholder and follows up where necessary. Structured interviews provide the opportunity to quickly hone in on areas of concern that were identified during process mapping or group elicitation techniques. They should be employed with purpose – to receive specific stakeholder feedback on proposed requirements or help identify systemic constraints. Generally speaking, they should be 30 minutes or less. Low

      Medium

      Unstructured One-on-One Interview In an unstructured one-on-one interview, the business analyst allows the conversation to flow freely. The BA may have broad themes to touch on, but does not run down a specific question list. Unstructured interviews are most useful for initial elicitation, when brainstorming a draft list of potential requirements is paramount. Unstructured interviews work best with senior stakeholders (sponsors or power users), since they can be time consuming if they’re applied to a large sample size. It’s important for BAs not to stifle open dialog and allow the participants to speak openly. They should be 60 minutes or less. Medium Low

      Step 1.2: Develop a vision to give the project direction

      Phase 1

      Develop a shared vision

      1.1 Get buy-in from key stakeholders

      1.2 Develop a vision to give the project direction

      1.3 Conduct a full assessment of each service desk

      This step will walk you through the following activities:
      • 1.2.1 Brainstorm desired attributes for the consolidated service desk to start formulating a vision
      • 1.2.2 Develop a compelling vision and story of change
      • 1.2.3 Create a vision for the consolidated service desk
      • 1.2.4 Identify the purpose, goals, and guiding principles of the consolidation project
      • 1.2.5 Identify anticipated benefits and associated KPIs
      • 1.2.6 Conduct a SWOT analysis on the business
      This step involves the following participants:
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Business Executives
      Step outcomes

      A shared vision for the consolidated service desk that:

      • Defines the scope of the consolidation
      • Encompasses the goals and guiding principles of the project
      • Identifies key attributes of the consolidated service desk and anticipated benefits it will bring
      • Is documented in an executive presentation

      Hold an executive visioning session to kick off the project

      A major change such as service desk consolidation requires a compelling vision to engage staff and motivate them to comprehend and support the change.

      After identifying key stakeholders, gather them in a visioning session or workshop to establish a clear direction for the project.

      An executive visioning session can take up to two days of focused effort and activities with the purpose of defining the short and long-term view, objectives, and priorities for the new consolidated service desk.

      The session should include the following participants:

      • Key stakeholders identified in step 1.1, including:
        • IT management and CIO
        • Project sponsor
        • Business executives interested in the project

      The session should include the following tasks:

      • Identify and prioritize the desired outcome for the project
      • Detail the scope and definition of the consolidation
      • Identify and assess key problems and opportunities
      • Surface and challenge project assumptions
      • Clarify the future desired state of the service desk
      • Determine how processes, functions, and systems are to be included in a consolidation analysis
      • Establish a degree of ownership by senior management

      The activities throughout this step are designed to be included as part of the visioning session

      Choose the attributes of your desired consolidated service desk

      Understand what a model consolidated service desk should look like before envisioning your target consolidated service desk.

      A consolidated service desk should include the following aspects:

      • Handles all customer contacts – including internal and external users – across all locations and business units
      • Provides a single point of contact for end users to submit requests for help
      • Handles both incidents and service requests, as well as any additional relevant ITIL modules such as problem, change, or asset management
      • Consistent, standardized processes and workflows
      • Single ITSM tool with workflows for ticket handling, prioritization, and escalations
      • Central data repository so that staff have access to all information needed to resolve issues quickly and deliver high-quality service, including:
        • IT infrastructure information (such as assets and support contracts)
        • End-user information (including central AD, assets and products owned, and prior interactions)
        • Knowledgebase containing known resolutions and workarounds

      Consolidated Service Desk

      • Service Desk 1
      • Service Desk 2
      • Service Desk 3
      • Consolidated staff
      • Consolidated ITSM tool
      • Consolidated data repository

      Brainstorm desired attributes for the consolidated service desk to start formulating a vision

      1.2.1 Identify the type of consolidation and desired service desk attributes

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Other interested business executives
      What You'll Need
      • Whiteboard or flip chart and markers
      Document

      Document in the Consolidate Service Desk Executive Presentation, slide 6.

      Brainstorm the model and attributes of the target consolidated service desk. You will use this to formulate a vision and define more specific requirements later on.
      1. Identify the type of consolidation: virtual, physical, or hybrid (both)
      2. Identify the level of consolidation: partial (some service desks consolidated) or complete (all service desks consolidated)
      Consolidated Service Desk Model Level of Consolidation
      Partial Complete
      Type of Consolidation Virtual
      Physical
      Hybrid

      3. As a group, brainstorm and document a list of attributes that the consolidated service desk should have.

      Examples:

      • Single point of contact for all users
      • One ITSM tool with consistent built-in automated workflows
      • Well-developed knowledgebase
      • Self-serve portal for end users with ability to submit and track tickets
      • Service catalog

      Develop a compelling vision and story of change

      1.2.2 Use a vision table to begin crafting the consolidation vision

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      • Other interested business executives
      What You'll Need
      • Whiteboard or flip chart and markers
      Document

      Document in the Consolidate Service Desk Executive Presentation, slide 7.

      Build desire for change.

      In addition to standard high-level scope elements, consolidation projects that require organizational change also need a compelling story or vision to influence groups of stakeholders.

      Use the vision table below to begin developing a compelling vision and story of change.

      Why is there a need to consolidate service desks?
      How will consolidation benefit the organization? The stakeholders?
      How did we determine this is the right change?
      What would happen if we didn’t consolidate?
      How will we measure success?

      Develop a vision to inspire and sustain leadership and commitment

      Vision can be powerful but is difficult to craft. As a result, vision statements often end up being ineffective (but harmless) platitudes.

      A service desk consolidation project requires a compelling vision to energize staff and stakeholders toward a unified goal over a sustained period of time.

      Great visions:

      • Tell a story. They describe a journey with a beginning (who we are and how we got here) and a destination (our goals and expected success in the future).
      • Convey an intuitive sense of direction (or “spirit of change”) that helps people act appropriately without being explicitly told what to do.
      • Appeal to both emotion and reason to make people want to be part of the change.
      • Balance abstract ideas with concrete facts. Without concrete images and facts, the vision will be meaninglessly vague. Without abstract ideas and principles, the vision will lack power to unite people and inspire broad support.
      • Are concise enough to be easy to communicate and remember in any situation.

      Info-Tech Insight

      Tell a story. Stories pack a lot of information into few words. They are easy to write, remember, and most importantly – share. It’s worth spending a little extra time to get the details right.

      Create a vision for the consolidated service desk

      1.2.3 Tell a story to describe the consolidated service desk vision

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      What You'll Need
      • Whiteboard or flip chart and markers
      • Document in the Executive Presentation, slide 8.

      Craft a vision of the future state of the service desk.

      Tell a story.

      Stories serve to give the consolidation real-world context by describing what the future state will mean for both staff and users of the service desk. The story should sum up the core of the experience of using the consolidated service desk and reflect how the service desk will fit into the life of the user.

      Stories should include:

      • Action describing the way things happen.
      • Contextual detail that helps readers relate to the person in the story.
      • Challenging ideas that contradict common belief and may be disruptive, but help suggest new directions.
      Example:

      Imagine if…

      … users could access one single online service that allows them to submit a ticket through a self-service portal and service catalog, view the status of their ticket, and receive updates about organization-wide outages and announcements. They never have to guess who to contact for help with a particular type of issue or how to contact them as there is only one point of contact for all types of incidents and service requests.

      … all users receive consistent service delivery regardless of their location, and never try to circumvent the help desk or go straight to a particular technician for help as there is only one way to get help by submitting a ticket through a single service desk.

      … tickets from any location could be easily tracked, prioritized, and escalated using standardized definitions and workflows to ensure consistent service delivery and allow for one set of SLAs to be defined and met across the organization.

      Discuss the drivers of the consolidation to identify the goals the project must achieve

      Identifying the reasons behind the consolidation will help formulate the vision for the consolidated service desk and the goals it should achieve.

      The image is a graph, titled Deployment Drivers for Those Planning a Consolidated Service Desk. From highest to lowest, they are: Improved Service Delivery/Increased Productivity; Drive on Operational Costs; and Perceived Best Practice.

      Service Desk Institute (n = 20, 2007)

      A survey of 233 service desks considering consolidation found that of the 20 organizations that were in the planning stages of consolidation, the biggest driver was to improve service delivery and/or increase productivity.

      This is in line with the recommendation that improved service quality should be the main consolidation driver over reducing costs.

      This image is a graph titled Drivers Among Those Who Have Implemented a Consolidated Service Desk. From highest to lowest, they are: Improved Service Delivery/Increased Productivity; Best Practice; Drive on Operational Costs; Internal vs Outsourcing; and Legacy.

      Service Desk Institute (n = 43, 2007)

      The drivers were similar among the 43 organizations that had already implemented a consolidated service desk, with improved service delivery and increased productivity again the primary driver.

      Aligning with best practice was the second most cited driver.

      Identify the purpose, goals, and guiding principles of the consolidation project

      1.2.4 Document goals of the project

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      What You'll Need
      • Whiteboard or flip chart and markers
      • Document in the Executive Presentation, slide 9.

      Use the results of your stakeholder analysis and interviews to facilitate a discussion among recommended participants and document the purpose of the consolidation project, the goals the project aims to achieve, and the guiding principles that must be followed.

      Use the following example to guide your discussion:

      Purpose The purpose of consolidating service desks is to improve service delivery to end users and free up more time and resources to achieve the organization’s core mission.
      Goals
      • Align IT resources with business strategies and priorities
      • Provide uniform quality and consistent levels of service across all locations
      • Improve the end-user experience by reducing confusion about where to get help
      • Standardize service desk processes to create efficiencies
      • Identify and eliminate redundant functions or processes
      • Combine existing resources to create economies of scale
      • Improve organizational structure, realign staff with appropriate job duties, and improve career paths
      Guiding Principles

      The consolidated service desk must:

      1. Provide benefit to the organization without interfering with the core mission of the business
      2. Balance cost savings with service quality
      3. Increase service efficiency without sacrificing service quality
      4. Not interfere with service delivery or the experience of end users
      5. Be designed with input from key stakeholders

      Identify the anticipated benefits of the consolidation to weigh them against risks and plan future communications

      The primary driver for consolidation of service desks is improved service delivery and increased productivity. This should relate to the primary benefits delivered by the consolidation, most importantly, improved end-user satisfaction.

      A survey of 43 organizations that have implemented a consolidated service desk identified the key benefits delivered by the consolidation (see chart at right).

      The image is a bar graph titled Benefits Delivered by Consolidated Service Desk. The benefits, from highest to lowest are: Increased Customer Satisfaction; Optimised Resourcing; Cost Reduction; Increased Productivity/Revenue; Team Visibility/Ownership; Reporting/Accountability.

      Source: Service Desk Institute (n = 43, 2007)

      Info-Tech Insight

      Cost reduction may be an important benefit delivered by the consolidation effort, but it should not be the most valuable benefit delivered. Focus communications on anticipated benefits for improved service delivery and end-user satisfaction to gain buy-in for the project.

      Identify anticipated outcomes and benefits of consolidation

      1.2.5 Use a “stop, start, continue” exercise to identify KPIs

      What You'll Need
      • Whiteboard or flip chart and markers
      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      Document

      Document in the Executive Presentation, slide 10

      1. Divide the whiteboard into 3 columns: stop, start, and continue
      2. Identify components of your service desk that:
      • Are problematic and should be phased out (stop)
      • Provide value but are not in place yet (start)
      • Are effective and should be sustained, if not improved (continue)
    • For each category, identify initiatives or outcomes that will support the desired goals and anticipated benefits of consolidation.
    • Stop Start Continue
      • Escalating incidents without following proper protocol
      • Allowing shoulder taps
      • Focusing solely on FCR as a measure of success
      • Producing monthly ticket trend reports
      • Creating a self-serve portal
      • Communicating performance to the business
      • Writing knowledgebase articles
      • Improving average TTR
      • Holding weekly meetings with team members

      Use a SWOT analysis to assess the service desk

      • A SWOT analysis is a structured planning method that organizations can use to evaluate the strengths, weaknesses, opportunities, and threats involved in a project or business venture.
      • Use a SWOT analysis to identify the organization’s current IT capabilities and classify potential disruptive technologies as the first step toward preparing for them.
      Review these questions...
      Strengths (Internal) Weaknesses (Internal)
      • What Service Desk processes provide value?
      • How does the Service Desk align with corporate/IT strategy?
      • How does your Service Desk benefit end users?
      • Does the Service Desk produce reports or data that benefit the business?
      • Does your Service Desk culture offer an advantage?
      • What areas of your service desk require improvement?
      • Are there gaps in capabilities?
      • Do you have budgetary limitations?
      • Are there leadership gaps (succession, poor management, etc.)?
      • Are there reputational issues with the business?
      Opportunities (External) Threats (External)
      • Are end users adopting hardware or software that requires training and education for either themselves or the Service Desk staff?
      • Can efficiencies be gained by consolidating our Service Desks?
      • What is the most cost-effective way to solve the user's technology problems and get them back to work?
      • How can we automate Service Desk processes?
      • Are there obstacles that the Service Desk must face?
      • Are there issues with respect to sourcing of staff or technologies?
      • Could the existing Service Desk metrics be affected?
      • Will the management team need changes to their reporting?
      • Will SLAs need to be adjusted?

      …to help you conduct your SWOT analysis on the service desk.

      Strengths (Internal) Weaknesses (Internal)
      • End user satisfaction >80%
      • Comprehensive knowledgebase
      • Clearly defined tiers
      • TTR on tickets is <1 day
      • No defined critical incident workflow
      • High cost to solve issues
      • Separate toolsets create disjointed data
      • No root cause analysis
      • Ineffective demand planning
      • No clear ticket categories
      Opportunities (External) Threats (External)
      • Service catalog
      • Ticket Templates
      • Ticket trend analysis
      • Single POC through the use of one tool
      • Low stakeholder buy-in
      • Fear over potential job loss
      • Logistics of the move
      • End user alienation over process change

      Conduct a SWOT analysis on the business

      1.2.6 Conduct SWOT analysis

      Participants
      • Project Sponsor
      • IT Director, CIO
      • IT Managers and Service Desk Manager(s)
      What You'll Need
      • Whiteboard or flip chart and markers
      Document
      • Document in the Executive Presentation, slide 11
      1. Break the group into two teams:
      • Assign team A strengths and weaknesses.
      • Assign team B opportunities and threats.
    • Have the teams brainstorm items that fit in their assigned areas.
      • Refer to the questions on the previous slide to help guide discussion
    • Choose someone from each group to fill in the grid on the whiteboard.
    • Conduct a group discussion about the items on the list.
    • Helpful to achieving the objective Harmful to achieving the objective
      Internal origin attributes of the organization Strengths Weaknesses

      External Origin attributes of the environment

      Opportunities Threats

      Frame your project in terms of people, process, technology

      A framework should be used to guide the consolidation effort and provide a standardized basis of comparison between the current and target state.

      Frame the project in terms of the change and impact it will have on:

      • People
      • Process
      • Technology

      Service desk consolidation will likely have a significant impact in all three categories by standardizing processes, implementing a single service management tool, and reallocating resources. Framing the project in this way will ensure that no aspect goes forgotten.

      For each of the three categories, you will identify:

      • Current state
      • Target state
      • Gap and actions required
      • Impact, risks, and benefits
      • Communication and training requirements
      • How to measure progress/success

      People

      • Tier 1 support
      • Tier 2 support
      • Tier 3 support
      • Vendors

      Process

      • Incident management
      • Service request management
      • SLAs

      Technology

      • ITSM tools
      • Knowledgebase
      • CMDB and other databases
      • Technology supported

      Complete the Consolidate Service Desk Executive Presentation

      Complete an executive presentation using the decisions made throughout this step

      Use the Consolidate Service Desk Executive Presentation to deliver the outputs of your project planning to the business and gain buy-in for the project.

      1. Use the results of the activities throughout step 1.2 to produce the key takeaways for your executive presentation.
      2. At the end of the presentation, include 1-2 slides summarizing any additional information specific to your organization.
      3. Once complete, pitch the consolidation project to the project sponsor and executive stakeholders.
        • This presentation needs to cement buy-in for the project before any other progress is made.

      Step 1.3: Conduct a full assessment of each service desk

      Phase 1

      Develop a shared vision

      1.1 Get buy-in from key stakeholders

      1.2 Develop a vision to give the project direction

      1.3 Conduct a full assessment of each service desk

      This step will walk you through the following activities:
      • 1.3.1 Review the results of your diagnostic programs
      • 1.3.2 Analyze the organizational structure of each service desk
      • 1.3.3 Assess the overall maturity of each service desk
      • 1.3.4 Map out roles and responsibilities of each service desk using organizational charts
      • 1.3.5 Assess and document current information system environment
      This step involves the following participants:
      • CIO
      • IT Directors
      • Service Desk Managers
      • Service Desk Technicians
      Step outcomes
      • A robust current state assessment of each service desk, including overall maturity, processes, organizational structure, agent skills, roles and responsibilities, agent satisfaction, technology and ITSM tools.

      Oxford saved time and effort by sticking with a tested process that works

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Oxford ITS instigated the service desk consolidation project in the fall of 2012.

      A new ITSM solution was formally acquired in the spring 2014, and amalgamated workflows designed.

      Throughout this period, at least 3 detailed process analyses occurred in close consultation with the affected IT units.

      Responsibility for understanding each existing process (incident, services, change management, etc.) were assigned to members of the project team.

      They determined which of the existing processes were most effective, and these served as the baseline – saving time and effort in the long run by sticking with tested processes that work.

      Reach out early and often.

      Almost from day one, the Oxford consolidation team made sure to consult closely with each relevant ITS team about their processes and the tools they used to manage their workflows.

      This was done both in structured interviews during the visioning stage and informally at periodic points throughout the project.

      The result was the discovery of many underlying similarities. This information was then instrumental to determining a realistic baseline from which to design the new consolidated service desk.

      "We may give our activities different names or use different tools to manage our work but in all cases common sense has prevailed and it’s perhaps not so surprising that we have common challenges that we choose to tackle in similar ways." – Andrew Goff, Change Management at Oxford ITS

      Review the results of your diagnostic programs to inform your current state assessment

      1.3.1 Understand satisfaction with the service desk

      Participants
      • CIO/IT Director
      • IT Manager
      • Service Manager(s)
      Document
      1. Set up an analyst call through your account manager to review the results of your diagnostic.
      • Whatever survey you choose, ask the analyst to review the data and comments concerning:
        • Assessments of service desk timeliness/effectiveness
        • IT business enablement
        • IT innovation leadership
    • Book a meeting with recommended participants. Go over the results of your diagnostic survey.
    • Facilitate a discussion of the results. Focus on the first few summary slides and the overall department results slide.
      • What is the level of IT support?
      • What are stakeholders’ perceptions of IT performance?
      • How satisfied are stakeholders with IT?
      • Does the department understand and act on business needs?
      • What are the business priorities and how well are you doing in meeting these priorities?
      • How can the consolidation project assist the business in achieving goals?
      • How could the consolidation improve end-user satisfaction and business satisfaction?
    • A robust current state assessment is the foundation of a successful consolidation

      You can’t determine where you’re going without a clear idea of where you are now.

      Before you begin planning for the consolidation, make sure you have a clear picture of the magnitude of what you plan on consolidating.

      Evaluate the current state of each help desk being considered for consolidation. This should include an inventory of:

      • Process:
        • Processes and workflows
        • Metrics and SLAs
      • People:
        • Organizational structure
        • Agent workload and skills
        • Facility layout and design
      • Technology:
        • Technologies and end users supported
        • Technologies and tools used by the service desk

      Info-Tech Insight

      A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting unnecessary information that will only distract and slow down the project.

      Review ticket handling processes for each service desk to identify best practices

      Use documentation, reports, and metrics to evaluate existing processes followed by each service desk before working toward standardized processes.

      Poor Processes vs. Optimized Processes

      Inconsistent or poor processes affect the business through:

      • Low business satisfaction
      • Low end-user satisfaction
      • High cost to resolve
      • Delayed progress on project work
      • Lack of data for reporting due to ineffective ticket categorization, tools, and logged tickets
      • No root cause analysis leads to a reactive vs. proactive service desk
      • Lack of cross-training and knowledge sharing result in time wasted troubleshooting recurring issues
      • Lack of trend analysis limits the effectiveness of demand planning

      Standardized service desk processes increase user and technician satisfaction and lower costs to support through:

      • Improved business satisfaction Improved end-user satisfaction Incidents prioritized and escalated accurately and efficiently
      • Decreased recurring issues due to root cause analysis and trends
      • Increased self-sufficiency of end users
      • Strengthened team and consistent delivery through cross-training and knowledge sharing
      • Enhanced demand planning through trend analysis and reporting

      The image is a graphic of a pyramid, with categories as follows (from bottom): FAQ/Knowledgebase; Users; Tier 1-75-80%; Tier 2-15%; Tier 3 - 5%. On the right side of the pyramid is written Resolution, with arrows extending from each of the higher sections down to Users. On the left is written Escalation, with arrows from each lower category up to the next highest. Inside the pyramid are arrows extending from the bottom to each level and vice versa.

      Analyze the organizational structure of each service desk

      1.3.2 Discuss the structure of each service desk

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Consolidate Service Desk Assessment Tool

      1. Facilitate a discussion among recommended participants to discuss the structure of each service desk. Decide which model best describes each service desk:

      • The Gatekeeper Model: All calls are routed through a central call group whose sole responsibility is to link the customer to the right individual or group.
      • The Call Sorting Model: All calls are sorted into categories using technology and forwarded to the right 2nd level specialist group.
      • Tiered Structure (Specialist Model): All calls are sorted through a single specialist group, such as desktop support. Their job is to log the interaction, attempt resolution, and escalate when the problem is beyond their ability to resolve.
      • Tiered Structure (Generalist Model): All calls are sorted through a single generalist group, whose responsibility is to log the interaction, attempt a first resolution, and escalate when the problem is beyond their ability to resolve.

      2. Use a flip chart or whiteboard to draw the architecture of each service desk, using the example on the right as a guide.

      The image is a graphic depicting the organizational structure of a service desk, from Users to Vendor. The graphic shows how a user request can move through tiers of service, and the ways that Tiers 2 and 3 of the service desk are broken down into areas of specialization.

      Assess the current state of each service desk using the Consolidate Service Desk Assessment Tool

      Assess the current state of each service desk

      The Consolidate Service Desk Assessment Tool will provide insight into the overall health of each existing service desk along two vectors:

      1. Process Maturity (calculated on the basis of a comprehensive survey)
      2. Metrics (calculated on the basis of entered ticket and demographic data)

      Together these answers offer a snapshot of the health, efficiency, performance, and perceived value of each service desk under evaluation.

      This tool will assist you through the current state assessment process, which should follow these steps:

      1. Send a copy of this tool to the Service Desk Manager (or other designated party) of each service desk that may be considered as part of the consolidation effort.
        • This will collect key metrics and landscape data and assess process maturity
      2. Analyze the data and discuss as a group
      3. Ask follow-up questions
      4. Use the information to compare the health of each service desk using the scorecard tool

      These activities will be described in more detail throughout this step of the project.

      Gather relevant data to assess the environment of each service desk

      Assess each service desk’s environment using the assessment tool

      Send a copy of the Consolidate Service Desk Assessment Tool to the Service Desk Manager (or other designated party) of each service desk that will be considered as part of the consolidation.

      Instruct them to complete tab 2 of the tool, the Environment Survey:

      • Enter Profile, Demographic, Satisfaction, Technology, and Ticket data into the appropriate fields as accurately as possible. Satisfaction data should be entered as percentages.
      • Notes can be entered next to each field to indicate the source of the data, to note missing or inaccurate data, or to explain odd or otherwise confusing data.

      This assessment will provide an overview of key metrics to assess the performance of each service desk, including:

      • Service desk staffing for each tier
      • Average ticket volume and distribution per month
      • # staff in IT
      • # service desk staff
      • # supported devices (PC, laptops, mobiles, etc.)
      • # desktop images

      Assess the overall maturity of each service desk

      1.3.3 Use the assessment tool to measure the maturity of each service desk

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Consolidate Service Desk Assessment Tool
      1. Assemble the relevant team for each service desk: process owners, functional managers, service desk manager, and relevant staff and technicians who work with the processes to be assessed. Each service desk team should meet to complete the maturity assessment together as a group.
      2. Go to tab 3 (Service Desk Maturity Survey) of the Consolidate Service Desk Assessment Tool and respond to the questions in the following categories:
      • Prerequisites (general questions)
      • People
      • Process
      • Technology
      • SLAs
    • Rate each element. Be honest. The goal is to end up with as close a representation as possible to what really exists. Only then can you identify realistic improvement opportunities. Use the maturity definitions as guides.
    • Evaluate resource utilization and satisfaction to allocate resources effectively

      Include people as part of your current state assessment to evaluate whether your resources are appropriately allocated to maximize effectiveness and agent satisfaction.

      Skills Inventory

      Use the IT Skills Inventory and Gap Assessment Tool to assess agent skills and identify gaps or overlaps.

      Agent Satisfaction

      Measure employee satisfaction and engagement to identify strong teams.

      Roles and Responsibilities

      Gather a clear picture of each service desk’s organizational hierarchy, roles, and responsibilities.

      Agent Utilization

      Obtain a snapshot of service desk productivity by calculating the average amount of time an agent is handling calls, divided by the average amount of time an agent is at work.

      Conduct a skills inventory for each service desk

      Evaluate agent skills across service desks

      After evaluating processes, evaluate the skill sets of the agents tasked with following these processes to identify gaps or overlap.

      Send the Skills Coverage Tool tab to each Service Desk Manager, who will either send it to the individuals who make up their service desk with instructions to rate themselves, or complete the assessment together with individuals as part of one-on-one meetings for discussing development plans.

      IT Skills Inventory and Gap Assessment Tool will enable you to:

      • List skills required to support the organization.
      • Document and rate the skills of the existing IT staffing contingent.
      • Assess the gaps to help determine hiring or training needs, or even where to pare back.
      • Build a strategy for knowledge sharing, transfer, and training through the consolidation project.

      Map out roles and responsibilities of each service desk using organizational charts

      1.3.4 Obtain or draw organizational charts for each location

      Clearly document service desk roles and responsibilities to rationalize service desk architecture.
      Participants
      • CIO, IT Director
      • Service Desk Manager(s)
      • Tier/Specialist Manager(s)
      What You’ll Need
      • Org. charts
      • Flip chart or whiteboard and markers
      1. Obtain or draw (on a whiteboard or flip chart) the organizational chart for each service desk to get a clear picture of the roles that fulfill each service desk. If there is any uncertainty or disagreement, discuss as a group to come to a resolution.
      2. Discuss the roles and reporting relationships within the service desk and across the organization to establish if/where inefficiencies exist and how these might be addressed through consolidation.
      3. If an up-to-date organizational chart is not in place, use this time to define the organizational structure as-is and consider future state.
      IT Director
      Service Desk Manager
      Tier 1 Help Desk Lead Tier 2 Help Desk Lead Tier 2 Apps Support Lead Tier 3 Specialist Support Lead
      Tier 1 Specialist Name Title Name Title Name Title
      Tier 1 Specialist Name Title Name Title Name Title
      Name Title Name Title Name Title
      Name Title Name Title

      Conduct an agent satisfaction survey to compare employee engagement across locations

      Evaluate agent satisfaction

      End-user satisfaction isn’t the only important satisfaction metric.

      Agent satisfaction forms a key metric within the Consolidate Service Desk Assessment Tool, and it can be evaluated in a variety of ways. Choose the approach that best suits your organization and time restraints for the project.

      Determine agent satisfaction on the basis of a robust (and anonymous) survey of service desk agents. Like the end-user satisfaction score, this measure is ideally computed as a percentage.

      There are several ways to measure agent satisfaction:

      1. If your organization runs an employee engagement survey, use the most recent survey results, separating them by location and converting them to a percentage.
      2. If your organization does not currently measure employee engagement or satisfaction, consider one of Info-Tech and McLean & Company’s two engagement diagnostics:
        • Full Engagement Diagnostic – 81 questions that provide a comprehensive view into your organization's engagement levels
        • McLean & Company’s Pulse Survey – 15 questions designed to give a high-level view of employee engagement
      3. For smaller organizations, a survey may not be feasible or make sense. In this case, consider gathering informal engagement data through one-on-one meetings.
      4. Be sure to discuss and document any reasons for dissatisfaction, including pain points with the current tools or processes.
      Document
      • Document on tab 2 of the Consolidate Service Desk Assessment Tool

      Assess the service management tools supporting your service desks

      Identify the different tools being used to support each service desk in order to assess whether and how they can be consolidated into one service management tool.

      Ideally, your service desks are already on the same ITSM platform, but if not, a comprehensive assessment of current tools is the first step toward a single, consolidated solution.

      Include the following in your tools assessment:

      • All automated ITSM solutions being used to log and track incidents and service requests
      • Any manual or other methods of tracking tickets (e.g. Excel spreadsheets)
      • Configurations and any customizations that have been made to the tools
      • How configuration items are maintained and how mature the configuration management databases (CMDB) are
      • Pricing and licensing agreements for tools
      • Any unique functions or limitations of the tools

      Info-Tech Insight

      Document not only the service management tools that are used but also any of their unique and necessary functions and configurations that users may have come to rely upon, such as remote support, self-serve, or chat support, in order to inform requirements in the next phase.

      Assess the IT environment your service desks support

      Even if you don’t do any formal asset management, take this opportunity for discovery and inventory to gain a complete understanding of your IT environment and the range of devices your service desks support.

      Inventory your IT environment, including:

      User Devices

      • Device counts by category Equipment/resources by user

      Servers

      • Server hardware, CPU, memory
      • Applications residing on servers

      Data centers

      • Including location and setup

      In addition to identifying the range of devices you currently support, assess:

      • Any future devices, hardware, or software that the service desk will need to support (e.g. BYOD, mobile)
      • How well each service desk is currently able to support these devices
      • Any unique or location-specific technology or devices that could limit a consolidation

      Info-Tech Insight

      The capabilities and configuration of your existing infrastructure and applications could limit your consolidation plans. A comprehensive technology assessment of not only the service desk tools but also the range of devices and applications your service desks supports will help you to prepare for any potential limitations or obstacles a consolidated service desk may present.

      Assess and document current information system environment

      1.3.5 Identify specific technology and tool requirements

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Consolidate Service Desk Assessment Tool, tab 2.
      Document

      Document information on number of devices supported and number of desktop images associated with each service desk in the section on “Technology Data” of the Consolidate Service Desk Assessment Tool.

      1. Identify and document the service management tools that are used by each service desk.
      2. For each tool, identify and document any of the following that apply:
      • Integrations
      • Configurations that were made during implementation
      • Customizations that were made during implementation
      • Version, licenses, cost
    • For each service desk, document any location-specific or unique technology requirements or differences that could impact consolidation, including:
      • Devices and technology supported
      • Databases and configuration items
      • Differing applications or hardware needs
    • If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.1 Assign roles and responsibilities

      Use a RACI chart to assign overarching responsibilities for the consolidation project.

      1.3.2 Analyze the organizational structure of each service desk

      Map out the organizational structure and flow of each service desk and discuss the model that best describes each.

      Phase 2

      Design the Consolidated Service Desk

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Design consolidated service desk

      Proposed Time to Completion (in weeks): 2-4

      Step 2.1: Model target consolidated service desk

      Start with an analyst kick-off call:

      • Define the target state of the consolidated service desk in detail
      • Identify requirements for the consolidation, broken down by people, process, technology and by short- vs. long-term needs

      Then complete these activities…

      • Set project metrics to measure success of the consolidation
      • Brainstorm people, process, technology requirements for the service desk
      • Build requirements documents and RFP for a new tool
      • Review results of the scorecard comparison tool

      With these tools & templates:

      Consolidate Service Desk Scorecard Tool

      Step 2.2: Assess logistics and cost of consolidation

      Review findings with analyst:

      • Plan the logistics of the consolidation for process, technology, and facilities
      • Evaluate the cost and cost savings of consolidation using a TCO tool

      Then complete these activities…

      • Plan logistics for process, technology, facilities, and resource allocation
      • Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project

      With these tools & templates:

      Service Desk Efficiency Calculator

      Service Desk Consolidation TCO Comparison Tool

      Phase 2 Results:

      • Detailed requirements and vision for the consolidated service desk, gap analysis of current vs. target state, and an initial analysis of the logistical considerations to achieve target.

      Step 2.1: Model target consolidated state

      Phase 2

      Design consolidation

      2.1 Design target consolidated service desk

      2.2 Assess logistics and cost of consolidation

      This step will walk you through the following activities:
      • 2.1.1 Determine metrics to measure the value of the project
      • 2.1.2 Set targets for each metric to measure progress and success of the consolidation
      • 2.1.3 Brainstorm process requirements for consolidated service desk
      • 2.1.4 Brainstorm people requirements for consolidated service desk
      • 2.1.5 Brainstorm technology requirements for consolidated service desk
      • 2.1.6 Build a requirements document for the service desk tool
      • 2.1.7 Evaluate alternative tools, build a shortlist for RFPs, and arrange web demonstrations or evaluation copies
      • 2.1.8 Set targets for key metrics to identify high performing service desks
      • 2.1.9 Review the results of the scorecard to identify best practices
      This step involves the following participants:
      • CIO
      • IT Director
      • Service Desk Managers
      • Service Desk Technicians
      Step Outcomes
      • A list of people, process, and technology requirements for the new consolidated service desk
      • A clear vision of the target state
      • An analysis of the gaps between existing and target service desks

      Ensure the right people and methods are in place to anticipate implementation hurdles

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      "Since our last update, a review and re-planning exercise has reassessed the project approach, milestones, and time scales. This has highlighted some significant hurdles to transition which needed to be addressed, resulting primarily from the size of the project and the importance to the department of a smooth and well-planned transition to the new processes and toolset." – John Ireland, Director of Customer Service & Project Sponsor

      Initial hurdles led to a partial reorganization of the project in Fall 2014

      Despite careful planning and its ultimate success, Oxford’s consolidation effort still encountered some significant hurdles along the way – deadlines were sometimes missed and important processes overlooked.

      These bumps can be mitigated by building flexibility into your plan:

      • Adopt an Agile methodology – review and revise groups of tasks as the project progresses, rather than waiting until near the end of the project to get approval for the complete implementation.
      • Your Tiger Team or Project Steering Group must include the right people – the project team should not just include senior or high-level management; members of each affected IT group should be consulted, and junior-level employees can provide valuable insight into existing and potential processes and workflows.

      Info-Tech Insight

      Ensure that the project lead is someone conversant in ITSM, so that they are equipped to understand and react to the unique challenges and expectations of a consolidation and can easily communicate with process owners.

      Use the consolidation vision to define the target service desk in more detail

      Use your baseline assessment and your consolidation vision as a guide to figure out exactly where you’re going before planning how to get there.

      With approval for the project established and a clear idea of the current state of each service desk, narrow down the vision for the consolidated service desk into a specific picture of the target state.

      The target state should provide answers to the following types of questions:

      Process:

      • Will there be one set of SLAs across the organization?
      • What are the target SLAs?
      • How will ticket categories be defined?
      • How will users submit and track their tickets?
      • How will tickets be prioritized and escalated?
      • Will a knowledgebase be maintained and accessible by both service desk and end users?

      People:

      • How will staff be reorganized?
      • What will the roles and responsibilities look like?
      • How will tiers be structured?
      • What will the career path look like within the service desk?

      Technology:

      • Will there be one single ITSM tool to support the service desk?
      • Will an existing tool be used or will a new tool be selected?
      • If a new tool is needed, what are the requirements?

      Info-Tech Insight

      Select the target state that is right for your organization. Don’t feel pressured to select the highest target state or a complete consolidation. Instead select the target state that is most compatible with your organization’s current needs and capabilities.

      Determine metrics to measure the value of the project

      2.1.1 Identify KPIs to measure the success of the consolidation

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You’ll Need
      • Whiteboard or flip chart and markers

      Identify three primary categories where the consolidation project is expected to yield benefits to the business. Use the example on the right to guide your discussion.

      Efficiency and effectiveness are standard benefits for this project, but the third category may depend on your organization.

      • Examples include: improved resourcing, security, asset management, strategic alignment, end-user experience, employee experience

      Identify 1-3 key performance indicators (KPIs) associated with each benefit category, which will be used to measure the success of the consolidation project. Ensure that each has a baseline measure that can be reassessed after the consolidation.

      Efficiency

      Streamlined processes to reduce duplication of efforts

      • Reduced IT spend and cost of delivery
      • One ITSM tool Improved reliability of service
      • Improved response time

      Resourcing

      Improved allocation of human and financial resources

      • Improved resource sharing
      • Improved organizational structure of service desk

      Effectiveness

      Service delivery will be more accessible and standardized

      • Improved responsive-ness to incidents and service requests
      • Improved resolution time
      • Single point of contact for end users
      • Improved reporting

      Set targets for each metric to measure progress and success of the consolidation

      2.1.2 Identify specific metrics for each KPI and targets for each

      Participants
      • IT Director
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You’ll Need
      • KPIs from previous step
      • Whiteboard or flip chart and markers
      1. Select one core KPI for each critical success factor, which will be used to measure progress and success of the consolidation effort down the road.
      2. For each KPI, document the average baseline metric the organization is achieving (averaged across all service desks).
      3. Discuss and document a target metric that the project will aim to reach through the single consolidated service desk.
      4. Set a short and long-term target for each metric to encourage continuous improvement. Examples:
      Efficiency
      Business Value KPI Current Metric Short-Term (6 month) Target Long-Term (1 year) Target
      Streamlined processes to reduce duplication of efforts Improved response time 2 hours 1 hour 30 minutes
      Effectiveness
      Business Value KPI Current Metric Short-Term (6 month) Target Long-Term (1 year) Target
      Service delivery will be more accessible and standardized Improved first call resolution (% resolved at Tier 1) 50% 60% 70%

      If poor processes were in place, take the opportunity to start fresh with the consolidation

      If each service desk’s existing processes were subpar, it may be easier to build a new service desk from the basics rather than trying to adapt existing processes.

      You should have these service management essentials in place:

      Service Requests:

      • Standardize process to verify, approve, and fulfill service requests.
      • Assign priority according to business criticality and service agreements.
      • Think about ways to manage service requests to better serve the business long term.

      Incident Management:

      • Set standards to define and record incidents.
      • Define incident response actions and communications.

      Knowledgebase:

      • Define standards for knowledgebase.
      • Introduce creation of knowledgebase articles.
      • Create a knowledge-sharing and cross-training culture.

      Reporting:

      • Select appropriate metrics.
      • Generate relevant insights that shed light on the value that IT creates for the organization.

      The image is a circle comprised of 3 concentric circles. At the centre is a circle labelled Standardized Service Desk. The ring outside of it is split into 4 sections: Incident Management; Service Requests; Structure and Reporting; and Knowledgebase. The outer circle is split into 3 sections: People, Process, Technologies.

      Evaluate how your processes compare with the best practices defined here. If you need further guidance on how to standardize these processes after planning the consolidation, follow Info-Tech’s blueprint, Standardize the Service Desk.

      Even optimized processes will need to be redefined for the target consolidated state

      Your target state doesn’t have to be perfect. Model a short-term, achievable target state that can demonstrate immediate value.

      Consider the following elements when designing service desk processes:
      • Ticket input (i.e. how can tickets be submitted?)
      • Ticket classification (i.e. how will tickets be categorized?)
      • Ticket prioritization (i.e. how will critical incidents be defined?)
      • Ticket escalation (i.e. how and at what point will tickets be assigned to a more specialized resource?)
      • Ticket resolution (i.e. how will resolution be defined and how will users be notified?)
      • Communication with end users (i.e. how and how often will users be notified about the status of their ticket or of other incidents and outages?)

      Consider the following unique process considerations for consolidation:

      • How will knowledge sharing be enabled in order for all technicians to quickly access known errors and resolve problems?
      • How can first contact resolution levels be maintained through the transition?
      • How will procedures be clearly documented so that tickets are escalated properly?
      • Will ticket classification and prioritization schemes need to change?
      • Will new services such as self-serve be introduced to end users and how will this be communicated?

      Info-Tech Insight

      Don’t do it all at once. Consolidation will lead to some level of standardization. It will be reinforced and improved later through ongoing reengineering and process improvement efforts (continual improvement management).

      Brainstorm process requirements for consolidated service desk

      2.1.3 Identify process-related requirements for short and long term

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Whiteboard, sticky notes, markers
      • Vision and goals for the consolidation from step 1.2
      Document
      • Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.
      1. Review the questions in the previous section to frame a discussion on process considerations and best practices for the target consolidated service desk.
      2. Use your responses to the questions to brainstorm a list of process requirements or desired characteristics for the target state, particularly around incident management and service request management.
      3. Write each requirement onto a sticky note and categorize it as one of the following:
        1. Immediate requirement for consolidated service desk
        2. Implement within 6 months
        3. Implement within 1 year

      Example:

      Whiteboard:

      • Immediate
        • Clearly defined ticket prioritization scheme
        • Critical incident process workflow
      • 6 months
        • Clearly defined SOP, policies, and procedures
        • Transactional end-user satisfaction surveys
      • 1 year
        • Change mgmt.
        • Problem mgmt.

      Define the target resource distribution and utilization for the consolidated service desk

      Consolidation can sound scary to staff wondering if there will be layoffs. Reduce that by repurposing local staff and maximizing resource utilization in your organizational design.

      Consider the following people-related elements when designing your target state:

      • How will roles and responsibilities be defined for service desk staff?
      • How many agents will be required to deal with ticket demand?
      • What is the target agent utilization rate?
      • How will staff be distributed among tiers?
      • What will responsibilities be at each tier?
      • Will performance goals and rewards be established or standardized?

      Consider the following unique people considerations for consolidation:

      • Will staffing levels change?
      • Will job titles or roles change for certain individuals?
      • How will staff be reorganized?
      • Will staff need to be relocated to one location?
      • Will reporting relationships change?
      • How will this be managed?
      • How will performance measurements be consolidated across teams and departments to focus on the business goals?
      • Will there be a change to career paths?
      • What will consolidation do to morale, job interest, job opportunities?

      Info-Tech Insight

      Identify SMEs and individuals who are knowledgeable about a particular location, end-user base, technology, or service offering. They may be able to take on a different, greater role due to the reorganization that would make better use of their skills and capabilities and improve morale.

      Brainstorm people requirements for consolidated service desk

      2.1.4 Identify people-related requirements for short and long term

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Whiteboard, sticky notes, markers
      • Vision and goals for the consolidation from step 1.2
      Document

      Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.

      1. Review the questions in the previous section to frame a discussion on people considerations and best practices for the target consolidated service desk.
      2. Use your responses to the questions to brainstorm a list of requirements for the allocation and distribution of resources, including roles, responsibilities, and organizational structure.
      3. When thinking about people, consider requirements for both your staff and your end users.
      4. Write each requirement onto a sticky note and categorize it as one of the following:
        1. Immediate requirement for consolidated service desk
        2. Implement within 6 months
        3. Implement within 1 year

      Example:

      Whiteboard:

      • Immediate
        • Three tier structure with SMEs at Tier 2 and 3
        • All staff working together in one visible location
      • 6 months
        • Roles and responsibilities well defined and documented
        • Appropriate training and certifications available to staff
      • 1 year
        • Agent satisfaction above 80%
        • End-user satisfaction above 75%

      Identify the tools that will support the service desk and those the service desk will support

      One of the biggest technology-related decisions you need to make is whether you need a new ITSM tool. Consider how it will be used by a single service desk to support the entire organization.

      Consider the following technology elements when designing your target state:
      • What tool will be used to support the service desk?
      • What processes or ITIL modules can the tool support?
      • How will reports be produced? What types of reports will be needed for particular audiences?
      • Will a self-service tool be in place for end users to allow for password resets or searches for solutions?
      • Will the tool integrate with tools for change, configuration, problem, and asset management?
      • Will the majority of manual processes be automated?
      Consider the following unique technology considerations for consolidation:
      • Is an existing service management tool extensible?
      • If so, can it integrate with essential non-IT systems?
      • Can the tool support a wider user base?
      • Can the tool support all areas, departments, and technologies it will need to after consolidation?
      • How will data from existing tools be migrated to the new tool?
      • What implementation or configuration needs and costs must be considered?
      • What training will be required for the tool?
      • What other new tools and technologies will be required to support the consolidated service desk?

      Info-Tech Insight

      Talk to staff at each service desk to ask about their tool needs and requirements to support their work. Invite them to demonstrate how they use their tools to learn about customization, configuration, and functionality in place and to help inform requirements. Engaging staff in the process will ensure that the new consolidated tool will be supported and adopted by staff.

      Brainstorm technology requirements for consolidated service desk

      2.1.5 Identify technology-related requirements for short and long term

      Participants
      • CIO
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You’ll Need
      • Whiteboard, sticky notes, markers
      • Vision and goals for the consolidation from step 1.2
      Document

      Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.

      1. Review the questions in the previous section to frame a discussion on technology considerations and best practices for the target consolidated service desk.
      2. Use your responses to the questions to brainstorm a list of requirements for the tools to support the consolidated service desk, along with any other technology requirements for the target state.
      3. Write each requirement onto a sticky note and categorize it as one of the following:
        1. Immediate requirement for consolidated service desk
        2. Implement within 6 months
        3. Implement within 1 year

      Example:

      Whiteboard:

      • Immediate
        • Single ITSM tool
        • Remote desktop support
      • 6 months
        • Self-service portal
        • Regular reports are produced accurately
      • 1 year
        • Mobile portal
        • Chat integration

      Identify specific requirements for a tool if you will be selecting a new ITSM solution

      Service desk software needs to address both business and technological needs. Assess these needs to identify core capabilities required from the solution.

      Features Description
      Modules
      • Do workflows integrate seamlessly between functions such as incident management, change management, asset management, desktop and network management?

      Self-Serve

      • Does the existing tool support self-serve in the form of web forms for incident reporting, forms for service requests, as well as FAQs for self-solve?
      • Is a service catalog available or can one be integrated painlessly?
      Enterprise Service Management Needs
      • Integration of solution to all of IT, Human Resources, Finance, and Facilities for workflows and financial data can yield great benefits but comes at a higher cost and greater complexity. Weigh the costs and benefits.
      Workflow Automation
      • If IT has advanced beyond simple workflows, or if extending these workflows beyond the department, more power may be necessary.
      • Full business process management (BPM) is part of a number of more advanced service desk/service management solutions.
      License Maintenance Costs
      • Are license and maintenance costs still reasonable and appropriate for the value of the tool?
      • Will the vendor renegotiate?
      • Are there better tools out there for the same or better price?
      Configuration Costs
      • Templates, forms, workflows, and reports all take time and skills but bring big benefits. Can these changes be done in-house? How much does it cost to maintain and improve?
      Speed / Performance
      • Data growth and volume may have reached levels beyond the current solution’s ability to cope, despite database tuning.
      Vendor Support
      • Is the vendor still supporting the solution and developing the roadmap? Has it been acquired? Is the level of support still meeting your needs?

      Build a requirements document for the service desk tool

      2.1.6 Create a requirements list and demo script for an ITSM tool (optional)

      Participants
      • CIO/IT Director
      • Service Desk Manager(s)
      • Service Desk Technicians
      What You'll Need
      • Flip charts and markers
      • Templates:
        • IT Service Management Demo Script Template
        • Service Desk Software and RFP Evaluation Tool

      Create a requirements list for the service desk tool.

      1. Break the group into smaller functional groups.
      2. Brainstorm features that would be important to improving efficiencies, services to users, and visibility to data.
      3. Document on flip chart paper, labelling each page with the functional group name.
      4. Prioritize into must-have and nice-to-have items.
      5. Reconvene and discuss each list with the group.
      6. Info-Tech’s Service Desk Software and RFP Evaluation Tool can also be used to document requirements for an RFI.

      Create a demo script:

      Using information from the requirements list, determine which features will be important for the team to see during a demo. Focus on areas where usability is a concern, for example:

      • End-user experience
      • Workflow creation and modification
      • Creating templates
      • Creating service catalog items
      • Knowledgebase

      Evaluate alternative tools, build a shortlist for RFPs, and arrange web demonstrations or evaluation copies

      2.1.7 Identify an alternative tool and build an RFP (optional)

      Participants
      • CIO (optional)
      • Service Desk Manager
      • Service Desk Technician(s)
      • Service Desk Tool Administrator
      What You'll Need
      • Whiteboard or flip chart and markers
      • Service Desk RFP Template

      Evaluate current tool:

      • Investigate to determine if these features are present and just not in use.
      • Contact the vendor if necessary.
      • If enough features are present, determine if additional training is required.
      • If tool is proven to be inadequate, investigate options.

      Consider alternatives:

      Use Info-Tech’s blueprints for further guidance on selecting and implementing an ITSM tool

      1. Select a tool

      Info-Tech regularly evaluates ITSM solution providers and ranks each in terms of functionality and affordability. The results are published in the Enterprise and Mid-Market Service Desk Software Vendor Landscapes.

      2. Implement the tool

      After selecting a solution, follow the Build an ITSM Tool Implementation Plan project to develop an implementation plan to ensure the tool is appropriately designed, installed, and tested and that technicians are sufficiently trained to ensure successful deployment and adoption of the tool.

      Compare your existing service desks with the Consolidate Service Desk Scorecard Tool

      Complete the scorecard tool along with the activities of the next step

      The Consolidate Service Desk Scorecard Tool will allow you to compare metrics and maturity results across your service desks to identify weak and poor performers and processes.

      The purpose of this tool is to organize the data from up to six service desks that are part of a service desk consolidation initiative. Displaying this data in an organized fashion, while offering a robust comparative analysis, should facilitate the process of establishing a new baseline for the consolidated service desk.

      Use the results on tab 4 of the Consolidate Service Desk Assessment Tool. Enter the data from each service desk into tab “2. InfoCards” of the Consolidate Service Desk Scorecard Tool.

      Data from up to six service desks (up to six copies of the assessment tool) can be entered into this tool for comparison.

      Set targets for key metrics to identify high performing service desks

      2.1.8 Use the scorecard tool to set target metrics against which to compare service desks

      Participants
      • CIO or IT Director
      • Service Desk Manager(s)
      What You’ll Need
      • Consolidate Service Desk Scorecard Tool
      1. Review the explanations of the six core metrics identified from the service desk assessment tool. These are detailed on tab 3 of the Consolidate Service Desk Scorecard Tool.
        1. End-user satisfaction
        2. Agent satisfaction
        3. Cost per ticket
        4. Agent utilization rate
        5. First contact resolution rate
        6. First tier resolution rate
      2. For each metric (except agent utilization), define a “worst” and “best” target number. These numbers should be realistic and determined only after some consideration.
      • Service desks scoring at or above the “best” threshold for a particular metric will receive 100% on that metric; while service desks scoring at or below the “worst” threshold for a particular metric will receive 0% on that metric.
      • For agent utilization, only a “best” target number is entered. Service desks hitting this target number exactly will receive 100%, with scores decreasing as a service desk’s agent utilization gets further away from this target.
    • Identify the importance of each metric and vary the values in the “weighting” column accordingly.
    • The values entered on this tab will be used in calculating the overall metric score for each service desk, allowing you to compare the performance of existing service desks against each other and against your target state.

      Review the results of the scorecard to identify best practices

      2.1.9 Discuss the results of the scorecard tool

      Participants
      • CIO or IT Director (optional)
      • Service Desk Manager(s)
      What You'll Need
      • Consolidate Service Desk Scorecard Tool
      1. Facilitate a discussion on the results of the scorecard tool on tabs 4 (Overall Results), 5 (Maturity Results), and 6 (Metrics Results).
      2. Identify the top performing service desks(s) (SD Champions) as identified by the average of their metric and maturity scores.
      3. Identify the top performing service desk by maturity level (tab 5; Level 3 – Integrated or Optimized), paying particular attention to high scorers on process maturity and maturity in incident & service request management.
      4. Identify the top performing service desk by metric score (tab 6), paying particular attention to the metrics that tie into your KPIs.
      5. For those service desks, review their processes and identify what they are doing well to glean best practices.
        1. Incorporate best practices from existing high performing service desks into your target state.
        2. If one service desk is already performing well in all areas, you may choose to model your consolidated service desk after it.

      Document processes and procedures in an SOP

      Define the standard operating procedures for the consolidated service desk

      Develop one set of standard operating procedures to ensure consistent service delivery across locations.

      One set of standard operating procedures for the new service desk is essential for a successful consolidation.

      Info-Tech’s Consolidated Service Desk SOP Template provides a detailed example of documenting procedures for service delivery, roles and responsibilities, escalation and prioritization rules, workflows for incidents and service requests, and resolution targets to help ensure consistent service expectations across locations.

      Use this template as a guide to develop or refine your SOP and define the processes for the consolidated service desk.

      Step 2.2: Assess logistics and cost of consolidation

      Phase 2

      Design consolidation

      2.1 Design target consolidated state

      2.2 Assess logistics and cost

      This step will walk you through the following activities:
      • 2.2.1 Plan logistics for process, technology, and facilities
      • 2.2.2 Plan logistics around resource allocation
      • 2.2.3 Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project
      This step involves the following participants:
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      Step outcomes
      • An understanding and list of tasks to accomplish to ensure all logistical considerations for the consolidation are accounted for
      • An analysis of the impact on staffing and service levels using the Service Desk Efficiency Calculator
      • An assessment of the cost of consolidation and the cost savings of a consolidated service desk using a TCO tool

      The United States Coast Guard’s consolidation saved $20 million in infrastructure and support costs

      CASE STUDY

      Industry: US Coast Guard

      Source: CIO Rear Adm. Robert E. Day, Jr. (retired)

      Challenges

      The US Coast Guard was providing internal IT support for 42,000 members on active duty from 11 distinct regional IT service centers around the US.

      Pain Points

      1. Maintaining 11 disparate IT architectures was costly and time consuming.
      2. Staffing inefficiencies limited the USCG’s global IT service operations to providing IT support from 8am to 4pm.
      3. Individual sites were unable to offload peak volume during heavier call loads to other facilities.
      4. Enforcing adherence to standard delivery processes, procedures, and methods was nearly impossible.
      5. Personnel didn’t have a single point of contact for IT support.
      6. Leadership has limited access to consolidated analytics.

      Outcomes

      • Significant reduction in infrastructure, maintenance, and support costs.
      • Reduced risk through comprehensive disaster recovery.
      • Streamlined processes and procedures improved speed of incident resolution.
      • Increased staffing efficiencies.
      • Deeper analytical insight into service desk performance.

      Admiral Day was the CIO from 2009 to 2014. In 2011, he lead an initiative to consolidate USCG service desks.

      Selecting a new location communicated the national mandate of the consolidated service desk

      Site Selection - Decision Procedures

      • Determine location criteria, including:
        • Access to airports, trains, and highways
        • Workforce availability and education
        • Cost of land, real estate, taxes
        • Building availability Financial incentives
      • Review space requirements (i.e. amount and type of space).
      • Identify potential locations and analyze with defined criteria.
      • Develop cost models for various alternatives.
      • Narrow selection to 2-3 sites. Analyze for fit and costs.
      • Conduct site visits to evaluate each option.
      • Make a choice and arrange for securing the site.
      • Remember to compare the cost to retrofit existing space with the cost of creating a space for the consolidated service desk.

      Key Decision

      Relocating to a new location involved potentially higher implementation costs, which was a significant disadvantage.

      Ultimately, the relocation reinforced the national mandate of the consolidated service desk. The new organization would act as a single point of contact for the support of all 42,000 members of the US Coast Guard.

      "Before our regional desks tended to take on different flavors and processes. Today, users get the same experience whether they’re in Alaska or Maryland by calling one number: (855) CG-FIX IT." – Rear Adm. Robert E. Day, Jr. (retired)

      Plan the logistics of the consolidation to inform the project roadmap and cost assessment

      Before proceeding, validate that the target state is achievable by evaluating the logistics of the consolidation itself.

      A detailed project roadmap will help break down the project into manageable tasks to reach the target state, but there is no value to this if the target state is not achievable or realistic.

      Don’t forget to assess the logistics of the consolidation that can be overlooked during the planning phase:

      • Service desk size
      • Location of the service desk
      • Proximity to company management and facilities
      • Unique applications, platforms, or configurations in each location/region
      • Distribution of end-user population and varying end-user needs
      • Load balancing
      • Call routing across locations
      • Special ergonomic or accessibility requirements by location
      • Language requirements

      Info-Tech Insight

      Language barriers can form significant hurdles or even roadblocks for the consolidation project. Don’t overlook the importance of unique language requirements and ensure the consolidated service desk will be able to support end-user needs.

      Plan logistics for process, technology, and facilities

      2.2.1 Assess logistical and cost considerations around processes, technology, and facilities

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You'll Need
      • Whiteboard or flip chart and markers
      • Consolidate roadmap
      Document

      Identify tasks that should form part of the roadmap and document in the roadmap tool.

      Identify costs that should be included in the TCO assessment and document in the TCO tool.

      Discuss and identify any logistic and cost considerations that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.

      Logistic considerations

      • Impact of ticket intake process changes on end users
      • Process change impact on SLAs and productivity standards
      • Call routing changes and improvements
      • Workstations and workspace – is there enough and what will it look like for each agent?
      • Physical access to the service desk – will walk-ups be permitted? Is it accessible?
      • Security or authorization requirements for specific agents that may be impacted by relocation
      • Layout and design of new location, if applicable
      • Hardware, platform, network, and server implications
      • Licensing and contract limitations of the service desk tool

      Cost considerations

      • Cost savings from ITSM tool consolidation
      • Cost of new ITSM tool purchase, if applicable
      • Efficiencies gained from process simplification
      • New hardware or software purchases
      • Cost per square foot of new physical location, if applicable

      Develop a staffing plan that leverages the strengths you currently have and supplement where your needs require

      Your staff are your greatest assets; be sensitive to their concerns as you plan the consolidation.

      Keep in mind that if your target state involves reorganization of resources and the creation of resources, there will be additional staffing tasks that should form part of the consolidation plan. These include:

      • Develop job descriptions and reporting relationships
      • Evaluate current competencies Identify training and hiring needs
      • Develop migration strategy (including severance and migration packages)

      If new positions will be created, follow these steps to mitigate risks:

      1. Conduct skills assessments (a skills inventory should have been completed in phase 1)
      2. Re-interview existing staff for open positions before considering hiring outside staff
      3. Hire staff from outside if necessary

      For more guidance on hiring help desk staff, see Info-Tech’s blueprint, Manage Help Desk Staffing.

      Be sensitive to employee concerns.

      Develop guiding principles for the consolidation to ensure that employee satisfaction remains a priority throughout the consolidation.

      Examples include:

      1. Reconcile existing silos and avoid creating new silos
      2. Keep current systems where it makes sense to avoid staff having to learn multiple new systems to do their jobs and to reduce costs
      3. Repurpose staff and allocate according to their knowledge and expertise as much as possible
      4. Remain open and transparent about all changes and communicate change regularly

      Info-Tech Insight

      The most talented employees can be lost in the migration to a consolidated service desk, resulting in organizational loss of core knowledge. Mitigate this risk using measurement strategies, competency modeling, and knowledge sharing to reduce ambiguity and discomfort of affected employees.

      Plan logistics around resource allocation

      2.2.2 Assess logistical and cost considerations around people

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You’ll Need
      • Whiteboard or flip chart and markers
      • Consolidate roadmap
      Document

      Identify tasks that should form part of the roadmap and document in the roadmap tool.

      Identify costs that should be included in the TCO assessment and document in the TCO tool.

      Discuss and identify any logistic and cost considerations surrounding resources and staffing that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.

      Logistic considerations

      • Specialized training requirements for staff moving to new roles
      • Enablement of knowledge sharing across agents
      • Potential attrition of staff who do not wish to relocate or be reallocated
      • Relocation of staff – will staff have to move and will there be incentives for moving?
      • Skills requirements, recruitment needs, job descriptions, and postings for hiring

      Cost considerations

      • Existing and future salaries for employees
      • Potential attrition of employees
      • Retention costs and salary increases to keep employees
      • Hiring costs
      • Training needs and costs

      Assess impact on staffing with the Service Desk Efficiency Calculator

      How do organizations calculate the staffing implications of a service desk consolidation?

      The Service Desk Efficiency Calculator uses the ITIL Gross Staffing Model to think through the impact of consolidating service desk processes.

      To estimate the impact of the consolidation on staffing levels, estimate what will happen to three variables:

      • Ticket volume
      • Average call resolution
      • Spare capacity

      All things being equal, a reduction in ticket volume (through outsourcing or the implementation of self-serve options, for example), will reduce your staffing requirements (all things being equal). The same goes for a reduction in the average call resolution rate.

      Constraints:

      Spare capacity: Many organizations are motivated to consolidate service desks by potential reductions in staffing costs. However, this is only true if your service desk agents have spare capacity to take on the consolidated ticket volume. If they don’t, you will still need the same number of agents to do the work at the consolidated service desk.

      Agent capabilities: If your agents have specialised skills that you need to maintain the same level of service, you won’t be able to reduce staffing until agents are cross-trained.

      Review the results of the Service Desk Efficiency Calculator to refine the business case for the consolidation project

      2.2.3 Discuss the results of the efficiency calculator in the context of consolidation

      Participants
      • CIO or IT Director
      • Service Desk Manager(s)
      What You’ll Need
      • Completed Service Desk Efficiency Calculator

      The third tab of the Service Desk Efficiency Calculator will quantify:

      • Service Desk Staffing: The impact of different ticket distribution on service desk staffing levels.
      • Service Desk Ticket Resolution Cost: The impact of different ticket distributions on ticket resolution costs.
      • Service Management Efficiency: The business impact of service management initiatives, specifically, the time lost or captured in service management processes relative to an average full-time employee equivalent.

      Facilitate a discussion around the results.

      Evaluate where you are now and where you hope to be. Focus on the efficiency gains expected from the outsourcing project. Review the expected gains in average resolution time, the expected impact on service desk ticket volume, and the associated productivity gains.

      Use this information to refine the business case and project plan for the consolidation, if needed.

      Assess consolidation costs and cost savings to refine the business case

      While cost savings should not be the primary driver of consolidation, they should be a key outcome of the project in order to deliver value.

      Typical cost savings for a service desk consolidation are highlighted below:

      People 10-20% savings (through resource pooling and reallocation)

      Process 5-10% savings (through process simplification and efficiencies gained)

      Technology 10-15% savings (through improved call routing and ITSM tool consolidation)

      Facilities 5-10% savings (through site selection and redesign)

      Cost savings should be balanced against the costs of the consolidation itself (including hiring for consolidation project managers or consultants, moving expenses, legal fees, etc.)

      Evaluate consolidation costs using the TCO Comparison Tool described in the next section.

      Analyze resourcing and budgeting to create a realistic TCO and evaluate the benefits of consolidation

      Use the TCO tool to assess the cost and cost savings of consolidation

      • The tool compares the cost of operating two service desks vs. one consolidated service desk, along with the cost of consolidation.
      • If your consolidation effort involves more than two facilities, then use multiple copies of the tool.
        • E.g. If you are consolidating four service desks (A, B, C, and D) into one service desk (X), then use two copies of the tool. We encourage you to book an analyst call to help you get the most out of this tool and process.

      Service Desk Consolidation TCO Comparison Tool

      Refine the business case and update the executive presentation

      Check in with executives and project sponsor before moving forward with the transition

      Since completing the executive visioning session in step 1.2, you should have completed the following activities:

      • Current state assessment
      • Detailed target state and metrics
      • Gap analysis between current and target state
      • Assessment of logistics and cost of consolidation

      The next step will be to develop a project roadmap to achieve the consolidation vision.

      Before doing this, check back in with the project sponsor and business executives to refine the business case, obtain necessary approvals, and secure buy-in.

      If necessary, add to the executive presentation you completed in step 1.2, copying results of the deliverables you have completed since:

      • Consolidate Service Desk Assessment Tool (current state assessment)
      • Consolidate Service Desk Scorecard Tool
      • Service Desk Consolidation TCO Comparison Tool

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.3 Brainstorm process requirements for consolidated service desk

      Identify process requirements and desired characteristics for the target consolidated service desk.

      2.1.9 Review the results of the scorecard to identify best practices

      Review the results of the Consolidate Service Desk Scorecard Tool to identify top performing service desks and glean best practices.

      Phase 3

      Plan the Transition

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Plan the transition

      Proposed Time to Completion (in weeks): 2-4

      Step 3.1: Build project roadmap

      Discuss with an analyst:

      • Identify specific initiatives for the consolidation project and evaluate the risks and dependencies for each
      • Plot initiatives on a detailed project roadmap with assigned responsibilities

      Then complete these activities…

      • Break the consolidation project down into specific initiatives
      • Identify and document risks and dependencies
      • Plot your initiatives onto a detailed project roadmap
      • Select transition date for consolidation

      With these tools & templates:

      Service Desk Consolidation Roadmap

      Step 3.2: Communicate the change

      Discuss with an analyst:

      • Identify the goals of communication, then develop a communications plan with targeted messaging for each stakeholder group to achieve those goals
      • Brainstorm potential objections and questions as well as responses to each

      Then complete these activities…

      • Build the communications delivery plan
      • Brainstorm potential objections and questions and prepare responses
      • Complete the news bulletin to distribute to your end users

      With these tools & templates:

      Service Desk Consolidation Communications and Training Plan Template

      Service Desk Consolidation News Bulletin & FAQ Template

      Phase 3 Results:
      • A detailed project roadmap toward consolidation and a communications plan to ensure stakeholders are on board

      Step 3.1: Build the project roadmap

      Phase 3

      Plan the consolidation

      3.1 Build the project roadmap

      3.2 Communicate the change

      This step will walk you through the following activities:
      • 3.1.1 Break the consolidation project down into a series of specific initiatives
      • 3.1.2 Identify and document risks and dependencies
      • 3.1.3 Plot your initiatives onto a detailed project roadmap
      • 3.1.4 Select transition date based on business cycles
      This step involves the following participants:
      • CIO
      • IT Directors
      • Service Desk Managers
      • Consolidation Project Manager
      • Service Desk Technicians
      Step outcomes

      A detailed roadmap to migrate to a single, consolidated service desk, including:

      • A breakdown of specific tasks groups by people, process, and technology
      • Identified risks and dependencies for each task
      • A timeline for completion of each task and the overall consolidation
      • Assigned responsibility for task completion

      Failure to engage stakeholders led to the failure of a large healthcare organization’s consolidation

      CASE STUDY

      Industry: Healthcare

      Source: Organizational insider

      A large US healthcare facilities organization implemented a service desk consolidation initiative in early 2013. Only 18 months later, they reluctantly decided to return to their previous service desk model.

      Why did this consolidation effort fail?

      1. Management failed to communicate the changes to service-level staff, leading to agent confusion and pushback. Initially, each desk became part of the other’s overflow queue with no mention of the consolidation effort. Next, the independent desks began to share a basic request queue. Finally, there was a complete virtual consolidation – which came as a shock to service agents.
      2. The processes and workflows of the original service desks were not integrated, requiring service agents to consult different processes and use different workflows when engaging with end users from different facilities, even though all calls were part of the same queue.
      3. Staff at the different service centers did not have a consistent level of expertise or technical ability, even though they all became part of the same queue. This led to a perceived drop in end-user satisfaction – end users were used to getting a certain level of service and were suddenly confronted with less experienced agents.

      Before Consolidation

      Two disparate service desks:

      • With distinct geographic locations.
      • Servicing several healthcare facilities in their respective regions.
      • With distinct staff, end users, processes, and workflows.

      After Consolidation

      One virtually-consolidated service desk servicing many facilities spread geographically over two distinct locations.

      The main feature of the new virtual service desk was a single, pooled ticket queue drawn from all the end users and facilities in the new geographic regions.

      Break the consolidation project down into a series of specific initiatives

      3.1.1 Create a list of specific tasks that will form the consolidation project

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You’ll Need
      • Whiteboard and markers
      • List of prioritized target state requirements
      • Consolidation roadmap
      Document

      Document the list of initiatives in the Service Desk Consolidation Roadmap.

      In order to translate your newly made decisions regarding the target state and logistical considerations into a successful consolidation strategy, create an exhaustive list of all the steps and sub-steps that will lead you from your current state to your target state.

      Use the next few steps to finish brainstorming the initiative list, identify risks and dependencies, and construct a detailed timeline populated with specific project steps.

      Instructions

      Start with the list you have been curating throughout the current and future state assessments. If you are completing this project as a workshop, add to the initiative list you have been developing on the whiteboard.

      Try to organize your initiatives into groups of related tasks. Begin arranging your initiatives into people, process, technology, or other categories.

      Whiteboard People Process Technology Other

      Evaluate the impact of potential risks and develop a backup plan for high risk initiatives

      A service desk consolidation has a high potential for risks. Have a backup plan prepared for when events don’t go as planned.

      • A consolidation project requires careful planning as it is high risk and not performed often.
      • Apply the same due diligence to the consolidation plan as you do in preparing your disaster recovery plan. Establish predetermined resolutions to realistic risks so that the team can think of solutions quickly during the consolidation.

      Potential Sources of Risk

      • Service desk tool or phone line downtime prevents ability to submit tickets
      • Unable to meet SLAs through the transition
      • Equipment failure or damage through the physical move
      • Lost data through tool migration
      • Lost knowledge from employee attrition
      Risk - degree of impact if activities do not go as planned High

      A – High Risk, Low Frequency

      Tasks that are rarely done and are high risk. Focus attention here with careful planning (e.g. consolidation)

      B – High Risk, High Frequency

      Tasks that are performed regularly and must be watched closely each time (e.g. security authorizations)

      C – Low Risk, Low Frequency

      Tasks that are performed regularly with limited impact or risk (e.g. server upgrades)

      D – Low Risk, High Frequency

      Tasks that are done all the time and are not risky (e.g. password resets)

      Low High
      Frequency - how often the activity has been performed

      Service desk consolidations fit in category A

      Identify risks for people, processes, tools, or data to ensure the project plan will include appropriate mitigations

      Each element of the consolidation has an inherent risk associated with it as the daily service flow is interrupted. Prepare in advance by anticipating these risks.

      The project manager, service desk managers, and subject matter experts (SMEs) of different areas, departments, or locations should identify risks for each of the processes, tools, resource groups (people), and any data exchanges and moves that will be part of the project or impacted by the project.

      Process - For each process, validate that workflows can remain intact throughout the consolidation project. If any gaps may occur in the process flows, develop a plan to be implemented in parallel with the consolidation to ensure service isn’t interrupted.

      Technology - For a tool consolidation, upgrade, or replacement, verify that there is a plan in place to ensure continuation of service delivery processes throughout the change.

      Make a plan for if and how data from the old tool(s) will be migrated to the new tool, and how the new tool will be installed and configured.

      People - For movement of staff, particularly with termination, identify any risks that may occur and involve your HR and legal departments to ensure all movement is compliant with larger processes within the organization.

      Info-Tech Insight

      Don’t overlook the little things. Sometimes the most minor-seeming components of the consolidation can cause the greatest difficulty. For example, don’t assume that the service desk phone number can simply roll over to a new location and support the call load of a combined service desk. Verify it.

      Identify and document risks and dependencies

      3.1.2 Risks, challenges, and dependencies exercise - Estimated Time: 60 minutes

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      • SMEs
      What You'll Need
      • Whiteboard and markers
      • List of initiatives identified in previous activities
      • Consolidation roadmap
      Document

      Use the outcome of this activity to complete your consolidation roadmap.

      Instructions
      • Document risks and challenges, as well as dependencies associated with the initiatives identified earlier, using a different color sticky note from your initiatives.
      • See example below.
      Combine Related Initiatives
      • Look for initiatives that are highly similar, dependent on each other, or occurring at the same time. Consolidate these initiatives into a single initiative with several sub-steps in order to better organize your roadmap and reduce redundancy.
      • Create hierarchies for dependent initiatives that could affect the scheduling of initiatives on a roadmap, and reorganize the whiteboard where necessary.
      Optional:
      • Use a scoring method to categorize risks. E.g.:
        • High: will stop or delay operations, radically increase cost, or significantly reduce consolidation benefits
        • Medium: would cause some delay, cost increase, or performance shortfall, but would not threaten project viability
        • Low: could impact the project to a limited extent, causing minor delays or cost increases
      • Develop contingency plans for high risks or adjust to avoid the problem entirely
      Implement new ISTM tool:
      • Need to transition from existing tools
      • Users must be trained
      • Data and open tickets must be migrated

      Plot your initiatives onto a detailed project roadmap

      3.1.3 Estimated Time: 45 minutes

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      Document

      Document your initiatives on tab 2 of the Service Desk Consolidation Roadmap or map it out on a whiteboard.

      Determine the sequence of initiatives, identify milestones, and assign dates.
      • The purpose of this exercise is to define a timeline and commit to initiatives to reach your goals.
      • Determine the order in which previously identified consolidation initiatives will be implemented, document previously identified risks and dependencies, assign ownership for each task, and assign dates for pilots and launch.

      Select transition date based on business cycles

      3.1.4

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You'll Need
      • Consolidation roadmap
      Document

      Adjust initiatives in the consolidation roadmap if necessary.

      The transition date will be used in communications in the next step.

      1. Review the initiatives in the roadmap and the resulting sunshine diagram on tab 3.
      2. Verify that the initiatives will be possible within the determined time frame and adjust if necessary.
      3. Based on the results of the roadmap, select a target transition date for the consolidation by determining:
        1. Whether there are dates when a major effort of this kind should not be scheduled.
        2. Whether there are merger and acquisition requirements that dictate a specific date for the service desk merger.
      4. Select multiple measurable checkpoints to alert the team that something is awry and mitigate risks.
      5. Verify that stakeholders are aware of the risks and the proposed steps necessary to mitigate them, and assign the necessary resources to them.
      6. Document or adjust the target transition date in the roadmap.

      Info-Tech Insight

      Consolidating service desks doesn’t have to be done in one shot, replacing all your help desks, tools, and moving staff all at the same time. You can take a phased approach to consolidating, moving one location, department, or tool at a time to ease the transition.

      Step 3.2: Communicate the change

      Phase 3

      Design consolidation

      3.1 Build the project roadmap

      3.2 Communicate the change

      This step will walk you through the following activities:
      • 3.2.1 Build the communications delivery plan
      • 3.2.2 Brainstorm potential objections and questions and prepare responses
      This step involves the following participants:
      • IT Director
      • Project Manager
      • Service Desk Manager(s)
      • Service Desk Agents
      Step outcomes
      • A detailed communications plan with key messages, delivery timeline, and spokesperson responsibility for each key stakeholder audience
      • A set of agreed-upon responses to anticipated objections and questions to ensure consistent message delivery
      • A news bulletin and list of FAQs to distribute to end users to prepare them for the change

      Create your communication plan with everyone in mind, from the CIO to end users

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Oxford implemented extremely innovative initiatives as part of its robust communications plan.

      ITS ran a one-day ITSM “business simulation” for the CIO and direct reports, increasing executive buy-in.

      The business simulation was incredibly effective as a way of getting management buy-in – it really showed what we are driving at. It’s a way of making it real, bringing people on board. ” – John Ireland, Director of Customer Service

      Detailed use cases were envisioned referencing particular ITIL processes as the backbone of the process framework.

      The use cases were very helpful, they were used […] in getting a broad engagement from teams across our department and getting buy-in from the distributed IT staff who we work with across the wider University. ” – John Ireland, Director of Customer Service

      The Oxford ITS SDCP blog was accessible to everyone.

      • Oxford’s SDCP blog acted as a project touchstone not only to communicate updates quickly, but also to collect feedback, enable collaboration, and set a project tone.
      • An informal tone and accessible format facilitated the difficult cultural shifts required of the consolidation effort.

      We in the project team would love to hear your view on this project and service management in general, so please feel free to comment on this blog post, contact us using the project email address […] or, for further information visit the project SharePoint site […] ” – Oxford ITS SDCP blog post

      Plan for targeted and timely communications to all stakeholders

      Develop a plan to keep all affected stakeholders informed about the changes consolidation will bring, and more importantly, how they will affect them.

      All stakeholders must be kept informed of the project plan and status as the consolidation progresses.
      • Management requires frequent communication with the core project group to evaluate the success of the project in meeting its goals.
      • End users should be informed about changes that are happening and how these changes will affect them.

      A communications plan should address three elements:

      1. The audience and their communication needs
      2. The most effective means of communicating with this audience
      3. Who should deliver the message

      Goals of communication:

      1. Create awareness and understanding of the consolidation and what it means for each role, department, or user group
      2. Gain commitment to the change from all stakeholders
      3. Reduce and address any concerns about the consolidation and be transparent in responding to any questions
      4. Communicate potential risks and mitigation plan
      5. Set expectations for service levels throughout and after the consolidation

      Plan the method of delivery for your communications carefully

      Plan the message, test it with a small audience, then deliver to your employees and stakeholders in person to avoid message avoidance or confusion.

      Message Format

      Email and Newsletters

      Email and newsletters are convenient and can be transmitted to large audiences easily, but most users are inundated with email already and may not notice or read the message.

      • Use email to make large announcements or invite people to meetings but not as the sole medium of communication.

      Face-to-Face Communication

      Face-to-face communication helps to ensure that users are receiving and understanding a clear message, and allows them to voice their concerns and clarify any confusion or questions.

      • Use one-on-ones for key stakeholders and team meetings for groups.

      Internal Website/Drive

      Internal sites help sustain change by making knowledge available after the consolidation, but won’t be retained beforehand.

      • Use for storing policies, how-to-guides, and SOPs.
      Message Delivery
      1. Plan your message
        1. Emphasize what the audience really needs to know, that is, how the change will impact them.
      2. Test your message
        1. Run focus groups or test your communications with a small audience (2-3 people) first to get feedback and adjust messages before delivering them more broadly.
      3. Deliver and repeat your message
        1. “Tell them what you’re going to tell them, then tell them, then tell them what you told them.”
      4. Gather feedback and evaluate communications
        1. Evaluate the effectiveness of the communications (through surveys, focus groups, stakeholder interviews, or metrics) to ensure the message was delivered and received successfully and communication goals were met.

      Address the specific concerns of the business vs. employees

      Focus on alleviating concerns from both sides of the communication equation: the business units and employees.

      Business units:

      Be attentive to the concerns of business unit management about loss of power. Appease worries about the potential risk of reduced service quality and support responsiveness that may have been experienced in prior corporate consolidation efforts.

      Make the value of the consolidation clear, and involve business unit management in the organizational change process.

      Focus on producing a customer-focused consolidated service desk. It will assuage fears over the loss of control and influence. Business units may be relinquishing control of their service desk, but they should retain the same level of influence.

      Employees:

      Employees are often fearful of the impact of a consolidation on their jobs. These fears should be addressed and alleviated as soon as possible.

      Design a communication plan outlining the changes and the reasons motivating it.

      Put support programs in place for displaced and surviving employees.

      Motivate employees during the transition and increase employee involvement in the change.

      Educate and train employees who make the transition to the new structure and new job demands.

      Info-Tech Insight

      Know your audience. Be wary of using technical jargon or acronyms that may seem like common knowledge within your department but would not be part of the vocabulary of non-technical audiences. Ensure your communications are suitable for the audience. If you need to use jargon or acronyms, explain what you mean.

      Build the communications delivery plan

      3.2.1 Develop a plan to deliver targeted messages to key stakeholder groups

      Participants
      • CIO or IT Director
      • Project Manager
      • Service Desk Manager(s)
      What You'll Need
      • Communications plan template
      • Whiteboard and markers
      Document

      Document your decisions in the communications plan template

      1. Define the goals of the communications in section 1 of the Service Desk Consolidation Communications and Training Plan Template.
      2. Determine when communication milestones/activities need to be delivered by completing the Communications Schedule in section 2.
      3. Determine the key stakeholder groups or audiences to whom you will need to deliver communications.
      4. Identify the content of the key messages that need to be delivered and select the most appropriate delivery method for each (i.e. email, team meeting, individual meetings). Designate who will be responsible for delivering the messages.
      5. Document a plan for gathering feedback and evaluating the effectiveness of the communications in section 5 (i.e. stakeholder interviews and surveys).

      Section 4 of the communications plan on objections and question handling will be completed in activity 3.2.2.

      Optional Activity

      If you completed the Stakeholder Engagement Workbook in step 1.1, you may also complete the Communications tab in that workbook to further develop your plan to engage stakeholders.

      Effectively manage the consolidation by implementing change management processes

      Implement change management processes to ensure that the consolidation runs smoothly with limited impact on IT infrastructure.

      Communicate and track changes: Identify and communicate changes to all stakeholders affected by the change to ensure they are aware of any downtime and can plan their own activities accordingly.

      Isolate testing: Test changes within a safe non-production environment to eliminate the risk of system outages that result from defects discovered during testing.

      Document back-out plans: Documented back-out/backup plans enable quick recovery in the event that the change fails.

      The image is a horizontal bar graph, titled Unplanned downtime due to change versus change management maturity. The graph shows that for a Change Management Maturity that is Informal, the % Experiencing Unplanned Downtime due to Failed Change is 41%; for Defined, it is 25%; and for Optimized, it is 19%.

      Organizations that have more mature and defined change management processes experience less unplanned downtime when implementing change across the organization.

      Sustain changes by adapting people, processes, and technologies to accept the transition

      Verify that people, process, and technologies are prepared for the consolidation before going live with the transition.

      What?

      1. Adapt people to the change

      • Add/change roles and responsibilities.
      • Move people to different roles/teams.
      • Change compensation and incentive structures to reinforce new goals, if applicable.

      2. Adapt processes to the change

      • Add/change supporting processes.
      • Eliminate or consolidate legacy processes.
      • Add/change standard operating procedures.

      3. Adapt technologies to the change

      • Add/change/update supporting technologies.
      • Eliminate or consolidate legacy technologies
      How? Work with HR on any changes involving job design, personnel changes, or compensation. Work with enterprise architects or business analysts to manage significant changes to processes that may impact the business and service levels.

      See Info-Tech’s Optimize the Change Management Processblueprint to use a disciplined change control process for technology changes.

      Info-Tech Insight

      Organizational change management (OCM) is widely recognized as a key component of project success, yet many organizations struggle to get adoption for new tools, policies, and procedures. Use Info-Tech’s blueprint on driving organizational change to develop a strategy and toolkit to achieve project success.

      Manage people by addressing their specific concerns based on their attitude toward change

      Avoid high turnover and resistance to change by engaging both the enthusiasts and the skeptics with targeted messaging.

      • Clearly articulate and strongly champion the changes that will result from the consolidation for those willing to adapt to the change.
      • Make change management practices integral to the entire project.
      • Provide training workshops on new processes, new goals or metrics, new technologies and tools, and teamwork as early as possible after consolidation.
      1. Enthusiasts - Empower them to stay motivated and promote the change
      2. Fence-Sitters/Indifferent - Continually motivate them by example but give them time to adapt to the change
      3. Skeptics - Engage them early and address their concerns and doubts to convert them to enthusiasts
      4. Saboteurs - Prevent them from spreading dissent and rumors, thus undermining the project, by counteracting negative claims early

      Leverage the Stakeholder Engagement Workbook from step 1.1 as well as Info-Tech’s blueprint on driving organizational change for more tactics on change management, particularly managing and engaging various personas.

      Prepare ahead of time for questions that various stakeholder groups may have

      Anticipate questions that will arise about the consolidation so you can prepare and distribute responses to frequently asked questions. Sample questions from various stakeholders are provided below.

      General
      1. Why is the organization moving to a consolidated service desk?
      2. Where is the consolidated service desk going to be located?
      3. Are all or only some service desks consolidating?
      4. When is the consolidation happening?
      5. What are the anticipated benefits of consolidation?

      Business

      1. What is the budget for the project?
      2. What are the anticipated cost savings and return on investment?
      3. When will the proposed savings be realized?
      4. Will there be job losses from the consolidation and when will these occur?
      5. Will the organization subsidize moving costs?

      Employees

      1. Will my job function be changing?
      2. Will my job location be changing?
      3. What will happen if I can’t relocate?
      4. Will my pay and benefits be the same?
      5. Will reporting relationships change?
      6. Will performance expectations and metrics change?

      End Users

      1. How do I get help with IT issues?
      2. How do I submit a ticket?
      3. How will I be notified of ticket status, outages?
      4. Where will the physical service desk be located?
      5. Will I be able to get help in my language?
      6. Will there be changes for levels of service?

      Brainstorm likely objections/questions to prepare responses

      3.2.2 Prepare responses to likely questions to ensure consistent messaging

      Participants
      • IT Director
      • Project Manager
      • Service Desk Manager(s)
      • Service Desk Agents
      Document

      Document your questions and responses in section 4 of the communications plan template. This should be continually updated.

      1. Brainstorm anticipated objections and questions you may hear from various stakeholder groups: service desk employees, end users, and management or executives.
      2. For each objection or question, prepare a response that will be delivered to ensure consistent messaging. Use a table like the example below.
      Group Objection/Question Response
      Service desk staff I’m comfortable with the service desk tool we’ve been using here and won’t know how to use the new one. We carefully evaluated the new solution against our requirements and selected it as the one that will provide the best service to our users and be user friendly. We tested the solution through user-acceptance testing to ensure staff will be comfortable using it, and we will provide comprehensive training to all users of the tool before launching it.
      End user I’m used to going to my favorite technician for help. How will I get service now? We are initiating a single point of contact so that you will know exactly where to go to get help quickly and easily, so that we can more quickly escalate your issue to the appropriate technician, and so that we can resolve it and notify you as soon as possible. This will make our service more effective and efficient than you having to find one individual who may be tied up with other work or unavailable.

      Keep the following in mind when formulating your responses:

      • Lead with the benefits
      • Be transparent and honest
      • Avoid acronyms, jargon, and technical terms
      • Appeal to both emotion and reason
      • Be concise and straightforward
      • Don’t be afraid to be repetitive; people need repetition to remember the message
      • Use concrete facts and images wherever possible

      Complete the Service Desk Consolidation News Bulletin & FAQ Template to distribute to your end users

      Customize the template or use as a guide to develop your own

      The Service Desk Consolidation News Bulletin & FAQ Template is intended to be an example that you can follow or modify for your own organization. It provides a summary of how the consolidation project will change how end users interact with the service desk.

      1. What the change means to end users
      2. When they should contact the service desk (examples)
      3. How to contact the service desk (include all means of contact and ticket submission)
      4. Answers to questions they may have
      5. Links to more information

      The bulletin is targeted for mass distribution to end users. A similar letter may be developed for service desk staff, though face-to-face communication is recommended.

      Instructions:

      1. Use the template as a guide to develop your own FAQ news bulletin and adjust any sections or wording as you see fit.
      2. You may wish to develop separate letters for each location, referring more specifically to their location and where the new service desk will be located.
      3. Save the file as a PDF for print or email distribution at the time determined in your communications plan.

      Keeping people a priority throughout the project ensured success

      CASE STUDY

      Industry: Higher Education

      Source: Oxford University, IT Services

      Oxford’s new consolidated service desk went live April 20, 2015.

      They moved from 3 distinct tools and 5 disparate help desks to a single service desk with one robust ITSM solution, all grounded by a unified set of processes and an integrated workflow.

      The success of this project hinged upon:

      • A bold vision, formulated early and in collaboration with all stakeholders.
      • Willingness to take time to understand the unique perspective of each role and help desk, then carefully studying existing processes and workflows to build upon what works.
      • Constant collaboration, communication, and the desire to listen to feedback from all interested parties.

      "We have had a few teething issues to deal with, but overall this has been a very smooth transition given the scale of it." – ICTF Trinity Term 2015 IT Services Report

      Beyond the initial consolidation.
      • Over the summer of 2015, ITS moved to full 24/7 support coverage.
      • Oxford’s ongoing proposition with regard to support services is to extend the new consolidated service desk beyond its current IT role:
        • Academic Admissions
        • Case Management
        • IT Purchasing
      • To gradually integrate those IT departments/colleges/faculties that remain independent at the present time.
      • Info-Tech can facilitate these goals in your organization with our research blueprint, Extend the Service Desk to Enterprise.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1 Break the consolidation project down into a series of specific initiatives

      Create a list of specific tasks that will form the consolidation project on sticky notes and organize into people, process, technology, and other categories to inform the roadmap.

      3.2.2 Brainstorm likely objections/questions to prepare responses

      Brainstorm anticipated questions and objections that will arise from various stakeholder groups and prepare consistent responses to each.

      Related Info-Tech research

      Standardize the Service Desk - Provide timely and effective responses to user requests and resolutions of all incidents.

      Extend the Service Desk to the Enterprise - Position IT as an innovator.

      Build a Continual Improvement Plan for the Service Desk - Teach your old service desk new tricks.

      Adopt Lean IT to Streamline the Service Desk - Turn your service desk into a Lean, keen, value-creating machine.

      Vendor Landscape: Enterprise Service Desk Software - Move past tickets to proactive, integrated service.

      Vendor Landscape: Mid-Market Service Desk Software - Ensure the productivity of the help desk with the right platform.

      Build an ITSM Tool Implementation Plan - Nail your ITSM tool implementation from the outset.

      Drive Organizational Change from the PMO - Don’t let bad change happen to good projects.

      Research contributors and experts

      Stacey Keener - IT Manager for the Human Health and Performance Directorate, Johnson Space Center, NASA

      Umar Reed - Director of IT Support Services US Denton US LLP

      Maurice Pryce - IT Manager City of Roswell, Georgia

      Ian Goodhart - Senior Business Analyst Allegis Group

      Gerry Veugelaers - Service Delivery Manager New Zealand Defence Force

      Alisa Salley Rogers - Senior Service Desk Analyst HCA IT&S Central/West Texas Division

      Eddie Vidal - IS Service Desk Managers University of Miami

      John Conklin - Chief Information Officer Helen of Troy LP

      Russ Coles - Senior Manager, Computer Applications York Region District Schoolboard

      John Seddon - Principal Vanguard Consulting

      Ryan van Biljon - Director, Technical Services Samanage

      Rear Admiral Robert E. Day Jr. (ret.) - Chief Information Officer United States Coast Guard

      George Bartha - Manager of Information Technology Unifrax

      Peter Hubbard - IT Service Management Consultant Pink Elephant

      Andre Gaudreau - Manager of School Technology Operations York Region District School Board

      Craig Nekola - Manager, Information Technology Anoka County

      Bibliography and Further Reading

      Hoen, Jim. “The Single Point of Contact: Driving Support Process Improvements with a Consolidated IT Help-Desk Approach.” TechTeam Global Inc. September 2005.

      Hubbard, Peter. “Leading University embarks on IT transformation programme to deliver improved levels of service excellence.” Pink Elephant. http://pinkelephant.co.uk/about/case-studies/service-management-case-study/

      IBM Global Services. “Service Desk: Consolidation, Relocation, Status Quo.” IBM. June 2005.

      Keener, Stacey. “Help Desks: a Problem of Astronomical Proportions.” Government CIO Magazine. 1 February 2015.

      McKaughan, Jeff. “Efficiency Driver.” U.S. Coast Guard Forum Jul. 2013. Web. http://www.intergraphgovsolutions.com/documents/CoastGuardForumJuly2013.pdf

      Numara Footprints. “The Top 10 Reasons for Implementing a Consolidated Service Desk.” Numara Software.

      Roy, Gerry, and Frederieke Winkler Prins. “How to Improve Service Quality through Service Desk Consolidation.” BMC Software.

      Smith, Andrew. “The Consolidated Service Desk – An Achievable Goal?” The Service Desk Institute.

      Wolfe, Brandon. “Is it Time for IT Service Desk Consolidation?” Samanage. 4 August 2015.

      Build Your BizDevOps Playbook

      • Buy Link or Shortcode: {j2store}177|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Today’s rapidly scaling and increasingly complex products create mounting pressure on delivery teams to release new features and changes quickly and with sufficient quality.
      • Many organizations see BizDevOps as a solution to help meet this demand. However, they often lack the critical cross-functional collaboration and team-sport culture that are critical for success.
      • The industry provides little consensus and guidance on how to prepare for the transition to BizDevOps.

