Take the time to understand the various data storage formats, disk types, and associated technology, as well as the cloud-based and on-premises options. This will help you select the right tool for your needs.
Look to existing use cases based on actual Info-Tech analyst calls to help in your decision-making process.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Explore the building blocks of enterprise storage so you can select the best solution, narrow your focus with the correct product type, explore the features that should be considered when evaluating enterprise storage offerings, and examine use cases based on actual Info-Tech analyst calls to find a storage solution for your situation.
The first step in solving your enterprise storage challenge is identifying your data sources, data volumes, and growth rates. This information will give you insight into what data sources could be stored on premises or in the cloud, how much storage you will require for the coming five to ten years, and what to consider when exploring enterprise storage solutions. This tool can be a valuable asset for determining your current storage drivers and future storage needs, structuring a plan for future storage purchases, and determining timelines and total cost of ownership.
|
To say that the current enterprise storage landscape looks interesting would be an understatement. The solutions offered by vendors continue to grow and evolve. Flash and NVMe are increasing the speed of storage media and reducing latency. Software-defined storage is finding the most efficient use of media to store data where it is best served while managing a variety of vendor storage and older storage area networks and network-attached storage devices. Storage as a service is taking on a new meaning with creative solutions that let you keep the storage appliance on premises or in a colocated data center while administration, management, and support are performed by the vendor for a nominal monthly fee. We cannot discuss enterprise storage without mentioning the cloud. Bring a thermometer because you must understand the difference between hot, warm, and cold storage when discussing the cloud options. Very hot and very cold may also come into play. Storage hardware can assume a higher total cost of ownership with support options that replace the controllers on a regular basis. The options with this type of service are also varied, but the concept of not having to replace all disks and chassis nor go through a data migration is very appealing to many companies. The cloud is growing in popularity when it comes to enterprise storage, but on-premises solutions are still in demand, and whether you choose cloud or on premises, you can be guaranteed an array of features and options to add stability, security, and efficiency to your enterprise storage. P.J. Ryan |
|
The vendor landscape is continually evolving, as are the solutions they offer. |
Storage providers are getting acquired by bigger players, “outside the box” thinking is disrupting the storage support marketplace, “as a service” storage offerings are evolving, and what is a data lake and do I need one? The traditional storage vendors are not alone in the market, and the solutions they offer are no longer traditional either. Explore the landscape and understand your options before you make any enterprise storage solution purchases. |
|---|---|
|
Understand the building blocks of storage so you can select the best solution. |
There are multiple storage formats for data, along with multiple hardware form factors and disk types to hold those various data formats. Software plays a significant role in many of these storage solutions, and cloud offerings take advantage of all the various formats, form factors, and disks. The challenge is matching your data type with the correct storage format and solution. |
|
Look to existing use cases to help in your decision-making process. |
Explore previous experiences from others by reading use cases to determine what the best solution is for your challenge. You’re probably not the first to encounter the challenge you’re facing. Another organization may have previously reached out for assistance and found a viable solution that may be just what you also need. |
“By 2025, it’s estimated that 463 exabytes of data will be created each day globally – that’s the equivalent of 212,765,957 DVDs per day!” (Visual Capitalist)
“Modern criminal groups target not only endpoints and servers, but also central storage systems and their backup infrastructure.” (Continuity Software)
Cloud or on premises? Maybe a hybrid approach with both cloud and on premises is best for you. Do you want to remove the headaches of storage administration, management, and support with a fully managed storage-as-a-service solution? Would you like to upgrade your controllers every three or four years without a major service interruption? The options are increasing and appealing.
1. Understand Your Data
Understand how much data you have and where it is located. This will be crucial when evaluating enterprise storage solutions.
2. Plan for Growth
Your enterprise storage considerations should include your data needs now and in the future.