      Our Advice

      Critical Insight

      • BizDevOps is cultural, not driven by tools. It is about delivering high-quality and valuable releases to stakeholders through collective ownership, continuous collaboration, and team-first behaviors supported by tools.
      • BizDevOps begins with a strong foundation in five key areas. The crux of successful BizDevOps is centered on the strategic adoption and optimization of building great requirements, collaborative practices, iterative delivery, application management, and high-fidelity environments.
      • Teams take STOCK of what it takes to collaborate effectively. Teams and stakeholders must show up, trust the delivery method and people, orchestrate facilitated activities, clearly communicate and knowledge share every time they collaborate.

      Impact and Result

      • Bring the right people to the table. BizDevOps brings significant organizational, process and technology changes to improve delivery effectiveness. Include the key roles in the definition and validation of your BizDevOps vision and practices.
      • Focus on the areas that matter. Review your current circumstances and incorporate the right practices that addresses your key challenges and blockers to becoming BizDevOps.
      • Build your BizDevOps playbook. Gain a broad understanding of the key plays and practices that makes a successful BizDevOps organization. Verify and validate these practices in order to tailor them to your context. Keep your playbook live.

      Build Your BizDevOps Playbook Research & Tools

      Start here – read the Executive Brief

      Find out why you should implement BizDevOps, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Get started with BizDevOps

      Set the right expectations with your stakeholders and define the context of your BizDevOps implementation.

      • Build Your BizDevOps Playbook – Phase 1: Get Started With BizDevOps
      • BizDevOps Playbook

      2. Tailor your BizDevOps playbook

      Tailor the plays in your BizDevOps playbook to your circumstances and vision.

      • Build Your BizDevOps Playbook – Phase 2: Tailor Your BizDevOps Playbook
      [infographic]

      Workshop: Build Your BizDevOps Playbook

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Set Your Expectations

      The Purpose

      Discuss the goals of your BizDevOps playbook.

      Identify the various perspectives who should be included in the BizDevOps discussion.

      Level set expectations of your BizDevOps implementation.

      Key Benefits Achieved

      Identification of the key roles who should be included in the BizDevOps discussion.

      Learning of key practices to support your BizDevOps vision and goals.

      Your vision of BizDevOps in your organization.

      Activities

      1.1 Define BizDevOps.

      1.2 Understand your key stakeholders.

      1.3 Define your objectives.

      Outputs

      Your BizDevOps definition

      List of BizDevOps stakeholders

      BizDevOps vision and objectives

      2 Set the Context

      The Purpose

      Understand the various methods to initiate the structuring of facilitated collaboration.

      Share a common way of thinking and behaving with a set of principles.

      Focus BizDevOps adoption on key areas of software product delivery.

      Key Benefits Achieved

      A chosen collaboration method (Scrum, Kanban, Scrumban) to facilitate collaboration

      A mutually understanding and beneficial set of guiding principles

      Areas where BizDevOps will see the most benefit

      Activities

      2.1 Select your foundation method.

      2.2 Define your guiding principles.

      2.3 Focus on the areas that matter.

      Outputs

      Chosen collaboration model

      List of guiding principles

      High-level assessment of delivery practices and its fit for BizDevOps

      3 Tailor Your BizDevOps Playbook

      The Purpose

      Review the good practices within Info-Tech’s BizDevOps Playbook.

      Tailor your playbook to reflect your circumstances.

      Key Benefits Achieved

      Understanding of the key plays involved in product delivery

      Product delivery plays that reflect the challenges and opportunities of your organization and support your BizDevOps vision

      Activities

      3.1 Review and tailor the plays in your playbook

      Outputs

      High-level discussion of key product delivery plays and its optimization to support BizDevOps

      Data Quality

      • Buy Link or Shortcode: {j2store}19|cart{/j2store}
      • Related Products: {j2store}19|crosssells{/j2store}
      • Teaser Video: Visit Website
      • Teaser Video Title: Big data after pandemic
      • member rating overall impact: 8.3/10
      • member rating average dollars saved: $5,100
      • member rating average days saved: 8
      • Parent Category Name: Data and Business Intelligence
      • Parent Category Link: /data-and-business-intelligence
      Restore trust in your data by aligning your data management approach to the business strategy

      Craft a Customer-Driven Market Strategy With Unbiased Data

      • Buy Link or Shortcode: {j2store}611|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation
      • Market strategies are informed by gut feel and endless brainstorming instead of market data to take their product from concept to customer.
      • Hiring independent market research firms results in a lack of unbiased third-party data. Research firms tell vendors what they want to hear instead of offering an agnostic view of software trends.
      • Dissatisfied customers don’t tell you directly why they are leaving, so there is no feedback loop back into product improvements.
      • Often a market strategy is built after a product is developed to force the product’s fit in the market. The product marketing team has no say in the product vision or future improvements.

      Our Advice

      Critical Insight

      • Adopt the 5 P’s to building a winning market strategy: Proposition, Product, Pricing, Placement, and Promotion.
      • You can’t be everything to everyone. Testing your proposition in the market to see what sticks is a risky move. Promise future value using past successes by gaining a deeper understanding of which customers and submarkets truly align to your product.
      • Customers have learned to avoid shiny new objects but still expect rapid feature releases. Differentiating features require a closer look at the underpinning vendor capabilities. Having intentional feature releases requires a feedback loop into the product roadmap and increases influence by the product marketing team.
      • Price transparency and sensitivity should drive what you offer to customers. Negotiating solely on price is a race to the bottom.

      Impact and Result

      • Leverage this report to gain insights on the software selection process and what top vendors do best.
      • Gain a bird’s-eye view on customer purchasing behavior using over 40,000 data points on satisfaction and importance collected directly from the source.
      • Build a winning market strategy influenced by real customer data that drives vendor success.

      Craft a Customer-Driven Market Strategy With Unbiased Data Research & Tools

      Read the storyboard

      Read our storyboard to find out why you should leverage SoftwareReviews data to craft your market strategy, review Info-Tech’s methodology, and understand unbiased customer data on software purchasing triggers.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Craft a Customer-Driven Market Strategy With Unbiased Data Storyboard
      [infographic]

      Improve Security Governance With a Security Steering Committee

      • Buy Link or Shortcode: {j2store}373|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Security is still seen as an IT problem rather than a business risk, resulting in security governance being relegated to the existing IT steering committee.
      • Security is also often positioned in the organization where they are not privy to the details of the organization’s overall strategy. Security leaders struggle to get the full enterprise picture.

      Our Advice

      Critical Insight

      • Work to separate the Information Security Steering Committee (ISSC) from the IT Steering Committee (ITSC). Security transcends the boundaries of IT and needs an independent, eclectic approach to make strategic decisions.
      • Be the lawyer, not the cop. Ground your communications in business terminology to facilitate a solution that makes sense to the entire organization.
      • Develop and stick to the agenda. Continued engagement from business stakeholders requires sticking to a strategic level-focused agenda. Dilution of purpose will lead to dilution in attendance.

      Impact and Result

      • Define a clear scope of purpose and responsibilities for the ISSC to gain buy-in and consensus for security governance receiving independent agenda time from the broader IT organization.
      • Model the information flows necessary to provide the steering committee with the intelligence to make strategic decisions for the enterprise.
      • Determine membership and responsibilities that shift with the evolving security landscape to ensure participation reflects interested parties and that money being spent on security mitigates risk across the enterprise.
      • Create clear presentation material and strategically oriented meeting agendas to drive continued participation from business stakeholders and executive management.

      Improve Security Governance With a Security Steering Committee Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to improve your security governance with a security steering committee, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define committee purpose and responsibilities

      Identify the purpose of your committee, determine the capabilities of the committee, and define roles and responsibilities.

      • Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities
      • Information Security Steering Committee Charter

      2. Determine information flows, membership & accountabilities

      Determine how information will flow and the process behind that.

      • Improve Security Governance With a Security Steering Committee – Phase 2: Determine Information Flows, Membership & Accountabilities

      3. Operate the Information Security Steering Committee

      Define your meeting agendas and the procedures to support those meetings. Hold your kick-off meeting. Identify metrics to measure the committee’s success.

      • Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee
      • Security Metrics Summary Document
      • Information Security Steering Committee Stakeholder Presentation
      [infographic]

      Further reading

      Improve Security Governance With a Security Steering Committee

      Build an inclusive committee to enable holistic strategic decision making.

      ANALYST PERSPECTIVE

      "Having your security organization’s steering committee subsumed under the IT steering committee is an anachronistic framework for today’s security challenges. Conflicts in perspective and interest prevent holistic solutions from being reached while the two permanently share a center stage.

      At the end of the day, security is about existential risks to the business, not just information technology risk. This focus requires its own set of business considerations, information requirements, and delegated authorities. Without an objective and independent security governance body, organizations are doomed to miss the enterprise-wide nature of their security problems."

      – Daniel Black, Research Manager, Security Practice, Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs
      • CISOs
      • IT/Security Leaders

      This Research Will Help You:

      • Develop an effective information security steering committee (ISSC) that ensures the right people are involved in critical decision making.
      • Ensure that business and IT strategic direction are incorporated into security decisions.

      This Research Will Also Assist:

      • Information Security Steering Committee (ISSC) members

      This Research Will Help Them:

      • Formalize roles and responsibilities.
      • Define effective security metrics.
      • Develop a communication plan to engage executive management in the organization’s security planning.

      Executive summary

      Situation

      • Successful information security governance requires a venue to address security concerns with participation from across the entire business.
      • Without access to requisite details of the organization – where we are going, what we are trying to do, how the business expects to use its technology – security can not govern its strategic direction.

      Complication

      • Security is still seen as an IT problem rather than a business risk, resulting in security governance being relegated to the existing IT steering committee.
      • Security is also often positioned in the organization where they are not privy to the details of the organization’s overall strategy. Security leaders struggle to get the full enterprise picture.

      Resolution

      • Define a clear scope of purpose and responsibilities for the Information Security Steering Committee to gain buy-in and consensus for security governance receiving independent agenda time from the broader IT organization.
      • Model the information flows necessary to provide the steering committee with the intelligence to make strategic decisions for the enterprise.
      • Determine membership and responsibilities that shift with the evolving security landscape to ensure participation reflects interested parties and that money being spent on security mitigates risk across the enterprise.
      • Create security metrics that are aligned with committee members’ operational goals to incentivize participation.
      • Create clear presentation material and strategically oriented meeting agendas to drive continued participation from business stakeholders and executive management.

      Info-Tech Insight

      1. Work to separate the ISSC from the IT Steering Committee (ITSC). Security transcends the boundaries of IT and needs an independent, eclectic approach to make strategic decisions.
      2. Be the lawyer, not the cop. Ground your communications in business terminology to facilitate a solution that make sense to the entire organization.
      3. Develop and stick to the agenda. Continued engagement from business stakeholders requires sticking to a strategic level-focused agenda. Dilution of purpose will lead to dilution in attendance.

      Empower your security team to act strategically with an ISSC

      Establishing an Information Security Steering Committee (ISSC)

      Even though security is a vital consideration of any IT governance program, information security has increasingly become an important component of the business, moving beyond the boundaries of just the IT department.

      This requires security to have its own form of steering, beyond the existing IT Steering Committee, that ensures continual alignment of the organization’s security strategy with both IT and business strategy.

      An ISSC should have three primary objectives:

      • Direct Strategic Planning The ISSC formalizes organizational commitments to strategic planning, bringing visibility to key issues and facilitating the integration of security controls that align with IT and business strategy.
      • Institute Clear Accountability The ISSC facilitates the involvement and commitment of executive management through clearly defined roles and accountabilities for security decisions, ensuring consistency in participation as the organization’s strategies evolve.
      • Optimize Security Resourcing The ISSC maximizes security by monitoring the implementation of the security strategic plan, making recommendations on prioritization of effort, and securing necessary resources through the planning and budgeting processes, as necessary.

      What does the typical ISSC do?

      Ensuring proper governance over your security program is a complex task that requires ongoing care and feeding from executive management to succeed.

      Your ISSC should aim to provide the following core governance functions for your security program:

      1. Define Clarity of Intent and Direction How does the organization’s security strategy support the attainment of the business and IT strategies? The ISSC should clearly define and communicate strategic linkage and provide direction for aligning security initiatives with desired outcomes.
      2. Establish Clear Lines of Authority Security programs contain many important elements that need to be coordinated. There needs to be clear and unambiguous authority, accountability, and responsibility defined for each element so lines of reporting/escalation are clear and conflicting objectives can be mediated.
      3. Provide Unbiased Oversight The ISSC should vet the organization’s systematic monitoring processes to make certain there is adherence to defined risk tolerance levels and ensure that monitoring is appropriately independent from the personnel responsible for implementing and managing the security program.
      4. Optimize Security Value Delivery Optimized value delivery occurs when strategic objectives for security are achieved and the organization’s acceptable risk posture is attained at the lowest possible cost. This requires constant attention to ensure controls are commensurate with any changes in risk level or appetite.

      Formalize the most important governance functions for your organization

      Creation of an ISSC is deemed the most important governance and oversight practice that a CISO can implement, based on polling of IT security leaders analyzing the evolving role of the CISO.

      Relatedly, other key governance practices reported – status updates, upstream communications, and executive-level sponsorship – are within the scope of what organizations traditionally formalize when establishing their ISSC.

      Vertical bar chart highlighting the most important governance functions according to respondents. The y axis is labelled 'Percentage of Respondents' with the values 0%-60%, and the x axis is labelled 'Governance and Oversight Practices'. Bars are organized from highest percentage to lowest with 'Creation of cross-functional committee to oversee security strategy' at 56%, 'Regularly scheduled reporting on the state of security to stakeholders' at 55%, 'Upstream communication channel from security leadership to CEO' at 46%, and 'Creation of program charter approved by executive-level sponsor' at 37%. Source: Ponemon Institute, 2017; N=184 organizations; 660 respondents.

      Despite the clear benefits of an ISSC, organizations are still falling short

      83% of organizations have not established formal steering committees to evaluate the business impact and risks associated with security decisions. (Source: 2017 State of Cybersecurity Metrics Report)

      70% of organizations have delegated cybersecurity oversight to other existing committees, providing security limited agenda time. (Source: PwC 2017 Annual Corporate Director Survey)

      "This is a group of risk managers an institution would bring together to deal with a response anyway. Having them in place to do preventive discussions and formulate policy to mitigate the liability sets and understand compliance obligations is just powerful." (Kirk Bailey, CISO, University of Washington)

      Prevent the missteps that make 9 out of 10 steering committees unsuccessful

      Why Do Steering Committees Fail?

      1. A lack of appetite for a steering committee from business partners. An effective ISSC requires participation from core members of the organization’s leadership team. The challenge is that most business partners don’t understand the benefits of an ISSC and the responsibilities aren’t tailored to participants’ needs or interests. It’s the CISO’s (or senior IT/security leader’s) responsibility to make this case to stakeholders and right-size the committee responsibilities and membership.
      2. ISSC committees are given inappropriate responsibilities. The steering committee is fundamentally about decision making; it’s not a working committee. Security leadership typically struggles with clarifying these responsibilities on two fronts: either the responsibilities are too vague and there is no clear way to execute on them within a meeting or responsibilities are too tactical and require knowledge that participants do not have. Responsibilities should determine who is on the ISSC, not the other way around.
      3. Lack of process around execution. An ISSC is only valuable if members are able to successfully execute on its mandate. Without well-defined processes it becomes nearly impossible for the ISSC to be actionable. As a result, participants lack the information they need to make critical decisions, agendas are unmet, and meetings are seen as a waste of time.

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Improve Security Governance With a Security Steering Committee – project overview

      1. Define Committee Purpose and Responsibilities

      2. Determine Information Flows, Membership & Accountabilities

      3. Operate the Information Security Steering Committee

      Supporting Tool icon

      Best-Practice Toolkit

      1.1 Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC

      1.2 Conduct a SWOT analysis of your information security governance capabilities

      1.3 Identify the responsibilities and duties of the ISSC

      1.4 Draft the committee purpose statement of your ISSC

      2.1 Define your SIPOC model for each of the ISSC responsibilities

      2.2 Identify committee participants and responsibility cadence

      2.3 Define ISSC participant RACI for each of the responsibilities

      3.1 Define the ISSC meeting agendas and procedures

      3.2 Define which metrics you will report to the ISSC

      3.3 Hold a kick-off meeting with your ISSC members to explain the process, responsibilities, and goals

      3.4 Tailor the Information Security Steering Committee Stakeholder Presentation template

      3.5 Present the information to the security leadership team

      3.6 Schedule your first meeting of the ISSC

      Guided Implementations

      • Identify the responsibilities and duties of the ISSC.
      • Draft the committee purpose of the ISSC.
      • Determine SIPOC modeling of information flows.
      • Determine accountabilities and responsibilities.
      • Set operational standards.
      • Determine effectiveness metrics.
      • Steering committee best practices.
      Associated Activity icon

      Onsite Workshop

      This blueprint can be combined with other content for onsite engagements, but is not a standalone workshop.
      Phase 1 Outcome:
      • Determine the purpose and responsibilities of your information security steering committee.
      Phase 2 Outcome:
      • Determine membership, accountabilities, and information flows to enable operational excellence.
      Phase 3 Outcome:
      • Define agendas and standard procedures to operate your committee.
      • Design an impactful stakeholder presentation.

      Improve Security Governance With a Security Steering Committee

      PHASE 1

      Define Committee Purpose and Responsibilities

      Phase 1: Define Committee Purpose and Responsibilities

      ACTIVITIES:

      • 1.1 Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC
      • 1.2 Conduct a SWOT analysis of your information security governance capabilities
      • 1.3 Identify the responsibilities and duties of the ISSC
      • 1.4 Draft the committee purpose statement for your ISSC

      OUTCOMES:

      • Conduct an analysis of your current information security governance capabilities and identify opportunities and weaknesses.
      • Define a clear scope of purpose and responsibilities for your ISSC.
      • Begin to customize your ISSC charter.

      Info-Tech Insight

      Balance vision with direction. Purpose and responsibilities should be defined so that they encompass your mission and objectives to the enterprise in clear terms, but provide enough detail that you can translate the charter into operational plans for the security team.

      Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC

      Supporting Tool icon 1.1

      A charter is the organizational mandate that outlines the purpose, scope, and authority of the ISSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.

      Start by reviewing Info-Tech’s template. Throughout the next two sections we will help you to tailor its contents.

      • Committee Purpose: The rationale, benefits of, and overall function of the committee.
      • Organization and Membership: Who is on the committee and how is participation measured against organizational need.
      • Responsibilities and Duties: What tasks/decisions the accountable committee is making.
      • RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.
      • Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with interested parties.
      Sample of the Info-Tech deliverable 'Information Security Steering Committee Charter Template'.

      Download the Information Security Steering Committee Charter to customize your organization’s charter

      Conduct a SWOT analysis of your information security governance capabilities

      Associated Activity icon 1.2

      INPUT: Survey outcomes, Governance overview handouts

      OUTPUT: SWOT analysis, Top identified challenges and opportunities

      1. Hold a meeting with your IT leadership team to conduct a SWOT analysis on your current information security governance capabilities.
      2. In small groups, or individually, have each group complete a SWOT analysis for one of the governance areas. For each consider:
        • Strengths: What is currently working well in this area?
        • Weaknesses: What could you improve? What are some of the challenges you’re experiencing?
        • Opportunities: What are some organizational trends that you can leverage? Consider whether your strengths or weaknesses could create opportunities.
        • Threats: What are some key obstacles across people, process, and technology?
      3. Have each team or individual rotate until each person has contributed to each SWOT. Add comments from the stakeholder survey to the SWOT.
      4. As a group, rank the inputs from each group and highlight the top five challenges and the top five opportunities you see for improvement.

      Identify the responsibilities and duties of the ISSC

      Associated Activity icon 1.3

      INPUT: SWOT analysis, Survey reports

      OUTPUT: Defined ISSC responsibilities

      1. With your security leadership team, review the typical responsibilities of the ISSC on the following slides (also included in the templated text of the charter linked below).
      2. Print off the following two slides, and in small teams or individually, identify which responsibilities the ISSC should have in your organization, brainstorm any additional responsibilities, and document reasoning.
      3. Have each team present to the larger group, track the similarities and differences between each of the groups, and come to consensus on the list of categories and responsibilities.
      4. Complete a sanity check: review your SWOT analysis. Do the responsibilities you’ve identified resolve the critical challenges or weaknesses?
      5. As a group, consider the responsibilities and whether you can reasonably implement those in one year or if there are any that will need to wait until year two of the committee.

      Add or modify responsibilities in Info-Tech’s Information Security Steering Committee Charter.

      Typical ISSC responsibilities and duties

      Use the following list of responsibilities to customize the list of responsibilities your ISSC may take on. These should link directly to the Responsibilities and Duties section of your ISSC charter.

      Strategic Oversight

      • Provide oversight and ensure alignment between information security strategy and company objectives.
      • Assess the adequacy of resources and funding to sustain and advance successful security programs and practices for identifying, assessing, and mitigating cybersecurity risks across all business functions.
      • Review controls to prevent, detect, and respond to cyber-attacks or information or data breaches involving company electronic information, intellectual property, data, or connected devices.
      • Review the company’s cyberinsurance policies to ensure appropriate coverage.
      • Provide recommendations, based on security best practices, for significant technology investments.

      Policy Governance

      • Review company policies pertaining to information security and cyberthreats, taking into account the potential for external threats, internal threats, and threats arising from transactions with trusted third parties and vendors.
      • Review privacy and information security policies and standards and the ramifications of updates to policies and standards.
      • Establish standards and procedures for escalating significant security incidents to the ISSC, board, other steering committees, government agencies, and law enforcement, as appropriate.

      Typical ISSC responsibilities and duties (continued)

      Use the following list of responsibilities to customize the list of responsibilities your ISSC may take on. These should link directly to the Responsibilities and Duties section of your ISSC charter.

      Risk Governance

      • Review and approve the company’s information risk governance structure and key risk management processes and capabilities.
      • Assess the company’s high-risk information assets and coordinate planning to address information privacy and security needs.
      • Provide input to executive management regarding the enterprise’s information risk appetite and tolerance.
      • Review the company’s cyber-response preparedness, incident response plans, and disaster recovery capabilities as applicable to the organization’s information security strategy.
      • Promote an open discussion regarding information risk and integrate information risk management into the enterprise’s objectives.

      Monitoring & Reporting

      • Receive periodic reports and coordinate with management on the metrics used to measure, monitor, and manage cyber and IT risks posed to the company and to review periodic reports on selected risk topics as the Committee deems appropriate.
      • Review reports provided by the IT organization regarding the status of and plans for the security of the company’s data stored on internal resources and with third-party providers.
      • Monitor and evaluate the quality and effectiveness of the company’s technology security, capabilities for disaster recovery, data protection, cyberthreat detection and cyber incident response, and management of technology-related compliance risks.

      Review the organization’s security strategy to solidify understanding of the ISSC’s purpose

      The ISSC should consistently evolve to reflect the strategic purpose of the security program. If you completed Info-Tech’s Security Strategy methodology, review the results to inform the scope of your committee. If you have not completed Info-Tech’s methodology, determining these details should be achieved through iterative stakeholder consultations.

      Strategy Components

      ISSC Considerations

      Security Pressure Analysis

      Review the ten security domains and your organization’s pressure levels to review the requisite maturity level of your security program. Consider how this may impact the focus of your ISSC.

      Security Drivers/Obligations

      Review how your security program supports the attainment of the organization’s business objectives. By what means should the ISSC support these objectives? This should inform the rationale, benefits, and overall function of the committee.

      Security Strategy Scope and Boundaries

      Consider the scope and boundaries of your security program to reflect on what the program is responsible for securing. Is this reflected adequately in the language of the committee’s purpose? Should components be added or redacted?

      Draft the committee purpose statement of your ISSC

      Associated Activity icon 1.4

      INPUT: SWOT Analysis, Security Strategy

      OUTPUT: ISSC Committee Purpose

      1. In a meeting with your IT leadership team – and considering the organization’s security strategy, defined responsibilities, and opportunities and threats identified – review the example goal statement in the Information Security Steering Committee Charter, and identify whether any of these statements apply to your organization. Select the statements that apply and collaboratively make any changes needed.
      2. Define unique goal statements by considering the following questions:
        • What three things would you realistically list for the ISSC to achieve?
        • If you were to accomplish three things in the next year, what would those be?
      3. With those goal statements in mind, consider the overall purpose of the committee. The purpose statement should be a reflection of what the committee does, why, and the goals.
      4. Have each individual review the example purpose statement and draft what they think a good purpose statement would be.
      5. Present each statement, and work together to determine a best-of-breed statement.

      Alter the Committee Purpose section in the Information Security Steering Committee Charter.

      Applications Priorities 2023

      • Buy Link or Shortcode: {j2store}186|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Economic, social, and regulatory conditions have changed livelihoods, businesses, and marketplaces. Modern tools and technologies have acted as lifelines by minimizing operating and delivery costs, and in the process, establishing a strong foundation for growth and maturity.
      • These tools and technologies must meet the top business goals of CXOs: ensure service continuity, improve customer experience, and make data-driven decisions.
      • While today’s business applications are good and well received, there is still room for improvement. The average business application satisfaction score among IT leadership was 72% (n=1582, CIO Business Vision).

      Our Advice

      Critical Insight

      • Applications are critical components in any business strategic plan. They can directly influence an organization’s internal and external brand and reputation, such as their uniqueness, competitiveness and innovativeness in the industry
      • Business leaders are continuously looking for innovative ways to better position their application portfolio to satisfy their goals and objectives, i.e., application priorities. Given the scope and costs often involved, these priorities must be carefully crafted to clearly state achievable business outcomes that satisfies the different needs very different customers, stakeholders, and users.
      • Unfortunately, expectations on your applications team have increased while the gap between how stakeholders and applications teams perceive effectiveness remains wide. This points to a need to clarify the requirements to deliver valuable and quality applications and address the pressures challenging your teams.

      Impact and Result

      Learn and explore the technology and practice initiatives in this report to determine which initiatives should be prioritized in your application strategy and align to your business organizational objectives:

      • Optimize the effectiveness of the IT organization.
      • Boost the productivity of the enterprise.
      • Enable business growth through technology.

      Applications Priorities 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Applications Priorities Report 2023 – A report that introduces and describes five opportunities to prioritize in your 2023 application strategy.

      In this report, we explore five priorities for emerging and leading-edge technologies and practices that can improve on capabilities needed to meet the ambitions of your organization.

      • Applications Priorities 2023 Report

      Infographic

      Further reading

      Applications Priorities 2023

      Applications are the engine of the business: keep them relevant and modern

      What we are facing today is transforming the ways in which we work, live, and relate to one another. Applications teams and portfolios MUST change to meet this reality.

      Economic, social, and regulatory conditions have changed livelihoods, businesses, and marketplaces. Modern tools and technologies have acted as lifelines by minimizing operating and delivery costs, and in the process, establishing a strong foundation for growth and maturity.

      As organizations continue to strengthen business continuity, disaster recovery, and system resilience, activities to simply "keep the lights on" are not enough. Be pragmatic in the prioritization and planning of your applications initiatives, and use your technologies as a foundation for your growth.

      Your applications must meet the top business goals of your CXOs

      • Ensure service continuity
      • Improve customer experience
      • Make data-driven decisions
      • Maximize stakeholder value
      • Manage risk

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022, n=568.

      Select and align your applications priorities to your business goals and objectives

      Applications are critical components in any business strategic plan. They can directly influence an organization's internal and external brand and reputation, such as their:

      • Uniqueness, competitiveness, and innovativeness in the industry.
      • Ability to be dynamic, flexible, and responsive to changing expectations, business conditions, and technologies.

      Therefore, business leaders are continuously looking for innovative ways to better position their application portfolios to satisfy their goals and objectives, i.e. applications priorities. Given the scope and costs often involved, these priorities must be carefully crafted to clearly state achievable business outcomes that satisfy
      the different needs of very different customers, stakeholders, and users.

      Today's business applications are good but leave room for improvement

      72%
      Average business application satisfaction score among IT leadership in 1582 organizations.

      Source: CIO Business Vision, August 2021 to July 2022, N=190.

      Five Applications Priorities for 2023

      In this report, we explore five priorities for emerging and leading-edge technologies and practices that can improve on capabilities needed to meet the Ambitions of your organization.

      this is an image of the Five Applications Priorities for which will be addressed in this blueprint.

      Strengthen your foundations to better support your applications priorities

      These key capabilities are imperative to the success of your applications strategy.

      KPI and Metrics

      Easily attainable and insightful measurements to gauge the progress of meeting strategic objectives and goals (KPIs), and the performance of individual teams, practices and processes (metrics).

      BUSINESS ALIGNMENT

      Gain an accurate understanding and interpretation of stakeholder, end-user, and customer expectations and priorities. These define the success of business products and services considering the priorities of individual business units and teams.

      EFFICIENT DELIVERY & SUPPORT PRACTICE

      Software delivery and support roles, processes, and tools are collaborative, well equipped and resourced, and optimized to meet changing stakeholder expectations.

      Data Management & Governance

      Ensuring data is continuously reliable and trustworthy. Data structure and integrations are defined, governed, and monitored.

      Product & Service Ownership

      Complete inventory and rationalization of the product and service portfolio, prioritized backlogs, roadmaps, and clear product and service ownership with good governance. This helps ensure this portfolio is optimized to meet its goals and objectives.

      Strengthen your foundations to better support your applications priorities (cont'd)

      These key capabilities are imperative to the success of your applications strategy.

      Organizational Change Management

      Manage the adoption of new and modified processes and technologies considering reputational, human, and operational concerns.

      IT Operational Management

      Continuous monitoring and upkeep of products and services to assure business continuity, and system reliability, robustness and disaster recovery.

      Architectural Framework

      A set of principles and standards that guides the consistent, sustainable and scalable growth of enterprise technologies. Changes to the architecture are made in collaboration with affected parties, such as security and infrastructure.

      Application Security

      The measures, controls, and tactics at the application layer that prevent vulnerabilities against external and internal threats and ensure compliance to industry and regulatory security frameworks and standards.

      There are many factors that can stand in your team's way

      Expectations on your applications team have increased, while the gap between how stakeholders and applications teams perceive effectiveness remains wide. This points to a need to clarify the requirements to deliver valuable and quality applications and address the pressures challenging your teams.

      1. Attracting and retaining talent
      2. Maximizing the return on technology
      3. Confidently shifting to digital
      4. Addressing competing priorities
      5. Fostering a collaborative culture
      6. Creating high-throughput teams

      CIOs agree that at least some improvement is needed across key IT activities

      A bar graph is depicted which shows the proportion of CIOs who believe that some, or significant improvement is necessary for the following categories: Measure IT Project Success; Align IT Budget; Align IT Project Approval Process; Measure Stakeholder Satisfaction With IT; Define and Align IT Strategy; Understand Business Goals

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022, n=568.

      Pressure Point 1:
      Attracting and Retaining Talent

      Recent environmental pressures impacted traditional working arrangements and showed more workplace flexibility is often possible. At the same time, many employees' expectations about how, when, and where they choose to work have also evolved. Recruitment and retention are reflections of different sides of the same employee value proposition coin. Organizations that fail to reinvent their approach to attracting and retaining talent by focusing on candidate and employee experience risk turnover, vacancies, and lost opportunities that can negatively impact the bottom line.

      Address the underlying challenges

      • Lack of employee empowerment and few opportunities for learning and development.
      • Poor coworker and manager relationships.
      • Compensation and benefits are inadequate to maintain desired quality of life.
      • Unproductive work environment and conflicting balance of work and life.
      • Unsatisfactory employee experience, including lack of employee recognition
        and transparency of organizational change.

      While workplace flexibility comes with many benefits, longer work hours jeopardize wellbeing.
      62% of organizations reported increased working hours, while 80% reported an increase in flexibility.
      Source: McLean & Company, 2022; n=394.

      Be strategic in how you fill and train key IT skills and capabilities

      • Cybersecurity
      • Big Data/Analytics
      • Technical Architecture
      • DevOps
      • Development
      • Cloud

      Source: Harvey Nash Group, 2021; n=2120.

      Pressure Point 2:
      Maximizing the Return of Technology

      Recent environmental pressures impacted traditional working arrangements and showed more workplace flexibility is often possible. At the same time, many employees' expectations about how, when, and where they choose to work have also evolved. Recruitment and retention are reflections of different sides of the same employee value proposition coin. Organizations that fail to reinvent their approach to attracting and retaining talent by focusing on candidate and employee experience risk turnover, vacancies, and lost opportunities that can negatively impact the bottom line.

      Address the underlying challenges

      • Inability to analyze, propose, justify, and communicate modernization solutions in language the stakeholders understand and in a way that shows they clearly support business priorities and KPIs and mitigate risks.
      • Little interest in documenting and rationalizing products and services through business-IT collaboration.
      • Lack of internal knowledge of the system and loss of vendor support.
      • Undefined, siloed product and service ownership and governance, preventing solutions from working together to collectively deliver more value.
      • Little stakeholder appetite to invest in activities beyond "keeping the lights on."

      Only 64% of applications were identified as effective by end users.
      Effective applications are identified as at least highly important and have high feature and usability satisfaction.
      Source: Application Portfolio Assessment, August 2021 to July 2022; N=315.

      "Regardless of the many definitions of modernization floating around, the one characteristic that we should be striving for is to ensure our applications do an outstanding job of supporting the users and the business in the most effective and efficient manner possible."
      Source: looksoftware.

      Pressure Point 3:
      Confidently Shifting to Digital

      "Going digital" reshapes how the business operates and drives value by optimizing how digital and traditional technologies and tactics work together. This shift often presents significant business and technical risks to business processes, enterprise data, applications, and systems which stakeholders and teams are not aware of or prepared to accommodate.

      Address the underlying challenges

      • Differing perspectives on digital can lead to disjointed transformation initiatives, oversold benefits, and a lack of synergy among digital technologies and processes.
      • Organizations have difficulty adapting to new technologies or rethinking current business models, processes, and ways of working because of the potential human, ethical, and reputational impacts and restrictions from legacy systems.
      • Management lacks a framework to evaluate how their organization manages and governs business value delivery.
      • IT is not equipped or resourced to address these rapidly changing business, customer, and technology needs.
      • The wrong tools and technologies were chosen to support the shift to digital.

      The shift to digital processes is starting, but slowly.
      62% of respondents indicated that 1-20% of their processes were digitized during the past year.
      Source: Tech Trends and Priorities 2023; N=500

      Resistance to change and time/budget constraints are top barriers preventing companies from modernizing their applications.
      Source: Konveyor, 2022; n=600.

      Pressure Point 4:
      Addressing Competing Priorities

      Enterprise products and services are not used, operated, or branded in isolation. The various parties involved may have competing priorities, which often leads to disagreements on when certain business and technology changes should be made and how resources, budget, and other assets should be allocated. Without a broader product vision, portfolio vision, and roadmap, the various dependent or related products and services will not deliver the same level of value as if they were managed collectively.

      Address the underlying challenges

      • Undefined product and service ownership and governance, including escalation procedures when consensus cannot be reached.
      • Lack of a unified and grounded set of value and quality definitions, guiding principles, prioritization standards, and broad visibility across portfolios, business capabilities, and business functions.
      • Distrust between business units and IT teams, which leads to the scaling of unmanaged applications and fragmented changes and projects.
      • Decisions are based on opinions and experiences without supporting data.

      55% of CXOs stated some improvement is necessary in activities to understand business goals.
      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      CXOs are moderately satisfied with IT's performance as a business partner (average score of 69% among all CXOs). This sentiment is similarly felt among CIOs (64%).
      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      Pressure Point 5:
      Fostering a Collaborative Culture

      Culture impacts business results, including bottom-line revenue and productivity metrics. Leaders appreciate the impact culture can have on applications initiatives and wish to leverage this. How culture translates from an abstract concept to something that is measurable and actionable is not straightforward. Executives need to clarify how the desired culture will help achieve their applications strategy and need to focus on the items that will have the most impact.

      Address the underlying challenges

      • Broad changes do not consider the unique subcultures, personalities, and behaviors of the various teams and individuals in the organization.
      • Leaders mandate cultural changes without alleviating critical barriers and do not embody the principles of the target state.
      • Bureaucracy and politics restrict changes and encourage the status quo.
      • Industry standards, technologies, and frameworks do not support or cannot be tailored to fit the desired culture.
      • Some teams are deliberately excluded from the scoping, planning, and execution of key product and service delivery and management activities.

      Agile does not solve team culture challenges.
      43% of organizations cited organizational culture as a significant barrier to adopting and scaling Agile practices.
      Source: Digital.ai, 2021.

      "Providing a great employee experience" as the second priority (after recruiting) highlights the emphasis organizations are placing on helping employees adjust after having been forced to change the way work gets done.
      Source: McLean & Company, 2022; N=826.

      Use your applications priorities to help address your pressure points

      Success can be dependent on your ability to navigate around or alleviate your pressure points. Design and market your applications priorities to bring attention to your pressure points and position them as key risk factors to their success.

      Applications Priorities
      Digital Experience (DX) Intelligent Automation Proactive Application Management Multisource Systems Digital Organization as a Platform
      Attracting and Retaining Talent Enhance the employee experience Be transparent and support role changes Shift focus from maintenance to innovation Enable business-managed applications Promote and showcase achievements and successes
      Maximizing the Return on Technology Modernize or extend the use of existing investments Automate applications across multiple business functions Improve the reliability of mission-critical applications Enhance the functionality of existing applications Increase visibility of underused applications
      Confidently Shifting to Digital Prioritize DX in your shift to digital Select the capabilities that will benefit most from automation Prepare applications to support digital tools and technologies Use best-of-breed tools to meet specific digital needs Bring all applications up to a common digital standard
      Addressing Competing Priorities Ground your digital vision, goals, and objectives Recognize and evaluate the architectural impact Rationalize the health of the applications Agree on a common philosophy on system composition Map to a holistic platform vision, goals, and objectives
      Fostering a Collaborative Culture Involve all perspectives in defining and delivering DX Involve the end user in the delivery and testing of the automated process Include the technical perspective in the viability of future applications plans Discuss how applications can work together better in an ecosystem Ensure the platform is configured to meet the individual needs of the users
      Creating High-Throughput Teams Establish delivery principles centered on DX Remove manual, error-prone, and mundane tasks Simplify applications to ease delivery and maintenance Alleviate delivery bottlenecks and issues Abstract the enterprise system to expedite delivery

      Digital Experience (DX)

      PRIORITY 1

      • Deliver Valuable User, Customer, Employee, and Brand Experiences

      Delivering valuable digital experiences requires the adoption of good management, governance, and operational practices to accommodate stakeholder, employee, customer, and end-user expectations of digital experiences (e.g. product management, automation, and iterative delivery). Technologies are chosen based on what best enables, delivers, and supports these expectations.

      Introduction

      Digital transformation is not just about new tools and technologies. It is also about delivering a valuable digital experience

      What is digital experience (DX)?

      Digital experience (DX) refers to the interaction between a user and an organization through digital products and services. Digital products and services are tools, systems, devices, and resources that gather, store, and process data; are continuously modernized; and embody eight key attributes that are described on the following slide. DX is broken down into four distinct perspectives*:

      • Customer Experience – The immediate perceptions of transactions and interactions experienced through a customer's journey in the use of the organization's digital
        products and services.
      • End-User Experience – Users' emotions, beliefs, and physical and psychological responses
        that occur before, during, or after interacting with a digital product or service.
      • Brand Experience – The broader perceptions, emotions, thoughts, feelings and actions the public associate with the organization's brand and reputation or its products and services. Brand experience evolves over time as customers continuously engage with the brand.
      • Employee Experience – The satisfaction and experience of an employee through their journey with the organization, from recruitment and hiring to their departure. How an employee embodies and promotes the organization brand and culture can affect their performance, trust, respect, and drive to innovate and optimize.
      Digital Products and Services
      Customer Experience Brand Experience Employee Experience End-User Experience

      Digital products and services have a common set of attributes

      Digital transformation is not just about new tools and technologies. It is also about delivering a valuable digital experience

      • Digital products and services must keep pace with changing business and end-user needs as well as tightly supporting your maturing business model with continuous modernization. Focus your continuous modernization on the key characteristics that drive business value.
      • Fit for purpose: Functionalities are designed and implemented for the purpose of satisfying the end user's needs and solving their problems.
      • User-centric: End users see the product as rewarding, engaging, intuitive, and emotionally satisfying. They want to come back to it.
      • Adaptable: The product can be quickly tailored to meet changing end-user and technology needs with reusable and customizable components.
      • Accessible: The product is available on demand and on the end user's preferred interface.
        End users have a seamless experience across all devices.
      • Private and secured: The end user's activity and data are protected from unauthorized access.
      • Informative and insightful: The product delivers consumable, accurate, and trustworthy real-time data that is important to the end user.
      • Seamless application connection: The product facilitates direct interactions with one or more other products through an uninterrupted user experience.
      • Relationship and network building: The product enables and promotes the connection and interaction of people.

      The Business Value cycle of continuous modernization.

      Signals

      DX is critical for business growth and maturity, but the organization may not be ready

      A good DX has become a key differentiator that gives organizations an advantage over their competition and peers. Shifts in working environments; employee, customer, and stakeholder expectations; and the advancements in modern technologies have raised the importance of adopting and transitioning to digital processes and tools to stay relevant and responsive to changing business and technology conditions.

      Applications teams are critical to ensuring the successful delivery and operation of these digital processes and tools. However, they are often under-resourced and challenged to meet their DX goals.

      • 7% of both business and IT respondents think IT has the resources needed to keep up with digital transformation initiatives and meet deadlines (Cyara, 2021).
      • 43% of respondents said that the core barrier to digital transformation is a lack of skilled resources (Creatio, 2021).
      A circle graph is shown with 91% of the circle coloured in dark blue, with the number 91% in the centre.

      of organizations stated that at least 1% of processes were shifted from being manually completed to digitally completed in the last year. 29% of organizations stated at least 21% were shifted.

      Source: Tech Trends and Priorities 2023; N=500.

      A circle graph is shown with 98% of the circle coloured in dark blue, with the number 98% in the centre.

      of organizations recognized digital transformation is important for competitive advantage. 94% stated it is important to enhance customer experience, and 91% stated it will have a positive impact on revenue.

      Source: Cyara, 2021.

      Drivers

      Brand and reputation

      Customers are swayed by the innovations and advancements in digital technologies and expect your applications team to deliver and support them. Your leaders recognize the importance of these expectations and are integrating them into their business strategy and brand (how the organization presents itself to its customers, employees and the public). They hope that their actions will improve and shape the company's reputation (public perception of the company) as effective, customer-focused, and forward-thinking.

      Worker productivity

      As you evolve and adopt more complex tools and technology, your stakeholders will expect more from business units and IT teams. Unfortunately, teams employing manual processes and legacy systems will struggle to meet these expectations. Digital products and services promote the simplification of complex operations and applications and help the business and your teams better align operational practices with strategic goals and deliver valuable DX.

      Organization modernization

      Legacy processes, systems, and ways of working are no longer suitable for meeting the strategic digital objectives and DX needs stakeholders expect. They drive up operational costs without increased benefits, impede business growth and innovation, and consume scarce budgets that could be used for other priorities. Shifting to digital tools and technologies will bring these challenges to light and demonstrate how modernization is an integral part of DX success.

      Benefits & Risks

      Benefits

      • Flexibility & Satisfaction
      • Adoption
      • Reliability

      Employees and customers can choose how they want to access, modify, and consume digital products and services. They can be tailored to meet the specific functional needs, behaviors, and habits of the end user.

      The customer, end user, brand, and employee drive selection, design, and delivery of digital products and services. Even the most advanced technologies will fail if key roles do not see the value in their use.

      Digital products and services are delivered with technical quality built into them, ensuring they meet the industry, regulatory, and company standards throughout their lifespan and in various conditions.

      Risks

      • Legacy & Lore
      • Bureaucracy & Politics
      • Process Inefficiencies
      • No Quality Standards

      Some stakeholders may not be willing to change due to their familiarity and comfort of business practices.

      Competing and conflicting priorities of strategic products and services undermine digital transformation and broader modernization efforts.

      Business processes are often burdened by wasteful activities. Digital products and services are only as valuable as the processes they support.

      The performance and support of your digital products and services are hampered due to unmanageable technical debt because of a deliberate decision to bypass or omit quality good practices.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Enhance the employee experience.

      Design the digital processes, tools, and technologies to meet the individual needs of the employee.

      Maximizing the Return on Technology

      Modernize or extend the use of existing investments.

      Drive higher adoption of applications and higher user value and productivity by implementing digital capabilities to the applications that will gain the most.

      Confidently Shifting to Digital

      Prioritize DX in your shift to digital. Include DX as part of your definition of success.

      Your products and services are not valuable if users, customers, and employees do not use them.

      Addressing Competing Priorities

      Ground your digital vision, goals, and objectives

      Establish clear ownership of DX and digital products and services with a cross-functional prioritization framework.

      Fostering a Collaborative Culture

      Involve all perspectives in defining and delivering DX.

      Maintain a committee of owners, stakeholders, and delivery teams to ensure consensus and discuss how to address cross-functional opportunities and risks.

      Creating High-Throughput Teams

      Establish delivery principles centered on DX.

      Enforce guiding principles to streamline and simplify DX delivery, such as plug-and-play architecture and quality standards.

      Recommendations

      Build a digital business strategy

      A digital business strategy clearly articulates the goals and ambitions of the business to adopt digital practices, tools, and technologies. This document:

      • Looks for ways to transform the business by identifying what technologies to embrace, what processes to automate, and what new business models to create.
      • Unifies digital possibilities with your customer experiences.
      • Establishes accountability with the executive leadership.
      • States the importance of cross-functional participation from senior management across the organization.

      Related Research:

      Learn, understand, and empathize with your users, employees, and customers

      • To create a better product, solution, or service, understanding those who use it, their needs, and their context is critical.
      • A great experience design practice can help you balance those goals so that they are in harmony with those of your users.
      • IT leaders must find ways to understand the needs of the business and develop empathy on a much deeper level. This empathy is the foundation for a thriving business partnership.

      Related Research:

      Recommendations

      Center product and service delivery decisions and activities on DX and quality

      User, customer, employee, and brand are integral perspectives on the software development lifecycle (SDLC) and the management and governance practices supporting digital products and services. It ensures quality standards and controls are consistently upheld while maintaining alignment with various needs and priorities. The goal is to come to a consensus on a universal definition and approach to embed quality and DX-thinking throughout the delivery process.

      Related Research:

      Instill collaborative delivery practices

      Today's rapidly scaling and increasingly complex digital products and services create mounting pressure on delivery teams to release new features and changes quickly and with sufficient quality. This pressure is further compounded by the competing priorities of individual stakeholders and the nuances among different personas of digital products and services.

      A collaborative delivery practice sets the activities, channels, and relationships needed to deliver a valuable and quality product or service with cross-functional awareness, accountability, and agreement.

      Related Research:

      Recommendations

      Continuously monitor and modernize your digital products and services

      Today's modern digital products and services are tomorrow's shelfware. They gradually lose their value, and the supporting technologies will become obsolete. Modernization is a continuous need.

      Data-driven insights help decision makers decide which products and services to retire, upgrade, retrain on, or maintain to meet the demands of the business.

      Enhancements focusing on critical business capabilities strengthen the case for investment and build trust with all stakeholders.

      Related Research:

      CASE STUDY
      Mastercard in Asia

      Focus on the customer journey

      Chief Marketing Officer M.V. Rajamannar (Raja) wanted to change Mastercard's iconic "Priceless" ad campaign (with the slogan "There are some things money can't buy. For everything else there's Mastercard."). The main reasons were that the campaign relied on one-way communication and targeted end customers, even though Mastercard doesn't issue cards directly to customers; partner banks do. To drive the change in campaign, Raja and his team created a digital engine that leveraged digital and social media. Digital engine is a seven-step process based on insights gleaned from data and real-time optimization.

      1. Emotional spark: Using data to understand customers' passion points, Mastercard builds videos and creatives to ignite an emotional spark and give customers a reason to engage. For example, weeks before New Year's Eve, Mastercard produced a video with Hugh Jackman to encourage customers to submit a story about someone who deeply mattered to them. The authors of the winning story would be flown to reunite with those both distant and dear.
      2. Engagement: Mastercard targets the right audience with a spark video through social media to encourage customers to share their stories.
      3. Offers: To help its partner banks and merchants in driving their business, the company identifies the best offers to match consumers' interests. In the above campaign, Mastercard's Asia-Pacific team found that Singapore was a favorite destination for Indian customers, so they partnered with Singapore's Resorts World Sentosa with an attractive offer.
      4. Real-time optimization: Mastercard optimizes, in real time, a portfolio of several offers through A/B testing and other analysis.
      5. Amplification: Real-time testing provides confidence to Mastercard about the potential success of these offers and encourages its bank and merchant partners to co-market and co-fund these campaigns.
      6. Network effects: A few weeks after consumers submitted their stories about distant loved ones, Mastercard selected winners, produced videos of them surprising their friends and families, and used these videos in social media to encourage sharing.
      7. Incremental transactions: These programs translate into incremental business for banks who issue cards, for merchants where customers spend money, and for Mastercard, which gets a portion of every transaction.

      Source: Harvard Business Review Press

      CASE STUDY
      Mastercard in Asia (cont'd)

      Focus on the customer journey

      1. Emotional Spark
        Drives genuine personal stories
      2. Engagement
        Through Facebook
        and social media
      3. Offers
        From merchants
        and Mastercard assets
      4. Optimization
        Real-time testing of offers and themes
      5. Amplification
        Paid and organic programmatic buying
      6. Network Effects
        Sharing and
        mass engagement
      7. Incremental Transactions
        Win-win for all parties

      CASE STUDY
      Mastercard in Asia (cont'd)

      The Mastercard case highlights important lessons on how to engage customers:

      • Have a broad message. Brands need to connect with consumers over how they live and spend their time. Organizations need to go beyond the brand or product message to become more relevant to consumers' lives. Dove soap was very successful in creating a conversation among consumers with its "Real Beauty" campaign, which focused not on the brand or even the product category, but on how women and society view beauty.
      • Shift from storytelling to story making. To break through the clutter of advertising, companies need to move from storytelling to story making. A broader message that is emotionally engaging allows for a two-way conversation.
      • Be consistent with the brand value. The brand needs to stand for something, and the content should be relevant to and consistent with the image of the brand. Pepsi announced an award of $20 million in grants to individuals, businesses, and nonprofits that promote a new idea to make a positive impact on community. A large number of submissions were about social causes that had nothing to do with Pepsi, and some, like reducing obesity, were in conflict with Pepsi's product.
      • Create engagement that drives business. Too much entertainment in ads may engage customers but detract from both communicating the brand message and increasing sales. Simply measuring the number of video views provides only a partial picture of a program's success.

      Intelligent Automation

      PRIORITY 2

      • Extend Automation Practices with AI and ML

      AI and ML are rapidly growing. Organizations see the value of machines intelligently executing high-performance and dynamic tasks such as driving cars and detecting fraud. Senior leaders see AI and ML as opportunities to extend their business process automation investments.

      Introduction

      Intelligent automation is the next step in your business process automation journey

      What is intelligent automation (IA)?

      Intelligent automation (IA) is the combination of traditional automation technologies, such as business process management (BPM) and robotic process automation (RPA), with AI and ML. The goal is to further streamline and scale decision making across various business processes by:

      • Removing human interactions.
      • Addressing decisions that involve complex variables.
      • Automatically adapting processes to changing conditions.
      • Bridging disparate automation technologies into an integrated end-to-end value delivery pipeline.

      "For IA to succeed, employees must be involved in the transformation journey so they can experience firsthand the benefits of a new way of working and creating business value," (Cognizant).

      What is the difference between IA and hyperautomation?

      "Hyperautomation is the act of automating everything in an organization that can be automated. The intent is to streamline processes across an organization using intelligent automation, which includes AI, RPA and other technologies, to run without human intervention. … Hyperautomation is a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible" (IBM, 2021).

      Note that hyperautomation often enables IA, but teams solely adopting IA do not need to abide to its automation-first principles.

      IA is a combination of various tools and technologies

      What tools and technologies are involved in IA?

      • Artificial intelligence (AI) & Machine Learning (ML) – AI systems perform tasks mimicking human intelligence such as learning from experience and problem solving. AI is making its own decisions without human intervention. Machine learning systems learn from experience and without explicit instructions. They learn patterns from data then analyze and make predictions based on past behavior and the patterns learned. AI is a combination of technologies and can include machine learning.
      • Intelligent Business Process Management System (iBPMS) – Combination of BPM tools with AI and other intelligence capabilities.
      • Robotic Process Automation (RPA) – Robots leveraging an application's UI rather than programmatic access. Automate rules-based, repetitive tasks performed by human workers with AI/ML.
      • Process Mining & Discovery – Process mining involves reading system event logs and application transactions and applying algorithmic analysis to automatically identify and map inferred business processes. Process discovery involves unintrusive virtual agents that sit on a user's desktop and record and monitor how they interact with applications to perform tasks and processes. Algorithms are then used to map and analyze the processes.
      • Intelligent Document Processing – The conversion of physical or unstructured documents into a structured, digital format that can be used in automation solutions. Optical character recognition (OCR) and natural language processing (NPL) are common tools used to enable this capability.
      • Advanced Analytics – The gathering, synthesis, transformation, and delivery of insightful and consumable information that supports data-driven decision making. Data is queried from various disparate sources and can take on a variety of structured and unstructured formats.

      The cycle of IA technologies

      Signals

      Process automation is an executive priority and requires organizational buy-in

      Stakeholders recognize the importance of business process automation and AI and are looking for ways to deliver more value using these technologies.

      • 90% of executives stated automating business workflows post-COVID-19 will ensure business continuity (Kofax, 2022).
      • 88% of executives stated they need to fast-track their end-to-end digital transformation (Kofax, 2022).

      However, the advertised benefits to vendors of enabling these desired automations may not be easily achievable because of:

      • Manual and undocumented business processes.
      • Fragmented and inaccessible systems.
      • Poor data quality, insights, and security.
      • The lack of process governance and management practice.
      A circle graph is shown with 49% of the circle coloured in dark blue, with the number 49% in the centre.

      of CXOs stated staff sufficiency, skill and engagement issues as a minor IT pain point compared to 51% of CIOs stated this issue as a major pain point.

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      A circle graph is shown with 36% of the circle coloured in dark blue, with the number 36% in the centre.

      of organizations have already invested in AI or machine learning.

      Source: Tech Trends and Priorities 2023; N=662

      Drivers

      Quality & throughput

      Products and services delivered through an undefined and manual process risk the creation of preventable and catchable defects, security flaws and holes, missing information, and other quality issues. IA solutions consistently reinforce quality standards the same way across all products and services while tailoring outputs to meet an individual's specific needs. Success is dependent on the accurate interpretation and application of quality standards and the user's expectations.

      Worker productivity

      IA removes the tedious, routine, and mundane tasks that distract and restrict employees from doing more valuable, impactful, and cognitively focused activities. Practical insights can also be generated through IA tools that help employees make data-driven decisions, evaluate problems from different angles, and improve the usability and value of the products and services they produce.

      Good process management practices

      Automation magnifies existing inefficiencies of a business process management practice, such as unclear and outdated process documentation and incorrect assumptions. IA reinforces the importance of good business process optimization practices, such as removing waste and inefficiencies in a thoughtful way, choosing the most appropriate automation solution, and configuring the process in the right way to maximize the solution's value.

      Benefits & Risks

      Benefits

      • Documentation
      • Hands-Off
      • Reusability

      All business processes must be mapped and documented to be automated, including business rules, data entities, applications, and control points.

      IA can be configured and orchestrated to automatically execute when certain business, process, or technology conditions are met in an unattended or attended manner.

      IA is applicable in use cases beyond traditional business processes, such as automated testing, quality control, audit, website scraping, integration platform, customer service, and data transfer.

      Risks

      • Data Quality & Bias
      • Ethics
      • Recovery & Security
      • Management

      The accuracy and relevance of the decisions IA makes are dependent on the overall quality of the data
      used to train it.

      Some decisions can have significant reputational, moral, and ethical impacts if made incorrectly.
      The question is whether it is appropriate for a non-human to make that decision.

      IA is composed of technologies that can be compromised or fail. Without the proper monitoring, controls,
      and recovery protocols, impacted IA will generate significant business and IT costs and can potentially harm customers, employees, and the organization.

      Low- and no-code capabilities ease and streamline IA development, which makes it susceptible to becoming unmanageable. Discipline is needed to ensure IA owners are aware of the size and health of the IA portfolio.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Be transparent and support role changes.

      Plan to address the human sentiment with automation (e.g. job security) and the transition of the role to other activities.

      Maximizing the Return on Technology

      Automate applications across multiple business functions.

      Recognize the value opportunities of improving and automating the integration of cross-functional processes.

      Confidently Shifting to Digital

      Maximize the learning of automation fit.

      Select the right capabilities to demonstrate the value of IA while using lessons learned to establish the appropriate support.

      Addressing Competing Priorities

      Recognize automation opportunities with capability maps.

      Use a capability diagram to align strategic IA objectives with tactical and technical IA initiatives.

      Fostering a Collaborative Culture

      Involve the user in the delivery process.

      Maximize automation adoption by ensuring the user finds value in its use before deployment.

      Creating High-Throughput Teams

      Remove manual, error-prone, and mundane tasks.

      Look for ways to improve team throughput by removing wasteful activities, enforcing quality, and automating away tasks driving down productivity.

      Recommendations

      Build your business process automation playbook and practice

      Formalize your business process automation practice with a good toolkit and a repeatable set of tactics and techniques.

      • Clarify the problem being solved with IA.
      • Optimate your processes. Apply good practices to first optimize (opti-) and then automate (-mate) key business processes.
      • Deliver minimum viable automations (MVAs). Maximize the learning of automation solutions and business operational changes through small, strategic automation use cases.

      Related Research:

      Explore the various IA tooling options

      Each IA tool will address a different problem. Which tool to choose is dependent on a variety of factors, such as functional suitability, technology suitability, delivery and support capabilities, alignment to strategic business goals, and the value it is designed to deliver.

      Related Research:

      Recommendations

      Introduce AI and ML thoughtfully and with a plan

      Despite the many promises of AI, organizations are struggling to fully realize its potential. The reasons boil down to a lack of understanding of when these technologies should and shouldn't be used, as well as a fear of the unknown. The plan to adopt AI should include:

      • Understanding of what AI really means in practice.
      • Identifying specific applications of AI in the business.
      • Understanding the type of AI applicable for the situation.

      Related Research:

      Mitigate AI and ML bias

      Biases can be introduced into an IA system at any stage of the development process, from the data you collect, to the way you collect it, to which algorithms are used and what assumptions were made. In most cases, AI and ML bias is a is a social, political, and business problem.

      While bias may not be intentional nor completely prevented or eliminated, early detection, good design, and other proactive preventative steps can be taken to minimize its scope and impact.

      Related Research:

      CASE STUDY
      University Hospitals

      Challenge

      University Hospitals Cleveland (UH) faces the same challenge that every major hospital confronts regarding how to deliver increasingly complex, high-quality healthcare to a diverse population efficiently and economically. In 2017, UH embarked on a value improvement program aiming to improve quality while saving $400 million over a five-year period.

      In emergency department (ED) and inpatient units, leaders found anticipating demand difficult, and consequently units were often over-staffed when demand was low and under-staffed when demand was high. Hospital leaders were uncertain about how to reallocate resources based on capacity needs.

      Solution

      UH turned to Hospital IQ's Census Solution to proactively manage capacity, staff, and flow in the ED and inpatient areas.

      By applying AI, ML, and external data (e.g. weather forecasts) to the hospital's own data (including EMR data and hospital policies), the solution helped UH make two-day census forecasts that managers used to determine whether to open or close in-patient beds and, when necessary, divert low-acuity patients to other hospitals in the system to handle predicted patient volume.

      Source: University Hospitals

      Results

      ED boarding hours have declined by 10% and the hospital has seen a 50% reduction in the number of patients who leave the hospital without
      being seen.

      UH also predicts in advance patients ready for discharge and identifies roadblocks, reducing the average length of stay by 15%. UH is able to better manage staff, reducing overtime and cutting overall labor costs.

      The hospital has also increased staff satisfaction and improved patient safety by closing specific units on weekends and increasing the number of rooms that can be sterilized.

      Proactive Application Management

      PRIORITY 3

      • Strengthen Applications to Prevent and Minimize the Impact of Future Issues

      Application management is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on application management when it becomes a problem. The lack of governance and practice accountability leaves this practice in a chaotic state: politics take over, resources are not strategically allocated, and customers are frustrated. As a result, application management is often reactive and brushed aside for new development.

      Introduction

      What is application management?

      Application management ensures valuable software is successfully delivered and is maintained for continuous and sustainable business operations. It contains a repeatable set of activities needed to rationalize and roadmap products and services while balancing priorities of new features and maintenance tasks.

      Unfortunately, application management is commonly perceived as a practice that solely addresses issues, updates, and incidents. However, application management teams are also tasked with new value delivery that was not part of the original release.

      Why is an effective application maintenance (reactive) practice not good enough?

      Application maintenance is the "process of modifying a software system or its components after delivery to correct faults, improve performance or other attributes, or adapt to a changed environment or business process," (IEEE, 1998). While it is critical to quickly fix defects and issues when they occur, reactively addressing them is more expensive than discovering them early and employing the practices to prevent them.

      Even if an application is working well, its framework, architecture, and technology may not be compatible with the possible upcoming changes stakeholders and vendors may want to undertake. Applications may not be problems now, but they soon can be.

      What motivates proactive application changes?

      This image shows the motivations for proactive application changes, sorted by external and internal sources.

      Proactive application management must be disciplined and applied strategically

      Proactive application management practices are critical to maintaining business continuity. They require continuous review and modification so that applications are resilient and can address current and future scenarios. Depending on the value of the application, its criticality to business operations, and its susceptibility to technology change, a more proactive management approach may be warranted. Stakeholders can then better manage resources and budget according to the needs of specific products.

      Reactive Management

      Run-to-Failure

      Fix and enhance the product when it breaks. In most cases, a plan is in place ahead of a failure, so that the problem can be addressed without significant disruption and costs.

      Preventive

      Regularly inspect and optimize the product to reduce the likelihood that it will fail in the future. Schedule inspections based on a specific timeframe or usage threshold.

      Predictive

      Predict failures before they happen using performance and usage data to alert teams when products are at risk of failure according to specified conditions.

      Reliability and Risk Based

      Analyze all possible failure scenarios for each component of the product and create tailored delivery plans to improve the stability, reliability, and value of each product.

      Proactive Management

      Signals

      Applications begin to degrade as soon as they are used

      Today's applications are tomorrow's shelfware. They gradually lose their value, stability, robustness, and compatibility with other enterprise technologies. The longer these applications are left unattended or simply "keeping the lights on," the more risks they will bring to the application portfolio, such as:

      • Discovery and exploitation of security flaws and gaps.
      • Increasing the lock-in to specific vendor technologies.
      • Inconsistent application performance across various workloads.

      These impacts are further compounded by the continuous work done on a system burdened with technical debt. Technical debt describes the result of avoided costs that, over time, cause ongoing business impacts. Left unaddressed, technical debt can become an existential threat that risks your organization's ability to effectively compete and serve its customers. Unfortunately, most organizations have a significant, growing, unmanageable technical debt portfolio.

      A circle graph is shown with 60% of the circle coloured in dark green, with the number 60% in the centre.

      of respondents stated they saw an increase in perceived change in technical debt during the past three years. A quarter of respondents indicated that it stayed the same.

      Source: McKinsey Digital, 2020.

      US
      $4.35
      Million

      is the average cost of a data breach in 2022. This figure represents a 2.6% increase from last year. The average cost has climbed 12.7% since 2020.

      Source: IBM, 2022; N=537.

      Drivers

      Technical debt

      Historical decisions to meet business demands by deferring key quality, architectural, or other software delivery activities often lead to inefficient and incomplete code, fragile legacy systems, broken processes, data quality problems, and the other contributors to technical debt. The impacts for this challenge is further heightened if organizations are not actively refactoring and updating their applications behind the scenes. Proactive application management is intended to raise awareness of application fragility and prioritize comprehensive refactoring activities alongside new feature development.

      Long-term application value

      Applications are designed, developed, and tested against a specific set of parameters which may become less relevant over time as the business matures, technology changes, and user behaviors and interactions shift. Continuous monitoring of the application system, regular stakeholder and user feedback, and active technology trend research and vendor engagement will reveal tasks to prepare an application for future value opportunities or stability and resilience concerns.

      Security and resiliency

      Innovative approaches to infiltrating and compromising applications are becoming prevailing stakeholder concerns. The loopholes and gaps in existing application security protocols, control points, and end-user training are exploited to gain the trust of unsuspecting users and systems. Proactive application management enforces continuous security reviews to determine whether applications are at risk. The goal is to prevent an incident from happening by hardening or complementing measures already in place.

      Benefits & Risks

      Benefits

      • Consistent Performance
      • Robustness
      • Operating Costs

      Users expect the same level of performance and experience from their applications in all scenarios. A proactive approach ensures the configurations meet the current needs of users and dependent technologies.

      Proactively managed applications are resilient to the latest security concerns and upcoming trends.

      Continuous improvements to the underlying architecture, codebase, and interfaces can minimize the cost to maintain and operate the application, such as the transition to a loosely coupled architecture and the standardization of REST APIs.

      Risks

      • Stakeholder Buy-In
      • Delayed Feature Releases
      • Team Capacity
      • Discipline

      Stakeholders may not see the association between the application's value and its technical quality.

      Updates and enhancements are system changes much like any application function. Depending
      on the priority of these changes, new functions may be pushed off to a future release cycle.

      Applications teams require dedicated capacity to proactively manage applications, but they are often occupied meeting other stakeholder demands.

      Overinvesting in certain application management activities (such as refactoring, re-architecture, and redesign) can create more challenges. Knowing how much to do is important.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Shift focus from maintenance to innovation.

      Work on the most pressing and critical requests first, with a prioritization framework reflecting cross-functional priorities.

      Maximizing the Return on Technology

      Improve the reliability of mission-critical applications.

      Regularly verify and validate applications are up to date with the latest patches and fixes and comply with industry good practices and regulations.

      Confidently Shifting to Digital

      Prepare applications to support digital tools and technologies.

      Focus enhancements on the key components required to support the integration, performance, and security needs of digital.

      Addressing Competing Priorities

      Rationalize the health of the applications.

      Use data-driven, compelling insights to justify the direction and prioritization of applications initiatives.

      Fostering a Collaborative Culture

      Include the technical perspective in the viability of future applications plans.

      Demonstrate how poorly maintained applications impede the team's ability to deliver confidently and quickly.

      Creating High-Throughput Teams

      Simplify applications to ease delivery and maintenance.

      Refactor away application complexities and align the application portfolio to a common quality standard to reduce the effort to deliver and test changes.

      Recommendations

      Reinforce your application maintenance practice

      Maintenance is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on maintenance when it becomes a problem.

      • Justify the necessity of streamlined maintenance.
      • Strengthen triaging and prioritization practices.
      • Establish and govern a repeatable process.

      Ensure product issues, incidents, defects, and change requests are promptly handled to minimize business and IT risks.

      Related Research:

      Build an application management practice

      Apply the appropriate management approaches to maintain business continuity and balance priorities and commitments among maintenance and new development requests.

      This practice serves as the foundation for creating exceptional customer experience by emphasizing cross-functional accountability for business value and product and service quality.

      Related Research:

      Recommendations

      Manage your technical debt

      Technical debt is a type of technical risk, which in turn is business risk. It's up to the business to decide whether to accept technical debt or mitigate it. Create a compelling argument to stakeholders as to why technical debt should be a business priority rather than just an IT one.

      • Define and identify your technical debt.
      • Conduct a business impact analysis.
      • Identify opportunities to better manage technical debt.

      Related Research:

      Gauge your application's health

      Application portfolio management is nearly impossible to perform without an honest and thorough understanding of your portfolio's alignment to business capabilities, business value, total cost of ownership, end-user reception and satisfaction, and technical health.

      Develop data-driven insights to help you decide which applications to retire, upgrade, retrain on, or maintain to meet the demands of the business.

      Related Research:

      Recommendations

      Adopt site reliability engineering (SRE) and DevOps practices

      Site reliability engineering (SRE) is an operational model for running online services more reliably by a team of dedicated reliability-focused engineers.

      DevOps, an operational philosophy promoting development and operations collaboration, can bring the critical insights to make application management practices through SRE more valuable.

      Related Research:

      CASE STUDY
      Government Agency

      Goal

      A government agency needed to implement a disciplined, sustainable application delivery, planning, and management process so their product delivery team could deliver features and changes faster with higher quality. The goal was to ensure change requests, fixes, and new features would relieve requester frustrations, reduce regression issues, and allow work to be done on agreeable and achievable priorities organization-wide. The new model needed to increase practice efficiency and visibility in order to better manage technical debt and focus on value-added solutions.

      Solution

      This organization recognized a number of key challenges that were inhibiting its team's ability to meet its goals:

      • The product backlog had become too long and unmanageable.
      • Delivery resources were not properly allocated to meet the skills and capabilities needed to successfully meet commitments.
      • Quality wasn't defined or enforced, which generated mounting technical debt.
      • There was a lack of clear metrics and defined roles and responsibilities.
      • The business had unrealistic and unachievable expectations.

      Source: Info-Tech Workshop

      Key practices implemented

      • Schedule quarterly business satisfaction surveys.
      • Structure and facilitate regular change advisory board meetings.
      • Define and enforce product quality standards.
      • Standardize a streamlined process with defined roles.
      • Configure management tools to better handle requests.

      Multisource Systems

      PRIORITY 4

      • Manage an Ecosystem Composed of In-House and Outsourced Systems

      Various market and company factors are motivating a review on resource and system sourcing strategies. The right sourcing model provides key skills, resources, and capabilities to meet innovation, time to market, financial, and quality goals of the business. However, organizations struggle with how best to support sourcing partners and to allocate the right number of resources to maximize success.

      Introduction

      A multisource system is an ecosystem of integrated internally and externally developed applications, data, and infrastructure. These technologies can be custom developed, heavily configured vendor solutions, or they may be commercial off-the-shelf (COTS) solutions. These systems can also be developed, supported, and managed by internal staff, in partnership with outsourced contractors, or be completely outsourced. Multisource systems should be configured and orchestrated in a way that maximizes the delivery of specific value drivers for the targeted audience.

      Successfully selecting a sourcing approach is not a simple RFP exercise to choose the lowest cost

      Defining and executing a sourcing approach can be a significant investment and risk because of the close interactions third-party services and partners will have with internal staff, enterprise applications and business capabilities. A careful selection and design is necessary.

      The selection of a sourcing partner is not simple. It involves the detailed inspection and examination of different candidates and matching their fit to the broader vision of the multisource system. In cases where control is critical, technology stack and resource sourcing consolidation to a few vendors and partners is preferred. In other cases, where worker productivity and system flexibility are highly prioritized, a plug-and-play best-of-breed approach is preferred.

      Typical factors involved in sourcing decisions.

      Sourcing needs to be driven by your department and system strategies

      How does the department want to be perceived?

      The image that your applications department and teams want to reflect is frequently dependent on the applications they deliver and support, the resources they are composed of, and the capabilities they provide.

      Therefore, choosing the right sourcing approach should be driven by understanding who the teams are and want to be (e.g. internal builder, an integrator, a plug-in player), what they can or want to do (e.g. custom-develop or implement), and what they can deliver or support (e.g. cloud or on-premises) must be established.

      What value is the system delivering?

      Well-integrated systems are the lifeblood of your organization. They provide the capabilities needed to deliver value to customers, employees, and stakeholders. However, underlying system components may not be sourced under a unified strategy, which can lead to duplicate vendor services and high operational costs.

      The right sourcing approach ensures your partners address key capabilities in your system's delivery and support, and that they are positioned to maximize the value of critical and high-impact components.

      Signals

      Business demand may outpace what vendors can support or offer

      Outsourcing and shifting to a buy-over-build applications strategy are common quick fixes to dealing with capacity and skills gaps. However, these quick fixes often become long-term implementations that are not accounted for in the sourcing selection process. Current application and resource sourcing strategies must be reviewed to ensure that vendor arrangements meet the current and upcoming demands and challenges of the business, customers, and enterprise technologies, such as:

      • Pressure from stakeholders to lower operating costs while maintaining or increasing quality and throughput.
      • Technology lock-in that addresses short-term needs but inhibits long-term growth and maturity.
      • Team capacity and talent acquisition not meeting the needs of the business.
      A circle graph is shown with 42% of the circle coloured in dark brown, with the number 42% in the centre.

      of respondents stated they outsourced software development fully or partly in the last 12 months (2021).

      Source: Coding Sans, 2021.

      A circle graph is shown with 65% of the circle coloured in dark brown, with the number 65% in the centre.

      of respondents stated they were at least somewhat satisfied with the result of outsourcing software development.

      Source: Coding Sans, 2021.

      Drivers

      Business-managed applications

      Employees are implementing and building applications without consulting, notifying, or heeding the advice of IT. IT is often ill-equipped and under-resourced to fight against shadow IT. Instead, organizations are shifting the mindset of "fight shadow IT" to "embrace business-managed applications," using good practices in managing multisource systems. A multisource approach strikes the right balance between user empowerment and centralized control with the solutions and architecture that can best enable it.

      Unique problems to solve

      Point solutions offer features to address unique use cases in uncommon technology environments. However, point solutions are often deployed in siloes with limited integration or overlap with other solutions. The right sourcing strategy accommodates the fragmented nature of point solutions into a broader enterprise system strategy, whether that be:

      • Multisource best of breed – integrate various technologies that provide subsets of the features needed for supporting business functions.
      • Multisource custom – integrate systems built in-house with technologies developed by external organizations.
      • Vendor add-ons and integrations – enhance an existing vendor's offering by using their system add-ons as upgrades, new add-ons, or integrations.

      Vendor services

      Some vendor services in a multisource environment may be redundant, conflicting, or incompatible. Given that multisource systems are regularly changing, it is difficult to identify what services are affected, what would be needed to fill the gap of the removed solution, or which redundant services should be removed.

      A multisource approach motivates the continuous rationalization of your vendor services and partners to determine the right mixture of in-house and outsourced resources, capabilities, and technologies.

      Benefits & Risks

      Benefits

      • Business-Focused Solution
      • Flexibility
      • Cost Optimization

      Multisource systems can be designed to support an employee's ability to select the tools they want and need.

      The environment is architected in a loosely coupled approach to allow applications to be easily added, removed, and modified with minimized impact to other integrated applications.

      Rather than investing in large solutions upfront, applications are adopted when they are needed and are removed when little value is gained. Disciplined application portfolio management is necessary to see the full value of this benefit.

      Risks

      • Manageable Sprawl
      • Policy Adherence
      • Integration & Compatibility

      The increased number and diversity of applications in multisource system environments can overwhelm system managers who do not have an effective application portfolio management practice.

      Fragmented application implementations risk inconsistent adherence to security and other quality policies, especially in situations where IT is not involved.

      Application integration can quickly become tangled, untraceable, and unmanageable because of varying team and vendor preferences for specific integration technologies and techniques.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Enable business-managed applications.

      Create the integrations to enable the easy connection of desired tools to enterprise systems with the appropriate guardrails.

      Maximizing the Return on Technology

      Enhance the functionality of existing applications.

      Complement current application capability gaps with data, features, and services from third-party applications.

      Confidently Shifting to Digital

      Use best-of-breed tools to meet specific digital needs.

      Select the best tools to meet the unique and special functional needs of the digital vision.

      Addressing Competing Priorities

      Agree on a common philosophy on system composition.

      Establish an owner of the multisource system to guide how the system should mature as the organization grows.

      Fostering a Collaborative Culture

      Discuss how applications can work together better in an ecosystem.

      Build committees to discuss how applications can better support each other and drive more value.

      Creating High-Throughput Teams

      Alleviate delivery bottlenecks and issues.

      Leverage third-party sources to fill skills and capacity gaps until a long-term solution can be implemented.

      Recommendations

      Define the goals of your applications department and product vision

      Understanding the applications team's purpose and image is critical in determining how the system they are managing and the skills and capacities they need should be sourced.

      Changing and conflicting definitions of value and goals make it challenging to convey an agreeable strategy of the multisource system. An achievable vision and practical tactics ensure all parties in the multisource system are moving in the same direction.

      Related Research:

      Develop a sourcing partner strategy

      Almost half of all sourcing initiatives do not realize projected savings, and the biggest reason is the choice of partner (Zhang et al., 2018). Making the wrong choice means inferior products, higher costs and the loss of both clients and reputation.

      Choosing the right sourcing partner involves understanding current skills and capacities, finding the right matching partner based on a desired profile, and managing a good working relationship that sees short-term gains and supports long-term goals.

      Related Research:

      Recommendations

      Strengthen enterprise integration practices

      Integration strategies that are focused solely on technology are likely to complicate rather than simplify because little consideration is given on how other systems and processes will be impacted. Enterprise integration needs to bring together business process, applications, and data – in that order.

      Kick-start the process of identifying opportunities for improvement by mapping how applications and data are coordinated to support business activities.

      Related Research:

      Manage your solution architecture and application portfolio

      Haphazardly implementing and integrating applications can generate significant security, performance, and data risks. A well-thought-through solution architecture is essential in laying the architecture quality principles and roadmap on how the multisource system can grow and evolve in a sustainable and maintainable way.

      Good application portfolio management complements the solution architecture as it indicates when low-value and unused applications should be removed to reduce system complexity.

      Related Research:

      Recommendations

      Embrace business-managed applications

      Multisource systems bring a unique opportunity to support the business and end users' desire to implement and develop their own applications. However, traditional models of managing applications may not accommodate the specific IT governance and management practices required to operate business-managed applications:

      • A collaborative and trusting business-IT relationship is key.
      • The role of IT must be reimagined.
      • Business must be accountable for its decisions.

      Related Research:

      CASE STUDY
      Cognizant

      Situation

      • Strives to be primarily an industry-aligned organization that delivers multiple service lines in multiple geographies.
      • Cognizant seeks to carefully consider client culture to create a one-team environment.
      • Value proposition is a consultative approach bringing thought leadership and mutually adding value to the relationship vs. the more traditional order-taker development partner.
      • Wants to share in solution development to facilitate shared successes. Geographic alignment drives knowledge of the client and their challenges, not just about time zone and supportability.
      • Offers one of the largest offshore capabilities in the world, supported by local and nearshore resources to drive local knowledge.
      • Today's clients don't typically want a black box, they are sophisticated and want transparency around the process and solution, to have a partner.
      • Clients do want to know where the work is being delivered from, how it's being done.

      Source: interview with Jay MacIsaac, Cognizant.

      Approach

      • Best relationship comes where teams operate as one.
      • Clients are seeking value, not a development black box.
      • Clients want to have a partner they can engage with, not just an order taker.
      • Want to build a one-team culture with shared goals and deliver business value.
      • Seek a partner that will add to their thinking not echo it.

      Results

      • Cognizant is continuing to deliver double-digit growth and continues to strive for top quartile performance.
      • Growth in the client base has seen the company grow to over 340,000 associates worldwide.

      Digital Organization as a Platform

      PRIORITY 5

      • Create a Common Digital Interface to Access All Products and Services

      A digital platform enables organizations to leverage a flexible, reliable, and scalable foundation to create a valuable DX, ease delivery and management efforts, maximize existing investments, and motivate the broader shift to digital. This approach provides a standard to architect, integrate, configure, and modernize the applications that compose the platform.

      Introduction

      What is digital organization as a platform (DOaaP)?

      Digital organization as a platform (DOaaP) is a collection of integrated digital services, products, applications, and infrastructure that is used as a vehicle to meet and exceed an organization's digital strategies. It often serves as an accessible "place for exchanges of information, goods, or services to occur between producers and consumers as well as the community that interacts
      with said platform" (Watts, 2020).

      DOaaP involves a strategy that paves the way for organizations to be digital. It helps organizations use their assets (e.g. data, processes, products, services) in the most effective ways and become more open to cooperative delivery, usage, and management. This opens opportunities for innovation and cross-department collaborations.

      How is DOaaP described?

      1. Open and Collaborative
        • Open organization: open data, open APIs, transparency, and user participation.
        • Collaboration, co-creation, crowdsourcing, and innovation
      2. Accessible and Connected
        • Digital inclusion
        • Channel ubiquity
        • Integrity and interoperability
        • Digital marketplace
      3. Digital and Programmable
        • Digital identity
        • Policies and processes as code
        • Digital products and services
        • Enabling digital platforms

      Digital organizations follow a common set of principles and practices

      Customer-centricity

      Digital organizations are driven by customer focus, meeting and exceeding customer expectations. It must design its services with a "digital first" principle, providing access through every expected channel and including seamless integration and interoperability with various departments, partners, and third-party services. It also means creating trust in its ability to provide secure services and to keep privacy and ethics as core pillars.

      Leadership, management, and strategies

      Digital leadership brings customer focus to the enterprise and its structures and organizes efficient networks and ecosystems. Accomplishing this means getting rid of silos and a siloed mentality and aligning on a digital vision to design policies and services that are efficient, cost-effective, and provide maximum benefit to the user. Asset sharing, co-creation, and being open and transparent become cornerstones of a digital organization.

      Infrastructure

      Providing digital services across demographics and geographies requires infrastructure, and that in turn requires long-term vision, smart investments, and partnerships with various source partners to create the necessary foundational infrastructure upon which to build digital services.

      Digitization and automation

      Automation and digitization of processes and services, as well as creating digital-first products, lead to increased efficiency and reach of the organization across demographics and geographies. Moreover, by taking a digital-first approach, digital organizations future-proof their services and demonstrate their commitment to stakeholders.

      Enabling platforms

      DOaaP embraces open standards, designing and developing organizational platforms and ecosystems with a cloud-first mindset and sound API strategies. Developer experience must also take center stage, providing the necessary tools and embracing Agile and DevOps practices and culture become prerequisites. Cybersecurity and privacy are central to the digital platform; hence they must be part of the design and development principles and practices.

      Signals

      The business expects support for digital products and services

      Digital transformation continues to be a high-priority initiative for many organizations, and they see DOaaP as an effective way to enable and exploit digital capabilities. However, DOaaP unleashes new strategies, opportunities, and challenges that are elusive or unfamiliar to business leaders. Barriers in current business operating models may limit DOaaP success, such as:

      • Department and functional silos
      • Dispersed, fragmented and poor-quality data
      • Ill-equipped and under-skilled resources to support DOaaP adoption
      • System fragmentation and redundancies
      • Inconsistent integration tactics employed across systems
      • Disjointed user experience leading to low engagement and adoption

      DOaaP is not just about technology, and it is not the sole responsibility of either IT or business. It is the collective responsibility of the organization.

      A circle graph is shown with 47% of the circle coloured in dark blue, with the number 47% in the centre.

      of organizations plan to unlock new value through digital. 50% of organizations are planning major transformation over the next three years.

      Source: Nash Squared, 2022.

      A circle graph is shown with 70% of the circle coloured in dark blue, with the number 70% in the centre.

      of organizations are undertaking digital expansion projects focused on scaling their business with technology. This result is up from 57% in 2021.

      Source: F5 Inc, 2022.

      Drivers

      Unified brand and experience

      Users should have the same experience and perception of a brand no matter what product or service they use. However, fragmented implementation of digital technologies and inconsistent application of design standards makes it difficult to meet this expectation. DOaaP embraces a single design and DX standard for all digital products and services, which creates a consistent perception of your organization's brand and reputation irrespective of what products and services are being used and how they are accessed.

      Accessibility

      Rapid advancement of end-user devices and changes to end-user behaviors and expectations often outpace an organization's ability to meet these requirements. This can make certain organization products and services difficult to find, access and leverage. DOaaP creates an intuitive and searchable interface to all products and services and enables the strategic combination of technologies to collectively deliver more value.

      Justification for modernization

      Many opportunities are left off the table when legacy systems are abstracted away rather than modernized. However, legacy systems may not justify the investment in modernization because their individual value is outweighed by the cost. A DOaaP initiative motivates decision makers to look at the entire system (i.e. modern and legacy) to determine which components need to be brought up to a minimum digital state. The conversation has now changed. Legacy systems should be modernized to increase the collective benefit of the entire DOaaP.

      Benefits & Risks

      Benefits

      • Look & Feel
      • User Adoption
      • Shift to Digital

      A single, modern, customizable interface enables a common look and feel no matter what and how the platform is being accessed.

      Organizations can motivate and encourage the adoption and use of all products and services through the platform and increase the adoption of underused technologies.

      DOaaP motivates and supports the modernization of data, processes, and systems to meet the goals and objectives outlined in the broader digital transformation strategy.

      Risks

      • Data Quality
      • System Stability
      • Ability to Modernize
      • Business Model Change

      Each system may have a different definition of commonly used entities (e.g. customer), which can cause data quality issues when information is shared among these systems.

      DOaaP can stress the performance of underlying systems due to the limitations of some systems to handle increased traffic.

      Some systems cannot be modernized due to cost constraints, business continuity risks, vendor lock-in, legacy and lore, or other blocking factors.

      Limited appetite to make the necessary changes to business operations in order to maximize the value of DOaaP technologies.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent Promote and showcase achievements and successes. Share the valuable and innovative work of your teams across the organization and with the public.
      Maximizing the Return on Technology Increase visibility of underused applications. Promote the adoption and use of all products and services through the platform and use the lessons learned to justify removal, updates or modernizations.
      Confidently Shifting to Digital Bring all applications up to a common digital standard. Define the baseline digital state all applications, data, and processes must be in to maximize the value of the platform.
      Addressing Competing Priorities Map to a holistic platform vision, goals and objectives. Work with relevant stakeholders, teams and end users to agree on a common directive considering all impacted perspectives.
      Fostering a Collaborative Culture Ensure the platform is configured to meet the individual needs of the users. Tailor the interface and capabilities of the platform to address users' functional and personal concerns.
      Creating High-Throughput Teams Abstract the enterprise system to expedite delivery. Use the platform to standardize application system access to simplify platform changes and quicken development and testing.

      Recommendations

      Define your platform vision

      Organizations realize that a digital model is the way to provide more effective services to their customers and end users in a cost-effective, innovative, and engaging fashion. DOaaP is a way to help support this transition.

      However, various platform stakeholders will have different interpretations of and preferences for what this platform is intended to solve, what benefits it is supposed to deliver, and what capabilities it will deliver. A grounded vision is imperative to steer the roadmap and initiatives.

      Related Research:

      Assess and modernize your applications

      Certain applications may not sufficiently support the compatibility, flexibility, and efficiency requirements of DOaaP. While workaround technologies and tactics can be employed to overcome these application challenges, the full value of the DOaaP may not be realized.

      Reviewing the current state of the application portfolio will indicate the functional and value limitations of what DOaaP can provide and an indication of the scope of investment needed to bring applications up to a minimum state.

      Related Research:

      Recommendations

      Understand and evaluate end-user needs

      Technology has reached a point where it's no longer difficult for teams to build functional and valuable digital platforms. Rather, the difficulty lies in creating an interface and platform that people want to use and use frequently.

      While it is important to increase the access and promotion of all products and services, orchestrating and configuring them in a way to deliver a satisfying experience is even more important. Applications teams must first learn about and empathize with the needs of end users.

      Related Research:

      Architect your platform

      Formalizing and constructing DOaaP just for the sake of doing so often results in an initiative that is lengthy and costly and ends up being considered a failure.

      The build and optimization of the platform must be predicated on a thorough understanding of the DOaaP's goals, objectives, and priorities and the business capabilities and process they are meant to support and enable. The appropriate architecture and delivery practices can then be defined and employed.

      Related Research:

      CASE STUDY
      e-Estonia

      Situation

      The digital strategy of Estonia resulted in e-Estonia, with the vision of "creating a society with more transparency, trust, and efficiency." Estonia has addressed the challenge by creating structures, organizations, and a culture of innovation, and then using the speed and efficiency of digital infrastructure, apps, and services. This strategy can reduce or eliminate bureaucracy through transparency and automation.

      Estonia embarked on its journey to making digital a priority in 1994-1996, focusing on a committed investment in infrastructure and digital literacy. With that infrastructure in place, they started providing digital services like an e-banking service (1996), e-tax and mobile parking (2002), and then went full steam ahead with a digital information interoperability platform in 2001, digital identity in 2002, e-health in 2008, and e-prescription in 2010. The government is now strategizing for AI.

      Results

      This image contains the results of the e-Estonia case study results

      Source: e-Estonia

      Practices employed

      The e-Estonia digital government model serves as a reference for governments across the world; this is acknowledged by the various awards it has received, like #2 in "internet freedom," awarded by Freedom House in 2019; #1 on the "digital health index," awarded by the Bertelsmann Foundation in 2019; and #1 on "start-up friendliness," awarded by Index Venture in 2018.

      References

      "15th State of Agile Report." Digital.ai, 2021. Web.
      "2022 HR Trends Report." McLean & Company, 2022.
      "2022: State of Application Strategy Report." F5 Inc, 2022.
      "Are Executives Wearing Rose-Colored Glasses Around Digital Transformation?" Cyara, 2021. Web.
      "Cost of a Data Breach Report 2022." IBM, 2022. Web.
      Dalal, Vishal, et al. "Tech Debt: Reclaiming Tech Equity." McKinsey Digital, Oct. 2020. Web.
      "Differentiating Between Intelligent Automation and Hyperautomation." IBM, 15 October 2021. Web.
      "Digital Leadership Report 2021." Harvey Nash Group, 2021.
      "Digital Leadership Report 2022: The State of Digital." Nash Squared, 2022. Web.
      Gupta, Sunil. "Driving Digital Strategy: A Guide to Reimagining Your Business." Harvard Business Review Press, 2018. Web.
      Haff, Gordon. "State of Application Modernization Report 2022." Konveyor, 2022. Web.
      "IEEE Standard for Software Maintenance: IEEE Std 1219-1998." IEEE Standard for Software Maintenance, 1998. Accessed Dec. 2015.
      "Intelligent Automation." Cognizant, n.d. Web.
      "Kofax 2022: Intelligent Automation Benchmark Study". Kofax, 2021. Web.
      McCann, Leah. "Barco's Virtual Classroom at UCL: A Case Study for the Future of All University Classrooms?" rAVe, 2 July 2020, Web.
      "Proactive Staffing and Patient Prioritization to Decompress ED and Reduce Length of Stay." University Hospitals, 2018. Web.
      "Secrets of Successful Modernization." looksoftware, 2013. Web.
      "State of Software Development." Coding Sans, 2021. Web.
      "The State of Low-Code/No-Code." Creatio, 2021. Web.
      "We Have Built a Digital Society and We Can Show You How." e-Estonia. n.d. Web.
      Zanna. "The 5 Types of Experience Series (1): Brand Experience Is Your Compass." Accelerate in Experience, 9 February 2020. Web.
      Zhang, Y. et al. "Effects of Risks on the Performance of Business Process Outsourcing Projects: The Moderating Roles of Knowledge Management Capabilities." International Journal of Project Management, 2018, vol. 36 no. 4, 627-639.

      Research Contributors and Experts

      This is a picture of Chris Harrington

      Chris Harrington
      Chief Technology Officer
      Carolinas Telco Federal Credit Union

      Chris Harrington is Chief Technology Officer (CTO) of Carolinas Telco Federal Credit Union. Harrington is a proven leader with over 20 years of experience developing and leading information technology and cybersecurity strategies and teams in the financial industry space.

      This is a picture of Benjamin Palacio

      Benjamin Palacio
      Senior Information Technology Analyst County of Placer

      Benjamin Palacio has been working in the application development space since 2007 with a strong focus on system integrations. He has seamlessly integrated applications data across multiple states into a single reporting solution for management teams to evaluate, and he has codeveloped applications to manage billions in federal funding. He is also a CSAC-credentialed IT Executive (CA, USA).

      This is a picture of Scott Rutherford

      Scott Rutherford
      Executive Vice President, Technology
      LGM Financial Services Inc.

      Scott heads the Technology division of LGM Financial Services Inc., a leading provider of warranty and financing products to automotive OEMs and dealerships in Canada. His responsibilities include strategy and execution of data and analytics, applications, and technology operations.

      This is a picture of Robert Willatts

      Robert Willatts
      IT Manager, Enterprise Business Solutions and Project Services
      Town of Newmarket

      Robert is passionate about technology, innovation, and Smart City Initiatives. He makes customer satisfaction as the top priority in every one of his responsibilities and accountabilities as an IT manager, such as developing business applications, implementing and maintaining enterprise applications, and implementing technical solutions. Robert encourages communication, collaboration, and engagement as he leads and guides IT in the Town of Newmarket.

      This is a picture of Randeep Grewal

      Randeep Grewal
      Vice President, Enterprise Applications
      Red Hat

      Randeep has over 25 years of experience in enterprise applications, advanced analytics, enterprise data management, and consulting services, having worked at numerous blue-chip companies. In his most recent role, he is the Vice President of Enterprise Applications at Red Hat. Reporting to the CIO, he is responsible for Red Hat's core business applications with a focus on enterprise transformation, application architecture, engineering, and operational excellence. He previously led the evolution of Red Hat into a data-led company by maturing the enterprise data and analytics function to include data lake, streaming data, data governance, and operationalization of analytics for decision support.

      Prior to Red Hat, Randeep was the director of global services strategy at Lenovo, where he led the strategy using market data to grow Lenovo's services business by over $400 million in three years. Prior to Lenovo, Randeep was the director of advanced analytics at Alliance One and helped build an enterprise data and analytics function. His earlier work includes seven years at SAS, helping SAS become a leader in business analytics, and at KPMG consulting, where he managed services engagements at Fortune 100 companies.

      Minimize the Damage of IT Cost Cuts

      • Buy Link or Shortcode: {j2store}53|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • Average growth rates for Opex and Capex budgets are expected to continue to decline over the next fiscal year.
      • Common “quick-win” cost-cutting initiatives are not enough to satisfy the organization’s mandate.
      • Cost-cutting initiatives often take longer than expected, failing to provide cost savings before the organization’s deadline.
      • Cost-optimization projects often have unanticipated consequences that offset potential cost savings and result in business dissatisfaction.

      Our Advice

      Critical Insight

      • IT costs affect the entire business, not just IT. For this reason, IT must work with the business collaboratively to convey the full implications of IT cost cuts.
      • Avoid making all your cuts at once; phase your cuts by taking into account the magnitude and urgency of your cuts and avoid unintended consequences.
      • Don’t be afraid to completely cut a service if it should not be delivered in the first place.

      Impact and Result

      • Take a value-based approach to cost optimization.
      • Reduce IT spend while continuing to deliver the most important services.
      • Involve the business in the cost-cutting process.
      • Develop a plan for cost cutting that avoids unintended interruptions to the business.

      Minimize the Damage of IT Cost Cuts Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should take a value-based approach to cutting IT costs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand the mandate and take immediate action

      Determine your approach for cutting costs.

      • Minimize the Damage of IT Cost Cuts – Phase 1: Understand the Mandate and Take Immediate Action
      • Cost-Cutting Plan
      • Cost-Cutting Planning Tool

      2. Select cost-cutting initiatives

      Identify the cost-cutting initiatives and design your roadmap.

      • Minimize the Damage of IT Cost Cuts – Phase 2: Select Cost-Cutting Initiatives

      3. Get approval for your cost-cutting plan and adopt change management best practices

      Communicate your roadmap to the business and attain approval.

      • Minimize the Damage of IT Cost Cuts – Phase 3: Get Approval for Your Cost-Cutting Plan and Adopt Change Management Best Practices
      • IT Personnel Engagement Plan
      • Stakeholder Communication Planning Tool
      [infographic]

      Workshop: Minimize the Damage of IT Cost Cuts

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Mandate and Take Immediate Action

      The Purpose

      Determine your cost-optimization stance.

      Build momentum with quick wins.

      Key Benefits Achieved

      Understand the internal and external drivers behind your cost-cutting mandate and the types of initiatives that align with it.

      Activities

      1.1 Develop SMART project metrics.

      1.2 Dissect the mandate.

      1.3 Identify your cost-cutting stance.

      1.4 Select and implement quick wins.

      1.5 Plan to report progress to Finance.

      Outputs

      Project metrics and mandate documentation

      List of quick-win initiatives

      2 Select Cost-Cutting Initiatives

      The Purpose

      Create the plan for your cost-cutting initiatives.

      Key Benefits Achieved

      Choose the correct initiatives for your roadmap.

      Create a sensible and intelligent roadmap for the cost-cutting initiatives.

      Activities

      2.1 Identify cost-cutting initiatives.

      2.2 Select initiatives.

      2.3 Build a roadmap.

      Outputs

      High-level cost-cutting initiatives

      Cost-cutting roadmap

      3 Get Approval for Your Cost-Cutting Plan and Adopt Change Management Best Practices

      The Purpose

      Finalize the cost-cutting plan and present it to the business.

      Key Benefits Achieved

      Attain engagement with key stakeholders.

      Activities

      3.1 Customize your cost-cutting plan.

      3.2 Create stakeholder engagement plans.

      3.3 Monitor cost savings.

      Outputs

      Cost-cutting plan

      Stakeholder engagement plan

      Cost-monitoring plan

      Marketing Management Suite Software Selection Guide

      • Buy Link or Shortcode: {j2store}552|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Selecting and implementing the right MMS platform – one that aligns with your requirements is a significant undertaking.
      • Despite the importance of selecting and implementing the right MMS platform, many organizations struggle to define an approach to picking the most appropriate vendor and rolling out the solution in an effective and cost-efficient manner.
      • IT often finds itself in the unenviable position of taking the fall for an MMS platform that doesn’t deliver on the promise of the MMS strategy.

      Our Advice

      Critical Insight

      • MMS platform selection must be driven by your overall customer experience management strategy. Link your MMS selection to your organization’s CXM framework.
      • Determine what exactly you require from your MMS platform; leverage use cases to help guide selection.
      • Ensure strong points of integration between your MMS and other software such as CRM and POS. Your MMS solution should not live in isolation; it must be part of a wider ecosystem.

      Impact and Result

      • An MMS platform that effectively meets business needs and delivers value.
      • Reduced costs during MMS vendor platform selection and faster time to results after implementation.

      Marketing Management Suite Software Selection Guide Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Marketing Management Suite Software Selection Guide – A deck that walks you through the process of building your business case and selecting the proper MMS platform.

      This blueprint will help you build a business case for selecting the right MMS platform, define key requirements, and conduct a thorough analysis and scan of the current state of the ever-evolving MMS market space.

      • Marketing Management Suite Software Selection Guide Storyboard
      [infographic]

      Further reading

      Marketing Management Suite Software Selection Guide

      Streamline your organizational approach to selecting a right-sized marketing management platform.

      Analyst perspective

      A robustly configured and comprehensive MMS platform is a crucial ingredient to help kick-start your organization's cross-channel and multichannel marketing management initiatives.

      Modern marketing management suites (MMS) are imperative given today's complex, multitiered, and often non-standardized marketing processes. Relying on isolated methods such as lead generation or email marketing techniques for executing key cross-channel and multichannel marketing initiatives is not enough to handle the complexity of contemporary marketing management activities.

      Organizations need to invest in highly customizable and functionally extensive MMS platforms to provide value alongside the marketing value chain and a 360-degree view of the consumer's marketing journey. IT needs to be rigorously involved with the sourcing and implementation of the new MMS tool, and the necessary business units also need to own the requirements and be involved from the initial stages of software selection.

      To succeed with MMS implementation, consider drafting a detailed roadmap that outlines milestone activities for configuration, security, points of integration, and data migration capabilities and provides for ongoing application maintenance and support.

      This is a picture of Yaz Palanichamy

      Yaz Palanichamy
      Senior Research Analyst, Customer Experience Strategy
      Info-Tech Research Group

      Executive summary

      Your Challenge

      • Many organizations struggle with taking a systematic and structured approach to selecting a right-sized marketing management suite (MMS) – an indispensable part of managing an organization's specific and nuanced marketing management needs.
      • Organizations must define a clear-cut strategic approach to investing in a new MMS platform. Exercising the appropriate selection and implementation rigor for a right-sized MMS tool is a critical step in delivering concrete business value to sustain various marketing value chains across the organization.

      Common Obstacles

      • An MMS vendor that is not well aligned to marketing requirements wastes resources and causes an endless cascade of end-user frustration.
      • The MMS market is rapidly evolving, making it difficult for vendors to retain a competitive foothold in the space.
      • IT managers and/or marketing professionals often find themselves in the unenviable position of taking the fall for MMS platforms that fail to deliver on the promise of the overarching marketing management strategy.

      Info-Tech's Approach

      • MMS platform selection must be driven by your overall marketing management strategy. Email marketing techniques, social marketing, and/or lead management strategies are often not enough to satisfy the more sophisticated use cases demanded by increasingly complex customer segmentation levels.
      • For organizations with a large audience or varied product offerings, a well-integrated MMS platform enables the management of various complex campaigns across many channels, product lines, customer segments, and marketing groups throughout the enterprise.

      Info-Tech Insight

      IT must collaborate with marketing professionals and other key stakeholder groups to define a unified vision and holistic outlook for a right-sized MMS platform.

      Info-Tech's methodology for selecting a right-sized marketing management suite platform

      1. Understand Core MMS Features

      2. Build the Business Case & Streamline Requirements

      3. Discover the MMS Market Space & Prepare for Implementation

      Phase Steps

      1. Define MMS Platforms
      2. Classify Table Stakes & Differentiating Capabilities
      3. Explore Trends
      1. Build the Business Case
      2. Streamline the Requirements Elicitation Process for a New MMS Platform
      3. Develop an Inclusive RFP Approach
      1. Discover Key Players in the Vendor Landscape
      2. Engage the Shortlist & Select Finalist
      3. Prepare for Implementation

      Phase Outcomes

      1. Consensus on scope of MMS and key MMS platform capabilities
      1. MMS platform selection business case
      2. Top-level use cases and requirements
      3. Procurement vehicle best practices
      1. Market analysis of MMS platforms
      2. Overview of shortlisted vendors
      3. Implementation considerations

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Understand what a marketing management suite is. Discuss core capabilities and key trends.

      Call #2: Build the business case
      to select a right-sized MMS.

      Call #3: Define your core
      MMS requirements.

      Call #4: Build and sustain procurement vehicle best practices.

      Call #5: Evaluate the MMS vendor landscape and short-list viable options.


      Call #6: Review implementation considerations.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      The MMS procurement process should be broken into segments:

      1. Create a vendor shortlist using this buyer's guide.
      2. Define a structured approach to selection.
      3. Review the contract.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      EXECUTIVE BRIEF

      What are marketing management suite platforms?

      Our Definition: Marketing management suite (MMS) platforms are core enterprise applications that provide a unified set of marketing processes for a given organization and, typically, the capability to coordinate key cross-channel marketing initiatives.

      Key product capabilities for sophisticated MMS platforms include but are not limited to:

      • Email marketing
      • Lead nurturing
      • Social media management
      • Content curation and distribution
      • Marketing reporting and analytics
      • Consistent brand messaging

      Using a robust and comprehensive MMS platform equips marketers with the appropriate tools needed to make more informed decisions around campaign execution, resulting in better targeting, acquisition, and customer retention initiatives. Moreover, such tools can help bolster effective revenue generation and ensure more viable growth initiatives for future marketing growth enablement strategies.

      Info-Tech Insight

      Feature sets are rapidly evolving over time as MMS offerings continue to proliferate in this market space. Ensure that you focus on core components such as customer conversion rates and new lead captures through maintaining well- integrated multichannel campaigns.

      Marketing Management Suite Software Selection Buyer's Guide

      Info-Tech Insight

      A right-sized MMS software selection and procurement decision should involve comprehensive requirements and needs analysis by not just Marketing but also other organizational units such as IT, in conjunction with input suppled from the internal vendor procurement team.

      MMS Software Selection & Vendor Procurement Journey. The three main steps are: Envision the Art of the Possible; Elicit Granular Requirements; Contextualize the MMS Vendor Market Space

      Phase 1

      Understand Core MMS Features

      Phase 1

      Phase 2

      Phase 3

      1.1 Define MMS Platforms

      1.2 Classify Table Stakes & Differentiating Capabilities

      1.3 Explore Trends

      2.1 Build the Business Case

      2.2 Streamline Requirements Elicitation

      2.3 Develop an Inclusive RFP Approach

      3.1 Discover Key Players in the Vendor Landscape

      3.2 Engage the Shortlist & Select Finalist

      3.3 Prepare for Implementation

      This phase will walk you through the following activities:

      • Level-set an understanding of MMS technology.
      • Define which MMS features are table stakes (standard) and which are key differentiating functionalities.
      • Identify the art of the possible in a modern MMS platform from sales, marketing, and service lenses.

      This phase involves the following participants:

      • CMO
      • Digital Marketing Project Manager
      • Marketing Data Analytics Analyst
      • Marketing Management Executive

      What are marketing management suite platforms?

      Our Definition: Marketing management suite (MMS) platforms are core enterprise applications that provide a unified set of marketing processes for a given organization and, typically, the capability to coordinate key cross-channel marketing initiatives.

      Key product capabilities for sophisticated MMS platforms include but are not limited to:

      • Email marketing
      • Lead nurturing
      • Social media management
      • Content curation and distribution
      • Marketing reporting and analytics
      • Consistent brand messaging

      Using a robust and comprehensive MMS platform equips marketers with the appropriate tools needed to make more informed decisions around campaign execution, resulting in better targeting, acquisition, and customer retention initiatives. Moreover, such tools can help bolster effective revenue generation and ensure more viable growth initiatives for future marketing growth enablement strategies.

      Info-Tech Insight

      Feature sets are rapidly evolving over time as MMS offerings continue to proliferate in this market space. Ensure that you focus on core components such as customer conversion rates and new lead captures through maintaining well- integrated multichannel campaigns.

      Marketing through the ages

      Tracing the foundational origins of marketing management practices

      Initial traction for marketing management strategies began with the need to holistically understand the effects of advertising efforts and how the media mix could be best optimized.

      1902

      1920s-1930s

      1942

      1952-1964

      1970s-1990s

      Recognizing the increasing need for focused and professional marketing efforts, the University of Pennsylvania offers the first marketing course, dubbed "The Marketing of Products."

      As broadcast media began to peak, marketers needed to manage a greater number of complex and interspersed marketing channels.

      The introduction of television ads in 1942 offered new opportunities for brands to reach consumers across a growing media landscape. To generate the highest ROI, marketers sought to understand the consumer and focus on more tailored messaging and product personalization. Thus, modern marketing practices were born.

      Following the introduction of broadcast media, marketers had to develop strategies beyond traditional spray-and-pray methods. The first modern marketing measurement concept, "marketing mix," was conceptualized in 1952 and popularized in 1964 by Neil Borden.

      This period marked the digital revolution and the new era of marketing. With the advent of new communications technology and the modern internet, marketing management strategies reached new heights of sophistication. During the early 1990s, search engines emerged to help users navigate the web, leading to early forms of search engine optimization and advertising.

      Where it's going: the future state of marketing management

      1. Increasing Complexity Driving Consumer Purchasing Decisions
        • "The main complexity is dealing with the increasing product variety and changing consumer demands, which is forcing marketers to abandon undifferentiated marketing strategies and even niche marketing strategies and to adopt a mass customization process interacting one-to-one with their customers." – Complexity, 2019
      2. Consumers Seeking More Tailored Brand Personalization
        • Financial Services marketers lead all other industries in AI application adoption, with 37% currently using them (Salesforce, 2019).
      3. The Inclusion of More AI-Enabled Marketing Strategies
        • According to a 2022 Nostro report, 70% of consumers say it is important that brands continue to offer personalized consumer experiences.
      4. Green Marketing
        • Recent studies have shown that up to 80% of all consumers are interested in green marketing strategies (Marketing Schools, 2020).

      Marketing management by the numbers

      Key trends

      6%

      As a continuously growing discipline, marketing management roles are predicted to grow faster than average, at a rate of 6% over the next decade.

      Source: U.S. Bureau of Labor Statistics, 2021

      17%

      While many marketing management vendors offer A/B testing, only 17% of marketers are actively using A/B testing on landing pages to increase conversion rates.

      Source: Oracle, 2022

      70%

      It is imperative that technology and SaaS companies begin to use marketing automation as a core component of their martech strategy to remain competitive. About 70% of technology and SaaS companies are employing integrated martech tools.

      Source: American Marketing Association, 2021

      Understand MMS table stakes features

      Organizations can expect nearly all MMS vendors to provide the following functionality

      Email Marketing

      Lead Nurturing

      Reporting, Analytics, and Marketing KPIs

      Marketing Campaign Management

      Integrational Catalog

      The use of email alongside marketing efforts to promote a business' products and services. Email marketing can be a powerful tool to maintain connections with your audience and ensure sustained brand promotion.

      The process of developing and nurturing relationships with key customer contacts at every major touchpoint in their customer journey. MMS platforms can use automated lead-nurturing functions that are triggered by customer behavior.

      The use of well-defined metrics to help curate, gather, and analyze marketing data to help track performance and improve the marketing department's future marketing decisions and strategies.

      Tools needed for the planning, execution, tracking, and analysis of direct marketing campaigns. Such tools are needed to help gauge your buyers' sentiments toward your company's product offerings and services.

      MMS platforms should generally have a comprehensive open API/integration catalog. Most MMS platforms should have dedicated integration points to interface with various tools across the marketing landscape (e.g. social media, email, SEO, CRM, CMS tools, etc.).

      Identify differentiating MMS features

      While not always deemed must-have functionality, these features may be the deciding factor when choosing between two MMS-focused vendors.

      Digital Asset Management (DAM)

      A DAM can help manage digital media asset files (e.g. photos, audio files, video).

      Customer Data Management

      Customer data management modules help your organization track essential customer information to maximize your marketing results.

      Text-Based Marketing

      Text-based marketing strategy is ideal for any organization primarily focused on coordinating structured and efficient marketing campaigns.

      Customer
      Journey Orchestration

      Customer journey orchestration enables users to orchestrate customer conversations and journeys across the entire marketing value chain.

      AI-Driven Workflows

      AI-powered workflows can help eliminate complexities and allow marketers to automate and optimize tasks across the marketing spectrum.

      Dynamic Segmentation

      Dynamic segmentation to target audience cohorts based on recent actions and stated preferences.

      Advanced Email Marketing

      These include capabilities such as A/B testing, spam filter testing, and detailed performance reporting.

      Ensure you understand the art of the possible across the MMS landscape

      Understanding the trending feature sets that encompass the broader MMS vendor landscape will best equip your organization with the knowledge needed to effectively match today's MMS platforms with your organization's marketing requirements.

      Holistically examine the potential of any MMS solution through three main lenses:

      Data-Driven
      Digital Advertising

      Adapt innovative techniques such as conversational marketing to help collect, analyze, and synthesize crucial audience information to improve the customer marketing experience and pre-screen prospects in a more conscientious manner.

      Next Best Action Marketing

      Next best action marketing (NBAM) is a customer-centric paradigm/marketing technique designed to capture specific information about customers and their individual preferences. Predicting customers' future actions by understanding their intent during their purchasing decisions stage will help improve conversion rates.

      AI-Driven Customer
      Segmentation

      The use of inclusive and innovative AI-based forecast modeling techniques can help more accurately analyze customer data to create more targeted segments. As such, marketing messages will be more accurately tailored to the customer that is reading them.

      Art of the possible: data-driven digital advertising

      CONVERSATIONAL MARKETING INTELLIGENCE

      Are you curious about the measures needed to boost engagement among your client base and other primary target audience groups? Conversational marketing intelligence metrics can help collect and disseminate key descriptive data points across a broader range of audience information.

      AI-DRIVEN CONVERSATIONAL MARKETING DEVICES

      Certain social media channels (e.g. LinkedIn and Facebook) like to take advantage of click-to-Messenger-style applications to help drive meaningful conversations with customers and learn more about their buying preferences. In addition, AI-driven chatbot applications can help the organization glean important information about the customer's persona by asking probing questions about their marketing purchase behaviors and preferences.

      METAVERSE- DRIVEN BRANDING AND ADVERTISING

      One of the newest phenomena in data-driven marketing technology and digital advertising techniques is the metaverse, where users can represent themselves and their brand via virtual avatars to further gamify their marketing strategies. Moreover, brands can create immersive experiences and engage with influencers and established communities and collect a wealth of information about their audience that can help drive customer retention and loyalty.

      Case study

      This is the logos for Gucci and Roblox.

      Metaverse marketing extends the potential for commercial brand development and representation: a deep dive into Gucci's metaverse practice

      INDUSTRY: Luxury Goods Apparel
      SOURCE: Vogue Business

      Challenge

      Beginning with a small, family-owned leather shop known as House of Gucci in Florence, Italy, businessman and fashion designer Guccio Gucci sold saddles, leather bags, and other accessories to horsemen during the 1920s. Over the years, Gucci's offerings have grown to include various other personal luxury goods.

      As consumer preferences have evolved over time, particularly with the younger generation, Gucci's professional marketing teams looked to invest in virtual technology environments to help build and sustain better brand awareness among younger consumer audiences.

      Solution

      In response to the increasing presence of metaverse-savvy gamers on the internet, Gucci began investing in developing its online metaverse presence to bolster its commercial marketing brand there.

      A recent collaboration with Roblox, an online gaming platform that offers virtual experiences, provided Gucci the means to showcase its fashion items using the Gucci Garden – a virtual art installation project for Generation Z consumers, powered by Roblox's VR technology. The Gucci Garden virtual system featured a French-styled garden environment where players could try on and buy Gucci virtual fashion items to dress up their blank avatars.

      Results

      Gucci's disruptive, innovative metaverse marketing campaign project with Roblox is proof of its commitment to tapping new marketing growth channels to showcase the brand to engage new and prospective consumers (e.g. Roblox's player base) across more unique sandboxed/simulation environments.

      The freedom and flexibility in the metaverse environments allows brands such as Gucci to execute a more flexible digital marketing approach and enables them to take advantage of innovative metaverse-driven technologies in the market to further drive their data-driven digital marketing campaigns.

      Art of the possible: next best action marketing (NBAM)

      NEXT BEST ACTION PREDICTIVE MODELING

      To improve conversion propensity, next best action techniques can use predictive modeling methods to help build a dynamic overview of the customer journey. With information sourced from actionable marketing intelligence data, MMS platforms can use NBAM techniques to identify customer needs based on their buying behavior, social media interactions, and other insights to determine what unique set of actions should be taken for each customer.

      MACHINE LEARNING–BASED RECOMMENDER SYSTEMS

      Rules-based recommender systems can help assign probabilities of purchasing behaviors based on the patterns in touchpoints of a customer's journey and interaction with your brand. For instance, a large grocery chain company such as Walmart or Whole Foods will use ML-based recommender systems to decide what coupons they should offer to their customers based on their purchasing history.

      Art of the possible: AI-driven customer segmentation

      MACHINE/DEEP LEARNING (ML/DL) ALGORITHMS

      The inclusion of AI in data analytics helps make customer targeting more accurate
      and meaningful. Organizations can analyze customer data more thoroughly and generate in-depth contextual and descriptive information about the targeted segments. In addition, they can use this information to automate the personalization of marketing campaigns for a specific target audience group.

      UNDERSTANDING CUSTOMER SENTIMENTS

      To greatly benefit from AI-powered customer segmentation, organizations must deploy specialized custom AI solutions to help organize qualitative comments into quantitative data. This approach requires companies to use custom AI models and tools that will analyze customer sentiments and experiences based on data extracted from various touchpoints (e.g. CRM systems, emails, chatbot logs).

      Phase 2

      Build the Business Case and Streamline Requirements

      Phase 1

      Phase 2

      Phase 3

      1.1 Define MMS Platforms

      1.2 Classify Table Stakes & Differentiating Capabilities

      1.3 Explore Trends

      2.1 Build the Business Case

      2.2 Streamline Requirements Elicitation

      2.3 Develop an Inclusive RFP Approach

      3.1 Discover Key Players in the Vendor Landscape

      3.2 Engage the Shortlist & Select Finalist

      3.3 Prepare for Implementation

      This phase will walk you through the following activities:

      • Define and build the business case for the selection of a right-sized MMS platform.
      • Elicit and prioritize granular requirements for your MMS platform.

      This phase involves the following participants:

      • CMO
      • Technical Marketing Analyst
      • Digital Marketing Project Manager
      • Marketing Data Analytics Analyst
      • Marketing Management Executive

      Software Selection Engagement

      5 Advisory Calls over a 5-Week Period to Accelerate Your Selection Process

      Expert analyst guidance over 5 weeks on average to select software and negotiate with the vendor.

      Save money, align stakeholders, speed up the process and make better decisions.

      Use a repeatable, formal methodology to improve your application selection process.

      Better, faster results, guaranteed, included in your membership.

      This is an image of the plan for five advisory calls over a five-week period.

      CLICK HERE to book your Selection Engagement

      Elicit and prioritize granular requirements for your marketing management suite (MMS) platform

      Understanding business needs through requirements gathering is the key to defining everything you need from your software. However, it is an area where people often make critical mistakes.

      Poorly scoped requirements

      Best practices

      • Fail to be comprehensive and miss certain areas of scope.
      • Focus on how the solution should work instead of what it must accomplish.
      • Have multiple levels of detail within the requirements, causing inconsistency and confusion.
      • Drill all the way down to system-level detail.
      • Add unnecessary constraints based on what is done today rather than focusing on what is needed for tomorrow.
      • Omit constraints or preferences that buyers think are obvious.
      • Get a clear understanding of what the system needs to do and what it is expected to produce.
      • Test against the principle of MECE – requirements should be "mutually exclusive and collectively exhaustive."
      • Explicitly state the obvious and assume nothing.
      • Investigate what is sold on the market and how it is sold. Use language that is consistent with that of the market and focus on key differentiators – not table stakes.
      • Contain the appropriate level of detail – the level should be suitable for procurement and sufficient for differentiating vendors.

      Info-Tech Insight
      Poor requirements are the number one reason projects fail. Review Info-Tech's Improve Requirements Gathering blueprint to learn how to improve your requirements analysis and get results that truly satisfy stakeholder needs.

      Info-Tech's approach

      Develop an inclusive and thorough approach to the RFP process

      Identity Need; Define Business requirements; Gain Business Authorization; Perform RFI/RFP; Negotiate Agreement; Purchase Goods and Services; Assess and Measure Performance.

      Info-Tech Insight

      Review Info-Tech's process and understand how you can prevent your organization from leaking negotiation leverage while preventing vendors from taking control of your RFP.

      The Info-Tech difference:

      1. The secret to managing an RFP is to make it as manageable and as thorough as possible. The RFP process should be like any other aspect of business – by developing a standard process. With a process in place, you are better able to handle whatever comes your way, because you know the steps you need to follow to produce a top-notch RFP.
      2. The business then identifies the need for more information about a product/service or determines that a purchase is required.
      3. A team of stakeholders from each area impacted gather all business, technical, legal, and risk requirements. What are the expectations of the vendor relationship post-RFP? How will the vendors be evaluated?
      4. Based on the predetermined requirements, either an RFI or an RFP is issued to vendors with a due date.

      Leverage Info-Tech's Contract Review Service to level the playing field with your shortlisted vendors

      You may be faced with multiple products, services, master service agreements, licensing models, service agreements, and more.
      Use Info-Tech's Contract Review Service to gain insights on your agreements:

      1. Are all key terms included?
      2. Are they applicable to your business?
      3. Can you trust that results will be delivered?
      4. What questions should you be asking from an IT perspective?

      Validate that a contract meets IT's and the business' needs by looking beyond the legal terminology. Use a practical set of questions, rules, and guidance to improve your value for dollar spent.

      This is an image of three screenshots from Info-Tech's Contract Review Service.

      CLICK to BOOK The Contract Review Service

      CLICK to DOWNLOAD Master Contract Review and Negotiation for Software Agreements

      Phase 3

      Discover the MMS Market Space and Prepare for Implementation

      Phase 1

      Phase 2

      Phase 3

      1.1 Define MMS Platforms

      1.2 Classify Table Stakes & Differentiating Capabilities

      1.3 Explore Trends

      2.1 Build the Business Case

      2.2 Streamline Requirements Elicitation

      2.3 Develop an Inclusive RFP Approach

      3.1 Discover Key Players in the Vendor Landscape

      3.2 Engage the Shortlist & Select Finalist

      3.3 Prepare for Implementation

      This phase will walk you through the following activities:

      • Dive into the key players of the MMS vendor landscape.
      • Understand best practices for building a vendor shortlist.
      • Understand key implementation considerations for MMS.

      This phase involves the following participants:

      • CMO
      • Marketing Management Executive
      • Applications Manager
      • Digital Marketing Project Manager
      • Sales Executive
      • Vendor Outreach and Partnerships Manager

      Review your use cases to start your shortlist

      Your Info-Tech analysts can help you narrow down the list of vendors that will meet your requirements.

      Next steps will include:

      1. Reviewing your requirements.
      2. Checking out SoftwareReviews.
      3. Shortlisting your vendors.
      4. Conducting demos and detailed proposal reviews.
      5. Selecting and contracting with a finalist!

      Get to know the key players in the MMS landscape

      The following slides provide a top-level overview of the popular players you will encounter in your MMS shortlisting process.

      This is a series of images of the logos for the companies which will be discussed later in this blueprint.

      Evaluate software category leaders through vendor rankings and awards

      SoftwareReviews

      This is an image of two screenshots from the Data Quadrant Report.

      The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      This is an image of two screenshots from the Emotional Footprint Report.

      The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      SoftwareReviews

      • Fact-based reviews of business software from IT professionals.
      • Product and category reports with state-of-the-art data visualization.
      • Top-tier data quality backed by a rigorous quality assurance process.
      • User-experience insight that reveals the intangibles of working with a vendor.

      CLICK HERE to ACCESS

      Comprehensive software reviews
      to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today's technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Advanced Campaign Management
      • Email Marketing Automation
      • Multichannel Integration

      Areas to Improve:

      • Mobile Marketing Management
      • Advanced Data Segmentation
      • Pricing Sensitivity and Implementation Support Model

      This is an image of SoftwareReviews analysis for Adobe Experience Cloud.

      history

      This is the Logo for Adobe Experience Cloud

      "Adobe Experience Cloud (AEC), formerly Adobe Marketing Cloud (AMC), provides a host of innovative multichannel analytics, social, advertising, media optimization, and content management products (just to name a few). The Adobe Marketing Cloud package allows users with valid subscriptions to download the entire collection and use it directly on their computer with open access to online updates. Organizations that have a deeply ingrained Adobe footprint and have already reaped the benefits of Adobe's existing portfolio of cloud services products (e.g. Adobe Creative Cloud) will find the AEC suite a functionally robust and scalable fit for their marketing management and marketing automation needs.

      However, it is important to note that AEC's pricing model is expensive when compared to other competitors in the space (e.g. Sugar Market) and, therefore, is not as affordable for smaller or mid-sized organizations. Moreover, there is the expectation of a learning curve with the AEC platform. Newly onboarded users will need to spend some time learning how to navigate and work comfortably with AEC's marketing automaton modules. "
      - Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Adobe Experience Cloud Platform pricing is opaque.
      Request a demo.*

      *Info-Tech recommends reaching out to the vendor's internal sales management team for explicit details on individual pricing plans for the Adobe Marketing Cloud suite.

      2021

      Adobe Experience Platform Launch is integrated into the Adobe Experience Platform as a suite of data collection technologies (Experience League, Adobe).

      November 2020

      Adobe announces that it will spend $1.5 billion to acquire Workfront, a provider of marketing collaboration software (TechTarget, 2020).

      September 2018

      Adobe acquires marketing automation software company Marketo (CNBC, 2018).

      June 2018

      Adobe buys e-commerce services provider Magento Commerce from private equity firm Permira for $1.68 billion (TechCrunch, 2018).

      2011

      Adobe acquires DemDex, Inc. with the intention of adding DemDex's audience-optimization software to the Adobe Online Marketing Suite (Adobe News, 2011).

      2009

      Adobe acquires online marketing and web analytics company Omniture for $1.8 billion and integrates its products into the Adobe Marketing Cloud (Zippia, 2022).

      Adobe platform launches in December 1982.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Marketing Workflow Management
      • Advanced Data Segmentation
      • Marketing Operations Management

      Areas to Improve:

      • Email Marketing Automation
      • Marketing Asset Management
      • Process of Creating and/or Managing Marketing Lists

      This is an image of SoftwareReviews analysis for Dynamics 365

      history

      This is the logo for Dynamics 365

      2021

      Microsoft Dynamics 365 suite adds customer journey orchestration as a viable key feature (Tech Target, 2021)

      2019

      Microsoft begins adding to its Dynamics 365 suite in April 2019 with new functionalities such as virtual agents, fraud detection, new mixed reality (Microsoft Dynamics 365 Blog, 2019).

      2017

      Adobe and Microsoft expand key partnership between Adobe Experience Manager and Dynamics 365 integration (TechCrunch, 2017).

      2016

      Microsoft Dynamics CRM paid seats begin growing steadily at more than 2.5x year-over-year (TechCrunch, 2016).

      2016

      On-premises application, called Dynamics 365 Customer Engagement, contains the Dynamics 365 Marketing Management platform (Learn Microsoft, 2023).

      Microsoft Dynamics 365 product suite is released on November 1, 2016.

      "Microsoft Dynamics 365 for Marketing remains a viable option for organizations that require a range of innovative MMS tools that can provide a wealth of functional capabilities (e.g. AI-powered analytics to create targeted segments, A/B testing, personalizing engagement for each customer). Moreover, Microsoft Dynamics 365 for Marketing offers trial options to sandbox their platform for free for 30 days to help users familiarize themselves with the software before buying into the product suite.

      However, ensure that you have the time to effectively train users on implementing the MS Dynamics 365 platform. The platform does not score high on customizability in SoftwareReviews reports. Developers have only a limited ability to modify the core UI, so organizations need to be fully equipped with the knowledge needed to successfully navigate MS-based applications to take full advantage of the platform. For organizations deep in the Microsoft stack, D365 Marketing is a compelling option."
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Dynamics 365
      Marketing

      Dynamics 365
      Marketing (Attachment)

      • Starts from $1,500 per tenant/month*
      • Includes 10,000 contacts, 100,000 interactions, and 1,000 SMS messages
      • For organizations without any other Dynamics 365 application
      • Starts from $750 per tenant/month*
      • Includes 10,000 contacts, 100,000 interactions, and 1,000 SMS messages
      • For organizations with a qualifying Dynamics 365 application

      * Pricing correct as of October 2022. Listed in USD and absent discounts. See pricing on vendor's website for latest information.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Marketing Analytics
      • Marketing Workflow Management
      • Lead Nurturing

      Areas to Improve:

      • Advanced Campaign Management
      • Email Marketing Automation
      • Marketing Segmentation

      This is an image of SoftwareReviews analysis for HubSpot

      history

      This is an image of the Logo for HubSpot

      2022

      HubSpot Marketing Hub releases Campaigns 2.0 module for its Marketing Hub platform (HubSpot, 2022).

      2018


      HubSpot announces the launch of its Marketing Hub Starter platform, a new offering that aims to give growing teams the tools they need to start marketing right (HubSpot Company News, 2018).

      2014

      HubSpot celebrates its first initial public offering on the NYSE market (HubSpot Company News, 2014).

      2013

      HubSpot opens its first international office location in Dublin, Ireland
      (HubSpot News, 2013).

      2010

      Brian Halligan and Dharmesh Shah write "Inbound Marketing," a seminal book that focuses on inbound marketing principles (HubSpot, n.d.).

      HubSpot opens for business in Cambridge, MA, USA, in 2005.

      "HubSpot's Marketing Hub software ranks consistently high in scores across SoftwareReviews reports and remains a strong choice for organizations that want to run successful inbound marketing campaigns that make customers interested and engaged with their business. HubSpot Marketing Hub employs comprehensive feature sets, including the option to streamline ad tracking and management, perform various audience segmentation techniques, and build personalized and automated marketing campaigns.

      However, SoftwareReviews reports indicate end users are concerned that HubSpot Marketing Hub's platform may be slightly overpriced in recent years and not cost effective for smaller and mid-sized companies that are working with a limited budget. Moreover, when it comes to mobile user accessibility reports, HubSpot's Marketing Hub does not directly offer data usage reports in relation to how mobile users navigate various web pages on the customer's website."
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      HubSpot Marketing Hub (Starter Package)

      HubSpot Marketing Hub (Professional Package)

      HubSpot Marketing Hub (Enterprise Package)

      • Starts from $50/month*
      • Includes 1,000 marketing contacts
      • All non-marketing contacts are free, up to a limit of 15 million overall contacts (marketing contacts + non-marketing contracts)
      • Starts from $890/month*
      • Includes 2,000 marketing contacts
      • Onboarding is required for a one-time fee of $3,000
      • Starts from $3600/month*
      • Includes 10,000 marketing contacts
      • Onboarding is required for a one-time fee of $6,000

      *Pricing correct as of October 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Email Marketing Automation
      • Customer Journey Mapping
      • Contacts Management

      Areas to Improve:

      • Pricing Model Flexibility
      • Integrational API Support
      • Antiquated UI/CX Design Elements

      This is an image of SoftwareReviews analysis for Maropost

      history

      This is an image of the Logo for MAROPOST Marketing Cloud

      2022

      Maropost acquires Retail Express, leading retail POS software in Australia for $55M (PRWire, 2022).

      2018


      Maropost develops innovative product feature updates to its marketing cloud platform (e.g. automated social campaign management, event segmentation for mobile apps) (Maropost, 2019).

      2015

      US-based communications organization Success selects Maropost Marketing Cloud for marketing automation use cases (Apps Run The World, 2015).

      2017

      Maropost is on track to become one of Toronto's fastest-growing companies, generating $30M in annual revenue (MarTech Series, 2017).

      2015

      Maropost is ranked as a "High Performer" in the Email Marketing category in a G2 Crowd Grid Report (VentureBeat, 2015).

      Maropost is founded in 2011 as a customer-centric ESP platform.

      Maropost Marketing Cloud – Essential

      Maropost
      Marketing Cloud –Professional

      Maropost
      Marketing Cloud –Enterprise

      • Starts from $279/month*
      • Includes baseline features such as email campaigns, A/B campaigns, transactional emails, etc.
      • Starts from $849/month*
      • Includes additional system functionalities of interest (e.g. mobile keywords, more journeys for marketing automation use cases)
      • Starts from $1,699/month*
      • Includes unlimited number of journeys
      • Upper limit for custom contact fields is increased by 100-150

      *Pricing correct as of October 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Advanced Data Segmentation
      • Marketing Analytics
      • Multichannel Integration

      Areas to Improve:

      • Marketing Operations
        Management
      • Marketing Asset Management
      • Community Marketing Management

      This is an image of SoftwareReviews analysis for Oracle Marketing Cloud.

      history

      This is an image of the Logo for Oracle Marketing Cloud

      2021

      New advanced intelligence capabilities within Oracle Eloqua Marketing Automation help deliver more targeted and personalized messages (Oracle, Marketing Automation documentation).

      2015


      Oracle revamps its marketing cloud with new feature sets, including Oracle ID Graph for cross-platform identification of customers, AppCloud Connect, etc. (Forbes, 2015).

      2014

      Oracle announces the launch of the Oracle Marketing Cloud (TechCrunch, 2014).

      2005

      Oracle acquires PeopleSoft, a company that produces human resource management systems, in 2005 for $10.3B (The Economic Times, 2016).

      1982

      Oracle becomes the first company to sell relational database management software (RDBMS). In 1982 it has revenue of $2.5M (Encyclopedia.com).

      Relational Software, Inc (RSI) – later renamed Oracle Corporation – is founded in 1977.

      "Oracle Marketing Cloud offers a comprehensive interwoven and integrated marketing management solution that can help end users launch cross-channel marketing programs and unify all prospect and customer marketing signals within one singular view. Oracle Marketing Cloud ranks consistently high across our SoftwareReviews reports and sustains top scores in overall customer experience rankings at a factor of 9.0. The emotional sentiment of users interacting with Oracle Marketing Cloud is also highly favorable, with Oracle's Emotional Footprint score at +93.

      Users should be aware that some of the reporting mechanisms and report-generation capabilities may not be as mature as those of some of its competitors in the MMS space (e.g. Salesforce, Adobe). Data exportability also presents a challenge in Oracle Marketing Cloud and requires a lot of internal tweaking between end users of the system to function properly. Finally, pricing sensitivity may be a concern for small and mid-sized organizations who may find Oracle's higher-tiered pricing plans to be out of reach. "
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Oracle Marketing Cloud pricing is opaque.
      Request a demo.*

      *Info-Tech recommends reaching out to the vendor's internal sales management team for explicit details on individual pricing plans for the Adobe Marketing Cloud suite.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Marketing Analytics
      • Advanced Campaign Management
      • Email Marketing Automation
      • Social Media Marketing Management

      Areas to Improve:

      • Community Marketing Management
      • Marketing Operations Management
      • Pricing Sensitivity and Vendor Support Model

      This is an image of SoftwareReviews analysis for Salesforce

      history

      This is an image of the Logo for Salesforce Marketing Cloud

      2022

      Salesforce announces sustainability as a core company value (Forbes, 2022).

      2012



      Salesforce unveils Salesforce Marketing Cloud during Dreamforce 2012, with 90,000 registered attendees (Dice, 2012).

      2009

      Salesforce launches Service Cloud, bringing customer service and support automation features to the market (TechCrunch, 2009).

      2003


      The first Dreamforce event is held at the Westin St. Francis hotel in downtown San Francisco
      (Salesforce, 2020).

      2001


      Salesforce delivers $22.4M in revenue for the fiscal year ending January 31, 2002 (Salesforce, 2020).

      Salesforce is founded in 1999.

      "Salesforce Marketing Cloud is a long-term juggernaut of the marketing management software space and is the subject of many Info-Tech member inquiries. It retains strong composite and customer experience (CX) scores in our SoftwareReviews reports. Some standout features of the platform include marketing analytics, advanced campaign management functionalities, email marketing automation, and customer journey management capabilities. In recent years Salesforce has made great strides in improving the overall user experience by investing in new product functionalities such as the Einstein What-If Analyzer, which helps test how your next email campaign will impact overall customer engagement, triggers personalized campaign messages based on an individual user's behavior, and uses powerful real-time segmentation and sophisticated AI to deliver contextually relevant experiences that inspire customers to act.

      On the downside, we commonly see Salesforce's solutions as costlier than competitors' offerings, and its commercial/sales teams tend to be overly aggressive in marketing its solutions without a distinct link to overarching business requirements. "
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Marketing Cloud Basics

      Marketing Cloud Pro

      Marketing Cloud Corporate

      Marketing Cloud Enterprise

      • Starts at $400*
      • Per org/month
      • Personalized promotional email marketing
      • Starts at $1,250*
      • Per org/month
      • Personalized marketing automation with email solutions
      • Starts at $3,750*
      • Per org/month
      • Personalized cross-channel strategic marketing solutions

      "Request a Quote"

      *Pricing correct as of October 2022. Listed in USD and absent discounts. See pricing on vendor's website for latest information.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Email Marketing Automation
      • Marketing Workflow Management
      • Marketing Analytics

      Areas to Improve:

      • Mobile Marketing Management
      • Marketing Operations Management
      • Advanced Data Segmentation

      This is an image of SoftwareReviews analysis for SAP

      history

      This is an image of the Logo for SAP

      2022

      SAP announces the second cycle of the 2022 SAP Customer Engagement Initiative. (SAP Community Blog, 2022).

      2020

      SAP acquires Austrian cloud marketing company Emarsys (TechCrunch, 2020).

      2015

      SAP Digital for Customer Engagement launches in May 2015 (SAP News, 2015).

      2009

      SAP begins branching out into three markets of the future (mobile technology, database technology, and cloud). SAP acquires some of its competitors (e.g. Ariba, SuccessFactors, Business Objects) to quickly establish itself as a key player in those areas (SAP, n.d.).

      1999

      SAP responds to the internet and new economy by launching its mysap.com strategy (SAP, n.d.).

      SAP is founded In 1972.

      "Over the years, SAP has positioned itself as one of the usual suspects across the enterprise applications market. While SAP has a broad range of capabilities within the CRM and customer experience space, it consistently underperforms in many of our user-driven SoftwareReviews reports for MMS and adjacent areas, ranking lower in MMS product feature capabilities such as email marketing automation and advanced campaign management than other mainstream MMS vendors, including Salesforce Marketing Cloud and Adobe Experience Cloud. The SAP Customer Engagement Marketing platform seems decidedly a secondary focus for SAP, behind its more compelling presence across the enterprise resource planning space.

      If you are approaching an MMS selection from a greenfield lens and with no legacy vendor baggage for SAP elsewhere, experience suggests that your needs will be better served by a vendor that places greater primacy on the MMS aspect of their portfolio."
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      SAP Customer Engagement Marketing pricing is opaque:
      Request a demo.*

      *Info-Tech recommends reaching out to the vendor's internal sales management team for explicit details on individual pricing plans for the Adobe Marketing Cloud suite.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Social Media Automation
      • Email Marketing Automation
      • Marketing Analytics

      Areas to Improve:

      • Ease of Data Integration
      • Breadth of Features
      • Marketing Workflow Management

      b

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Campaign Management
      • Segmentation
      • Email Delivery

      Areas to Improve:

      • Mobile Optimization
      • A/B Testing
      • Content Authoring

      This is an image of SoftwareReviews analysis for ZOHO Campaigns.

      history

      This is an image of the Logo for ZOHO Campaigns

      2021

      Zoho announces CRM-Campaigns sync (Zoho Campaigns Community Learning, 2021).

      2020

      Zoho reaches more than 50M customers in January ( Zippia, n.d.).

      2017

      Zoho launches Zoho One, a comprehensive suite of 40+ applications (Zoho Blog, 2017).

      2012

      Zoho releases Zoho Campaigns (Business Wire, 2012).

      2007

      Zoho expands into the collaboration space with the release of Zoho Docs and Zoho Meetings (Zoho, n.d.).

      2005

      Zoho CRM is released (Zoho, n.d.).

      Zoho platform is founded in 1996.

      "Zoho maintains a long-running repertoire of end-to-end software solutions for business development purposes. In addition to its flagship CRM product, the company also offers Zoho Campaigns, which is an email marketing software platform that enables contextually driven marketing techniques via dynamic personalization, email interactivity, A/B testing, etc. For organizations that already maintain a deep imprint of Zoho solutions, Zoho Campaigns will be a natural extension to their immediate software environment.

      Zoho Campaigns is a great ecosystem play in environments that have a material Zoho footprint. In the absence of an existing Zoho environment, it's prudent to consider other affordable products as well."
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Free Version

      Standard

      Professional

      • Starts at $0*
      • Per user/month billed annually
      • Up to 2,000 contacts
      • 6,000 emails/month
      • Starts at $3.75*
      • Per user/month billed annually
      • Up to 100,000 contacts
      • Advanced email templates
      • SMS marketing
      • Starts at $6*
      • Per user/month billed annually
      • Advanced segmentation
      • Dynamic content

      *Pricing correct as of October 2022. Listed in USD and absent discounts.

      See pricing on vendor's website for latest information.

      Leverage Info-Tech's research to plan and execute your MMS implementation

      Use Info-Tech's three-phase implementation process to guide your planning:

      1. Assess

      2. Prepare

      3. Govern & Course Correct

      Download Info-Tech's Governance and Management of Enterprise Software Implementation
      Establish and execute an end-to-end, agile framework to succeed with the implementation of a major enterprise application.

      Ensure your implementation team has a high degree of trust and communication

      If external partners are needed, dedicate an internal resource to managing the vendor and partner relationships.

      Communication

      Teams must have some type of communication strategy. This can be broken into:

      • Regularity: Having a set time each day to communicate progress and a set day to conduct retrospectives.
      • Ceremonies: Injecting awards and continually emphasizing delivery of value to encourage relationship building and constructive motivation.
      • Escalation: Voicing any concerns and having someone responsible for addressing them.

      Proximity

      Distributed teams create complexity as communication can break down. This can be mitigated by:

      • Location: Placing teams in proximity to eliminate the barrier of geographical distance and time zone differences.
      • Inclusion: Making a deliberate attempt to pull remote team members into discussions and ceremonies.
      • Communication Tools: Having the right technology (e.g. video conference) to help bring teams closer together virtually.

      Trust

      Members should trust other members are contributing to the project and completing their required tasks on time. Trust can be developed and maintained by:

      • Accountability: Having frequent quality reviews and feedback sessions. As work becomes more transparent, people become more accountable.
      • Role Clarity: Having a clear definition of what everyone's role is.

      Selecting a right-sized MMS platform

      This selection guide allows organizations to execute a structured methodology for picking an MMS platform that aligns with their needs. This includes:

      • Alignment and prioritization of key business and technology drivers for an MMS selection business case.
      • Identification of key use cases and requirements for a right-sized MMS platform.
      • A comprehensive market scan of key players in the MMS market space.

      This formal MMS selection initiative will drive business-IT alignment, identify pivotal sales and marketing automation priorities, and thereby allow for the rollout of a streamlined MMS platform that is highly likely to satisfy all stakeholder needs.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Summary of accomplishment

      Knowledge Gained

      • What marketing management is
      • Historical origins of marketing management
      • The future of marketing management
      • Key trends in marketing management suites

      Processes Optimized

      • Requirements gathering
      • RFPs and contract reviews
      • Marketing management suite vendor selection
      • Marketing management platform implementation

      Marketing Management

      • Adobe Experience Cloud
      • Microsoft Dynamics 365 for Marketing
      • HubSpot Marketing Hub
      • Maropost Marketing Cloud
      • Oracle Marketing Cloud

      Vendors Analyzed

      • Salesforce Marketing Cloud
      • SAP
      • Sugar Market
      • Zoho Campaigns

      Related Info-Tech Research

      Select a Marketing Management Suite

      Many organizations struggle with taking a systematic approach to selection that pairs functional requirements with specific marketing workflows, and as a result they choose a marketing management suite (MMS) that is not well aligned to their needs, wasting resources and causing end-user frustration.

      Get the Most Out of Your CRM

      Customer relationship management (CRM) application portfolios are often messy,
      with multiple integration points, distributed data, and limited ongoing end-user training. A properly optimized CRM ecosystem will reduce costs and increase productivity.

      Customer Relationship Management Platform Selection Guide

      Speed up the process to build your business case and select your CRM solution. Despite the importance of CRM selection and implementation, many organizations struggle to define an approach to picking the right vendor and rolling out the solution in an effective and cost-efficient manner.

      Bibliography

      "16 Biggest Tech Acquisitions in History." The Economic Times, 28 July 2016. Web.
      "Adobe Acquires Demdex – Brings Audience Optimization to $109 Billion Global Online Ad Market." Adobe News, 18 Jan 2011. Accessed Nov 2022.
      "Adobe Company History Timeline." Zippia, 9 Sept 2022. Accessed Nov 2022.
      "Adobe to acquire Magento for $1.68B." TechCrunch, 21 May 2018. Accessed Dec 2022.
      Anderson, Meghan Keaney. "HubSpot Launches European Headquarters." HubSpot Company News, 3 Mar 2013.
      Arenas-Gaitán, Jorge, et al. "Complexity of Understanding Consumer Behavior from the Marketing Perspective." Journal of Complexity, vol. 2019, 8 Jan 2019. Accessed Sept 2022.
      Bureau of Labor Statistics. "Advertising, Promotions, and Marketing Managers." Occupational Outlook Handbook. U.S. Department of Labor, 8 Sept 2022. Accessed 1 Nov 2022.
      "Campaigns." Marketing Hub, HubSpot, n.d. Web.
      Conklin, Bob. "Adobe report reveals best marketing practices for B2B growth in 2023 and beyond." Adobe Experience Cloud Blog, 23 Sept 2022. Web.
      "Consumer Behavior Stats 2021: The Post-Pandemic Shift in Online Shopping Habit" Nosto.com, 7 April 2022. Accessed Oct 2022.
      "Data Collection Overview." Experience League, Adobe.com, n.d. Accessed Dec 2022.
      Duduskar, Avinash. "Interview with Tony Chen, CEO at Channel Factory." MarTech Series, 16 June 2017. Accessed Nov 2022.
      "Enhanced Release of SAP Digital for Customer Engagement Helps Anyone Go Beyond CRM." SAP News, 8 Dec. 2015. Press release.
      Fang, Mingyu. "A Deep Dive into Gucci's Metaverse Practice." Medium.com, 27 Feb 2022. Accessed Oct 2022.
      Flanagan, Ellie. "HubSpot Launches Marketing Hub Starter to Give Growing Businesses the Tools They Need to Start Marketing Right." HubSpot Company News, 17 July 2018. Web.
      Fleishman, Hannah. "HubStop Announces Pricing of Initial Public Offering." HubSpot Company News, 8 Oct. 204. Web.
      Fluckinger, Don. "Adobe to acquire Workfront for $1.5 billion." TechTarget, 10 Nov 2020. Accessed Nov 2022.
      Fluckinger, Don. "Microsoft Dynamics 365 adds customer journey orchestration." TechTarget, 2 March 2021. Accessed Nov 2022.
      Green Marketing: Explore the Strategy of Green Marketing." Marketing Schools, 19 Nov 2020. Accessed Oct 2022.
      Ha, Anthony. "Oracle Announces Its Cross-Platform Marketing Cloud." TechCrunch, 30 April 2014. Web.
      Heyd, Kathrin. "Partners Welcome – SAP Customer Engagement Initiative 2022-2 is open for your registration(s)!" SAP Community Blog, 21 June 2022. Accessed Nov 2022.
      HubSpot. "Our Story." HubSpot, n.d. Web.
      Jackson, Felicia. "Salesforce Tackles Net Zero Credibility As It Adds Sustainability As A Fifth Core Value." Forbes, 16 Feb. 2022. Web.
      Kolakowski, Nick. "Salesforce CEO Marc Benioff Talks Social Future." Dice, 19 Sept. 2012. Web.
      Lardinois, Frederic. "Microsoft's Q4 earnings beat Street with $22.6B in revenue, $0.69 EPS." TechCrunch, 19 July 2016. Web.
      Levine, Barry. "G2 Crowd report finds the two email marketing tools with the highest user satisfaction." Venture Beat, 30 July 2015. Accessed Nov 2022.
      Looking Back, Moving Forward: The Evolution of Maropost for Marketing." Maropost Blog, 21 May 2019. Accessed Oct 2022.
      Maher, Sarah. "What's new with HubSpot? Inbound 2022 Feature Releases." Six & Flow, 9 July 2022. Accessed Oct 2022.
      Marketing Automation Provider, Salesfusion, Continues to Help Marketers Achieve Their Goals With Enhanced User Interface and Powerful Email Designer Updates." Yahoo Finance, 10 Dec 2013. Accessed Oct 2022.
      "Maropost Acquires Retail Express for $55 Million+ as it Continues to Dominate the Global Commerce Space." Marapost Newsroom, PRWire.com, 19 Jan 2022. Accessed Nov 2022.
      McDowell, Maghan. "Inside Gucci and Roblox's new virtual world." Vogue Business, 17 May 2021. Web.
      Miller, Ron. "Adobe and Microsoft expand partnership with Adobe Experience Manager and Dynamics 265 Integration." TechCrunch, 3 Nov 2017. Accessed Nov 2022.
      Miller, Ron. "Adobe to acquire Magento for $1.68B" TechCrunch, 21 May 2018. Accessed Nov 2022.
      Miller, Ron. "SAP continues to build out customer experience business with Emarys acquisition." TechCrunch, 1 Oct. 2020. Web.
      Miller, Ron. "SugarCRM moves into marketing automation with Salesfusion acquisition." TechCrunch, 16 May 2019.
      Novet, Jordan. "Adobe confirms it's buying Marketo for $4.75 billion." CNBC, 20 Sept 2018. Accessed Dec 2022.
      "Oracle Corp." Encyclopedia.com, n.d. Web.
      Phillips, James. "April 2019 Release launches with new AI, mixed reality, and 350+ feature updates." Microsoft Dynamics 365 Blog. Microsoft, 2 April 2019. Web.
      S., Aravindhan. "Announcing an important update to Zoho CRM-Zoho Campaigns integration." Zoho Campaigns Community Learning, Zoho, 1 Dec. 2021. Web.
      Salesforce. "The History of Salesforce." Salesforce, 19 March 2020. Web.
      "Salesfusion Integrates With NetSuite CRM to Simplify Sales and Marketing Alignment" GlobeNewswire, 6 May 2016. Accessed Oct 2022. Press release.
      "Salesfusion Integrates With NetSuite CRM to Simplify Sales and Marketing Alignment." Marketwired, 6 May 2016. Web.
      "Salesfusion is Now Sugar Market: The Customer FAQ." SugarCRM Blog, 31 July 2019. Web.
      "Salesfusion's Marketing Automation Platform Drives Awareness and ROI for Education Technology Provider" GlobeNewswire, 25 June 2015. Accessed Nov 2022. Press release.
      SAP. "SAP History." SAP, n.d. Web.
      "State of Marketing." 5th Edition, Salesforce, 15 Jan 2019. Accessed Oct 2022.
      "Success selects Maropost Marketing Cloud for Marketing Automation." Apps Run The World, 10 Jan 2015. Accessed Nov 2022.
      "SugarCRM Acquires SaaS Marketing Automation Innovator Salesfusion." SugarCRM, 16 May 2019. Press release.
      Sundaram, Vijay. "Introducing Zoho One." Zoho Blog, 25 July 2017. Web.
      "The State of MarTech: Is you MarTech stack working for you?" American Marketing Association, 29 Nov 2021. Accessed Oct 2022.
      "Top Marketing Automation Statistics for 2022." Oracle, 15 Jan 2022. Accessed Oct 2022.
      Trefis Team. "Oracle Energizes Its Marketing Cloud With New Features." Forbes, 7 April 2015. Accessed Oct 2022.
      Vivek, Kumar, et al. "Microsoft Dynamics 365 Customer Engagement (on-premises) Help, version 9.x." Learn Dynamics 365, Microsoft, 9 Jan 2023. Web.
      "What's new with HubSpot? Inbound 2022 feature releases" Six and Flow, 9 July 2022. Accessed Nov 2022.
      Widman, Jeff. "Salesforce.com Launches The Service Cloud,, A Customer Service SaaS Application." TechCrunch, 15 Jan. 2009. Web.
      "Zoho History." Zippia, n.d. Web.
      "Zoho Launches Zoho Campaigns." Business Wire, 14 Aug. 2012. Press release.
      Zoho. "About Us." Zoho, n.d. Web.

      Need hands-on assistance?

      Engage Info-Tech for a Software Selection Workshop!

      40 Hours of Advisory Assistance Delivered On-Line or In-Person

      Select Better Software, Faster.

      40 Hours of Expert Analyst Guidance
      Project & Stakeholder Management Assistance
      Save money, align stakeholders, Speed up the process & make better decisions.
      Better, faster results, guaranteed, $25K standard engagement fee

      This is an image of the plan for five advisory calls over a five week period.

      CLICK HERE to book your Workshop Engagement

      Security Strategy

      • Buy Link or Shortcode: {j2store}42|cart{/j2store}
      • Related Products: {j2store}42|crosssells{/j2store}
      • member rating overall impact: 9.4/10
      • member rating average dollars saved: $33,431
      • member rating average days saved: 29
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk

      The challenge

      You may be experiencing one or more of the following:

      • You may not have sufficient security resources to handle all the challenges.
      • Security threats are prevalent. Yet many businesses struggle to embed systemic security thinking into their culture.
      • The need to move towards strategic planning of your security landscape is evident. How to get there is another matter.

      Our advice

      Insight

      To have a successful information security strategy, take these three factors into account:

      • Holistic: your view must include people, processes, and technology.
      • Risk awareness: Base your strategy on the actual risk profile of your company. And then add the appropriate best practices.
      • Business-aligned: When your strategic security plan demonstrates alignment with the business goals and supports it, embedding will go much more straightforward.

      Impact and results 

      • We have developed a highly effective approach to creating your security strategy. We tested and refined this for more than seven years with hundreds of different organizations.
      • We ensure alignment with business objectives.
      • We assess organizational risk and stakeholder expectations.
      • We enable a comprehensive current state assessment.
      • And we prioritize initiatives and build out a right-sized security roadmap.

       

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get up to speed

      Read up on why you should build your customized information security strategy. Review our methodology and understand the four ways we can support you.

      Assess the security requirements

      It all starts with risk appetite, yes, but security is something you want to get right. Determine your organizations' security pressures and business goals, and then determine your security program's goals.

      • Build an Information Security Strategy – Phase 1: Assess Requirements
      • Information Security Requirements Gathering Tool (xls)
      • Information Security Pressure Analysis Tool (xls)

      Build your gap initiative

      Our best-of-breed security framework makes you perform a gap analysis between where you are and where you want to be (your target state). Once you know that, you can define your goals and duties.

      • Build an Information Security Strategy – Phase 2: Assess Gaps
      • Information Security Program Gap Analysis Tool (xls)

      Plan the implementation of your security strategy 

      With your design at this level, it is time to plan your roadmap.

      • Build an Information Security Strategy – Phase 3: Build the Roadmap

      Let it run and continuously improve. 

      Learn to use our methodology to manage security initiatives as you go. Identify the resources you need to execute the evolving strategy successfully.

      • Build an Information Security Strategy – Phase 4: Execute and Maintain
      • Information Security Strategy Communication Deck (ppt)
      • Information Security Charter (doc)

       

      Identify and Build the Data & Analytics Skills Your Organization Needs

      • Buy Link or Shortcode: {j2store}301|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management

      The rapid technological evolution in platforms, processes, and applications is leading to gaps in the skills needed to manage and use data. Some common obstacles that could prevent you from identifying and building the data & analytics skills your organization needs include:

      • Lack of resources and knowledge to secure professionals with the right mix of D&A skills and right level of experience/skills
      • Lack of well-formulated and robust data strategy
      • Underestimation of the value of soft skills

      Our Advice

      Critical Insight

      Skill deficiency is frequently stated as a roadblock to realizing corporate goals for data & analytics. Soft skills and technical skills are complementary, and data & analytics teams need a combination of both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization’s data strategy to ensure the right skills are available at the right time and minimize pertinent risks.

      Impact and Result

      Follow Info-Tech's advice on the roles and skills needed to support your data & analytics strategic growth objectives and how to execute an actionable plan:

      • Define the skills required for each essential data & analytics role.
      • Identify the roles and skills gaps in alignment with your current data strategy.
      • Establish an action plan to close the gaps and reduce risks.

      Identify and Build the Data & Analytics Skills Your Organization Needs Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Build the Data & Analytics Skills Your Organization Needs Deck – Use this research to assist you in identifying and building roles and skills that are aligned with the organization’s data strategy.

      To generate business value from data, data leaders must first understand what skills are required to achieve these goals, identify the current skill gaps, and then develop skills development programs to enhance the relevant skills. Use Info-Tech's approach to identify and fill skill gaps to ensure you have the right skills at the right time.

      • Identify and Build the Data & Analytics Skills Your Organization Needs Storyboard

      2. Data & Analytics Skills Assessment and Planning Tool – Use this tool to help you identify the current and required level of competency for data & analytics skills, analyze gaps, and create an actionable plan.

      Start with skills and roles identified as the highest priority through a high-level maturity assessment. From there, use this tool to determine whether the organization’s data & analytics team has the key role, the right combination of skill sets, and the right level competency for each skill. Create an actionable plan to develop skills and fill gaps.

      • Data & Analytics Skills Assessment and Planning Tool
      [infographic]

      Further reading

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Blending soft skills with deep technical expertise is essential for building successful data & analytics teams.

      Analyst Perspective

      Blending soft skills with deep technical expertise is essential for building successful data & analytics teams.

      In today's changing environment, data & analytics (D&A) teams have become an essential component, and it is critical for organizations to understand the skill and talent makeup of their D&A workforce. Chief data & analytics officers (CDAOs) or other equivalent data leaders can train current data employees or hire proven talent and quickly address skills gaps.

      While developing technical skills is critical, soft skills are often left underdeveloped, yet lack of such skills is most likely why the data team would face difficulty moving beyond managing technology and into delivering business value.

      Follow Info-Tech's methodology to identify and address skills gaps in today's data workplace. Align D&A skills with your organization's data strategy to ensure that you always have the right skills at the right time.

      Ruyi Sun
      Research Specialist,
      Data & Analytics, and Enterprise Architecture
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The rapid technological evolution in platforms, processes, and applications is leading to gaps in the skills needed to manage and use data. Some critical challenges organizations with skills deficiencies might face include:

      • Time loss due to delayed progress and reworking of initiatives
      • Poor implementation quality and low productivity
      • Reduced credibility of data leader and data initiatives

      Common Obstacles

      Some common obstacles that could prevent you from identifying and building the data and analytics (D&A) skills your organization needs are:

      • Lack of resources and knowledge to secure professionals with the right mixed D&A skills and the right experience/skill level
      • Lack of well-formulated and robust data strategy
      • Neglecting the value of soft skills and placing all your attention on technical skills

      Info-Tech's Approach

      Follow Info-Tech's guidance on the roles and skills required to support your D&A strategic growth objectives and how to execute an actionable plan:

      • Define skills required for each essential data and analytics role
      • Identify roles and skills gap in alignment with your current data strategy
      • Establish action plan to close the gaps and reduce risks

      Info-Tech Insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills required by your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      The rapidly changing environment is impacting the nature of work

      Scarcity of data & analytics (D&A) skills

      • Data is one of the most valuable organizational assets, and regardless of your industry, data remains the key to informed decision making. More than 75% of businesses are looking to adopt technologies like big data, cloud computing, and artificial intelligence (AI) in the next five years (World Economic Forum, 2023). As organizations pivot in response to industry disruptions and technological advancements, the nature of work is changing, and the demand for data expertise has grown.
      • Despite an increasing need for data expertise, organizations still have trouble securing D&A roles due to inadequate upskilling programs, limited understanding of the skills required, and more (EY, 2022). Notably, scarce D&A skills have been critical. More workers will need at least a base level of D&A skills to adequately perform their jobs.

      Stock image of a data storage center.

      Organizations struggle to remain competitive when skills gaps aren't addressed

      Organizations identify skills gaps as the key barriers preventing industry transformation:

      60% of organizations identify skills gaps as the key barriers preventing business transformation (World Economic Forum, 2023)

      43% of respondents agree the business area with the greatest need to address potential skills gaps is data analytics (McKinsey & Company, 2020)

      Most organizations are not ready to address potential role disruptions and close skills gaps:

      87% of surveyed companies say they currently experience skills gaps or expect them within a few years (McKinsey & Company, 2020)

      28% say their organizations make effective decisions on how to close skills gaps (McKinsey & Company, 2020)

      Neglecting soft skills development impedes CDOs/CDAOs from delivering value

      According to BearingPoint's CDO survey, cultural challenges and limited data literacy are the main roadblocks to a CDO's success. To drill further into the problem and understand the root causes of the two main challenges, conduct a root cause analysis (RCA) using the Five Whys technique.

      Bar Chart of 'Major Roadblocks to the Success of a CDO' with 'Limited data literacy' at the top.
      (Source: BearingPoint, 2020)

      Five Whys RCA

      Problem: Poor data literacy is the top challenge CDOs face when increasing the value of D&A. Why?

      • People that lack data literacy find it difficult to embrace and trust the organization's data insights. Why?
      • Data workers and the business team don't speak the same language. Why?
      • No shared data definition or knowledge is established. Over-extensive data facts do not drive business outcomes. Why?
      • Leaders fail to understand that data literacy is more than technical training, it is about encompassing all aspects of business, IT, and data. Why?
      • A lack of leadership skills prevents leaders from recognizing these connections and the data team needing to develop soft skills.

      Problem: Cultural challenge is one of the biggest obstacles to a CDO's success. Why?

      • Decisions are made from gut instinct instead of data-driven insights, thus affecting business performance. Why?
      • People within the organization do not believe that data drives operational excellence, so they resist change. Why?
      • Companies overestimate the organization's level of data literacy and data maturity. Why?
      • A lack of strategies in change management, continuous improvement & data literacy for data initiatives. Why?
      • A lack of expertise/leaders possessing these relevant soft skills (e.g. change management, etc.).

      As organizations strive to become more data-driven, most conversations around D&A emphasize hard skills. Soft skills like leadership and change management are equally crucial, and deficits there could be the root cause of the data team's inability to demonstrate improved business performance.

      Data cannot be fully leveraged without a cohesive data strategy

      Business strategy and data strategy are no longer separate entities.

      • For any chief data & analytics officer (CDAO) or equivalent data leader, a robust and comprehensive data strategy is the number one tool for generating measurable business value from data. Data leaders should understand what skills are required to achieve these goals, consider the current skills gap, and build development programs to help employees improve those skills.
      • Begin your skills development programs by ensuring you have a data strategy plan prepared. A data strategy should never be formulated independently from the business. Organizations with high data maturity will align such efforts to the needs of the business, making data a major part of the business strategy to achieve data centricity.
      • Refer to Info-Tech's Build a Robust and Comprehensive Data Strategy blueprint to ensure data can be leveraged as a strategic asset of the organization.

      Diagram of 'Data Strategy Maturity' with two arrangements of 'Data Strategy' and 'Business Strategy'. One is 'Aligned', the other is 'Data Centric.'

      Info-Tech Insight

      The process of achieving data centricity requires alignment between the data and business teams, and that requires soft skills.

      Follow Info-Tech's methodology to identify the roles and skills needed to execute a data strategy

      1. Define Key Roles and Skills

        Digital Leadership Skills, Soft Skills, Technical Skills
        Key Output
        • Defined essential competencies, responsibilities for some common data roles
      2. Uncover the Skills Gap

        Data Strategy Alignment, High-Level Data Maturity Assessment, Skills Gap Analysis
        Key Output
        • Data roles and skills aligned with your current data strategy
        • Identified current and target state of data skill sets
      3. Build an Actionable Plan

        Initiative Priority, Skills Growth Feasibility, Hiring Feasibility
        Key Output
        • Identified action plan to address the risk of data skills deficiency

      Info-Tech Insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      Research benefits

      Member benefits

      • Reduce time spent defining the target state of skill sets.
      • Gain ability to reassess the feasibility of execution on your data strategy, including resources and timeline.
      • Increase confidence in the data leader's ability to implement a successful skills development program that is aligned with the organization's data strategy, which correlates directly to successful business outcomes.

      Business benefits

      • Reduce time and cost spent hiring key data roles.
      • Increase chance of retaining high-quality data professionals.
      • Reduce time loss for delayed progress and rework of initiatives.
      • Optimize quality of data initiative implementation.
      • Improve data team productivity.

      Insight summary

      Overarching insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      Phase 1 insight

      Technological advancements will inevitably require new technical skills, but the most in-demand skills go beyond mastering the newest technologies. Soft skills are essential to data roles as the global workforce navigates the changes of the last few years.

      Phase 2 insight

      Understanding and knowing your organization's data maturity level is a prerequisite to assessing your current skill and determining where you must align in the future.

      Phase 3 insight

      One of the misconceptions that organizations have includes viewing skills development as a one-time effort. This leads to underinvestment in data team skills, risk of falling behind on technological changes, and failure to connect with business partners. Employees must learn to continuously adapt to the changing circumstances of D&A.

      While the program must be agile and dynamic to reflect technological improvements in the development of technical skills, the program should always be anchored in soft skills because data management is fundamentally about interaction, collaboration, and people.

      Tactical insight

      Seeking input and support across your business units can align stakeholders to focus on the right data analytics skills and build a data learning culture.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is four to six calls over the course of two to three months.

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3

      Call #1: Understand common data & analytics roles and skills, and your specific objectives and challenges. Call #2: Assess the current data maturity level and competency of skills set. Identify the skills gap. Call #3: Identify the relationship between current initiatives and capabilities. Initialize the corresponding roadmap for the data skills development program.

      Call #4: (follow-up call) Touching base to follow through and ensure that benefits have received.

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 1

      Define Key Roles and Skills

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 1.1 Review D&A Skill & Role List in Data & Analytics Assessment and Planning Tool

      This phase involves the following participants:

      • Data leads

      Key resources for your data strategy: People

      Having the right role is a key component for executing effective data strategy.

      D&A Common Roles

      • Data Steward
      • Data Custodian
      • Data Owner
      • Data Architect
      • Data Modeler
      • Artificial Intelligence (AI) and Machine Learning (ML) Specialist
      • Database Administrator
      • Data Quality Analyst
      • Security Architect
      • Information Architect
      • System Architect
      • MDM Administrator
      • Data Scientist
      • Data Engineer
      • Data Pipeline Developer
      • Data Integration Architect
      • Business Intelligence Architect
      • Business Intelligence Analyst
      • ML Validator

      AI and ML Specialist is projected to be the fastest-growing occupation in the next five years (World Economic Forum, 2023).

      While tech roles take an average of 62 days to fill, hiring a senior data scientist takes 70.5 days (Workable, 2019). Start your recruitment cycle early for this demand.

      D&A Leader Roles

      • Chief Data Officer (CDO)/Chief Data & Analytics Officer (CDAO)
      • Data Governance Lead
      • Data Management Lead
      • Information Security Lead
      • Data Quality Lead
      • Data Product Manager
      • Master Data Manager
      • Content and Record Manager
      • Data Literacy Manager

      CDOs act as impactful change agents ensuring that the organization's data management disciplines are running effectively and meeting the business' data needs. Only 12.0% of the surveyed organizations reported having a CDO as of 2012. By 2022, this percentage had increased to 73.7% (NewVantage Partners, 2022).

      Sixty-five percent of respondents said lack of data literacy is the top challenge CDOs face today (BearingPoint, 2020). It has become imperative for companies to consider building a data literacy program which will require a dedicated data literacy team.

      Key resources for your data strategy: Skill sets

      Distinguish between the three skills categories.

      • Soft Skills

        Soft skills are described as power skills regarding how you work, such as teamwork, communication, and critical thinking.
      • Digital Leadership Skills

        Not everyone working in the D&A field is expected to perform advanced analytical tasks. To thrive in increasingly data-rich environments, however, every data worker, including leaders, requires a basic technological understanding and skill sets such as AI, data literacy, and data ethics. These are digital leadership skills.
      • Technical Skills

        Technical skills are the practical skills required to complete a specific task. For example, data scientists and data engineers require programming skills to handle and manage vast amounts of data.

      Info-Tech Insight

      Technological advancements will inevitably require new technical skills, but the most in-demand skills go beyond mastering the newest technologies. Soft skills are essential to data roles as the global workforce navigates the changes of the last few years.

      Soft skills aren't just nice to have

      They're a top asset in today's data workplace.

      Leadership

      • Data leaders with strong leadership abilities can influence the organization's strategic execution and direction, support data initiatives, and foster data cultures. Organizations that build and develop leadership potential are 4.2 times more likely to financially outperform those that do not (Udemy, 2022).

      Business Acumen

      • The process of deriving conclusions and insights from data is ultimately utilized to improve business decisions and solve business problems. Possessing business acumen helps provide the business context and perspectives for work within data analytics fields.

      Critical Thinking

      • Critical thinking allows data leaders at every level to objectively assess a problem before making judgment, consider all perspectives and opinions, and be able to make decisions knowing the ultimate impact on results.

      Analytical Thinking

      • Analytical thinking remains the most important skill for workers in 2023 (World Economic Forum, 2023). Data analytics expertise relies heavily on analytical thinking, which is the process of breaking information into basic principles to analyze and understand the logic and concepts.

      Design Thinking & Empathy

      • Design thinking skills help D&A professionals understand and prioritize the end-user experience to better inform results and assist the decision-making process. Organizations with high proficiency in design thinking are twice as likely to be high performing (McLean & Company, 2022).

      Learning Focused

      • The business and data analytics fields continue to evolve rapidly, and the skills, especially technical skills, must keep pace. Learning-focused D&A professionals continuously learn, expanding their knowledge and enhancing their techniques.

      Change Management

      • Change management is essential, especially for data leaders who act as change agents developing and enabling processes and who assist others with adjusting to changes with cultural and procedural factors. Organizations with high change management proficiency are 2.2 times more likely to be high performing (McLean & Company, 2022).

      Resilience

      • Being motivated and adaptable is essential when facing challenges and high-pressure situations. Organizations highly proficient in resilience are 1.8 times more likely to be high performing (McLean & Company, 2022).

      Managing Risk & Governance Mindset

      • Risk management ability is not limited to highly regulated institutions. All data workers must understand risks from the larger organizational perspective and have a holistic governance mindset while achieving their individual goals and making decisions.

      Continuous Improvement

      • Continuously collecting feedback and reflecting on it is the foundation of continuous improvement. To uncover and track the lessons learned and treat them as opportunities, data workers must be able to discover patterns and connections.

      Teamwork & Collaboration

      • Value delivery in a data-centric environment is a team effort, requiring collaboration across the business, IT, and data teams. D&A experts with strong collaborative abilities can successfully work with other teams to achieve shared objectives.

      Communication & Active Listening

      • This includes communicating with relevant stakeholders about timelines and expectations of data projects and associated technology and challenges, paying attention to data consumers, understanding their requirements and needs, and other areas of interest to the organization.

      Technical skills for everyday excellence

      Digital Leadership Skills

      • Technological Literacy
      • Data and AI Literacy
      • Cloud Computing Literacy
      • Data Ethics
      • Data Translation

      Data & Analytics Technical Competencies

      • Data Mining
      • Programming Languages (Python, SQL, R, etc.)
      • Data Analysis and Statistics
      • Computational and Algorithmic Thinking
      • AI/ML Skills (Deep Learning, Computer Vision, Natural Language Processing, etc.)
      • Data Visualization and Storytelling
      • Data Profiling
      • Data Modeling & Design
      • Data Pipeline (ETL/ELT) Design & Management
      • Database Design & Management
      • Data Warehouse/Data Lake Design & Management

      1.1 Review D&A Skill & Role List in the Data & Analytics Assessment and Planning Tool

      Sample of Tab 2 in the Data & Analytics Assessment and Planning Tool.

      Tab 2. Skill & Role List

      Objective: Review the library of skills and roles and customize them as needed to align with your organization's language and specific needs.

      Download the Data & Analytics Assessment and Planning Tool

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 2

      Uncover the Skills Gap

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 2.1 High-level assessment of your present data management maturity
      • 2.2 Interview business and data leaders to clarify current skills availability
      • 2.3 Use the Data & Analytics Assessment and Planning Tool to Identify your skills gaps

      This phase involves the following participants:

      • Data leads
      • Business leads and subject matter experts (SMEs)
      • Key business stakeholders

      Identify skills gaps across the organization

      Gaps are not just about assigning people to a role, but whether people have the right skill sets to carry out tasks.

      • Now that you have identified the essential skills and roles in the data workplace, move to Phase 2. This phase will help you understand the required level of competency, assess where the organization stands today, and identify gaps to close.
      • Using the Data & Analytics Assessment and Planning Tool, start with areas that are given the highest priority through a high-level maturity assessment. From there, three levels of gaps will be found: whether people are assigned to a particular position, the right combination of D&A skill sets, and the right competency level for each skill.
      • Lack of talent assigned to a position

      • Lack of the right combination of D&A skill sets

      • Lack of appropriate competency level

      Info-Tech Insight

      Understanding your organization's data maturity level is a prerequisite to assessing the skill sets you have today and determining where you need to align in the future.

      2.1 High-level assessment of your present data management maturity

      Identifying and fixing skills gaps takes time, money, and effort. Focus on bridging the gap in high-priority areas.

      Input: Current state capabilities, Use cases (if applicable), Data culture diagnostic survey results (if applicable)
      Output: High-level maturity assessment, Prioritized list of data management focused area
      Materials: Data Management Assessment and Planning Tool (optional), Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Objectives:

      Prioritize these skills and roles based on your current maturity levels and what you intend to accomplish with your data strategy.

      Steps:

      1. (Optional Step) Refer to the Build a Robust and Comprehensive Data Strategy blueprint. You can assess your data maturity level using the following frameworks and methods:
        • Review current data strategy and craft use cases that represent high-value areas that must be addressed for their teams or functions.
        • Use the data culture assessment survey to determine your organization's data maturity level.
      2. (Optional Step) Refer to the Create a Data Management Roadmap blueprint and Data Management Assessment and Planning Tool to dive deep into understanding and assessing capabilities and maturity levels of your organization's data management enablers and understanding your priority areas and specific gaps.
      3. If you have completed Data Management Assessment and Planning Tool, fill out your maturity level scores for each of the data management practices within it - Tab 3 (Current-State Assessment). Skip Tab 4 (High-Level Maturity Assessment).
      4. If you have not yet completed Data Management Assessment and Planning Tool, skip Tab 3 and continue with Tab 4. Assign values 1 to 3 for each capability and enabler.
      5. You can examine your current-state data maturity from a high level in terms of low/mid/high maturity using either Tabs 3 or 4.
      6. Suggested focus areas along the data journey:
        • Low Maturity = Data Strategy, Data Governance, Data Architecture
        • Mid Maturity = Data Literacy, Information Management, BI and Reporting, Data Operations Management, Data Quality Management, Data Security/Risk Management
        • High Maturity = MDM, Data Integration, Data Product and Services, Advanced Analytics (ML & AI Management).

      Download the Data & Analytics Assessment and Planning Tool

      2.2 Interview business and data leaders to clarify current skills availability

      1-2 hours per interview

      Input: Sample questions targeting the activities, challenges, and opportunities of each unit
      Output: Identified skills availability
      Materials: Whiteboard/Flip charts, Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Instruction:

      1. Conduct a deep-dive interview with each key data initiative stakeholder (data owners, SMEs, and relevant IT/Business department leads) who can provide insights on the skill sets of their team members, soliciting feedback from business and data leaders about skills and observations of employees as they perform their daily tasks.
      2. Populate a current level of competency for each skill in the Data & Analytics Assessment and Planning Tool in Tabs 5 and 6. Having determined your data maturity level, start with the prioritized data management components (e.g. if your organization sits at low data maturity level, start with identifying relevant positions and skills under data governance, data architecture, and data architecture elements).
      3. More detailed instructions on how to utilize the workbook are at the next activity.

      Key interview questions that will help you :

      1. Do you have personnel assigned to the role? What are their primary activities? Do the personnel possess the soft and technical skills noted in the workbook? Are you satisfied with their performance? How would you evaluate their degree of competency on a scale of "vital, important, nice to have, or none"? The following aspects should be considered when making the evaluation:
        • Key Performance Indicators (KPIs): Business unit data will show where the organization is challenged and will help identify potential areas for development.
        • Project Management Office: Look at successful and failed projects for trends in team traits and competencies.
        • Performance Reviews: Look for common themes where employees excel or need to improve.
        • Focus Groups: Speak with a cross section of employees to understand their challenges.
      2. What technology is currently used? Are there requirements for new technology to be bought and/or optimized in the future? Will the workforce need to increase their skill level to carry out these activities with the new technology in place?

      Download the Data & Analytics Assessment and Planning Tool

      2.3 Use the Data & Analytics Assessment and Planning Tool to identify skills gaps

      1-3 hours — Not everyone needs the same skill levels.

      Input: Current skills competency, Stakeholder interview results and findings
      Output: Gap identification and analysis
      Materials: Data & Analytics Assessment and Planning Tool
      Participants: Data leads

      Instruction:

      1. Select your organization's data maturity level in terms of Low/Mid/High in cell A6 for both Tab 5 (Soft Skills Assessment) and Tab 6 (Technical Skills Assessment) to reduce irrelevant rows.
      2. Bring together key business stakeholders (data owners, SMEs, and relevant IT custodians) to determine whether the data role exists in the organization. If yes, assign a current-state value from “vital, important, nice to have, or none” for each skill in the assessment tool. Info-Tech has specified the desired/required target state of each skill set.
      3. Once you've assigned the current-state values, the tool will automatically determine whether there is a gap in skill set.

      Download the Data & Analytics Assessment and Planning Tool

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 3

      Build an Actionable Plan

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 3.1 Use the Data & Analytics Assessment and Planning Tool to build your actionable roadmap

      This phase involves the following participants:

      • Data leads
      • Business leads and subject matter experts (SMEs)
      • Key business stakeholders

      Determine next steps and decision points

      There are three types of internal skills development strategies

      • There are three types of internal skills development strategies organizations can use to ensure the right people with the right abilities are placed in the right roles: reskill, upskill, and new hire.
      1. Reskill

        Reskilling involves learning new skills for a different or newly defined position.
      2. Upskill

        Upskilling involves building a higher level of competency in skills to improve the worker's performance in their current role.
      3. New hire

        New hire involves hiring workers who have the essential skills to fill the open position.

      Info-Tech Insight

      One of the misconceptions that organizations have includes viewing skills development as a one-time effort. This leads to underinvestment in data team skills, risk of falling behind on technological changes, and failure to connect with business partners. Employees must learn to continuously adapt to the changing circumstances of D&A. While the program must be agile and dynamic to reflect technological improvements in the development of technical skills, the program should always be anchored in soft skills because data management is fundamentally about interaction, collaboration, and people.

      How to determine when to upskill, reskill, or hire to meet your skills needs

      Reskill

      Reskilling often indicates a change in someone's career path, so this decision requires a goal aligned with both individuals and the organization to establish a mutually beneficial situation.

      When making reskilling decisions, organizations should also consider the relevance of the skill for different positions. For example, data administrators and data architects have similar skill sets, so reskilling is appropriate for these employees.

      Upskill

      Upskilling tends to focus more on the soft skills necessary for more advanced positions. A data strategy lead, for example, might require design thinking training, which enables leaders to think from different perspectives.

      Skill growth feasibility must also be considered. Some technical skills, particularly those involving cutting-edge technologies, require continual learning to maintain operational excellence. For example, a data scientist may require AI/ML skills training to incorporate use of modern automation technology.

      New Hire

      For open positions and skills that are too resource-intensive to reskill or upskill, it makes sense to recruit new employees. Consider, however, time and cost feasibility of hiring. Some positions (e.g. senior data scientist) take longer to fill. To minimize risks, coordinate with your HR department and begin recruiting early.

      Data & Analytics skills training

      There are various learning methods that help employees develop priority competencies to achieve reskilling or upskilling.

      Specific training

      The data team can collaborate with the human resources department to plan and develop internal training sessions aimed at specific skill sets.

      This can also be accomplished through external training providers such as DCAM, which provides training courses on data management and analytics topics.

      Formal education program

      Colleges and universities can equip students with data analytics skills through formal education programs such as MBAs and undergraduate or graduate degrees in Data Science, Machine Learning, and other fields.

      Certification

      Investing time and effort to obtain certifications in the data & analytics field allows data workers to develop skills and gain recognition for continuous learning and self-improvement.

      AWS Data Analytics and Tableau Data Scientist Certification are two popular data analytics certifications.

      Online learning from general providers

      Some companies offer online courses in various subjects. Coursera and DataCamp are two examples of popular providers.

      Partner with a vendor

      The organization can partner with a vendor who brings skills and talents that are not yet available within the organization. Employees can benefit from the collaboration process by familiarizing themselves with the project and enhancing their own skills.

      Support from within your business

      The data team can engage with other departments that have previously done skills development programs, such as Finance and Change & Communications, who may have relevant resources to help you improve your business acumen and change management skills.

      Info-Tech Insight

      Seeking input and support across your business units can align stakeholders to focus on the right data analytics skills and build a data learning culture.

      Data & Analytics skills reinforcement

      Don't assume learners will immediately comprehend new knowledge. Use different methods and approaches to reinforce their development.

      Innovation Space

      • Skills development is not a one-time event, but a continuous process during which innovation should be encouraged. A key aspect of being innovative is having a “fail fast” mentality, which means collecting feedback, recognizing when something isn't working, encouraging experimentation, and taking a different approach with the goal of achieving operational excellence.
      • Human-centered design (HCD) also yields innovative outcomes with a people-first focus. When creating skills development programs for various target groups, organizations should integrate a human-centered approach.

      Commercial Lens

      • Exposing people to a commercial way of thinking can add long-term value by educating people to act in the business' best interest and raising awareness of what other business functions contribute. This includes concepts such as project management, return on investment (ROI), budget alignment, etc.

      Checklists/Rubrics

      • Employees should record what they learn so they can take the time to reflect. A checklist is an effective technique for establishing objectives, allowing measurement of skills development and progress.

      Buddy Program

      • A buddy program helps employees gain and reinforce knowledge and skills they have learned through mutual support and information exchange.

      Align HR programs to support skills integration and talent recruitment

      With a clear idea of skills needs and an executable strategy for training and reinforcing of concepts, HR programs and processes can help the data team foster a learning environment and establish a recruitment plan. The links below will direct you to blueprints produced by McLean & Company, a division of Info-Tech Research Group.

      Workforce Planning

      When integrating the skills of the future into workforce planning, determine the best approach for addressing the identified talent gaps – whether to build, buy, or borrow.

      Integrate the future skills identified into the organization's workforce plan.

      Talent Acquisition

      In cases where employee development is not feasible, the organization's talent acquisition strategy must focus more on buying or borrowing talent. This will impact the TA process. For example, sourcing and screening must be updated to reflect new approaches and skills.

      If you have a talent acquisition strategy, assess how to integrate the new roles/skills into recruiting.

      Competencies/Succession Planning

      Review current organizational core competencies to determine if they need to be modified. New skills will help inform critical roles and competencies required in succession talent pools.

      If no competency framework exists, use McLean & Company's Develop a Comprehensive Competency Framework blueprint.

      Compensation

      Evaluate modified and new roles against the organization's compensation structure. Adjust them as necessary. Look at market data to understand compensation for new roles and skills.

      Reassess your base pay structure according to market data for new roles and skills.

      Learning and Development

      L&D plays a huge role in closing the skills gap. Build L&D opportunities to support development of new skills in employees.

      Design an Impactful Employee Development Program to build the skills employees need in the future.

      3.1 Use the Data & Analytics Assessment and Planning Tool to build an actionable plan

      1-3 hours

      Input: Roles and skills required, Key decision points
      Output: Actionable plan
      Materials: Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Instruction:

      1. On Tab 7 (Next Steps & Decision Points), you will find a list of tasks that correspond to roles that where there is a skills gap.
      2. Customize this list of tasks initiatives according to your needs.
      3. The Gantt chart, which will be generated automatically after assigning start and finish dates for each activity, can be used to structure your plan and guarantee that all the main components of skills development are addressed.

      Sample of Tab 7 in the Data & Analytics Assessment and Planning Tool.

      Download the Data & Analytics Assessment and Planning Tool

      Related Info-Tech Research

      Sample of the Create a Data Management Roadmap blueprint.

      Create a Data Management Roadmap

      • This blueprint will help you design a data management practice that will allow your organization to use data as a strategic enabler.

      Stock image of a person looking at data dashboards on a tablet.

      Build a Robust and Comprehensive Data Strategy

      • Put a strategy in place to ensure data is available, accessible, well-integrated, secured, of acceptable quality, and suitably visualized to fuel organization-wide decision making. Start treating data as strategic and corporate asset.

      Sample of the Foster Data-Driven Culture With Data Literacy blueprint.

      Foster Data-Driven Culture With Data Literacy

      • By thoughtfully designing a data literacy training program appropriate to the audience's experience, maturity level, and learning style, organizations build a data-driven and engaged culture that helps them unlock their data's full potential and outperform other organizations.

      Research Authors and Contributors

      Authors:

      Name Position Company
      Ruyi Sun Research Specialist Info-Tech Research Group

      Contributors:

      Name Position Company
      Steve Wills Practice Lead Info-Tech Research Group
      Andrea Malick Advisory Director Info-Tech Research Group
      Annabel Lui Principal Advisory Director Info-Tech Research Group
      Sherwick Min Technical Counselor Info-Tech Research Group

      Bibliography

      2022 Workplace Learning Trends Report.” Udemy, 2022. Accessed 20 June 2023.

      Agrawal, Sapana, et al. “Beyond hiring: How companies are reskilling to address talent gaps.” McKinsey & Company, 12 Feb. 2020. Accessed 20 June 2023.

      Bika, Nikoletta. “Key hiring metrics: Useful benchmarks for tech roles.” Workable, 2019. Accessed 20 June 2023.