3. Understand the Mechanics
Take the time to understand the various data storage formats, disk types, and associated technology, as well as the cloud-based and on-premises options. This will help you select the right tool for your needs.
|
Format |
What it is |
Disk Drives and Technology |
|
|---|---|---|---|
|
File Storage |
File storage is hierarchical storage that uses files, folders, subfolders, and directories. You enter a specific filename and path to access the file, such as P:\users\johndoe\strategy\cloud.doc. If you ever saved a file on a server, you used file storage. File storage is usually managed by some type of file manager, such as File Explorer in Windows. Network-attached storage (NAS) devices use file storage. |
Hard Disk Drives (HDD) |
HDD use a platter of spinning disks to magnetically store data. The disks are thick enough to make them rigid and are referred to as hard disks. HDD is older technology but is still in demand and offered by vendors. |
|
Object Storage |
Object storage is when data is broken into distinct units, called objects. These objects are stored in a flat, non-hierarchical structure in a single location or repository. Each object is identified by its associated ID and metadata. Objects are accessed by an application programming interface (API). |
Flash |
Flash storage uses flash memory chips to store data. The flash memory chips are written with electricity and contain no moving parts. Flash storage is very fast, which is how the technology got its name (“Flash vs. SSD Storage,” Enterprise Storage Forum, 2018). |
|
Block Storage |
Block storage is when data is divided up into fixed-size blocks and stored with a unique identifier. Blocks can be stored in different environments, such as Windows or Linux. Storage area networks (SANs) use block storage. |
Solid-State Drive (SSD) |
SSD is a storage mechanism that also does not use any moving parts. Most SSD drives use flash storage, but other options are available for SSD. |
|
Nonvolatile Memory Express (NVMe) |
NVMe is a communications standard developed specially for SSDs by a consortium of vendors including Intel, Samsung, SanDisk, Dell, and Seagate. It operates across the PCIe bus (hence the “Express” in the name), which allows the drives to act more like the fast memory that they are rather than the hard disks they imitate (PCWorld). |
|
Network-Attached Storage |
Storage Area Network |
Software-Defined Storage |
Hyperconverged Infrastructure |
|---|---|---|---|
|
NAS refers to a storage device that is connected directly to your network. Any user or device with access to your network can access the available storage provided by the NAS. NAS storage is easily scalable and can add data redundancy through RAID technology. NAS uses the file storage format. NAS storage may or may not be the first choice in terms of enterprise storage, but it does have a solid market appeal as an on-premises primary backup storage solution. |
A SAN is a dedicated network of pooled storage devices. The dedicated network, separate from the regular network, provides high speed and scalability without concern for the regular network traffic. SANs use block storage format and can be divided into logical units that can be shared between servers or segregated from other servers. SANs can be accessed by multiple servers and systems at the same time. SANs are scalable and offer high availability and redundancy through RAID technology. SANs can use a variety of disk types and sizes and are quite common among on-premises storage solutions. |
“Software-defined storage (SDS) is a storage architecture that separates storage software from its hardware. Unlike traditional network-attached storage (NAS) or storage area network (SAN) systems, SDS is generally designed to perform on any industry-standard or x86 system, removing the software’s dependence on proprietary hardware.” (RedHat) SDS uses software-based policies and rules to grow and protect storage attached to applications. SDS allows you to use server-based storage products to add management, protection, and better usage. |
Hyperconverged storage uses virtualization and software-defined storage to combine the storage, compute, and network resources along with a hypervisor into one appliance. Hyperconverged storage can scale out by adding more nodes or appliances, but scaling up, or adding more resources to each appliance, can have limitations. There is flexibility as hyperconverged storage can work with most network and compute manufacturers. |
“Enterprise cloud storage offers nearly unlimited scalability. Enterprises can add storage quickly and easily as it is needed, eliminating the risk and cost of over-provisioning.”
– Spectrum Enterprise
“Hot data will operate on fresh data. Cold data will operate on less frequent data and [is] used mainly for reporting and planning. Warm data is a balance between the two.”
– TechBlost
|
|
“Because data lakes mostly consist of raw unprocessed data, a data scientist with specialized expertise is typically needed to manipulate and translate the data.”
– DevIQ
“A Lakehouse is also a type of centralized data repository, integrated from heterogeneous sources. As can be expected from its name, It shares features with both datawarehouses and data lakes.”
– Cesare
“Storage as a service (STaaS) eliminates Capex, simplifies management and offers extensive flexibility.”
– TechTarget
The current vendor landscape for enterprise storage solutions represents a range of industry veterans and the brands they’ve aggregated along the way, as well as some relative newcomers who have come to the forefront within the past ten years.