      Chroust, Tomas. “Chief Data Officer – Leaders of data-driven enterprises.” BearingPoint, 2020. Accessed 20 June 2023.

      “Data and AI Leadership Executive Survey 2022.” NewVantage Partners, Jan 2022. Accessed 20 June 2023.

      Dondi, Marco, et al. “Defining the skills citizens will need in the future world of work.” McKinsey & Company, June 2021. Accessed 20 June 2023.

      Futschek, Gerald. “Algorithmic Thinking: The Key for Understanding Computer Science.” Lecture Notes in Computer Science, vol. 4226, 2006.

      Howard, William, et al. “2022 HR Trends Report.” McLean & Company, 2022. Accessed 20 June 2023.

      “Future of Jobs Report 2023.” World Economic Forum, May 2023. Accessed 20 June 2023.

      Knight, Michelle. “What is Data Ethics?” Dataversity, 19 May 2021. Accessed 20 June 2023.

      Little, Jim, et al. “The CIO Imperative: Is your technology moving fast enough to realize your ambitions?” EY, 22 Apr. 2022. Accessed 20 June 2023.

      “MDM Roles and Responsibilities.” Profisee, April 2019. Accessed 20 June 2023.

      “Reskilling and Upskilling: A Strategic Response to Changing Skill Demands.” TalentGuard, Oct. 2019. Accessed 20 June 2023.

      Southekal, Prashanth. “The Five C's: Soft Skills That Every Data Analytics Professional Should Have.” Forbes, 17 Oct. 2022. Accessed 20 June 2023.

      Leading Through Uncertainty Workshop Overview

      • Buy Link or Shortcode: {j2store}474|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $123,999 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Leadership Development Programs
      • Parent Category Link: /leadership-development-programs

      As the world around us changes there is a higher risk that IT productivity and planned priorities will be derailed.

      Our Advice

      Critical Insight

      To meet the challenges of uncertainty head on IT leaders must adapt so their employees are supported and IT departments continue to operate successfully.

      Impact and Result

      • Clearly define and articulate the current and future priorities to provide direction and cultivate hope for the future.
      • Recognize and manage your own reactions to be conscious of how you are showing up and the perceptions others may have.
      • Incorporate the 4Cs of Leading Through Uncertainty into your leadership practice to make sense of the situation and lead others through it.
      • Build tactics to connect with your employees that will ensure employee engagement and productivity.

      Leading Through Uncertainty Workshop Overview Research & Tools

      Start here – read the Workshop Overview

      Read our concise Workshop Overview to find out how this program can support IT leaders when managing teams through uncertain times.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Leading Through Uncertainty (LTU) Workshop Overview
      [infographic]

      Measure IT Project Value

      • Buy Link or Shortcode: {j2store}431|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $5,549 Average $ Saved
      • member rating average days saved: 6 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • People treat benefits as a box to tick on the business case, deflating or inflating them to facilitate project approval.
      • Even if benefits are properly defined, they are usually forgotten once the project is underway.
      • Subsequent changes to project scope may impact the viability of the project’s business benefits, resulting in solutions that do not deliver expected value.

      Our Advice

      Critical Insight

      • It is rare for project teams or sponsors to be held accountable for managing and/or measuring benefits. The assumption is often that no one will ask if benefits have been realized after the project is closed.
      • The focus is largely on the project’s schedule, budget, and scope, with little attention paid to the value that the project is meant to deliver to the organization.
      • Without an objective stakeholder to hold people accountable for defining benefits and demonstrating their delivery, benefits will continue to be treated as red tape.
      • Sponsors will not take the time to define benefits properly, if at all. The project team will not take the time to ensure they are still achievable as the project progresses. When the project is complete, no one will investigate actual project success.

      Impact and Result

      • The project sponsor and business unit leaders must own project benefits; IT is only accountable for delivering the solution.
      • IT can play a key role in this process by establishing and supporting a benefits realization process. They can help business unit leaders and sponsors define benefits properly, identify meaningful metrics, and report on benefits realization effectively.
      • The project management office is ideally suited to facilitate this process by providing tools and templates, and a consistent and comparable view across projects.
      • Project managers are accountable for delivering the project, not for delivering the benefits of the project itself. However, they must ensure that changes to project scope are assessed for impact on benefits viability.

      Measure IT Project Value Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should establish a benefits legitimacy practice, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish benefits legitimacy during portfolio Intake

      This phase will help you define a benefits management process to help support effective benefits definition during portfolio intake.

      • Deliver Project Value With a Benefits Legitimacy Initiative – Phase 1: Establish Benefits Legitimacy During Portfolio Intake
      • Project Sponsor Role Description Template
      • Benefits Commitment Form Template
      • Right-Sized Business Case Template

      2. Maintain benefits legitimacy throughout project planning and execution

      This phase will help you define a process for effective benefits management during project planning and the execution intake phase.

      • Deliver Project Value With a Benefits Legitimacy Initiative – Phase 2: Maintain Benefits Legitimacy Throughout Project Planning and Execution
      • Project Benefits Documentation Workbook
      • Benefits Legitimacy Workflow Template (PDF)
      • Benefits Legitimacy Workflow Template (Visio)

      3. Close the deal on project benefits

      This phase will help you define a process for effectively tracking and reporting on benefits realization post-project.

      • Deliver Project Value With a Benefits Legitimacy Initiative – Phase 3: Close the Deal on Project Benefits
      • Portfolio Benefits Tracking Tool
      • Benefits Lag Report Template
      • Benefits Legitimacy Handbook Template
      [infographic]

      Workshop: Measure IT Project Value

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Analyze the Current State of Benefits Management

      The Purpose

      Assess the current state of benefits management at your organization and establish a realistic target state.

      Establish project and portfolio baselines for benefits management.

      Key Benefits Achieved

      Set achievable workshop goals and align stakeholder expectations.

      Establish a solid foundation for benefits management success.

      Activities

      1.1 Introductions and overview.

      1.2 Discuss attendee expectations and goals.

      1.3 Complete Info-Tech’s PPM Current State Scorecard.

      1.4 Perform right-wrong-confusing-missing analysis.

      1.5 Define target state for benefits management.

      1.6 Refine project levels.

      Outputs

      Info-Tech’s PPM Current State Scorecard report

      Right-wrong-confusing-missing analysis

      Stakeholder alignment around workshop goals and target state

      Info-Tech’s Project Intake Classification Matrix

      2 Establish Benefits Legitimacy During Portfolio Intake

      The Purpose

      Establish organizationally specific benefit metrics and KPIs.

      Develop clear roles and accountabilities for benefits management.

      Key Benefits Achieved

      An articulation of project benefits and measurements.

      Clear checkpoints for benefits communication during the project are defined.

      Activities

      2.1 Map the current portfolio intake process.

      2.2 Establish project sponsor responsibilities and accountabilities for benefits management.

      2.3 Develop organizationally specific benefit metrics and KPIs.

      2.4 Integrate intake legitimacy into portfolio intake processes.

      Outputs

      Info-Tech’s Project Sponsor Role Description Template

      Info-Tech’s Benefits Commitment Form Template

      Intake legitimacy process flow and RASCI chart

      Intake legitimacy SOP

      3 Maintain Benefits Legitimacy Throughout Project Planning and Execution

      The Purpose

      Develop a customized SOP for benefits management during project planning and execution.

      Key Benefits Achieved

      Ensure that all changes to the project have been recorded and benefits have been updated in preparation for deployment.

      Updated benefits expectations are included in the final sign-off package.

      Activities

      3.1 Map current project management process and audit project management documentation.

      3.2 Identify appropriate benefits control points.

      3.3 Customize project management documentation to integrate benefits.

      3.4 Develop a deployment legitimacy process flow.

      Outputs

      Customized project management toolkit

      Info-Tech’s Project Benefits Documentation Workbook

      Deployment of legitimacy process flow and RASCI chart

      Deployment of legitimacy SOP

      4 Close the Deal on Project Benefits

      The Purpose

      Develop a post-project benefits realization process.

      Key Benefits Achieved

      Clear project sponsorship accountabilities for post-project benefits tracking and reporting.

      A portfolio level benefits tracking tool for reporting on benefits attainment.

      Activities

      4.1 Identify appropriate benefits control points in the post-project process.

      4.2 Configure Info-Tech’s Portfolio Benefits Tracking Tool.

      4.3 Define a post-project benefits reporting process.

      4.4 Formalize protocol for reporting on, and course correcting, benefit lags.

      4.5 Develop a post-project legitimacy process flow.

      Outputs

      Info-Tech’s Portfolio Benefits Tracking Tool

      Post-Project legitimacy process flow and RASCI chart

      Post-Project Legitimacy SOP

      Info-Tech’s Benefits Legitimacy Handbook

      Info-Tech’s Benefits Legitimacy Workflow Template

      Satisfy Customer Requirements for Information Security

      • Buy Link or Shortcode: {j2store}259|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $247 Average $ Saved
      • member rating average days saved: 3 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements.
      • Responding to these assurance demands requires ever more effort from the security team, which distracts them from their primary mission of protecting the organization.
      • Every customer seems to have their own custom security questionnaire they want you to complete, increasing the effort you have to expend to respond to them.

      Our Advice

      Critical Insight

      • Your security program can be a differentiator and help win and retain customers.
      • Value rank your customers to right-size the level of effort your security team dedicates to responding to questionnaires.
      • SOC 2 or ISO 27001 certification can be an important part of your security marketing, but only if you make the right business case.

      Impact and Result

      • CISOs need to develop a marketing strategy for their information security program.
      • Ensure that your security team dedicates the appropriate amount of effort to sales by value ranking your potential customers and aligning efforts to value.
      • Develop a business case for SOC 2 or ISO 27001 to determine if certification makes sense for your organization, and to gain support from key stakeholders.

      Satisfy Customer Requirements for Information Security Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should proactively satisfy customer requirements for information security, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Manage customer expectations for information security

      Identify your customers’ expectations for security and privacy, value rank your customers to right-size your efforts, and learn how to impress them with your information security program.

      • Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

      2. Select a certification path

      Decide whether to obtain SOC 2 or ISO 27001 certification, and build a business case for certification.

      • Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path
      • Security Certification Selection Tool
      • Security Certification Business Case Tool

      3. Obtain and maintain certification

      Develop your certification scope, prepare for the audit, and learn how to maintain your certification over time.

      • Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification
      [infographic]

      Mitigate Machine Bias

      • Buy Link or Shortcode: {j2store}343|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $9,549 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy
      • AI is the new electricity. It is fundamentally and radically changing the fabric of our world, from the way we conduct business, to how we work and live, make decisions, and engage with each other, to how we organize our society, and ultimately, to who we are. Organizations are starting to adopt AI to increase efficiency, better engage customers, and make faster, more accurate decisions.
      • Like with any new technology, there is a flip side, a dark side, to AI – machine biases. If unchecked, machine biases replicate, amplify, and systematize societal biases. Biased AI systems may treat some of your customers (or employees) differently, based on their race, gender, identity, age, etc. This is discrimination, and it is against the law. It is also bad for business, including missed opportunities, lost consumer confidence, reputational risk, regulatory sanctions, and lawsuits.

      Our Advice

      Critical Insight

      • Machine biases are not intentional. They reflect the cognitive biases, preconceptions, and judgement of the creators of AI systems and the societal structures encoded in the data sets used for machine learning.
      • Machine biases cannot be prevented or fully eliminated. Early identification and diversity in and by design are key. Like with privacy and security breaches, early identification and intervention – ideally at the ideation phase – is the best strategy. Forewarned is forearmed. Prevention starts with a culture of diversity, inclusivity, openness, and collaboration.
      • Machine bias is enterprise risk. Machine bias is not a technical issue. It is a social, political, and business problem. Integrate it into your enterprise risk management (ERM).

      Impact and Result

      • Just because machine biases are induced by human behavior, which is also captured in data silos, they are not inevitable. By asking the right questions upfront during application design, you can prevent many of them.
      • Biases can be introduced into an AI system at any stage of the development process, from the data you collect, to the way you collect it, to which algorithms are used, to which assumptions are made, etc. Ask your data science team a lot of questions; leave no stone unturned.
      • Don’t wait until “Datasheets for Datasets” and “Model Cards for Model Reporting” (or similar frameworks) become standards. Start creating these documents now to identify and analyze biases in your apps. If using open-source data sets or libraries, you may need to create them yourself for now. If working with partners or using AI/ ML services, demand that they provide such information as part of the engagement. You, not your partners, are ultimately responsible for the AI-powered product or service you deliver to your customers or employees.
      • Build a culture of diversity, transparency, inclusivity, and collaboration – the best mechanism to prevent and address machine biases.
      • Treat machine bias as enterprise risk. Use your ERM to guide all decisions around machine biases and their mitigation.

      Mitigate Machine Bias Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand the dark side of AI: algorithmic (machine) biases, how they emerge, why they are dangerous, and how to mitigate them. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand AI biases

      Learn about machine biases, how and where they arise in AI systems, and how they relate to human cognitive and societal biases.

      • Mitigate Machine Bias – Phase 1: Understand AI Biases

      2. Identify data biases

      Learn about data biases and how to mitigate them.

      • Mitigate Machine Bias – Phase 2: Identify Data Biases
      • Datasheets for Data Sets Template
      • Datasheets for Datasets

      3. Identify model biases

      Learn about model biases and how to mitigate them.

      • Mitigate Machine Bias – Phase 3: Identify Model Biases
      • Model Cards for Model Reporting Template
      • Model Cards For Model Reporting

      4. Mitigate machine biases and risk

      Learn about approaches for proactive and effective bias prevention and mitigation.

      • Mitigate Machine Bias – Phase 4: Mitigate Machine Biases and Risk
      [infographic]

      Workshop: Mitigate Machine Bias

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Prepare

      The Purpose

      Understand your organization’s maturity with respect to data and analytics in order to maximize workshop value.

      Key Benefits Achieved

      Workshop content aligned to your organization’s level of maturity and business objectives.

      Activities

      1.1 Execute Data Culture Diagnostic.

      1.2 Review current analytics strategy.

      1.3 Review organization's business and IT strategy.

      1.4 Review other supporting documentation.

      1.5 Confirm participant list for workshop.

      Outputs

      Data Culture Diagnostic report.

      2 Understand Machine Biases

      The Purpose

      Develop a good understanding of machine biases and how they emerge from human cognitive and societal biases. Learn about the machine learning process and how it relates to machine bias.

      Select an ML/AI project and complete a bias risk assessment.

      Key Benefits Achieved

      A solid understanding of algorithmic biases and the need to mitigate them.

      Increased insight into how new technologies such as ML and AI impact organizational risk.

      Customized bias risk assessment template.

      Completed bias risk assessment for selected project.

      Activities

      2.1 Review primer on AI and machine learning (ML).

      2.2 Review primer on human and machine biases.

      2.3 Understand business context and objective for AI in your organization.

      2.4 Discuss selected AI/ML/data science project or use case.

      2.5 Review and modify bias risk assessment.

      2.6 Complete bias risk assessment for selected project.

      Outputs

      Bias risk assessment template customized for your organization.

      Completed bias risk assessment for selected project.

      3 Identify Data Biases

      The Purpose

      Learn about data biases: what they are and where they originate.

      Learn how to address or mitigate data biases.

      Identify data biases in selected project.

      Key Benefits Achieved

      A solid understanding of data biases and how to mitigate them.

      Customized Datasheets for Data Sets Template.

      Completed datasheet for data sets for selected project.

      Activities

      3.1 Review machine learning process.

      3.2 Review examples of data biases and why and how they happen.

      3.3 Identify possible data biases in selected project.

      3.4 Discuss “Datasheets for Datasets” framework.

      3.5 Modify Datasheets for Data Sets Template for your organization.

      3.6 Complete datasheet for data sets for selected project.

      Outputs

      Datasheets for Data Sets Template customized for your organization.

      Completed datasheet for data sets for selected project.

      4 Identify Model Biases

      The Purpose

      Learn about model biases: what they are and where they originate.

      Learn how to address or mitigate model biases.

      Identify model biases in selected project.

      Key Benefits Achieved

      A solid understanding of model biases and how to mitigate them.

      Customized Model Cards for Model Reporting Template.

      Completed model card for selected project.

      Activities

      4.1 Review machine learning process.

      4.2 Review examples of model biases and why and how they happen.

      4.3 Identify potential model biases in selected project.

      4.4 Discuss Model Cards For Model Reporting framework.

      4.5 Modify Model Cards for Model Reporting Template for your organization.

      4.6 Complete model card for selected project.

      Outputs

      Model Cards for Model Reporting Template customized for your organization.

      Completed model card for selected project.

      5 Create Mitigation Plan

      The Purpose

      Review mitigation approach and best practices to control machine bias.

      Create mitigation plan to address machine biases in selected project. Align with enterprise risk management (ERM).

      Key Benefits Achieved

      A solid understanding of the cultural dimension of algorithmic bias prevention and mitigation and best practices.

      Drafted plan to mitigate machine biases in selected project.

      Activities

      5.1 Review and discuss lessons learned.

      5.2 Create mitigation plan to address machine biases in selected project.

      5.3 Review mitigation approach and best practices to control machine bias.

      5.4 Identify gaps and discuss remediation.

      Outputs

      Summary of challenges and recommendations to systematically identify and mitigate machine biases.

      Plan to mitigate machine biases in selected project.

      Build a Chatbot Proof of Concept

      • Buy Link or Shortcode: {j2store}532|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $9,566 Average $ Saved
      • member rating average days saved: 7 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Implement a chatbot proof of concept mapped to business needs.
      • Scale up customer service delivery in a cost-effective manner.
      • Objectively measure the success of the chatbot proof of concept with metrics-based data.
      • Choose the ticket categories to build during your chatbot proof of concept.

      Our Advice

      Critical Insight

      • Build your chatbot to create business value. Whether it is increasing service or resource efficiency, keep the goal of value in mind when making decisions with your proof of concept.

      Impact and Result

      • When implemented effectively, chatbots can help save costs, generate new revenue, and ultimately increase customer satisfaction for both external- and internal-facing customers.

      Build a Chatbot Proof of Concept Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a chatbot proof of concept, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Form your chatbot strategy

      Build action-based metrics to measure the success of your chatbot proof of concept.

      • Chatbot ROI Calculator
      • Chatbot POC Metrics Tool

      2. Build your chatbot foundation

      Put business value first to architect your chatbot before implementation.

      • Chatbot Conversation Tree Library (Visio)
      • Chatbot Conversation Tree Library (PDF)

      3. Continually improve your chatbot

      Continue to grow your chatbot beyond the proof of concept.

      • Chatbot POC RACI
      • Chatbot POC Implementation Roadmap
      • Chatbot POC Communication Plan
      [infographic]

      Workshop: Build a Chatbot Proof of Concept

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build Your Strategy

      The Purpose

      Build your strategy.

      Key Benefits Achieved

      Calculate your chatbot’s ROI to determine its success.

      Organize your chatbot proof of concept (POC) metrics to keep the project on track.

      Objectively choose chatbot ticket categories.

      Activities

      1.1 Customize your chatbot ROI calculator.

      1.2 Choose your proof of concept ticket categories.

      1.3 Design chatbot metrics to measure success.

      Outputs

      Chatbot ROI Calculator

      Chatbot POC Implementation Roadmap

      Chatbot POC Metrics Tool

      2 Architect Your Chatbot

      The Purpose

      Architect your chatbot.

      Key Benefits Achieved

      Design your integrations with business value in mind.

      Begin building chatbot decision trees.

      Activities

      2.1 List and map your chatbot integrations.

      2.2 Build your conversation tree library.

      Outputs

      Chatbot Integration Map

      Chatbot Conversation Tree Library

      3 Architect Your Chatbot Conversations

      The Purpose

      Architect your chatbot conversations.

      Key Benefits Achieved

      Detail your chatbot conversations in the decision trees.

      Activities

      3.1 Build your conversation tree library.

      Outputs

      Chatbot Conversation Tree Library

      4 Continually Grow Your Chatbot

      The Purpose

      Continually grow your chatbot.

      Key Benefits Achieved

      Identify talent for chatbot support.

      Create an implementation plan.

      Activities

      4.1 Outline the support responsibilities for your chatbot.

      4.2 Build a communication plan.

      Outputs

      Chatbot POC RACI

      Chatbot POC Communication Plan

      Cybersecurity Priorities in Times of Pandemic

      • Buy Link or Shortcode: {j2store}381|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • Novel coronavirus 2019 (COVID-19) has thrown organizations around the globe into chaos as they attempt to continue operations while keeping employees safe.
      • IT needs to support business continuity – juggling available capacity and ensuring that services are available to end users – without clarity of duration, amid conditions that change daily, on a scale never seen before.
      • Security has never been more important than now. But…where to start? What are the top priorities? How do we support remote work while remaining secure?

      Our Advice

      Critical Insight

      • There is intense pressure to enable employees to work remotely, as soon as possible. IT is scrambling to enable access, source equipment to stage, and deploy products to employees, many of whom are unfamiliar with working from home.
      • There is either too much security to allow people to be productive or too little security to ensure that the organization remains protected and secure.
      • These events are unprecedented, and no plan currently exists to sufficiently maintain a viable security posture during this interim new normal.

      Impact and Result

      • Don’t start from scratch. Leverage your current security framework, processes, and mechanisms but tailor them to accommodate the new way of remote working.
      • Address priority security items related to remote work capability and its implications in a logical sequence. Some security components may not be as time sensitive as others.
      • Remain diligent! Circumstances may have changed, but the importance of security has not. In fact, IT security is likely more important now than ever before.

      Cybersecurity Priorities in Times of Pandemic Research & Tools

      Start here – read our Cybersecurity Priorities research.

      Our recommendations and the accompanying checklist tool will help you quickly get a handle on supporting a remote workforce while maintaining security in your organization.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Cybersecurity Priorities in Times of Pandemic Storyboard
      • Cybersecurity Priorities Checklist Tool
      [infographic]

      Modernize Your Applications

      • Buy Link or Shortcode: {j2store}178|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Application modernization is essential to stay competitive and productive in today’s digital environment. Your stakeholders have outlined their digital business goals that IT is expected to meet.
      • Your application portfolio cannot sufficiently support the flexibility and efficiency the business needs because of legacy challenges.
      • Your teams do not have a framework to illustrate, communicate, and justify the modernization effort and organizational changes in the language your stakeholders understand.

      Our Advice

      Critical Insight

      • Build your digital applications around continuous modernization. End-user needs, technology, business direction, and regulations rapidly change in today’s competitive and fast-paced industry. This reality will quickly turn your modern applications into shelfware. Build continuous modernization at the center of your digital application vision to keep up with evolving business, end-user, and IT needs.
      • Application modernization is organizational change management. If you build and modernize it, they may not come. The crux of successful application modernization is centered on the strategic, well-informed, and onboarded adoption of changes in key business areas, capabilities, and processes. Organizational change management must be front and center so that applications are fit for purpose and are something that end users want and need to use.
      • Business-IT collaboration is not optional. Application modernization will not be successful if your lines of business (LOBs) and IT are not working together. IT must empathize how LOBs operate and proactively support the underlying operational systems. LOBs must be accountable for all products leveraging modern technologies and be able to rationalize the technical feasibility of their digital application vision.

      Impact and Result

      • Establish the digital application vision. Gain a grounded understanding of the digital application construct and prioritize these attributes against your digital business goals.
      • Define your modernization approach. Obtain a thorough view of your business and technical complexities, risks, and impacts. Employ the right modernization techniques based on your organization’s change tolerance.
      • Build your roadmap. Clarify the organizational changes needed to support modernization and adoption of your digital applications.

      Modernize Your Applications Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should strategically modernize your applications, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Set your vision

      Describe your application vision and set the right modernization expectations with your stakeholders.

      • Modernize Your Applications – Phase 1: Set Your Vision

      2. Identify your modernization opportunities

      Focus your modernization efforts on the business opportunities that your stakeholders care about.

      • Modernize Your Applications – Phase 2: Identify Your Modernization Opportunities

      3. Plan your modernization

      Describe your modernization initiatives and build your modernization tactical roadmap.

      • Modernize Your Applications – Phase 3: Plan Your Modernization
      [infographic]

      Workshop: Modernize Your Applications

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Set Your Vision

      The Purpose

      Discuss the goals of your application modernization initiatives

      Define your digital application vision and priorities

      List your modernization principles

      Key Benefits Achieved

      Clear application modernization objectives and high priority value items

      Your digital application vision and attributes

      Key principles that will guide your application modernization initiatives

      Activities

      1.1 State Your Objectives

      1.2 Characterize Your Digital Application

      1.3 Define Your Modernization Principles

      Outputs

      Application modernization objectives

      Digital application vision and attributes definitions

      List of application modernization principles and guidelines

      2 Identify Your Modernization Opportunities

      The Purpose

      Identify the value streams and business capabilities that will benefit the most from application modernization

      Conduct a change tolerance assessment

      Build your modernization strategic roadmap

      Key Benefits Achieved

      Understanding of the value delivery improvements modernization can bring

      Recognizing the flexibility and tolerance of your organization to adopt changes

      Select an approach that best fits your organization’s goals and capacity

      Activities

      2.1 Identify the Opportunities

      2.2 Define Your Modernization Approach

      Outputs

      Value streams and business capabilities that are ideal modernization opportunities

      Your modernization strategic roadmap based on your change tolerance and modernization approach

      3 Plan Your Modernization

      The Purpose

      Identify the most appropriate modernization technique and the scope of changes to implement your techniques

      Develop an actionable tactical roadmap to complete your modernization initiatives

      Key Benefits Achieved

      Clear understanding of what must be changed to the organization and application considering your change tolerance

      An achievable modernization plan

      Activities

      3.1 Shortlist Your Modernization Techniques

      3.2 Roadmap Your Modernization Initiatives

      Outputs

      Scope of your application modernization initiatives

      Your modernization tactical roadmap

      The State of Black Professionals in Tech

      • Buy Link or Shortcode: {j2store}550|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • The experience of Black professionals in IT differs from their colleagues.
      • Job satisfaction is also lower for Black IT professionals.
      • For organizations to gain from the benefits of diversity, equity, and inclusion, they need to ensure they understand the landscape for many Black professionals.

      Our Advice

      Critical Insight

      • As an IT leader, you can make a positive difference in the working lives of your team; this is not just the domain of HR.
      • Employee goals can vary depending on the barriers that they encounter. IT leaders must ensure they have an understanding of unique employee needs to better support them, increasing their ability to recruit and retain.
      • Improve the experience of Black IT professionals by ensuring your organization has diversity in leadership and supports mentorship and sponsorship.

      Impact and Result

      • Use the data from Info-Tech’s analysis to inform your DEI strategy.
      • Learn about actions that IT leaders can take to improve the satisfaction and career advancement of their Black employees.

      The State of Black Professionals in Tech Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. The State of Black Professionals in Tech Report – A report providing you with advice on barriers and solutions for leaders of Black employees.

      IT leaders often realize that there are barriers impacting their employees but don’t know how to address them. This report provides insights on the barriers and actions that can help improve the lives of Black professionals in technology.

      • The State of Black Professionals in Tech Report

      Infographic

      Further reading

      The State of Black Professionals in Tech

      Keep inclusion at the forefront to gain the benefits from diversity.

      Analysts' Perspective

      The experience of Black professionals in technology is unique.

      Diversity in tech is not a new topic, and it's not a secret that technology organizations struggle to attract and retain Black employees. Ever since the early '90s, large tech organizations have been dealing with public critique of their lack of diversity. This topic is close to our hearts, but unfortunately while improvements have been made, progress is quite slow.

      In recent years, current events have once again brought diversity to the forefront for many organizations. In addition, the pandemic along with talent trends such as "the great resignation" and "quiet quitting" and preparations for a recession have not only impacted diversity at large but also Black professionals in technology. Our previous research has focused on the wider topic of Recruiting and Retaining People of Color in Tech, but we've found that the experiences of persons of color are not all the same.

      This study focuses on the unique experience of Black professionals in technology. Over 600 people were surveyed using an online tool; interviews provided additional insights. We're excited to share our findings with you.

      This is a picture of Allison Straker This is an image of Ugbad Farah

      Allison Straker
      Research Director
      Info-Tech Research Group

      Ugbad Farah
      Research Director
      Info-Tech Research Group

      Demographics

      In October 2021, we launched a survey to understand what the Black experience is like for people in technology. We wanted and received a variety of responses which would help us to understand how Black technology professionals experienced their working world. We received responses from 633 professionals, providing us with the data for this report.

      For more information on our survey demographics please see the appendix at this end of this report.

      A pie chart showing 26% black and 74% All Other

      26% of our respondents either identified as Black or felt the world sees them as Black.

      Professionals from various countries responded to the survey:

      • Most respondents were born in the US (52%), Canada (14%), India (14%), or Nigeria (4%).
      • Most respondents live in the US (56%), Canada (25%), Nigeria (2%), or the United Kingdom (2%).

      Companies with more diversity achieve more revenue from innovation

      Organizations do better and are more innovative when they have more diversity, a key ingredient in an organization's secret sauce.
      Organizations also benefit from engaged employees, yet we've seen that organizations struggle with both. Just having a certain number of diverse individuals is not enough. When it comes to reaping the benefits of diversity, organizations can flourish when employees feel safe bringing their whole selves to work.

      45% Innovation Revenue by Companies With Above-Average Diversity Scores
      26%

      Innovation Revenue by Companies With Below-Average Diversity Scores

      (Chart source: McKinsey, 2020)


      Companies with higher employee engagement experience 19.2% higher earnings.

      However, those with lower employee engagement experience 32.7% lower earnings.
      (DecisionWise, 2020)

      If your workforce doesn't reflect the community it serves, your business may be missing out on the chance to find great employees and break into new and growing markets, both locally and globally.
      Diversity makes good business sense.
      (Business Development Canada, 2023)

      A study about Black professionals

      Why is this about Black professionals and not other diverse groups?

      While there are a variety of diversity dimensions, it's important to understand what makes up a "multicultural workforce." There is more to diversity than gender, race, and ethnicity. Organizations need to understand that there is diversity within these groups and Black professionals have their own unique experience when it comes to entering and navigating tech that needs to be addressed.

      This image contains two bar graphs from the Brookfield Institute for Innovation and Entrepreneurship. They show the answers to two questions, sorted by the following categories: Black; Non-White; Asian; White. The questions are as follows: I feel comfortable to voice my opinion, even when it differs from the group opinion; I am part of the decision-making process at work.

      (Brookfield Institute for Innovation and Entrepreneurship, 2019)

      The solutions that apply to Black professionals are not only beneficial for Black employees but for all. While all demographics are unique, the solutions in this report can support many.

      Unsatisfied and underrepresented

      Less Black professionals responded as "satisfied" in their IT careers. The question is: How do we mend the Gap?

      Percentage of IT Professionals Who Reported Being Very Satisfied in Their Current Role

      • All Other Professionals: 34%
      • Black Professionals: 23%

      Black workers are underrepresented in most professional roles, especially computer and math Occupations

      A bar graph showing representation of black workers in the total workforce compared to computer and mathematical science occupations.

      The gap in satisfaction

      What's Important?

      Our research suggests that the differences in satisfaction among ethnic groups are related to differences in value systems. We asked respondents to rank what's important, and we explored why.

      Non-Black professionals rated autonomy and their manager working relationships as most important.

      For Black professionals, while those were important, #1 was promotion and growth opportunities, ranked #7 by all other professionals. This is a significant discrepancy.

      Recognition of my work/accomplishments also was viewed significantly differently, with Black professionals ranking it low on the list at #7 and all other professionals considering it very important at #3.

      All Other Professionals

      Black Professionals

      Two columns, containing metrics of satisfaction rated by Black Professionals, and All Other Professionals.

      Maslow's Hierarchy of Needs applies to job satisfaction

      In Maslow's hierarchy, it is necessary for people to achieve items lower on the hierarchy before they can successfully pursue the higher tiers.

      An image of Maslow's Hierarchy of Needs modified to apply to Job Satisfaction

      Too many Black professionals in tech are busy trying to achieve some of the lower parts of the hierarchy; it is stopping them from achieving elements higher up that can lead to job satisfaction.

      This can stop them from gaining esteem, importance, and ultimately, self-actualization. The barriers that impact safety and social belonging happen on a day-to-day basis, and so the day-to-day lives of Black professionals in tech can look very different from their counterparts.

      There are barriers that hinder and solutions that support employees

      An image showing barriers to success An image showing Actions for Success.
      There are various barriers that increase the likelihood for Black professionals to focus on the lower end of the needs hierarchy:

      These are among some of the solutions that, when layered, can support Black professionals in tech in moving up the needs hierarchy.

      Focusing on these actions can support Black professionals in achieving much needed job satisfaction.

      What does this mean?

      The minority experience is not a monolith

      The barriers that Black professionals encounter aren't limited to the same barriers as their colleagues, and too often this means that they aren't in a position to grow their careers in a way that leads to job satisfaction.

      There is a 11% gap between the satisfaction of Black professionals and their peers.

      Early Steps:
      Take time to understand the Black experience.

      As leaders, it's important to be aware that employee goals vary depending on the barriers they're battling with.

      Intermediate:
      If Black employees don't have strong relationships, networks, and mentorships it becomes increasingly difficult to navigate the path to upward mobility.

      As a leader, you can look for opportunities to bridge the gap on these types of conversations.

      Advanced:
      Black professionals in tech are not advancing like their counterparts.

      Creating clear career paths will not only benefit Black employees but also support your entire organization.

      Key metrics:

      • Engagement
      • Committed Executive Leadership
      • Development Opportunities
      • Organizational Programs

      Black respondents are significantly more likely to report barriers to their career advancement

      Common barriers

      Black professionals, like their colleagues, encounter barriers as they try to advance their careers. The barriers both groups encounter include microaggressions, racism, ageism, accessibility issues, sexual orientation, bias due to religion, lack of a career-supported network, gender bias, family status bias, and discrimination due to language/accents.

      What tops the list

      Microaggressions and racism are at the top of these barriers, but Black professionals also deal with other barriers that their colleagues may experience, such as gender-based bias, accessibility issues, religion, and more.

      One of these barriers alone can be difficult to deal with but when they are compounded it can be very difficult to navigate through the working environment in tech.

      A graph charting the impact of the common barriers

      What are microaggressions?

      Microaggression

      A statement, action, or incident regarded as an instance of indirect, subtle, or unintentional discrimination against members of a marginalized group such as a racial or ethnic minority.

      (Oxford Languages, 2023)

      Why are they significant?

      These things may seem innocent enough but the messaging that is received and the lasting impression is often far from it.

      Our research shows that racism and discrimination contribute to poor mental health among Black professionals.

      Examples

      • You're so articulate!
      • How do you always have different hair, can I touch it?
      • Where are you really from?
      • I don't see color.
      • I believe the most qualified person should get the job; everyone can succeed in this society if they work hard enough.

      "The experience of having to question whether something happened to you because of your race or constantly being on edge because your environment is hostile can often leave people feeling invisible, silenced, angry, and resentful."
      Dr. Joy Bradford,
      clinical Psychologist, qtd. In Pfizer

      It takes some time to get in the door

      For too many Black respondents, It took Longer than their peers to Find Technology Jobs.

      Both groups had some success finding jobs in "no time" – however, there was a difference. Thirty-four percent of "all others" found their jobs quickly, while the numbers were less for Black professionals, at 26%. There was also a difference at the opposite end of the spectrum. For 29% of Black professionals, it took seven months or longer to find their IT job, while that number is only 19% for their peers.

      .a graph showing time taken for respondents sorted by black; and all other.

      This points to the need for improvements in recruitment and career advancement.

      29% of Black respondents said that it took them 7 months or longer to find their technology job.

      Compared to 19% of all other professionals that selected the same response.

      And once they're in, it's difficult to advance

      Black Professionals are not Advancing as Quickly as their Colleagues. Especially when you look at their Experience.

      Our research shows that compared to all other ethnicities; Black participants were 55% more likely to report that they had no career advancement/promotion in their career. There is a bigger percentage of Black professionals who have never received a promotion; there's also a large number of Black professionals who have been working a significant amount time in the same role without a promotion.

      .Career Advancement

      A graph showing career advancement for the categories: Black and All Other.

      Black participants were 55% more likely to report that they had had no career advancement/promotion in their career.

      No advancement

      A graph showing the number of respondents who reported no career advancement over time, for the categories: Black; and All Other.

      There's a high cost to lack of engagement

      When employees feel disillusioned with things like career advancement and microaggressions, they often become disengaged. When you continuously have to steel yourself against microaggressions, racism, and other barriers, it prevents you from bringing your whole self to the office. The barriers can lead to what's been coined as "emotional tax." An emotional tax is the experience of feeling different from colleagues because of your inherent diversity and the associated negative effects on health, wellbeing, and the ability to thrive at work.

      Earnings of companies with higher employee engagement

      19.2%

      Earnings of companies with lower employee engagement

      -32.7%

      (DecisionWise, 2020)

      "I've conditioned myself for the corporate world, I don't bring my authentic self to work."
      Anonymous Interview Subject

      Lack of engagement also costs the organization in terms of turnover, something many organizations today are struggling with how to address. Organizations want to increase the ability of the workforce to remain in the organization. For Black employees, this gets harder when they're not engaged and they're the only one. When the emotional tax gets to be too much, this can lead to turnover. Turnover not only costs companies billions in profits, it also negatively impacts leadership diversity. It's difficult to imagine career growth when you don't see anyone that looks like you at the top. It is a challenge to see your future when there aren't others that you can relate to at top levels in the organization, leading to one of our interview subjects to muse, "How long can I last?"

      "Being Black in tech can be hard on your mental health. Your mind is constantly wondering, 'how long can I last?' "
      Anonymous Interview Subject

      Fewer Black professionals feel like they can be their authentic selves at work

      Authentic vs. Successes

      For many Black professionals, "code-switching," or altering the way one speaks and acts depending on context, becomes the norm to make others more comfortable. Many feel that being authentic and succeeding in the workplace are mutually exclusive.

      Programs and Resources

      We asked respondents "What's in place to build an inclusive culture at your company?" Most respondents (51% and 45%) reported that there were employee resource groups at their organizations.

      Do you feel you can be your authentic self at work?

      A bar graph showing 86% for All Other Professions, and 75% for Black Professionals

      A bar graph showing responses to the question What’s in place to build an inclusive culture at your company.

      What can be done?

      An image showing actions for success.

      There are various actions that organizations can take to help address barriers.

      It's important to ensure these are not put in as band-aid solutions but that they are carefully thought out and layered.

      Our findings demonstrate that remote work, career development, and DEI programs along with mentorship and diverse leadership are strong enablers of professional satisfaction. An unfortunate consequence, if professionals are not nurtured, is that we risk losing much needed talent to self-employment or to other organizations.

      There are several solutions

      Respondents were asked to distribute points across potential solutions that could lead to job satisfaction. The ratings showed that there were common solutions that could be leveraged across all groups.

      Respondents were asked what solutions were valuable for their career development.

      All groups were mostly aligned on the order of the solutions that would lead to career satisfaction; however, Black professionals rated the importance of employee resource groups as higher than their colleagues did.

      An image showing how respondents rate a number of categories, sorted into Ratings by Black Professionals, and Ratings by Other Professionals

      Mentorship and sponsorship are seen as key for all employees, as is of course training.

      However, employee resource groups (ERGs) were rated significantly higher for Black professionals and discussions around diversity were higher for their colleagues. This may be because other groups feel a need to learn more about diversity, whereas Black professionals live this experience on a day-to day basis, so it's not as critical for them.

      Double the number of satisfied Black professionals through mentorship and sponsorship

      a bar graph showing the number of very satisfied people with and without mentors/sponsors.

      Mentorship and sponsorship help to close the job satisfaction gap for Black IT professionals. The percentage of satisfied Black employees almost doubles when they have a mentor or sponsorship, moving the satisfaction rate to closer to all other colleagues.

      As leaders, you likely benefit from a few different advisors, and your staff should be able to benefit in the same way.

      They can have their own personal board of advisors, both inside and outside of your organization, helping them to navigate the working world in IT.

      To support your staff, provide guidance and coaching to internal mentors so that they can best support employees, and ensure that your organizational culture supports relationship building and trust.

      While all are critical, coaching, mentoring, and sponsorship are not the same

      Coaching

      Performance-driven guidance geared to support the employee with on-the-job performance. This could be a short-term relationship.

      Mentorship

      A relationship where the mentor provides guidance, information, and expertise to support the long-term career development of the mentee.

      Sponsorship

      The act of advocating on the behalf of another for a position, promotion, development opportunity, etc. over a longer period.

      For more information on setting up a mentorship program, see Optimize the Mentoring Program to Build a High Performing Learning Organization.

      On why mentorship and sponsorship are important:

      "With some degree of mentorship or sponsorship, it means that your ability to thrive or to have a positive experience in organizations increases substantially.

      Mentorship and sponsorship are very often the lynchpin of someone being successful and sticking with an organization.

      Sponsorship is an endorsement to other high-level stakeholders who very often are the gatekeepers of opportunity. Sponsors help to shepherd you through the gate."

      An Image of Carlos Thomas

      Carlos Thomas
      Executive Councilor, Info-Tech Research Group

      What is an employee resource group?

      IT Professionals rated ERGs as the third top driver of success at work

      Employee resource groups enable employees to connect in their workplace based on shared characteristics or life experiences.

      ERGs generally focus on providing support, enhancing career development, and contributing to personal development in the work environment. Some ERGs provide advice to the organization on how they can support their diverse employees.

      As leaders, you should support and encourage the formation of ERGs in your organization.

      What each ERG does will vary according to the needs of employees in your organization. Your role is to enable the ERGs as they are created and maintained.

      On setting up and leveraging employee resource groups:

      "Employee resource groups, when leveraged in an authentically intentional way, can be the some of the most impactful stakeholders in the development and implementation of the organizational diversity, equity, and inclusion strategy.

      ERGs are essential to the development of policies, programs, and initiatives that address the needs of equity-seeking groups and are key to driving organizational culture and employee wellbeing, in addition to hiring and recruitment.

      ERGs must be set up for success by having adequate resources to do the work, which includes adequate budgets, executive sponsorship, training, support, and capacity to do the work. According to a Great Place To Work survey (2021), 50% of ERGs identified the need for adequate resources as a challenge for carrying out the work.:"

      An image of Cinnamon Clark

      CINNAMON CLARK
      PRACTICE LEAD, DIVERSITY, EQUITY AND INCLUSION services, MCLEAN & CO

      There is a gap when it comes to diversity in leadership

      Representation at leadership levels is especially stagnant.

      Black Americans comprise 13.6% of the US population
      (2022 data from the US Census Bureau)

      And yet only 5.9% of the country's CEOs are Black, with only 6 (1%) at the top of Fortune 500 companies.
      (2021 data from the Bureau of Labor Statistics and Fortune.com)

      I've never worked for a company that has Black executives. It's difficult to envision long-term growth with an organization when you don't see yourself represented in leadership.
      – Anonymous Interview Subject

      Having diversity in your leadership team doubles satisfaction

      An image of a bar graph showing satisfaction for those who do, and do not see diversity in their company's leadership.

      Our research shows that Black professionals are more satisfied in their role when they see leaders that look like them.

      Satisfaction of other professionals is not as impacted by diversity in leadership as for Black professionals. Satisfaction doubles in organizations that have a diverse leadership team.

      To reap the benefits from diversity, we need to ensure diversity is not just in entry or mid-level positions and provide employees an opportunity to see diversity in their company's leadership.

      On the need for diversity in leadership:

      "As a Black professional leader, it's not lost on me that I have a responsibility. I have to demonstrate authenticity, professionalism, and exemplary behavior that others can mimic. And I must also showcase that there are possibilities for those coming up in their career. I feel very grateful that I can bestow onto others my knowledge, my experience, my journey, and the tips that I've used to help bring me to be where I am.
      (Having Black leaders in an organization) demonstrates that there is talent across the board, that there are all types of women and people with proficiencies. What it brings to the table is a difference in thoughts and experience.
      A person like myself, sitting at the table, can bring a unique perspective on employee behavior and employee impact. CCL is an organization focused on equity, diversity, and inclusion; for sure having me at the table and others that look like me at the table demonstrates to the public an organization that's practicing what it preaches."

      An image of C. Fara Francis

      C. Fara Francis
      CIO, Center for creative leadership

      Work from home

      While all groups have embraced the work-from-home movement, many Black professionals find it reduces the impact of racial incidents in the workplace.

      Percentage of employees who experienced positive changes in motivation after working remotely.

      Black: 43%; All Other: 43%

      I have to guard and protect myself from experiencing and witnessing racism every day. I am currently working remotely, and I can say for certain my mood and demeanor have improved. Not having to decide if I should address a racist comment or action has made my day easier.
      Source: Slate, 2022

      Remote work significantly led to feelings of better chances for career advancement

      Survey respondents were asked about the positive and negative changes they saw in their interactions and experiences with remote work. Black employees and their colleagues replied similarly, with mostly positive experiences.

      While both groups enjoyed better chances for career advancement, the difference was significantly higher for Black professionals.

      An image of a series of bar graphs showing the effects of remote work on a number of factors.

      Reasons for Self-Employment:

      More Black professionals have chosen self-employment than their colleagues.

      All Other: 26%; Black: 30%.

      A bar graph showing rankings for reasons for self employment, sorted by Black and All Other.

      The biggest reasons for both groups in choosing self-employment were for better pay, career growth, and work/life balance.

      While the desire for better pay was the highest reason for both groups, for engaged employees salary is a lower priority than other concerns (Adecco Group's Global Workforce of the Future report). Consider salary in conjunction with career growth, work/life balance, and the variety in the work that your employees have.

      A bar graph showing rankings for reasons for self employment, sorted by Black and All Other.

      If we don't consider our Black employees, not only do we risk them leaving the organization, but they may decide to just work for themselves.

      Most professionals believe their organizations are committed to diversity, equity, and inclusion

      38% of all respondents believe their organizations are very committed to DEI
      49% believe they are somewhat committed
      9% feel they are not committed
      4% are unsure

      Make sure supports are in place to help your employees grow in their careers:

      Leadership
      IT Leadership Career Planning Research Center

      Diversity and Inclusion Tactics
      IT Diversity & Inclusion Tactics

      Employee Development Planning
      Implement an IT Employee Development Plan

      Belief in your organization's diversity, equity, and inclusion efforts isn't consistent across groups: Make sure actions are seen as genuine

      While organization's efforts are acknowledged, Black professionals aren't as optimistic about the commitment as their peers. Make sure that your programs are reaching the various groups you want to impact, to increase the likelihood of satisfaction in their roles.

      SATISFACTION INCREASES IN BOTH BLACK AND NON-BLACK PROFESSIONALS

      When they believe in their company's commitment to diversity, equity. and inclusion.

      Of those who believe in their organization's commitment, 61% of Black professionals and 67% of non-Black professionals are very satisfied in their roles.

      BELIEVE THEIR ORGANIZATION IS NOT COMMITTED TO DEI

      BELIEVE THEIR ORGANIZATION IS VERY COMMITTED TO DEI

      NON-BLACK PROFESSIONALS

      8%

      41%

      BLACK PROFESSIONALS

      13%

      30%

      Recommendations

      It's important to understand the current landscape:

      • The barriers that Black employees often face.
      • The potential solutions that can help close the gap in employee satisfaction.

      We recognize that resolving this is not easy. Although senior executives are recognizing that a diverse set of experiences, perspectives, and backgrounds is crucial to fostering innovation and competing on the global stage, organizations often don't take the extra step to actively look for racialized talent, and many people still believe that race doesn't play an important part in an individual's ability to access opportunities.

      Look at a variety of solutions that you can implement within your organization; layering solutions is the key to driving business diversity. Always keep in mind that diversity is not a monolith, that the experiences of each demographic varies.

      Info-Tech resources

      Appendix

      About the research

      Diversity in tech survey

      As part of the research process for the State of Black Tech Report, Info-Tech Research Group conducted an open online survey among its membership and wider community of professionals. The survey was fielded from October 2021 to April 2022, collecting 633 responses.

      An image of Page 1 of the Appendix.

      Current Position

      An image of Page 2 of the Appendix.

      Education and Experience

      Education was fairly consistent across both groups, with a few exceptions: more Black professionals had secondary school (9% vs. 4%) and more Black professionals had Doctorate degrees (4% vs. 2%).

      We had more non-Black respondents with 20+ years of experience (31% vs. 19%) and more Black respondents with less than 1 year of experience (8% vs. 5%) – the rest of the years of experience were consistent across the two groups.

      An image of Page 3 of the Appendix.

      It is important to recognize that people are often seen by "the world" as belonging to a different race or set of races than what they personally identify as. Both aspects impact a professional's experience in the workplace.

      An image of Page 4 of the Appendix.

      Bibliography

      Barton, LeRon. “I’m Black. Remote Work Has Been Great for My Mental Health.” Slate, 15 July 2022.

      “Black or African American alone, percent.” U.S. Census Bureau QuickFacts: United States. Accessed 14 February 2023.

      Boyle, Matthew. “More Workers Ready to Quit Over ‘Window Dressing’ Racism Efforts.” Bloomberg.com, 9 June 2022.

      Boyle, Matthew. “Remote Work Has Vastly Improved the Black Worker Experience.” Bloomberg.com, 5 October 2021.

      Cooper, Frank, and Ranjay Gulati. “What Do Black Executives Really Want?” Harvard Business Review, 18 November 2021.

      “Emotional Tax.” Catalyst. Accessed 1 April 2022.

      “Employed Persons by Detailed Occupation, Sex, Race, and Hispanic or Latino Ethnicity” U.S. Bureau of Labor Statistics. Accessed February 14, 2023.

      “Equality in Tech Report - Welcome.” Dice, 9 March 2022. Accessed 23 March 2022.

      Erb, Marcus. "Leaders Are Missing the Promise and Problems of Employee Resource Groups." Great Place To Work, 30 June 2021.

      Gawlak, Emily, et al. “Key Findings - Being Black In Corporate America.” Coqual, Center for Talent Innovation (CTI), 2019.

      “Global Workforce of the Future Research.” Adecco, 2022. Accessed 4 February 2023.

      Gruman, Galen. “The State of Ethnic Minorities in U.S. Tech: 2020.” Computerworld, 21 September 2020. Accessed 31 May 2022.

      Hancock, Bryan, et al. “Black Workers in the US Private Sector.” McKinsey, 21 February 2021. Accessed 1 April 2022.

      “Hierarchy Of Needs Applied To Employee Engagement.” Proactive Insights, 12 February 2020.

      Hobbs, Cecyl. “Shaping the Future of Leadership for Black Tech Talent.” Russell Reynolds Associates, 27 January 2022. Accessed 3 August 2022.

      Hubbard, Lucas. “Race, Not Job, Predicts Economic Outcomes for Black Households.” Duke Today, 16 September 2021. Accessed 30 May 2022.

      Knight, Marcus. “How the Tech Industry Can Be More Inclusive to the Black Community.” Crunchbase, 23 February 2022.

      “Maslow’s Hierarchy of Needs in Employee Engagement (Pre and Post Covid 19).” Vantage Circle HR Blog, 30 May 2022.

      McDonald, Autumn. “The Racism of the ‘Hard-to-Find’ Qualified Black Candidate Trope (SSIR).” Stanford Social Innovation Review, 1 June 2021. Accessed 13 December 2021.

      McGlauflin, Paige. “The Fortune 500 Features 6 Black CEOs—and the First Black Founder Ever.” Fortune, 23 May 2022. Accessed 14 February 2023.

      “Microaggression." Oxford English Dictionary, Oxford Languages, 2023.

      Reed, Jordan. "Understanding Racial Microaggression and Its Effect on Mental Health." Pfizer, 26 August 2020.

      Shemla, Meir “Why Workplace Diversity Is So Important, And Why It’s So Hard To Achieve.” Forbes, 22 August 2018. Accessed 4 February 2023.

      “The State of Black Women in Corporate America.” Lean In and McKinsey & Company, 2020. Accessed 14 January 2022.

      Van Bommel, Tara. “The Power of Empathy in Times of Crisis and Beyond (Report).” Catalyst, 2021. Accessed 1 April 2022.

      Vu, Viet, Creig Lamb, and Asher Zafar. “Who Are Canada’s Tech Workers?” Brookfield Institute for Innovation and Entrepreneurship, January 2019. Accessed on Canadian Electronic Library, 2021. Web.

      Warner, Justin. “The ROI of Employee Engagement: Show Me the Money!” DecisionWise, 1 January 2020. Web.

      White, Sarah K. “5 Revealing Statistics about Career Challenges Black IT Pros Face.” CIO (blog), 9 February 2023. Accessed 5 July 2022.

      Williams, Joan C. “Stop Asking Women of Color to Do Unpaid Diversity Work.” Bloomberg.com, 14 April 2022.

      Williams, Joan C., Rachel Korn, and Asma Ghani. “A New Report Outlines Some of the Barriers Facing Asian Women in Tech.” Fast Company, 13 April 2022.

      Wilson, Valerie, Ethan Miller, and Melat Kassa. “Racial representation in professional occupations.” Economic Policy Institute, 8 June 2021.

      “Workplace Diversity: Why It’s Good for Business.” Business Development Canada (BDC.ca), 6 Feb. 2023. Accessed 4 February 2023.

      Secure IT-OT Convergence

      • Buy Link or Shortcode: {j2store}382|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $10,499 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations

      IT and OT are both very different complex systems. However, significant benefits have driven OT to be converged to IT. This results in IT security leaders, OT leaders and their teams' facing challenges in:

      • Governing and managing IT and OT security and accountabilities.
      • Converging security architecture and controls between IT and OT environments.
      • Compliance with regulations and standards.
      • Metrics for OT security effectiveness and efficiency.

      Our Advice

      Critical Insight

      • Returning to isolated OT is not beneficial for the organization, therefore IT and OT need to learn to collaborate starting with communication to build trust and to overcome differences between IT and OT. Next, negotiation is needed on components such as governance and management, security controls on OT environments, compliance with regulations and standards, and metrics for OT security.
      • Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.
      • OT interfaces with the physical world while IT system concerns more on cyber world. Thus, the two systems have different properties. The challenge is how to create strategic collaboration between IT-OT based on negotiation and this needs top-down support.

      Impact and Result

      Info-Tech’s approach in preparing for IT/OT convergence in the planning phase is coordination and collaboration of IT and OT to

      • initiate communication to define roles and responsibilities.
      • establish governance and build cross-functional team.
      • identify convergence components and compliance obligations.
      • assess readiness.

      Secure IT/OT Convergence Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Secure IT/OT Convergence Storyboard – A step-by-step document that walks you through how to secure IT-OT convergence.

      Info-Tech provides a three-phase framework of secure IT/OT convergence, namely Plan, Enhance, and Monitor & Optimize. The essential steps in Plan are to:

    • Initiate communication to define roles and responsibilities.
    • Establish governance and build a cross-functional team.
    • Identify convergence components and compliance obligations.
    • Assess readiness.
      • Secure IT/OT Convergence Storyboard

      2. Secure IT/OT Convergence Requirements Gathering Tool – A tool to map organizational goals to secure IT-OT goals.

      This tool serves as a repository for information about the organization, compliance, and other factors that will influence your IT/OT convergence.

      • Secure IT/OT Convergence Requirements Gathering Tool

      3. Secure IT/OT Convergence RACI Chart Tool – A tool to identify and understand the owners of various IT/OT convergence across the organization.

      A critical step in secure IT/OT convergence is populating a RACI (Responsible, Accountable, Consulted, and Informed) chart. The chart assists you in organizing roles for carrying out convergence steps and ensures that there are definite roles that different individuals in the organization must have. Complete this tool to assign tasks to suitable roles.

      • Secure IT/OT Convergence RACI Chart Tool
      [infographic]

      Further reading

      Secure IT/OT Convergence

      Create a holistic IT/OT security culture.

      Analyst Perspective

      Are you ready for secure IT/OT convergence?

      IT/OT convergence is less of a convergence and more of a migration. The previously entirely separate OT ecosystem is migrating into the IT ecosystem, primarily to improve access via connectivity and to leverage other standard IT capabilities for economic benefit.

      In the past, OT systems were engineered to be air gapped, relying on physical protection and with little or no security in design, (e.g. OT protocols without confidentiality properties). However, now, OT has become dependent on the IT capabilities of the organization, thus OT inherits IT’s security issues, that is, OT is becoming more vulnerable to attack from outside the system. IT/OT convergence is complex because the culture, policies, and rules of IT are quite foreign to OT processes such as change management, and the culture, policies, and rules of OT are likewise foreign to IT processes.

      A secure IT/OT convergence can be conceived of as a negotiation of a strong treaty between two systems: IT and OT. The essential initial step is to begin with communication between IT and OT, followed by necessary components such as governing and managing OT security priorities and accountabilities, converging security controls between IT and OT environments, assuring compliance with regulations and standards, and establishing metrics for OT security.

      Photo of Ida Siahaan, Research Director, Security and Privacy Practice, Info-Tech Research Group. Ida Siahaan
      Research Director, Security and Privacy Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      IT and OT are both very different complex systems. However, significant benefits have driven OT to converge with IT. This results in IT security leaders, OT leaders, and their teams facing challenges with:

      • Governing and managing IT and OT security and accountabilities.
      • Converging security architecture and controls between IT and OT environments.
      • Compliance with regulations and standards.
      • Metrics for OT security effectiveness and efficiency.
      Common Obstacles
      • IT/OT network segmentation and remote access issues, as most OT incidents indicate that the attackers gained access through the IT network, followed by infiltration into OT networks.
      • OT proprietary devices and unsecure protocols use outdated systems which may be insecure by design.
      • Different requirements of OT and IT security – i.e. IT (confidentiality, integrity, and availability) vs. OT (safety, reliability, and availability).
      Info-Tech’s Approach

      Info-Tech’s approach in preparing for IT/OT convergence (i.e. the Plan phase) is coordination and collaboration of IT and OT to:

      • Initiate communication to define roles and responsibilities.
      • Establish governance and build a cross-functional team.
      • Identify convergence components and compliance obligations.
      • Assess readiness.

      Info-Tech Insight

      Returning to isolated OT is not beneficial for the organization, so IT and OT need to learn to collaborate, starting with communication to build trust and to overcome their differences. Next, negotiation is needed on components such as governance and management, security controls on OT environments, compliance with regulations and standards, and establishing metrics for OT security.

      Consequences of unsecure IT/OT convergence

      OT systems were built with no or little security design

      90% of organizations that use OT experienced a security incident. (Fortinet, 2021. Ponemon, 2019.)

      Bar graph comparing three years, 2019-2021, of four different OT security incidents: 'Ransomeware', 'Insider breaches', 'Phishing', and 'Malware'.
      (Source: Fortinet, 2021.)
      Lack of visibility

      86% of OT security-related service engagements lack complete visibility of OT network in 2021 (90% in 2020, 81% in 2019). (Source: “Cybersecurity Year In Review” Dragos, 2022.)

      The need for secure IT/OT convergence

      Important Industrial Control System (ICS) cyber incidents

      2000
      Target: Australian sewage plant. Method: Insider attack. Impact: 265,000 gallons of untreated sewage released.
      2012
      Target: Middle East energy companies. Method: Shamoon. Impact: Overwritten Windows-based systems files.
      2014
      Target: German Steel Mill. Method: Spear-phishing. Impact: Blast furnace failed to shut down.
      2017
      Target: Middle East safety instrumented system (SIS). Method: TRISIS/TRITON. Impact: Modified SIS ladder logic.
      2022
      Target: Viasat’s KA-SAT network. Method: AcidRain. Impact: Significant loss of communication for the Ukrainian military, which relied on Viasat’s services.
      Timeline of Important Industrial Control System (ICS) cyber incidents.
      1903
      Target: Marconi wireless telegraph presentation. Method: Morse code. Impact: Fake message sent “Rats, rats, rats, rats. There was a young fellow of Italy, Who diddled the public quite prettily.”
      2010
      Target: Iranian uranium enrichment plant. Method: Stuxnet. Impact: Compromised programmable logic controllers (PLCs).
      2013
      Target: ICS supply chain. Method: Havex. Impact: Remote Access Trojan (RAT) collected information and uploaded data to command-and-control (C&C) servers
      2016
      Target: Ukrainian power grid. Method: BlackEnergy. Impact: For 1-6 hours, power outages for 230,000 consumers.
      2021
      Target: Colonial Pipeline. Method: DarkSide ransomware. Impact: Compromised billing infrastructure halted the pipeline operation.

      (Source: US Department of Energy, 2018.


      ”Significant Cyber Incidents,” CSIS, 2022


      MIT Technology Review, 2022.)

      Info-Tech Insight

      Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.

      Case Study

      Horizon Power
      Logo for Horizon Power.
      INDUSTRY
      Utilities
      SOURCE
      Interview

      Horizon Power is the regional power provider in Western Australia and stands out as a leader not only in the innovative delivery of sustainable power, but also in digital transformation. Horizon Power is quite mature in distributed energy resource management; moving away from centralized generation to decentralized, community-led generation, which reflects in its maturity in converging IT and OT.

      Horizon Power’s IT/OT convergence journey started over six years ago when advanced metering infrastructure (AMI) was installed across its entire service area – an area covering more than one quarter of the Australian continent.

      In these early days of the journey, the focus was on leveraging matured IT approaches such as adoption of cloud services to the OT environment, rather than converging the two. Many years later, Horizon Power has enabled OT data to be more accessible to derive business benefits such as customer usage data using data analytics with the objective of improving the collection and management of the OT data to improve business performance and decision making.

      The IT/OT convergence meets legislation such as the Australian Energy Sector Cyber Security Framework (AESCSF), which has impacts on the architectural layer of cybersecurity that support delivery of the site services.

      Results

      The lessons learned in converging IT and OT from Horizon Power were:

      • Start with forming relationships to build trust and overcome any divide between IT and OT.
      • Collaborate with IT and OT teams to successfully implement solutions, such as vulnerability management and discovery tools for OT assets.
      • Switch the focus from confidentiality and integrity to availability in solutions evaluation
      • Develop training and awareness programs for all levels of the organization.
      • Actively encourage visible sponsorship across management by providing regular updates and consistent messaging.
      • Monitor cybersecurity metrics such as vulnerabilities, mean time to treat vulnerabilities, and intrusion attempts.
      • Manage third-party vendors using a platform which not only performs external monitoring but provides third-party vendors with visibility or potential threats in their organization.

      The Secure IT/OT Convergence Framework

      IT/OT convergence is less of a convergence and more of a migration. The previously entirely separate OT ecosystem is migrating onto the IT ecosystem, to improve access via the internet and to leverage other standard IT capabilities. However, IT and OT are historically very different, and without careful calculation, simply connecting the two systems will result in a problem. Therefore, IT and OT need to learn to live together starting with communication to build trust and to overcome differences between IT and OT.
      Convergence Elements
      • Process convergence
      • Software and data convergence
      • Network and infrastructure convergence
      Target Groups
      • OT leader and teams
      • IT leader and teams
      • Security leader and teams
      Security Components
      • Governance and compliance
      • Security strategy
      • Risk management
      • Security policies
      • IR, DR, BCP
      • Security awareness and training
      • Security architecture and controls

      Plan

      • Initiate communication
      • Define roles and responsibilities
      • Establish governance and build a cross-functional team
      • Identify convergence elements and compliance obligations
      • Assess readiness

      Governance

      Compliance

      Enhance

      • Update security strategy for IT/OT convergence
      • Update risk-management framework for IT/OT convergence
      • Update security policies and procedures for IT/OT convergence
      • Update incident response, disaster recovery, and business continuity plan for IT/OT convergence

      Security strategy

      Risk management

      Security policies and procedures

      IR, DR, and BCP

      Monitor &
      Optimize

      • Implement awareness, induction, and cross-training program
      • Design and deploy converging security architecture and controls
      • Establish and monitor IT/OT security metrics on effectiveness and efficiency
      • Red-team followed by blue-team activity for cross-functional team building

      Awareness and cross-training

      Architecture and controls

      Phases
      Color-coded phases with arrows looping back up from the bottom to top phase.
      • Plan
      • Enhance
      • Monitor & Optimize
      Plan Outcomes
      • Mapping business goals to IT/OT security goals
      • RACI chart for priorities and accountabilities
      • Compliance obligations register
      • Readiness checklist
      Enhance Outcomes
      • Security strategy for IT/OT convergence
      • Risk management framework
      • Security policies & procedures
      • IR, DR, BCP
      Monitor & Optimize Outcomes
      • Security awareness and training
      • Security architecture and controls
      Plan Benefits
      • Improved flexibility and less divided IT/OT
      • Improved compliance
      Enhance Benefits
      • Increased strategic common goals
      • Increased efficiency and versatility
      Monitor & Optimize Benefits
      • Enhanced security
      • Reduced costs

      Plan

      Initiate communication

      To initiate communication between the IT and OT teams, it is important to understand how the two groups are different and to build trust to find a holistic approach which overcomes those differences.
      IT OT
      Remote Access Well-defined access control Usually single-level access control
      Interfaces Human Machine, equipment
      Software ERP, CRM, HRIS, payroll SCADA, DCS
      Hardware Servers, switches, PCs PLC, HMI, sensors, motors
      Networks Ethernet Fieldbus
      Focus Reporting, communication Up-time, precision, safety
      Change management Frequent updates and patches Infrequent updates and patches
      Security Confidentiality, integrity, availability Safety, reliability, availability
      Time requirement Normally not time critical Real time

      Info-Tech Insight

      OT interfaces with the physical world while IT system concerns more on cyber world. Thus, the two systems have different properties. The challenge is how to create strategic collaboration between IT and OT based on negotiation, and this needs top-down support.

      Identifying organization goals is the first step in aligning your secure IT/OT convergence with your organization’s vision.

      • Security leaders need to understand the direction the organization is headed in.
      • Wise security investments depend on aligning your security initiatives to the organization.
      • Secure IT/OT convergence should contribute to your organization’s objectives by supporting operational performance and ensuring brand protection and shareholder value.

      Map organizational goals to IT/OT security goals

      Input: Corporate, IT, and OT strategies

      Output: Your goals for the security strategy

      Materials: Secure IT/OT Convergence Requirements Gathering Tool

      Participants: Executive leadership, OT leader, IT leader, Security leader, Compliance, Legal, Risk management

      1. As a group, brainstorm organization goals.
        1. Review relevant corporate, IT, and OT strategies.
      2. Record the most important business goals in the Secure IT/OT Convergence Requirements Gathering Tool. Try to limit the number of business goals to no more than 10 goals. This limitation will be critical to helping focus on your secure IT/OT convergence.
      3. For each goal, identify one to two security alignment goals. These should be objectives for the security strategy that will support the identified organization goals.

      Download the Secure IT/OT Convergence Requirements Gathering Tool

      Record organizational goals

      Sample of the definitions table with columns numbered 1-4.

      Refer to the Secure IT/OT Convergence Framework when filling in the following elements.

      1. Record your identified organization goals in the Goals Cascade tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      2. For each of your organizational goals, identify IT alignment goals.
      3. For each of your organizational goals, identify OT alignment goals.
      4. For each of your organizational goals, select one to two IT/OT security alignment goals from the drop-down lists.

      Establish scope and boundaries

      It is important to know at the outset of the strategy: What are we trying to secure in IT/OT convergence ?
      This includes physical areas we are responsible for, types of data we care about, and departments or IT/OT systems we are responsible for.

      This also includes what is not in scope. For some outsourced services or locations, you may not be responsible for their security. In some business departments, you may not have control of security processes. Ensure that it is made explicit at the outset what will be included and what will be excluded from security considerations.

      Physical Scope and Boundaries

      • How many offices and locations does your organization have?
      • Which locations/offices will be covered by your information security management system (ISMS)?
      • How sensitive is the data residing at each location?
      • You may have many physical locations, and it is not necessary to list each one. Rather, list exceptional cases that are specifically in or out of scope.

      IT Systems Scope and Boundaries

      • There may be hundreds of applications that are run and maintained in your organization. Some of these may be legacy applications. Do you need to secure all your programs or only a select few?
      • Is the system owned or outsourced?
      • Where are you accountable for security?
      • How sensitive is the data that each system handles?

      Organizational Scope and Boundaries

      • Will your ISMS cover all departments within your organization? For example, do certain departments (e.g. operations) not need any security coverage?
      • Do you have the ability to make security decisions for each department?
      • Who are the key stakeholders/data owners for each department?

      OT Systems Scope and Boundaries

      • There may be hundreds of OT systems that are run and maintained in your organization. Do you need to secure all OT or a select subset?
      • Is the system owned or outsourced?
      • Where are you accountable for safety and security?
      • What reliability requirements does each system handle?

      Record scope and boundaries

      Sample Scope and Boundaries table. Refer to the Secure IT/OT Convergence Framework when filling in the following elements:
      • Record your security-related organizational scope, physical location scope, IT systems scope, and OT systems scope in the Scope tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      • For each item scoped, give the rationale for including it in the comments column. Careful attention should be paid to any elements that are not in scope.

      Plan

      Define roles and responsibilities

      Input: List of relevant stakeholders

      Output: Roles and responsibilities for the secure IT/OT convergence program

      Materials: Secure IT/OT Convergence RACI Chart Tool

      Participants: Executive leadership, OT leader, IT leader, Security leader

      There are many factors that impact an organization’s level of effectiveness as it relates to IT/OT convergence. How the two groups interact, what skill sets exist, the level of clarity around roles and responsibilities, and the degree of executive support and alignment are only a few. Thus, it is imperative in the planning phase to identify stakeholders who are:

      • Responsible: The people who do the work to accomplish the activity; they have been tasked with completing the activity and/or getting a decision made.
      • Accountable: The person who is accountable for the completion of the activity. Ideally, this is a single person and will often be an executive or program sponsor.
      • Consulted: The people who provide information. This is usually several people, typically called subject matter experts (SMEs).
      • Informed: The people who are updated on progress. These are resources that are affected by the outcome of the activities and need to be kept up to date.

      Download the Secure IT/OT Convergence RACI Chart Tool

      Define RACI Chart

      Sample RACI chart with only the 'Plan' section enlarged.

      Define responsible, accountable, consulted, and informed (RACI) stakeholders.
      1. Customize the "work units" to best reflect your operation with applicable stakeholders.
      2. Customize the "action“ rows as required.
      Info-Tech Insight

      The roles and responsibilities should be clearly defined. For example, IT network should be responsible for the communication and configuration of all access points and devices from the remote client to the control system DMZ, and controls engineering should be responsible from the control system DMZ to the control system.

      Plan

      Establish governance and build cross-functional team

      To establish governance and build an IT/OT cross-functional team, it is important to understand the operation of OT systems and their interactions with IT within the organization, e.g. ad hoc, centralized, decentralized.

      The maturity ladder with levels 'Fully Converged', 'Collaborative Partners', 'Trusted Resources', 'Affiliated Entities', and 'Siloed' at the bottom. Each level has four maturity indicators listed.

      Info-Tech Insight

      To determine IT/OT convergence maturity level, Info-Tech provides the IT/OT Convergence Self-Evaluation Tool.

      Centralized security governance model example

      Example of a centralized security governance model.

      Plan

      Identify convergence elements and compliance obligations

      To switch the focus from confidentiality and integrity to safety and availability for OT system, it is important to have a common language such as the Purdue model for technical communication.
      • A lot of OT compliance standards are technically focused and do not address governance and management, e.g. IT standards like the NIST Cybersecurity Framework. For example, OT system modeling with Purdue model will help IT teams to understand assets, networking, and controls. This understanding is needed to know the possible security solutions and where these solutions could be embedded to the OT system with respect to safety, reliability, and availability.
      • However, deployment of technical solutions or patches to OT system may nullify warranty, so arrangements should be made to manage this with the vendor or manufacturer prior to modification.
      • Finally, OT modernizations such as smart grid together with the advent of IIoT where data flow is becoming less hierarchical have encouraged the birth of a hybrid Purdue model, which maintains segmentation with flexibility for communications.

      Level 5: Enterprise Network

      Level 4: Site Business

      Level 3.5: DMZ
      Example: Patch Management Server, Application Server, Remote Access Server

      Level 3: Site Operations
      Example: SCADA Server, Engineering Workstation, Historian

      Level 2: Area Supervisory Control
      Example: SCADA Client, HMI

      Level 1: Basic Control
      Example: Batch Controls, Discrete Controls, Continuous Process Controls, Safety Controls, e.g. PLCs, RTUs

      Level 0: Process
      Example: Sensors, Actuators, Field Devices

      (Source: “Purdue Enterprise Reference Architecture (PERA) Model,” ISA-99.)

      Identify compliance obligations

      To manage compliance obligations, it is important to use a platform which not only performs internal and external monitoring, but also provides third-party vendors with visibility on potential threats in their organization.
      Example table of compliance obligations standards. Example tables of compliance obligations regulations and guidelines.

      Source:
      ENISA, 2013
      DHS, 2009.

      • OT system has compliance obligations with industry regulations and security standards/regulations/guidelines. See the lists given. The lists are not exhaustive.
      • OT system owner can use the standards/regulations/guidelines as a benchmark to determine and manage the security level provided by third parties.
      • It is important to understand the various frameworks and to adhere to the appropriate compliance obligations, e.g. IEC/ISA 62443 - Security for Industrial Automation and Control Systems Series.

      IEC/ISA 62443 - Security for Industrial Automation and Control Systems Series

      International series of standards for asset owners, system integrators, and product manufacturers.
      Diagram of the international series of standards for asset owners.
      (Source: Cooksley, 2021)
      • IEC/ISA 62443 is a comprehensive international series of standards covering security for ICS systems, which recognizes three roles, namely: asset owner, system integrator, and product manufacturer.
      • In IEC/ISA 62443, requirements flow from the asset owner to the product manufacturer, while solutions flow in the opposite direction.
      • For the asset owner who owns and operates a system, IEC 62443-2 enables defining target security level with reference to a threat level and using the standard as a benchmark to determine the current security level.
      • For the system integrator, IEC 62443-3 assists to evaluate the asset owner’s requirements to create a system design. IEC 62443-3 also provides a method for verification that components provided by the product manufacturer are securely developed and support the functionality required.

      Record your compliance obligations

      Refer to the “Goals Cascade” tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      1. Identify your compliance obligations. Most organizations have compliance obligations that must be adhered to. These can include both mandatory and voluntary obligations. Mandatory obligations include:
        1. Laws
        2. Government regulations
        3. Industry standards
        4. Contractual agreements
        Voluntary obligations include standards that the organization has chosen to follow for best practices and any obligations that are required to maintain certifications. Organizations will have many different compliance obligations. For the purposes of your secure IT/OT convergence, include only those that have OT security requirements.
      2. Record your compliance obligations, along with any notes, in your copy of the Secure IT/OT Convergence Requirements Gathering Tool.
      3. Refer to the “Compliance DB” tab for lists of standards/regulations/guidelines.
      Table of mandatory and voluntary security compliance obligations.

      Plan

      Assess readiness

      Readiness checklist for secure IT/OT convergence

      People

      • Define roles and responsibilities on interaction based on skill sets and the degree of support and alignment.
      • Adopt well-established security governance practices for cross-functional teams.
      • Analyze and develop skills required by implementing awareness, induction, and cross-training program.

      Process

      • Conduct a maturity assessment of key processes and highlight interdependencies.
      • Redesign cybersecurity processes for your secure IT/OT convergence program.
      • Develop a baseline and periodically review on risks, security policies and procedures, incident response, disaster recovery, and business continuity plan.

      Technology

      • Conduct a maturity assessment and identify convergence elements and compliance obligations.
      • Develop a roadmap and deploy converging security architecture and controls step by step, working with trusted technology partners.
      • Monitor security metrics on effectiveness and efficiency and conduct continuous testing by red-team and blue-team activities.

      (Source: “Grid Modernization: Optimize Opportunities And Minimize Risks,” Info-Tech)

      Enhance

      Update security strategy

      To update security strategy, it is important to actively encourage visible sponsorship across management and to provide regular updates.

      Cycle for updating security strategy: 'Architecture design', 'Procurement', 'Installation', 'Maintenance', 'Decommissioning'.
      (Source: NIST SP 800-82 Rev.3, “Guide to Operational Technology (OT) Security,” NIST, 2022.)
      • OT system life cycle is like the IT system life cycle, starting with architectural design and ending with decommissioning.
      • Currently, IT only gets involved from installation or maintenance, so they may not fully understand the OT system. Therefore, if OT security is compromised, the same personnel who commissioned the OT system (e.g. engineering, electrical, and maintenance specialists) must be involved. Thus, it is important to have the IT team collaborate with the OT team in each stage of the OT system’s life cycle.
      • Finally, it is necessary to have propositional sharing of responsibilities between IT leaders, security leaders, and OT leaders who have broader responsibilities.

      Enhance

      Update risk management framework

      The need for asset and threat taxonomy

      • One of issues in IT/OT convergence is that OT systems focus on production, so IT solutions like security patching or updates may deteriorate a machine or take a machine offline and may not be applicable. For example, some facilities run with reliability of 99.999%, which only allows maximum of 5 minutes and 35 seconds or less of downtime per year.
      • Managing risks requires an understanding of the assets and threats for IT/OT systems. Having a taxonomy of the assets and the threats cand help.
      • Applying normal IT solutions to mitigate security risks may not be applicable in an OT environment, e.g. running an antivirus tool on OT system may remove essential OT operations files. Thus, this approach must be avoided; instead, systems must be rebuilt from golden images.
      Risk management framework.
      (Source: ENISA, 2018.)

      Enhance

      Update security policies and procedures

      • Policy is the link between people, process, and technology for any size of organization. Small organizations may think that having formal policies in place is not necessary for their operations, but compliance is applicable to all organizations, and vulnerabilities affect organizations of all sizes as well. Small organizations partnering with clients or other organizations are sometimes viewed as ideal proxies for attackers.
      • Updating security policies to align with the OT system so that there is a uniform approach to securing both IT and OT environments has several benefits. For example, enhancing the overall security posture as issues are pre-emptively avoided, being better prepared for auditing and compliance requirements, and improving governance especially when OT governance is weak.
      • In updating security policies, it is important to redefine the policy framework to include the OT framework and to prioritize the development of security policies. For example, entities that own or manage US and Canadian electric power grids must comply with North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards, specifically CIP-003 for Policy and Governance. This can be achieved by understanding the current state of policies and by right-sizing the policy suite based on a policy hierarchy.
      The White House released an Executive Order on Improving the Nation’s Cybersecurity (EO 14028) in 2021 that establishes new requirements on the scope of protection and security policy such that it must include both IT and OT.

      Policy hierarchy example

      This example of a policy hierarchy features templates from Info-Tech’s Develop and Deploy Security Policies and Identify the Best Framework for Your Security Policies research.

      Example policy hierarchy with four levels, from top-down: 'Governance', 'Process-based policies', 'Prescriptive/ technical (for IT including OT elements)', 'Prescriptive/ technical (for users)'.

      Enhance

      Update IR, DR, and BCP

      A proactive approach to security is important, so actions such as updating and testing the incident response plan for OT are a must. (“Cybersecurity Year In Review” Dragos, 2022.)

      1. Customize organizational chart for IT/OT IR, DR, BCP based on governance and management model.
        E.g. ad hoc, internal distributed, internal centralized, combined distributed, and decentralized. (Software Engineering Institute, 2003)
      2. Adjust the authority of the new organizational chart and decide if it requires additional staffing.
        E.g. full authority, shared authority. (Software Engineering Institute, 2003)
      3. Update IR plan, DR plan, and BCP for IT/OT convergence.
        E.g. incorporate zero trust principles for converge network
      4. Testing updated IR plan, DR plan, and BCP.

      Optimize

      Implement awareness, induction, and cross-training

      To develop training and awareness programs for all levels of the organization, it is important to understand the common challenges in IT security that also affect secure IT/OT convergence and how to overcome those challenges.

      Alert Fatigue

      Too many false alarms, too many events to process, and an evolving threat landscape that wastes analysts’ valuable time on mundane tasks such as evidence collection. Meanwhile, only limited time is given for decision and conclusion, which results in fear of missing an incident and alert fatigue.

      Skill Shortages

      Obtaining and retaining cybersecurity-skilled talent is challenging. Organizations need to invest in the people, but not all organizations will be able to invest sufficiently to have their own dedicated security team.

      Lack of Insight

      To report progress, clear metrics are needed. However, cybersecurity still falls short in this area, as the system itself is complex, and much work is siloed. Furthermore, lessons learned are not yet distilled into insights yet for improving future accuracy.

      Lack of Visibility

      Ensuring complete visibility of the threat landscape, risks, and assets requires system integration and consistent workflow across the organization, and the convergence of OT, IoT, and IT enhances this challenge (e.g. machines cannot be scanned during operational uptime).
      (Source: Security Intelligence, 2020.)
      “Cybersecurity staff are feeling burnout and stressed to the extent that many are considering leaving their jobs.” (Danny Palmer, ZDNET News, 2022)

      Awareness may not correspond to readiness

      • An issue with IT/OT convergence training and awareness happens when awareness exists, but the personnel are trained only for IT security and are not trained for OT-specific security. For example, some organizations still use generic topics such as not opening email attachments, when the personnel do not even operate using email nor in a web browsing environment. (“Assessing Operational Readiness,” Dragos, 2022)
      • Meanwhile, as is the case with IT, OT security training topics are broad, such as OT threat intelligence, OT-specific incident response, and tabletop exercises.
      • Hence, it requires the creation of a training program development plan that considers the various audiences and topics and maps them accordingly.
      • Moreover, roles are also evolving due to convergence and modernization. These new roles require an integrative skill set. For example, the grid security & ops team might consist of an IT security specialist, SCADA technician/engineer, and OT/IIOT security specialist where OT/IIOT security specialist is a new role. (Grid Modernization: Optimize Opportunities and Minimize Risks,” Info-Tech)
      • In conclusion, it is important to approach talent development with an open mind. The ability to learn and flexibility in the face of change are important attributes, and technical skill sets can be improved with certifications and training.
      “One area regularly observed by Dragos is a weakness in overall cyber readiness and training tailored specific to the OT environment.” (“Assessing Operational Technology,” Dragos, 2022.)

      Certifications

      What are the options?
      • One of issues in certification is the complexity on relevancy in topics with respect to roles and levels.
      • An example solution is the European Union Agency for Cybersecurity (ENISA)’s approach to analyzing existing certifications by orientation, scope, and supporting bodies, grouped into specific certifications, relevant certifications, and safety certifications.

      Specific cybersecurity certification of ICS/SCADA
      Example: ISA-99/IEC 62443 Cybersecurity Certificate Program, GIAC Global Industrial Cyber Security Professional (GICSP), Certified SCADA Security Architect (CSSA), EC-Council ICS/SCADA Cybersecurity Training Course.

      Other relevant certification schemes
      Example: Network and Information Security (NIS) Driving License, ISA Certified Automation Professional (CAP), Industrial Security Professional Certification (NCMS-ISP).

      Safety Certifications
      Example: Board of Certified Safety Professionals (BCSP), European Network of Safety and Health Professional Organisations (ENSHPO).

      Order of certifications with 'Orientation' at the top, 'Scope', then 'Support'.(Source: ENISA, 2015.)

      Optimize

      Design and deploy converging security architecture and controls

      • IT/OT convergence architecture can be modeled as a layered structure based on security. In this structure, the bottom layer is referred as “OT High-Security Zone” and the topmost layer is “IT Low-Security Zone.” In this model, each layer has its own set of controls configured and acts like an additional layer of security for the zone underneath it.
      • The data flows from the “OT High-Security Zone” to the topmost layer, the “IT Low-Security Zone,” and the traffic must be verified to pass to another zone based on the need-to-know principle.
      • In the normal control flow within the “OT High-Security Zone” from level 3 to level 0, the traffic must be verified to pass to another level based on the principle of least privilege.
      • Remote access (dotted arrow) is allowed under strict access control and change control based on the zero-trust principle with clear segmentation and a point for disconnection between the “OT High-Security Zone” and the “OT Low-Security Zone”
      • This model simplifies the security process, as if the lower layers have been compromised, then the compromise can be confined on that layer, and it also prevents lateral movement as access is always verified.
      Diagram for the deployments of converging security architecture.(Source: “Purdue Enterprise Reference Architecture (PERA) model,” ISA-99.)

      Off-the-shelf solutions

      Getting the right recipe: What criteria to consider?

      Image of a shopping cart with the four headlines on the right listed in order from top to bottom.
      Icon of an eye crossed out. Visibility and Asset Management

      Passive data monitoring using various protocol layers, active queries to devices, or parsing configuration files of OT, IoT, and IT environments on assets, processes, and connectivity paths.

      Icon of gears. Threat Detection, Mitigation, and Response (+ Hunting)

      Automation of threat analysis (signature-based, specification-based, anomaly-based, sandboxing) not only in IT but also in relevant environments, e.g. IoT, IIoT, and OT on assets, data, network, and orchestration with threat intelligence sharing and analytics.

      Icon of a check and pen. Risk Assessment and Vulnerability Management

      Risk scoring approach (qualitative, quantitative) based on variables such as behavioral patterns and geolocation. Patching and vulnerability management.

      Icon of a wallet. Usability, Architecture, Cost

      The user and administrative experience, multiple deployment options and extensive integration capabilities, and affordability.

      Optimize

      Establish and monitor IT/OT security metrics for effectiveness and efficiency

      Role of security metrics in a cybersecurity program (EPRI, 2017.)
      • Requirements for secure IT/OT are derived from mandatory or voluntary compliance, e.g. NERC CIP, NIST SP 800-53.
      • Frameworks for secure IT/OT are used to build and implement security, e.g. NIST CSF, AESCSF.
      • Maturity of secure IT/OT is used to measure the state of security, e.g. C2M2, CMMC.
      • Security metrics have the role of measuring effectiveness and efficiency.

      Icon of a person ascending stairs.
      Safety

      OT interfaces with the physical world. Thus, metrics based on risks related with life, health, and safety are crucial. These metrics motivate personnel by making clear why they should care about security. (EPRI, 2017.)

      Icon of a person ascending stairs.
      Business Performance

      The impact of security on the business can be measured in various metrics such as operational metrics, service level agreements (SLAs), and financial metrics. (BMC, 2022.)

      Icon of a person ascending stairs.
      Technology Performance

      Early detection will lead to faster remediation and less damage. Therefore, metrics such as maximum tolerable downtime (MTD) and mean time to recovery (MTR) indicate system reliability. (Dark Reading, 2022)

      Icon of a person ascending stairs.
      Security Culture

      The metrics for the overall quality of security culture with indicators such as compliance and audit, vulnerability management, and training and awareness.

      Further information

      Related Info-Tech Research

      Sample of 'Build an Information Security Strategy'.

      Build an Information Security Strategy

      Info-Tech has developed a highly effective approach to building an information security strategy – an approach that has been successfully tested and refined for over seven years with hundreds of organizations.

      This unique approach includes tools for ensuring alignment with business objectives, assessing organizational risk and stakeholder expectations, enabling a comprehensive current-state assessment, prioritizing initiatives, and building a security roadmap.

      Sample of 'Preparing for Technology Convergence in Manufacturing'.

      Preparing for Technology Convergence in Manufacturing

      Information technology (IT) and operational technology (OT) teams have a long history of misalignment and poor communication.

      Stakeholder expectations and technology convergence create the need to leave the past behind and build a culture of collaboration.

      Sample of 'Implement a Security Governance and Management Program'.

      Implement a Security Governance and Management Program

      Your security governance and management program needs to be aligned with business goals to be effective.

      This approach also helps provide a starting point to develop a realistic governance and management program.

      This project will guide you through the process of implementing and monitoring a security governance and management program that prioritizes security while keeping costs to a minimum.

      Bibliography

      Assante, Michael J. and Robert M. Lee. “The Industrial Control System Cyber Kill Chain.” SANS Institute, 2015.

      “Certification of Cyber Security Skills of ICS/SCADA Professionals.” European Union Agency for Cybersecurity (ENISA), 2015. Web.

      Cooksley, Mark. “The IEC 62443 Series of Standards: A Product Manufacturer‘s Perspective.” YouTube, uploaded by Plainly Explained, 27 Apr. 2021. Accessed 26 Aug. 2022.

      “Cyber Security Metrics for the Electric Sector: Volume 3.” Electric Power Research Institute (EPRI), 2017.

      “Cybersecurity and Physical Security Convergence.” Cybersecurity and Infrastructure Security Agency (CISA). Accessed 19 May 2022.

      “Cybersecurity in Operational Technology: 7 Insights You Need to Know,” Ponemon, 2019. Web.

      “Developing an Operational Technology and Information Technology Incident Response Plan.” Public Safety Canada, 2020. Accessed 6 Sep. 2022.

      Gilsinn, Jim. “Assessing Operational Technology (OT) Cybersecurity Maturity.” Dragos, 2021. Accessed 02 Sep. 2022.

      “Good Practices for Security of Internet of Things.” European Union Agency for Cybersecurity (ENISA), 2018. Web.

      Greenfield, David. “Is the Purdue Model Still Relevant?” AutomationWorld. Accessed 1 Sep. 2022

      Hemsley, Kevin E., and Dr. Robert E. Fisher. “History of Industrial Control System Cyber Incidents.” US Department of Energy (DOE), 2018. Accessed 29 Aug. 2022.

      “ICS Security Related Working Groups, Standards and Initiatives.” European Union Agency for Cybersecurity (ENISA), 2013.

      Killcrece, Georgia, et al. “Organizational Models for Computer Security Incident Response Teams (CSIRTs).” Software Engineering Institute, CMU, 2003.

      Liebig, Edward. “Security Culture: An OT Survival Story.” Dark Reading, 30 Aug. 2022. Accessed 29 Aug. 2022.

      Bibliography

      O'Neill, Patrick. “Russia Hacked an American Satellite Company One Hour Before the Ukraine Invasion.” MIT Technology Review, 10 May 2022. Accessed 26 Aug. 2022.

      Palmer, Danny. “Your Cybersecurity Staff Are Burned Out – And Many Have Thought About Quitting.” Zdnet, 08 Aug. 2022. Accessed 19 Aug. 2022.

      Pathak, Parag. “What Is Threat Management? Common Challenges and Best Practices.” SecurityIntelligence, 23 Jan. 2020. Web.

      Raza, Muhammad. “Introduction To IT Metrics & KPIs.” BMC, 5 May 2022. Accessed 12 Sep. 2022.

      “Recommended Practice: Developing an Industrial Control Systems Cybersecurity Incident Response Capability.” Department of Homeland Security (DHS), Oct. 2009. Web.

      Sharma, Ax. “Sigma Rules Explained: When and How to Use Them to Log Events.” CSO Online, 16 Jun. 2018. Accessed 15 Aug. 2022.

      “Significant Cyber Incidents.” Center for Strategic and International Studies (CSIS). Accessed 1 Sep. 2022.

      Tom, Steven, et al. “Recommended Practice for Patch Management of Control Systems.” Department of Homeland Security (DHS), 2008. Web.

      “2021 ICS/OT Cybersecurity Year In Review.” Dragos, 2022. Accessed 6 Sep. 2022.

      “2021 State of Operational Technology and Cybersecurity Report,” Fortinet, 2021. Web.

      Zetter, Kim. “Pre-Stuxnet, Post-Stuxnet: Everything Has Changed, Nothing Has Changed.” Black Hat USA, 08 Aug. 2022. Accessed 19 Aug. 2022.

      Research Contributors and Experts

      Photo of Jeff Campbell, Manager, Technology Shared Services, Horizon Power, AU. Jeff Campbell
      Manager, Technology Shared Services
      Horizon Power, AU

      Jeff Campbell has more than 20 years' experience in information security, having worked in both private and government organizations in education, finance, and utilities sectors.

      Having focused on developing and implementing information security programs and controls, Jeff is tasked with enabling Horizon Power to capitalize on IoT opportunities while maintaining the core security basics of confidentiality, integrity and availability.

      As Horizon Power leads the energy transition and moves to become a digital utility, Jeff ensures the security architecture that supports these services provides safer and more reliable automation infrastructures.

      Christopher Harrington
      Chief Technology Officer (CTO)
      Carolinas Telco Federal Credit Union

      Frank DePaola
      Vice President, Chief Information Security Officer (CISO)
      Enpro

      Kwasi Boakye-Boateng
      Cybersecurity Researcher
      Canadian Institute for Cybersecurity

      Application Development Quality

      • Buy Link or Shortcode: {j2store}26|cart{/j2store}
      • Related Products: {j2store}26|crosssells{/j2store}
      • member rating overall impact: 10.0/10
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Applications
      • Parent Category Link: /applications
      Apply quality assurance across your critical development process steps to secure quality to product delivery

      Human Resources Management

      • Buy Link or Shortcode: {j2store}31|cart{/j2store}
      • Related Products: {j2store}31|crosssells{/j2store}
      • member rating overall impact: 9.6/10
      • member rating average dollars saved: $13,367
      • member rating average days saved: 7
      • Parent Category Name: people and Resources
      • Parent Category Link: /people-and-resources
      Talent is the differentiator; availability is not.

      Choose Your Mobile Platform and Tools

      • Buy Link or Shortcode: {j2store}281|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Mobile Development
      • Parent Category Link: /mobile-development
      • Organizations see the value of mobile applications in improving productivity and reach of day-to-day business and IT operations. This motivates leaders to begin the planning of their first application.
      • However, organizations often lack the critical foundational knowledge and skills to deliver and maintain high quality and valuable applications that meet business and user priorities and technical requirements.
      • Mobile technologies and trends are continually evolving and maturing. It is hard to predict which trends will make a significant impact and to prepare current mobile investments to harness their value of these trends.

      Our Advice

      Critical Insight

      • Mobile applications can stress the stability, reliability, and overall quality of your enterprise systems and services. They will also increase your security risks because of the exposure of your enterprise technology assets to unsecured networks and devices.
      • High costs of entry may restrict what built-in features your users can have in their mobile experience. Workarounds may not be sufficient to offset the costs of certain built-in feature needs.
      • Many operating models do not enable or encourage the collaboration required to fully understand user needs and behaviors and evaluate mobile opportunities and underlying operational systems from multiple perspectives.

      Impact and Result

      • Establish the right expectations. Understand your mobile users by learning their needs, challenges, and behaviors. Discuss the current state of your systems and your high priority non-functional requirements to determine what to expect from your mobile applications.
      • Choose the right mobile platform approach and shortlist your mobile delivery solutions. Obtain a thorough view of the business and technical complexities of your mobile opportunities, including current mobile delivery capabilities and system compatibilities.
      • Create your mobile roadmap. Describe the gradual rollout of your mobile technologies through minimal valuable products (MVPs).

      Choose Your Mobile Platform and Tools Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Choose Your Mobile Platform and Tools Storyboard

      This blueprint helps you develop an approach to understand the mobile experience your stakeholders want your users to have and select the appropriate platform and delivery tools to meet these expectations.

      • Choose Your Mobile Platform and Tools Storyboard

      2. Mobile Application Delivery Communication Template – Clearly communicate the goal and approach of your mobile application implementation in a language your audience understands.

      This template narrates a story to describe the need and expectations of your low- and no-code initiative to get buy-in from stakeholders and interested parties.

      • Mobile Application Delivery Communication Template

      Infographic

      Workshop: Choose Your Mobile Platform and Tools

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Choose Your Platform and Delivery Solution

      The Purpose

      Choose the right mobile platform.

      Shortlist your mobile delivery solution and desired features and services.

      Key Benefits Achieved

      A chosen mobile platform that meets user and enterprise needs.

      Candidate mobile delivery solutions that meet your delivery needs and capacity of your teams.

      Activities

      1.1 Select your platform approach.

      1.2 Shortlist your mobile delivery solution.

      1.3 Build your feature and service lists.

      Outputs

      Desired mobile platform approach.

      Shortlisted mobile delivery solutions.

      Desired list of vendor features and services.

      2 Create Your Roadmap

      The Purpose

      Design the mobile application minimal viable product (MVP).

      Create your mobile roadmap.

      Key Benefits Achieved

      An achievable and valuable mobile application that is scalable for future growth.

      Clear intent of business outcome delivery and completing mobile delivery activities.

      Activities

      2.1 Define your MVP release.

      2.2 Build your roadmap.

      Outputs

      MVP design.

      Mobile delivery roadmap.

      3 Set the Mobile Context

      The Purpose

      Understand your user’s environment needs, behaviors, and challenges.

      Define stakeholder expectations and ensure alignment with the holistic business strategy.

      Identify your mobile application opportunities.

      Key Benefits Achieved

      Thorough understanding of your mobile user and opportunities where mobile applications can help.

      Level set stakeholder expectations and establish targeted objectives.

      Prioritized list of mobile opportunities.

      Activities

      3.1 Generate user personas with empathy maps.

      3.2 Build your mobile application canvas.

      3.3 Build your mobile backlog.

      Outputs

      User personas.

      Mobile objectives and metrics.

      Mobile opportunity backlog.

      4 Identify Your Technical Needs

      The Purpose

      Define the mobile experience you want to deliver and the features to enable it.

      Understand the state of your current system to support mobile.

      Identify your definition of mobile application quality.

      List the concerns with mobile delivery.

      Key Benefits Achieved

      Clear understanding of the desired mobile experience.

      Potential issues and risks with enabling mobile on top of existing systems.

      Grounded understanding of mobile application quality.

      Holistic readiness assessment to proceed with mobile delivery.

      Activities

      4.1 Discuss your mobile needs.

      4.2 Conduct a technical assessment.

      4.3 Define mobile application quality.

      4.4 Verify your decision to deliver mobile applications.

      Outputs

      List of mobile features to enable the desired mobile experience.

      System current assessment.

      Mobile application quality definition.

      Verification to proceed with mobile delivery.

      Further reading

      Choose Your Mobile Platform and Tools

      Maximize the value of your mobile investments by prioritizing technology decisions on user experience, business priorities, and system quality.

      EXECUTIVE BRIEF

      Analyst Perspective

      Mobile is the way of working.

      Workers require access to enterprise products, data, and services anywhere at anytime on any device. Give them the device-specific features, offline access, desktop-like interfaces, and automation capabilities they need to be productive.

      To be successful, you need to instill a collaborative business-IT partnership. Only through this partnership will you be able to select the right mobile platform and tools to balance desired outcomes with enterprise security, performance, integration, quality, and other delivery capacity concerns.

      This is a picture of Andrew Kum-Seun Senior Research Analyst, Application Delivery and Application Management Info-Tech Research Group

      Andrew Kum-Seun
      Senior Research Analyst,
      Application Delivery and Application Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Organizations see the value of mobile applications in improving productivity and reach of day-to-day business and IT operations. This motivates leaders to begin the planning of their first application.
      • However, organizations often lack the critical foundational knowledge and skills to deliver and maintain high quality and valuable applications that meet business and user priorities and technical requirements.
      • Mobile technologies and trends are continually evolving and maturing. It is hard to predict which trends will make a significant impact and to prepare current mobile investments to harness the value of these trends.

      Common Obstacles

      • Mobile applications can stress the stability, reliability and overall quality of your enterprise systems and services. They will also increase your security risks because of the exposure of your enterprise technology assets to unsecured networks and devices.
      • High costs of entry may restrict what native features your users can have in their mobile experience. Workarounds may not be sufficient to offset the costs of certain native feature needs.
      • Many operating models do not enable or encourage the collaboration required to fully understand user needs and behaviors and evaluate mobile opportunities and underlying operational systems from multiple perspectives.

      Info-Tech's Approach

      • Establish the right expectations. Understand your mobile users by learning their needs, challenges, and behaviors. Discuss the current state of your systems and your high priority non-functional requirements to determine what to expect from your mobile applications.
      • Choose the right mobile platform approach and shortlist your mobile delivery solutions. Obtain a thorough view of the business and technical complexities of your mobile opportunities, including current mobile delivery capabilities and system compatibilities.
      • Create your mobile roadmap. Describe the gradual rollout of your mobile technologies through minimal valuable products (MVPs).

      Insight Summary

      Overarching Info-Tech Insight

      Treat your mobile applications as digital products. Digital products are continuously modernized to ensure they are fit-for-purpose, secured, accessible, and immersive. A successful mobile experience involves more than just the software and supporting system. It involves good training and onboarding, efficient delivery turnaround, and a clear and rational vision and strategy.

      Phase 1: Set the Mobile Context

      • Build applications your users need and desire – Design the right mobile application that enables your users to address their frustrations and productivity challenges.
      • Maximize return on your technology investments – Build your mobile applications with existing web APIs, infrastructure, and services as much as possible.
      • Prioritize mobile security, performance and integration requirements – Understand the unique security, performance, and integration influences has on your desired mobile user experience. Find the right balance of functional and non-functional requirements through business and IT collaboration.

      Phase 2: Define Your Mobile Approach

      • Start with a mobile web platform - Minimize disruptions to your existing delivery process and technical stack by building against common web standards. Select a hybrid platform or cross-platform if you need device hardware access or have complicated non-functional requirements.
      • Focus your mobile solution decision on vendor support and functional complexity – Verify that your solution is not only compatible with the architecture, data, and policies of existing business systems, but satisfies IT's concerns with access to restricted technology and data, and with IT's ability to manage and operate your applications.
      • Anticipate changes, defects & failures in your roadmap - Quickly shift your mobile roadmaps according to user feedback, delivery challenges, value, and stability.

      Mobile is how the business works today

      Mobile adoption continues to grow in part due to the need to be a mobile workforce, and the shift in customer behaviors. This reality pushed the industry to transform business processes and technologies to better support the mobile way of working.

      Mobile Builds Interests
      61%
      Mobile devices drove 61% of visits to U.S. websites
      Source: Perficient, 2021

      Mobile Maintains Engagement
      54%
      Mobile devices generated 54.4% of global website traffic in Q4 2021.
      Source: Statista, 2022

      Mobile Drives Productivity
      82%
      According to 82% of IT executives, smartphones are highly important to employee productivity
      Source: Samsung and Oxford Economics, 2022

      Mobile applications enable and drive your digital business strategy

      Organizations know the criticality of mobile applications in meeting key business and digital transformation goals, and they are making significant investments. Over half (58%) of organizations say their main strategy for driving application adoption is enabling mobile access to critical enterprise systems (Enterprise CIO, 2016). The strategic positioning and planning of mobile applications are key for success.

      Mobile Can Motivate, Support and Drive Progress in Key Activities Underpinning Digital Transformation Goals

      Goal: Enhance Customer Experience

      • A shift from paper to digital communications
      • Seamless, omni-channel client experiences across devices
      • Create Digital interactive documents with sections that customers can customize to better understand their communications

      Goal: Increase Workflow Throughput & Efficiency

      • Digitized processes and use of data to improve process efficiency
      • Modern IT platforms
      • Automation through robotic process automation (RPA) where possible
      • Use of AI and machine learning for intelligent automation

      Source: Broadridge, 2022

      To learn more, visit Info-Tech's Define Your Digital Business Strategy blueprint.

      Well developed mobile applications bring unique opportunities to drive more value

      Role

      Opportunities With Mobile Applications

      Expected Value

      Stationary Worker

      Design flowcharts and diagrams, while abandoning paper and desktop applications in favor of easy-to-use, drawing tablet applications.

      Multitask by checking the application to verify information given by a vendor during their presentation or pitch.

      • Reduce materials cost to complete administrative responsibilities.
      • Digitally and automatically store and archive frequently used documents.

      Roaming Worker
      (Engineer)

      Replace physical copies of service and repair manuals with digital copies, and access them with mobile applications.

      Scan or input product bar code to determine whether a replacement part is available or needs to be ordered.

      • Readily access and update corporate data anywhere at anytime.
      • Expand employee responsibilities with minimal skills impact.

      Roaming Worker
      (Nurse)

      Log patient information according to HIPAA standards and complete diagnostics live to propose medication for a patient.

      Receive messages from senior staff about patients and scheduling while on-call.

      • Quickly and accurately complete tasks and update patient data at site.
      • Be readily accessible to address urgent issues.

      Info-Tech Insight

      If you build it, they may not come. Design and build the applications your user wants and needs, and ensure users are properly onboarded and trained. Learn how your applications are leveraged, capture feedback from the user and system dashboards, and plan for enhancements, fixes, and modernizations.

      Workers expect IT to deliver against their high mobile expectations

      Workers want sophisticated mobile applications like what they see their peers and competitors use.

      Why is IT considering building their own applications?

      • Complex and Unique Workflows: Canned templates and shells are viewed as incompatible to the workflows required to complete worker responsibilities outside the office, with the same level of access to corporate data as on premise.
      • Supporting Bring Your Own Device (BYOD): Developing your own mobile applications around your security protocols and standards can help mitigate the risks with personal devices that are already in your workforce.
      • Long-Term Architecture Misalignment: Outsourcing mobile development risks the mobile application misaligned with your quality standards or incompatible with other enterprise and third-party systems.

      Continuously meeting aggressive user expectations will not be easy

      Value Quickly Wears Off
      39.9% of users uninstall an application because it is not in use.
      40%
      Source: n=2,000, CleverTap, 2021

      Low Tolerance to Waiting
      Keeping a user waiting for 3 seconds is enough to dissatisfy 43% of users.
      43%
      Source: AppSamurai, 2018

      Quick Fixes Are Paramount
      44% of defects are found by users
      44%
      Source: Perfecto Mobile, 2014

      Mobile emphasizes the importance of good security, performance, and integration

      Today's mobile workers are looking for new ways to get more work done quickly. They want access to enterprise solutions and data directly on their mobile devices, which can reside on multiple legacy systems and in the cloud and third-party infrastructure. This presents significant performance, integration, and security risks.

      Cloud Solutions: Can I use my existing APIs?. Solutions in Corporate Networks: Do my legacy systems have the capacity to support mobile?; How do I integrate solutions and data from multiple sources into a single view?; Third Party Solutions: Will I have a significant performance bottleneck?; Single View on Mobile Devices: How is corporate data stored on the device?; What new technology dependencies must I account for in my architecture and operational support capabilities?

      Accept change as the norm

      IT is challenged with keeping up with disruptive technologies, such as mobile, which are arriving and changing faster and faster.

      What is the issue? Mobile priorities, concepts, and technologies do not remain static. For example, current Google's Pixels benefit from at least three versions of Android updates and at least three years of monthly security patches after their release (NextPit, 2022). Keeping up to date with anything mobile is difficult if you do not have the right delivery and product management practices in place.

      What is the impact on IT? Those who fail to prepare for changing requirements and technologies will quickly run into maintainability, extensibility, and flexibility issues. Mobile applications will quickly become stale and misaligned with the maturity of other enterprise infrastructure and applications.

      Continuously look at the trends, vendor roadmaps, and your user's feedback to envision where your mobile applications should be. Learning from your past attempts gives you insights on the opportunities and impacts changes will have on your people, process, and technology.

      How do I address this issue? A well-defined mobile vision and roadmap ensures your initiatives are aligned with your holistic business and technology strategies, the right problem is being solved, and resources are available to deliver high priority changes.

      To learn more, visit Info-Tech's Deliver on Your Digital Product Vision blueprint.

      Address the difficulties in managing enterprise mobile technologies

      Adaptability During Development

      Teams must be ready to alter their mobile approach when new insights and issues arise during and after the delivery of your mobile application and its updates.

      High Cybersecurity Standards

      Cybersecurity should be a top priority given the high security exposure of mobiles and the sensitive data mobile applications need to operate. Role-based access, back-up systems, advanced scanning, and protection software and encryption should all be implemented.

      Integration with Other Systems

      Your application will likely be integrated with other systems to expand service offerings and optimize performance and user experience. Your enterprise integration strategy ensures all systems connect against a common pattern with compatible technologies.

      Finding the Right Mobile Developers

      Enterprise mobile delivery requires a broad skillset to build valuable applications against extensive non-functional requirements in complex and integration environments. The right resources are even harder to find when native applications are preferred over web-based ones.

      Source: Radoslaw Szeja, Netguru, 2022.

      Build and manage the right experience by treating mobile as digital products

      Digital products are continuously modernized to ensure they are fit-for-purpose, secured, insightful, accessible, and interoperable. A good experience involves more than just technology.

      First, deliver the experience end users want and expect by designing the application against digital application principles.

      Business Value

      Continuous modernization

      • Fit for purpose
      • User-centric
      • Adaptable
      • Accessible
      • Private and secured
      • Informative and insightful
      • Seamless application connection
      • Relationship and network building

      To learn more, visit Info-Tech's Modernize Your Applications blueprint.

      Then, deliver a long-lasting experience by supporting your applications with key governance and management capabilities.

      • Product Strategy and Roadmap
      • External Relationships
      • User Adoption and Organizational Change Management
      • Funding
      • Knowledge Management
      • Stakeholder Management
      • Product Governance
      • Maintenance & Enhancement
      • User Support
      • Managing and Governing Data
      • Requirements Analysis and Design
      • Research & Development

      To learn more, visit Info-Tech's Make the Case for Product Delivery blueprint.

      Choose Your Mobile Platform and Tools

      Maximize the value of your mobile investments by prioritizing technology decisions on user experience, business priorities, and system quality.

      WORKFLOW

      1. Capture Your User Personas and Journey workflow: Trigger: Step 1; Step 2; Step 3; Step 4; Outcome
      2. Select Your Platform Nine datapoints are arranged on a graph where the x axis s labeled: User Centric Needs; and the Y axis is labeled: Enterprise-centric needs. The datapoints are, in order from left to right, top to bottom: Hybrid; Cross- Platform; Native; Web; Hybrid or Cross- Platform; Cros-s Platform; Web; Web; Hybrid or Cross- Platform.
      3. Shortlist Your Solutions A quadrant analysis is depicted. the top data is labeled Complex Mobile Features; the right side is labeled Organization-Managed Stack; the bottom is labeled Simple Mobile Features; and the left side is labeled Vendor-Managed Stack. The quadrants are labeled the following, in order from left to right, top to bottom. Vendor- Hosted Mobile Platform; Custom Native Development Solutions; Commercial-Off-the-Shelf Solutions; Custom Web Development Solutions. In the middle of the graph are the following, in order from top to bottom: Cross-Platform Development Solutions; Hybrid Development Solutions

      Strategic Perspective
      Business and Product Strategies

      1. End-User Perspective

      End User Needs

      • Productivity
      • Innovation
      • Transformation

      Native User Experience

      • Anytime, Anywhere
      • Visually Pleasing & Fulfilling
      • Personalized & Insightful
      • Hands-Off & Automated
      • Integrated Ecosystem

      2. Platform Perspective

      Technical Requirements

      Security

      Performance

      Integration

      Mobile Platform

      3. Solution Perspective

      Vendor Support

      Services

      Stack Mgmt.

      Quality & Risk

      Mobile Delivery Solutions

      Make user experience (UX) the standard

      User experience (UX) focuses on a user's emotions, beliefs, and physical and psychological responses that occur before, during, or after interacting with a service or product.

      For a mobile application to be meaningful, the functions, aesthetics and content must be:

      • Usable
        • Users can intuitively navigate through your mobile application and complete their desired tasks.
      • Desirable
        • The application elements are used to evoke positive emotions and appreciation.
      • Accessible
        • Users can easily use your mobile application, including those with disabilities.
      • Valuable
        • Users find the content useful, and it fulfills a need.

      Enable a greater experience with UX-driven thinking

      Designing for a high-quality experience requires more than just focusing on the UI. It also requires the merging of multiple business, technical, and social disciplines in order to create an immersive, practical, and receptive application. The image on the right explains the disciplines involved in UX. This is critical for ensuring users have a strong desire to use the mobile application, it is adequately supported technically, and it supports business objectives.

      To learn more, visit Info-Tech's Implement and Mature Your User Experience Design Practice blueprint.

      A Venn diagram is depicted, demonstrating the inputs that lead to an interactive design, with interactive elements, usability, and accessibility. This work by Mark Roden is licensed under a Creative Commons Attribution 3.0 Unported License.

      Source: Marky Roden, Xomino, 2018

      Define the mobile experience your end users want

      • Anytime, Anywhere
        • The user can access, update and analyze data and corporate products and services whenever they want, in all networks, and on any device.
      • Hands-Off and Automated
        • The application can perform various workflows and tasks without the user's involvement and notify the user when specific triggers are hit.
      • Personalized and Insightful
        • Content presentation and subject are tailored for the user based on specific inputs from the user, device hardware, or predicted actions.
      • Integrated Ecosystem
        • The application supports a seamless experience across various third-party and enterprise applications and services the user needs.
      • Visually Pleasing and Fulfilling
        • The UI is intuitive and aesthetically gratifying, with little security and performance trade-offs to use the full breadth of its functions and services.

      Each mobile platform has its own take on the mobile native experience. The choice ultimately depends on whether the costs and effort are worth the anticipated value.

      Mobile value is dependent on the platform you choose

      What is a platform?

      "A platform is a set of software and a surrounding ecosystem of resources that helps you to grow your business. A platform enables growth through connection: its value comes not only from its own features, but from its ability to connect external tools, teams, data, and processes." (Source: Emilie Nøss Wangen, 2021) In the mobile context, applications in a platform execute and communicate through a loosely-coupled API architecture, whether the supporting system is managed and supported by your organization or by third-party providers.

      Web

      Mobile web applications are deployed and executed within the mobile web browser. They are often developed with a combination of web and scripting languages, such as HTML, CSS, and JavaScript. Web often takes two forms on mobile:

      • Progressive Web Applications (PWA)
      • Mobile Web Sites

      Hybrid

      Hybrid applications are developed with web technologies but are deployed as native applications. The code is wrapped using a framework so that it runs locally within a native container. It uses the device's browser runtime engine to support more sophisticated designs and features than to the web approach.

      Cross-Platform

      Cross-platform applications are developed within a distinct programming or scripting environment that uses its own scripting language (often like web languages) and APIs. The solution compiles the code into device-specific builds for native deployment.

      Native

      Native applications are developed and deployed to specific devices and OSs using platform-specific software development kits (SDKs) provided by the operating system vendors. The programming language and framework are dictated by the targeted device, such as Java for Android.

      Start mobile development on a mobile web platform

      Start with what you have: begin with a mobile web platform to minimize impacts to your existing delivery skill sets and technical stack while addressing business needs. Resort to a hybrid first. Then consider a cross-platform application if you require device access or need to meet specific non-functional requirements.

      Why choose a mobile web platform?

      Pros

      The latest versions of the most popular web languages (HTML5, CSS3, JavaScript) abstract away from the granular, physical components of the application, simplifying the development process. HTML5 offer some mobile features (e.g. geolocation, accelerometer) that can meet your desired experience without the need for native development skills. Native look-and-feel, high performance, and full device access are just a few tradeoffs of going with web languages.

      Cons

      Native mobile platforms depend on device-specific code which follows specific frameworks and leverages unique programming libraries, such as Objective C for iOS and Java for Android. Each language requires a high level of expertise in the coding structure and hardware of specific devices. This requires resources with specific skillsets and different tools to support development and testing.

      Other Notable Benefits with Web Languages

      • Modern browsers in most mobile devices can execute and render many mobile features developed in web languages, allowing for greater portability and sophistication of code across multiple devices. However, this flexibility comes at the cost of performance since the browser's runtime engine will not perform as well as a native engine.
      • Web languages are well known by developers, minimizing skills and resourcing impacts. Consequently, changes can be quickly accommodated and updated uniformly across all end users.

      Select your mobile platform

      Drive your mobile platform selection against user-centric needs (e.g. device access, aesthetics) and enterprise-centric needs (e.g. security, system performance).

      When does a platform makes sense to use?

      Web

      • Desire to maximize current web technologies investments (people, process, and technologies).
      • Use cases do not require significant computational resources on the device or are tightly constrained by non-functional requirements.
      • Limited budget to acquire mobile development resources.
      • Access to device hardware is not a high priority.

      Hybrid / Cross-Platform

      • The need to quickly spin up native-like applications for multiple platforms and devices.
      • Desire to leverage existing web development skills, but also a need for device access and meeting specific non-functional requirements.
      • Vendor support is needed for the entire mobile delivery process.

      Native

      • Developers are experts in the target programming language and with the device's hardware.
      • Strong need for high performance, security, and device-specific access and customizations.
      • Application use cases require significant computing resources.

      Nine datapoints are arranged on a graph where the x axis s labeled: User Centric Needs; and the Y axis is labeled: Enterprise-centric needs. The datapoints are, in order from left to right, top to bottom: Hybrid; Cross- Platform; Native; Web; Hybrid or Cross- Platform; Cros-s Platform; Web; Web; Hybrid or Cross- Platform.

      Understand the common attributes of a mobile delivery solution

      • Source Code Management – Built-in or having the ability to integrate with code management solutions for branching, merging, and versioning. Debugging and coding assistance capabilities may be available.
      • Single Code Base – Capable of programming in a standard coding and scripting language for deployment into several platforms and devices. This code base is aligned to a common industry framework (e.g. AngularJS, Java) or a vendor-defined one.
      • Out-of-the-Box Connectors & Plug-ins – Pre-built APIs enhance the solution's capabilities with third-party tools and systems to deliver and manage high quality and valuable mobile applications.
      • Emulators – Ability to virtualize an application's execution on a target platform and device.
      • Support for Native Features – Supports plug-ins and APIs for access to device-specific features.

      What are mobile delivery solutions?

      A mobile delivery solution provides the tools, resources, and support to enable or build your mobile application. It can provide pre-built applications, vendor supported components to allow some configurations, or resources for full stack customizations. Solutions can be barebone software development kits (SDKs), or comprehensive suites offering features to support the entire software delivery lifecycle, such as:

      • Mobile application management
      • Testing and publishing to app stores
      • Content management
      • Cloud hosting
      • Application performance management

      Info-Tech Insight

      Mobile enablement and development capabilities are already embedded in many common productivity tools and enterprise applications, such as Microsoft PowerApps and ERP modules. They can serve as a starting point in the initial rollout of new management and governance practices without the need to acquire new tools.

      Select your mobile delivery solutions

      1. Set the scope of your framework.
      • The initial context of this framework is based on the mobile functions needed to support your desired mobile experience and on the current state of your enterprise and 3rd party systems.
    • Define the decision factors for your solution selection.
      • Review the decision factors that will influence the selection of your mobile delivery solution for each mobile opportunity:
      • Stack Management – Who will be hosting and supporting your mobile application stack?
      • Workflows Complexity & Native Experience – How complex is your desired mobile experience and how will native device features be leveraged?
    • Select your solution type.
      • Mobile delivery solutions are broadly defined in the following groups:
      • Commercial-Off-The-Shelf (COTS) – Pre-built mobile applications requiring little to no configurations or implementation effort.
      • Vendor Hosted Mobile Platform – Back-end and mid-tier infrastructure and operational support are managed by a vendor.
      • Cross-Platform Development – Frameworks that transform a single code base into platform-specific builds.
      • Hybrid Development – Tools that wrap a single code base into a locally deployable build.
      • Custom Web Development – Environment enabling full stack development for mobile web applications.
      • Custom Native Development – Environment enabling full stack development for mobile native applications.
    • A quadrant analysis is depicted. the top data is labeled Complex Mobile Features; the right side is labeled Organization-Managed Stack; the bottom is labeled Simple Mobile Features; and the left side is labeled Vendor-Managed Stack. The quadrants are labeled the following, in order from left to right, top to bottom. Vendor- Hosted Mobile Platform; Custom Native Development Solutions; Commercial-Off-the-Shelf Solutions; Custom Web Development Solutions. In the middle of the graph are the following, in order from top to bottom: Cross-Platform Development Solutions; Hybrid Development Solutions

      Optimize your software delivery process

      Mobile brings new delivery and management challenges that are often difficult for organizations that are tied to legacy systems, hindered by rigid and slow delivery lifecycles, and are unable to adopt leading-edge technologies. Many of these challenges stem from the fact that mobile is a significant shift from desktop development:

      • Mobile devices and operating systems are heavily fragmented, especially in the Android space.
      • Test coverage is significantly expanded to include physical environments and multiple network connections.
      • Mobile devices do not have the same performance capabilities and memory storage as their desktop counterparts.
      • The user interface must be strategically designed to accommodate the limited screen size.
      • Mobile applications are highly susceptible to security breaches.
      • Mobile users often expect quick turnaround time on fixes and enhancements due to continuously changing technology, business priorities, and user needs.

      To learn more, visit Info-Tech's Modernize Your SDLC blueprint.

      How should the process change?

      • Cross-functional collaboration – Bringing business and IT together at the most opportune times to clarify user needs and business priorities, and set realistic expectations given technology and capacity constraints. The appropriate tactics and techniques are used to improve decision making and delivery effectiveness according to the type of work.
      • Iterative delivery – Frequent delivery of progressive changes minimizes the risk of low-quality features by containing and simplifying scope, and enables responsive turnarounds of fixes, enhancements, and priority changes.
      • Feedback loops –Mobile application owners constantly review, update and refine their backlog of mobile features and changes to reflect user feedback and system performance metrics. Delivery teams proactively prepare the application for future scaling based on lessons and feedback learned from earlier releases.

      Achieve mobile success with MVPs

      By delivering mobile capabilities in small iterations, teams recognize value sooner and reduce accumulated risk. Both benefits are realized as the iteration enters validation testing and release.

      This image depicts a graph of the learn-build-measure cycle over time, adapted from Managing the Development of Large Software Systems, Dr. Winston W. Royce, 1970

      An MVP focuses on a small set of functions, involves minimal possible effort to deliver a working and valuable solution, and is designed to satisfy a specific user group. Its purpose is to:

      • Maximize learning.
      • Evaluate the value and acceptance of mobile applications.
      • Inform the building of a mobile delivery practice.

      The build-measure-learn loop suggests mobile delivery teams should perpetually take an idea and develop, test, and validate it with the mobile development solution, then expand on the MVP using the lessons learned and evolving ideas. In this sense the MVP is just the first iteration in the loop.

      Gauge the value with the right metrics

      Metrics are a powerful way to drive behavior change in your organization. But metrics are highly prone to creating unexpected outcomes so they must be used with great care. Use metrics judiciously to avoid gaming or ambivalent behavior, productivity loss, and unintended consequences.

      To learn more, visit Info-Tech's Select and Use SDLC Metrics Effectively blueprint.

      What should I measure?

      1. Mobile Application Engagement, Retention and User Satisfaction
        1. The activeness of users on the applications, the number of returning users, and the happiness of the users.
        2. Example: Number of tasks completed, number of active and returning users, session length and intervals, user satisfaction
      2. Value Driven from Mobile Applications
        1. The business value that the user directly or indirectly receives with the mobile application.
        2. Example: Mobile application revenue, business operational costs, worker productivity, business reputation and image
      3. Delivery Throughput and Quality
        1. The health and quality of your mobile applications throughout their lifespan and the speed to deliver working applications that meet stakeholder expectations.
        2. Example: Frequency of release, lead time, request turnaround, escaped defects, test coverage.

      Use Info-Tech's diagnostic to evaluate the reception of your mobile applications

      Info-Tech's Application Portfolio Assessment (APA) Diagnostic is a canned end-user satisfaction survey used to evaluate your application portfolio health to support data-driven decisions.

      This image contains a screenshot from Info-Tech's Application Portfolio Assessment (APA) Diagnostic

      USE THE PROGRAM DIAGNOSTIC TO:

      • Assess the importance and satisfaction of enterprise applications.
      • Solicit feedback from your end users on applications being used.
      • Understand the strengths and weaknesses of your current applications.
      • Perform a high-level application rationalization initiative.

      INTEGRATE DIAGNOSTIC RESULTS TO:

      • Target which applications to analyze in greater detail.
      • Expand on the initial application rationalization results with a more comprehensive and business-value-focused criteria.

      Grow your mobile delivery practice

      Level 1: Mobile Delivery Foundations

      You understand the opportunities and impacts mobile has on your business operations and its disruptive nature on your enterprise systems. Your software delivery lifecycle was optimized to incorporate the specific practices and requirements needed for mobile. A mobile platform was selected based on stakeholder needs that are weighed against current skillsets, high priority non-functional requirements, the available capacity and scalability of your stack, and alignment to your current delivery process.

      Level 2: Scaled Mobile Delivery

      New features and mobile use cases are regularly emerging in the industry. Ensuring your mobile platform and delivery process can easily scale to incorporate constantly changing mobile features and technologies is key. This can help minimize the impact these changes will have on your mobile stack and the resulting experience.

      Achieving this state requires three competencies: mobile security, performance optimization, and integration practices.

      Level 3: Leading-Edge Mobile Delivery

      Many of today's mobile trends involve, in one form or another, hardware components on the mobile device (e.g., NFC receivers, GPS, cameras). You understand the scope of native features available on your end user's mobile device and the required steps and capabilities to enable and leverage them.

      Hit a home run with your stakeholders

      Use a data-driven approach to select the right tooling vendor for your needs – fast.

      Awareness Education & Discovery Evaluation Selection

      Negotiation & Configuration

      1.1 Proactively Lead Technology Optimization & Prioritization 2.1 Understand Marketplace Capabilities & Trends 3.1 Gather & Prioritize Requirements & Establish Key Success Metrics 4.1 Create a Weighted Selection Decision Model 5.1 Initiate Price Negotiation with Top Two Venders
      1.2 Scope & Define the Selection Process for Each Selection Request Action 2.2 Discover Alternate Solutions & Conduct Market Education 3.2 Conduct a Data Driven Comparison of Vendor Features & Capabilities 4.2 Conduct Investigative Interviews Focused on Mission Critical Priorities with Top 2-4 Vendors 5.2 Negotiate Contract Terms & Product Configuration

      1.3 Conduct an Accelerated Business Needs Assessment

      2.3 Evaluate Enterprise Architecture & Application Portfolio Narrow the Field to Four Top Contenders 4.3 Validate Key Issues with Deep Technical Assessments, Trial Configuration & Reference Checks 5.3 Finalize Budget Approval & Project
      1.4 Align Stakeholder Calendars to Reduce Elapsed Time & Asynchronous Evaluation 2.4 Validate the Business Case 5.4 Invest in Training & Onboarding Assistance

      Investing time improving your software selection methodology has big returns.

      Info-Tech Insight

      Not all software selection projects are created equal – some are very small, some span the entire enterprise. To ensure that IT is using the right framework, understand the cost and complexity profile of the application you're looking to select. Info-Tech's Rapid Application Selection Framework approach is best for commodity and mid-tier enterprise applications; selecting complex applications is better handled by the methodology in Info-Tech's Implement a Proactive and Consistent Vendor Selection Process.

      Pitch your mobile delivery approach with Info-Tech's template

      Communicate the justification of your approach to mobile applications with Info-Tech's Mobile Application Delivery Communication Template:

      • Level set your mobile application goals and objectives by weighing end user expectations with technical requirements.
      • Define the high priority opportunities for mobile applications.
      • Educate decision makers of the limitations and challenges of delivering specific mobile experiences with the various mobile platform options.
      • Describe your framework to select the right mobile platform and delivery tools.
      • Lay out your mobile delivery roadmap and initiatives.

      INFO-TECH DELIVERABLE

      This is a screenshot from Info-Tech's Mobile Application Delivery Communication Template

      Info-Tech's methodology for mobile platform and delivery solution selection

      1. Set the Mobile Context

      2. Define Your Mobile Approach

      Phase Steps

      Step 1.1 Build Your Mobile Backlog

      Step 1.2 Identify Your Technical Needs

      Step 1.3 Define Your Non-Functional Requirements

      Step 2.1 Choose Your Platform Approach

      Step 2.2 Shortlist Your Mobile Delivery Solution

      Step 2.3 Create a Roadmap for Mobile Delivery

      Phase Outcomes

      • User personas
      • Mobile objectives and metrics
      • Mobile opportunity backlog
      • List of mobile features to enable the desired mobile experience
      • System current assessment
      • Mobile application quality definition
      • Readiness for mobile delivery
      • Desired mobile platform approach
      • Shortlisted mobile delivery solutions
      • Desired list of vendor features and services
      • MVP design
      • Mobile delivery roadmap

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2

      Call #1: Understand the case and motivators for mobile applications.

      Call #2: Discuss the end user and desired mobile experience.

      Call #5: Discuss the desired mobile platform.

      Call #8: Discuss your mobile MVP.

      Call #3: Review technical complexities and non-functional requirements.

      Call #6: Shortlist mobile delivery solutions and desired features.

      Call #9: Review your mobile delivery roadmap.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 6 to 9 calls over the course of 2 to 3 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Module 1 Module 2 Module 3 Module 4 Post-Workshop
      Activities Set the Mobile Context Identify Your Technical Needs Choose Your Platform & Delivery Solution Create Your Roadmap Next Steps andWrap-Up (offsite)

      1.1 Generate user personas with empathy maps

      1.2 Build your mobile application canvas

      1.3 Build your mobile backlog

      2.1 Discuss your mobile needs

      2.2 Conduct a technical assessment

      2.3 Define mobile application quality

      2.4 Verify your decision to deliver mobile applications

      3.1 Select your platform approach

      3.2 Shortlist your mobile delivery solution

      3.3 Build your feature and service lists

      4.1 Define your MVP release

      4.2 Build your roadmap

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      • User personas
      • Mobile objectives and metrics
      • Mobile opportunity backlog
      • List of mobile features to enable the desired mobile experience
      • System current assessment
      • Mobile application quality definition
      • Verification to proceed with mobile delivery
      • Desired mobile platform approach
      • Shortlisted mobile delivery solutions
      • Desired list of vendor features and services
      • MVP design
      • Mobile delivery roadmap
      • Completed workshop output deliverable
      • Next steps

      Phase 1

      Set the Mobile Context

      Choose Your Mobile Platform and Tools

      This phase will walk you through the following steps:

      • Step 1.1 – Build Your Mobile Backlog
      • Step 1.2 – Identify Your Technical Needs
      • Step 1.3 – Define Your Non-Functional Requirements

      This phase involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Step 1.1

      Build Your Mobile Backlog

      Activities

      1.1.1 Generate user personas with empathy maps

      1.1.2 Build your mobile application canvas

      1.1.3 Build your mobile backlog

      Set the Mobile Context

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • User personas
      • Mobile objectives and metrics
      • Mobile opportunity backlog

      Users expect your organization to support their mobile way of working

      Today, users expect sophisticated and personalized features, immersive interactions, and cross-platform capabilities from their mobile applications and be able to access information and services anytime, anywhere and on any device. These demands are pushing organizations to become more user-driven, placing greater importance on user experience (UX) with enterprise-grade technologies.

      How has technologies evolved to easily enable mobile capabilities?

      • Desktop-Like Features
        • Native-like features, such as geolocation and local caching, are supported through web language or third-party plugins and extensions.
      • Extendable & Scalable
        • Plug-and-play architecture is designed to allow software delivery teams to explore new use cases and mobile capabilities with out-of-the-box connectors and/or customizable REST APIs.
      • Low Barrier to Entry
        • Low- and no-code development tools, full-stack solutions, and plug-and-play architectures allow non-technical users to easily build and implement applications without direct IT involvement.
      • Templates & Shells
        • Vendors provide UI templates and application shells that contain pre-built native features and multiple aesthetic layouts in a publishing-friendly and configurable way.
      • Personalized Content
        • Content can be uniquely tailored to a user's preference or be automatically generated based on the user's profile or activity history.
      • Hands-Off Operations
        • Many mobile solutions operate in a as-a-service model where the underlying and integrated technologies are managed by the vendor and abstracted away.

      Make user experience (UX) the standard

      User experience (UX) focuses on a user's emotions, beliefs, and physical and psychological responses that occur before, during, or after interacting with a service or product.

      For a mobile application to be a meaningful experience, the functions, aesthetics and content must be:

      • Usable
        • Users can intuitively navigate through your mobile application and complete their desired tasks.
      • Desirable
        • The application elements are used to evoke positive emotions and appreciation.
      • Accessible
        • Users can easily use your mobile application, including those with disabilities.
      • Valuable
        • Users find the content useful, and it fulfills a need.

      Enable a greater experience with UX-driven thinking

      Designing for a high-quality experience requires more than just focusing on the UI. It also requires the merging of multiple business, technical, and social disciplines in order to create an immersive, practical, and receptive application. The image on the right explains the disciplines involved in UX. This is critical for ensuring users have a strong desire to use the mobile application, it is adequately supported technically, and it supports business objectives.

      To learn more, visit Info-Tech's Implement and Mature Your User Experience Design Practice blueprint.

      A Venn diagram is depicted, demonstrating the inputs that lead to an interactive design, with interactive elements, usability, and accessibility. This work by Mark Roden is licensed under a Creative Commons Attribution 3.0 Unported License.

      Source: Marky Roden, Xomino, 2018

      UX-driven mobile apps bring together a compelling UI with valuable functionality

      Info-Tech Insight

      Organizations often over-rotate on the UI. Receptive and satisfying applications require more than just pretty pictures, bold colors, and flashy animations. UX-driven mobile applications require the seamless merging of enticing design elements and valuable functions that are specifically tailored to the behaviors of the users. Take a deep look at how each design element and function is used and perceived by the user, and how your application can sufficiently support user needs.

      UI-Function Balance to Achieve Highly Satisfying Mobile Applications

      An application's UI and function both contribute to UX, but they do so in different ways.

      • The UI generates the visual, audio, and vocal cues to draw the attention of users to key areas of the application while stimulating the user's emotions.
      • Functions give users the means to satisfy their needs effortlessly.

      Finding the right balance of UI and function is dependent on the organization's understanding of user emotions, needs, and tendencies. However, these factors are often left out of an application's design. Having the right UX competencies is key in assuring user behaviors are appropriately accommodated early in the delivery process.

      To learn more, visit Info-Tech's Modernize Your Corporate Website to Drive Business Value blueprint.

      Focus your efforts on all items that drive high user experience and satisfaction

      UX-driven mobile applications involve all interaction points and system components working together to create an immersive experience while being actively supported by delivery and operations teams. Many organizations commonly focus on visual and content design to improve the experience, but this is only a small fraction of the total UX design. Look beyond the surface to effectively enhance your application's overall UX.

      Typical Focus of Mobile UX

      Aesthetics
      What Are the Colors & Fonts?

      Relevance & Modern
      Will Users Receive Up to Date Content and Trending Features?

      UI Design
      Where Are the Interaction Points?

      Content Layout
      How Is Content Organized?

      Critical Areas of Mobile UX That Are Often Ignored

      Web Infrastructure
      How Will Your Application Be Operationally Supported?

      Human Behavior
      What Do the Users Feel About Your Application?

      Coding Language
      What Is the Best Language to Use?

      Cross-Platform Compatibility
      How Does It Work in a Browser Versus Each Mobile Platform?

      Application Quality
      How are Functional and Non-Functional Needs Balanced?

      Adoption & Retention
      How Do I Promote Adoption and Maintain User Engagement?

      Application Support
      How Will My Requests and Issues Be Handled?

      Use personas to envision who will be using your mobile application

      What Are Personas?

      Personas are detailed descriptions of the targeted audience of your mobile application. It represents a type of user in a particular scenario. Effective personas:

      • Express and focus on the major needs and expectations of the most important user groups.
      • Give a clear picture of the typical user's behavior.
      • Aid in uncovering critical features and functionalities.
      • Describe real people with backgrounds, goals, and values.

      Why Are Personas Important to UX?

      They are important because they help:

      • Focus the development of mobile application features on the immediate needs of the intended audience.
      • Detail the level of customization needed to ensure content is valuable to and resonates with the user.
      • Describe how users may behave when certain audio and visual stimulus are triggered from the mobile application.
      • Outline the special design considerations required to meet user accessibility needs.

      Key Elements of a Persona:

      • Professional and Technical Skills and Experiences (e.g., knowledge of mobile applications, area of expertise)
      • Persona Group (e.g., executives)
      • Technological Environment of User (e.g., devices, browsers, network connection)
      • Demographics (e.g., nationality, age, language spoken)
      • Typical Behaviors and Tendencies (e.g., goes to different website when cannot find information in 20 seconds)
      • Purpose of Using the Mobile Application (e.g., search for information, submit registration form)

      Create empathy maps to gain a deeper understanding of stakeholder personas

      Empathy mapping draws out the characteristics, motivations, and mannerisms of a potential end user.

      This image contains an image of an empathy map from XPLANE, 2017. it includes the following list: 1. Who are we empathizing with; 2. What do they need to DO; 3. What do they SEE; 4. What do they SAY?; 5. What do they DO; 6. What do they HEAR; 7. What do they THINK and FEEL.

      Source: XPLANE, 2017

      Empathy mapping focuses on identifying the problems, ambitions, and frustrations they are looking to resolve and describes their motivations for wanting to resolve them. This analysis helps your teams:

      • Better understand the reason behind the struggles, frustrations and motivators through a user's perspective.
      • Verify the accuracy of assertions made about the user.
      • Pinpoint the specific problem the mobile application will be designed to solve and the constraints to its successful adoption and on-going use.
      • Read more about empathy mapping and download the empathy map PDF template here.

      To learn more, visit Info-Tech's Use Experience Design to Drive Empathy with the Business blueprint.

      1.1.1 Generate user personas with empathy maps

      1-3 hours

      1. Download the Empathy Map Canvas and draw the map on a whiteboard or project it on the screen.
      2. Choose an end user to be the focus of your empathy map. Using sticky notes, fill out the sections of the empathy map in the following order:
        1. Start by filling out the goals section. State who the subject of the empathy map will be and what activity or task you would like them to do.
          1. Focus on activities and tasks that may benefit from mobile.
        2. Next, complete the outer sections in clockwise order (see, say, do, hear). The purpose of this is to think in terms of what the subject of your empathy map is observing, sensing, and experiencing.
          1. Indicate the mobile devices and OS users will likely use and the environments they will likely be in (e.g., places with poor connections)
          2. Discuss accessibility needs and how user prefer to consume content.
        3. Last, complete the inner circle of the empathy map (pains and gains). Since you spent the last step of the exercise thinking about the external influences on your stakeholder, you can think about how those stimuli affect their emotions.
      3. Document your end user persona into Info-Tech's Mobile Application Delivery Communication Template.

      Input

      Output
      • List of potential mobile application users
      • User personas
      Materials Participants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.1.1 cont'd

      This image contains an image of an empathy map from XPLANE, 2017. it includes the following list: 1. Who are we empathizing with; 2. What do they need to DO; 3. What do they SEE; 4. What do they SAY?; 5. What do they DO; 6. What do they HEAR; 7. What do they THINK and FEEL.

      Download the Empathy Map Canvas

      Many business priorities are driving mobile

      Mobile Applications

      • Product Roadmap
        • Upcoming enterprise technology releases and updates offer mobile capabilities to expand its access to a broader userbase.
      • Cost Optimization
        • Maximizing business value in processes and technologies through disciplined and strategic cost and spending reduction practices with mobile applications.
      • Competitive Differentiation
        • Developing and optimizing your organization's distinct products and services quickly with mobile applications.
      • Digital Transformation
        • Transitioning processes, data and systems to a digital environment to broaden access to enterprise data and services anywhere at anytime.
      • Operational Efficiency
        • Improving software delivery and business process throughput by increasing worker productivity with mobile applications.
      • Other Business Priorities
        • New corporate products and services, business model changes, application rationalization and other priorities may require modernization, innovation and a mobile way of working.

      Focus on the mobile business and end user problem, not the solution

      People are naturally solution-focused. The onus isn't on them to express their needs in the form of a problem statement!

      When refining your mobile problem statement, attempt to answer the following four questions:

      • Who is impacted?
      • What is the (user or organizational) challenge that needs to be addressed?
      • Where does it happen?
      • Why does it matter?

      There are many ways of writing problem statements, a clear approach follows the format:

      • "Our (who) has the problem that (what) when (where). Our solution should (why)."
      • Example: "Our system analysts has the problem that new tickets take too long to update when working on user requests. Our approach should enable the analyst to focus on working with customers and not on administration."

      Adapted from: "Design Problem Statements – What and How to Frame Them"

      How to write a vision statement

      It's ok to dream a little!

      When thinking about a vision statement, think about:

      • Who is it for?
      • What does the customer need?
      • What can we do for them?
      • And why is this special?

      There are different statement templates available to help form your vision statements. Some include:

      1. For [our target customer], who [customer's need], the [product] is a [product category or description] that [unique benefits and selling points]. Unlike [competitors or current methods], our product [main differentiators]. (Crossing the Chasm)
      2. "We believe (in) a [noun: world, time, state, etc.] where [persona] can [verb: do, make, offer, etc.], for/by/with [benefit/goal].
      3. To [verb: empower, unlock, enable, create, etc.] [persona] to [benefit, goal, future state].
      4. Our vision is to [verb: build, design, provide], the [goal, future state], to [verb: help, enable, make it easier to...] [persona]."

      (Numbers 2-4 from: How to define a product vision)

      Info-Tech Best Practice

      A vision shouldn't be so far out that it doesn't feel real and so short term that it gets bogged down in minutiae and implementation details. Finding that right balance will take some trial and error and will be different depending on your organization.

      Ensure mobile supports ongoing value delivery and stakeholder expectations

      Success hinges on your team's ability to deliver business value. Well-developed mobile applications instill stakeholder confidence in ongoing business value delivery and stakeholder buy-in, provided proper expectations are set and met.

      Business value defines the success criteria of an organization, and it is interpreted from four perspectives:

      • Profit Generation – The revenue generated from a business capability with mobile applications.
      • Cost Reduction – The cost reduction when performing business capabilities with mobile applications.
      • Service Enablement – The productivity and efficiency gains of internal business operations with mobile applications.
      • Customer and Market Reach – Metrics measuring the improved reach and insights of the business in existing or new markets.

      See our Build a Value Measurement Framework blueprint for more information about business value definition.

      This image contains a quadrant analysis with the following labels: Left - Improved Capabilities; Top - Outward; Right - Financial Benefit; Bottom - Inward. the quadrants are labeled the following, in order from left to right, top to bottom. Customer and Market Reach; Profit Generation; Service Enhancement; Cost Reduction

      Set realistic mobile goals

      Mobile applications enables the exploration of new and different ways to improve worker productivity and deliver business value. However, the realities of mobile applications may limit your ability to meet some of your objectives:

      • On the day of installation, the average retention rate for public-facing applications was 25.3%. By day 30, the retention rate drops to 5.7%. (Source: Statista, 2020)
      • 63% of 3,335 most popular Android mobile applications on the Google Play Store contained open-source components with known security vulnerabilities and other pervasive security concerns including exposing sensitive data (Source: Synopsys, 2021)
      • 62% of users would delete the application because of performance issues, such as crashes, freezes and other errors (Source: Intersog, 2021).

      These realities are not guaranteed to occur or impede your ability to deliver valuable mobile applications, but they can lead to unachievable expectations. Ensure your stakeholders are not oversold on advertised benefits and hold you accountable for unrealistic objectives. Recognize that the organization must also change how it works and operates to see the full benefit and adoption of mobile applications and overcome the known and unknown challenges and hurdles that often come with mobile delivery.

      Benchmarks present enticing opportunities, but should be used to set reasonable expectations

      66%
      Improve Market Reach
      66% of the global population uses a mobile device
      Source: DataReportal, 2021

      20%
      Connected Workers are More Productive
      Nearly 20 percent of mobile professionals estimate they miss more than three hours of working time a week not being able to get connected to the internet
      Source: iPass, 2017

      80%
      Increase Brand Recognition
      80% of smartphone users are more likely to purchase from companies whose mobile sites of apps help them easily find answers to their questions
      Source: Google, 2018

      Gauge the value with the right metrics

      Metrics are a powerful way to drive behavior change in your organization. But metrics are highly prone to creating unexpected outcomes so they must be used with great care. Use metrics judiciously to avoid gaming or ambivalent behavior, productivity loss, and unintended consequences.

      To learn more, visit Info-Tech's Select and Use SDLC Metrics Effectively blueprint.

      What should I measure?

      1. Mobile Application Engagement, Retention and User Satisfaction
        • The activeness of users on the applications, the number of returning users, and the happiness of the users.
        • Example: Number of tasks completed, number of active and returning users, session length and intervals, user satisfaction
      2. Value Driven from Mobile Applications
        • The business value that the user directly or indirectly receives with the mobile application.
        • Example: Mobile application revenue, business operational costs, worker productivity, business reputation and image
      3. Delivery Throughput and Quality
        • The health and quality of your mobile applications throughout their lifespan and the speed to deliver working applications that meet stakeholder expectations.
        • Example: Frequency of release, lead time, request turnaround, escaped defects, test coverage.

      Use Info-Tech's diagnostic to evaluate the reception of your mobile applications

      Info-Tech's Application Portfolio Assessment (APA) Diagnostic is a canned end user satisfaction survey used to evaluate your application portfolio health to support data-driven decisions.

      This image contains a screenshot from Info-Tech's Application Portfolio Assessment (APA) Diagnostic

      USE THE PROGRAM DIAGNOSTIC TO:

      • Assess the importance and satisfaction of enterprise applications.
      • Solicit feedback from your end users on applications being used.
      • Understand the strengths and weaknesses of your current applications.
      • Perform a high-level application rationalization initiative.

      INTEGRATE DIAGNOSTIC RESULTS TO:

      • Target which applications to analyze in greater detail.
      • Expand on the initial application rationalization results with a more comprehensive and business-value-focused criteria.

      Use a canvas to define key elements of your mobile initiative

      Mobile Application Initiative Name

      Owner:
      Parent Initiative:
      Updated:

      NAME
      LINK
      October 05, 2022

      Problem Statement

      Vision

      The problem or need mobile applications are addressing

      Vision, unique value proposition, elevator pitch, or positioning statement

      Business Goals & Metrics

      Capabilities, Processes & Application Systems

      List of business objectives or goals for the mobile application initiative.

      List of business capabilities, processes and application systems related to this initiative.

      Personas/Customers/Users

      Stakeholders

      List of groups who consume the mobile application

      List of key resources, stakeholders, and teams needed to support the process, systems and services

      To learn more, visit Info-Tech's Deliver on Your Digital Product Vision blueprint.

      1.1.2 Build your mobile application canvas

      1-3 hours

      1. Complete the following fields to build your mobile application canvas:
        • Mobile application initiative name
        • Mobile application owner
        • Parent initiative name
        • Problem that mobile applications are intending to solve and your vision. See the outcome from the previous exercise.
        • Mobile application business goals and metrics.
        • Capabilities, processes and application systems involved
        • Primary customers/users (For additional help with your product personas, download and complete to Deliver on Your Digital Product Vision.)
      2. Stakeholders
      3. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • User personas
      • Business strategy
      • Problem and vision statements
      • Mobile objectives and metrics
      • Mobile application canvas
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.1.2 cont'd

      Mobile Application Initiative Name

      Owner:
      Parent Initiative:
      Updated:

      NAME
      LINK
      October 05, 2022

      Problem Statement

      Vision

      [Problem Statement]

      [Vision]

      Business Goals & Metrics

      Capabilities, Processes & Application Systems

      [Business Goal 1, Metric]
      [Business Goal 2, Metric]
      [Business Goal 3, Metric]

      [Business Capability]
      [Business Process]
      [Application System]

      Personas/Customers/Users

      Stakeholders

      [User 1]
      [User 2]
      [User 3]

      [Stakeholder 1]
      [Stakeholder 2]
      [Stakeholder 3]

      Create your mobile backlog

      Your backlog gives you a holistic understanding of the demand for mobile applications across your organization.

      Opportunities
      Trends
      MVP

      External Sources

      Internal Sources

      • Market Trends Analysis
      • Competitive Analysis
      • Regulations & Industry Standards
      • Customer & Reputation Analysis
      • Application Rationalization
      • Capability & Value Stream Analysis
      • Business Requests & Incidents
      • Discovery & Mining Capabilities

      A mobile application minimum viable product (MVP) focuses on a small set of functions, involves minimal possible effort to deliver a working and valuable solution, and is designed to satisfy a specific user group. Its purpose is to maximize learning, evaluate value and acceptance, and inform the development of a full-fledged mobile delivery practice.

      Find your mobile opportunities

      Modern mobile technologies enable users to access, analyze and change data anywhere with native device features, which opens the door to enhanced processes and new value sources.

      Examples of Mobile Opportunities:

      • Mobile Payment
        • Cost alternative to credit card transaction fees.
        • Loyalty systems are updated upon payment without need of a physical card.
        • Quicker completion of transactions.
      • Inventory Management
        • Update inventory database when shipments arrive or deliveries are made.
        • Inform retailers and consumers of current stock on website.
        • Alert staff of expired or outdated products.
      • Quick and Small Data Transfer
        • Embed tags into posters to transfer URIs, which sends users to sites containing product or location information.
        • Replace entry tags, fobs, or smart cards at doors.
        • Exchange contact details.
      • Location Sensitive Information
        • Proactively send promotions and other information (e.g. coupons, event details) to users within a defined area.
        • Inform employees of nearby prospective clients.
      • Supply Chain Management
        • Track the movement and location of goods and delivery trucks.
        • Direct drivers to the most optimal route.
        • Location-sensitive billing apps such as train and bus ticket purchases.
      • Education and Learning
        • Educate users about real-world objects and places with augmented books and by pushing relevant learning materials.
        • Visualize theories and other text with dynamic 3D objects.
      • Augmented Reality (AR)
        • Provide information about the user's surroundings and the objects in the environment through the mobile device.
        • Interactive and immersive experiences with the inclusion of virtual reality.
      • Architecture and Planning
        • Visualize historic buildings or the layout of structural projects and development plans.
        • Develop a digital tour with location-based audio initiated with location-based services or a camera.
      • Navigation
        • Provide directions to users to navigate and provide contextual travelling instructions.
        • Push traffic notifications and route changes to travelling users.
      • Tracking User Movement
        • Predict the future location of users based on historic information and traffic modelling.
        • Proactively push information to users before they reach their destination.

      1.1.3 Build your mobile backlog

      1-3 hours

      1. As a group, discuss the use and value mobile already has within your organization for each persona.
        1. What are some of the apps being used?
        2. What enterprise systems and applications are already exposed to the web and accessible by mobile devices?
        3. How critical is mobile to business operations, marketing campaigns, etc.?
      2. Discuss how mobile can bring additional business value to other areas of your organization for each persona.
        1. Can mobile enhance your customer reach? Do your customers care that your services are offered through mobile?
        2. Are employees asking for better access to enterprise systems in order to improve their productivity?
      3. Write your mobile opportunities in the following form: As a [end user persona], I want to [process or capability to enable with mobile applications], so that [organizational benefit]. Prioritize each opportunity against feasibility, desirability, and viability.
      4. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Input

      Output
      • Problem and vision statements
      • Mobile objectives and metrics
      • Mobile application canvas
      • Mobile opportunities backlog
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Manage your mobile backlog

      Your backlog stores and organizes your mobile opportunities at various stages of readiness. It must be continuously refined to address new requests, maintenance and changing priorities.

      3 – IDEAS
      Composed of raw, vague, and potentially large ideas that have yet to go through any formal valuation.

      2 – QUALIFIED
      Researched and qualified opportunities awaiting refinement.

      1 READY
      Discrete, refined opportunities that are ready to be placed in your team's delivery plans.

      Adapted from Essential Scrum

      A well-formed backlog can be thought of as a DEEP backlog

      • Detailed Appropriately: opportunities are broken down and refined as necessary
      • Emergent: The backlog grows and evolves over time as opportunities are added and removed.
      • Estimated: The effort an opportunity requires is estimated at each tier.
      • Prioritized: The opportunity's value and priority are determined at each tier.

      (Source Perforce, 2018)

      See our Deliver on Your Digital Product Vision for more information on backlog practices.

      Step 1.2

      Identify Your Technical Needs

      Activities

      1.2.1 Discuss your mobile needs

      1.2.2 Conduct a technical assessment

      Set the Mobile Context

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • List of mobile features to enable the desired mobile experience
      • System current assessment

      Describe your desired mobile experiences with journey maps

      A journey map tells the story of the user's experience with an existing or prospective product or service, starting with a trigger, through the process of engagement, to create an outcome. Journey maps can focus on a particular part of the user's or the entire experience with your organization's products or services. All types of maps capture key interactions and motivations of the user in chronological order.

      Why are journey maps an important for mobile application delivery?

      Everyone has their own preferred method for completing their tasks on mobile devices – often, what differentiates one persona from another has to do with how users privately behave. Understand that the activities performed outside of IT's purview develop context for your persona's pain points and position IT to meet their needs with the appropriate solution.

      To learn more, visit Info-Tech's Use Experience Design to Drive Empathy with the Business blueprint.

      Two charts are depicted, the first shows the path from Trigger, through steps 1-4, to the outcome, and the Activities and Touchpoints for each. The second chart shows the Expectation analysis, showing which steps are must-haves, nice-to-haves, and hidden-needs.

      Pinpoint specific mobile needs in your journey map

      Realize that mobile applications may not precisely fit with your personas workflow or align to their expectations due to device and system limitations and restrictions. Flag the mobile opportunities that require significant modifications to underlying systems.

      Consider these workflow scenarios that can influence your persona's desire for mobile:

      Workflow Scenarios Ask Yourself The Key Questions Technology Constraints or Restrictions to Consider Examples of Mobile Opportunities

      Data View – Data is queried, prepared and presented to make informed decisions, but it cannot be edited.

      Where is the data located and can it be easily gathered and prepared?

      Is the data sensitive and can it be locally stored?

      What is the level of detail in my view?

      Multi-factor authentication required.

      Highly sensitive data requires encryption in transit and at rest.

      Minor calculations and preparation needed before data view.

      Generate a status report.

      View social media channels.

      View contact information.

      Data Collection – Data is inputted directly into the application and updates back-end system or integrated 3rd party services.

      Do I need special permission to add, delete and overwrite data?

      How much data can I edit?

      Is the data automatically gathered?

      Bandwidth restrictions.

      Multi-factor authentication required.

      Native device access required (e.g., camera).

      Multiple types and formats of gathered data.

      Manual and automatic data gathering

      Book appointments with clients.

      Update inventory.

      Tracking movement of company assets.

      Data Analysis & Modification – Data is evaluated, manipulated and transformed through the application, back-end system or 3rd party service.

      How complex are my calculations?

      Can computations be offloaded?

      What resources are needed to complete the analysis?

      Memory and processing limitations on device.

      Inability to configure device and enterprise hardware to support system resource demand.

      Scope and precision of analysis and modifications.

      Evaluate and propose trends.

      Gauge user sentiment.

      Propose next steps and directions.

      Define the mobile experience your end users want

      Anytime, Anywhere
      The user can access, update and analyze data, and corporate products and services whenever they want, in all networks, and on any device.

      Hands-Off & Automated
      The application can perform various workflows and tasks without the user's involvement and notify the user when specific triggers are hit.

      Personalized & Insightful
      Content presentation and subject are tailored for the user based on specific inputs from the user, device hardware or predicted actions.

      Integrated Ecosystem
      The application supports a seamless experience across various 3rd party and enterprise applications and services the user needs.

      Visually Pleasing & Fulfilling
      The UI is intuitive and aesthetically gratifying with little security and performance trade-offs to use the full breadth of its functions and services.

      Each mobile platform has its own take on the mobile native experience. The choice ultimately depends on whether the costs and effort are worth the anticipated value.

      1.2.1 Discover your mobile needs

      1-3 hours

      1. Define the workflow of a high priority opportunity in your mobile backlog. This workflow can be pertaining to an existing mobile application or a workflow that can benefit with a mobile application.
        1. Indicate the trigger that will initiate the opportunity and the desired outcome.
        2. Break down the persona's desired outcome into small pieces of value that are realized in each workflow step.
      2. Identify activities and touchpoints the persona will need to complete to finish each step in the workflow. Indicate the technology used to complete the activity or to facilitate the touchpoint.
      3. Indicate which activities and touchpoints can be satisfied, complimented or enhanced with mobile.

      Input

      Output
      • User personas
      • Mobile application canvas
      • Desired mobile experience
      • List of mobile features
      • Journey map
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.2.1 cont'd

      Workflow

      Trigger

      Conduct initial analysis

      Get planning help

      Complete and submit RFP

      Design and implement solution

      Implement changes

      Activities, Channels, and Touchpoints

      Need is recognized in CIO council meeting

      See if we have a sufficient solution internally

      Seek planning help (various channels)

      *Meet with IT shared services business analyst

      Select the appropriate vendor

      Follow action plan

      Compliance rqmt triggered by new law

      See if we have a sufficient solution internally

      *Hold in-person initial meeting with IT shared services

      *Review and approve rqmts (email)

      Seek miscellaneous support

      Implement project and manage change

      Research potential solutions in the marketplace

      Excess budget identified for utilization

      Pick a "favorite" solution

      *Negotiate and sign statement of work (email)

      Prime organization for the change

      Create action plan

      If solution is unsatisfactory, plan remediation

      Current Technology

      • Email
      • Video conferencing
      • Phone
      • Meeting transcripts and recordings
      • ERP
      • IT asset management
      • Internet browser for research
      • Virtual environment to demonstrate solutions
      • Email
      • Vendor assessment and procurement solution
      • Email
      • Video conferencing
      • Phone
      • Meeting transcripts and recordings
      • PDF documents and reader
      • Digital signature
      • Email
      • Video conferencing
      • Phone
      • Meeting transcripts and recordings
      • PDF documents and reader
      • Digital signature
      • Email
      • Video conferencing
      • Phone
      • Vendor assessment and procurement solution
      • Project management solution
      • Team collaboration solution
      • Email
      • Video conferencing
      • Phone
      • Project management solution
      • Team collaboration solution
      • Vendor's solution

      Legend:

      Bold – Touchpoint

      * – Activities or Touchpoints That Can Benefit with Mobile

      1.2.1 cont'd

      1-3 hours

      1. Analyze persona expectations. Identify the persona's must-haves, then nice-to-haves, and then hidden needs to effectively complete the workflow.
        1. Must-haves. The necessary outcomes, qualities, and features of the workflow step.
        2. Nice-to-haves. Desired outcomes, qualities, or features that your persona is able to articulate or express.
        3. Hidden needs. Outcomes, qualities, or features that your persona is not aware they have a desire for; benefits that they are pleasantly surprised to receive. These will usually be unknown for your first-iteration journey map.
      2. Indicate which persona expectations can be satisfied with mobile. Discuss what would the desired mobile experience be.
      3. Discuss feedback and experiences your team has heard from the personas they engage with regularly.
      4. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      1.2.1 cont'd

      Example

      This image contains an example workflow for determining mobile needs.

      1.2.1 cont'd

      Template:

      Workflow

      TriggerStep 1Step 2Step 3Step 4

      Desired Outcome

      Journey Map

      Activities & Touch-points

      <>

      <>

      <>

      <>

      <>

      <>

      Must-Haves

      <>

      <>

      <>

      <>

      <>

      <>

      Nice-to-Haves

      <>

      <>

      <>

      <>

      <>

      <>

      Hidden Needs

      <>

      <>

      <>

      <>

      <>

      <>

      Emotional Journey

      <>

      <>

      <>

      <>

      <>

      <>

      If you need more than four steps in the workflow, duplicate this slide.

      Understand how mobile fits with your current system

      Evaluate the risks and impacts of your desired mobile features by looking at your enterprise system architecture from top to bottom. Is your mobile vision and needs compatible with your existing business capabilities and technologies?

      An architecture is usually represented by one or more architecture views that together provide a coherent description of the application system, including demonstrating the full impact mobile will have. A single, comprehensive model is often too complex to be understood and communicated in its most detailed form, and a model too high level hides the underlying complexity of an application's structure and deployment (The Open Group, TOGAF 8.1.1 - Developing Architecture Views). Obtain a complete understanding of your architecture by assessing it through multiple levels of views to reveal different sets of concerns:

      Application Architecture Views

      1. Use Case View
      • How does your business operate, and how will users interact with your mobile applications?
    • . Process View
      • What is the user workflow impacted by mobile, and how will it change?
    • Component View
      • How are my existing applications structured? What are its various components? How will mobile expand the costs of the existing technical debt?
    • Data View
      • What is the relationship of the data and information consumed, analyzed, and transmitted? Will mobile jeopardize the quality and reliability of the data?
    • Deployment View
      • In what environment are your mobile application components deployed? How will the existing systems operate with your mobile applications?
    • System View
      • How does your mobile application communicate with other internal and external systems? How will dependencies change with mobile?
    • See our Enhance Your Solution Architecture for more information.

      Ask key questions in your current system assessment

      • How do the various components of your system communicate with each other (e.g., web APIs, middleware, and point to point)?
      • What information is exchanged during the conversation?
      • How does the data flow from one component to the next? Is the data read-only or can application and users edit and modify it?
      • What are the access points to your mid- and back-tier systems (e.g., user access through web interface, corporate networks and third-party application access through APIs)?
      • Who has access to your enterprise systems?
      • Which components are managed and operated by third-party providers? What is your level of control?
      • What are the security protocols currently enforced in your system?
      • How often are your databases updated? Is it real-time or periodic extract, transfer, and load (ETL)?
      • What are the business rules?
      • Is your mobile stack dependent on other systems?
      • Is a mobile middleware, web server, or API gateway needed to help facilitate the integration between devices and your back-end support?

      1.2.2 Conduct a technical assessment

      1-3 hours

      1. Evaluate your current systems that will support the journey map of your mobile opportunities based on two categories: system quality and system management. Use the tables on the following slides and modify the questions if needed.
      2. Discuss if the current state of your system will impede your ability to succeed with mobile. Use this discussion to verify the decision to continue with mobile applications in your current state.
      3. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • Journey map
      • Understanding of current system
      • Assessment of current system
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.2.2 cont'd

      Current State System Quality Assessment

      Factors Definitions Survey Responses
      Fit-for-Purpose System functionalities, services and integrations are designed and implemented for the purpose of satisfying the end users' needs and technology compatibilities. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Response Rate The system completes computation and processing requests within acceptable timeframes. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Data Quality The system delivers consumable, accurate, and trustworthy data. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Usability The system provides functionalities, services and integrations that are rewarding, engaging, intuitive, and emotionally satisfying. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Reliability The system is resilient or quickly recovers from issues and defects. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Accessible The system is available on demand and on the end user's preferred interface and device. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Secured End-user activity and data is protected from unauthorized access. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Adaptable The system can be quickly tailored to meet changing end-user and technology needs with reusable and customizable components. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)

      1.2.2 cont'd

      Current State System Management Assessment

      Factors Definitions Survey Responses
      Documentation The system is documented, accurate, and shared in the organization. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Measurement The system is continuously measured against clearly defined metrics tied to business value. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Compliance The system is compliant with regulations and industry standards. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Continuous Improvement The system is routinely rationalized and enhanced. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Architecture There is a shared overview of how the process supports business value delivery and its dependencies with technologies and other processes. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Ownership & Accountability The process has a clearly defined owner who is accountable for its risks and roadmap. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Support Resources are available to address adoption and execution challenges. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)
      Organizational Change Management Communication, onboarding, and other change management capabilities are available to facilitate technology and related role and process changes. 1 (Very Poor) – 2 – 3 (Fair) – 4 – 5 (Excellent)

      Step 1.3

      Define Your Non-Functional Requirements

      Activities

      1.3.1 Define mobile application quality

      1.3.2 Verify your decision to deliver mobile applications

      Set the Mobile Context

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams

      Outcomes of this step

      • Mobile application quality definition
      • Readiness for mobile delivery

      Build a strong foundation of mobile application quality

      Functionality and aesthetics often take front seats in mobile application delivery. Applications are then frequently modified and changed, not because they are functionally deficient or visually displeasing, but because they are difficult to maintain or scale, too slow, vulnerable or compromised. Implementing clear quality principles (i.e., non-functional requirements) and strong quality assurance practices throughout delivery are critical to minimize the potential work of future maintenance and to avoid, mitigate and manage IT risks.

      What is Mobile Application Quality?

      • Quality requirements (i.e., non-functional requirements) are properties of a system or product that dictate how it should behave at runtime and how it should be designed, implemented, and maintained.
      • These requirements should be involved in decision making around architecture, UI and functional design changes.
      • Functionality should not dictate the level of security, availability, or performance of a product, thereby risking system quality. Functionality and quality are viewed orthogonally, and trade-offs are discussed when one impacts the other.
      • Quality attributes should never be achieved in isolation as one attribute can have a negative or positive impact on another (e.g. security and availability).

      Why is Mobile Quality Assurance Critical?

      • Quality assurance (QA) is a necessity for the validation and verification of mobile delivery, whether you are delivering applications in an Agile or Waterfall fashion. Effective QA practices implemented across the software development lifecycle (SDLC) are vital, as all layers of the mobile stack need to readily able to adjust to suddenly evolving and changing business and user needs and technologies without risking system stability and breaking business standards and expectations.
      • However, investments in QA optimizations are often afterthoughts. QA is commonly viewed as a lower priority compared to other delivery capabilities (e.g., design and coding) and is typically the first item cut when delivery is under pressure.

      See our Build a Software Quality Assurance Program for more information.

      Mobile emphasizes the importance of good security, performance and integration

      Today's mobile workforce is looking for new ways to get more work done quickly. They want access to enterprise solutions and data directly on their mobile device, which can reside on multiple legacy systems and in the cloud and third-party infrastructure. This presents significant performance, integration, and security risks.

      Cloud Solutions: Can I use my existing APIs?. Solutions in Corporate Networks: Do my legacy systems have the capacity to support mobile?; How do I integrate solutions and data from multiple sources into a single view?; Third Party Solutions: Will I have a significant performance bottleneck?; Single View on Mobile Devices: How is corporate data stored on the device?; What new technology dependencies must I account for in my architecture and operational support capabilities?

      Mobile risks opening and widening existing security gaps

      New mobile technologies and the continued expansion of the enterprise environment increase the number of entry points attackers to your corporate data and networks. The ever-growing volume, velocity, and variety of new threats puts significant pressure on mobile delivery teams who are responsible for implementing mobile security measures and maintaining alignment to your security policies and those of app stores.

      Mobile attacks can come from various vectors:

      Attack Surface: Mobile Device

      Attack Surface: Network

      Attack Surface: Data Center

      Browser:
      Phishing
      Buffer Overflow
      Data Caching

      System:
      No Passcode
      Jailbroken and Rooted OS
      No/Weak Encryption
      OS Data Caching

      Phone:
      SMSishing
      Radio Frequency Attacks

      Apps:
      Configuration Manipulation
      Runtime Injection
      Improper SSL Validation

      • Packet Sniffing
      • Session Hijacking
      • Man-in-the-Middle (circumvent password verification systems)
      • Fake SSL Certificate
      • Rogue Access Points

      Web Server:
      Cross-Site Scripting (XSS)
      Brute Force Attacks
      Server Misconfigurations

      Database:
      SQL Injection
      Data Dumping

      Understand the top web security risks and vulnerabilities seen in the industry

      Recognize mobile applications are exposed to the same risks and vulnerabilities as web applications. Learn of OWASP's top 10 web security risks.

      • Broken Access Control
        • Failures typically lead to unauthorized information disclosure, modification, or destruction of all data or performing a business function outside the user's limits.
      • Cryptographic Failures
        • Improper and incorrect protection of data in transit and at rest, especially proprietary and confidential data and those that fall under privacy laws.
      • Injection
        • Execution of malicious code and injection of hostile or unfiltered data on the mobile device via the mobile application.
      • Insecure Design
        • Missing or ineffective security controls in the application design. An insecure design cannot be fixed by a perfect implementation,. Needed security controls were never created to defend against specific attacks.
      • Security Misconfiguration
        • The security settings in the application are not securely set or configured, including poor security hardening and inadequate system upgrading practices.
      • Vulnerable and Outdated Components
        • System components are vulnerable because they are unsupported, out of date, untested or not hardened against current security concerns.
      • Identification and Authentication Failures
        • Improper or poor protection against authentication-related attacks, particularly to the user's identity, authentication and session management.
      • Software and Data Integrity Failures
        • Failures related to code and infrastructure that does not protect against integrity violations, such as an application relying upon plugins, libraries, or modules from untrusted sources, repositories, and content delivery networks
      • Security Logging and Monitoring Failures
        • Insufficient logging, detection, monitoring, and active response that hinders the ability to detect, escalate, and respond to active breaches.
      • Server-Side Request Forgery (SSRF)
        • SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL.

      Good mobile application performance drives satisfaction and value delivery

      Underperforming mobile applications can cause your users to be unproductive. Your mobile applications should always aim to satisfy the productivity requirements of your end users.

      Users quickly notice applications that are slow and difficult to use. Providing a seamless experience for the user is now heavily dependent on how well your application performs. Optimizing your mobile application's processing efficiency can help your users perform their jobs properly in various environment conditions.

      Productive Users Need
      Performant Mobile Applications

      Persona

      Mobile Application Use Case

      Optimized Mobile Application

      Stationary Worker

      • Design flowcharts and diagrams, while abandoning paper and desktop apps in favor of easy-to-use, drawing tablet applications.
      • Multitask by checking the application to verify information given by a vendor during their presentation or pitch.
      • Flowcharts and diagrams are updated in real time for team members to view and edit
      • Compare vendors under assessment with a quick look-up app feature

      Roaming Worker (Engineer)

      • Replace physical copies of service and repair manuals physically stored with digital copies and access them with mobile applications.
      • Scan or input product bar code to determine whether a replacement part is available or needs to be ordered.
      • Worker is capable of interacting with other features of the mobile web app while product bar code is being verified

      Enhance the performance of the entire mobile stack

      Due to frequently changing mobile hardware, users' high performance expectations and mobile network constraints, mobile delivery teams must focus on the entire mobile stack for optimizing performance.

      Fine tune your enterprise mobile applications using optimization techniques to improve performance across the full mobile stack.

      This image contains a bar graph ranking the importance of the following datapoints: Minimize render blocking resources; Configure the mobile application viewport; Determine the right image file format ; Determine above-the-fold content; Minimize browser reflow; Adopt UI techniques to improve perceived latency; Resource minification; Data compression; Asynchronous programming; Resource HTTP caching; Minimize network roundtrips for first time to render.

      Info-Tech Insight

      Some user performance expectations can be managed with clever UI design (e.g., spinning pinwheels to indicate loading in progress and directing user focus to quick loading content) and operational choices (e.g. graceful degradation and progressive enhancements).

      Create an API-centric integration strategy

      Mobile delivery teams are tasked to keep up with the changing needs of end users and accommodate the evolution of trending mobile features. Ensuring scalable APIs is critical in quickly releasing changes and ensuring availability of corporate services and resources.

      As your portfolio of mobile applications grows, and device platforms and browsers diversify, it will become increasingly complex to provide all the data and service capabilities your mobile apps need to operate. It is important that your APIs are available, reliable, reusable, and secure for multiple uses and platforms.

      Take an API-centric approach to retain control of your mobile development and ensure reliability.

      APIs are the underlying layer of your mobile applications, enabling remote access of company data and services to end users. Focusing design and development efforts on the maintainability, reliability and scalability of your APIs enables your delivery teams to:

      • Reuse tried-and-tested APIs to deliver, test and harden applications and systems quicker by standardizing on the use and structure of REST APIs.
      • Ensure a consistent experience and performance across different applications using the same API.
      • Uniformly apply security and access control to remain compliant to security protocols, industry standards and regulations.
      • Provide reliable integration points when leveraging third-party APIs and services.

      See our Build Effective Enterprise Integration on the Back of Business Process for more information.

      Guide your integration strategy with principles

      Craft your principles around good API management and integration practices

      Expose Enterprise Data And Functionality in API-Friendly Formats
      Convert complex on-premises application services into developer-friendly RESTful APIs

      Protect Information Assets Exposed Via APIs to Prevent Misuse
      Ensure that enterprise systems are protected against message-level attack and hijack

      Authorize Secure, Seamless Access for Valid Identities
      Deploy strong access control, identity federation and social login functionality

      Optimize System Performance and Manage the API Lifecycle
      Maintain the availability of backend systems for APIs, applications and end users

      Engage, Onboard, Educate and Manage Developers
      Give developers the resources they need to create applications that deliver real value

      Source: 5 Pillars of API Management, Broadcom, 2021

      Clarify your definition of mobile quality

      Quality does not mean the same thing to everyone

      Do not expect a universal definition of mobile quality. Each department, person and industry standard will have a different interpretation of quality, and they will perform certain activities and enforce policies that meet those interpretations. Misunderstanding of what is defined as a high quality mobile application within business and IT teams can lead to further confusion behind governance, testing priorities and compliance.

      Each interpretation of quality can lead to endless testing, guardrails and constraints, or lack thereof. Be clear on the priority of each interpretation and the degree of effort needed to ensure they are met.

      For example:

      Mobile Application Owner
      What does an accessible mobile application mean?

      Persona: Customer
      I can access it on mobile phones, tablets and the web browser

      Persona: Developer
      I have access to each layer of the mobile stack including the code & data

      Persona: Operations
      The mobile application is accessible 24/7 with 95% uptime

      Example: A School Board's Quality Definition

      Quality Attribute Definitions
      Usability The product is an intuitive solution. Usability is the ease with which the user accomplishes a desired task in the application system and the degree of user support the system provides. Limited training and documentation are required.
      Performance Usability and performance are closely related. A solution that is slow is not usable. The application system is able to meet timing requirements, which is dependent on stable infrastructure to support it regardless of where the application is hosted. Baseline performance metrics are defined and changes must result in improvements. Performance is validated against peak loads.
      Availability The application system is present, accessible, and ready to carry out its tasks when needed. The application is accessible from multiple devices and platforms, is available 24x7x365, and teams communicate planned downtimes and unplanned outages. IT must serve teachers international student's parents, and other users who access the application outside normal business hours. The application should never be down when it should be up. Teams must not put undue burden on end users accessing the systems. Reasonable access requirements are published.
      Security Applications handle both private and personal data, and must be able to segregate data based on permissions to protect privacy. The application system is able to protect data and information from unauthorized access. Users want it to be secure but seamless. Vendors need to understand and implement the District School Board's security requirements into their products. Teams ensure access is authorized, maintain data integrity, and enforce privacy.
      Reusability Reusability is the capability for components and subsystems to be suitable for use in other applications and in other scenarios. This attribute minimizes the duplication of components and implementation time. Teams ensure a modular design that is flexible and usable in other applications.
      Interoperability The degree to which two or more systems can usefully exchange meaningful information via interfaces in a particular context.

      Scalability

      There are two kinds of scalability:

      • Horizontal scalability (scaling out): Adding more resources to logical units, such as adding another server to a cluster of servers.
      • Vertical scalability (scaling up): Adding more resources to a physical unit, such as adding more memory to a single computer.

      Ease of maintenance and enhancements are critical. Additional care is given to custom code because of the inherent difficulty to make it scale and update.

      Modifiability The capability to manage the risks and costs of change, considering what can be changed, the likelihood of change, and when and who makes the change. Teams minimize the barriers to change, and get business buy in to keep systems current and valuable.
      Testability The ease with which software are made to demonstrate its faults through (typically execution-based) testing. It cannot be assumed that the vendor has already tested the system against District School Board's requirements. Testability applies to all applications, operating systems, and databases.
      Supportability The ability of the system to provide information helpful for identifying and resolving issues when it fails to work correctly. Supportability applies to all applications and systems within the District School Board's portfolio, whether that be custom developed applications or vendor provided solutions. Resource investments are made to better support the system.
      Cost Efficiency The application system is executed and maintained in such a way that each area of cost is reduced to what is critically needed. Cost efficiency is critical (e.g. printers cost per page, TCO, software what does downtime cost us), and everyone must understand the financial impact of their decisions.
      Self-Service End users are empowered to make configurations, troubleshoot and make changes to their application without the involvement of IT. The appropriate controls are in place to manage the access to unauthorized access to corporate systems.
      Modifiability The capability to manage the risks and costs of change, considering what can be changed, the likelihood of change, and when and who makes the change. Teams minimize the barriers to change, and get business buy in to keep systems current and valuable.
      Testability The ease with which software are made to demonstrate its faults through (typically execution-based) testing. It cannot be assumed that the vendor has already tested the system against District School Board's requirements. Testability applies to all applications, operating systems, and databases.
      Supportability The ability of the system to provide information helpful for identifying and resolving issues when it fails to work correctly. Supportability applies to all applications and systems within the District School Board's portfolio, whether that be custom developed applications or vendor provided solutions. Resource investments are made to better support the system.

      1.3.1 Define mobile application quality

      1-3 hours

      1. List 5 quality attributes that your organization sees as important for a successful mobile application.
      2. List the core personas that will support mobile delivery and that will consume the mobile application. Start with development, operations and support, and end user.
      3. Describe each quality attributes from the perspective of each persona by asking, "What does quality mean to you?".
      4. Review each description from each persona to come to an acceptable definition.
      5. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • User personas
      • Mobile application canvas
      • Journey map
      • Mobile application quality definition
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.3.1 cont'd

      Example: Info-Tech Guided Implementation with a Legal and Professional Services Organization

      Quality AttributeDeveloperOperations & Support TeamEnd Users

      Usability

      • Architecture and frameworks are aligned with industry best practices
      • Regular feedback through analytics and user feedback
      • Faster development and less technical debt
      • Pride in the product
      • Satisfaction that the product is serving its purpose and is actually being used by the user
      • Increased update of product use and feedback for future lifecycle
      • Standardization and positive perception of IT processes
      • Simpler to train users to adopt products and changes
      • Trust in system and ability to promote the product in a positive light
      • Trusted list of applications
      • Intuitive (easy to use, no training required)
      • Encourage collaboration and sharing ideas between end users and delivery teams
      • The information presented is correct and accurate
      • Users understand where the data came from and the algorithms behind it
      • Users learn features quickly and retain their knowledge longer, which directly correlates to decreased training costs and time
      • High uptake in use of the product
      • Seamless experience, use less energy to work with product

      Security

      • Secure by design approach
      • Testing across all layers of the application stack
      • Security analysis of our source code
      • Good approach to security requirement definition, secure access to databases, using latest libraries and using semantics in code
      • Standardized & clear practices for development
      • Making data access granular (not all or none)
      • Secure mission critical procedures which will reduce operational cost, improve compliance and mitigate risks
      • Auditable artifacts on security implementation
      • Good data classification, managed secure access, system backups and privacy protocols
      • Confidence of protection of user data
      • Encryption of sensitive data
      Availability
      • Good access to the code
      • Good access to the data
      • Good access to APIs and other integration technologies
      • Automatic alerts when something goes wrong
      • Self-repairing/recovering
      • SLAs and uptimes
      • Code documentation
      • Proactive support from the infrastructure team
      • System availability dashboard
      • Access on any end user device, including mobile and desktop
      • 24/7 uptime
      • Rapid response to reported defects or bugs
      • Business continuity

      1.3.2 Verify your decision to deliver mobile applications

      1-3 hours

      1. Review the various end user, business and technical expectations for mobile its achievability given the current state of your system and non-functional requirements.
      2. Complete the list of questions on the following slide as an indication for your readiness for mobile delivery.

      Input

      Output
      • Mobile application canvas
      • Assessment to proceed with mobile
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      1.3.2 cont'd

      Skill Sets
      Software delivery teams have skills in creating mobile applications that stakeholders are expecting in value and quality. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Architects look for ways to reuse existing technical asset and design for future growth and maturity in mobile. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Resources can be committed to implement and manage a mobile platform. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Software delivery teams and resources are adaptable and flexible to requirements and system changes. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Delivery Process
      My software delivery process can accommodate last minute and sudden changes in mobile delivery tasks. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Business and IT requirements for the mobile are clarified through collaboration between business and IT representatives. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Mobile will help us fill the gaps and standardize our software delivery process process. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      My testing practices can be adapted to verify and validate the mobile functional and non-functional requirements. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Technical Stack
      My mid-tier and back-end support has the capacity to accommodate additional traffic from mobile. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      I have access to my web infrastructure and integration technologies, and I am capable of making configurations. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      My security approaches and capabilities can be enhanced address specific mobile application risks and vulnerabilities. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      I have a sound and robust integration strategy involving web APIs that gives me the flexibility to support mobile applications. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)

      Phase 2

      Define Your Mobile Approach

      Choose Your Mobile Platform and Tools

      This phase will walk you through the following activities:

      • Step 2.1 – Choose Your Platform Approach
      • Step 2.2 – Shortlist Your Mobile Delivery Solution
      • Step 2.3 – Create a Roadmap for Mobile Delivery

      This phase involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Step 2.1

      Choose Your Platform Approach

      Activities

      2.1.1 Select your platform approach

      Define Your Mobile Approach

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • Desired mobile platform approach

      Mobile value is dependent on the platform you choose

      What is a platform?

      "A platform is a set of software and a surrounding ecosystem of resources that helps you to grow your business. A platform enables growth through connection: its value comes not only from its own features, but from its ability to connect external tools, teams, data, and processes." (Source: Emilie Nøss Wangen, 2021) In the mobile context, applications in a platform execute and communicate through a loosely coupled API architecture whether the supporting system is managed and supported by your organization or by 3rd party providers.

      Web

      The mobile web often takes on one of the following two approaches:

      • Responsive websites – Content, UI and other website elements automatically adjusts itself according to the device, creating a seamless experience regardless of the device.
      • Progressive web applications (PWAs) – PWAs uses the browser's APIs and features to offer native-like experiences.

      Mobile web applications are often developed with a combination of HTML, CSS, and JavaScript languages.

      Hybrid

      Hybrid applications are developed with web technologies but are deployed as native applications. The code is wrapped using a framework so that it runs locally within a native container, and it uses the device's browser runtime engine to support more sophisticated designs and features compared to the web approach. Hybrid mobile solutions allows teams to code once and deploy to multiple platforms.

      Some notable examples:

      • Gmail
      • Instagram

      Cross-Platform

      Cross-platform applications are developed within a distinct programming or scripting environment that uses its own scripting language (often like web languages) and APIs. Then the solution will compile the code into device-specific builds for native deployment.

      Some notable examples:

      • Facebook
      • Skype
      • Slack

      Native

      Native applications are developed and deployed to specific devices and OSs using platform-specific software development kits (SDKs) provided by the operating system vendors. The programming language and framework are dictated by the targeted device, such as Java for Android.

      With this platform, developers have direct access to local device features allowing customized operations. This enables the use of local resources, such as memory and runtime engines, which will achieve a higher performance than hybrid and cross-platform applications.

      Each platform offers unique pros and cons depending on your mobile needs

      WebHybridCross-PlatformNative

      Pros

      Cons

      Pros

      Cons

      Pros

      Cons

      Pros

      Cons

      • Modern browsers support the popular of web languages (HTML, CSS, and JavaScript).
      • Ubiquitous across multiple form factors and devices.
      • Mobile can be easily integrated into traditional web development processes and technical stacks.
      • Installations are not required, and updates are immediate.
      • Sensitive data can be wiped from memory after app is closed.
      • Limited access to local device hardware and software.
      • Local caching is available for limited offline capabilities, but the scope of tasks that can be completed in this scenario is restricted.
      • The browser's runtime engine is limited in computing power.
      • Not all browsers fully support the latest versions of HTML, CSS, or JavaScript.
      • Web languages can be used to develop a complete application.
      • Code can be reused for multiple platforms, including web.
      • Access to commonly-used native features that are not available through the web platform.
      • Quick delivery and maintenance updates compared to native and cross-platform platforms.
      • Consistent internet access is needed due to its reliance heavily reliance on web technologies to operate.
      • Limited ability to support complex workflows and features.
      • Sluggish performance compared to cross-platform and native applications.
      • Certain features may not operate the same across all platforms given the code once, deploy everywhere approach.
      • More cost-effective to develop than using native development approaches to gain similar features. Platform-specific developers are not needed.
      • Common codebase to develop applications on different applications.
      • Enables more complex application functionalities and technical customizations compared to hybrid applications.
      • Code is not portable across cross-platform delivery solutions.
      • The framework is tied to the vendor solution which presents the risk of vendor lock-in.
      • Deployment is dependent on an app store and the delivery solution may not guarantee the application's acceptance into the application store.
      • Significant training and onboarding may be needed using the cross-platform framework.
      • Tight integration with the device's hardware enables high performance and greater use of hardware features.
      • Computationally-intensive and complex tasks can be completed on the device.
      • Available offline access.
      • Apps are available through easy-to-access app stores.
      • Requires additional investments, such as app stores, app-specific support, versioning, and platform-specific extensions.
      • Developers skilled in a device-specific language are difficult to acquire and costly to train.
      • Testing is required every time a new device or OS is introduced.
      • Higher development and maintenance costs are tradeoffs for native device features.

      Start mobile development on a mobile web platform

      Start with what you have: begin with a mobile web platform to minimize impacts to your existing delivery skill sets and technical stack while addressing business needs. Resort to a hybrid first and then consider a cross-platform application if you require device access or the need to meet specific non-functional requirements.

      Why choose a mobile web platform?

      Pros

      The latest versions of the most popular web languages (HTML5, CSS3, JavaScript) abstract away from the granular, physical components of the application, simplifying the development process. HTML5 offer some mobile features (e.g., geolocation, accelerometer) that can meet your desired experience without the need for native development skills. Native look-and-feel, high performance, and full device access are just a few tradeoffs of going with web languages.

      Cons

      Native mobile platforms depend on device-specific code which follows specific frameworks and leverages unique programming libraries, such as Objective C for iOS and Java for Android. Each language requires a high level of expertise in the coding structure and hardware of specific devices requiring resources with specific skillsets and different tools to support development and testing.

      Other Notable Benefits with Web Languages

      • Modern browsers in most mobile devices are capable of executing and rendering many mobile features developed in web languages, allowing for greater portability and sophistication of code across multiple devices. However, this flexibility comes at the cost of performance since the browser's runtime engine will not perform as well as a native engine.
      • Web languages are well known by developers, minimizing skills and resourcing impacts. Consequently, changes can be quickly accommodated and updated uniformly across all end users.

      Do you need a native platform?

      Consider web workarounds if you choose a web platform but require some native experiences.

      The web platform does not give you direct access or sophisticated customizations to local device hardware and services, underlying code and integrations. You may run into the situation where you need some native experiences, but the value of these features may not offset the costs to undertake a native, hybrid or cross-platform application. When developing hybrid and cross-platform applications with a mobile delivery solution, only the APIs of the commonly used device features are available. Note that some vendors may not offer a particular native feature across all devices, inhibiting your ability to achieve feature parity or exploiting device features only available in certain devices. Workarounds are then needed.

      Consider the following workarounds to address the required native experiences on the web platform:

      Native Function Description Web Workaround Impact
      Camera Takes pictures or records videos through the device's camera. Create an upload form in the web with HTML5. Break in workflow leading to poor user experience (UX).
      Geolocation Detects the geographical location of the device. Available through HTML5. Not Applicable.
      Calendar Stores the user's calendar in local memory. Integrate with calendaring system or manually upload contacts. Costly integration initiative. Poor user experience.
      Contacts Stores contact information in local memory. Integrate app with contact system or manually upload contacts. Costly integration initiative. Poor user experience.
      Near Field Communication (NFC) Communication between devices by touching them together or bringing them into proximity. Manual transfer of data. A lot of time is consumed transferring simple information.
      Native Computation Computational power and resources needed to complete tasks on the device. Resource-intensive requests are completed by back-end systems and results sent back to user. Slower application performance given network constraints.

      Info-Tech Insight

      In many cases, workarounds are available when evaluating the gaps between web and native applications. For example, not having application-level access to the camera does not negate the user option to upload a picture taken by the camera through a web form. Tradeoffs like this will come down to assessing the importance of each platform gap for your organization and whether a workaround is good enough as a native-like experience.

      Architect and configure your entire mobile stack with a plan

      • Assess your existing technology stack that will support your mobile platform. Determine if it has the capacity to handle mobile traffic and the necessary integration between devices and enterprise and 3rd party systems are robust and reliable. Reach out to your IT teams and vendors if you are missing key mobile components, such as:
      • The acquisition and provisioning of physical or virtual mobile web servers and middleware from existing vendors.
      • Cloud services [e.g., Mobile Back-end as a Service (mBaaS)] that assists in the mobilization of back-end data sources with API SDKs, orchestration of data from multiple sources, transformation of legacy APIs to mobile formats, and satisfaction of other security, integration and performance needs.
      • Configure the services of your web server or middleware to facilitate the translation, transformation, and transfer of data between your mobile front-end and back-end. If your plan involves scripts, maintenance and other ongoing costs will likely increase.
      • Leverage the APIs or adapters provided by your vendors or device manufacturers to integrate your mobile front-end and back-end support to your web server or middleware. If you are reusing a web server, the back-end integration should already be in place. Remember, APIs implement business rules to maintain the integrity of data exchange within your mobile stack.
      • See Appendix A for examples of reference architectures of mobile platforms.

      See our Enhance Your Solution Architecture for more information.

      Do Not Forget Your Security and Performance Requirements

      Security: New threats from mobile put organizations into a difficult situation beyond simply responding to them in a timely matter. Be careful not to take the benefits of security out of the mobile context. You need to make security a first-order citizen during the scoping, design, and optimization of your systems supporting mobile. It must also be balanced with other functional and non-functional requirements with the right roles taking accountability for these decisions.

      See our Strengthen the SSDLC for Enterprise Mobile Applications for more information.

      Performance: Within a distributed mobile environment, performance has a risk of diminishing due to limited device capacity, network hopping, lack of server scalability, API bottlenecks, and other device, network and infrastructure issues. Mobile web APIs suffer from the same pain points as traditional web browsing and unplanned API call management in an application will lead to slow performance.

      See our Develop Enterprise Mobile Applications With Realistic and Relevant Performance for more information.

      Enterprise platform selection requires a shift in perspective

      Your mobile platform selection must consider both user and enterprise (i.e., non-functional) needs. Use a two-step process for your analysis:

      Begin Platform Selection with a User-Centric Approach

      Organizations appealing to end users place emphasis on the user experience: the look and appeal of the user interface, and the satisfaction, ease of use, and value of its functionalities. In this approach, IT concerns and needs are not high priorities, but many functions are completed locally or isolated from mission critical corporate networks and sensitive data. Some needs include:

      • Performance: quick execution of tasks and calculations made on the device or offloaded to web servers or the cloud.
      • User Interface: cross-platform compatibility and feature-rich design and functionality. The right native experience is critical to the user adoption and satisfaction.
      • Device Access: use of local device hardware and software to complete app use cases, such as camera, calendar, and contact lists.

      Refine Platform Selection with an Enterprise-Centric Approach

      From the enterprise perspective, emphasis is on security, system performance, integration, reuse and other non-functional requirements as the primary motivations in the selection of a mobile platform. User experience is still a contributing factor because of the mobile application's need to drive value but its priority is not exclusive. Some drivers include:

      • Openness: agreed-upon industry standards and technologies that can be applied to serve enterprise needs which support business processes.
      • Integration: increase the reuse of legacy investments and existing applications and services with integration capabilities.
      • Flexibility: support for multiple data types from applications such as JSON format for mobile.
      • Capacity: maximize the utilization of your software delivery resources beyond the initial iteration of the mobile application.

      Info-Tech Insight

      Selecting a mobile platform should not solely be made on business requirements. Key technical stakeholders should be at the table in this discussion to provide insight on the implementation and ongoing costs and benefits of each platform. Both business and technical requirements should be considered when deciding on a final platform.

      Select your mobile platform

      Drive your mobile platform selection against user-centric needs (e.g. device access, aesthetics) and enterprise-centric needs (e.g. security, system performance).

      When does a platform makes sense to use?

      Web

      • Desire to maximize current web technologies investments (people, process, and technologies).
      • Use cases do not require significant computational resources on the device or are tightly constrained by non-functional requirements.
      • Limited budget to acquire mobile development resources.
      • Access to device hardware is not a high priority.

      Hybrid / Cross-Platform

      • The need to quickly spin up native-like applications for multiple platforms and devices.
      • Desire to leverage existing web development skills, but also a need for device access and meeting specific non-functional requirements.
      • Vendor support is needed for the entire mobile delivery process.

      Native

      • Developers are experts in the target programming language and with the device's hardware.
      • Strong need for high performance, security and device-specific access and customizations.
      • Application use cases requiring significant computing resources.

      Nine datapoints are arranged on a graph where the x axis s labeled: User Centric Needs; and the Y axis is labeled: Enterprise-centric needs. The datapoints are, in order from left to right, top to bottom: Hybrid; Cross- Platform; Native; Web; Hybrid or Cross- Platform; Cros-s Platform; Web; Web; Hybrid or Cross- Platform.

      2.1.1 Select your platform approach

      1-3 hours

      1. Review your mobile objectives, end user needs and non-functional requirements.
      2. Determine which mobile platform is appropriate for each mobile opportunity or use case by answering the following questions on the following slides against two factors: user-centric and enterprise-centric needs.
      3. Calculate an average score for user-centric and one for enterprise-centric. Then, map them on the matrix to indicate possible platform options. Consider all options around the plotted point.
      4. Further discuss which platforms should be the preferred choice.
      5. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • Desired mobile experience
      • List of desired mobile features
      • Current state assessments
      • Mobile platform approach
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      2.1.1 cont'd

      User-Centric Needs: Functional Requirements

      Factors Definitions Survey Responses
      Device Hardware Access The scope of access to native device hardware features. Basic features include those that are available through current web languages (e.g., geolocation) whereas comprehensive features are those that are device-specific. 1 (Basic) – 2 – 3 (Moderate) – 4 – 5 (Comprehensive)
      Customized Execution of Device Hardware The degree of changes to the execution of local device hardware to satisfy functional needs. 1 (Use as Is) – 2 – 3 (Configure) – 4 – 5 (Customize)
      Device Software Access The scope of access to software on the user's device, such as calendars and contact. 1 (Basic) – 2 – 3 (Moderate) – 4 – 5 (Comprehensive)
      Customized Execution of Device Software The degree of changes to the execution of local device software to satisfy functional needs. 1 (Use as Is) – 2 – 3 (Configure) – 4 – 5 (Customize)
      Use Case Complexity Workflow tasks and decisions are simple and straightforward. Complex computation is not needed to acquire the desired outcome. 1 (Strongly Agree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Disagree)
      Computational Resources The resources needed on the device to complete desired functional needs. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Use Case Ambiguity The mobile use case and technical requirements are well understood and documented. Changes to the mobile application is likely. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Mobile Application Access Enterprise systems and data are accessible to the broader organization through the mobile application. This factor does not necessarily mean that anyone can access it untracked. You may still need to identify yourself or log in, etc. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Scope of Adoption & Impact The extent to which the mobile application is leveraged in the organization. 1 (Enterprise) – 2 – 3 (Department) – 4 – 5 (Team)
      Installable The need to locally install the mobile application. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Targeted Devices & Platforms Mobile applications are developed for a defined set of mobile platform versions and types and device. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Output Audience The mobile application transforms an input into a valuable output for high-priority internal or external stakeholders. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)

      2.1.1 cont'd

      User-Centric Needs: Native User Experience Factors

      Factors Definitions Survey Responses
      Immersive Experience The need to bridge physical world with the virtual and digital environment, such as geofencing and NFC. 1 (Internally Delivered) – 2 – 3 (3rd Party Supported) – 4 – 5 (Business Implemented)
      Timeliness of Content and Updates The speed of which the mobile application (and supporting system) responds with requested information, data and updates from enterprise systems and 3rd party services. 1 (Reasonable Delayed Response) – 2 – 3 (Partially Outsourced) – 4 – 5 (Fully Outsourced)
      Application Performance The speed of which the mobile application completes tasks is critical to its success. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Network Accessibility The needed ability to access and use the mobile application in various network conditions. 1 (Only Available When Online) – 2 – 3 (Partially Available When Online) – 4 – 5 (Available Online)
      Integrated Ecosystem The approach to integrate the mobile application with enterprise or 3rd party systems and services. 1 (Out-of-the-Box Connectors) – 2 – 3 (Configurable Connectors) – 4 – 5 (Customized Connectors)
      Desire to Have a Native Look-and-Feel The aesthetics and UI features (e.g., heavy animations) that are only available through native and cross-platform applications. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      User Tolerance to Change The degree of willingness and ableness for a user to change their way of working to maximize the value of the mobile application. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Mission Criticality The business could not execute its main strategy if the mobile application was removed. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Business Value The mobile application directly adds business value to the organization. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Industry Differentiation The mobile application provides a distinctive competitive advantage or is unique to your organization. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)

      2.1.1 cont'd

      Enterprise-Centric Needs: Non-Functional Requirements

      Factors Definitions Survey Responses
      Legacy Compatibility The need to integrate and operate with legacy systems. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Code Portability The need to enable the "code once and deploy everywhere" approach. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Vendor & Technology Lock-In The tolerance to lock into a vendor mobile delivery solution or technology framework. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Data Sensitivity The data used by the mobile application does not fall into the category of sensitive data – meaning nothing financial, medical, or personal identity (GDPR and worldwide equivalents). The disclosure, modification, or destruction of this data would cause limited harm to the organization. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Data Policies Policies of the mobile application's data are mandated by internal departmental standards (e.g. naming standards, backup standards, data type consistency). Policies only mandated in this way usually have limited use in a production capacity. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Security Risks Mobile applications are connected to private data sources and its intended use will be significant if underlying data is breached. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      Business Continuity & System Integrity Risks The mobile application in question does not have much significance relative to the running of mission critical processes in the organization. 1 (Strongly Disagree) – 2 – 3 (Neutral) – 4 – 5 (Strongly Agree)
      System Openness Openness of enterprise systems to enable mobile applications from the user interface to the business logic and backend integrations and database. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Mobile Device Management The organization's policy for the use of mobile devices to access and leverage enterprise data and services. 1 (Bring-Your-Own-Device) – 2 – 3 (Hybrid) – 4 – 5 (Corporate Devices)

      2.1.1 cont'd

      Enterprise-Centric Needs: Delivery Capacity

      Factors Definitions Survey Responses
      Ease of Mobile Delivery The desire to have out-of-the-box and packaged tools to expedite mobile application delivery using web technologies. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Solution Competency The capability for internal staff to and learn how to implement and administer mobile delivery tools and deliver valuable, high-quality applications. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Ease of Deployment The desire to have the mobile applications delivered by the team or person without specialized resources from outside the team. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Delivery Approach The capability to successfully deliver mobile applications given budgetary and costing, resourcing, and supporting services constraints. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Maintenance & Operational Support The capability of the resources to responsibly maintain and operate mobile applications, including defect fixes and the addition and extension of modules to base implementations of the digital product. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Domain Knowledge Support The availability and accessibility of subject and domain experts to guide facilitate mobile application implementation and adoption. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Delivery Urgency The desire to have the mobile application delivered quickly. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Reusable Components The desire to reuse UI elements and application components. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)

      2.1.1 cont'd

      Example:

      Score Factors (Average) Mobile Opportunity 1: Inventory Management Mobile Opportunity 2: Remote Support
      User-Centric Needs 4.25 3
      Functional Requirements 4.5 2.25
      Native User Experience Factors 4 1.75
      Enterprise-Centric Needs 4 2
      Non-Functional Requirements 3.75 3.25
      Delivery Capacity 4.25 2.75
      Possible Mobile Platform Cross-Platform Native PWA Hybrid

      Nine datapoints are arranged on a graph where the x axis s labeled: User Centric Needs; and the Y axis is labeled: Enterprise-centric needs. The datapoints are, in order from left to right, top to bottom: Hybrid; Cross- Platform; Native; Web; Hybrid or Cross- Platform; Cros-s Platform; Web; Web; Hybrid or Cross- Platform. Two yellow circles are overlaid, one containing the phrase: Remote Support - over the box containing Progressive Web Applications (PWA) or Hybrid; and a yellow circle containing the phrase Inventory MGMT, partly covering the box containing Native; and the box containing Cross-Platform.

      Build a scalable and manageable platform

      Long-term mobile success depends on the efficiency and reliability of the underlying operational platform. This platform must support the computational and performance demands in a changing business environment, whether it is composed of off-the-self or custom-developed solutions, or a single vendor or best-of-breed.

      • Application
        • The UI design and content language is standardized and consistently applied
        • All mobile configurations and components are automatically versioned
        • Controlled administration and tooling access, automation capabilities, and update delivery
        • Holistic portfolio management
      • Data
        • Automated data management to preserve data quality (e.g. removal of duplications)
        • Defined single source of truth
        • Adherence to data governance, and privacy and security policies
        • Good content management practices, governance and architecture
      • Infrastructure
        • Containers and sandboxes are available for development and testing
        • Self-healing and self-service environments
        • Automatic system scaling and load balancing
        • Comply to budgetary and licensing constraints
      • Integration
        • Backend database and system updates are efficient
        • Loosely coupled architecture to minimize system regressions and delivery effort
        • Application, system and data monitoring

      Step 2.2

      Shortlist Your Mobile Delivery Solution

      Activities

      2.2.1 Shortlist your mobile delivery solution

      2.2.2 Build your feature and service lists

      Define Your Mobile Approach

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • Shortlisted mobile delivery solutions
      • Desired list of vendor features and services

      Ask yourself: should I build or buy?

      Build Buy

      Multi-Source Best-of-Breed

      Vendor Add-Ons & Integrations

      Integrate various technologies that provide subset(s) of the features needed for supporting the business functions.

      Enhance an existing vendor's offerings by using their system add-ons either as upgrades, new add-ons or integrations.

      Pros

      • Flexibility in choice of tools.
      • In some cases, cost may be lower.
      • Easier to enhance with in-house teams.

      Cons

      • Introduces tool sprawl.
      • Requires resources to understand tools and how they integrate.
      • Some of the tools necessary may not be compatible with each other.

      Pros

      • Reduces tool sprawl.
      • Supports consistent tool stack.
      • Vendor support can make enhancement easier.
      • Total cost of ownership may be lower.

      Cons

      • Vendor Lock-In.
      • The processes to enhance may require tweaking to fit tool capability.

      Multi-Source Custom

      Single Source

      Integrate systems built in-house with technologies developed by external organizations.

      Buy an application/system from one vendor only.

      Pros

      • Flexibility in choice of tools.
      • In some cases, cost may be lower.
      • Easier to enhance with in-house teams.

      Cons

      • May introduce tool sprawl.
      • Requires resources to have strong technical skills
      • Some of the tools necessary may
      • not be compatible with each other.

      Pros

      • Reduces tool sprawl.
      • Supports consistent tool stack.
      • Vendor support can make enhancement easier.
      • Total cost of ownership may be lower.

      Cons

      • Vendor Lock-In.
      • The processes to enhance may require tweaking to fit tool capability.

      Weigh the pros and cons of mobile enablement versus development

      Mobile Enablement

      Mobile Development

      Description Mobile interfaces that heavily rely on enterprise or 3rd party systems to operate. Mobile does not expand the functionality of the system but complements it with enhanced access, input and consumption capabilities. Mobile applications that are custom built or configured in a way that can operate as a standalone entity, whether they are locally deployed to a user's device or virtually hosted.
      Mobile Platform Mobile web, locally installed mobile application provided by vendor Mobile web, hybrid, cross-platform, native
      Typical Audience Internal staff, trusted users Internal and external users, general public
      Examples of Tooling Flavors Enterprise applications, point solutions, robotic & process automation Mobile enterprise application platform, web development, low and no code development, software development kits (SDKs)
      Technical Skills Required Little to no mobile delivery experience and skillsets are needed, but teams must be familiar with the supporting system to understand how a mobile interface can improve the value of the system. Have good UX-driven and quality-first practices in the mobile context. In-depth coding, networking, system and UX design, data management and security skills are needed for complex designs, functions, and architectures.
      Architecture & Integration Architecture is standardized by the vendor or enterprise with UI elements that are often minimally configurable. Extensions and integrations must be done through the system rather than the mobile interface. Much of application stack and integration approach can be customized to meet the specific functional and non-functional needs. It should still leverage web and design standards and investments currently used.
      Functional Scope Functionality is limited to the what the underlying system allows the interface to do. This often is constrained to commodity web application features (e.g., reporting) or tied to minor configurations to the vendor-provided point solution Functionality is only constrained by the platform and the targeted mobile devices whether it is performance, integration, access or security related. Teams should consider feature and content parity across all products within the organization portfolio.
      Delivery Pipeline End-to-end delivery and automated pipeline is provided by the vendor to ensure parity across all interfaces. Many vendors provide cloud-based services for hosting. Otherwise, it is directly tied to the SDLC of the supporting system. End-to-end delivery and automated pipeline is directly tied to enterprise SDLC practices or through the vendor. Some vendors provide cloud-based services for hosting. Updates are manually or automatically (through a vendor) published to app stores and can be automatically pushed to corporate users through mobile application management capabilities.
      Standards & Guardrails Quality standards and technology governance are managed by the vendor or IT with limited capabilities to tailor them to be mobile specific. Quality standards and technology governance are managed by the mobile delivery teams. The degree of customizations to these standards and guardrails is dependent on the chosen platform and delivery team competencies.

      Understand the common attributes of a mobile delivery solution

      • Source Code Management – Built-in or having the ability to integrate with code management solutions for branching, merging, and versioning. Debugging and coding assistance capabilities may be available.
      • Single Code Base – Capable of programming in a standard coding and scripting language for deployment into several platforms and devices. This code base is aligned to a common industry framework (e.g., AngularJS, Java) or a vendor-defined one.
      • Out-of-the-Box Connectors & Plug-ins – Pre-built APIs enhance the solution's capabilities with 3rd party tools and systems to deliver and manage high quality and valuable mobile applications.
      • Emulators – Ability to virtualize an application's execution on a target platform and device.
      • Support for Native Features – Supports plug-ins and APIs for access to device-specific features.

      What are mobile delivery solutions?

      A mobile delivery solution gives you the tools, resources and support to enable or build your mobile application. They can provide pre-built applications, vendor supported components to allow some configurations, or resources for full stack customizations. Some solutions can be barebone software development kits (SDKs) or comprehensive suites offering features to support the entire software delivery lifecycle, such as:

      • Mobile application management
      • Testing and publishing to app stores
      • Content management
      • Cloud hosting
      • Application performance management

      Info-Tech Insight

      Mobile enablement and development capabilities are already embedded in many common productivity tools and enterprise applications, such as Microsoft PowerApps and ERP modules. They can serve as a starting point in the initial rollout of new management and governance practices without the need of acquiring new tools.

      Select your mobile delivery solutions

      1. Set the scope of your framework.
      • The initial context of this framework is based on the mobile functions needed to support your desired mobile experience and on the current state of your enterprise and 3rd party systems.
    • Define the decision factors for your solution selection.
      • Review the decision factors that will influence the selection of your mobile delivery solution for each mobile opportunity:
      • Stack Management – Who will be hosting and supporting your mobile application stack?
      • Workflows Complexity & Native Experience – How complex is your desired mobile experience and how will native device features be leveraged?
    • Select your solution type.
      • Mobile delivery solutions are broadly defined in the following groups:
      • Commercial-Off-The-Shelf (COTS) – Pre-built mobile applications requiring little to no configurations or implementation effort.
      • Vendor Hosted Mobile Platform – Back-end and mid-tier infrastructure and operational support are managed by a vendor.
      • Cross-Platform Development – Frameworks that transform a single code base into platform-specific builds.
      • Hybrid Development – Tools that wrap a single code base into a locally deployable build.
      • Custom Web Development – Environment enabling full stack development for mobile web applications.
      • Custom Native Development – Environment enabling full stack development for mobile native applications.
    • A quadrant analysis is depicted. the top data is labeled Complex Mobile Features; the right side is labeled Organization-Managed Stack; the bottom is labeled Simple Mobile Features; and the left side is labeled Vendor-Managed Stack. The quadrants are labeled the following, in order from left to right, top to bottom. Vendor- Hosted Mobile Platform; Custom Native Development Solutions; Commercial-Off-the-Shelf Solutions; Custom Web Development Solutions. In the middle of the graph are the following, in order from top to bottom: Cross-Platform Development Solutions; Hybrid Development Solutions

      Explore the various solution options

      Vendor Hosted Mobile Platform

      • Cloud Services (Mobile Backend-as-a-Service) (Amazon Amplify, Kinvey, Back4App, Google Firebase, Apache Usergrid)
      • Low Code Mobile Platforms (Outsystems, Mendix, Zoho Creator, IBM Mobile Foundation, Pega Mobile, HCL Volt MX, Appery)
      • Mobile Development via Enterprise Application (SalesForce Heroku, Oracle Application Accelerator MAX, SAP Mobile Development Kit, NetSuite Mobile)
      • Mobile Development via Business Process Automation (PowerApps, Appian, Nintex, Quickbase)

      Cross-Platform Development SDKs

      React Native, NativeScript, Xamarin Forms, .NET MAUI, Flutter, Kotlin Multiplatform Mobile, jQuery Mobile, Telerik, Temenos Quantum

      Custom Native Development Solutions

      • Native Development Languages and Environments (Swift, Java, Objective-C, Kotlin, Xcode, NetBeans, Android Studio, AppCode, Microsoft Visual Studio, Eclipse, DriodScript, Compose, Atom)
      • Mobile Application Utilities (Unity, MonoGame, Blender, 3ds Max Design, Maya, Unreal Engine, Amazon Lumberyard, Oculus)

      Commercial-Off-the-Shelf Solutions

      • No Code Mobile Platforms (Swiftic, Betty Blocks, BuildFire, Appy Pie, Plant an App, Microsoft Power Apps, AppSheet, Wix, Quixy)
      • Mobile Application Point Solutions and Enablement via Enterprise Applications

      Hybrid Development SDKs

      Cordova Project, Sencha Touch, Electron, Ionic, Capacitor, Monaca, Voltbuilder

      Custom Web Development Solutions

      Web Development Frameworks (React, Angular, Vue, Express, Django, Rails, Spring, Ember, Backbone, Bulma, Bootstrap, Tailwind CSS, Blade)

      Get the most out of your solutions by understanding their core components

      While most of the heavy lifting is handled by the vendor or framework, understanding how the mobile application is built and operates can identify where further fine-tuning is needed to increase its value and quality.

      Platform Runtime

      Automatic provisioning, configurations, and tuning of organizational and 3rd party infrastructure for high availability, performance, security and stability. This can include cloud management and non-production environments.

      Extensions

      • Mobile delivery solutions can be extended to allow:
      • Custom development of back-end code
      • Customizable integrations and hooks where needed
      • Integrations with CI/CD pipelines and administrative services
      • Integrations with existing databases and authentication services

      Platform Services

      The various services needed to support mobile delivery and enable continuous delivery, such as:

      • Configuration & Change Management – Verifies, validates, and monitors builds, deployments and changes across all components.
      • Code Generator – Transforms UI and data models into native application components that are ready to be deployed.
      • Deployment Services – Deploys application components consistently across all target environments and app stores.
      • Application Services – Manages the mobile application at runtime, including executing scheduled tasks and instrumentation.

      Application Architecture

      Fundamentally, mobile application architecture is no different than any other application architecture so much of your design standards still applies. The trick is tuning it to best meet your mobile functional and non-functional needs.

      This image contains an example of mobile application architecture.

      Source: "HCL Volt MX", HCL.

      Build your shortlist decision criteria

      The decision on which type of mobile delivery solution to use is dependent on several key questions?

      Who is the Mobile Delivery Team?

      • Is it a worker, business or IT?
      • What skills and knowledge does this person have?
      • Who is supporting mobile delivery and management?
      • Are other skills and tools needed to support, extend or mature mobile delivery adoption?

      What are the Use Cases?

      • What is the value and priority of the use cases?
      • What native features do we need?
      • Who is the audience of the output and who is impacted?
      • What systems, data and services do I need access?
      • Is it best to build it or buy it?
      • What are the quality standards?
      • How strategic is the use case?

      How Complex is the System?

      • Is the mobile application a standalone or integrated with enterprise systems?
      • What is the system's state and architecture?
      • What 3rd party services do we need integrated?
      • Are integrations out-of-the-box or custom?
      • Is the data standardized and who can edit its definition?
      • Is the system monolithic or loosely coupled?

      How Much Can We Tolerate?

      • Risks: What are the business and technical risks involved?
      • Costs: How much can we invest in implementation, training and operations?
      • Change: What organizational changes am I expecting to make? Will these changes be accepted and adopted?

      2.2.1 Shortlist your mobile delivery solution

      1-3 hours

      1. Determine which mobile delivery solutions is appropriate for each mobile opportunity or use case by answering the following questions on the following slides against two factors: complexity of mobile workflows and native features and management of the mobile stack.
        1. Take the average of the enterprise-centric and user-centric scores from step 2.1 for your complexity of mobile workflows and native features scores.
      2. Calculate an average score for the management of the mobile stack. Then, map them on the matrix to indicate possible solution options alongside your user-centric scores. Consider all options around the plotted point.
      3. Further discuss which solution should be the preferred choice and compare those options with your selected platform approach.
      4. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • Current state assessment
      • Mobile platform approach
      • Shortlist of mobile delivery solution
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      2.2.1 cont'd

      Stack Management

      Factors Definitions Survey Responses
      Cost of Delayed Delivery The expected cost if a vendor solution or update is delayed. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Vendor Negotiation Organization's ability to negotiate favorable terms from vendors. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Controllable Delivery Timeline Organization's desire to control when solutions and updates are delivered. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Solution Hosting The desired approach to host the mobile application. 1 (Fully Outsourced) – 2 – 3 (Partially Outsourced) – 4 – 5 (Internally Hosted)
      Vendor Lock-In The tolerance to be locked into a specific technology stack or vendor ecosystem. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Operational Cost Target The primary target of the mobile application's operational budget. 1 (External Resources) – 2 – 3 (Hybrid) – 4 – 5 (Internal Resources)
      Platform Management The desired approach to manage the mobile delivery solution, platform or underlying technology. 1 (Decentralized) – 2 – 3 (Federated) – 4 – 5 (Centralized)
      Skill & Competency of Mobile Delivery Team The ability of the team to create and manage valuable and high-quality mobile applications. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Current Investment in Enterprise Technologies The need to maximize the ROI of current enterprise technologies or integrate with legacy technologies. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Ease of Extensibility Need to have out-of-the-box connectors and plug-ins to extend the mobile delivery solution beyond its base implementation. 1 (High) – 2 – 3 (Moderate) – 4 – 5 (Low)
      Holistic Application Strategy Organizational priorities on the types of applications the portfolio should be comprised. 1 (Buy) – 2 – 3 (Hybrid) – 4 – 5 (Build)
      Control of Delivery Pipeline The desire to control the software delivery pipeline from design to development, testing, publishing and support. 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)
      Specific Quality Requirements Software and mobile delivery is constrained to your unique quality standards (e.g., security, performance, availability) 1 (Low) – 2 – 3 (Moderate) – 4 – 5 (High)

      2.2.1 cont'd

      Example:

      Score Factors (Average) Mobile Opportunity 1: Inventory Management Mobile Opportunity 2: Remote Support
      User-Centric & Enterprise Centric Needs (From Step 2.1) 4.125 2.5
      Stack Management 2 2.5
      Desired Mobile Delivery Solution Vendor-Hosted Mobile Platform

      Commercial-Off-the-Shelf Solution

      Hybrid Development Solution

      A quadrant analysis is depicted. the top data is labeled Complex Mobile Features; the right side is labeled Organization-Managed Stack; the bottom is labeled Simple Mobile Features; and the left side is labeled Vendor-Managed Stack. The quadrants are labeled the following, in order from left to right, top to bottom. Vendor- Hosted Mobile Platform; Custom Native Development Solutions; Commercial-Off-the-Shelf Solutions; Custom Web Development Solutions. In the middle of the graph are the following, in order from top to bottom: Cross-Platform Development Solutions; Hybrid Development Solutions.

      Consider the following in your solution selection and implementation

      • Vendor lock in – Each solution has its own approach, frameworks, and data schemas to convert designs and logic into an executable build that is stable in the targeted environment. Consequently, moving application artifacts (e.g., code and designs) from one solution or environment to another may not be easily accomplished without significant modifications or the use of application modernization or migration services.
      • Conflicting priorities and viewpoints of good delivery practices – Mobile delivery solutions are very particular on how they generate applications from designs and configurations. The solution's approach may not accommodate your interpretation of high-quality code (e.g., scalability, maintainability, extensibility, security). Technical experts should be reviewing and refactoring the generated code.
      • Incompatibility with enterprise applications and systems – The true benefit of mobile delivery solutions is their ability to connect your mobile application to enterprise and 3rd party technologies and services. This capability often requires enterprise technologies and services to be architected in a way that is compatible with your delivery solution while ensuring data, security protocols and other standards and policies are consistently enforced.
      • Integration with current application development and management tools – Mobile delivery solutions should be extensions from your existing application development and management tools that provides the versioning, testing, monitoring, and deployment capabilities to sustain a valuable application portfolio. Without this integration, IT will be unable to:
        • Root cause issues found on IT dashboards or reported to help desk.
        • Rollback defective applications to a previous stable state.
        • Obtain a complete application portfolio inventory.
        • Execute comprehensive testing for high-risk applications.
        • Trace artifacts throughout the development lifecycle.
        • Generate reports of the status of releases.

      Enhance your SDLC to support mobile delivery

      What is the SDLC?

      The software development lifecycle (SDLC) is a process that ensures valuable software products are efficiently delivered to customers. It contains a repeatable set of activities needed to intake and analyze requirements to design, build, test, deploy, and maintain software products.

      How will mobile delivery influence my SDLC?

      • Cross-functional collaboration – Bringing business and IT together at the most opportune times to clarify user needs and business priorities, and set realistic expectations given technology and capacity constraints. The appropriate tactics and techniques are used to improve decision making and delivery effectiveness according to the type of work.
      • Iterative delivery – Frequent delivery of progressive changes minimizes the risk of low-quality features by containing and simplifying scope, and enables responsive turnarounds of fixes, enhancements, and priority changes.
      • Feedback loops –Mobile application owners constantly review, update and refine their backlog of mobile features and changes to reflect user feedback and system performance metrics. Delivery teams proactively prepare the application for future scaling based on lessons and feedback learned from earlier releases.

      To learn more, visit Info-Tech's Modernize Your SDLC blueprint.

      Example: Low- & No-Code Mobile Delivery Pipeline

      Low Code

      Data Modeling & Configuration

      No Code

      Visual Interface with Complex Data Models

      Data Modeling & Configuration

      Visual Interfaces with Simple Data Models

      GUI Designer with Customizable Components & Entities

      UI Definition & Design

      GUI Designer with Canned Templates

      Visual Workflow and Custom Scripting

      Business Logic Rules and Workflow Specification

      Visual Workflow and Natural Language Scripting

      Out-of-the-Box Plugins & Custom Integrations

      Integration of External Services (via 3rd Party APIs)

      Out-of-the-Box Plugins

      Automated and Manual Build & Packaging

      Build & Package

      Automated Build & Packaging

      Automated & Manual Testing

      Test

      Automated Testing

      One-Click Push or IT Push to App Store

      Publish to App Store

      One-Click Push to App Store

      Use Info-Tech's research to address your delivery gaps

      Mobile success requires more than a set of good tools.

      Overcome the Common Challenges Faced with Building Mobile Applications

      Common Challenges with Digital Applications

      Suggested Solutions

      • Time & Resource Constraints
      • Buy-In From Internal Stakeholders
      • Rapidly Changing Requirements
      • Legacy Systems
      • Low-Priority for Internal Tools
      • Insufficient Data Access

      Source: DronaHQ, 2021

      Learn the differentiators of mobile delivery solutions

      • Native Program Languages – Supports languages other than web (Java, Ruby, C/C++/C#, Objective-C).
      • IDE Integration – Available plug-ins for popular development suites and editors.
      • Debugging Tools – Finding and eliminating bugs (breakpoints, single stepping, variable inspection, etc.).
      • Application Packaging via IDE – Digitally sign applications through the IDE for it to be packaged and published in app stores.
      • Automated Testing Tools – Native or integration with automated functional and unit testing tools.
      • Low- and No- Code Designer – Tools for designing graphical user interfaces and features and managing data with drag-and-drop functionalities.
      • Publishing and Deployment Capabilities – Automated deployment to mobile device management (MDM) systems, mobile application management (MAM) systems, mobile application stores, and web servers.
      • Third-Party and Open-Source Integration – Integration with proprietary and open-source third-party modules, development tools, and systems.
      • Developer Marketplace – Out-of-the-box plug-ins, templates, and integration are available through a marketplace.
      • Mobile Application Support Capabilities – Ability to gather, manage, and address application issues and defects.
      • API Gateway, Monitoring, and Management – Services that enable the creation, publishing, maintenance, monitoring, and securing of APIs through a common interface.
      • Mobile Analytics and Monitoring – View the adoption, usage, and performance of deployed mobile applications through graphical dashboards.
      • Mobile Content Management – Publish and manage mobile content through a centralized system.
      • Mobile Application Security – Supports the securing of application access and usage, data encryption, and testing of security controls.

      Define your mobile delivery vendor selection criteria

      Focus on the key vendor attributes and capabilities that enable mobile delivery scaling and growth in your organization

      Considerations in Mobile Delivery Vendor Selection
      Platform Features & Capabilities Price to Implement & Operate Platform
      Types of Mobile Applications That Can Be Developed Ease of IT Administration & Management
      User Community & Marketplace Size Security, Privacy & Access Control Capabilities
      SME in Industry Verticals & Business Functions Vendor Product Roadmap & Corporate Strategy
      Pre-Built Designs, Templates & Application Shells Scope of Device- and OS-Specific Compatibilities
      Regulatory & Industry Compliance Integration & Technology Partners
      Importing Artifacts From and Exporting to Other Solutions Platform Architecture & Underlying Technology
      End-to-End Support for the Entire Mobile SDLC Relevance to Current Mobile Trends & Practices

      Build your features list

      Incorporate different perspectives when defining the list of mandatory and desired features of your target solution.

      Appendix B contains a list of features for low- and no-code solutions that can be used as a starting point.

      Visit Info-Tech's Implement a Proactive and Consistent Vendor Selection Process blueprint.

      Mobile Developer

      • Visual, drag-and-drop models to define data models, business logic, and user interfaces.
      • One-click deployment.
      • Self-healing capabilities.
      • Vendor-managed infrastructure.
      • Active community and marketplace.
      • Pre-built templates and libraries.
      • Optical character recognition and natural language processing.
      • Knowledgebase and document management.
      • Business value, operational costs, and other KPI monitoring.
      • Business workflow automation.

      Mobile IT Professional

      • Audit and change logs.
      • Theme and template builder.
      • Template management.
      • Role-based access.
      • Regulatory compliance.
      • Consistent design and user experience across applications.
      • Application and system performance monitoring.
      • Versioning and code management.
      • Automatic application and system refactoring and recovery.
      • Exception and error handling.
      • Scalability (e.g. load balancing) and infrastructure management.
      • Real-time debugging.
      • Testing capabilities.
      • Security management.
      • Application integration management.

      2.2.2 Build your feature and service lists

      1-3 hours

      Review the key outcomes in the previous exercises to help inform the features and vendor support you require to support your mobile delivery needs:

      End user personas and desired mobile experience

      Objectives and expectations

      Desired mobile features and platform

      Mobile delivery solutions

      Brainstorm a list of features and functionalities you require from your ideal solution vendors. Prioritize these features and functionalities. See our Implement a Proactive and Consistent Vendor Selection Process blueprint for more information on vendor procurement.

      Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Download the Mobile Application Delivery Communication Template

      Input

      Output
      • Shortlist of mobile solutions
      • Quality definitions
      • Mobile objectives and metrics
      • List of desired features and services of mobile delivery solution vendors
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Hit a home run with your stakeholders

      Use a data-driven approach to select the right tooling vendor for your needs – fast.

      AwarenessEducation & DiscoveryEvaluationSelection

      Negotiation & Configuration

      1.1 Proactively Lead Technology Optimization & Prioritization2.1 Understand Marketplace Capabilities & Trends3.1 Gather & Prioritize Requirements & Establish Key Success Metrics4.1 Create a Weighted Selection Decision Model5.1 Initiate Price Negotiation with Top Two Venders
      1.2 Scope & Define the Selection Process for Each Selection Request Action2.2 Discover Alternate Solutions & Conduct Market Education3.2 Conduct a Data Driven Comparison of Vendor Features & Capabilities4.2 Conduct Investigative Interviews Focused on Mission Critical Priorities with Top 2-4 Vendors5.2 Negotiate Contract Terms & Product Configuration

      1.3 Conduct an Accelerated Business Needs Assessment

      2.3 Evaluate Enterprise Architecture & Application PortfolioNarrow the Field to Four Top Contenders4.3 Validate Key Issues with Deep Technical Assessments, Trial Configuration & Reference Checks5.3 Finalize Budget Approval & Project
      1.4 Align Stakeholder Calendars to Reduce Elapsed Time & Asynchronous Evaluation2.4 Validate the Business Case5.4 Invest in Training & Onboarding Assistance

      Investing time improving your software selection methodology has big returns.

      Info-Tech Insight

      Not all software selection projects are created equal – some are very small, some span the entire enterprise. To ensure that IT is using the right framework, understand the cost and complexity profile of the application you're looking to select. Info-Tech's Rapid Application Selection Framework approach is best for commodity and mid-tier enterprise applications; selecting complex applications is better handled by the methodology in Info-Tech's Implement a Proactive and Consistent Vendor Selection Process.

      Step 2.3

      Create a Roadmap for Mobile Delivery

      Activities

      2.3.1 Define your MVP release

      2.3.2 Build your roadmap

      Define Your Mobile Approach

      This step involves the following participants:

      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      Outcomes of this step

      • MVP design
      • Mobile delivery roadmap

      Achieve mobile success with MVPs

      By delivering mobile capabilities in small iterations, teams recognize value sooner and reduce accumulated risk. Both benefits are realized as the iteration enters validation testing and release.

      This image depicts a graph of the learn-build-measure cycle over time, adapted from Managing the Development of Large Software Systems, Dr. Winston W. Royce, 1970

      An MVP focuses on a small set of functions, involves minimal possible effort to deliver a working and valuable solution, and is designed to satisfy a specific user group. Its purpose is to:

      • Maximize learning.
      • Evaluate the value and acceptance of mobile applications.
      • Inform the building of a mobile delivery practice.

      The build-measure-learn loop suggests mobile delivery teams should perpetually take an idea and develop, test, and validate it with the mobile development solution, then expand on the MVP using the lessons learned and evolving ideas. In this sense the MVP is just the first iteration in the loop.

      Leverage a canvas to detail your MVP

      Use the release canvas to organize and align the organization around your MVP!

      This is an example of a release canvas which can be used to detail your MVP.

      2.3.1 Define your MVP release

      1-3 hours

      1. Create a list of high priority use cases slated for mobile application delivery. Brainstorm the various supporting activities required to implement your use cases including the shortlisting of mobile delivery tools.
      2. Prioritize these use cases based on business priority (from your canvas). Size the effort of these use cases through collaboration.
      3. Define your MVPs using a release canvas as shown on the following slide.
      4. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Input

      Output
      • High priority mobile opportunities
      • Mobile platform approach
      • Shortlist of mobile solutions
      • List of potential MVPs
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      2.3.1 cont'd

      MVP Name

      Owner:
      Parent Initiative:
      Updated:

      NAME
      LINK
      October 05, 2022

      MVP Theme/Goals

      [Theme / Goal]

      Use Cases

      Value

      Costs

      [Use Case 1]
      [Use Case 2]
      [Use Case 3]

      [Business Value 1]
      [Business Value 2]
      [Business Value 3]

      [Cost Item 1]
      [Cost Item 2]
      [Cost Item 3]

      Impacted Personas

      Impacted Workflows

      Stakeholders

      [Persona 1]
      [Persona 2]
      [Persona 3]

      [Workflow 1]
      [Workflow 2]
      [Workflow 3]

      [Stakeholder 1]
      [Stakeholder 2]
      [Stakeholder 3]

      Build your mobile roadmap

      It's more than a set of colorful boxes. It's the map to align everyone to where you are going

      Your mobile roadmap

      • Lays out a strategy for your mobile application, platform and practice implementation and scaling.
      • Is a statement of intent for your mobile adoption.
      • Communicates direction for the implementation and use of mobile delivery tools, mobile applications and supporting technologies.
      • Directly connects to the organization's goals

      However, it is not:

      • Representative of a hard commitment.
      • A simple combination of your current product roadmaps

      Roadmap your MVPs against your milestones and release dates

      This is an image of an example of a roadmap for your MVPS, with milestones across Jan 2022, Feb 2022, Mar 2022, Apr 2022. under milestones, are the following points: Points in the timeline when an established set of artifacts is complete (feature-based), or to check status at a particular point in time (time-based); Typically assigned a date and used to show progress; Plays an important role when sequencing different types of artifacts. Under Release Dates are the following points: Releases mark the actual delivery of a set of artifacts packaged together in a new version of processes and applications or new mobile application and delivery capabilities. ; Release dates, firm or not, allow stakeholders to anticipate when this is coming.

      To learn more, visit Info-Tech's Deliver on Your Digital Product Vision blueprint.

      Understand what is communicated in your roadmap

      WHY is the work being done?

      Explains the overarching goal of work being done to a specific audience.

      WHO is doing the work?

      Categorizes the different groups delivering the work on the product.

      WHAT is the work being done?

      Explains the artifacts, or items of work, that will be delivered.

      WHEN is the work being done?

      Explains when the work will be delivered within your timeline.

      To learn more, visit Info-Tech's Deliver on Your Digital Product Vision blueprint.

      Pay attention to organizational changes

      Be prepared to answer:

      "How will mobile change the way I do my job?"

      • Plan how workers will incorporate mobile applications into their way of working and maximize the features it offers.
      • Address the human concerns regarding the transition to a digital world involving modern and mobile technologies and automation.
      • Accept changes, challenges and failures with open arms and instill tactics to quickly address them.
      • Build and strengthen business-IT trust, empowerment, and collaborative culture by adopting the right practices throughout the mobile delivery process.
      • Ensure continuous management and leadership support for business empowerment, operational changes, and shifts in role definitions to best support mobile delivery.
      • Establish a committee to manage the growth, adoption, and delivery of mobile as part of a grandeur digital application portfolio and address conflicts among business units and IT.

      Anticipate and prepare for changes and issues

      Verify and validate the flexibility and adaptability of your mobile applications, strategy and roadmap against various scenarios

      • Scenarios
        • Application Stores Rejecting the Application
        • Security Incidents & Risks
        • Low User Adoption, Retention & Satisfaction
        • Incompatibility with User's Device & Other Systems
        • Device & OS Patches & Updates
        • Changes in Industry Standards & Regulations

      Use the "Now, Next, Later" roadmap

      Use this when deadlines and delivery dates are not strict. This is best suited for brainstorming a product plan when dependency mapping is not required.

      Now

      What are you going to do now?

      Next

      What are you going to do very soon?

      Later

      What are you going to do in the future?

      This is a roadmap showing various points in the following categories: Now; Next; Later

      Adapted From: "Tips for Agile product roadmaps & product roadmap examples," Scrum.org, 2017

      2.3.2 Build your roadmap

      1-3 hours

      1. Identify the business outcomes your mobile application delivery and MVP is expected to deliver.
      2. Build your strategic roadmap by grouping each business outcome by how soon you need to deliver it:
        1. Now: Let's achieve this ASAP.
        2. Next: Sometime very soon, let's achieve these things.
        3. Later: Much further off in the distance, let's consider these things.
      3. Identify what the critical steps are for the organization to embrace mobile application delivery and deliver your MVP.
      4. Build your tactical roadmap by grouping each critical step by how soon you need to address it:
        1. Now: Let's do this ASAP.
        2. Next: Sometime very soon, let's do these things.
        3. Later: Much further off in the distance, let's consider these things.
      5. Document your findings and discussions into Info-Tech's Mobile Application Delivery Communication Template.

      Input

      Output
      • List of potential MVPs
      • Mobile roadmap
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • Mobile Application Delivery Communication Template
      • Applications Manager
      • Product and Platform Owners
      • Software Delivery Teams
      • Business and IT Leaders

      2.3.2 cont'd

      Example: Tactical Roadmap

      Milestone 1

      • Modify the business processes of the MVP to best leverage mobile technologies. Streamline the business processes by removing the steps that do not directly support value delivery.
      • Develop UI templates using the material design framework and the organization's design standards. Ensure it is supported on mobile devices through the mobile browser and satisfy accessibility design standards.
      • Verify and validate current security controls against latest security risks using the W3C as a starting point. Install the latest security patches to maintain compliance.
      • Acquire the Ionic SDK and upskill delivery teams.

      Milestone 2

      • Update the current web framework and third-party libraries with the latest version and align web infrastructure to latest W3C guidelines.
      • Verify and validate functionality and stability of APIs with third-party applications. Begin transition to REST APIs where possible.
      • Make minor changes to the existing data architecture to better support the data volume, velocity, variety, and veracity the system will process and deliver.
      • Update the master data management with latest changes. Keep changes to a minimum.
      • Develop and deliver the first iteration of the MVP with Ionic.

      Milestone 3

      • Standardize the initial mobile delivery practice.
      • Continuously monitor the system and proactively address business continuity, system stability and performance, and security risks.
      • Deliver a hands-on and facilitated training session to end users.
      • Develop intuitive user manuals that are easily accessible on SharePoint.
      • Consult end users for their views and perspectives of suggested business model and technology changes.
      • Regularly survey end users and the media to gauge industry sentiment toward the organization.

      Pitch your roadmap initiatives

      There are multiple audiences for your pitch, and each audience requires a different level of detail when addressed. Depending on the outcomes expected from each audience, a suitable approach must be chosen. The format and information presented will vary significantly from group to group.

      Audience

      Key Contents

      Outcome

      Outcome

      • Costs or benefits estimates

      Sign off on cost and benefit projections

      Executives and decision makers

      • Business value and financial benefits
      • Notable business risks and impacts
      • Business rationale and strategic roadmap

      Revisions, edits, and approval

      IT teams

      • Notable technical and IT risks
      • IT rationale and tactical roadmap
      • Proposed resourcing and skills capacity

      Clarity of vision and direction and readiness for delivery

      Business workers

      • Business rationale
      • Proposed business operations changes
      • Application roadmap

      Verification on proposed changes and feedback

      Continuously measure the benefits and value realized in your mobile applications

      Success hinges on your team's ability to deliver business value. Well-developed mobile applications instill stakeholder confidence in ongoing business value delivery and stakeholder buy-in, provided proper expectations are set and met.

      Business value defines the success criteria of an organization, and it is interpreted from four perspectives:

      • Profit Generation – The revenue generated from a business capability with mobile applications.
      • Cost Reduction – The cost reduction when performing business capabilities with mobile applications.
      • Service Enablement – The productivity and efficiency gains of internal business operations with mobile applications.
      • Customer and Market Reach – Metrics measuring the improved reach and insights of the business in existing or new markets.

      See our Build a Value Measurement Framework blueprint for more information about business value definition.

      Business Value Matrix

      This image contains a quadrant analysis with the following labels: Left - Improved Capabilities; Top - Outward; Right - Financial Benefit; Bottom - Inward. the quadrants are labeled the following, in order from left to right, top to bottom. Customer and Market Reach; Profit Generation; Service Enhancement; Cost Reduction

      Grow your mobile delivery practice

      We are Here
      Level 1: Mobile Delivery Foundations Level 2: Scaled Mobile Delivery Level 3: Leading-Edge Mobile Delivery

      You understand the opportunities and impacts mobile has on your business operations and its disruptive nature on your enterprise systems. Your software delivery lifecycle was optimized to incorporate the specific practices and requirements needed for mobile. A mobile platform was selected based on stakeholder needs that are weighed against current skillsets, high priority non-functional requirements, the available capacity and scalability of your stack, and alignment to your current delivery process.

      New features and mobile use cases are regularly emerging in the industry. Ensuring your mobile platform and delivery process can easily scale to incorporate constantly changing mobile features and technologies is key. This can help minimize the impact these changes will have on your mobile stack and the resulting experience.

      Achieving this state requires three competencies: mobile security, performance optimization, and integration practices.

      Many of today's mobile trends involve, in one form or another, hardware components on the mobile device (e.g., NFC receivers, GPS, cameras). You understand the scope of native features available on your end user's mobile device and the required steps and capabilities to enable and leverage them.

      Grow your mobile delivery practice (cont'd)

      Ask yourself the following questions:
      Level 1: Mobile Delivery Foundations Level 2: Scaled Mobile Delivery Level 3: Leading-Edge Mobile Delivery

      Checkpoint questions shown at the end of step 1.2 of this blueprint

      You should be at this point upon the successful delivery of your first mobile application.

      Security

      • Your mobile stack (application, data, and infrastructure) is updated to incorporate the security risks mobile apps will have on your systems and business operations.
      • Leading edge encryption, authentication management (e.g., multi-factor), and access control systems are used to bolster existing mobile security infrastructure.
      • Network traffic to and from mobile application is monitored and analyzed.

      Performance Optimization

      • Performance enhancements are made with the entire mobile stack in mind.
      • Mobile performance is monitored and assessed with both proactive (data flow) and retroactive (instrumentation) approaches.
      • Development and testing practices and technologies accommodate the performance differences between mobile and desktop applications.

      API Development

      • Existing web APIs are compatible with mobile applications, or a gateway / middleware is used to facilitate communication with backend and third-party services.
      • APIs are secured to prevent unauthorized access and misuse.
      • Web APIs are documented and standardized for reuse in multiple mobile applications.
      • Implementing APIs of native features in native and/or cross-platform and/or hybrid platforms is well understood.
      • All leading-edge mobile features are mapped to and support business requirements and objectives.
      • The new mobile use cases are well understood and account for the various scenarios/environments a user may encounter with the leading-edge mobile features.
      • The relevant non-mobile devices, readers, sensors, and other dependent systems are shortlisted and acquired to enable and support your new mobile capabilities.
      • Delivery teams are prepared to accommodate the various security, performance, and integration risks associated with implementing leading-edge mobile features. Practices and mechanisms are established to minimize the impact to business operations.
      • Metrics are used to measure the success of your leading-edge mobile features implementation by comparing its performance and acceptance against past projects.
      • Business stakeholders and development teams are up to date with the latest mobile technologies and delivery techniques.

      Summary of Accomplishment

      Choose Your Mobile Platform and Tools

      • User personas
      • Mobile objectives and metrics
      • Mobile opportunity backlog
      • List of mobile features to enable the desired mobile experience
      • System current assessment
      • Mobile application quality definition
      • Readiness for mobile delivery
      • Desired mobile platform approach
      • Shortlisted mobile delivery solutions
      • Desired list of vendor features and services
      • MVP design
      • Mobile delivery roadmap

      If you would like additional support, have our analysts guide you through other phases as part of Info-Tech workshop.

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Research Contributors and Experts

      This is a picture of Chaim Yudkowsky, Chief Information Officer for The American Israel Public Affairs Committee

      Chaim Yudkowsky
      Chief Information Officer
      The American Israel Public Affairs Committee

      Chaim Yudkowsky is currently Chief information Officer for American Israel Public Affairs Committee (AIPAC), the DC headquartered not-for-profit focused on lobbying for a strong US-Israel relationship. In that role, Chaim is responsible for all traditional IT functions including oversight of IT strategy, vendor relationships, and cybersecurity program. In addition, Chaim also has primary responsibility for all physical security technology and strategy for US offices and event technology for the many AIPAC events.

      Bibliography

      "5 Pillars of API Management". Broadcom, 2021. Web.

      Bourne, James. "Apperian research shows more firms pushing larger numbers of enterprise apps". Enterprise CIO, 17 Feb 2016. Web.

      Ceci, L. "Mobile app user retention rate worldwide 2020, by vertical". Statista, 6 Apr 2022. Web.

      Clement, J. "Share of global mobile website traffic 2015-2021". Statista, 18 Feb 2022. Web

      DeVos, Jordan. "Design Problem Statements – What They Are and How to Frame Them." Toptal, n.d. Web.

      Enge, Eric. "Mobile vs. Desktop Usage in 2020". Perficient, 23 March 2021. Web.

      Engels, Antoine. "How many Android updates does Samsung, Xiaomi or OnePlus offer?" NextPit, Mar 2022. Web.

      "Fast-tracking digital transformation through next-gen technologies". Broadridge, 2022. Web.

      Gayatri. "The Pulse of Digital Transformation 2021 – Survey Results." DronaHQ, 2021. Web.

      Gray, Dave. "Updated Empathy Map Canvas." The XPLANE Collection, 15 July 2017. Web.

      "HCL Volt MX". HCL, n.d. Web.

      "iPass Mobile Professional Report 2017". iPass, 2017. Web.

      Karlsson, Johan. "Backlog Grooming: Must-Know Tips for High-Value Products." Perforce, 2019. Web.

      Karnes, KC. "Why Users Uninstall Apps: 28% of People Feel Spammed [Survey]". CleverTap, 27 July 2021. Web.

      Kemp, Simon. "Digital 2021: Global Overview Report". DataReportal, 27 Jan 2021. Web.

      Kleinberg, Sara. "Consumers are always shopping and eager for your help". Google, Aug 2018. Web.

      MaLavolta, Ivano. "Anatomy of an HTML 5 mobile web app". University of L'Aquila, 16 Apr 2012. Web.

      "Maximizing Mobile Value: To BYOD or not to BYOD?" Samsung and Oxford Economics, 2022. Web.

      "Mobile App Performance Metrics For Crash-Free Apps." AppSamurai, 27 June 2018. Web.

      "Mobile Application Development Statistics: 5 Facts". Intersog, 23 Nov 2021. Web.

      Moore, Geoffrey A. "Crossing the Chasm, 3rd Edition: Marketing and Selling Disruptive Products to Mainstream Customers." Harper Business, 3rd edition, 2014. Book.

      "OWASP Top Ten". OWASP, 2021. Web.

      "Personas". Usability.gov, n.d. Web.

      Roden, Marky. "PSC Tech Talk: UX Design – Not just making things pretty". Xomino, 18 Mar 2018. Web.

      Royce, Dr. Winston W. "Managing the Development of Large Software Systems." USC Student Computing Facility, 1970. Web.

      Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education, 2012. Book.

      Sahay, Apurvanand et al. "Supporting the understanding and comparison of low-code development platforms." Universit`a degli Studi dell'Aquila, 2020. Web.

      Schuurman, Robbin. "Tips for Agile product roadmaps & product roadmap examples." Scrum.org, 2017. Web.

      Strunk, Christian. "How to define a product vision (with examples)." Christian Strunk. n.d. Web.

      Szeja, Radoslaw. "14 Biggest Challenges in Mobile App Development in 2022". Netguru, 4 Jan 2022. Web.

      "Synopsys Research Reveals Significant Security Concerns in Popular Mobile Apps Amid Pandemic". Synopsys, 25 Mar 2021. Web.

      "TOGAF 8.1.1 Online, Part IV: Resource Base, Developing Architecture Views." The Open Group, n.d. Web.

      Wangen, Emilie Nøss. "What Is a Software Platform & How Is It Different From a Product?" HubSpot, 2021. Web.

      "Mobile App Retention Rate: What's a Good Retention Rate?" Localytics, July 2021. Web.

      "Why Mobile Apps Fail: Failure to Launch". Perfecto Mobile, 26 Jan 2014. Web.

      Appendix A

      Sample Reference Frameworks

      Reference Framework: Web Platform

      Most of the operations of the applications on a web platform are executed in the mid-tier or back-end servers. End users interact with the platform through the presentation layer, developed with web languages, in the browser.

      This is an image of the Reference Framework: Web Platform

      Reference Framework: Mobile Web Application

      Many mobile web applications are composed of JavaScript (the muscle of the app), HTML5 (the backbone of the app), and CSS (the aesthetics of the app). The user will make a request to the web server which will interact with the application to provide a response. Since each device has unique attributes, consider a device detection service to help adjust content for each type of device.

      this is an image of the Reference Framework: Mobile Web Application

      Source: MaLavolta, Ivono, 2012.

      Web Platform: Anatomy of a Web Server

      Web Server Services

      • Mediation Services: Perform transformation of data/messages.
      • Boundary Services: Provide interface protocol and data/message conversion capabilities.
      • Event Distribution: Provides for the enterprise-wide adoption of content and topic-based publish/subscribe event distribution.
      • Transport Services: Facilitate data transmission across the middleware/server.
      • Service Directory: Manages multiple service identifiers and locations.

      This image shows the relationships of the various web server services listed above

      Reference Framework: Hybrid Platform

      Unlike the mobile web platform, most of an application's operations on the hybrid platform is on the device within a native container. The container leverages the device browser's runtime engine and is based on the framework of the mobile delivery solution.

      This is an image of the Reference Framework: Hybrid Platform

      Reference Framework: Native Platform

      Applications on a native platform are installed locally on the device giving it access to native device hardware and software. The programming language depends on the operating system's or device's SDK.

      This is an image of the Reference Framework: Native Platform

      Appendix B

      List of Low- and No- Code Software Delivery Solution Features

      Supplementary List of Features

      Graphical user interface

      • Drag-and-drop designer - This feature enhances the user experience by permitting to drag all the items involved in making an app including actions, responses, connections, etc.
      • Point and click approach - This is similar to the drag-and-drop feature except it involves pointing on the item and clicking on the interface rather than dragging and dropping the item.
      • Pre-built forms/reports - This is off-the-shelf and most common reusable editable forms or reports that a user can use when developing an application.
      • Pre-built dashboards - This is off-the-shelf and most common dashboards that a user can use when developing an application.
      • Forms - This feature helps in creating a better user interface and user experience when developing applications. A form includes dashboards, custom forms, surveys, checklists, etc. which could be useful to enhance the usability of the application being developed.
      • Progress tracking - This features helps collaborators to combine their work and track the development progress of the application.
      • Advanced Reporting - This features enables the user to obtain a graphical reporting of the application usage. The graphical reporting includes graphs, tables, charts, etc.
      • Built-in workflows - This feature helps to concentrate the most common reusable workflows when creating applications.
      • Configurable workflows - Besides built-in workflows, the user should be able to customize workflows according to their needs.

      Interoperability support

      • Interoperability with external services - This feature is one of the most important features to incorporate different services and platforms including that of Microsoft, Google, etc. It also includes the interoperability possibilities among different low-code platforms.
      • Connection with data sources - This features connects the application with data sources such as Microsoft Excel, Access and other relational databases such as Microsoft SQL, Azure and other non-relational databases such as MongoDB.

      Security Support

      • Application security - This feature enables the security mechanism of an application which involves confidentiality, integrity and availability of an application, if and when required.
      • Platform security - The security and roles management is a key part in developing an application so that the confidentiality, integrity and authentication (CIA) can be ensured at the platform level.

      Collaborative development support

      • Off-line collaboration - Different developers can collaborate on the specification of the same application. They work off-line locally and then they commit to a remote server their changes, which need to be properly merged.
      • On-line collaboration - Different developers collaborate concurrently on the specification of the same application. Conflicts are managed at run-time.

      Reusability support

      • Built-in workflows - This feature helps to concentrate the most common reusable workflows in creating an application.
      • Pre-built forms/reports - This is off-the-shelf and most common reusable editable forms or reports that a user might want to employ when developing an application.
      • Pre-built dashboards - This is off-the-shelf and most common dashboards that a user might want to employ when developing an application.

      Scalability

      • Scalability on number of users - This features enables the application to scale-up with respect to the number of active users that are using that application at the same time.
      • Scalability on data traffic - This features enables the application to scale-up with respect to the volume of data traffic that are allowed by that application in a particular time.
      • Scalability on data storage - This features enables the application to scale-up with respect to the data storage capacity of that application.

      Business logic specification mechanisms

      • Business rules engine - This feature helps in executing one or more business rules that help in managing data according to user's requirements.
      • Graphical workflow editor - This feature helps to specify one or more business rules in a graphical manner.
      • AI enabled business logic - This is an important feature which uses Artificial Intelligence in learning the behavior of an attributes and replicate those behaviors according to learning mechanisms.

      Application build mechanisms

      • Code generation - According to this feature, the source code of the modeled application is generated and subsequently deployed before its execution.
      • Models at run-time - The model of the specified application is interpreted and used at run-time during the execution of the modeled application without performing any code generation phase.

      Deployment support

      • Deployment on cloud - This features enables an application to be deployed online in a cloud infrastructure when the application is ready to deployed and used.
      • Deployment on local infrastructures - This features enables an application to be deployed locally on the user organization's infrastructure when the application is ready to be deployed and used.

      Kinds of supported applications

      • Event monitoring - This kind of applications involves the process of collecting data, analyzing the event that can be caused by the data, and signaling any events occurring on the data to the user.
      • Process automation - This kind of applications focuses on automating complex processes, such as workflows, which can take place with minimal human intervention.
      • Approval process control - This kind of applications consists of processes of creating and managing work approvals depending on the authorization of the user. For example, payment tasks should be managed by the approval of authorized personnel only.
      • Escalation management - This kind of applications are in the domain of customer service and focuses on the management of user viewpoints that filter out aspects that are not under the user competences.
      • Inventory management - This kind of applications is for monitoring the inflow and outflow of goods and manages the right amount of goods to be stored.
      • Quality management - This kind of applications is for managing the quality of software projects, e.g., by focusing on planning, assurance, control and improvements of quality factors.
      • Workflow management - This kind of applications is defined as sequences of tasks to be performed and monitored during their execution, e.g., to check the performance and correctness of the overall workflow.

      Source: Sahay, Apurvanand et al., 2020

      Automate Work Faster and More Easily With Robotic Process Automation

      • Buy Link or Shortcode: {j2store}237|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Your organization has many business processes that rely on repetitive, routine manual data collection and processing work, and there is high stakeholder interest in automating them.
      • You’re investigating whether robotic process automation (RPA) is a suitable technological enabler for automating such processes.
      • Being a trending technology, especially with its association with artificial intelligence (AI), there is much marketing fluff, hype, and misunderstanding about RPA.
      • Estimating the potential impact of RPA on business is difficult, as the relevant industry statistics often conflict each other and you aren’t sure how applicable it is to your business.

      Our Advice

      Critical Insight

      • There are no physical robots in RPA. RPA is about software “bots” that interact with applications as if they were human users to perform routine, repetitive work in your place. It’s for any business in any industry, not just for manufacturing.
      • RPA is lightweight IT; it reduces the cost of entry, maintenance, and teardown of automation as well as the technological requirement of resources that maintain it, as it complements existing automation solutions in your toolkit.
      • RPA is rules-based. While AI promises to relax the rigidity of rules, it adds business risks that are poorly understood by both businesses and subject-matter experts. Rules-based “RPA 1.0” is mature and may pose a stronger business case than AI-enabled RPA.
      • RPA’s sweet spot is “swivel chair automation”: processes that require human workers to act as a conduit between several systems, moving between applications, manually keying, re-keying, copying, and pasting information. A bot can take their place.

      Impact and Result

      • Discover RPA and how it differentiates from other automation solutions.
      • Understand the benefits and risks of complementing RPA with AI.
      • Identify existing business processes best suited for automation with RPA.
      • Communicate RPA’s potential business benefits to stakeholders.

      Automate Work Faster and More Easily With Robotic Process Automation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should use RPA to automate routine, repetitive data collection and processing work, review Info-Tech’s methodology, and understand the ways we can support you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Discover robotic process automation

      Learn about RPA, including how it compares to IT-led automation rooted in business process management practices and the role of AI.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 1: Discover Robotic Process Automation
      • Robotic Process Automation Communication Template

      2. Identify processes best suited for robotic process automation

      Identify and prioritize candidate processes for RPA.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 2: Identify Processes Best Suited for Robotic Process Automation
      • Process Evaluation Tool for Robotic Process Automation
      • Minimum Viable Business Case Document
      [infographic]

      Embed Privacy and Security Culture Within Your Organization

      • Buy Link or Shortcode: {j2store}379|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: 10 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance

      Engagement with privacy and security within organizations has not kept pace with the increasing demands from regulations. As a result, organizations often find themselves saying they support privacy and security engagement but struggling to create behavioral changes in their staff.

      However, with new privacy and security requirements proliferating globally, we can’t help but wonder how much longer we can carry on with this approach.

      Our Advice

      Critical Insight

      To truly take hold, privacy and security engagement must be supported by senior leadership, aligned with business objectives, and embedded within each of the organization’s operating groups and teams.

      Impact and Result

      • Develop a defined structure for privacy and security in the context of your organization, your obligations, and your objectives.
      • Align your business goals and strategy with privacy and security to obtain support from your senior leadership team.
      • Identify and implement a set of metrics to monitor the success of each of the six engagement enablers amongst your team.

      Embed Privacy and Security Culture Within Your Organization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a culture of privacy and security at your organization, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define privacy and security in the context of the organization

      Use the charter template to document the primary outcomes and objectives for the privacy and security engagement program within the organization and map the organizational structure to each of the respective roles to help develop a culture of privacy and security.

      • Privacy and Security Engagement Charter

      2. Map your privacy and security enablers

      This tool maps business objectives and key strategic goals to privacy and security objectives and attributes identified as a part of the overall engagement program. Leverage the alignment tool to ensure your organizational groups are mapped to their corresponding enablers and supporting metrics.

      • Privacy and Security Business Alignment Tool

      3. Identify and track your engagement indicators

      This document maps out the organization’s continued efforts in ensuring employees are engaged with privacy and security principles, promoting a strong culture of privacy and security. Use the playbook to document and present the organization’s custom plan for privacy and security culture.

      • Privacy and Security Engagement Playbook

      Infographic

      Workshop: Embed Privacy and Security Culture Within Your Organization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Determine Drivers and Engagement Objectives

      The Purpose

      Understand the current privacy and security landscape in the organization.

      Key Benefits Achieved

      Targeted set of drivers from both a privacy and security perspective

      Activities

      1.1 Discuss key drivers for a privacy and security engagement program.

      1.2 Identify privacy requirements and objectives.

      1.3 Identify security requirements and objectives.

      1.4 Review the business context.

      Outputs

      Understanding of the role and requirements of privacy and security in the organization

      Privacy drivers and objectives

      Security drivers and objectives

      Privacy and security engagement program objectives

      2 Align Privacy and Security With the Business

      The Purpose

      Ensure that your privacy and security engagement program is positioned to obtain the buy-in it needs through business alignment.

      Key Benefits Achieved

      Direct mappings between a culture of privacy and security and the organization’s strategic and business objectives

      Activities

      2.1 Review the IT/InfoSec strategy with IT and the InfoSec team and map to business objectives.

      2.2 Review the privacy program and privacy strategic direction with the Privacy/Legal/Compliance team and map to business objectives.

      2.3 Define the four organizational groupings and map to the organization’s structure.

      Outputs

      Privacy and security objectives mapped to business strategic goals

      Mapped organizational structure to Info-Tech’s organizational groups

      Framework for privacy and security engagement program

      Initial mapping assessment within Privacy and Security Business Alignment Tool

      3 Map Privacy and Security Enablers to Organizational Groups

      The Purpose

      Make your engagement plan tactical with a set of enablers mapped to each of the organizational groups and privacy and security objectives.

      Key Benefits Achieved

      Measurable indicators through the use of targeted enablers that customize the organization’s approach to privacy and security culture

      Activities

      3.1 Define the privacy enablers.

      3.2 Define the security enablers.

      3.3 Map the privacy and security enablers to organizational structure.

      3.4 Revise and complete Privacy and Security Business Alignment Tool inputs.

      Outputs

      Completed Privacy and Security Engagement Charter.

      Completed Privacy and Security Business Alignment Tool.

      4 Identify and Select KPIs and Metrics

      The Purpose

      Ensure that metrics are established to report on what the business wants to see and what security and privacy teams have planned for.

      Key Benefits Achieved

      End-to-end, comprehensive program that ensures continued employee engagement with privacy and security at all levels of the organization.

      Activities

      4.1 Segment KPIs and metrics based on categories or business, technical, and behavioral.

      4.2 Select KPIs and metrics for tracking privacy and security engagement.

      4.3 Assign ownership over KPI and metric tracking and monitoring.

      4.4 Determine reporting cadence and monitoring.

      Outputs

      KPIs and metrics identified at a business, technical, and behavioral level for employees for continued growth

      Completed Privacy and Security Engagement Playbook

      Rationalize Your Collaboration Tools

      • Buy Link or Shortcode: {j2store}51|cart{/j2store}
      • member rating overall impact: 7.3/10 Overall Impact
      • member rating average dollars saved: 10 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: End-User Computing Applications
      • Parent Category Link: /end-user-computing-applications
      • Organizations collaboration toolsets are increasingly disordered and overburdened. Not only do organizations waste money by purchasing tools that overlap with their current toolset, but also employees’ productivity is destroyed by having to spend time switching between multiple tools.
      • Shadow IT is easier than ever. Without suitable onboarding and agreed-upon practices, employees will seek out their own solutions for collaboration. No transparency of what tools are being used means that information shared through shadow IT cannot be coordinated, monitored, or regulated effectively.

      Our Advice

      Critical Insight

      • Best-of-breed approaches create more confusion than productivity. Collaboration toolsets should be as streamlined as possible.
      • Employee-led initiatives to implement new toolsets are more successful. Focus on what is a suitable fit for employees’ needs.
      • Strategizing toolsets enhances security. File transfers and communication through unmonitored, unapproved tools increases phishing and hacking risks.

      Impact and Result

      • Categorize your current collaboration toolset, identifying genuine overlaps and gaps in your collaboration capabilities.
      • Work through our best-practice recommendations to decide which redundant overlapping tools should be phased out.
      • Build business requirements to fill toolset gaps and create an adoption plan for onboarding new tools.
      • Create a collaboration strategy that documents collaboration capabilities, rationalizes them, and states which capability to use when.

      Rationalize Your Collaboration Tools Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to create a collaboration strategy that will improve employee efficiency and save the organization time and money.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Evaluate current toolset

      Identify and categorize current collaboration toolset usage to recognize unnecessary overlaps and legitimate gaps.

      • Rationalize Your Collaboration Tools – Phase 1: Evaluate Current Toolset
      • Identifying and Categorizing Shadow Collaboration Tools Survey
      • Overlaps and Gaps in Current Collaboration Toolset Template

      2. Strategize toolset overlaps

      Evaluate overlaps to determine which redundant tools should be phased out and explore best practices for how to do so.

      • Rationalize Your Collaboration Tools – Phase 2: Strategize Toolset Overlaps
      • Phase-Out Plan Gantt Chart Template
      • Phase-Out Plan Marketing Materials

      3. Fill toolset gaps

      Fill your collaboration toolset gaps with best-fit tools, build business requirements for those tools, and create an adoption plan for onboarding.

      • Rationalize Your Collaboration Tools – Phase 3: Fill Toolset Gaps
      • Adoption Plan Gantt Chart Template
      • Adoption Plan Marketing Materials
      • Collaboration Tools Business Requirements Document Template
      • Collaboration Platform Evaluation Tool
      [infographic]

      Workshop: Rationalize Your Collaboration Tools

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Categorize the Toolset

      The Purpose

      Create a collaboration vision.

      Acknowledge the current state of the collaboration toolset.

      Key Benefits Achieved

      A clear framework to structure the collaboration strategy

      Activities

      1.1 Set the vision for the Collaboration Strategy.

      1.2 Identify your collaboration tools with use cases.

      1.3 Learn what collaboration tools are used and why, including shadow IT.

      1.4 Begin categorizing the toolset.

      Outputs

      Beginnings of the Collaboration Strategy

      At least five archetypical use cases, detailing the collaboration capabilities required for these cases

      Use cases updated with shadow IT currently used within the organization

      Overlaps and Gaps in Current Capabilities Toolset Template

      2 Strategize Overlaps

      The Purpose

      Identify redundant overlapping tools and develop a phase-out plan.

      Key Benefits Achieved

      Communication and phase-out plans for redundant tools, streamlining the collaboration toolset.

      Activities

      2.1 Identify legitimate overlaps and gaps.

      2.2 Explore business and user strategies for identifying redundant tools.

      2.3 Create a Gantt chart and communication plan and outline post-phase-out strategies.

      Outputs

      Overlaps and Gaps in Current Capabilities Toolset Template

      A shortlist of redundant overlapping tools to be phased out

      Phase-out plan

      3 Build Business Requirements

      The Purpose

      Gather business requirements for finding best-fit tools to fill toolset gaps.

      Key Benefits Achieved

      A business requirements document

      Activities

      3.1 Use SoftwareReviews and the Collaboration Platform Evaluation Tool to shortlist best-fit collaboration tool.

      3.2 Build SMART objectives and goals cascade.

      3.3 Walk through the Collaboration Tools Business Requirements Document Template.

      Outputs

      A shortlist of collaboration tools

      A list of SMART goals and a goals cascade

      Completed Business Requirements Document

      4 Create an Adoption Plan

      The Purpose

      Create an adoption plan for successfully onboarding new collaboration tools.

      Key Benefits Achieved

      An adoption plan

      Activities

      4.1 Fill out the Adoption Plan Gantt Chart Template.

      4.2 Create the communication plan.

      4.3 Explore best practices to socialize the new tools.

      Outputs

      Completed Gantt chart

      Adoption plan marketing materials

      Long-term strategy for engaging employees with onboarded tools

      Develop Your Value-First Business Process Automation Strategy

      • Buy Link or Shortcode: {j2store}236|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization

      Business process automation (BPA) has gained momentum, especially as pilots result in positive outcomes such as improved customer experience, efficiencies, and cost savings. Stakeholders want to invest more in BPA solutions and scale initial successes across different business and IT functions.

      But it’s critical to get it right and not fall into the hype so that the costs don’t outweigh the benefits.

      Ultimately, all BPA initiatives should align with a common vision.

      Build the right BPA strategy – smarter, not faster

      Organizations should adopt a methodical approach to growing their BPA, taking cost, talent availability, and goals into account.

      1. Recognize the true value of automation. Successful BPA improves more than cost savings and revenue generation. Employee satisfaction, organizational reputation, brand, and better-performing products and services are other sought-after benefits.
      2. Consider all relevant factors as you build a strategy. Take into account the impact BPA initiatives will have on users, risk and change appetites, customer satisfaction, and business priorities.
      3. Mature your practice as you scale your BPA technologies. Develop skills, resources, and governance practices as you scale your automation tools. Deploy BPA with quality in mind, then continuously monitor, review, and maintain the automation for success.
      4. Learn from your initial automations. Maximize what you learn from your minimum viable automations (MVA) and use that knowledge to build and scale your automation implementation across the organization.

      Develop Your Value-First Business Process Automation Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Business Process Automation Strategy Deck – A step-by-step document that walks you through how to position business process automation as a key capability and assess the organization’s readiness for its adoption.

      This blueprint helps you develop a strategy justify the scaling and maturing of your business process automation (BPA) practices and capabilities to fulfill your business priorities.

      • Develop Your Value-First Business Process Automation Strategy – Phases 1-4

      2. Business Process Automation Strategy Template – A template to help you build a clear and compelling strategy document for stakeholders.

      Document your business process automation strategy in the language your stakeholders understand. Tailor this document to fit your BPA objectives and initiatives.

      • Business Process Automation Strategy Template

      3. Business Process Automation Maturity Assessment Tool – A tool to help gauge the maturity of your BPA practice.

      Evaluate the maturity of the key capabilities of your BPA practice to determine its readiness to support complex and scaled BPA solutions.

      • Business Process Automation Maturity Assessment Tool

      Infographic

      Workshop: Develop Your Value-First Business Process Automation Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Context

      The Purpose

      Understand the business priorities and your stakeholders' needs that are driving your business process automation initiatives while abiding by the risk and change appetite of your organization.

      Key Benefits Achieved

      Translate business priorities to the context of business process automation.

      Arrive at a common definition of business value.

      Come to an understanding of the needs, concerns, and problems of BPA stakeholders.

      Discover organizational risk and change tolerance and appetite.

      Activities

      1.1 Set the Business Context

      1.2 Understand Your Stakeholder Needs

      1.3 Build Your Risk & Change Profile

      Outputs

      Business problem, priorities, and business value definition

      Customer and end-user assessment (e.g. personas, customer journey)

      Risk and change profile

      2 Define Your BPA Objectives and Opportunities

      The Purpose

      Set reasonable and achievable expectations for your BPA initiatives and practices, and select the right BPA opportunities to meet these expectations.

      Key Benefits Achieved

      Align BPA objectives and metrics to your business priorities.

      Create guiding principles that support your organization’s and team’s culture.

      Define a vision of your target-state BPA practice

      Create a list of BPA opportunities that will help build your practice and meet business priorities.

      Activities

      2.1 Define Your BPA Expectations

      2.2 List Your Guiding Principles

      2.3 Envision Your BPA Target State

      2.4 Build Your Opportunity Backlog

      Outputs

      BPA problem statement, objectives, and metrics

      BPA guiding principles

      Desired scaled BPA target state

      Prioritized BPA opportunities

      3 Assess Your BPA Maturity

      The Purpose

      Evaluate the current state of your BPA practice and its readiness to support scaled and complex BPA solutions.

      Key Benefits Achieved

      List key capabilities to implement and optimize to meet the target state of your BPA practice.

      Brainstorm solutions to address the gaps in your BPA capabilities.

      Activities

      3.1 Assess Your BPA Maturity

      Outputs

      BPA maturity assessment

      4 Roadmap Your BPA Initiatives

      The Purpose

      Identify high-priority key initiatives to support your BPA objectives and goals, and establish the starting point of your BPA strategy.

      Key Benefits Achieved

      Create an achievable roadmap of BPA initiatives designed to deliver good practices and valuable automations.

      Perform a risk assessment of your BPA initiatives and create mitigations for high-priority risks.

      Find the starting point in the development of your BPA strategy.

      Activities

      4.1 Roadmap Your BPA Initiatives

      4.2 Assess and Mitigate Your Risks

      4.3 Complete Your BPA Strategy

      Outputs

      List of BPA initiatives and roadmap

      BPA initiative risk assessment

      Initial draft of your BPA strategy

      There should never be only one.

      • Large vertical image:
      • member rating overall impact: High Impact
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      Today, we're talking about a concept that’s both incredibly simple and dangerously overlooked: the single point of failure, or SPOF for short.

      Imagine you’ve built an impenetrable fortress. It has high walls, a deep moat, and strong gates. But the entire fortress can only be accessed through a single wooden bridge. That bridge is your single point of failure. If it collapses or is destroyed, your magnificent fortress is completely cut off. It doesn't matter how strong the rest of it is; that one weak link renders the entire system useless.

      In your work, your team, and your processes and technology, these single bridges are everywhere. A SPOF is any part of a system that, if it stops working, will cause the entire system to shut down. It’s the one critical component, the one indispensable person, or the one vital process that everything else depends on.

      When you identify and fix these weak points you aren't being pessimistic; you're fixing the very foundation of something that can withstand shocks and surprises. It’s about creating truly resilient systems and teams, not just seemingly strong ones. So, let’s explore where these risks hide and what you can do about them.

      When People Become the Problem

      For those of you who know me, saying something like this feels at odds with who I am. And yet, it's one of the most common and riskiest areas in any organization. Human single points of failure don't happen because of malicious intent. They typically grow out of good intentions, hard work, and necessity. But the result is the same: a fragile system completely dependent on an individual.

      The Rise of the Hero

      We all know a colleague like this. The “hero” is the one person who has all the answers. When a critical system goes down at 3 AM, they're the only one who can fix it. They understand the labyrinthine codebase nobody else dares to touch. They have the historical context for every major decision made in the last decade. On the surface, this person is invaluable. Management loves them because they solve problems. The team relies on them because they’re a walking encyclopedia.

      But here’s the inconvenient truth: your hero is your biggest liability.

      This isn’t their fault. They likely became the hero by stepping up when no one else would or could. The hero may actually feel like they are the only ones qualified to handle the issue because “management” does not take the necessary actions to train other people. Or “management” places other priorities. Be aware, this is a perception thing. The manager is very likely to be very concerned about the well-being of their employee. (I'm taking "black companies", akin to black sites, out of the equation for a moment and concentrating on generally healthy workplaces.) The hero will likely feel a strong bond to their environment. Also, every hero is different. There is a single point of failure, but not a single type of person. Every person has a different driver.

      I watched a YouTube video by a famous entrepreneur the other day. And she said something that triggered a response in me, because it sows the seeds of the hero. She said, Would you rather have an employee who just fixes it, handles it, and deals with it? Or an employee that talks about it? Obviously, the large majority will take the person behind door number 1. I would too. But then you need to step up as a manager, as an owner, as an executive, and enforce knowledge sharing.

      If you channel all critical knowledge and capabilities through one person, if you let this person become your go-to specialist for everything, you've created a massive SPOF. What happens when your hero gets sick, takes a well deserved two week vacation to a place with no internet, or leaves the company for a new opportunity? The system grinds to a halt. A minor issue becomes a major crisis because the only person who can fix it is unavailable.

      This overreliance doesn't just create a risk; it stifles growth. Other team members don't get the opportunity to learn and develop new skills because the hero is always there to swoop in and save the day. The answer? I guess that depends on your situation and what your ability is to keep this person happy without alienating the rest of the team. The answer may lie in the options discussed later in the article around KPIs.

      The Knowledge Hoarders

      A step beyond the individual hero is the team that acts as a collective SPOF. This is the team that “protects” its know how. They might use complex, undocumented tools, speak in a language of acronyms only they understand, or resist any attempts to standardize their processes. They've built a silo around their work, making themselves indispensable as a unit.

      Unlike the hero, this often comes from a place of perceived self preservation. If they are the only ones who understand how something works, their jobs are secure, right? But this behavior is incredibly damaging to the organization's resilience. Not to mention that it is just plain wrong. The team becomes inundated with requests for new features, but also for help in solving incidents. The result in numerous instances is that the team succeeds in neither. Next the manager is called to the senior management because the business is complaining that things don't progress as expected. 

      This team thus has become a bottleneck. Any other team that needs to interact with their system is completely at their mercy. Progress slows to a crawl, dependent on their availability and willingness to cooperate. Preservation has turned into survival.  

      The real root cause at the heart of both the hero and the knowledge hoarding team is a failure of knowledge management. When information isn't shared, documented, and made accessible, you are actively choosing to create single points of failure. We'll dive deeper into building a robust knowledge sharing culture in a future article, but for now, recognize that knowledge kept in one person's or team's head is a disaster waiting to happen.

      When Your Technology is a House of Cards

      People aren't the only source of fragility. The way you build and manage your technology stacks can easily create critical SPOFs that leave you vulnerable. These are often less obvious at first, but they can cause dangerous failures when they finally break.

      The Danger of the Single Node

      Let's start with the most straightforward technical SPOF: the single node setup. Imagine you have a critical application like maybe your company's main website or an internal database. If you run that entire application on one single server (a single “node”), you've created a classic SPOF.

      It’s like a restaurant with only one chef. If that chef goes home, the kitchen closes. It doesn't matter how many waiters or tables you have. If that single server experiences a hardware failure, a software crash, or even just needs to be rebooted for an update, your entire service goes offline. There is no failover. The service is simply down until that one machine is fixed, patched or rebooted.

      You need to set up your systems so that when one node goes down, the other takes over. This is not just something for large enterprises. SMEs must do the same. I've had numerous calls from business owners who did something to their web server or system and now “it doesn't work!” Not only are they down, now they have to call me and I then must arrange for subject matter experts to fix it immediately. Typically at a cost much larger than if they had set up their system with active, warm or even cold standbys. 

      The Mystery of Closed Technologies

      Another major risk comes from an overreliance on closed, proprietary technologies. This happens when you build a core part of your business on a piece of software or hardware that you don't control and can't inspect. It’s a “black box.” You know what it’s supposed to do, but you have no idea how it does it, and you can’t fix it if it breaks. When something goes wrong, you are completely at the mercy of the company that created it. You have to submit a support ticket and wait.

      This is actually relatable to the next chapter, please follow along and take the advice there.

      The Trap of Vendor Lock In

      Closely related to closed technology is the concept of vendor lock-in. This is a subtle but powerful SPOF. It happens when you become so deeply integrated with a single vendor's ecosystem that the cost and effort of switching to a competitor are impossibly high. Your vendor effectively becomes a strategic single point of failure. Your ability to innovate, control costs, and pivot your strategy is now tied to the decisions of another company.

      This may even run afoul of legal standards. In Europe, we have the DORA and NIS2 regulations. DORA specifically mandates that companies have exit plans for their systems, starting with their critical and important functions. Functions refers to business services, to be clear. 

      But we get there so easily. The native functions of AWS, Azure and Google Cloud, just to name a few, are very enticing to use. They offer convenience, low code, and performance on tap. It's just that, once you integrate deeply with them, you are taken, hook, line, and sinker. And then you have people like me, or worse, your regulator, who demands “What is your exit plan?”

      Your Resilience Playbook: Practical Steps to Eliminate SPOFs

      Identifying your single points of failure is the first step. The real work is in systematically eliminating them. This isn't about a single, massive project; it's about building new habits and principles into your daily work. Here's a playbook I think you can start using today.

      Mitigate People-Based Risks

      The cure for depending on one person is to create a culture where knowledge is fluid and shared by default. Your goal is to move from individual heroics to collective resilience.

      • Mandate real vacations. This might sound strange, but one of the best ways to reveal and fix a “hero” problem is to make sure your hero takes a real, disconnected vacation. This isn't a punishment; it's a benefit to them and a necessary stress test for the team. It forces others to step up and document their processes in preparation. The first time will be painful, but it gets easier each time as the team builds its own knowledge.

      • Adopt the “teach, don't just do” rule. Coach your senior experts to see their role as multipliers. When someone asks them a question, their first instinct should be to show, not just to do. This can be a five minute screen sharing session, grabbing a colleague to pair program on a fix, or taking ten minutes to write down the answer in a shared knowledge base so it never has to be asked again.

        Many companies have knowledge sharing solutions in place. Take a moment to actually use them. Prepare for when new people come into the company. Have a place where they can get into the groove and learn the heart beat of the company. There is a reason why the Madonna song is so captivating to so many people. Getting into the groove elevates you. And the same thing happens in your company. 

      • Rotate responsibilities and run "game days". Actively move people around. Let a developer handle support tickets for a week to understand common customer issues. Have your infrastructure expert sit with the product team. Also, create “game days” where you simulate a crisis. For example: "Okay team, our lead developer is 'on vacation' today. Let's practice a full deployment without them.” This makes learning safe and proactive.

      • Celebrate team success, not individual firefighting. Shift your praise and recognition. Instead of publicly thanking a single person for working all night to resolve a problem, celebrate the team that built a system so resilient it didn't break in the first place. Reward the team that wrote excellent documentation that allowed a junior member to solve a complex issue. Culture follows what you celebrate. At the same time, if the team does not pony up, definitely praise the person and follow up with the team to fix this.

      • Host internal demos and tech talks. Create a regular, informal forum where people can share what they're working on. This could be a “brown bag lunch” session or a Friday afternoon demo. It demystifies what other teams are doing, breaks down silos, and encourages people to ask questions in a low pressure environment.

      • Remunerate sharing. Make sharing knowledge a bonus-eligible key performance indicator. The more sharing an expert does, with their peers acknowledging this, the more the expert earns. You can easily incorporate this into your peer feedback system. 

      • Run DRP exercises without your top engineers: This is taking a leap of faith, and I would never recommend this until all of the above are in place and proven. 

      Building Resilient Technical Systems

      The core principle here is to assume failure will happen and to design for it. A resilient system isn't one where parts never fail, but one where the system as a whole keeps working even when they do.

      • Embrace the rule of three. This is a simple but powerful guideline. For critical data, aim to have three copies on two different types of media, with one copy stored off-site (or in a different cloud region). For critical services, aim for at least three instances running in different availability zones. This simple rule protects you from a wide range of common failures.

      • Automate everything you can. Every manual process is a potential SPOF. It relies on a person remembering a series of steps perfectly, often under pressure. Automate your testing, your deployments, your server setup, and your backup procedures. Scripts are consistent and repeatable; tired humans at 3 AM are not.

      • Use health checks and smart monitoring. It's not enough to have a backup server; you need to know that it's healthy and ready to take over. Implement automated health checks that constantly monitor your primary and redundant systems. Your monitoring should alert you the moment a backup component fails, not just when the primary one does.

      • Practice chaos engineering. Don't wait for a real failure to test your resilience. Intentionally introduce failures in a controlled environment. This is known as chaos engineering. Start small. What happens if you turn off a non-critical service during work hours? Does the system handle it gracefully? Does the team know how to respond? This turns a potential crisis into a planned, educational drill.

      Avoiding Technology and Vendor Traps

      Your resilience also depends on the choices you make about the technology and partners you rely on. The goal is to maintain control over your destiny.

      • Build abstraction layers. Instead of having your application code talk directly to a specific vendor's service, create an intermediary layer that you control. This “abstraction layer” acts as a buffer. If you ever need to switch vendors, you only have to update your abstraction layer, not your entire application. It’s more work up front but gives you immense flexibility later.

      • Make “ease of exit” a key requirement. When you evaluate a new technology or vendor, make portability a primary concern. Ask tough questions: How do we get our data out? What is the process for migrating to a competitor? Is the technology based on open standards? Run a small proof of concept to test how hard it would be to leave before you commit fully.

      • Consider a multi-vendor strategy. For your most critical dependencies, like cloud hosting, avoid going all in on a single provider if you can. Using services from two or more vendors is an advanced strategy, but it provides the ultimate protection against a massive, platform wide outage or unfavorable changes in pricing or terms.

      It's a journey, not a destination

      You will never be “ready.” Building resilience by eliminating single points of failure isn't a one time project you can check off a list. It’s a continuous process. New SPOFs will emerge as your systems evolve, people change roles, and your business grows.

      The key is to make this thinking a part of your culture. Make “What's the bus factor for this project?” a regular question in your planning meetings. Make redundancy and documentation a non negotiable requirement for new systems. By constantly looking for the one thing that can bring everything down, you can build teams and technology that don't just survive shocks—they eat them for breakfast.

      IT Diversity & Inclusion Tactics

      • Buy Link or Shortcode: {j2store}517|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • Although inclusion is key to the success of a diversity and inclusion (D&I) strategy, the complexity of the concept makes it a daunting pursuit.
      • This is further complicated by the fact that creating inclusion is not a one-and-done exercise. Rather, it requires the ongoing commitment of employees and managers to reassess their own behaviors and to drive a cultural shift.

      Our Advice

      Critical Insight

      Realize the benefits of a diverse workforce by embedding inclusion into work practices, behaviors, and values, ensuring accountability throughout the department.

      Impact and Result

      Understand what it means to be inclusive: reassess work practices and learn how to apply leadership behaviors to create an inclusive environment

      IT Diversity & Inclusion Tactics Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Mobilize inclusion efforts

      Learn, evaluate, and understand what it means to be inclusive, examine biases, and apply inclusive leadership behaviors.

      • Diversity & Inclusion Initiatives Catalog
      • Inclusive IT Work Practices Examples
      • Inclusive Work Practices Template
      • Equip Managers to Adopt Inclusive Leadership Behaviors
      • Workbook: Equip Managers to Adopt Inclusive Leadership Behaviors
      • Standard Focus Group Guide
      [infographic]

      Time Study

      • Buy Link or Shortcode: {j2store}260|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • In ESG’s 2018 report “The Life of Cybersecurity Professionals,” 36% of participants expressed the overwhelming workload was a stressful aspect of their job.
      • Organizations expect a lot from their security specialists. From monitoring the threat environment, protecting business assets, and learning new tools, to keeping up with IT initiatives, cybersecurity teams struggle to balance their responsibilities with the constant emergencies and disruptions that take them away from their primary tasks.
      • Businesses fail to recognize the challenges associated with task prioritization and the time management practices of a security professional.

      Our Advice

      Critical Insight

      • The majority of scheduled calendar meetings include employees and peers.
        • Our research indicates cybersecurity professionals spent the majority of their meetings with employees (28%) and peers (24%). Other stakeholders involved in meetings included by myself (15%), boss (13%), customers (10%), vendors (8%), and board of directors (2%).
      • Calendar meetings are focused on project work, management, and operations.
        • When asked to categorize calendar meetings, the focus was on project work (26%), management (23%), and operations (22%). Other scheduled meetings included ones focused on strategy (15%), innovation (9%), and personal time (5%).
      • Time management scores were influenced by the percentage of time spent with employees and peers.
        • When participants were divided into good and poor time managers, we found good time managers spent less time with their peers and more time with their employees. This may be due to the nature of employee meetings being more directly tied to the project outputs of the manager than their peer meetings. Managers who spend more time in meetings with their employees feel a sense of accomplishment, and hence rate themselves higher in time management.

      Impact and Result

      • Understand how cybersecurity professionals allocate their time.
      • Gain insight on whether perceived time management skills are associated with calendar maintenance factors.
      • Identify common time management pain points among cybersecurity professionals.
      • Identify current strategies cybersecurity professionals use to manage their time.

      Time Study Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Read our Time Study

      Read our Time Study to understand how cybersecurity professionals allocate their time, what pain points they endure, and tactics that can be leveraged to better manage time.

      • Time Study Storyboard
      [infographic]

      Voka 2025 Resilience Scores

       

      Test uw digitale slagkracht!

      Jammer! U bent te laat.

      De VOKA Bedrijven Contact Dagen 2025 zijn voorbij en onze winnaars zijn bekend!

      Liguris: 80 points
      Keiretsu: 71 points
      Staffler: 69 points
      Xpo group: 67 points
      Actief: 66 points

      Continue reading

      Accelerate Digital Transformation With a Digital Factory

      • Buy Link or Shortcode: {j2store}93|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $50,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Organizational challenges are hampering digital transformation (DX) initiatives.
      • The organization’s existing digital factory is failing to deliver value.
      • Designing a successful digital factory is a difficult process.

      Our Advice

      Critical Insight

      To remain competitive, enterprises must deliver products and services like a startup or a digital native enterprise. This requires enterprises to:

      • Understand how digital native enterprises are designed.
      • Understand the foundations of good design: purpose, organizational support, and leadership.
      • Understand the design of the operating model: structure and organization, management practices, culture, environment, teams, technology platforms, and meaningful metrics and KPIs.

      Impact and Result

      Organizations that implement this project will draw benefits in the following aspects:

      • Gain awareness and understanding of various aspects that hamper DX.
      • Set the right foundations by having clarity of purpose, alignment on organizational support, and the right leadership in place.
      • Design an optimal operating model by setting up the right organizational structures, management practices, lean and optimal governance, agile teams, and an environment that promotes productivity and wellbeing.
      • Finally, set the right measures and KPIs.

      Accelerate Digital Transformation With a Digital Factory Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand the importance of a well-designed digital factory.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build the case

      Collect data and stats that will help build a narrative for digital factory.

      • Digital Factory Playbook

      2. Lay the foundation

      Discuss purpose, mission, organizational support, and leadership.

      3. Design the operating model

      Discuss organizational structure, management, culture, teams, environment, technology, and KPIs.

      [infographic]

      Workshop: Accelerate Digital Transformation With a Digital Factory

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build the case

      The Purpose

      Understand and gather data and stats for factors impacting digital transformation.

      Develop a narrative for the digital factory.

      Key Benefits Achieved

      Identification of key pain points and data collected

      Narrative to support the digital factory

      Activities

      1.1 Understand the importance and urgency of digital transformation (DX).

      1.2 Collect data and stats on the progress of DX initiatives.

      1.3 Identify the factors that hamper DX and tie them to data/stats.

      1.4 Build the narrative for the digital factory (DF) using the data/stats.

      Outputs

      Identification of factors that hamper DX

      Data and stats on progress of DX

      Narrative for the digital factory

      2 Lay the foundation

      The Purpose

      Discuss the factors that impact the success of establishing a digital factory.

      Key Benefits Achieved

      A solid understanding and awareness that successful digital factories have clarity of purpose, organizational support, and sound leadership.

      Activities

      2.1 Discuss

      2.2 Discuss what organizational support the digital factory will require and align and commit to it.

      2.3 Discuss reference models to understand the dynamics and the strategic investment.

      2.4 Discuss leadership for the digital age.

      Outputs

      DF purpose and mission statements

      Alignment and commitment on organizational support

      Understanding of competitive dynamics and investment spread

      Develop the profile of a digital leader

      3 Design the operating model (part 1)

      The Purpose

      Understand the fundamentals of the operating model.

      Understand the gaps and formulate the strategies.

      Key Benefits Achieved

      Design of structure and organization

      Design of culture aligned with organizational goals

      Management practices aligned with the goals of the digital factory

      Activities

      3.1 Discuss structure and organization and associated organizational pathologies, with focus on hierarchy and silos, size and complexity, and project-centered mindset.

      3.2 Discuss the importance of culture and its impact on productivity and what shifts will be required.

      3.3 Discuss management for the digital factory, with focus on governance, rewards and compensation, and talent management.

      Outputs

      Organizational design in the context of identified pathologies

      Cultural design for the DF

      Management practices and governance for the digital factory

      Roles/responsibilities for governance

      4 Design the operating model (part 2)

      The Purpose

      Understand the fundamentals of the operating model.

      Understand the gaps and formulate the strategies.

      Key Benefits Achieved

      Discuss agile teams and the roles for DF

      Environment design that supports productivity

      Understanding of existing and new platforms

      Activities

      4.1 Discuss teams and various roles for the DF.

      4.2 Discuss the impact of the environment on productivity and satisfaction and discuss design factors.

      4.3 Discuss technology and tools, focusing on existing and future platforms, platform components, and organization.

      4.4 Discuss design of meaningful metrics and KPIs.

      Outputs

      Roles for DF teams

      Environment design factors

      Platforms and technology components

      Meaningful metrics and KPIs

      Improve Requirements Gathering

      • Buy Link or Shortcode: {j2store}523|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $153,578 Average $ Saved
      • member rating average days saved: 26 Average Days Saved
      • Parent Category Name: Requirements & Design
      • Parent Category Link: /requirements-and-design
      • Poor requirements are the number one reason that projects fail. Requirements gathering and management has been an ongoing issue for IT professionals for decades.
      • If proper due diligence for requirements gathering is not conducted, then the applications that IT is deploying won’t meet business objectives and will fail to deliver adequate business value.
      • Inaccurate requirements definition can lead to significant amounts of project rework and hurt the organization’s financial performance. It will also create significant damage to the working relationship between IT and the business.
      • Often, business analysts haven’t developed the right competencies to successfully execute requirements gathering processes, even when they are in place.

      Our Advice

      Critical Insight

      • To avoid makeshift solutions, an organization needs to gather requirements with the desired future state in mind.
      • Creating a unified set of standard operating procedures is essential for effectively gathering requirements, but many organizations fail to do it.
      • Centralizing governance of requirements processes with a requirements gathering steering committee or requirements gathering center of excellence can bring greater uniformity and cohesion when gathering requirements across projects.
      • Business analysts must be targeted for competency development to ensure that the processes developed above are being successfully executed and the right questions are being asked of project sponsors and stakeholders.

      Impact and Result

      • Enhanced requirements analysis will lead to tangible reductions in cycle time and reduced project overhead.
      • An improvement in requirements analysis will strengthen the relationship between business and IT, as more and more applications satisfy stakeholder needs.
      • More importantly, the applications delivered by IT will meet all of the must-have and at least some of the nice-to-have requirements, allowing end users to successfully execute their day-to-day responsibilities.

      Improve Requirements Gathering Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should invest in optimizing your requirements gathering processes.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build the target state for the requirements gathering process

      Capture a clear understanding of the target needs for the requirements process.

      • Build a Strong Approach to Business Requirements Gathering – Phase 1: Build the Target State for the Requirements Gathering Process
      • Requirements Gathering SOP and BA Playbook
      • Requirements Gathering Maturity Assessment
      • Project Level Selection Tool
      • Business Requirements Analyst
      • Requirements Gathering Communication Tracking Template

      2. Define the elicitation process

      Develop best practices for conducting and structuring elicitation of business requirements.

      • Build a Strong Approach to Business Requirements Gathering – Phase 2: Define the Elicitation Process
      • Business Requirements Document Template
      • Scrum Documentation Template

      3. Analyze and validate requirements

      Standardize frameworks for analysis and validation of business requirements.

      • Build a Strong Approach to Business Requirements Gathering – Phase 3: Analyze and Validate Requirements
      • Requirements Gathering Documentation Tool
      • Requirements Gathering Testing Checklist

      4. Create a requirements governance action plan

      Formalize change control and governance processes for requirements gathering.

      • Build a Strong Approach to Business Requirements Gathering – Phase 4: Create a Requirements Governance Action Plan
      • Requirements Traceability Matrix
      [infographic]

      Workshop: Improve Requirements Gathering

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define the Current State and Target State for Requirements Gathering

      The Purpose

      Create a clear understanding of the target needs for the requirements gathering process.

      Key Benefits Achieved

      A comprehensive review of the current state for requirements gathering across people, processes, and technology.

      Identification of major challenges (and opportunity areas) that should be improved via the requirements gathering optimization project.

      Activities

      1.1 Understand current state and document existing requirement process steps.

      1.2 Identify stakeholder, process, outcome, and training challenges.

      1.3 Conduct target state analysis.

      1.4 Establish requirements gathering metrics.

      1.5 Identify project levels 1/2/3/4.

      1.6 Match control points to project levels 1/2/3/4.

      1.7 Conduct project scoping and identify stakeholders.

      Outputs

      Requirements Gathering Maturity Assessment

      Project Level Selection Tool

      Requirements Gathering Documentation Tool

      2 Define the Elicitation Process

      The Purpose

      Create best practices for conducting and structuring elicitation of business requirements.

      Key Benefits Achieved

      A repeatable framework for initial elicitation of requirements.

      Prescribed, project-specific elicitation techniques.

      Activities

      2.1 Understand elicitation techniques and which ones to use.

      2.2 Document and confirm elicitation techniques.

      2.3 Create a requirements gathering elicitation plan for your project.

      2.4 Build the operating model for your project.

      2.5 Define SIPOC-MC for your selected project.

      2.6 Practice using interviews with business stakeholders to build use case models.

      2.7 Practice using table-top testing with business stakeholders to build use case models.

      Outputs

      Project Elicitation Schedule

      Project Operating Model

      Project SIPOC-MC Sub-Processes

      Project Use Cases

      3 Analyze and Validate Requirements

      The Purpose

      Build a standardized framework for analysis and validation of business requirements.

      Key Benefits Achieved

      Policies for requirements categorization, prioritization, and validation.

      Improved project value as a result of better prioritization using the MOSCOW model.

      Activities

      3.1 Categorize gathered requirements for use.

      3.2 Consolidate similar requirements and eliminate redundancies.

      3.3 Practice prioritizing requirements.

      3.4 Build the business process model for the project.

      3.5 Rightsize the requirements documentation template.

      3.6 Present the business requirements document to business stakeholders.

      3.7 Identify testing opportunities.

      Outputs

      Requirements Gathering Documentation Tool

      Requirements Gathering Testing Checklist

      4 Establish Change Control Processes

      The Purpose

      Create formalized change control processes for requirements gathering.

      Key Benefits Achieved

      Reduced interjections and rework – strengthened formal evaluation and control of change requests to project requirements.

      Activities

      4.1 Review existing CR process.

      4.2 Review change control process best practices and optimization opportunities.

      4.3 Build guidelines for escalating changes.

      4.4 Confirm your requirements gathering process for project levels 1/2/3/4.

      Outputs

      Requirements Traceability Matrix

      Requirements Gathering Communication Tracking Template

      5 Establish Ongoing Governance for Requirements Gathering

      The Purpose

      Establish governance structures and ongoing oversight for business requirements gathering.

      Key Benefits Achieved

      Consistent governance and oversight of the requirements gathering process, resulting in fewer “wild west” scenarios.

      Better repeatability for the new requirements gathering process, resulting in less wasted time and effort at the outset of projects.

      Activities

      5.1 Define RACI for the requirements gathering process.

      5.2 Define the requirements gathering steering committee purpose.

      5.3 Define RACI for requirements gathering steering committee.

      5.4 Define the agenda and cadence for the requirements gathering steering committee.

      5.5 Identify and analyze stakeholders for communication plan.

      5.6 Create communication management plan.

      5.7 Build the action plan.

      Outputs

      Requirements Gathering Action Plan

      Further reading

      Improve Requirements Gathering

      Back to basics: great products are built on great requirements.

      Analyst Perspective

      A strong process for business requirements gathering is essential for application project success. However, most organizations do not take a strategic approach to optimizing how they conduct business analysis and requirements definition.

      "Robust business requirements are the basis of a successful project. Without requirements that correctly articulate the underlying needs of your business stakeholders, projects will fail to deliver value and involve significant rework. In fact, an Info-Tech study found that of projects that fail over two-thirds fail due to poorly defined business requirements.

      Despite the importance of good business requirements to project success, many organizations struggle to define a consistent and repeatable process for requirements gathering. This results in wasted time and effort from both IT and the business, and generates requirements that are incomplete and of dubious value. Additionally, many business analysts lack the competencies and analytical techniques needed to properly execute the requirements gathering process.

      This research will help you get requirements gathering right by developing a set of standard operating procedures across requirements elicitation, analysis, and validation. It will also help you identify and fine-tune the business analyst competencies necessary to make requirements gathering a success."

      – Ben Dickie, Director, Enterprise Applications, Info-Tech Research Group

      Our understanding of the problem

      This Research is Designed For:

      • The IT applications director who has accountability for ensuring that requirements gathering procedures are both effective and efficient.
      • The designated business analyst or requirements gathering professional who needs a concrete understanding of how to execute upon requirements gathering SOPs.

      This Research Will Help You:

      • Diagnose your current state and identify (and prioritize) gaps that exist between your target requirements gathering needs and your current capabilities and processes.
      • Build a requirements gathering SOP that prescribes a framework for requirements governance and technology usage, as well as techniques for elicitation, analysis, and validation.

      This Research Will Also Assist:

      • The business partner/stakeholder who is interested in ways to work with IT to improve upon existing procedures for requirements gathering.
      • Systems analysts and developers who need to understand how business requirements are effectively gathered upstream.

      This Research Will Help Them:

      • Understand the significance and importance of business requirements gathering on overall project success and value alignment.
      • Create rules of engagement for assisting IT with the collection of requirements from the right stakeholders in a timely fashion.

      Executive summary

      Situation

      • Strong business requirements are essential to project success – inadequate requirements are the number one reason that projects fail.
      • Organizations need a consistent, repeatable, and prescriptive set of standard operating procedures (SOPs) that dictate how business requirements gathering should be conducted.

      Complication

      • If proper due diligence for requirements gathering is not conducted, then the applications that IT is deploying won’t meet business objectives, and they will fail to deliver adequate business value.
      • Inaccurate requirements definition can lead to significant amounts of project rework and hurt the organization’s financial performance. It will also damage the relationship between IT and the business.

      Resolution

      • To avoid delivering makeshift solutions (paving the cow path), organizations need to gather requirements with the desired future state in mind. Organizations need to keep an open mind when gathering requirements.
      • Creating a unified set of SOPs is essential for effectively gathering requirements; these procedures should cover not just elicitation, analysis, and validation, but also include process governance and documentation.
      • BAs who conduct requirements gathering must demonstrate proven competencies for stakeholder management, analytical techniques, and the ability to speak the language of both the business and IT.
      • An improvement in requirements analysis will strengthen the relationship between business and IT, as more and more applications satisfy stakeholder needs. More importantly, the applications delivered by IT will meet all of the must-have and at least some of the nice-to-have requirements, allowing end users to execute their day-to-day responsibilities.

      Info-Tech Insight

      1. Requirements gathering SOPs should be prescriptive based on project complexity. Complex projects will require more analytical rigor. Simpler projects can be served by more straightforward techniques like user story development.
      2. Business analysts (BA) can make or break the execution of the requirements gathering process. A strong process still needs to be executed well by BAs with the right blend of skills and knowledge.

      Understand what constitutes a strong business requirement

      A business requirement is a statement that clearly outlines the functional capability that the business needs from a system or application. There are several attributes to look at in requirements:

      Verifiable
      Stated in a way that can be easily tested

      Unambiguous
      Free of subjective terms and can only be interpreted in one way

      Complete
      Contains all relevant information

      Consistent
      Does not conflict with other requirements

      Achievable
      Possible to accomplish with budgetary and technological constraints

      Traceable
      Trackable from inception through to testing

      Unitary
      Addresses only one thing and cannot be decomposed into multiple requirements

      Agnostic
      Doesn’t pre-suppose a specific vendor or product

      Not all requirements will meet all of the attributes.

      In some situations, an insight will reveal new requirements. This requirement will not follow all of the attributes listed above and that’s okay. If a new insight changes the direction of the project, re-evaluate the scope of the project.

      Attributes are context specific.

      Depending on the scope of the project, certain attributes will carry more weight than others. Weigh the value of each attribute before elicitation and adjust as required. For example, verifiable will be a less-valued attribute when developing a client-facing website with no established measuring method/software.

      Build a firm foundation: requirements gathering is an essential step in any project, but many organizations struggle

      Proper requirements gathering is critical for delivering business value from IT projects, but it remains an elusive and perplexing task for most organizations. You need to have a strategy for end-to-end requirements gathering, or your projects will consistently fail to meet business expectations.

      50% of project rework is attributable to problems with requirements. (Info-Tech Research Group)

      45% of delivered features are utilized by end users. (The Standish Group)

      78% of IT professionals believe the business is “usually” or “always” out of sync with project requirements. (Blueprint Software Systems)

      45% of IT professionals admit to being “fuzzy” about the details of a project’s business objectives. (Blueprint Software Systems)

      Requirements gathering is truly an organization-spanning issue, and it falls directly on the IT directors who oversee projects to put prudent SOPs in place for managing the requirements gathering process. Despite its importance, the majority of organizations have challenges with requirements gathering.

      What happens when requirements are no longer effective?

      • Poor requirements can have a very visible and negative impact on deployed apps.
      • IT receives the blame for any project shortcomings or failures.
      • IT loses its credibility and ability to champion future projects.
      • Late projects use IT resources longer than planned.

      Requirements gathering is a core component of the overall project lifecycle that must be given its due diligence

      PMBOK’s Five Phase Project Lifecycle

      Initiate – Plan: Requirements Gathering Lives Here – Execute – Control – Close

      Inaccurate requirements is the 2nd most common cause of project failure (Project Management Institute ‒ Smartsheet).

      Requirements gathering is a critical stage of project planning.

      Depending on whether you take an Agile or Waterfall project management approach, it can be extended into the initiate and execute phases of the project lifecycle.

      Strong stakeholder satisfaction with requirements gathering results in higher satisfaction in other areas

      Organizations that had high satisfaction with requirements gathering were more likely to be highly satisfied with the other areas of IT. In fact, 72% of organizations that had high satisfaction with requirements gathering were also highly satisfied with the availability of IT capacity to complete projects.

      A bar graph measuring % High Satisfaction when projects have High Requirements Gathering vs. Not High Requirements Gathering. The graph shows a substantially higher percentage of high satisfaction on projects with High Requirements Gathering

      Note: High satisfaction was classified as organizations with a score greater or equal to 8. Not high satisfaction was every other organization that scored below 8 on the area questions.

      N=395 organizations from Info-Tech’s CIO Business Vision diagnostic

      Requirements gathering efforts are filled with challenges; review these pitfalls to avoid in your optimization efforts

      The challenges that afflict requirements gathering are multifaceted and often systemic in nature. There isn’t a single cure that will fix all of your requirements gathering problems, but an awareness of frequently encountered challenges will give you a basis for where to consider establishing better SOPs. Commonly encountered challenges include:

      Process Challenges

      • Requirements may be poorly documented, or not documented at all.
      • Elicitation methods may be inappropriate (e.g. using a survey when collaborative whiteboarding is needed).
      • Elicitation methods may be poorly executed.
      • IT and business units may not be communicating requirements in the same terms/language.
      • Requirements that conflict with one another may not be identified during analysis.
      • Requirements cannot be traced from origin to testing.

      Stakeholder Challenges

      • Stakeholders may be unaware of the requirements needed for the ideal solution.
      • Stakeholders may have difficulty properly articulating their desired requirements.
      • Stakeholders may have difficulty gaining consensus on the ideal solution.
      • Relevant stakeholders may not be consulted on requirements.
      • Sign-off may not be received from the proper stakeholders.

      70% of projects fail due to poor requirements. (Info-Tech Research Group)

      Address the root cause of poor requirements to increase project success

      Root Causes of Poor Requirements Gathering:

      • Requirements gathering procedures don’t exist.
      • Requirements gathering procedures exist but aren’t followed.
      • There isn't enough time allocated to the requirements gathering phase.
      • There isn't enough involvement or investment secured from business partners.
      • There is no senior leadership involvement or mandate to fix requirements gathering.
      • There are inadequate efforts put towards obtaining and enforcing sign-off.

      Outcomes of Poor Requirements Gathering:

      • Rework due to poor requirements leads to costly overruns.
      • Final deliverables are of poor quality.
      • Final deliverables are implemented late.
      • Predicted gains from deployed applications are not realized.
      • There are low feature utilization rates by end users.
      • There are high levels of end-user dissatisfaction.
      • There are high levels of project sponsor dissatisfaction.

      Info-Tech Insight

      Requirements gathering is the number one failure point for most development or procurement projects that don’t deliver value. This has been and continues to be the case as most organizations still don't get requirements gathering right. Overcoming organizational cynicism can be a major obstacle when it is time to optimize the requirements gathering process.

      Reduce wasted project work with clarity of business goals and analysis of requirements

      You can reduce the amount of wasted work by making sure you have clear business goals. In fact, you could see an improvement of as much as 50% by going from a low level of satisfaction with clarity of business goals (<2) to a high level of satisfaction (≥5).

      A line graph demonstrating that as the amount of wasted work increases, clarity of business goals satisfaction decreases.

      Likewise, you could see an improvement of as much as 43% by going from a low level of satisfaction with analysis of requirements (less than 2) to a high level of satisfaction (greater than or equal to 5).

      A line graph demonstrating that as the Amount of Wasted Work decreases, the level of satisfaction with analysis of requirements shifts from low to high.

      Note: Waste is measured by the amount of cancelled projects; suboptimal assignment of resources; analyzing, fixing, and re-deploying; inefficiency, and unassigned resources.

      N=200 teams from the Project Portfolio Management diagnostic

      Effective requirements gathering supports other critical elements of project management success

      Good intentions and hard work aren’t enough to make a project successful. As you proceed with a project, step back and assess the critical success factors. Make sure that the important inputs and critical activities of requirements gathering are supporting, not inhibiting, project success.

      1. Streamlined Project Intake
      2. Strong Stakeholder Management
      3. Defined Project Scope
      4. Effective Project Management
      5. Environmental Analysis

      Don’t improvise: have a structured, end-to-end approach for successfully gathering useful requirements

      Creating a unified SOP guide for requirements elicitation, analysis, and validation is a critical step for requirements optimization; it gives your BAs a common frame of reference for conducting requirements gathering.

      • The key to requirements optimization is to establish a strong set of SOPs that provide direction on how your organization should be executing requirements gathering processes. This SOP guide should be a holistic document that walks your BAs through a requirements gathering project from beginning to end.
      • An SOP that is put aside is useless; it must be well communicated to BAs. It should be treated as the veritable manifesto of requirements management in your organization.

      Info-Tech Insight

      Having a standardized approach to requirements management is critical, and SOPs should be the responsibility of a group. The SOP guide should cover all of the major bases of requirements management. In addition to providing a walk-through of the process, an SOP also clarifies requirements governance.

      Leverage Info-Tech’s proven Requirements Gathering Framework as the basis for building requirements processes

      A graphic with APPLICATIONS THAT DELIVER BUSINESS VALUE written in the middle. Three steps are named: Elicit; Analyze; Validate. Around the outer part of the graphic are 4 arrows arranged in a circle, with the labels: Plan; Monitor; Communicate; Manage.

      Info-Tech’s Requirements Gathering Framework is a comprehensive approach to requirements management that can be scaled to any size of project or organization. This framework has been extensively road-tested with our clients to ensure that it balances the needs of IT and business stakeholders to give a holistic, end-to-end approach for requirements gathering. It covers the foundational issues (elicitation, analysis, and validation) and prescribes techniques for planning, monitoring, communicating, and managing the requirements gathering process.

      Don’t forget resourcing: the best requirements gathering process will still fail if you don’t develop BA competencies

      When creating the process for requirements gathering, think about how it will be executed by your BAs, and what the composition of your BA team should look like. A strong BA needs to serve as an effective translator, being able to speak the language of both the business and IT.

      1. To ensure alignment of your BAs to the requirements gathering process, undertake a formal skills assessment to identify areas where analysts are strong, and areas that should be targeted for training and skills development.
      2. Training of BAs on the requirements gathering process and development of intimate familiarity with SOPs is essential; you need to get BAs on the same page to ensure consistency and repeatability of the requirements process.
      3. Consider implementing a formal mentorship and/or job shadowing program between senior and junior BAs. Many of our members report that leveraging senior BAs to bootstrap the competencies of more junior team members is a proven approach to building skillsets for requirements gathering.

      What are some core competencies of a good BA?

      • Strong stakeholder management.
      • Proven track record in facilitating elicitation sessions.
      • Ability to bridge the gulf between IT and the business by speaking both languages.
      • Ability to ask relevant probing questions to uncover latent needs.
      • Experience with creating project operating models and business process diagrams.
      • Ability to set and manage expectations throughout the process.

      Throughout this blueprint, look for the “BA Insight” box to learn how steps in the requirements gathering process relate to the skills needed by BAs to facilitate the process effectively.

      A mid-sized local government overhauls its requirements gathering approach and sees strong results

      CASE STUDY

      Industry

      Government

      Source

      Info-Tech Research Group Workshop

      The Client

      The organization was a local government responsible for providing services to approximately 600,000 citizens in the southern US. Its IT department is tasked with deploying applications and systems (such as HRIS) that support the various initiatives and mandate of the local government.

      The Requirements Gathering Challenge

      The IT department recognized that a strong requirements gathering process was essential to delivering value to its stakeholders. However, there was no codified process in place – each BA unilaterally decided how they would conduct requirements gathering at the start of each project. IT recognized that to enhance both the effectiveness and efficiency of requirements gathering, it needed to put in place a strong, prescriptive set of SOPs.

      The Improvement

      Working with a team from Info-Tech, the IT leadership and BA team conducted a workshop to develop a new set of SOPs that provided clear guidance for each stage of the requirements process: elicitation, analysis, and validation. As a result, business satisfaction and value alignment increased.

      The Requirements Gathering SOP and BA Playbook offers a codified set of SOPs for requirements gathering gave BAs a clear playbook.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Build a Strong Approach to Business Requirements Gathering – project overview

      1. Build the Target State for Requirements Gathering 2. Define the Elicitation Process 3. Analyze and Validate Requirements 4. Create a Requirements Governance Action Plan
      Best-Practice Toolkit

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      Guided Implementations
      • Review Info-Tech’s requirements gathering methodology.
      • Assess current state for requirements gathering – pains and challenges.
      • Determine target state for business requirements gathering – areas of opportunity.
      • Assess elicitation techniques and determine best fit to projects and business environment.
      • Review options for structuring the output of requirements elicitation (i.e. SIPOC).
      • Create policies for requirements categorization and prioritization.
      • Establish best practices for validating the BRD with project stakeholders.
      • Discuss how to handle changes to requirements, and establish a formal change control process.
      • Review options for ongoing governance of the requirements gathering process.
      Onsite Workshop Module 1: Define the Current and Target State Module 2: Define the Elicitation Process Module 3: Analyze and Validate Requirements Module 4: Governance and Continuous Improvement Process
      Phase 1 Results: Clear understanding of target needs for the requirements process. Phase 2 Results: Best practices for conducting and structuring elicitation. Phase 3 Results: Standardized frameworks for analysis and validation of business requirements. Phase 4 Results: Formalized change control and governance processes for requirements.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Define Current State and Target State for Requirements Gathering

      • Understand current state and document existing requirement process steps.
      • Identify stakeholder, process, outcome, and reigning challenges.
      • Conduct target state analysis.
      • Establish requirements gathering metrics.
      • Identify project levels 1/2/3/4.
      • Match control points to project levels 1/2/3/4.
      • Conduct project scoping and identify stakeholders.

      Define the Elicitation Process

      • Understand elicitation techniques and which ones to use.
      • Document and confirm elicitation techniques.
      • Create a requirements gathering elicitation plan for your project.
      • Practice using interviews with business stakeholders to build use case models.
      • Practice using table-top testing with business stakeholders to build use case models.
      • Build the operating model for your project

      Analyze and Validate Requirements

      • Categorize gathered requirements for use.
      • Consolidate similar requirements and eliminate redundancies.
      • Practice prioritizing requirements.
      • Rightsize the requirements documentation template.
      • Present the business requirements document (BRD) to business stakeholders.
      • Identify testing opportunities.

      Establish Change Control Processes

      • Review existing CR process.
      • Review change control process best practices & optimization opportunities.
      • Build guidelines for escalating changes.
      • Confirm your requirements gathering process for project levels 1/2/3/4.

      Establish Ongoing Governance for Requirements Gathering

      • Define RACI for the requirements gathering process.
      • Define the requirements gathering governance process.
      • Define RACI for requirements gathering governance.
      • Define the agenda and cadence for requirements gathering governance.
      • Identify and analyze stakeholders for communication plan.
      • Create communication management plan.
      • Build the action plan.
      Deliverables
      • Requirements gathering maturity assessment
      • Project level selection tool
      • Requirements gathering documentation tool
      • Project elicitation schedule
      • Project operating model
      • Project use cases
      • Requirements gathering documentation tool
      • Requirements gathering testing checklist
      • Requirements traceability matrix
      • Requirements gathering communication tracking template
      • Requirements gathering action plan

      Phase 1: Build the Target State for the Requirements Gathering Process

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Build the Target State

      Proposed Time to Completion: 2 weeks

      Step 1.1: Understand the Benefits of Requirements Optimization

      Start with an analyst kick off call:

      • Review Info-Tech’s requirements gathering methodology.

      Then complete these activities…

      • Hold a fireside chat.

      With these tools & templates:

      Requirements Gathering SOP and BA Playbook

      Step 1.2: Determine Your Target State for Requirements Gathering

      Review findings with analyst:

      • Assess current state for requirements gathering – pains and challenges.
      • Determine target state for business requirements gathering – areas of opportunity.

      Then complete these activities…

      • Identify your business process model.
      • Define project levels.
      • Match control points to project level.
      • Identify and analyze stakeholders.

      With these tools & templates:

      • Requirements Gathering Maturity Assessment
      • Project Level Selection Tool
      • Business Requirements Analyst job description
      • Requirements Gathering Communication Tracking Template

      Phase 1 Results & Insights:

      Clear understanding of target needs for the requirements process.

      Step 1.1: Understand the Benefits of Requirements Optimization

      Phase 1

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      Phase 2

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      Phase 3

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      Phase 4

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      This step will walk you through the following activities:
      • Identifying challenges with requirements gathering and identifying objectives for the workshop.
      This step involves the following participants:
      • Business stakeholders
      • BAs
      Outcomes of this step
      • Stakeholder objectives identified.

      Requirements optimization is powerful, but it’s not free; gauge the organizational capital you’ll need to make it a success

      Optimizing requirements management is not something that can be done in isolation, and it’s not necessarily going to be easy. Improving your requirements will translate into better value delivery, but it takes real commitment from IT and its business partners.

      There are four “pillars of commitment” that will be necessary to succeed with requirements optimization:

      1. Senior Management Organizational Capital
        • Before organizations can establish revised SOPs for requirements gathering, they’ll need a strong champion in senior management to ensure that updated elicitation and sign-off techniques do not offend people. A powerful sponsor can lead to success, especially if they are in the business.
      2. End-User Organizational Capital
        • To overcome cynicism, you need to focus on convincing end users that there is something to be gained from participating in requirements gathering (and the broader process of requirements optimization). Frame the value by focusing on how good requirements mean better apps (e.g. faster, cheaper, fewer errors, less frustration).
      3. Staff Resourcing
        • You can have a great SOP, but if you don’t have the right resources to execute on it you’re going to have difficulty. Requirements gathering needs dedicated BAs (or equivalent staff) who are trained in best practices and can handle elicitation, analysis, and validation successfully.
      4. Dedicated Cycle Time
        • IT and the business both need to be willing to demonstrate the value of requirements optimization by giving requirements gathering the time it needs to succeed. If these parties are convinced by the concept in theory, but still try to rush moving to the development phase, they’re destined for failure.

      Rethink your approach to requirements gathering: start by examining the business process, then tackle technology

      When gathering business requirements, it’s critical not to assume that layering on technology to a process will automatically solve your problems.

      Proper requirements gathering views projects holistically (i.e. not just as an attempt to deploy an application or technology, but as an endeavor to enable new or re-engineered business processes). Neglecting to see requirements gathering in the context of business process enablement leads to failure.

      • Far too often, organizations automate an existing process without putting much thought into finding a better way to do things.
      • Most organizations focus on identifying a series of small improvements to make to a process and realize limited gains.
      • The best way to generate transformational gains is to reinvent how the process should be performed and work backwards from there.
      • You should take a top-down approach and begin by speaking with senior management about the business case for the project and their vision for the target state.
      • You should elicit requirements from the rank-and-file employees while centering the discussion and requirements around senior management’s target state. Don’t turn requirements gathering into a griping session about deficiencies with a current application.

      Leverage Info-Tech’s proven Requirements Gathering Framework as the basis for building requirements processes

      A graphic with APPLICATIONS THAT DELIVER BUSINESS VALUE written in the middle. Three steps are named: Elicit; Analyze; Validate. Around the outer part of the graphic are 4 arrows arranged in a circle, with the labels: Plan; Monitor; Communicate; Manage.

      Info-Tech’s Requirements Gathering Framework is a comprehensive approach to requirements management that can be scaled to any size of project or organization. This framework has been extensively road-tested with our clients to ensure that it balances the needs of IT and business stakeholders to give a holistic, end-to-end approach for requirements gathering. It covers both the foundational issues (elicitation, analysis, and validation) as well as prescribing techniques for planning, monitoring, communicating, and managing the requirements gathering process.

      Requirements gathering fireside chat

      1.1.1 – 45 minutes

      Output
      • Stakeholder objectives
      Materials
      • Whiteboard, markers, sticky notes
      Participants
      • BAs

      Identify the challenges you’re experiencing with requirements gathering, and identify objectives.

      1. Hand out sticky notes to participants, and ask the group to work independently to think of challenges that exist with regards to requirements gathering. (Hint: consider stakeholder challenges, process challenges, outcome challenges, and training challenges.) Ask participants to write their current challenges on sticky notes, and place them on the whiteboard.
      2. As a group, review all sticky notes and group challenges into themes.
      3. For each theme you uncover, work as a group to determine the objective that will overcome these challenges throughout the workshop and write this on the whiteboard.
      4. Discuss how these challenges will be addressed in the workshop.

      Don’t improvise: have a structured, prescriptive end-to-end approach for successfully gathering useful requirements

      Creating a unified SOP guide for requirements elicitation, analysis, and validation is a critical step for requirements optimization; it gives your BAs a common frame of reference for conducting requirements gathering.

      • The key to requirements optimization is to establish a strong set of SOPs that provide direction on how your organization should be executing requirements gathering processes. This SOP guide should be a holistic document that walks your BAs through a requirements gathering project from beginning to end.
      • An SOP that is put aside is useless; it must be well communicated to BAs. It should be treated as the veritable manifesto of requirements management in your organization.

      Info-Tech Insight

      Having a standardized approach to requirements management is critical, and SOPs should be the responsibility of a group. The SOP guide should cover all of the major bases of requirements management. In addition to providing a walk-through of the process, an SOP also clarifies requirements governance.

      Use Info-Tech’s Requirements Gathering SOP and BA Playbook to assist with requirements gathering optimization

      Info-Tech’s Requirements Gathering SOP and BA Playbook template forms the basis of this blueprint. It’s a structured document that you can fill out with defined procedures for how requirements should be gathered at your organization.

      Info-Tech’s Requirements Gathering SOP and BA Playbook template provides a number of sections that you can populate to provide direction for requirements gathering practitioners. Sections provided include: Organizational Context Governance Procedures Resourcing Model Technology Strategy Knowledge Management Elicitation SOPs Analysis SOPs Validation SOPs.

      The template has been pre-populated with an example of requirements management procedures. Feel free to customize it to fit your specific needs.

      Download the Requirements Gathering SOP and BA Playbook template.

      Step 1.2: Determine Your Target State for Requirements Gathering

      Phase 1

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      Phase 2

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      Phase 3

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      Phase 4

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      This step will walk you through the following activities:
      • Conduct a current and target state analysis.
      • Identify requirements gathering business process model.
      • Establish requirements gathering performance metrics.
      • Define project levels – level 1/2/3/4.
      • Match control points to project level.
      • Conduct initial brainstorming on the project.
      This step involves the following participants:
      • BAs
      Outcomes of this step:
      • Requirements gathering maturity summary.
      • Requirements gathering business process model.
      • Identification of project levels.
      • Identification of control points.

      Plan for requirements gathering

      The image is the Requirements Gathering Framework from earlier slides, but with all parts of the graphic grey-out, except for the arrows containing Plan and Monitor, at the top.

      Establishing an overarching plan for requirements governance is the first step in building an SOP. You must also decide who will actually execute the requirements gathering processes, and what technology they will use to accomplish this. Planning for governance, resourcing, and technology is something that should be done repeatedly and at a higher strategic level than the more sequential steps of elicitation, analysis, and validation.

      Establish your target state for requirements gathering processes to have a cogent roadmap of what needs to be done

      Visualize how you want requirements to be gathered in your organization. Do not let elements of the current process restrict your thinking.

      • First, articulate the impetus for optimizing requirements management and establish clear goals.
      • Use these goals to drive the target state.

      For example:

      • If the goal is to improve the accuracy of requirements, then restructure the validation process.
      • If the goal is to improve the consistency of requirements gathering, then create SOPs or use electronic templates and tools.

      Refrain from only making small changes to improve the existing process. Think about the optimal way to structure the requirements gathering process.

      Define the attributes of a good requirement to help benchmark the type of outputs that you’re looking for

      Attributes of Good Requirements

      Verifiable – It is stated in a way that can be tested.

      Unambiguous – It is free of subjective terms and can only be interpreted in one way.

      Complete – It contains all relevant information.

      Consistent – It does not conflict with other requirements.

      Achievable – It is possible to accomplish given the budgetary and technological constraints.

      Traceable – It can tracked from inception to testing.

      Unitary – It addresses only one thing and cannot be decomposed into multiple requirements.

      Accurate – It is based on proven facts and correct information.

      Other Considerations:

      Organizations can also track a requirement owner, rationale, priority level (must have vs. nice to have), and current status (approved, tested, etc.).

      Info-Tech Insight

      Requirements must be solution agnostic – they should focus on the underlying need rather than the technology required to satisfy the need as it can be really easy to fall into the technology solution trap.

      Use Info-Tech’s Requirements Gathering Maturity Assessment tool to help conduct current and target state analysis

      Use the Requirements Gathering Maturity Assessment tool to help assess the maturity of your requirements gathering function in your organization, and identify the gaps between the current state and the target state. This will help focus your organization's efforts in closing the gaps that represent high-value opportunities.

      • On tab 2. Current State, use the drop-down responses to provide the answer that best matches your organization, where 1= Strongly disagree and 5 = Strongly agree. On tab 3. Target State, answer the same questions in relation to where your organization would like to be.
      • Based on your responses, tab 4. Maturity Summary will display a visual of the gap between the current and target state.

      Conduct a current and target state analysis

      1.2.1 – 1 hour

      Complete the Requirements Gathering Maturity Assessment tool to define your target state, and identify the gaps in your current state.

      Input
      • Current and target state maturity rating
      Output
      • Requirements gathering maturity summary
      Materials
      • Whiteboard
      • Markers
      Participants
      • BAs
      1. For each component of requirements gathering, write out a series of questions to evaluate your current requirements gathering practices. Use the Requirements Gathering Maturity Assessment tool to assist you in drafting questions.
      2. Review the questions in each category, and agree on a rating from 1-5 on their current maturity: 1= Strongly disagree and 5 = Strongly agree. (Note: it will likely be very rare that they would score a 5 in any category, even for the target state.)
      3. Once the assigned categories have been completed, have groups present their assessment to all, and ensure that there is consensus. Once consensus has been reached, input the information into the Current State tab of the tool to reveal the overall current state of maturity score for each category.
      4. Now that the current state is complete, go through each category and define the target state goals.
      5. Document any gaps or action items that need to be addressed.

      Example: Conduct a current and target state analysis

      The Requirements Gathering Maturity Assessment - Target State, with example data inputted.

      Select the project-specific KPIs that will be used to track the value of requirements gathering optimization

      You need to ensure your requirements gathering procedures are having the desired effect and adjust course when necessary. Establishing an upfront list of key performance indicators that will be benchmarked and tracked is a crucial step.

      • Without following up on requirements gathering by tracking project metrics and KPIs, organizations will not be able to accurately gauge if the requirements process re-engineering is having a tangible, measurable effect. They will also not be able to determine what changes (if any) need to be made to SOPs based on project performance.
      • This is a crucial step that many organizations overlook. Creating a retroactive list of KPIs is inadequate, since you must benchmark pre-optimization project metrics in order to assess and isolate the value generated by reducing errors and cycle time and increasing value of deployed applications.

      Establish requirements gathering performance metrics

      1.2.2 – 30 minutes

      Input
      • Historical metrics
      Output
      • Target performance metrics
      Materials
      • Whiteboard
      • Markers
      • Paper
      Participants
      • BAs
      1. Identify the following information for the last six months to one year:
        1. Average number of reworks to requirements.
        2. Number of change requests.
        3. Percent of feature utilization by end users.
        4. User adoption rate.
        5. Number of breaches in regulatory requirements.
        6. Percent of final deliverables implemented on time.
        7. End-user satisfaction score (if possible).
      2. As a group, look at each metric in turn and set your target metrics for six months to one year for each of these categories.

      Document the output from this exercise in section 2.2 of the Requirements Gathering SOP and BA Playbook.

      Visualize your current and target state process for requirements gathering with a business process model

      A business process model (BPM) is a simplified depiction of a complex process. These visual representations allow all types of stakeholders to quickly understand a process, how it affects them, and enables more effective decision making. Consider these areas for your model:

      Stakeholder Analysis

      • Identify who the right stakeholders are
      • Plan communication
      • Document stakeholder responsibilities in a RACI

      Elicitation Techniques

      • Get the right information from stakeholders
      • Document it in the appropriate format
      • Define business need
      • Enterprise analysis

      Documentation

      • How are outputs built?
      • Process flows
      • Use cases
      • Business rules
      • Traceability matrix
      • System requirements

      Validation & Traceability

      • Make sure requirements are accurate and complete
      • Trace business needs to requirements

      Managing Requirements

      • Organizing and prioritizing
      • Gap analysis
      • Managing scope
      • Communicating
      • Managing changes

      Supporting Tools

      • Templates to standardize
      • Checklists
      • Software to automate the process

      Your requirements gathering process will vary based on the project level

      It’s important to determine the project levels up front, as each project level will have a specific degree of elicitation, analysis, and validation that will need to be completed. That being said, not all organizations will have four levels.

      Level 4

      • Very high risk and complexity.
      • Projects that result in a transformative change in the way you do business. Level 4 projects affect all lines of business, multiple technology areas, and have significant costs and/or risks.
      • Example: Implement ERP

      Level 3

      • High risk and complexity.
      • Projects that affect multiple lines of business and have significant costs and/or risks.
      • Example: Implement CRM

      Level 2

      • Medium risk and complexity.
      • Projects with broader exposure to the business that present a moderate level of risk to business operations.
      • Example: Deploy Office 365

      Level 1

      • Low risk and complexity.
      • Routine/straightforward projects with limited exposure to the business and low risk of negative business impact.
      • Example: SharePoint Update

      Use Info-Tech’s Project Level Selection Tool to classify your project level and complexity

      1.3 Project Level Selection Tool

      The Project Level Selection Tool will classify your projects into four levels, enabling you to evaluate the risk and complexity of a particular project and match it with an appropriate requirements gathering process.

      Project Level Input

      • Consider the weighting criteria for each question and make any needed adjustments to better reflect how your organization values each of the criterion.
      • Review the option levels 1-4 for each of the six questions, and make any modifications necessary to better suit your organization.
      • Review the points assigned to each of the four buckets for each of the six questions, and make any modifications needed.

      Project Level Selection

      • Use this tab to evaluate the project level of each new project.
      • To do so, answer each of the questions in the tool.

      Define project levels – Level 1/2/3/4

      1.2.3 – 1 hour

      Input
      • Project level assessment criteria
      Output
      • Identification of project levels
      Materials
      • Whiteboard
      • Markers
      Participants
      • BAs

      Define the project levels to determine the appropriate requirements gathering process for each.

      1. Begin by asking participants to review the six criteria for assessing project levels as identified in the Project Level Selection Tool. Have participants review the list and ensure agreement around the factors. Create a chart on the board using Level 1, Level 2, Level 3, and Level 4 as column headings.
      2. Create a row for each of the chosen factors. Begin by filling in the chart with criteria for a level 4 project: What constitutes a level 4 project according to these six factors?
      3. Repeat the exercise for Level 3, Level 2, and Level 1. When complete, you should have a chart that defines the four project levels at your organization.
      4. Input this information into the tool, and ask participants to review the weighting factors and point allocations and make modifications where necessary.
      5. Input the details from one of the projects participants had selected prior to the workshop beginning and determine its project level. Discuss whether this level is accurate, and make any changes needed.

      Document the output from this exercise in section 2.3 of the Requirements Gathering SOP and BA Playbook.

      Define project levels

      1.2.3 – 1 hour

      Category Level 4 Level 3 Level 2 Level 1
      Scope of Change Full system update Full system update Multiple modules Minor change
      Expected Duration 12 months + 6 months + 3-6 months 0-3 months
      Impact Enterprise-wide, globally dispersed Enterprise-wide Department-wide Low users/single division
      Budget $1,000,000+ $500,000-1,000,000 $100,000-500,000 $0-100,000
      Services Affected Mission critical, revenue impacting Mission critical, revenue impacting Pervasive but not mission critical Isolated, non-essential
      Confidentiality Yes Yes No No

      Define project levels

      1.2.3 – 1 hour

      The tool is comprised of six questions, each of which is linked to at least one type of project risk.

      Using the answers provided, the tool will calculate a level for each risk category. Overall project level is a weighted average of the individual risk levels, based on the importance weighting of each type of risk set by the project manager.

      This tool is an excerpt from Info-Tech’s exhaustive Project Level Assessment Tool.

      The image shows the Project Level Tool, with example data filled in.

      Build your initial requirements gathering business process models: create different models based on project complexity

      1.2.4 – 30 minutes

      Input
      • Current requirements gathering process flow
      Output
      • Requirements gathering business process model
      Materials
      • Whiteboard
      • Markers
      Participants
      • BAs

      Brainstorm the ideal target business process flows for your requirements gathering process (by project level).

      1. As a group, create a process flow on the whiteboard that covers the entire requirements gathering lifecycle, incorporating the feedback from exercise 1.2.1. Draw the process with input from the entire group.
      2. After the process flow is complete, compare it to the best practice process flow on the following slide. You may want to create different process flows based on project level (i.e. a process model for Level 1 and 2 requirements gathering, and a process model for how to collect requirements for Level 3 and 4). As you work through the blueprint, revisit and refine these models – this is the initial brainstorming!

      Document the output from this exercise in section 2.4 of the Requirements Gathering SOP and BA Playbook.

      Example: requirements gathering business process model

      An example of the requirements gathering business process model. The model depicts the various stages of the requirements gathering process.

      Develop your BA team to accelerate collecting, analyzing, and translating requirements

      Having an SOP is important, but it should be the basis for training the people who will actually execute the requirements gathering process. Your BA team is critical for requirements gathering – they need to know the SOPs in detail, and you need to have a plan for recruiting those with an excellent skill set.

      • The designated BA(s) for the project have responsibility for end-to-end requirements management – they are responsible for executing the SOPs outlined in this blueprint, including elicitation, analysis, and validation of requirements during the project.
      • Designated BAs must work collaboratively with their counterparts in the business and IT (e.g. developer teams or procurement professionals) to ensure that the approved requirements are met in a timely and cost-effective manner.

      The ideal candidates for requirements gathering are technically savvy analysts (but not necessarily computer science majors) from the business who are already fluent with the business’ language and cognizant of the day-to-day challenges that take place. Organizationally, these BAs should be in a group that bridges IT and the business (such as an RGCOE or PMO) and be specialists rather than generalists in the requirements management space.

      A BA resourcing strategy is included in the SOP. Customize it to suit your needs.

      "Make sure your people understand the business they are trying to provide the solution for as well if not better than the business folks themselves." – Ken Piddington, CIO, MRE Consulting

      Use Info-Tech’s Business Requirements Analyst job description template for sourcing the right talent

      1.4 Business Requirements Analyst

      If you don’t have a trained group of in-house BAs who can execute your requirements gathering process, consider sourcing the talent from internal candidates or calling for qualified applicants. Our Business Requirements Analyst job description template can help you quickly get the word out.

      • Sometimes, you will have a dedicated set of BAs, and sometimes you won’t. In the latter case, the template covers:
        • Job Title
        • Description of Role
        • Responsibilities
        • Target Job Skills
        • Target Job Qualifications
      • The template is primarily designed for external hiring, but can also be used to find qualified internal candidates.

      Info-Tech Deliverable
      Download the Business Requirements Analyst job description template.

      Standardizing process begins with establishing expectations

      CASE STUDY

      Industry Government

      Source Info-Tech Workshop

      Challenge

      A mid-sized US municipality was challenged with managing stakeholder expectations for projects, including the collection and analysis of business requirements.

      The lack of a consistent approach to requirements gathering was causing the IT department to lose credibility with department level executives, impacting the ability of the team to engage project stakeholders in defining project needs.

      Solution

      The City contracted Info-Tech to help build an SOP to govern and train all BAs on a consistent requirements gathering process.

      The teams first set about establishing a consistent approach to defining project levels, defining six questions to be asked for each project. This framework would be used to assess the complexity, risk, and scope of each project, thereby defining the appropriate level of rigor and documentation required for each initiative.

      Results

      Once the project levels were defined, the team established a formalized set of steps, tools, and artifacts to be created for each phase of the project. These tools helped the team present a consistent approach to each project to the stakeholders, helping improve credibility and engagement for eliciting requirements.

      The project level should set the level of control

      Choose a level of control that facilitates success without slowing progress.

      No control Right-sized control Over-engineered control
      Final deliverable may not satisfy business or user requirements. Control points and communication are set at appropriate stage-gates to allow for deliverables to be evaluated and assessed before proceeding to the next phase. Excessive controls can result in too much time spent on stage-gates and approvals, which creates delays in the schedule and causes milestones to be missed.

      Info-Tech Insight

      Throughout the requirements gathering process, you need checks and balances to ensure that the projects are going according to plan. Now that we know our stakeholder, elicitation, and prioritization processes, we will set up the control points for each project level.

      Plan your communication with stakeholders

      Determine how you want to receive and distribute messages to stakeholders.

      Communication Milestones Audience Artifact Final Goal
      Project Initiation Project Sponsor Project Charter Communicate Goals and Scope of Project
      Elicitation Scheduling Selected Stakeholders (SMEs, Power Users) Proposed Solution Schedule Elicitation Sessions
      Elicitation Follow-Up Selected Stakeholders Elicitation Notes Confirm Accuracy of Notes
      First Pass Validation Selected Stakeholders Consolidated Requirements Validate Aggregated Requirements
      Second Pass Validation Selected Stakeholders Prioritized Requirements Validate Requirements Priority
      Eliminated Requirements Affected Stakeholders Out of Scope Requirements Affected Stakeholders Understand Impact of Eliminated Requirements
      Solution Selection High Authority/Expertise Stakeholders Modeled Solutions Select Solution
      Selected Solution High Authority/Expertise Stakeholders and Project Sponsor Requirements Package Communicate Solution
      Requirements Sign-Off Project Sponsor Requirements Package Obtain Sign-Off

      Setting control points – approvals and sign-offs

      # – Control Point: A decision requiring specific approval or sign-off from defined stakeholders involved with the project. Control points result in accepted or rejected deliverables/documents.

      A – Plan Approval: This control point requires a review of the requirements gathering plan, stakeholders, and elicitation techniques.

      B – Requirements Validation: This control point requires a review of the requirements documentation that indicates project and product requirements.

      C – Prioritization Sign-Off: This requires sign-off from the business and/or user groups. This might be sign-off to approve a document, prioritization, or confirm that testing is complete.

      D – IT or Peer Sign-Off: This requires sign-off from IT to approve technical requirements or confirm that IT is ready to accept a change.

      Match control points to project level and identify these in your requirements business process models

      1.2.5 – 45 minutes

      Input
      • Activity 1.2.4 business process diagram
      Output
      • Identify control points
      Materials
      • Whiteboard
      • Markers
      • Sticky notes
      Participants
      • Business stakeholders
      • BAs

      Define all of the key control points, required documentation, and involved stakeholders.

      1. On the board, post the initial business process diagram built in exercise 1.2.4. Have participants suggest appropriate control points. Write the control point number on a sticky note and place it where the control point should be.
      2. Now that we have identified the control points, consider each control point and define who will be involved in each one, who provides the approval to move forward, the documentation required, and the overall goal.

      Document the output from this exercise in section 6.1 of the Requirements Gathering SOP and BA Playbook.

      A savvy BA should clarify and confirm project scope prior to embarking on requirements elicitation

      Before commencing requirements gathering, it’s critical that your practitioners have a clear understanding of the initial business case and rationale for the project that they’re supporting. This is vital for providing the business context that elicitation activities must be geared towards.

      • Prior to commencing the requirements gathering phase, the designated BA should obtain a clear statement of scope or initial project charter from the project sponsor. It’s also advisable for the BA to have an in-person meeting with the project sponsor(s) to understand the overarching strategic or tactical impetus for the project. This initial meeting should be less about eliciting requirements and more about understanding why the project is moving forward, and the business processes it seeks to enable or re-engineer (the target state).
      • During this meeting, the BA should seek to develop a clear understanding of the strategic rationale for why the project is being undertaken (the anticipated business benefits) and why it is being undertaken at this time. If the sponsor has any business process models they can share, this would be a good time to review them.

      During requirements gathering, BAs should steer clear of solutions and focus on capturing requirements. Focus on traceable, hierarchical, and testable requirements. Focusing on solution design means you are out of requirements mode.

      Identify constraints early and often, and ensure that they are adequately communicated to project sponsors and end users

      Constraints come in many forms (i.e. financial, regulatory, and technological). Identifying these constraints prior to entering requirements gathering enables you to remain alert; you can separate what is possible from what is impossible, and set stakeholder expectations accordingly.

      • Most organizations don’t inventory their constraints until after they’ve gathered requirements. This is dangerous, as clients may inadvertently signal to end users or stakeholders that an infeasible requirement is something they will pursue. As a result, stakeholders are disappointed when they don’t see it materialize.
      • Organizations need to put advanced effort into constraint identification and management. Too much time is wasted pursuing requirements that aren't feasible given existing internal (e.g. budgets and system) and external (e.g. legislative or regulatory) constraints.
      • Organizations need to manage diverse stakeholders for requirements analysis. Communication will not always be solely with internal teams, but also with suppliers, customers, vendors, and system integrators.

      Stakeholder management is a critical aspect of the BA’s role. Part of the BA’s responsibility is prioritizing solutions and demonstrating to stakeholders the level of effort required and the value attained.

      A graphic, with an arrow running down the left side, pointing downward, which is labelled Constraint Malleability. On the right side of the arrow are three rounded arrows, stacked. The top arrow is labelled Legal/Regulatory Constraints, the second is labelled System/Technical Constraints and the third is labelled Stakeholder Constraints

      Conduct initial brainstorming on the scope of a selected enterprise application project (real or a sample of your choice)

      1.2.6 – 30 minutes

      Input
      • Project details
      Output
      • Initial project scoping
      Materials
      • Whiteboard
      • Markers
      Participants
      • Business stakeholders

      Begin the requirements gathering process by conducting some initial scoping on why we are doing the project, the goals, and the constraints.

      1. Share the project intake form/charter with each member of the group, and give them a few minutes to read over the project details.
      2. On the board write the project topic and three sub-topics:
        • Why does the business want this?
        • What do you want customers (end users) to be able to do?
        • What are the constraints?
      3. As a group, brainstorm answers to each of these questions and write them on the board.

      Example: Conduct initial brainstorming on the project

      Image shows an example for initial brainstorming on a project. The image shows the overall idea, Implement CRM, with question bubbles emerging out of it, and space left blank to brainstorm the answers to those questions.

      Identify stakeholders that must be consulted during the elicitation part of the process; get a good spectrum of subject matter experts (SMEs)

      Before you can dive into most elicitation techniques, you need to know who you’re going to speak with – not all stakeholders hold the same value.

      There are two broad categories of stakeholders:

      Customers: Those who ask for a system/project/change but do not necessarily use it. These are typically executive sponsors, project managers, or interested stakeholders. They are customers in the sense that they may provide the funding or budget for a project, and may have requests for features and functionality, but they won’t have to use it in their own workflows.

      Users: Those who may not ask for a system but must use it in their routine workflows. These are your end users, those who will actually interact with the system. Users don’t necessarily have to be people – they can also be other systems that will require inputs or outputs from the proposed solution. Understand their needs to best drive more granular functional requirements.

      "The people you need to make happy at the end of the day are the people who are going to help you identify and prioritize requirements." – Director of IT, Municipal Utilities Provider

      Need a hand with stakeholder identification? Leverage Info-Tech’s Stakeholder Planning Tool to catalog and prioritize the stakeholders your BAs will need to contact during the elicitation phase.

      Exercise: Identify and analyze stakeholders for the application project prior to beginning formal elicitation

      1.2.7 – 45 minutes

      Input
      • List of stakeholders
      Output
      • Stakeholder analysis
      Materials
      • Whiteboard
      • Markers
      • Sticky notes
      Participants
      • BAs

      Practice the process for identifying and analyzing key stakeholders for requirements gathering.

      1. As a group, generate a complete list of the project stakeholders. Consider who is involved in the problem and who will be impacted by the solution, and record the names of these stakeholders/stakeholder groups on a sticky note. Categories include:
        1. Who is the project sponsor?
        2. Who are the user groups?
        3. Who are the project architects?
        4. Who are the specialty stakeholders (SMEs)?
        5. Who is your project team?
      2. Now that you’ve compiled a complete list, review each user group and indicate their level of influence against their level of involvement in the project to create a stakeholder power map by placing their sticky on a 2X2 grid.
      3. At the end of the day, record this list in the Requirements Gathering Communication Tracking Template.

      Use Info-Tech’s Requirements Gathering Communication Tracking Template

      1.5 Requirements Gathering Communication Tracking Template

      Use the Requirements Gathering Communication Tracking Template for structuring and managing ongoing communications among key requirements gathering implementation stakeholders.

      An illustration of the Stakeholder Power Map Template tab of the Requirements Gathering Communication Tracking Template

      Use the Stakeholder Power Map tab to:

      • Identify the stakeholder's name and role.
      • Identify their position on the power map using the drop-down menu.
      • Identify their level of support.
      • Identify resisters' reasons for resisting as: unwilling, unable, and/or unknowing.
      • Identify which committees they currently sit on, and which they will sit on in the future state.
      • Identify any key objections the stakeholder may have.

      Use the Communication Management Plan tab to:

      • Identify the vehicle/communication medium (status update, meeting, training, etc.).
      • Identify the audience for the communication.
      • Identify the purpose for communication.
      • Identify the frequency.
      • Identify who is responsible for the communication.
      • Identify how the communication will be distributed, and the level of detail.

      Right-size your investments in requirements management technology; sometimes the “suite spot” isn’t necessary

      Recording and analyzing requirements needs some kind of tool, but don’t overinvest in a dedicated suite if you can manage with a more inexpensive solution (such as Word, Excel, and/or Visio). Top-tier solutions may be necessary for an enterprise ERP deployment, but you can use a low-cost solution for low-level productivity application.

      • Many companies do things in the wrong order. Organizations need to right-size the approach that they take to recording and analyzing requirements. Taking the suite approach isn’t always better – often, inputting the requirements into Word or Excel will suffice. An RM suite won’t solve your problems by itself.
      • If you’re dealing with strategic approach or calculated approach projects, their complexity likely warrants a dedicated RM suite that can trace system dependencies. If you’re dealing with primarily elementary or fundamental approach projects, use a more basic tool.

      Your SOP guide should specify the technology platform that your analysts are expected to use for initial elicitation as well as analysis and validation. You don’t want them to use Word if you’ve invested in a full-out IBM RM solution.

      The graphic shows a pyramid shape next to an arrow, pointing up. The arrow is labelled Project Complexity. The pyramid includes three text boxes, reading (from top to bottom) Dedicated RM Suite; RM Module in PM Software; and Productivity APP (Word/Excel/Visio)

      If you need to opt for a dedicated suite, these vendors should be strong contenders in your consideration set

      Dedicated requirements management suites are a great (although pricey) way to have full control over recording, analysis, and hierarchical categorization of requirements. Consider some of the major vendors in the space if Word, Excel, and Visio aren’t suitable for you.

      • Before you purchase a full-scale suite or module for requirements management, ensure that the following contenders have been evaluated for your requirements gathering technology strategy:
        • Micro Focus Requirements Management
        • IBM Requisite Pro
        • IBM Rational DOORS
        • Blueprint Requirements Management
        • Jama Software
        • Polarion Software (a Siemens Company)

      A mid-sized consulting company overhauls its requirement gathering software to better understand stakeholder needs

      CASE STUDY

      Industry Consulting

      Source Jama Software

      Challenge

      ArcherPoint is a leading Microsoft Partner responsible for providing business solutions to its clients. Its varied customer base now requires a more sophisticated requirements gathering software.

      Its process was centered around emailing Word documents, creating versions, and merging issues. ArcherPoint recognized the need to enhance effectiveness, efficiency, and accuracy of requirements gathering through a prescriptive set of elicitation procedures.

      Solution

      The IT department at ArcherPoint recognized that a strong requirements gathering process was essential to delivering value to stakeholders. It needed more scalable and flexible requirements gathering software to enhance requirements traceability. The company implemented SaaS solutions that included traceability and seamless integration features.

      These features reduced the incidences of repetition, allowed for tracing of requirements relationships, and ultimately led to an exhaustive understanding of stakeholders’ needs.

      Results

      Projects are now vetted upon an understanding of the business client’s needs with a thorough requirements gathering collection and analysis.

      A deeper understanding of the business needs also allows ArcherPoint to better understand the roles and responsibilities of stakeholders. This allows for the implementation of structures and policies which makes the requirements gathering process rigorous.

      There are different types of requirements that need to be gathered throughout the elicitation phase

      Business Requirements

      • Higher-level statements of the goals, objectives, or needs of the enterprise.
      • Describe the reasons why a project has been initiated, the objectives that the project will achieve, and the metrics that will be used to measure its success.
      • Business requirements focus on the needs of the organization as a whole, not stakeholders within it.
      • Business requirements provide the foundation on which all further requirements analysis is based:
        • Ultimately, any detailed requirements must map to business requirements. If not, what business need does the detailed requirement fulfill?

      Stakeholder Requirements

      • Statements of the needs of a particular stakeholder or class of stakeholders, and how that stakeholder will interact with a solution.
      • Stakeholder requirements serve as a bridge between business requirements and the various classes of solution requirements.
      • When eliciting stakeholder requirements, other types of detailed requirements may be identified. Record these for future use, but keep the focus on capturing the stakeholders’ needs over detailing solution requirements.

      Solution options or preferences are not requirements. Be sure to identify these quickly to avoid being forced into untimely discussions and sub-optimal solution decisions.

      Requirement types – a quick overview (continued)

      Solution Requirements: Describe the characteristics of a solution that meet business requirements and stakeholder requirements. They are frequently divided into sub-categories, particularly when the requirements describe a software solution:

      Functional Requirements

      • Describe the behavior and information that the solution will manage. They describe capabilities the system will be able to perform in terms of behaviors or operations, i.e. specific information technology application actions or responses.
      • Functional requirements are not detailed solution specifications; rather, they are the basis from which specifications will be developed.

      Non-Functional Requirements

      • Capture conditions that do not directly relate to the behavior or functionality of the solution, but rather describe environmental conditions under which the solution must remain effective or qualities that the systems must have. These can include requirements related to capacity, speed, security, availability, and the information architecture and presentation of the user interface.
      • Non-functional requirements often represent constraints on the ultimate solution. They tend to be less negotiable than functional requirements.
      • For IT solutions, technical requirements would fit in this category.
      Info-Tech Insight

      Remember that solution requirements are distinct from solution specifications; in time, specifications will be developed from the requirements. Don’t get ahead of the process.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.2.1 Conduct current and target state analysis

      An analyst will facilitate a discussion to assess the maturity of your requirements gathering process and identify any gaps in the current state.

      1.2.2 Establish requirements gathering performance metrics

      Speak to an analyst to discuss and determine key metrics for measuring the effectiveness of your requirements gathering processes.

      1.2.4 Identify your requirements gathering business process model

      An analyst will facilitate a discussion to determine the ideal target business process flow for your requirements gathering.

      1.2.3; 1.2.5 Define control levels and match control points

      An analyst will assist you with determining the appropriate requirements gathering approach for different project levels. The discussion will highlight key control points and define stakeholders who will be involved in each one.

      1.2.6; 1.2.7 Conduct initial scoping and identify key stakeholders

      An analyst will facilitate a discussion to highlight the scope of the requirements gathering optimization project as well as identify and analyze key stakeholders in the process.

      Phase 2: Define the Elicitation Process

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Define the Elicitation Process

      Proposed Time to Completion: 2 weeks

      Step 2.1: Determine Elicitation Techniques

      Start with an analyst kick off call:

      • Understand and assess elicitation techniques.
      • Determine best fit to projects and business environment.

      Then complete these activities…

      • Understand different elicitation techniques.
      • Record the approved elicitation techniques.
      Step 2.2: Structure Elicitation Output

      Review findings with analyst:

      • Review options for structuring the output of requirements elicitation.
      • Build the requirements gathering operating model.

      Then complete these activities…

      • Build use case model.
      • Use table-top testing to build use case models.
      • Build the operating model.

      With these tools & templates:

      • Business Requirements Document Template
      • Scrum Documentation Template
      Phase 2 Results & Insights:
      • Best practices for conducting and structuring elicitation.

      Step 2.1: Determine Elicitation Techniques

      Phase 1

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      Phase 2

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      Phase 3

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      Phase 4

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      This step will walk you through the following activities:

      • Understand requirements elicitation techniques.

      This step involves the following participants:

      • BAs
      • Business stakeholders

      Outcomes of this step

      • Select and record best-fit elicitation techniques.

      Eliciting requirements is all about effectively creating the initial shortlist of needs the business has for an application

      The image is the Requirements Gathering Framework, shown earlier. All parts of the framework are greyed-out, except for the arrow containing the word Elicit in the center of the image, with three bullet points beneath it that read: Prepare; Conduct; Confirm.

      The elicitation phase is where the BAs actually meet with project stakeholders and uncover the requirements for the application. Major tasks within this phase include stakeholder identification, selecting elicitation techniques, and conducting the elicitation sessions. This phase involves the most information gathering and therefore requires a significant amount of time to be done properly.

      Good requirements elicitation leverages a strong elicitation framework and executes the right elicitation techniques

      A mediocre requirements practitioner takes an order taker approach to elicitation: they elicit requirements by showing up to a meeting with the stakeholder and asking, “What do you want?” This approach frequently results in gaps in requirements, as most stakeholders cannot free-form spit out an accurate inventory of their needs.

      A strong requirements practitioner first decides on an elicitation framework – a mechanism to anchor the discussion about the business requirements. Info-Tech recommends using business process modelling (BPM) as the most effective framework. The BA can now work through several key questions:

      • What processes will this application need to support?
      • What does the current process look like?
      • How could we improve the process?
      • In a target state process map, what are the key functional requirements necessary to support this?

      The second key element to elicitation is using the right blend of elicitation techniques: the tactical approach used to actually collect the requirements. Interviews are the most popular means, but focus groups, JAD sessions, and observational techniques can often yield better results – faster. This section will touch on BPM/BPI as an elicitation framework, then do deep dive on different elicitation techniques.

      The elicitation phase of most enterprise application projects follows a similar four-step approach

      Prepare

      Stakeholders must be identified, and elicitation frameworks and techniques selected. Each technique requires different preparation. For example, brainstorming requires ground rules; focus groups require invitations, specific focus areas, and meeting rooms (perhaps even cameras). Look at each of these techniques and discuss how you would prepare.

      Conduct

      A good elicitor has the following underlying competencies: analytical thinking, problem solving, behavioral characteristics, business knowledge, communication skills, interaction skills, and proficiency in BA tools. In both group and individual elicitation techniques, interpersonal proficiency and strong facilitation is a must. A good BA has an intuitive sense of how to manage the flow of conversations, keep them results-oriented, and prevent stakeholder tangents or gripe sessions.

      Document

      How you document will depend on the technique you use. For example, recording and transcribing a focus group is probably a good idea, but you still need to analyze the results and determine the actual requirements. Use cases demand a software tool – without one, they become cumbersome and unwieldy. Consider how you would document the results before you choose the technique. Some analysts prefer to use solutions like OneNote or Evernote for capturing the raw initial notes, others prefer pen and paper: it’s what works best for the BA at hand.

      Confirm

      Review the documentation with your stakeholder and confirm the understanding of each requirement via active listening skills. Revise requirements as necessary. Circulating the initial notes of a requirements interview or focus group is a great practice to get into – it ensures jargon and acronyms are correctly captured, and that nothing has been lost in the initial translation.

      BPM is an extremely useful framework for framing your requirements elicitation discussions

      What is BPM? (Source: BPMInstitute.org)

      BPMs can take multiple forms, but they are created as visual process flows that depict a series of events. They can be customized at the discretion of the requirements gathering team (swim lanes, legends, etc.) based on the level of detail needed from the input.

      When to use them?

      BPMs can be used as the basis for further process improvement or re-engineering efforts for IT and applications projects. When the requirements gathering process owner needs to validate whether or not a specific step involved in the process is necessary, BPM provides the necessary breakdown.

      What’s the benefit?

      Different individuals absorb information in a variety of ways. Visual representations of a process or set of steps tend to be well received by a large sub-set of individuals, making BPMs an effective analysis technique.

      This related Info-Tech blueprint provides an extremely thorough overview of how to leverage BPM and process improvement approaches.

      Use a SIPOC table to assist with zooming into a step in a BPM to help define requirements

      Build a Sales Report
      • Salesforce
      • Daily sales results
      • Sales by product
      • Sales by account rep
      • Receive customer orders
      • Process invoices
      • GL roll-up
      • Sales by region
      • Sales by rep
      • Director of Sales
      • CEO
      • Report is accurate
      • Report is timely
      • Balance to GL
      • Automated email notification

      Source: iSixSigma

      Example: Extract requirements from a BPM for a customer service solution

      Look at an example for a claims process, and focus on the Record Claim task (event).

      Task Input Output Risks Opportunities Condition Sample Requirements
      Record Claim Customer Email Case Record
      • An agent accidentally misses the email and the case is not submitted.
      • The contents of the email are not properly ported over into the case for the claim.
      • The claim is routed to the wrong recipient within the claims department.
      • There is translation risk when the claim is entered in another language from which it is received.
      • Reduce the time to populate a customer’s claim information into the case.
      • Automate the data capture and routing.
      • Pre-population of the case with the email contents.
      • Suggested routing based on the nature of the case.
      • Multi-language support.

      Business:

      • The system requires email-to-case functionality.

      Non-Functional:

      • The cases must be supported in multiple languages.
      • Case management requires Outlook integration.

      Functional:

      • The case must support the following information:
      • Title; Customer; Subject; Case Origin; Case Type; Owner; Status; Priority
      • The system must pre-populate the claims agent based on the nature of the case.

      The image is an excerpt from a table, with the title Claims Process at the top. The top row is labelled Customer Service, and includes a textbox that reads Record Claim. The bottom row is labelled Claims, and includes a textbox that reads Manage Claim. A downward-pointing arrow connects the two textboxes.

      Identify the preferred elicitation techniques in your requirements gathering SOP: outline order of operations

      Conducting elicitation typically takes the greatest part of the requirements management process. During elicitation, the designated BA(s) should be reviewing documentation, and conducting individual and group sessions with key stakeholders.

      • When eliciting requirements, it’s critical that your designated BAs use multiple techniques; relying only on stakeholder interviews while neglecting to conduct focus groups and joint whiteboarding sessions will lead to trouble.
      • Avoid makeshift solutions by focusing on target state requirements, but don’t forget about the basic user needs. These can often be neglected because one party assumes that the other already knows about them.
      • The SOP guide should provide your BAs with a shortlist of recommended/mandated elicitation techniques based on business scenarios (examples in this section). Your SOP should also suggest the order in which BAs use the techniques for initial elicitation. Generally, document review comes first, followed by group, individual, and observational techniques.

      Elicitation is an iterative process – requirements should be refined in successive steps. If you need more information in the analysis phases, don’t be afraid to go back and conduct more elicitation.

      Understand different elicitation techniques

      2.1.1 – 1 hour

      Input
      • Elicitation techniques
      Output
      • Elicitation technique assessment
      Materials
      • Whiteboard
      • Markers
      • Paper
      Participants
      • BAs
      1. For this exercise, review the following elicitation techniques: observation, document review, surveys, focus groups, and interviews. Use the material in the next slides to brainstorm around the following questions:
        1. What types of information can the technique be used to collect?
        2. Why would you use this technique over others?
        3. How will you prepare to use the technique?
        4. How will you document the technique?
        5. Is this technique suitable for all projects?
        6. When wouldn’t you use it?
      2. Have each group present their findings from the brainstorming to the group.

      Document any changes to the elicitation techniques in section 4.0 of the Requirements Gathering SOP and BA Playbook.

      Understand different elicitation techniques – Interviews

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Structured One-on-One Interview In a structured one-on-one interview, the BA has a fixed list of questions to ask the stakeholder and follows up where necessary. Structured interviews provide the opportunity to quickly home in on areas of concern that were identified during process mapping or group elicitation techniques. They should be employed with purpose, i.e. to receive specific stakeholder feedback on proposed requirements or to help identify systemic constraints. Generally speaking, they should be 30 minutes or less. Low Medium
      Unstructured One-on-One Interview In an unstructured one-on-one interview, the BA allows the conversation to flow free form. The BA may have broad themes to touch on but does not run down a specific question list. Unstructured interviews are most useful for initial elicitation, when brainstorming a draft list of potential requirements is paramount. Unstructured interviews work best with senior stakeholders (sponsors or power users), since they can be time consuming if they’re applied to a large sample size. It’s important for BAs not to stifle open dialogue and allow the participants to speak openly. They should be 60 minutes or less. Medium Low
      Info-Tech Insight

      Interviews should be used with high-value targets. Those who receive one-on-one face time can help generate good requirements, as well as allow effective communication around requirements at a later point (i.e. during the analysis and validation phases).

      Understand the diverse approaches for interviews

      Use a clear interview approach to guide the preparation, facilitation styles, participants, and interview schedules you manage for a specific project.

      Depending on your stakeholder audience and interview objectives, apply one or more of the following approaches to interviews.

      Interview Approaches

      • Unstructured
      • Semi-structured
      • Structured

      The Benefits of Interviews

      Fosters direct engagement

      IT is able to hear directly from stakeholders about what they are looking to do with a solution and the level of functionality that they expect from it.

      Offers greater detail

      With interviews, a greater degree of insight can be gained by leveraging information that wouldn’t be collected through traditional surveys. Face-to-face interactions provide thorough answers and context that helps inform requirements.

      Removes ambiguity

      Face-to-face interactions allow opportunities for follow-up around ambiguous answers. Clarify what stakeholders are looking for and expect in a project.

      Enables stakeholder management

      Interviews are a direct line of communication with a project stakeholder. They provide input and insight, and help to maintain alignment, plan next steps, and increase awareness within the IT organization.

      Select an interview structure based on project objectives and staff types

      Consider stakeholder types and characteristics, in conjunction with the best way to maximize time, when selecting which of the three interview structures to leverage during the elicitation phase of requirements gathering.

      Structured Interviews

      • Interviews conducted using this structure are modelled after the typical Q&A session.
      • The interviewer asks the participant a variety of closed-ended questions.
      • The participant’s response is limited to the scope of the question.

      Semi-Structured Interviews

      • The interviewer may prepare a guide, but it acts as more of an outline.
      • The goal of the interview is to foster and develop conversation.
      • Participants have the ability to answer questions on broad topics without compromising the initial guide.

      Unstructured Interviews

      • The interviewer may have a general interview guide filled with open-ended questions.
      • The objective of the questions is to promote discussion.
      • Participants may discuss broader themes and topics.

      Select the best interview approach

      Review the following questions to determine what interview structure you should utilize. If you answer the question with “Yes,” then follow the corresponding recommendations for the interview elements.

      Question Structure Type Facilitation Technique # of Participants
      Do you have to interview multiple participants at once because of time constraints? Semi-structured Discussion 1+
      Does the business or stakeholders want you to ask specific questions? Structured Q&A 1
      Have you already tried an unsuccessful survey to gather information? Semi-structured Discussion 1+
      Are you utilizing interviews to understand the area? Unstructured Discussion 1+
      Do you need to gather requirements for an immediate project? Structured Q&A 1+

      Decisions to make for interviews

      Interviews should be used with high-value targets. Those who receive one-on-one face time can help generate good requirements and allow for effective communication around requirements during the analysis and validation stages.

      Who to engage?

      • Individuals with an understanding of the project scope, constraints and considerations, and high-level objectives.
      • Project stakeholders from across different functional units to solicit a varied set of requirement inputs.

      How to engage?

      • Approach selected interview candidate(s) with a verbal invitation to participate in the requirements gathering process for [Project X].
      • Take the initiative to book time in the candidate’s calendar. Include in your calendar invitation a description of the preparation required for the interview, the anticipated outputs, and a brief timeline agenda for the interview itself.

      How to drive participant engagement?

      • Use introductory interview questions to better familiarize yourself with the interviewee and to create an environment in which the individual feels welcome and at ease.
      • Once acclimatized, ensure that you hold the attention of the interviewee by providing further probing, yet applicable, interview questions.

      Manage each point of the interaction in the interview process

      Interviews generally follow the same workflow regardless of which structure you select. You must manage the process to ensure that the interview runs smoothly and results in an effective gathering requirements process.

      1. Prep Schedule
        • Recommended Actions
          • Send an email with a proposed date and time for the meeting.
          • Include an overview of what you will be discussing.
          • Mention if other people will be joining (if group interview).
      2. Meeting Opening
        • Recommended Actions
          • Provide context around the meeting’s purpose and primary focal points.
          • Let interviewee(s) know how long the interview will last.
          • Ask if they have any blockers that may cause the meeting to end early.
      3. Meeting Discussion
        • Recommended Actions
          • Ask questions and facilitate discussion in accordance with the structure you have selected.
          • Ensure that the meeting’s dialogue is being either recorded using written notes (if possible) or a voice recorder.
      4. Meeting Wrap-Up
        • Recommended Actions
          • Provide a summary of the big findings and what was agreed upon.
          • Outline next steps or anything else you will require from the participant.
          • Let the interviewee(s) know that you will follow up with interview notes, and will require feedback from them.
      5. Meeting Follow-Up
        • Recommended Actions
          • Send an overview of what was covered and agreed upon during the interview.
          • Show the mock-ups of your work based on the interview, and solicit feedback.
          • Give the interviewee(s) the opportunity to review your notes or recording and add value where needed.

      Solve the problem before it occurs with interview troubleshooting techniques

      The interview process may grind to a halt due to challenging situations. Below are common scenarios and corresponding troubleshooting techniques to get your interview back on track.

      Scenario Technique
      Quiet interviewee Begin all interviews by asking courteous and welcoming questions. This technique will warm the interviewee up and make them feel more comfortable. Ask prompting questions during periods of silence in the interview. Take note of the answers provided by the interviewee in your interview guide, along with observations and impact statements that occur throughout the duration of the interview process.
      Disgruntled interviewee Avoid creating a hostile environment by eliminating the interviewee’s perception that you are choosing to focus on issues that the interviewee feels will not be resolved. Ask questions to contextualize the issue. For example, ask why they feel a particular way about the issue, and determine whether they have valid concerns that you can resolve.
      Interviewee has issues articulating their answer Encourage the interviewee to use a whiteboard or pen and paper to kick start their thought process. Make sure you book a room with these resources readily available.

      Understand different elicitation techniques – Observation

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Casual Observation The process of observing stakeholders performing tasks where the stakeholders are unaware they are being observed. Capture true behavior through observation of stakeholders performing tasks without informing them they are being observed. This information can be valuable for mapping business process; however, it is difficult to isolate the core business activities from unnecessary actions. Low Medium
      Formal Observation The process of observing stakeholders performing tasks where the stakeholders are aware they are being observed. Formal observation allows BAs to isolate and study the core activities in a business process because the stakeholder is aware they are being observed. Stakeholders may become distrusting of the BA and modify their behavior if they feel their job responsibilities or job security are at risk Low Medium

      Info-Tech Insight

      Observing stakeholders does not uncover any information about the target state. Be sure to use contextual observation in conjunction with other techniques to discover the target state.

      Understand different elicitation techniques – Surveys

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Closed-Response Survey A survey that has fixed responses for each answer. A Likert-scale (or similar measures) can be used to have respondents evaluate and prioritize possible requirements. Closed response surveys can be sent to large groups and used to quickly gauge user interest in different functional areas. They are easy for users to fill out and don’t require a high investment of time. However, their main deficit is that they are likely to miss novel requirements not listed. As such, closed response surveys are best used after initial elicitation or brainstorming to validate feature groups. Low Medium
      Open-Response Survey A survey that has open-ended response fields. Questions are fixed, but respondents are free to populate the field in their own words. Open-response surveys take longer to fill out than closed, but can garner deeper insights. Open-response surveys are a useful supplement (and occasionally replacement) for group elicitation techniques, like focus groups, when you need to receive an initial list of requirements from a broad cross-section of stakeholders. Their primary shortcoming is the analyst can’t immediately follow up on interesting points. However, they are particularly useful for reaching stakeholders who are unavailable for individual one-on-ones or group meetings. Low Medium

      Info-Tech Insight

      Surveys can be useful mechanisms for initial drafting of raw requirements (open-response) and gauging user interest in proposed requirements or feature sets (closed-response). However, they should not be the sole focus of your elicitation program due to lack of interactivity and two-way dialogue with the BA.

      Be aware: Know the implications of leveraging surveys

      What are surveys?

      Surveys take a sample population’s written responses for data collection. Survey respondents can identify themselves or choose to remain anonymous. Anonymity removes the fear of repercussions for giving critical responses to sensitive topics.

      Who needs to be involved?

      Participants of a survey include the survey writer, respondent(s), and results compiler. There is a moderate amount of work that comes from both the writer and compiler, with little work involved on the end of the respondent.

      What are the benefits?

      The main benefit of surveys is their ability to reach large population groups and segments without requiring personal interaction, thus saving money. Surveys are also very responsive and can be created and modified rapidly to address needs as they arise on an on-going basis.

      When is it best to employ a survey method?

      Surveys are most valuable when completed early in the requirements gathering stage.

      Intake and Scoping → Requirements Gathering → Solution Design → Development/ Procurement → Implementation/ Deployment

      When a project is announced, develop surveys to gauge what users consider must-have, should-have, and could-have requirements.

      Use surveys to profile the demand for specific requirements.

      It is often difficult to determine if requirements are must haves or should haves. Surveys are a strong method to assist in narrowing down a wide range of requirements.

      • If all survey respondents list the same requirement, then that requirement is a must have.
      • If no participants mention a requirement, then that requirement is not likely to be important to project success.
      • If the results are scattered, it could be that the organization is unsure of what is needed.

      Are surveys worth the time and effort? Most of the time.

      Surveys can generate insights. However, there are potential barriers:

      • Well-constructed surveys are difficult to make – asking the right questions without being too long.
      • Participants may not take surveys seriously, giving non-truthful or half-hearted answers.

      Surveys should only be done if the above barriers can easily be overcome.

      Scenario: Survey used to gather potential requirements

      Scenario

      There is an unclear picture of the business needs and functional requirements for a solution.

      Survey Approach

      Use open-ended questions to allow respondents to propose requirements they see as necessary.

      Sample questions

      • What do you believe _______ (project) should include to be successful?
      • How can _______ (project) be best made for you?
      • What do you like/dislike about ________ (process that the project will address)?

      What to do with your results

      Take a step back

      If you are using surveys to elicit a large number of requirements, there is probably a lack of clear scope and vision. Focus on scope clarification. Joint development sessions are a great technique for defining your scope with SMEs.

      Moving ahead

      • Create additional surveys. Additional surveys can help narrow down the large list of requirements. This process can be reiterated until there is a manageable number of requirements.
      • Move onto interviews. Speak directly with the users to get a grasp of the importance of the requirements taken from surveys.

      Employ survey design best practices

      Proper survey design determines how valuable the responses will be. Review survey principles released by the University of Wisconsin-Madison.

      Provide context

      Include enough detail to contextualize questions to the employee’s job duties.

      Where necessary:

      • Include conditions
      • Timeline considerations
      • Additional pertinent details

      Give clear instructions

      When introducing a question identify if it should be answered by giving one answer, multiple answers, or a ranking of answers.

      Avoid IT jargon

      Ensure the survey’s language is easily understood.

      When surveying colleagues from the business use their own terms, not IT’s.

      E.g. laptops vs. hardware

      Saying “laptops” is more detailed and is a universal term.

      Use ranges

      Recommended:

      In a month your Outlook fails:

      • 1-3 times
      • 4-7 times
      • 7+ times

      Not Recommended:

      Your Outlook fails:

      • Almost never
      • Infrequently
      • Frequently
      • Almost always

      Keep surveys short

      Improve responses and maintain stakeholder interest by only including relevant questions that have corresponding actions.

      Recommended: Keep surveys to ten or less prompts.

      Scenario: Survey used to narrow down requirements

      Scenario

      There is a large list of requirements and the business is unsure of which ones to further pursue.

      Survey Approach

      Use closed-ended questions to give degrees of importance and rank requirements.

      Sample questions

      • How often do you need _____ (requirement)?
        • 1-3 times a week; 4-6 times a week; 7+ times a week
      • Given the five listed requirements below, rank each requirement in order of importance, with 1 being the most important and 5 being the least important.
      • On a scale from 1-5, how important is ________ (requirement)?
        • 1 – Not important at all; 2 – Would provide minimal benefit; 3 – Would be nice to have; 4 – Would provide substantial benefit; 5 – Crucial to success

      What to do with your results

      Determine which requirements to further explore

      Avoid simply aggregating average importance and using the highest average as the number-one priority. Group the highest average importance requirements to be further explored with other elicitation techniques.

      Moving ahead

      The group of highly important requirements needs to be further explored during interviews, joint development sessions, and rapid development sessions.

      Scenario: Survey used to discover crucial hidden requirements

      Scenario

      The business wanted a closer look into a specific process to determine if the project could be improved to better address process issues.

      Survey Approach

      Use open-ended questions to allow employees to articulate very specific details of a process.

      Sample questions

      • While doing ________ (process/activity), what part is the most frustrating to accomplish? Why?
      • Is there any part of ________ (process/activity) that you feel does not add value? Why?
      • How would you improve _________ (process/activity)?

      What to do with your results

      Set up prototyping

      Prototype a portion with the new requirement to see if it meets the user’s needs. Joint application development and rapid development sessions pair developers and users together to collaboratively build a solution.

      Next steps

      • Use interviews to begin solution mapping. Speak to SMEs and the users that the requirement would affect. Understand how to properly incorporate the discovered requirement(s) into the solution.
      • Create user stories. User stories allow developers to step into the shoes of the users. Document the user’s requirement desires and their reason for wanting it. Give those user stories to the developers.

      Explore mediums for survey delivery

      Online

      Free online surveys offer quick survey templates but may lack customization. Paid options include customizable features. Studies show that most participants find web-based surveys more appealing, as web surveys tend to have a higher rate of completion.

      Potential Services (Not a comprehensive list)

      SurveyMonkey – free and paid options

      Good Forms – free options

      Ideal for:

      • Low complexity surveys
      • High complexity surveys
      • Quick responses
      • Low cost (free survey options)

      Paper

      Paper surveys offer complete customizability. However, paper surveys take longer to distribute and record, and are also more expensive to administer.

      Ideal for:

      • Low complexity surveys
      • High complexity surveys
      • Quick responses
      • Low cost

      Internally-developed

      Internally-developed surveys can be distributed via the intranet or email. Internal surveys offer the most customization. Cost is the creator’s time, but cost can be saved on distribution versus paper and paid online surveys.

      Ideal for:

      • Low complexity surveys
      • High complexity surveys
      • Quick responses
      • Low cost (if created quickly)

      Understand different elicitation techniques – Focus Groups

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Focus Group Focus groups are sessions held between a small group (typically ten individuals or less) and an experienced facilitator who leads the conversation in a productive direction. Focus groups are highly effective for initial requirements brainstorming. The best practice is to structure them in a cross-functional manner to ensure multiple viewpoints are represented, and the conversation doesn’t become dominated by one particular individual. Facilitators must be wary of groupthink in these meetings (i.e. the tendency to converge on a single POV). Medium Medium
      Workshop Workshops are larger sessions (typically ten people or more) that are led by a facilitator, and are dependent on targeted exercises. Workshops may be occasionally decomposed into smaller group sessions. Workshops are highly versatile: they can be used for initial brainstorming, requirement prioritization, constraint identification, and business process mapping. Typically, the facilitator will use exercises or activities (such as whiteboarding, sticky note prioritization, role-playing, etc.) to get participants to share and evaluate sets of requirements. The main downside to workshops is a high time commitment from both stakeholders and the BA. Medium High

      Info-Tech Insight

      Group elicitation techniques are most useful for gathering a wide spectrum of requirements from a broad group of stakeholders. Individual or observational techniques are typically needed for further follow-up and in-depth analysis with critical power users or sponsors.

      Conduct focus groups and workshops

      There are two specific types of group interviews that can be utilized to elicit requirements: focus groups and workshops. Understand each type’s strengths and weaknesses to determine which is better to use in certain situations.

      Focus Groups Workshops
      Description
      • Small groups are encouraged to speak openly about topics with guidance from a facilitator.
      • Larger groups are led by a facilitator to complete target exercises that promote hands-on learning.
      Strengths
      • Highly effective for initial requirements brainstorming.
      • Insights can be explored in depth.
      • Any part of the requirements gathering process can be done in a workshop.
      • Use of activities can increase the learning beyond simple discussions.
      Weaknesses
      • Loudest voice in the room can induce groupthink.
      • Discussion can easily veer off topic.
      • Extremely difficult to bring together such a large group for extended periods of time.
      Facilitation Guidance
      • Make sure the group is structured in a cross-functional manner to ensure multiple viewpoints are represented.
      • If the group is too large, break the members into smaller groups. Try putting together members who would not usually interact.

      Solution mapping and joint review sessions should be used for high-touch, high-rigor BPM-centric projects

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Solution Mapping Session A one-on-one session to outline business processes. BPM methods are used to write possible target states for the solution on a whiteboard and to engineer requirements based on steps in the model. Solution mapping should be done with technically savvy stakeholders with a firm understanding of BPM methodologies and nomenclature. Generally, this type of elicitation method should be done with stakeholders who participated in tier one elicitation techniques who can assist with reverse-engineering business models into requirement lists. Medium Medium
      Joint Requirements Review Session This elicitation method is sometimes used as a last step prior to moving to formal requirements analysis. During the review session, the rough list of requirements is vetted and confirmed with stakeholders. A one-on-one (or small group) requirements review session gives your BAs the opportunity to ensure that what was recorded/transcribed during previous one-on-ones (or group elicitation sessions) is materially accurate and representative of the intent of the stakeholder. This elicitation step allows you to do a preliminary clean up of the requirements list before entering the formal analysis phase. Low Low

      Info-Tech Insight

      Solution mapping and joint requirements review sessions are more advanced elicitation techniques that should be employed after preliminary techniques have been utilized. They should be reserved for technically sophisticated, high-value stakeholders.

      Interactive whiteboarding and joint development sessions should be leveraged for high-rigor BPM-based projects

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Interactive White- boarding A group session where either a) requirements are converted to BPM diagrams and process flows, or b) these flows are reverse engineered to distil requirement sets. While the focus of workshops and focus groups is more on direct requirements elicitation, interactive whiteboarding sessions are used to assist with creating initial solution maps (or reverse engineering proposed solutions into requirements). By bringing stakeholders into the process, the BA benefits from a greater depth of experience and access to SMEs. Medium Medium
      Joint Application Development (JAD) JAD sessions pair end-user teams together with developers (and BA facilitators) to collect requirements and begin mapping and developing prototypes directly on the spot. JAD sessions fit well with organizations that use Agile processes. They are particularly useful when the overall project scope is ambiguous; they can be used for project scoping, requirements definition, and initial prototyping. JAD techniques are heavily dependent on having SMEs in the room – they should preference knowledge power users over the “rank and file.” High High

      Info-Tech Insight

      Interactive whiteboarding should be heavily BPM-centric, creating models that link requirements to specific workflow activities. Joint development sessions are time-consuming but create greater cohesion and understanding between BAs, developers, and SMEs.

      Rapid application development sessions add some Agile aspects to requirements elicitation

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Rapid Application Development A form of prototyping, RAD sessions are akin to joint development sessions but with greater emphasis on back-and-forth mock-ups of the proposed solution. RAD sessions are highly iterative – requirements are gathered in sessions, developers create prototypes offline, and the results are validated by stakeholders in the next meeting. This approach should only be employed in highly Agile-centric environments. High High

      For more information specific to using the Agile development methodology, refer to the project blueprint Implement Agile Practices That Work.

      The role of the BA differs with an Agile approach to requirements gathering. A traditional BA is a subset of the Agile BA, who typically serves as product owner. Agile BAs have elevated responsibilities that include bridging communication between stakeholders and developers, prioritizing and detailing the requirements, and testing solutions.

      Overview of JAD and RDS techniques (Part 1)

      Use the following slides to gain a thorough understanding of both JAD and rapid development sessions (RDS) to decide which fits your project best.

      Joint Application Development Rapid Development Sessions
      Description JAD pairs end users and developers with a facilitator to collect requirements and begin solution mapping to create an initial prototype. RDS is an advanced approach to JAD. After an initial meeting, prototypes are developed and validated by stakeholders. Improvements are suggested by stakeholders and another prototype is created. This process is iterated until a complete solution is created.
      Who is involved? End users, SMEs, developers, and a facilitator (you).
      Who should use this technique? JAD is best employed in an Agile organization. Agile organizations can take advantage of the high amount of collaboration involved. RDS requires a more Agile organization that can effectively and efficiently handle impromptu meetings to improve iterations.
      Time/effort versus value JAD is a time/effort-intensive activity, requiring different parties at the same time. However, the value is well worth it. JAD provides clarity for the project’s scope, justifies the requirements gathered, and could result in an initial prototype. RDS is even more time/effort intensive than JAD. While it is more resource intensive, the reward is a more quickly developed full solution that is more customized with fewer bugs.

      Overview of JAD and RDS techniques (Part 2)

      Joint Application Development

      Timeline

      Projects that use JAD should not expect dramatically quicker solution development. JAD is a thorough look at the elicitation process to make sure that the right requirements are found for the final solution’s needs. If done well, JAD eliminates rework.

      Engagement

      Employees vary in their project engagement. Certain employees leverage JAD because they care about the solution. Others are asked for their expertise (SMEs) or because they perform the process often and understand it well.

      Implications

      JAD’s thorough process guarantees that requirements gathering is done well.

      • All requirements map back to the scope.
      • SMEs are consulted throughout the duration of the process.
      • Prototyping is only done after final solution mapping is complete.

      Rapid Development Sessions

      Timeline

      Projects that use RDS can either expect quicker or slower requirements gathering depending on the quality of iteration. If each iteration solves a requirement issue, then one can expect that the solution will be developed fairly rapidly. If the iterations fail to meet requirements the process will be quite lengthy.

      Engagement

      Employees doing RDS are typically very engaged in the project and play a large role in helping to create the solution.

      Implications

      RDS success is tied to the organization’s ability to collaborate. Strong collaboration will lead to:

      • Fewer bugs as they are eliminated in each iteration.
      • A solution that is highly customized to meet the user’s needs.

      Poor collaboration will lead to RDS losing its full value.

      When is it best to use JAD?

      JAD is best employed in an Agile organization for application development and selection. This technique best serves relatively complicated, large-scale projects that require rapid or sequential iterations on a prototype or solution as a part of requirements gathering elicitation. JAD effectuates each step in the elicitation process well, from initial elicitation to narrowing down requirements.

      When tackling a project type you’ve never attempted

      Most requirement gathering professionals will use their experience with project type standards to establish key requirements. Avoid only relying on standards when tackling a new project type. Apply JAD’s structured approach to a new project type to be thorough during the elicitation phase.

      In tandem with other elicitation techniques

      While JAD is an overarching requirements elicitation technique, it should not be the only one used. Combine the strengths of other elicitation techniques for the best results.

      When is it best to use RDS?

      RDS is best utilized when one, but preferably both, of the below criteria is met.

      When the scope of the project is small to medium sized

      RDS’ strengths lie in being able to tailor-make certain aspects of the solution. If the solution is too large, tailor-made sections are impossible as multiple user groups have different needs or there is insufficient resources. When a project is small to medium sized, developers can take the time to custom make sections for a specific user group.

      When most development resources are readily available

      RDS requires developers spending a large amount of time with users, leaving less time for development. Having developers at the ready to take on users’ improvement maintains the effectiveness of RDS. If the same developer who speaks to users develops the entire iteration, the process would be slowed down dramatically, losing effectiveness.

      Techniques to compliment JAD/RDS

      1. Unstructured conversations

      JAD relies on unstructured conversations to clarify scope, gain insights, and discuss prototyping. However, a structure must exist to guarantee that all topics are discussed and meetings are not wasted.

      2. Solution mapping and interactive white-boarding

      JAD often involves visually illustrating how high-level concepts connect as well as prototypes. Use solution mapping and interactive whiteboarding to help users and participants better understand the solution.

      3. Focus groups

      Having a group development session provides all the benefits of focus groups while reducing time spent in the typically time-intensive JAD process.

      Plan how you will execute JAD

      Before the meeting

      1. Prepare for the meeting

      Email all parties a meeting overview of topics that will be discussed.

      During the meeting

      2. Discussion

      • Facilitate the conversation according to what is needed (e.g. skip scope clarification if it is already well defined).
      • Leverage solution mapping and other visual aids to appeal to all users.
      • Confirm with SMEs that requirements will meet the users’ needs.
      • Discuss initial prototyping.

      After the meeting

      3. Wrap-up

      • Provide a key findings summary and set of agreements.
      • Outline next steps for all parties.

      4. Follow-up

      • Send the mock-up of any agreed upon prototype(s).
      • Schedule future meetings to continue prototyping.

      JAD provides a detail-oriented view into the elicitation process. As a facilitator, take detailed notes to maximize the outputs of JAD.

      Plan how you will execute RDS

      Before the meeting

      1. Prepare for the meeting

      • Email all parties a meeting overview.
      • Ask employees and developers to bring their vision of the solution, regardless of its level of detail.

      During the meeting

      2. Hold the discussion

      • Facilitate the conversation according to what is needed (e.g. skip scope clarification if already well defined).
      • Have both parties explain their visions for the solution.
      • Talk about initial prototype and current iteration.

      After the meeting

      3. Wrap-up

      • Provide a key findings summary and agreements.
      • Outline next steps for all parties.

      4. Follow-up

      • Send the mock-up of any agreed upon prototype(s).
      • Schedule future meeting to continue prototyping.

      RDS is best done in quick succession. Keep in constant contact with both employees and developers to maintain positive momentum from a successful iteration improvement.

      Develop a tailored facilitation guide for JAD and RDS

      JAD/RDS are both collaborative activities, and as with all group activities, issues are bound to arise. Be proactive and resolve issues using the following guidelines.

      Scenario Technique
      Employee and developer visions for the solution don’t match up Focus on what both solutions have in common first to dissolve any tension. Next, understand the reason why both parties have differences. Was it a difference in assumptions? Difference in what is a requirement? Once the answer has been determined, work on bridging the gaps. If there is no resolution, appoint a credible authority (or yourself) to become the final decision maker.
      Employee has difficulty understanding the technical aspect of the developer’s solution Translate the developer’s technical terms into a language that the employee understands. Encourage the employee to ask questions to further their understanding.
      Employee was told that their requirement or proposed solution is not feasible Have a high-level member of the development team explain how the requirement/solution is not feasible. If it’s possible, tell the employee that the requirement can be done in a future release and keep them updated.

      Harvest documentation from past projects to uncover reusable requirements

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Legacy System Manuals The process of reviewing documentation and manuals associated with legacy systems to identify constraints and exact requirements for reuse. Reviewing legacy systems and accompanying documentation is an excellent way to gain a preliminary understanding of the requirements for the upcoming application. Be careful not to overly rely on requirements from legacy systems; if legacy systems have a feature set up one way, this does not mean it should be set up the same way on the upcoming application. If an upcoming application must interact with other systems, it is ideal to understand the integration points early. None High
      Historical Projects The process of reviewing documentation from historical projects to extract reusable requirements. Previous project documentation can be a great source of information and historical lessons learned. Unfortunately, historical projects may not be well documented. Historical mining can save a great deal of time; however, the fact that it was done historically does not mean that it was done properly. None High

      Info-Tech Insight

      Document mining is a laborious process, and as the term “mining” suggests the yield will vary. Regardless of the outcome, document mining must be performed and should be viewed as an investment in the requirements gathering process.

      Extract internal and external constraints from business rules, policies, and glossaries

      Technique Description Assessment and Best Practices Stakeholder Effort BA Effort
      Rules The process of extracting business logic from pre-existing business rules (e.g. explicit or implied workflows). Stakeholders may not be fully aware of all of the business rules or the underlying rationale for the rules. Unfortunately, business rule documents can be lengthy and the number of rules relevant to the project will vary. None High
      Glossary The process of extracting terminology and definitions from glossaries. Terminology and definitions do not directly lead to the generation of requirements. However, reviewing glossaries will allow BAs to better understand domain SMEs and interpret their requirements. None High
      Policy The process of extracting business logic from business policy documents (e.g. security policy and acceptable use). Stakeholders may not be fully aware of the different policies or the underlying rationale for why they were created. Going directly to the source is an excellent way to identify constraints and requirements. Unfortunately, policies can be lengthy and the number of items relevant to the project will vary. None High

      Info-Tech Insight

      Document mining should be the first type of elicitation activity that is conducted because it allows the BA to become familiar with organizational terminology and processes. As a result, the stakeholder facing elicitation sessions will be more productive.

      Review the different types of formal documentation (Part 1)

      1. Glossary

      Extract terminology and definitions from glossaries. A glossary is an excellent source to understand the terminology that SMEs will use.

      2. Policy

      Pull business logic from policy documents (e.g. security policy and acceptable use). Policies generally have mandatory requirements for projects, such as standard compliance requirements.

      3. Rules

      Review and reuse business logic that comes from pre-existing rules (e.g. explicit or implied workflows). Like policies, rules often have mandatory requirements or at least will require significant change for something to no longer be a requirement.

      Review the different types of formal documentation (Part 2)

      4. Legacy System

      Review documents and manuals of legacy systems, and identify reusable constraints and requirements. Benefits include:

      • Gain a preliminary understanding of general organizational requirements.
      • Ease of solution integration with the legacy system if needed.

      Remember to not use all of the basic requirements of a legacy system. Always strive to find a better, more productive solution.

      5. Historical Projects

      Review documents from historical projects to extract reusable requirements. Lessons learned from the company’s previous projects are more applicable than case studies. While historical projects can be of great use, consider that previous projects may not be well documented.

      Drive business alignment as an output from documentation review

      Project managers frequently state that aligning projects to the business goals is a key objective of effective project management; however, it is rarely carried out throughout the project itself. This gap is often due to a lack of understanding around how to create true alignment between individual projects and the business needs.

      Use company-released statements and reports

      Extract business wants and needs from official statements and reports (e.g. press releases, yearly reports). Statements and reports outline where the organization wants to go which helps to unearth relevant project requirements.

      Ask yourself, does the project align to the business?

      Documented requirements should always align with the scope of the project and the business objectives. Refer back frequently to your set of gathered requirements to check if they are properly aligned and ensure the project is not veering away from the original scope and business objectives.

      Don’t just read for the sake of reading

      The largest problem with documentation review is that requirements gathering professionals do it for the sake of saying they did it. As a result, projects often go off course due to not aligning to business objectives following the review sessions.

      • When reading a document, take notes to avoid projects going over time and budget and business dissatisfaction. Document your notes and schedule time to review the set of complete notes with your team following the individual documentation review.

      Select elicitation techniques that match the elicitation scenario

      There is a time and place for each technique. Don’t become too reliant on the same ones. Diversify your approach based on the elicitation goal.

      A chart showing Elicitation Scenarios and Techniques, with each marked for their efficacy.

      This table shows the relative strengths and weaknesses of each elicitation technique compared against the five basic elicitation scenarios.

      A typical project will encounter most of the elicitation scenarios. Therefore, it is important to utilize a healthy mix of techniques to optimize effectiveness.

      Very Strong = Very Effective

      Strong = Effective

      Medium = Somewhat Effective

      Weak = Minimally Effective

      Very Weak = Not Effective

      Record the approved elicitation techniques that your BAs should use

      2.1.2 – 30 minutes

      Input
      • Approved elicitation techniques
      Output
      • Execution procedure
      Materials
      • Whiteboard
      • Markers
      Participants
      • Business stakeholders
      • BAs

      Record the approved elicitation methods and best practices for each technique in the SOP.

      Identify which techniques should be utilized with the different stakeholder classes.

      Segment the different techniques based by project complexity level.

      Use the following chart to record the approved techniques.

      Stakeholder L1 Projects L2 Projects L3 Projects L4 Projects
      Senior Management Structured Interviews
      Project Sponsor Unstructured Interviews
      SME (Business) Focus Groups Unstructured Interviews
      Functional Manager Focus Groups Structured Interviews
      End Users Surveys; Focus Groups; Follow-Up Interviews; Observational Techniques

      Document the output from this exercise in section 4.0 of the Requirements Gathering SOP and BA Playbook.

      Confirm initial elicitation notes with stakeholders

      Open lines of communication with stakeholders and keep them involved in the requirements gathering process; confirm the initial elicitation before proceeding.

      Confirming the notes from the elicitation session with stakeholders will result in three benefits:

      1. Simple miscommunications can compound and result in costly rework if they aren’t caught early. Providing stakeholders with a copy of notes from the elicitation session will eliminate issues before they manifest themselves in the project.
      2. Stakeholders often require an absorption period after elicitation sessions to reflect on the meeting. Following up with stakeholders gives them an opportunity to clarify, enhance, or change their responses.
      3. Stakeholders will become disinterested in the project (and potentially the finished application) if their involvement in the project ends after elicitation. Confirming the notes from elicitation keeps them involved in the process and transitions stakeholders into the analysis phase.

      This is the Confirm stage of the Confirm, Verify, Approve process.

      “Are these notes accurate and complete?”

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.1 Understand the different elicitation techniques

      An analyst will walk you through the different elicitation techniques including observations, document reviews, surveys, focus groups, and interviews, and highlight the level of effort required for each.

      2.1.2 Select and record the approved elicitation techniques

      An analyst will facilitate the discussion to determine which techniques should be utilized with the different stakeholder classes.

      Step 2.2: Structure Elicitation Output

      Phase 1

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      Phase 2

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      Phase 3

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      Phase 4

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      This step will walk you through the following activities:
      • Build use-case models.
      • Practice using elicitation techniques with business stakeholders to build use-case models.
      • Practice leveraging user stories to convey requirements.
      This step involves the following participants:
      • BAs
      • Business stakeholders
      Outcomes of this step
      • Understand the value of use-case models for requirements gathering.
      • Practice different techniques for building use-case models with stakeholders.

      Record and capture requirements in solution-oriented formats

      Unstructured notes for each requirement are difficult to manage and create ambiguity. Using solution-oriented formats during elicitation sessions ensures that the content can be digested by IT and business users.

      This table shows common solution-oriented formats for recording requirements. Determine which formats the development team and BAs are comfortable using and create a list of acceptable formats to use in projects.

      Format Description Examples
      Behavior Diagrams These diagrams describe what must happen in the system. Business Process Models, Swim Lane Diagram, Use Case Diagram
      Interaction Diagrams These diagrams describe the flow and control of data within a system. Sequence Diagrams, Entity Diagrams
      Stories These text-based representations take the perspective of a user and describe the activities and benefits of a process. Scenarios, User Stories

      Info-Tech Insight

      Business process modeling is an excellent way to visually represent intricate processes for both IT and business users. For complex projects with high business significance, business process modeling is the best way to capture requirements and create transformational gains.

      Use cases give projects direction and guidance from the business perspective

      Use Case Creation Process

      Define Use Cases for Each Stakeholder

      • Each stakeholder may have different uses for the same solution. Identify all possible use cases attributed to the stakeholders.
      • All use cases are possible test case scenarios.

      Define Applications for Each Use Case

      • Applications are the engines behind the use cases. Defining the applications to satisfy use cases will pinpoint the areas where development or procurement is necessary.

      Consider the following guidelines:

      1. Don’t involve systems in the use cases. Use cases just identify the key end-user interaction points that the proposed solution is supposed to cover.
      2. Some use cases are dependent on other use cases or multiple stakeholders may be involved in a single use case. Depending on the availability of these use cases, they can either be all identified up front (Waterfall) or created at various iterations (Agile).
      3. Consider the enterprise architecture perspective. Existing enterprise architecture designs can provide a foundation of current requirement mappings and system structure. Reuse these resources to reduce efforts.
      4. Avoid developing use cases in isolation. Reusability is key in reducing designing efforts. By involving multiple departments, requirement clashes can be avoided and the likelihood of reusability increases.

      Develop practical use cases to help drive the development effort in the right direction

      Evaluating the practicality and likelihood of use cases is just as important as developing them.

      Use cases can conflict with each other. In certain situations, specific requirements of these use cases may clash with one another even though they are functionally sound. Evaluate use-case requirements and determine how they satisfy the overall business need.

      Use cases are not necessarily isolated; they can be nested. Certain functionalities are dependent on the results of another action, often in a hierarchical fashion. By mapping out the expected workflows, BAs can determine the most appropriate way to implement.

      Use cases can be functionally implemented in many ways. There could be multiple ways to accomplish the same use case. Each of these needs to be documented so that functional testing and user documentation can be based on them.

      Nested Use Case Examples:

      Log Into Account ← Depends on (Nested) Ordering Products Online
      Enter username and password Complete order form
      Verify user is a real person Process order
      Send user forgotten password message Check user’s account
      Send order confirmation to user

      Build a use-case model

      2.2.1 – 45 minutes

      Input
      • Sub processes
      Output
      • Use case model
      Materials
      • Whiteboard
      • Markers
      Participants
      • Business stakeholders
      • BAs
      Demonstrate how to use elicitation techniques to build use cases for the project.
      1. Identify a sub-process to build the use-case model. Begin the exercise by giving a brief description of the purpose of the meeting.
      2. For each stakeholder, draw a stick figure on the board. Pose the question “If you need to do X, what is your first step?” Go through the process until the end goal and draw each step. Ensure that you capture triggers, causes, decision points, outcomes, tools, and interactions.
      3. Starting at the beginning of the diagram, go through each step again and check with stakeholders if the step can be broken down into more granular steps.
      4. Ask the stakeholder if there are any alternative flows that people use, or any exceptions to process steps. If there are, map these out on the board.
      5. Go back through each step and ask the stakeholder where the current process is causing them grief, and where modification should be made.
      6. Record this information in the Business Requirements Document Template.

      Build a use-case model

      2.2.1

      Example: Generate Letters

      Inspector: Log into system → Search for case → Identify recipient → Determine letter type → Print letter

      Admin: Receive letter from inspector → Package and mail letter

      Citizen: Receive letter from inspector

      Understand user stories and profiles

      What are they?

      User stories describe what requirement a user wants in the solution and why they want it. The end goal of a user story is to create a simple description of a requirement for developers.

      When to use them

      User stories should always be used in requirements gathering. User stories should be collected throughout the elicitation process. Try to recapture user stories as new project information is released to capture any changes in end-customer needs.

      What’s the benefit?

      User stories help capture target users, customers, and stakeholders. They also create a “face” for individual user requirements by providing user context. This detail enables IT leaders to associate goals and end objectives with each persona.

      Takeaway

      To better understand the characteristics driving user requirements, begin to map objectives to separate user personas that represent each of the project stakeholders.

      Are user stories worth the time and effort?

      Absolutely.

      A user’s wants and needs serve as a constant reminder to developers. Developers can use this information to focus on how a solution needs to accomplish a goal instead of only focusing on what goals need to be completed.

      Create customized user stories to guide or structure your elicitation output

      Instructions

      1. During surveys, interviews, and development sessions, ask participants the following questions:
        • What do you want from the solution?
        • Why do you want that?
      2. Separate the answer into an “I want to” and “So that” format.
        • For users who give multiple “I want to” and “So that” statements, separate them into their respective pairs.
      3. Place each story on a small card that can easily be given to developers.
      As a I want to So that Size Priority
      Developer Learn network and system constraints The churn between Operations and I will be reduced. 1 point Low

      Team member

      Increase the number of demonstrations I can achieve greater alignment with business stakeholders. 3 points High
      Product owner Implement a user story prioritization technique I can delegate stories in my product backlog to multiple Agile teams. 3 points Medium

      How to make an effective and compelling user story

      Keep your user stories short and impactful to ensure that they retain their impact.

      Follow a simple formula:

      As a [stakeholder title], I want to [one requirement] so that [reason for wanting that requirement].

      Use this template for all user stories. Other formats will undermine the point of a user story. Multiple requirements from a single user must be made into multiple stories and given to the appropriate developer. User stories should fit onto a sticky note or small card.

      Example

      As an: I want to: So that:
      Administrator Integrate with Excel File transfer won’t possibly lose information
      X Administrator Integrate with Excel and Word File transfer won’t possibly lose information

      While the difference between the two may be small, it would still undermine the effectiveness of a user story. Different developers may work on the integration of Excel or Word and may not receive this user story.

      Assign user stories a size and priority level

      Designate a size to user stories

      Size is an estimate of how many resources must be dedicated to accomplish the want. Assign a size to each user story to help determine resource allocation.

      Assign business priority to user stories

      Based on how important the requirement is to project success, assign each user story a rating of high, medium, or low. The priority given will dictate which requirements are completed first.

      Example:

      Scope: Design software to simplify financial reporting

      User Story Estimated Size Priority
      As an administrator, I want to integrate with Excel so that file transfer won’t possibly lose information. Low High
      As an administrator, I want to simplify graph construction so that I can more easily display information for stakeholders. High Medium

      Combine both size and priority to decide resource allocation. Low-size, high-priority tasks should always be done first.

      Group similar user stories together to create greater impact

      Group user stories that have the same requirement

      When collecting user stories, many will be centered around the same requirement. Group similar user stories together to show the need for that requirement’s inclusion in the solution.

      Even if it isn’t a must-have requirement, if the number of similar user stories is high enough, it would become the most important should-have requirement.

      Group together user stories such as these:
      As an I want So that
      Administrator To be able to create bar graphs Information can be more easily illustrated
      Accountant To be able to make pie charts Budget information can be visually represented

      Both user stories are about creating charts and would be developed similarly.

      Leave these user stories separate
      As an I want So that
      Administrator The program to auto-save Information won’t be lost during power outages
      Accountant To be able to save to SharePoint My colleagues can easily view and edit my work

      While both stories are about saving documents, the development of each feature is vastly different.

      Create customized user profiles

      User profiles are a way of grouping users based on a significant shared details (e.g. in the finance department, website user).

      Go beyond the user profile

      When creating the profile, consider more than the group’s name. Ask yourself the following questions:

      • What level of knowledge and expertise does this user profile have with this type of software?
      • How much will this user profile interact with the solution?
      • What degree of dependency will this user profile have on the solution?

      For example, if a user profile has low expertise but interacts and depends heavily on the program, a more thorough tutorial of the FAQ section is needed.

      Profiles put developers in user’s shoes

      Grouping users together helps developers put a face to the name. Developers can then more easily empathize with users and develop an end solution that is directly catered to their needs.

      Leverage group activities to break down user-story sizing techniques

      Work in groups to run through the following story-sizing activities.

      Planning Poker: This approach uses the Delphi method where members estimate the size of each user story by revealing numbered cards. These estimates are then discussed and agreed upon as a group.

      • Planning poker generates discussion about variances in estimates but dominant personalities may lead to biased results or groupthink.

      Team Sort: This approach can assist in expediting estimation when you are handling numerous user stories.

      • Bucket your user stories into sizes (e.g. extra-small, small, medium, large, and extra-large) based on an acceptable benchmark that may change from project to project.
      • Collaborate as a team to conclude the final size.
      • Next, translate these sizes into points.

      The graphic shows the two activities described, Planning Poker and Team Sort. In the Planning Poker image, 3 sets of cards are shown, with the numbers 13, 5, and 1 on the top of each set. At the bottom of the image are 7 cards, labelled with: 1, 2, 3, 5, 8, 13, 21. In the Team Sort section, there is an arrow pointing in both directions, representing a spectrum from XS to XL. Each size is assigned a point value: XS is 1; S is 3; M is 5; L is 10; and XL is 20. Cards with User Story # written on them are arranged along the spectrum.

      Create a product backlog to communicate business needs to development teams

      Use the product backlog to capture expected work and create a roadmap for the project by showing what requirements need to be delivered.

      How is the product owner involved?

      • The product owner is responsible for keeping in close contact with the end customer and making the appropriate changes to the product backlog as new ideas, insights, and impediments arise.
      • The product owner should have good communication with the team to make accurate changes to the product backlog depending on technical difficulties and needs for clarification.

      How do I create a product backlog?

      • Write requirements in user stories. Use the format: “As a (user role), I want (function) so that (benefit).” Identify end users and understand their needs.
      • Assign each requirement a priority. Decide which requirements are the most important to deliver. Ask yourself, “Which user story will create the most value?”

      What are the approaches to generate my backlog?

      • Team Brainstorming – The product owner, team, and scrum master work together to write and prioritize user stories in a single or a series of meetings.
      • Business Case – The product owner translates business cases into user stories as per the definition of “development ready.”

      Epics and Themes

      As you begin to take on larger projects, it may be advantageous to organize and group your user stories to simplify your release plan:

      • Epics are collections of similar user stories and are used to describe significant and large development initiatives.
      • Themes are collections of similar epics and are normally used to define high-level business objectives.

      To avoid confusion, the pilot product backlog will be solely composed of user stories.

      Example:

      Theme: Increase user exposure to corporate services through mobile devices
      Epic: Access corporate services through a mobile application Epic: Access corporate services through mobile website
      User Story: As a user, I want to find the closest office so that I can minimize travel time As a user, I want to find the closest office so that I can minimize travel time User Story: As a user, I want to submit a complaint so that I can improve company processes

      Simulate product backlog creation

      Overview

      Leverage Info-Tech’s Scrum Documentation Template, using the Backlog and Planning tab, to help walk you through this activity.

      Instructions

      1. Have your product owner describe the business objectives of the pilot project.
      2. Write the key business requirements as user stories.
      3. Based on your business value drivers, identify the business value of your user stories (high, medium, low).
      4. Have your team review the user stories and question the story’s value, priority, goal, and meaning.
      5. Break down the user stories if the feature or business goal is unclear or too large.
      6. Document the perceived business value of each user story, as well as the priority, goal, and meaning.

      Examples:

      As a citizen, I want to know about road construction so that I can save time when driving. Business Value: High

      As a customer, I want to find the nearest government office so that I can register for benefits. Business Value: Medium

      As a voter, I want to know what each candidate believes in so that I can make an informed decision. Business Value: High

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.2.1 Build use-case models

      An analyst will assist in demonstrating how to use elicitation techniques to build use-case models. The analyst will walk you through the table testing to visually map out and design process flows for each use case.

      Phase 3: Analyze and Validate Requirements

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Analyze and Validate Requirements

      Proposed Time to Completion: 1 week
      Step 3.1: Create Analysis Framework

      Start with an analyst kick off call:

      • Create policies for requirements categorization and prioritization.

      Then complete these activities…

      • Create functional requirements categories.
      • Consolidate similar requirements and eliminate redundancies.
      • Prioritize requirements.

      With these tools & templates:

      • Requirements Gathering Documentation Tool
      Step 3.2: Validate Business Requirements

      Review findings with analyst:

      • Establish best practices for validating the BRD with project stakeholders.

      Then complete these activities…

      • Right-size the BRD.
      • Present the BRD to business stakeholders.
      • Translate business requirements into technical requirements.
      • Identify testing opportunities.

      With these tools & templates:

      • Business Requirements Document Template
      • Requirements Gathering Testing Checklist

      Phase 3 Results & Insights:

      • Standardized frameworks for analysis and validation of business requirements

      Step 3.1: Create Analysis Framework

      Phase 1

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      Phase 2

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      Phase 3

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      Phase 4

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      This step will walk you through the following activities:
      • Categorize requirements.
      • Eliminate redundant requirements.
      This step involves the following participants:
      • BAs
      Outcomes of this step
      • Prioritized requirements list.

      Analyze requirements to de-duplicate them, consolidate them – and most importantly – prioritize them!

      he image is the Requirements Gathering Framework, shown earlier. All parts of the framework are greyed-out, except for the arrow containing the word Analyze in the center of the image, with three bullet points beneath it that read: Organize; Prioritize; Verify

      The analysis phase is where requirements are compiled, categorized, and prioritized to make managing large volumes easier. Many organizations prematurely celebrate being finished the elicitation phase and do not perform adequate diligence in this phase; however, the analysis phase is crucial for a smooth transition into validation and application development or procurement.

      Categorize requirements to identify and highlight requirement relationships and dependencies

      Eliciting requirements is an important step in the process, but turning endless pages of notes into something meaningful to all stakeholders is the major challenge.

      Begin the analysis phase by categorizing requirements to make locating, reconciling, and managing them much easier. There are often complex relationships and dependencies among requirements that do not get noted or emphasized to the development team and as a result get overlooked.

      Typically, requirements are classified as functional and non-functional at the high level. Functional requirements specify WHAT the system or component needs to do and non-functional requirements explain HOW the system must behave.

      Examples

      Functional Requirement: The application must produce a sales report at the end of the month.

      Non-Functional Requirement: The report must be available within one minute after midnight (EST) of the last day of the month. The report will be available for five years after the report is produced. All numbers in the report will be displayed to two decimal places.

      Categorize requirements to identify and highlight requirement relationships and dependencies

      Further sub-categorization of requirements is necessary to realize the full benefit of categorization. Proficient BAs will even work backwards from the categories to drive the elicitation sessions. The categories used will depend on the type of project, but for categorizing non-functional requirements, the Volere Requirements Resources has created an exhaustive list of sub-categories.

      Requirements Category Elements

      Example

      Look & Feel Appearance, Style

      User Experience

      Usability & Humanity Ease of Use, Personalization, Internationalization, Learning, Understandability, Accessibility Language Support
      Performance Speed, Latency, Safety, Precision, Reliability, Availability, Robustness, Capacity, Scalability, Longevity Bandwidth
      Operational & Environmental Expected Physical Environment, Interfacing With Adjacent Systems, Productization, Release Heating and Cooling
      Maintainability & Support Maintenance, Supportability, Adaptability Warranty SLAs

      Security

      Access, Integrity, Privacy, Audit, Immunity Intrusion Prevention
      Cultural & Political Global Differentiation Different Statutory Holidays
      Legal Compliance, Standards Hosting Regulations

      What constitutes good requirements

      Complete – Expressed a whole idea or statement.

      Correct – Technically and legally possible.

      Clear – Unambiguous and not confusing.

      Verifiable – It can be determined that the system meets the requirement.

      Necessary – Should support one of the project goals.

      Feasible – Can be accomplished within cost and schedule.

      Prioritized – Tracked according to business need levels.

      Consistent – Not in conflict with other requirements.

      Traceable – Uniquely identified and tracked.

      Modular – Can be changed without excessive impact.

      Design-independent – Does not pose specific solutions on design.

      Create functional requirement categories

      3.1.1 – 1 hour

      Input
      • Activity 2.2.1
      Output
      • Requirements categories
      Materials
      • Whiteboard
      • Markers
      • Sticky notes
      Participants
      • BAs
      Practice the techniques for categorizing requirements.
      1. Divide the list of requirements that were elicited for the identified sub-process in exercise 2.2.1 among smaller groups.
      2. Have groups write the requirements on red, yellow, or green sticky notes, depending on the stakeholder’s level of influence.
      3. Along the top of the whiteboard, write the eight requirements categories, and have each group place the sticky notes under the category where they believe they should fit.
      4. Once each group has posted the requirements, review the board and discuss any requirements that should be placed in another category.

      Document any changes to the requirements categories in section 5.1 of the Requirements Gathering SOP and BA Playbook.

      Create functional requirement categories

      The image depicts a whiteboard with different colored post-it notes grouped into the following categories: Look & Feel; Usability & Humanity; Legal; Maintainability & Support; Operational & Environmental; Security; Cultural & Political; and Performance.

      Consolidate similar requirements and eliminate redundancies

      Clean up requirements and make everyone’s life simpler!

      After elicitation, it is very common for an organization to end up with redundant, complementary, and conflicting requirements. Consolidation will make managing a large volume of requirements much easier.

      Redundant Requirements Owner Priority
      1. The application shall feed employee information into the payroll system. Payroll High
      2. The application shall feed employee information into the payroll system. HR Low
      Result The application shall feed employee information into the payroll system. Payroll & HR High
      Complementary Requirements Owner Priority
      1. The application shall export reports in XLS and PDF format. Marketing High
      2. The application shall export reports in CSV and PDF format. Finance High
      Result The application shall export reports in XLS, CSV, and PDF format. Marketing & Finance High

      Info-Tech Insight

      When collapsing redundant or complementary requirements, it is imperative that the ownership and priority metadata be preserved for future reference. Avoid consolidating complementary requirements with drastically different priority levels.

      Identify and eliminate conflict between requirements

      Conflicting requirements are unavoidable; identify and resolve them as early as possible to minimize rework and grief.

      Conflicting requirements occur when stakeholders have requirements that either partially or fully contradict one another, and as a result, it is not possible or practical to implement all of the requirements.

      Steps to Resolving Conflict:

      1. Notify the relevant stakeholders of the conflict and search for a basic solution or compromise.
      2. If the stakeholders remain in a deadlock, appoint a final decision maker.
      3. Schedule a meeting to resolve the conflict with the relevant stakeholders and the decision maker. If multiple conflicts exist between the same stakeholder groups, try to resolve as many as possible at once to save time and encourage reciprocation.
      4. Give all parties the opportunity to voice their rationale and objectively rate the priority of the requirement. Attempt to reach an agreement, consensus, or compromise.
      5. If the parties remain in a deadlock, encourage the final decision maker to weigh in. Their decision should be based on which party has the greater need for the requirement, the difficulty to implement the requirement, and which requirement better aligns with the project goals.

      Info-Tech Insight

      Resolve conflicts whenever possible during the elicitation phase by using cross-functional workshops to facilitate discussions that address and settle conflicts in the room.

      Consolidate similar requirements and eliminate redundancies

      3.1.2 – 30 minutes

      Input
      • Activity 3.1.1
      Output
      • Requirements categories
      Materials
      • Whiteboard
      • Markers
      • Sticky notes
      Participants
      • BAs

      Review the outputs from the last exercise and ensure that the list is mutually exclusive by consolidating similar requirements and eliminating redundancies.

      1. Looking at each category in turn, review the sticky notes and group similar, complementary, and conflicting notes together. Put a red dot on any conflicting requirements to be used in a later exercise.
      2. Have the group start by eliminating the redundant requirements.
      3. Have the group look at the complementary requirements, and consolidate each into a single requirement. Discard originals.
      4. Record this information in the Requirements Gathering Documentation Tool.

      Prioritize requirements to assist with solution modeling

      Prioritization is the process of ranking each requirement based on its importance to project success. Hold a separate meeting for the domain SMEs, implementation SMEs, project managers, and project sponsors to prioritize the requirements list. At the conclusion of the meeting, each requirement should be assigned a priority level. The implementation SMEs will use these priority levels to ensure efforts are targeted towards the proper requirements as well as to plan features available on each release. Use the MoSCoW Model of Prioritization to effectively order requirements.

      The MoSCoW Model of Prioritization

      The image shows the MoSCoW Model of Prioritization, which is shaped like a pyramid. The sections, from top to bottom (becoming incrementally larger) are: Must Have; Should Have; Could Have; and Won't Have. There is additional text next to each category, as follows: Must have - Requirements must be implemented for the solution to be considered successful.; Should have: Requirements are high priority that should be included in the solution if possible.; Could Have: Requirements are desirable but not necessary and could be included if resources are available.; Won't Have: Requirements won’t be in the next release, but will be considered for the future releases.

      The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994 (Source: ProductPlan).

      Base your prioritization on the right set of criteria

      Effective Prioritization Criteria

      Criteria

      Description

      Regulatory & Legal Compliance These requirements will be considered mandatory.
      Policy Compliance Unless an internal policy can be altered or an exception can be made, these requirements will be considered mandatory.
      Business Value Significance Give a higher priority to high-value requirements.
      Business Risk Any requirement with the potential to jeopardize the entire project should be given a high priority and implemented early.
      Likelihood of Success Especially in proof-of-concept projects, it is recommended that requirements have good odds.
      Implementation Complexity Give a higher priority to low implementation difficulty requirements.
      Alignment With Strategy Give a higher priority to requirements that enable the corporate strategy.
      Urgency Prioritize requirements based on time sensitivity.
      Dependencies A requirement on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.

      Info-Tech Insight

      It is easier to prioritize requirements if they have already been collapsed, resolved, and rewritten. There is no point in prioritizing every requirement that is elicited up front when some of them will eventually be eliminated.

      Use the Requirements Gathering Documentation Tool to steer your requirements gathering approach during a project

      3.1 Requirements Gathering Documentation Tool

      Use the Requirements Gathering Documentation Tool to identify and track stakeholder involvement, elicitation techniques, and scheduling, as well as to track categorization and prioritization of requirements.

      • Use the Identify Stakeholders tab to:
        • Identify the stakeholder's name and role.
        • Identify their influence and involvement.
        • Identify the elicitation techniques that you will be using.
        • Identify who will be conducting the elicitation sessions.
        • Identify if requirements were validated post elicitation session.
        • Identify when the elicitation will take place.
      • Use the Categorize & Prioritize tab to:
        • Identify the stakeholder.
        • Identify the core function.
        • Identify the business requirement.
        • Describe the requirement.
        • Identify the categorization of the requirement.
        • Identify the level of priority of the requirement.

      Prioritize requirements

      3.1.3 – 30 minutes

      Input
      • Requirements list
      • Prioritization criteria
      Output
      • Prioritized requirements
      Materials
      • Whiteboard
      • Markers
      • Sticky notes
      Participants
      • BAs
      • Business stakeholders

      Using the output from the MoSCoW model, prioritize the requirements according to those you must have, should have, could have, and won’t have.

      1. As a group, review each requirement and decide if the requirement is:
        1. Must have
        2. Should have
        3. Could have
        4. Won’t have
      2. Beginning with the must-have requirements, determine if each has any dependencies. Ensure that each of the dependencies are moved to the must-have category. Group and circle the dependent requirements.
      3. Continue the same exercise with the should-have and could-have options.
      4. Record the results in the Requirements Gathering Documentation Tool.

      Step 1 – Prioritize requirements

      3.1.3

      The image shows a whiteboard, with four categories listed at the top: Must Have; Should Have; Could Have; Won't Have. There are yellow post-it notes under each category.

      Step 2-3 – Prioritize requirements

      This image is the same as the previous image, but with the additions of two dotted line squares under the Must Have category, with arrows pointing to them from post-its in the Should have category.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      3.1.1 Create functional requirements categories

      An analyst will facilitate the discussion to brainstorm and determine criteria for requirements categories.

      3.1.2 Consolidate similar requirements and eliminate redundancies

      An analyst will facilitate a session to review the requirements categories to ensure the list is mutually exclusive by consolidating similar requirements and eliminating redundancies.

      3.1.3 Prioritize requirements

      An analyst will facilitate the discussion on how to prioritize requirements according to the MoSCoW prioritization framework. The analyst will also walk you through the exercise of determining dependencies for each requirement.

      Step 3.2: Validate Business Requirements

      Phase 1

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      Phase 2

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      Phase 3

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      Phase 4

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      This step will walk you through the following activities:
      • Build the BRD.
      • Translate functional requirements to technical requirements.
      • Identify testing opportunities.

      This step involves the following participants:

      • BAs

      Outcomes of this step

      • Finalized BRD.

      Validate requirements to ensure that they meet stakeholder needs – getting sign-off is essential

      The image is the Requirements Gathering Framework shown previously. In this instance, all aspects of the graphic are greyed out with the exception of the Validate arrow, right of center. Below the arrow are three bullet points: Translate; Allocate; Approve.

      The validation phase involves translating the requirements, modeling the solutions, allocating features across the phased deployment plan, preparing the requirements package, and getting requirement sign-off. This is the last step in the Info-Tech Requirements Gathering Framework.

      Prepare a user-friendly requirements package

      Before going for final sign-off, ensure that you have pulled together all of the relevant documentation.

      The requirements package is a compilation of all of the business analysis and requirements gathering that occurred. The document will be distributed among major stakeholders for review and sign-off.

      Some may argue that the biggest challenge in the validation phase is getting the stakeholders to sign off on the requirements package; however, the real challenge is getting them to actually read it. Often, stakeholders sign the requirements document without fully understanding the scope of the application, details of deployment, and how it affects them.

      Remember, this document is not for the BAs; it’s for the stakeholders. Make the package with the stakeholders in mind. Create multiple versions of the requirements package where the length and level of technical details is tailored to the audience. Consider creating a supplementary PowerPoint version of the requirements package to present to senior management.

      Contents of Requirements Package:

      • Project Charter (if available)
      • Overarching Project Goals
      • Categorized Business Requirements
      • Selected Solution Proposal
      • Rationale for Solution Selection
      • Phased Roll-Out Plan
      • Proposed Schedule/Timeline
      • Signatures Page

      "Sit down with your stakeholders, read them the document line by line, and have them paraphrase it back to you so you’re on the same page." – Anonymous City Manager of IT Project Planning Info-Tech Interview

      Capture requirements in a dedicated BRD

      The BRD captures the original business objectives and high-level business requirements for the system/process. The system requirements document (SRD) captures the more detailed functional and technical requirements.

      The graphic is grouped into two sections, indicated by brackets on the right side, the top section labelled BRD and the lower section labelled as SRD. In the BRD section, a box reads Needs Identified in the Business Case. An arrow points from the bottom of the box down to another box labelled Use Cases. In the SRD section, there are three arrows pointing from the Use Cases box to three boxes in a row. They are labelled Functionality; Usability; and Constraints. Each of these boxes has a plus sign between it and the next in the line. At the bottom of the SRD section is a box with text that reads: Quality of Service Reliability, Supportability, and Performance

      Use Info-Tech’s Business Requirements Document Template to specify the business needs and expectations

      3.2 Business Requirements Document Template

      The Business Requirements Document Template can be used to record the functional, quality, and usability requirements into formats that are easily consumable for future analysis, architectural and design activities, and most importantly in a format that is understandable by all business partners.

      The BRD is designed to take the reader from a high-level understanding of the business processes down to the detailed automation requirements. It should capture the following:

      • Project summary and background
      • Operating model
      • Business process model
      • Use cases
      • Requirements elicitation techniques
      • Prioritized requirements
      • Assumptions and constraints

      Rightsize the BRD

      3.2.1 – 30 minutes

      Input
      • Project levels
      • BRD categories
      Output
      • BRD
      Materials
      • Whiteboard
      • Markers
      Participants
      • BAs
      • Business stakeholders

      Build the required documentation for requirements gathering.

      1. On the board, write out the components of the BRD. As a group, review the headings and decide if all sections are needed for level 1 & 2 and level 3 & 4 projects. Your level 3-4 project business cases will have the most detailed business cases; consider your level 1-2 projects, and remove any categories you don’t believe are necessary for the project level.
      2. Now that you have a right-sized template, break the team into two groups and have each group complete one section of the template for your selected project.
        1. Project overview
        2. Implementation considerations
      3. Once complete, have each group present its section, and allow the group to make additions and modifications to each section.

      Document the output from this exercise in section 6 of the Requirements Gathering SOP and BA Playbook.

      Present the BRD to business stakeholders

      3.2.2 – 1 hour

      Input
      • Activity 3.2.1
      Output
      • BRD presentation
      Materials
      • Whiteboard
      • Markers
      Participants
      • Business stakeholders

      Practice presenting the requirements document to business stakeholders.

      1. Hold a meeting with a group of selected stakeholders, and have a representative present each section of the BRD for your project.
      2. Instruct participants that they should spend the majority of their time on the requirements section, in particular the operating model and the requirements prioritization.
      3. At the end of the meeting, have the business stakeholders validate the requirements, and approve moving forward with the project or indicate where further requirements gathering must take place.

      Example:

      Typical Requirements Gathering Validation Meeting Agenda
      Project overview 5 minutes
      Project operating model 10 minutes
      Prioritized requirements list 5 minutes
      Business process model 30 minutes
      Implementation considerations 5 minutes

      Translate business requirements into technical requirements

      3.2.3 – 30 minutes

      Input
      • Business requirements
      Output
      • BRD presentation
      Materials
      • Whiteboard
      • Markers
      Participants
      • Business stakeholders
      • BAs
      • Developers

      Practice translating business requirements into system requirements.

      1. Bring in representatives from the development team, and have a representative walk them through the business process model.
      2. Present a detailed account of each business requirement, and work with the IT team to build out the system requirements for each.
      3. Document the system requirements in the Requirements Gathering Documentation Tool.

      For requirements traceability, ensure you’re linking your requirements management back to your test strategy

      After a solution has been fully deployed, it’s critical to create a strong link between your software testing strategy and the requirements that were collected. User acceptance testing (UAT) is a good approach for requirement verification.

      • Many organizations fail to create an explicit connection between their requirements gathering and software testing strategies. Don’t follow their example!
      • When conducting UAT, structure exercises in the context of the requirements; run through the signed-off list and ask users whether or not the deployed functionality was in line with the expectations outlined in the finalized requirements documentation.
      • If not – determine whether it was a miscommunication on the requirements management side or a failure of the developers (or procurement team) to meet the agreed-upon requirements.

      Download the Requirements Gathering Testing Checklist template.

      Identify the testing opportunities

      3.2.4 – 30 minutes

      Input
      • List of requirements
      Output
      • Requirements testing process
      Materials
      • Whiteboard
      • Markers
      Participants
      • BAs
      • Developers

      Identify how to test the effectiveness of different requirements.

      1. Ask the group to review the list of requirements and identify:
        1. Which kinds of requirements enable constructive testing efforts?
        2. Which kinds of requirements enable destructive testing efforts?
        3. Which kinds of requirements support end-user acceptance testing?
        4. What do these validation-enabling objectives mean in terms of requirement specificity?
      2. For each, identify who will do the testing and at what stage.

      Verify that the requirements still meet the stakeholders’ needs

      Keep the stakeholders involved in the process in between elicitation and sign-off to ensure that nothing gets lost in transition.

      After an organization’s requirements have been aggregated, categorized, and consolidated, the business requirements package will begin to take shape. However, there is still a great deal of work to complete. Prior to proceeding with the process, requirements should be verified by domain SMEs to ensure that the analyzed requirements continue to meet their needs. This step is often overlooked because it is laborious and can create additional work; however, the workload associated with verification is much less than the eventual rework stemming from poor requirements.

      All errors in the requirements gathering process eventually surface; it is only a matter of time. Control when these errors appear and minimize costs by soliciting feedback from stakeholders early and often.

      This is the Verify stage of the Confirm, Verify, Approve process.

      “Do these requirements still meet your needs?”

      Put it all together: obtain final requirements sign-off

      Use the sign-off process as one last opportunity to manage expectations, obtain commitment from the stakeholders, and minimize change requests.

      Development or procurement of the application cannot begin until the requirements package has been approved by all of the key stakeholders. This will be the third time that the stakeholders are asked to review the requirements; however, this will be the first time that the stakeholders are asked to sign off on them.

      It is important that the stakeholders understand the significance of their signatures. This is their last opportunity to see exactly what the solution will look like and to make change requests. Ensure that the stakeholders also recognize which requirements were omitted from the solution that may affect them.

      The sign-off process needs to mean something to the stakeholders. Once a signature is given, that stakeholder must be accountable for it and should not be able to make change requests. Note that there are some requests from senior stakeholders that can’t be refused; use discretion when declining requests.

      This is the Approve stage of the Confirm, Verify, Approve process.

      "Once requirements are signed off, stay firm on them!" – Anonymous Hospital Business Systems Analyst Info-Tech Interview

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with out Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.2.1; 3.2.2 Rightsize the BRD and present it to business stakeholders

      An analyst will facilitate the discussion to gather the required documentation for building the BRD. The analyst will also assist with practicing the presenting of each section of the document to business stakeholders.

      3.2.3; 3.2.4 Translate business requirements into technical requirements and identify testing opportunities

      An analyst will facilitate the session to practice translating business requirements into testing requirements and assist in determining how to test the effectiveness of different requirements.

      Phase 4: Create a Requirements Governance Action Plan

      Phase 4 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Create a Requirements Governance Action Plan

      Proposed Time to Completion: 3 weeks

      Step 4.1: Create Control Processes for Requirements Changes

      Start with an analyst kick off call:

      • Discuss how to handle changes to requirements and establish a formal change control process.

      Then complete these activities…

      • Develop a change control process.
      • Build the guidelines for escalating changes.
      • Confirm your requirements gathering process.
      • Define RACI for the requirements gathering process.

      With these tools & templates:

      • Requirements Traceability Matrix
      Step 4.2: Build Requirements Governance and Communication Plan

      Review findings with analyst:

      • Review options for ongoing governance of the requirements gathering process.

      Then complete these activities…

      • Define the requirements gathering steering committee purpose.
      • Define the RACI for the RGSC.
      • Define procedures, cadence, and agenda for the RGSC.
      • Identify and analyze stakeholders.
      • Create a communications management plan.
      • Build the requirements gathering process implementation timeline.

      With these tools & templates:

      Requirements Gathering Communication Tracking Template

      Phase 4 Results & Insights:
      • Formalized change control and governance processes for requirements.

      Step 4.1: Create Control Processes for Requirements Changes

      Phase 1

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      Phase 2

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      Phase 3

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      Phase 4

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      This step will walk you through the following activities:
      • Develop change control process.
      • Develop change escalation process.
      This step involves the following participants:
      • BAs
      • Business stakeholders
      Outcomes of this step
      • Requirements gathering process validation.
      • RACI completed.

      Manage, communicate, and test requirements

      The image is the Requirement Gathering Framework graphic from previous sections. In this instance, all parts of the image are greyed out, with the exception of the arrows labelled Communicate and Manage, located at the bottom of the image.

      Although the manage, communicate, and test requirements section chronologically falls as the last section of this blueprint, that does not imply that this section is to be performed only at the end. These tasks are meant to be completed iteratively throughout the project to support the core requirements gathering tasks.

      Prevent requirements scope creep

      Once the stakeholders sign off on the requirements document, any changes need to be tracked and managed. To do that, you need a change control process.

      Thoroughly validating requirements should reduce the amount of change requests you receive. However, eliminating all changes is unavoidable.

      The BAs, sponsor, and stakeholders should have agreed upon a clearly defined scope for the project during the planning phase, but there will almost always be requests for change as the project progresses. Even a high number of small changes can negatively impact the project schedule and budget.

      To avoid scope creep, route all changes, including small ones, through a formal change control process that will be adapted depending on the level of project and impact of the change.

      Linking change requests to requirements is essential to understanding relevance and potential impact

      1. Receive project change request.
      2. Refer to requirements document to identify requirements associated with the change.
        • Matching requirement is found: The change is relevant to the project.
        • Multiple requirements are associated with the proposed change: The change has wider implications for the project and will require closer analysis.
        • The request involves a change or new business requirements: Even if the change is within scope, time, and budget, return to the stakeholder who submitted the request to identify the potentially new requirements that relate to this change. If the sponsor agrees to the new requirements, you may be able to approve the change.
      3. Findings influence decision to escalate/approve/reject change request.

      Develop a change control process

      4.1.1 – 45 minutes

      Input
      • Current change control process
      Output
      • Updated change control process
      Materials
      • Whiteboard
      • Markers
      Participants
      • BAs
      • Developers
      1. Ask the team to consider their current change control process. It might be helpful to discuss a project that is currently underway, or already completed, to provide context. Draw the process on the whiteboard through discussion with the team.
      2. If necessary, provide some cues. Below are some change control process activities:
        • Submit project change request form.
        • PM assesses change.
        • Project sponsor assesses change.
        • Bring request to project steering committee to assess change.
        • Approve/reject change.
      3. Ask participants to brainstorm a potential separate process for dealing with small changes. Add a new branch for minor changes, which will allow you to make decisions on when to bundle the changes versus implementing directly.

      Document any changes from this exercise in section 7.1 of the Requirements Gathering SOP and BA Playbook.

      Example change control process

      The image is an example of a change control process, depicted via a flowchart.

      Build guidelines for escalating changes

      4.1.2 – 1 hour

      Input
      • Current change control process
      Output
      • Updated change control process
      Materials
      • Whiteboard
      • Markers
      Participants
      • BAs
      • Developers

      Determine how changes will be escalated for level 1/2/3/4 projects.

      1. Write down the escalation options for level 3 & 4 projects on the whiteboard:
        • Final decision rests with project manager.
        • Escalate to sponsor.
        • Escalate to project steering committee.
        • Escalate to change control board.
      2. Brainstorm categories for assessing the impact of a change and begin creating a chart on the whiteboard by listing these categories in the far left column. Across the top, list the escalation options for level 3 & 4 projects.
      3. Ask the team to agree on escalation conditions for each escalation option. For example, for the final decision to rest with the project manager one condition might be:
        • Change is within original project scope.
      4. Review the output from exercise 4.1.1 and tailor the process model to meet level 3 & 4 escalation models.
      5. Repeat steps 1-4 for level 1 & 2 projects.

      Document any changes from this exercise in section 7.2 of the Requirements Gathering SOP and BA Playbook.

      Example: Change control process – Level 3 & 4

      Impact Category Final Decision Rests With Project Manager If: Escalate to Steering Committee If: Escalate to Change Control Board If: Escalate to Sponsor If:
      Scope
      • Change is within original project scope.
      • Change is out of scope.
      Budget
      • Change can be absorbed into current project budget.
      • Change will require additional funds exceeding any contingency reserves.
      • Change will require the release of contingency reserves.
      Schedule
      • Change can be absorbed into current project schedule.
      • Change will require the final project close date to be delayed.
      • Change will require a delay in key milestone dates.
      Requirements
      • Change can be linked to an existing business requirement.
      • Change will require a change to business requirements, or a new business requirement.

      Example: Change control process – Level 1 & 2

      Impact CategoryFinal Decision Rests With Project Manager If:Escalate to Steering Committee If:Escalate to Sponsor If:
      Scope
      • Change is within original project scope.
      • Change is out of scope.
      Budget
      • Change can be absorbed into current project budget, even if this means releasing contingency funds.
      • Change will require additional funds exceeding any contingency reserves.
      Schedule
      • Change can be absorbed into current project schedule, even if this means moving milestone dates.
      • Change will require the final project close date to be delayed.
      Requirements
      • Change can be linked to an existing business requirement.
      • Change will require a change to business requirements, or a new business requirement.

      Leverage Info-Tech’s Requirements Traceability Matrix to help create end-to-end traceability of your requirements

      4.1 Requirements Traceability Matrix

      Even if you’re not using a dedicated requirements management suite, you still need a way to trace requirements from inception to closure.
      • Ensuring traceability of requirements is key. If you don’t have a dedicated suite, Info-Tech’s Requirements Traceability Matrix can be used as a form of documentation.
      • The traceability matrix covers:
        • Association ID
        • Technical Assumptions and Needs
        • Functional Requirement
        • Status
        • Architectural Documentation
        • Software Modules
        • Test Case Number

      Info-Tech Deliverable
      Take advantage of Info-Tech’s Requirements Traceability Matrix to track requirements from inception through to testing.

      You can’t fully validate what you don’t test; link your requirements management back to your test strategy

      Create a repository to store requirements for reuse on future projects.

      • Reuse previously documented requirements on future projects to save the organization time, money, and grief. Well-documented requirements discovered early can even be reused in the same project.
      • If every module of the application must be able to save or print, then the requirement only needs to be written once. The key is to be able to identify and isolate requirements with a high likelihood of reuse. Typically, requirements pertaining to regulatory and business rule compliance are prime candidates for reuse.
      • Build and share a repository to store historical requirement documentation. The repository must be intuitive and easy to navigate, or users will not take advantage of it. Plan the information hierarchy in advance. Requirements management software suites have the ability to create a repository and easily migrate requirements over from past projects.
      • Assign one person to manage the repository to create consistency and accountability. This person will maintain the master requirements document and ensure the changes that take place during development are reflected in the requirements.

      Confirm your requirements gathering process

      4.1.3 – 45 minutes

      Input
      • Activity 1.2.4
      Output
      • Requirements gathering process model
      Materials
      • Whiteboard
      • Markers
      Participants
      • BAs

      Review the requirements gathering process and control levels for project levels 1/2/3/4 and add as much detail as possible to each process.

      1. Draw out the requirements gathering process for a level 4 project as created in exercise 1.2.4 on a whiteboard.
      2. Review each process step as a group, and break down each step so that it is at its most granular. Be sure to include each decision point, key documentation, and approvals.
      3. Once complete, review the process for level 3, 2 & 1. Reduce steps as necessary. Note: there may not be a lot of differentiation between your project level 4 & 3 or level 2 & 1 processes. You should see differentiation in your process between 2 and 3.

      Document the output from this exercise in section 2.4 of the Requirements Gathering SOP and BA Playbook.

      Example: Confirm your requirements gathering process

      The image is an example of a requirements gathering process, representing in the format of a flowchart.

      Define RACI for the requirements gathering process

      4.1.4 – 45 minutes

      Input
      • List of stakeholders
      Output
      • RACI matrix
      Materials
      • Whiteboard
      • Markers
      Participants
      • Business stakeholders

      Understand who is responsible, accountable, consulted, and informed for key elements of the requirements gathering process for project levels 1/2/3/4.

      1. As a group, identify the key stakeholders for requirements gathering and place those names along the top of the board.
      2. On the left side of the board, list the process steps and control points for a level 4 project.
      3. For each process step, identify who is responsible, accountable, informed, and consulted.
      4. Repeat this process for project levels 3, 2 & 1.

      Example: RACI for requirements gathering

      Project Requestor Project Sponsor Customers Suppliers Subject Matter Experts Vendors Executives Project Management IT Management Developer/ Business Analyst Network Services Support
      Intake Form A C C I R
      High-Level Business Case R A C C C C I I C
      Project Classification I I C I R A R
      Project Approval R R I I I I I I A I I
      Project Charter R C R R C R I A I R C C
      Develop BRD R I R C C C R A C C
      Sign-Off on BRD/ Project Charter R A R R R R
      Develop System Requirements C C C R I C A R R
      Sign-Off on SRD R R R I A R R
      Testing/Validation A I R C R C R I R R
      Change Requests R R C C A I R C
      Sign-Off on Change Request R A R R R R
      Final Acceptance R A R I I I I R R R I I

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      4.1.1; 4.1.2 Develop a change control process and guidelines for escalating changes

      An analyst will facilitate the discussion on how to improve upon your organization’s change control processes and how changes will be escalated to ensure effective tracking and management of changes.

      4.1.3 Confirm your requirements gathering process

      With the group, an analyst will review the requirements gathering process and control levels for the different project levels.

      4.1.4 Define the RACI for the requirements gathering process

      An analyst will facilitate a whiteboard exercise to understand who is responsible, accountable, informed, and consulted for key elements of the requirements gathering process.

      Step 4.2: Build Requirements Governance and Communication Plan

      Phase 1

      1.1 Understand the Benefits of Requirements Optimization

      1.2 Determine Your Target State for Requirements Gathering

      Phase 2

      2.1 Determine Elicitation Techniques

      2.2 Structure Elicitation Output

      Phase 3

      3.1 Create Analysis Framework

      3.2 Validate Business Requirements

      Phase 4

      4.1 Create Control Processes for Requirements Changes

      4.2 Build Requirements Governance and Communication Plan

      This step will walk you through the following activities:

      • Developing a requirements gathering steering committee.
      • Identifying and analyzing stakeholders for requirements governance.
      • Creating a communication management plan.

      This step involves the following participants:

      • Business stakeholders
      • BAs

      Outcomes of this step

      • Requirements governance framework.
      • Communication management plan.

      Establish proper governance for requirements gathering that effectively creates and communicates guiding principles

      If appropriate governance oversight doesn’t exist to create and enforce operating procedures, analysts and developers will run amok with their own processes.

      • One of the best ways to properly govern your requirements gathering process is to establish a working committee within the framework of your existing IT steering committee. This working group should be given the responsibility of policy formulation and oversight for requirements gathering operating procedures. The governance group should be comprised of both business and IT sponsors (e.g. a director, BA, and “voice of the business” line manager).
      • The governance team will not actually be executing the requirements gathering process, but it will be deciding upon which policies to adopt for elicitation, analysis, and validation. The team will also be responsible for ensuring – either directly or indirectly through designated managers – that BAs or other requirements gathering processionals are following the approved steps.

      Requirements Governance Responsibilities

      1. Provide oversight and review of SOPs pertaining to requirements elicitation, analysis, and validation.

      2. Establish corporate policies with respect to requirements gathering SOP training and education of analysts.

      3. Prioritize efforts for requirements optimization.

      4. Determine and track metrics that will be used to gauge the success (or failure) of requirements optimization efforts and make process and policy changes as needed.

      Right-size your governance structure to your organization’s complexity and breadth of capabilities

      Not all organizations will be best served by a formal steering committee for requirements gathering. Assess the complexity of your projects and the number of requirements gathering practitioners to match the right governance structure.

      Level 1: Working Committee
      • A working committee is convened temporarily as required to do periodic reviews of the requirements process (often annually, or when issues are surfaced by practitioners). This governance mechanism works best in small organizations with an ad hoc culture, low complexity projects, and a small number of practitioners.
      Level 2: IT Steering Committee Sub-Group
      • For organizations that already have a formal IT steering committee, a sub-group dedicated to managing the requirements gathering process is desirable to a full committee if most projects are complexity level 1 or 2, and/or there are fewer than ten requirements gathering practitioners.
      Level 3: Requirements Gathering Steering Committee
      • If your requirements gathering process has more than ten practitioners and routinely deals with high-complexity projects (like ERP or CRM), a standing formal committee responsible for oversight of SOPs will provide stronger governance than the first two options.
      Level 4: Requirements Gathering Center of Excellence
      • For large organizations with multiple business units, matrix organizations for BAs, and a very large number of requirements gathering practitioners, a formal center of excellence can provide both governance as well as onboarding and training for requirements gathering.

      Identify and analyze stakeholders

      4.2.1A – 1 hour

      Input
      • Number of practitioners, project complexity levels
      Output
      • Governance structure selection
      Materials
      • Whiteboard
      • Markers
      Participants
      • Business stakeholders

      Use a power map to determine which governance model best fits your organization.

      The image is a square, split into four equal sections, labelled as follows from top left: Requirements Steering Committee; Requirements Center of Excellence; IT Steering Committee Sub-Group; Working Committee. The left and bottom edges of the square are labelled as follows: on the left, with an arrow pointing upwards, Project Complexity; on the bottom, with arrow pointing right, # of Requirements Practitioners.

      Define your requirements gathering governance structure(s) and purpose

      4.2.1B – 30 minutes

      Input
      • Requirements gathering elicitation, analysis, and validation policies
      Output
      • Governance mandate
      Materials
      • Whiteboard
      • Markers
      Participants
      • Business stakeholders

      This exercise will help to define the purpose statement for the applicable requirements gathering governance team.

      1. As a group, brainstorm key words that describe the unique role the governance team will play. Consider value, decisions, and authority.
      2. Using the themes, come up with a set of statements that describe the overall purpose statement.
      3. Document the outcome for the final deliverable.

      Example:

      The requirements gathering governance team oversees the procedures that are employed by BAs and other requirements gathering practitioners for [insert company name]. Members of the team are appointed by [insert role] and are accountable to [typically the chair of the committee].

      Day-to-day operations of the requirements gathering team are expected to be at the practitioner (i.e. BA) level. The team is not responsible for conducting elicitation on its own, although members of the team may be involved from a project perspective.

      Document the output from this exercise in section 3.1 of the Requirements Gathering SOP and BA Playbook.

      A benefits provider established a steering committee to provide consistency and standardization in requirements gathering

      CASE STUDY

      Industry Not-for-Profit

      Source Info-Tech Workshop

      Challenge

      This organization is a not-for-profit benefits provider that offers dental coverage to more than 1.5 million people across three states.

      With a wide ranging application portfolio that includes in-house, custom developed applications as well as commercial off-the-shelf solutions, the company had no consistent method of gathering requirements.

      Solution

      The organization contracted Info-Tech to help build an SOP to put in place a rigorous and efficient methodology for requirements elicitation, analysis, and validation.

      One of the key realizations in the workshop was the need for governance and oversight over the requirements gathering process. As a result, the organization developed a Requirements Management Steering Committee to provide strategic oversight and governance over requirements gathering processes.

      Results

      The Requirements Management Steering Committee introduced accountability and oversight into the procedures that are employed by BAs. The Committee’s mandate included:

      • Provide oversight and review SOPs pertaining to requirements elicitation, analysis, and validation.
      • Establish corporate policies with respect to training and education of analysts on requirements gathering SOPs.
      • Prioritize efforts for requirements optimization.
      • Determine metrics that can be used to gauge the success of requirements optimization efforts.

      Authority matrix – RACI

      There needs to be a clear understanding of who is accountable, responsible, consulted, and informed about matters brought to the attention of the requirements gathering governance team.

      • An authority matrix is often used within organizations to indicate roles and responsibilities in relation to processes and activities.
      • Using the RACI model as an example, there is only one person accountable for an activity, although several people may be responsible for executing parts of the activity.
      • In this model, accountable means end-to-end accountability for the process. Accountability should remain with the same person for all activities of a process.

      RResponsible

      The one responsible for getting the job done.

      A – Accountable

      Only one person can be accountable for each task.

      C – Consulted

      Involvement through input of knowledge and information.

      I – Informed

      Receiving information about process execution and quality.

      Define the RACI for effective requirements gathering governance

      4.2.2 – 30 minutes

      Input
      • Members’ list
      Output
      • Governance RACI
      Materials
      • Whiteboard
      • Markers
      • Sticky notes
      Participants
      • Governance team members

      Build the participation list and authority matrix for the requirements gathering governance team.

      1. Have each participant individually consider the responsibilities of the governance team, and write five participant roles they believe should be members of the governance team.
      2. Have each participant place the roles on the whiteboard, group participants, and agree to five participants who should be members.
      3. On the whiteboard, write the responsibilities of the governance team in a column on the left, and place the sticky notes of the participant roles along the top of the board.
      4. Under the appropriate column for each activity, identify who is the “accountable,” “responsible,” “consulted,” and “informed” role for each activity.
      5. Agree to a governance chair.

      Document any changes from this exercise in section 3.1 of the Requirements Gathering SOP and BA Playbook.

      Example: Steps 2-5: Build the governance RACI

      The image shows an example governance RACI, with the top of the chart labelled with Committee Participants, and the left hand column labelled Committee Responsibilities. Some of the boxes have been filled in.

      Define your requirements gathering governance team procedures, cadence, and agenda

      4.2.3 – 30 minutes

      Input
      • Governance responsibilities
      Output
      • Governance procedures and agenda
      Materials
      • Whiteboard
      • Markers
      Participants
      • Steering committee members

      Define your governance team procedures, cadence, and agenda.

      1. Review the format of a typical agenda as well as the list of responsibilities for the governance team.
      2. Consider how you will address each of these responsibilities in the meeting, who needs to present, and how long each presentation should be.
      3. Add up the times to define the meeting duration.
      4. Consider how often you need to meet to discuss the information: monthly, quarterly, or annually? Are there different actions that need to be taken at different points in the year?
      5. As a group, decide how the governance team will approve changes and document any voting standards that should be included in the charter. Will a vote be taken during or prior to the meeting? Who will have the authority to break a tie?
      6. As a group, decide how the committee will review information and documentation. Will members commit to reviewing associated documents before the meeting? Can associated documentation be stored in a knowledge repository and/or be distributed to members prior to the meeting? Who will be responsible for this? Can a short meeting/conference call be held with relevant reviewers to discuss documentation before the official committee meeting?

      Review the format of a typical agenda

      4.2.3 – 30 minutes

      Meeting call to order [Committee Chair] [Time]
      Roll call [Committee Chair] [Time]
      Review of SOPs
      A. Requirements gathering dashboard review [Presenters, department] [Time]
      B. Review targets [Presenters, department] [Time]
      C. Policy Review [Presenters, department] [Time]

      Define the governance procedures and cadence

      4.2.3 – 30 minutes

      • The governance team or committee will be chaired by [insert role].
      • The team shall meet on a [insert time frame (e.g. monthly, semi-annual, annual)] basis. These meetings will be scheduled by the team or committee chair or designated proxy.
      • Approval for all SOP changes will be reached through a [insert vote consensus criteria (majority, uncontested, etc.)] vote of the governance team. The vote will be administered by the governance chair. Each member of the committee shall be entitled to one vote, excepting [insert exceptions].
      • The governance team has the authority to reject any requirements gathering proposal which it deems not to have made a sufficient case or which does not significantly contribute to the strategic objectives of [insert company name].
      • [Name of individual] will record and distribute the meeting minutes and documentation of business to be discussed in the meeting.

      Document any changes from this exercise in section 3.1 of the Requirements Gathering SOP and BA Playbook.

      Changing the requirements gathering process can be disruptive – be successful by gaining business support

      A successful communication plan involves making the initiative visible and creating staff awareness around it. Educate the organization on how the requirements gathering process will differ.

      People can be adverse to change and may be unreceptive to being told they must “comply” to new policies and procedures. Demonstrate the value in requirements gathering and show how it will assist people in their day-to-day activities.

      By demonstrating how an improved requirements gathering process will impact staff directly, you create a deeper level of understanding across lines-of-business, and ultimately a higher level of acceptance for new processes, rules, and guidelines.

      A proactive communication plan will:
      • Assist in overcoming issues with prioritization, alignment resourcing, and staff resistance.
      • Provide a formalized process for implementing new policies, rules, and guidelines.
      • Detail requirements gathering ownership and accountability for the entirety of the process.
      • Encourage acceptance and support of the initiative.

      Identify and analyze stakeholders to communicate the change process

      Who are the requirements gathering stakeholders?

      Stakeholder:

      • A stakeholder is any person, group, or organization who is the end user, owner, sponsor, or consumer of an IT project, change, or application.
      • When assessing an individual or group, ask whether they can impact or be impacted by any decision, change, or activity executed as part of the project. This might include individuals outside of the organization.

      Key Stakeholder:

      • Someone in a management role or someone with decision-making power who will be able to influence requirements and/or be impacted by project outcomes.

      User Group Representatives:

      • For impacted user groups, follow best practice and engage an individual to act as a representative. This individual will become the primary point of contact when making decisions that impact the group.

      Identify the reasons for resistance to change

      Stakeholders may resist change for a variety of reasons, and different strategies are necessary to address each.

      Unwilling – Individuals who are unwilling to change may need additional encouragement. For these individuals, you’ll need to reframe the situation and emphasize how the change will benefit them specifically.

      Unable – All involved requirements gathering will need some form of training on the process, committee roles, and responsibilities. Be sure to have training and support available for employees who need it and communicate this to staff.

      Unaware – Until people understand exactly what is going on, they will not be able to conform to the process. Communicate change regularly at the appropriate detail to encourage stakeholder support.

      Info-Tech Insight

      Resisters who have influence present a high risk to the implementation as they may encourage others to resist as well. Know where and why each stakeholder is likely to resist to mitigate risk. A detailed plan will ensure you have the needed documentation and communications to successfully manage stakeholder resistance.

      Identify and analyze stakeholders

      4.2.4 – 1 hour

      Input
      • Requirements gathering stakeholders list
      Output
      • Stakeholder power map
      Materials
      • Whiteboard
      • Markers
      • Sticky notes
      Participants
      • RGSC members

      Identify the impact and level of resistance of all stakeholders to come up with the right communication plan.

      1. Through discussion, generate a complete list of stakeholders for requirements gathering and record the names on the whiteboard or flip chart. Group related stakeholders together.
      2. Using the template on the next slide, draw the stakeholder power map.
      3. Evaluate each stakeholder on the list based on:
        1. Influence: To what degree can this stakeholder impact progress?
        2. Involvement: How involved is the stakeholder already?
        3. Support: Label supporters with green sticky notes, resisters with red notes, and the rest with a third color.
      4. Based on the assessment, write the stakeholder’s name on a green, red, or other colored sticky note, and place the sticky note in the appropriate place on the power map.
      5. For each of the stakeholders identified as resisters, determine why you think they would be resistant. Is it because they are unwilling, unable, and/or unknowing?
      6. Document changes to the stakeholder analysis in the Requirements Gathering Communication Tracking Template.

      Identify and analyze stakeholders

      4.2.4 – 1 hour

      Use a power map to plot key stakeholders according to influence and involvement.

      The image shows a power map, which is a square divided into 4 equally-sized sections, labelled from top left: Focused Engagement; Key Players; Keep Informed; Minimal Engagement. On the left side of the square, there is an arrow pointing upwards labelled Influence; at the bottom of the square, there is an arrow pointing right labelled Involvement. On the right side of the image, there is a legend indicating that a green dot indicates a Supporter; a grey dot indicated Neutral; and a red dot indicates a Resister.

      Example: Identify and analyze stakeholders

      Use a power map to plot key stakeholders according to influence and involvement.

      The image is the same power map image from the previous section, with some additions. A red dot is located at the top left, with a note: High influence with low involvement? You need a strategy to increase engagement. A green dot is located mid-high on the right hand side. Grey dots are located left and right in the bottom of the map. The bottom right grey dot has the note: High involvement with lower influence? Make sure to keep these stakeholders informed at regular intervals and monitor engagement.

      Stakeholder analysis: Reading the power map

      High Risk:

      Stakeholders with high influence who are not as involved in the project or are heavily impacted by the project are less likely to give feedback throughout the project lifecycle and need to be engaged. They are not as involved but have the ability to impact project success, so stay one step ahead.

      Do not limit your engagement to kick-off and close – you need to continue seeking input and support at all stages of the project.

      Mid Risk:

      Key players have high influence, but they are also more involved with the project or impacted by its outcomes and are thus easier to engage.

      Stakeholders who are heavily impacted by project outcomes will be essential to your organizational change management strategy. Do not wait until implementation to engage them in preparing the organization to accept the project – make them change champions.

      Low Risk:

      Stakeholders with low influence who are not impacted by the project do not pose as great of a risk, but you need to keep them consistently informed of the project and involve them at the appropriate control points to collect feedback and approval.

      Inputs to the communications plan

      Stakeholder analysis should drive communications planning.

      Identify Stakeholders
      • Who is impacted by this project?
      • Who can affect project outcomes?
      Assess Stakeholders
      • Influence
      • Involvement
      • Support
      Stakeholder Change Impact Assessment
      • Identify change supporters/resistors and craft change messages to foster acceptance.
      Stakeholder Register
      • Record assessment results and preferred methods of communication.
      The Communications Management Plan:
      • Who will receive information?
      • What information will be distributed?
      • How will information be distributed?
      • What is the frequency of communication?
      • What will the level of detail be?
      • Who is responsible for distributing information?

      Communicate the reason for the change and stay on message throughout the change

      Leaders of successful change spend considerable time developing a powerful change message: a compelling narrative that articulates the desired end state and makes the change concrete and meaningful to staff. They create the change vision with staff to build ownership and commitment.

      The change message should:

      • Explain why the change is needed.
      • Summarize the things that will stay the same.
      • Highlight the things that will be left behind.
      • Emphasize the things that are being changed.
      • Explain how the change will be implemented.
      • Address how the change will affect the various roles in the organization.
      • Discuss staff’s role in making the change successful.

      The five elements of communicating the reason for the change:

      COMMUNICATING THE CHANGE

      What is the change?

      Why are we doing it?

      How are we going to go about it?

      How long will it take us?

      What will the role be for each department and individual?

      Create a communications management plan

      4.2.5 – 45 minutes

      Input
      • Exercise 4.1.1
      Output
      • Communications management plan
      Materials
      • Whiteboard
      • Markers
      Participants
      • RGSC members

      Build the communications management plan around your stakeholders’ needs.

      1. Build a chart on the board using the template on the next slide.
      2. Using the list from exercise 4.1.1, brainstorm a list of communication vehicles that will need to be used as part of the rollout plan (e.g. status updates, training).
      3. Through group discussion, fill in all these columns for at least three communication vehicles:
        • (Target) audience
        • Purpose (description)
        • Frequency (of the communication)
          • The method, frequency, and content of communication vehicles will change depending on the stakeholder involved. This needs to be reflected by your plan. For example, you may have several rows for “Status Report” to cover the different stakeholders who will be receiving it.
        • Owner (of the message)
        • Distribution (method)
        • (Level of) details
          • High/medium/low + headings
      4. Document your stakeholder analysis in the Requirements Gathering Communication Tracking Template.

      Communications plan template

      4.2.5 – 45 minutes

      Sample communications plan: Status reports

      Vehicle Audience Purpose Frequency Owner Distribution Level of Detail
      Communications Guidelines
      • Regardless of complexity, it is important not to overwhelm stakeholders with information that is not relevant to them. Sending more detailed information than is necessary might mean that it does not get read.
      • Distributing reports too widely may lead to people assuming that someone else is reading it, causing them to neglect reading it themselves.
      • Only distribute reports to the stakeholders who need the information. Think about what information that stakeholder requires to feel comfortable.

      Example: Identify and analyze stakeholders

      Sample communications plan: Status reports

      Vehicle Audience Purpose Frequency Owner Distribution Level of Detail
      Status Report Sponsor Project progress and deliverable status Weekly Project Manager Email

      Details for

      • Milestones
      • Deliverables
      • Budget
      • Schedule
      • Issues
      Status Report Line of Business VP Project progress Monthly Project Manager Email

      High Level for

      • Major milestone update

      Build your requirements gathering process implementation timeline

      4.2.6 – 45 minutes

      Input
      • Parking lot items
      Output
      • Implementation timeline
      Materials
      • Whiteboard
      • Markers
      • Sticky notes
      Participants
      • RGSC members

      Build a high-level timeline for the implementation.

      1. Collect the action items identified throughout the week in the “parking lot.”
      2. Individually or in groups, brainstorm any additional action items. Consider communication, additional training required, approvals, etc.
        • Write these on sticky notes and add them to the parking lot with the others.
      3. As a group, start organizing these notes into logical groupings.
      4. Assign each of the tasks to a person or group.
      5. Identify any risks or dependencies.
      6. Assign each of the tasks to a timeline.
      7. Following the exercise, the facilitator will convert this into a Gantt chart using the roadmap for requirements gathering action plan.

      Step 3: Organize the action items into logical groupings

      4.2.6 – 45 minutes

      The image shows a board with 5 categories: Documentation, Approval, Communication, Process, and Training. There are groups of post-it notes under each category title.

      Steps 4-6: Organize the action items into logical groupings

      4.2.6 – 45 minutes

      This image shows a chart with Action Items to be listed in the left-most column, Person or Group Responsible in the next column, Risks/Dependencies in the next columns, and periods of time (i.e. 1-3 months, 2-6 months, etc.) in the following columns. The chart has been partially filled in as an exemplar.

      Recalculate the selected requirements gathering metrics

      Measure and monitor the benefits of requirements gathering optimization.

      • Reassess the list of selected and captured requirements management metrics.
      • Recalculate the metrics and analyze any changes. Don’t expect a substantial result after the first attempt. It will take a while for BAs to adjust to the Info-Tech Requirements Gathering Framework. After the third project, results will begin to materialize.
      • Understand that the project complexity and business significance will also affect how long it takes to see results. The ideal projects to beta the process on would be of low complexity and high business significance.
      • Realize that poor requirements gathering can have negative effects on the morale of BAs, IT, and project managers. Don’t forget to capture the impact of these through surveys.

      Major KPIs typically used for benchmarking include:

      • Number of application bugs/defects (for internally developed applications).
      • Number of support requests or help desk tickets for the application, controlled for user deployment levels.
      • Overall project cycle time.
      • Overall project cost.
      • Requirements gathering as a percentage of project time.

      Revisit the requirements gathering metrics selected in the planning phase and recalculate them after requirements gathering optimization has been attempted.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.2.1; 4.2.2; 4.2.3 – Build a requirements gathering steering committee

      The analyst will facilitate the discussion to define the purpose statement of the steering committee, build the participation list and authority matrix for its members, and define the procedures and agenda.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      4.2.4 Identify and analyze stakeholders

      An analyst will facilitate the discussion on how to identify the impact and level of resistance of all stakeholders to come up with the communication plan.

      4.2.5 Create a communications management plan

      An analyst will assist the team in building the communications management plan based on the stakeholders’ needs that were outlined in the stakeholder analysis exercise.

      4.2.6 Build a requirements gathering implementation timeline

      An analyst will facilitate a session to brainstorm and document any action items and build a high-level timeline for implementation.

      Insight breakdown

      Requirements gathering SOPs should be prescriptive based on project complexity.

      • Complex projects will require more analytical rigor. Simpler projects can be served by more straightforward techniques such as user stories.

      Requirements gathering management tools can be pricy, but they can also be beneficial.

      • Requirements gathering management tools are a great way to have full control over recording, analyzing, and categorizing requirements over complex projects.

      BAs can make or break the execution of the requirements gathering process.

      • A strong process still needs to be executed well by BAs with the right blend of skills and knowledge.

      Summary of accomplishment

      Knowledge Gained

      • Best practices for each stage of the requirements gathering framework:
        • Elicitation
        • Analysis
        • Validation
      • A clear understanding of BA competencies and skill sets necessary to successfully execute the requirements gathering process.

      Processes Optimized

      • Stakeholder identification and management.
      • Requirements elicitation, analysis, and validation.
      • Requirements gathering governance.
      • Change control processes for new requirements.
      • Communication processes for requirements gathering.

      Deliverables Completed

      • SOPs for requirements gathering.
      • Project level selection framework.
      • Communications framework for requirements gathering.
      • Requirements documentation standards.

      Organizations and experts who contributed to this research

      Interviews

      • Douglas Van Gelder, IT Manager, Community Development Commission of the County of Los Angeles
      • Michael Lyons, Transit Management Analyst, Metropolitan Transit Authority
      • Ken Piddington, CIO, MRE Consulting
      • Thomas Dong, Enterprise Software Manager, City of Waterloo
      • Chad Evans, Director of IT, Ontario Northland
      • Three anonymous contributors

      Note: This research also incorporates extensive insights and feedback from our advisory service and related research projects.

      Bibliography

      “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint Software Systems, 2012. Web.

      “BPM Definition.” BPMInstitute.org, n.d. Web.

      “Capturing the Value of Project Management.” PMI’s Pulse of the Profession, 2015. Web.

      Eby, Kate. “Demystifying the 5 Phases of Project Management.” Smartsheet, 29 May 2019. Web.

      “Product Management: MoSCoW Prioritization.” ProductPlan, n.d. Web.

      “Projects Delivered on Time & on Budget Result in Larger Market Opportunities.” Jama Software, 2015. Web.

      “SIPOC Table.” iSixSigma, n.d. Web.

      “Survey Principles.” University of Wisconsin-Madison, n.d. Web.

      “The Standish Group 2015 Chaos Report.” The Standish Group, 2015. Web.

      Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

      • Buy Link or Shortcode: {j2store}378|cart{/j2store}
      • member rating overall impact: 7.3/10 Overall Impact
      • member rating average dollars saved: $10,756 Average $ Saved
      • member rating average days saved: 9 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • The demand for qualified cybersecurity professionals far exceeds supply. As a result, organizations are struggling to protect their data against the evolving threat landscape.
      • It is a constant challenge to know what skills will be needed in the future, and when and how to acquire them.

      Our Advice

      Critical Insight

      • Plan for the inevitable. All industries are expected to be affected by the talent gap in the coming years. Plan ahead to address your organization’s future needs.
      • Base skills acquisition decisions on the five key factors to define skill needs. Create an impact scale for the five key factors (data criticality, durability, availability, urgency, and frequency) that reflects your organizational strategy, initiatives, and pressures.
      • A skills gap will always exist to some degree. The threat landscape is constantly changing, and your workforce’s skill sets must evolve as well.

      Impact and Result

      • Organizations must align their security initiatives to talent requirements such that business objectives are achieved and the business is cyber ready.
      • Identify if there are skill gaps in your current workforce.
      • Decide how you’ll acquire needed skills based on characteristics of need for each skill.

      Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a technical skills acquisition strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify skill needs for target state

      Identify what skills will be needed in your future state.

      • Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 1: Identity Skill Needs for Target State
      • Security Initiative Skills Guide
      • Skills Gap Prioritization Tool

      2. Identify technical skill gaps

      Align role requirements with future initiative skill needs.

      • Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 2: Identify Technical Skill Gaps
      • Current Workforce Skills Assessment
      • Technical Skills Workbook
      • Information Security Compliance Manager
      • IT Security Analyst
      • Chief Information Security Officer
      • Security Administrator
      • Security Architect

      3. Develop a sourcing plan for future work roles

      Acquire skills based on the impact of the five key factors.

      • Close the InfoSec Skills Gap: Develop a Skills Sourcing Plan for Future Work Roles – Phase 3: Develop a Sourcing Plan for Future Work Roles
      [infographic]

      Workshop: Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Skill Needs for Target State

      The Purpose

      Determine the skills needed in your workforce and align them to your organization’s security roadmap.

      Key Benefits Achieved

      Insight on what skills your organization will need in the future.

      Activities

      1.1 Understand the importance of aligning security initiatives skill needs with workforce requirements.

      1.2 Identify needed skills for future initiatives.

      1.3 Prioritize the initiative skill gaps.

      Outputs

      Security Initiative Skills Guide

      Skills Gap Prioritization Tool

      2 Define Technical Skill Requirements

      The Purpose

      Identify and create technical skill requirements for key work roles that are needed to successfully execute future initiatives.

      Key Benefits Achieved

      Increased understanding of the NICE Cybersecurity Workforce Framework.

      Standardization of technical skill requirements of current and future work roles.

      Activities

      2.1 Assign work roles to the needs of your future environment.

      2.2 Discuss the NICE Cybersecurity Workforce Framework.

      2.3 Develop technical skill requirements for current and future work roles.

      Outputs

      Skills Gap Prioritization Tool

      Technical Skills Workbook

      Current Workforce Skills Assessment

      3 Acquire Technical Skills

      The Purpose

      Assess your current workforce against their role’s skill requirements.

      Discuss five key factors that aid acquiring skills.

      Key Benefits Achieved

      A method to acquire skills in future roles.

      Activities

      3.1 Continue developing technical skill requirements for current and future work roles.

      3.2 Conduct Current Workforce Skills Assessment.

      3.3 Discuss methods of acquiring skills.

      3.4 Develop a plan to acquire skills.

      Outputs

      Technical Skills Workbook

      Current Workforce Skills Assessment

      Current Workforce Skills Assessment

      Technical Skills Workbook

      Current Workforce Skills Assessment

      Technical Skills Workbook

      Current Workforce Skills Assessment

      4 Plan to Execute Action Plan

      The Purpose

      Assist with communicating the state of the skill gap in your organization.

      Key Benefits Achieved

      Strategy on how to acquire skills needs of the organization.

      Activities

      4.1 Review skills acquisition plan.

      4.2 Discuss training and certification opportunities for staff.

      4.3 Discuss next steps for closing the skills gap.

      4.4 Debrief.

      Outputs

      Technical Skills Workbook