Vendors like Dell EMC and HPE are longstanding veterans of storage appliances with established offerings and a back catalogue of acquisitions fueling their growth. Others such as Pure Storage offer creative solutions like all-flash arrays, which are becoming more and more appealing as flash storage becomes more commoditized.
Cloud-based vendors have become popular options in recent years. Cloud storage provides many options and has attracted many other vendors to provide a cloud option in addition to their on-premises solutions. Some software and hardware vendors also partner with cloud vendors to offer a complete solution that includes storage.
Explore your current vendor’s solutions as a starting point, then use that understanding as a reference point to dive into other players in the market
Key Players
Block, object, or file storage? NAS, SAN, SDS, or HCI? Cloud or on prem? Hot, warm, or cold?
Which one do you choose?
The following use cases based on actual Info-Tech analyst calls may help you decide.
“Offsite” may make you think of geographical separation or even cloud-based storage, but what is the best option and why?
“Data retrieval from cold storage is harder and slower than it is from hot storage. … Because of the longer retrieval time, online cold storage plans are often much cheaper. … The downside is that you’d incur additional costs when retrieving the data.”
– Ben Stockton, Cloudwards
Hyperconverged infrastructure combines storage, virtual infrastructure, and associated management into one piece of equipment.
“HCI environments use a hypervisor, usually running on a server that uses direct-attached storage (DAS), to create a data center pool of systems and resources.”
– Samuel Greengard, Datamation
SAN providers offer a varied range of options for their products, and those options are constantly evolving.
“SAN-to-SAN replication is a low-cost, highly efficient way to manage mounting quantities of stored data.”
– Secure Infrastructure & Services
That old storage area network may still have some useful life left in it.
“Often enterprises have added storage on an ad hoc basis as they needed it for various applications. That can result in a mishmash of heterogenous storage hardware from a wide variety of vendors. SDS offers the ability to unify management of these different storage devices, allowing IT to be more efficient.”
– Cynthia Harvey, Enterprise Storage Forum (“What Is Software Defined Storage?”, 2018)
Many backup software solutions can provide backups to multiple locations, making two-location backups simple.
“Data protection demands that enterprises have multiple methods of keeping data safe and replicating it in case of disaster or loss.”
– Drew Robb, Enterprise Storage Forum, 2021
SAN solutions have come a long way with improvements in how data is stored and what is used to store the data.
“A rapidly growing portion of SAN deployments leverages all-flash storage to gain its high performance, consistent low latency, and lower total cost when compared to spinning disk.”
– NetApp
Cloud storage would not be sufficient if you were using a dial up connection, just as on-premises storage solutions would not suffice if they were using floppy disks.
“The captured video is stored for days, weeks, months and sometimes years and consumes a lot of space. Data storage plays a new and important role in these systems. Object storage is ideal to store the video data.”
– Object-Storage.Info
Some software products have storage options available as a result of agreements with other storage vendors. Several backup and archive software products fall into this category.
“Cold storage is perfect for archiving your data. Online backup providers offer low-cost, off-site data backups at the expense of fast speeds and easy access, even though data retrieval often comes at an added cost. If you need to keep your data long-term, but don’t need to access it often, this is the kind of storage you need.”
– Ben Stockton, Cloudwards
Activity
The first step in solving your enterprise storage challenge is identifying your data sources or drivers, data volume size, and growth rates. This information will give you insight into what data sources could be stored on premises or in the cloud, how much storage you will require for the coming five to ten years, and what to consider when exploring enterprise storage solutions.
Download the Modernize Enterprise Storage Workbook and take the first step toward understanding your data requirements.
Download the Modernize Enterprise Storage Workbook
Current and emerging storage technologies are disrupting the status quo – prepare your infrastructure for the exponential rise in data and its storage requirements.
Modernize Enterprise Storage Workbook
This workbook will complement the discussions and activities found in the Modernize Enterprise Storage blueprint. Use this workbook in conjunction with the blueprint to develop a strategy for storage modernization.
Bakkianathan, Raghunathan. “What is the difference between Hot Warm and Cold data storage?” TechBlost, n.d.. Accessed 14 July 2022.
Cesare. “Data warehouse vs Data lake vs Lakehouse… and DeltaLake?“ Medium, 14 June 2021. Accessed 26 July 2022.
Davison, Shawn and Ryan Sappenfield. “Data Lake Vs Lakehouse Vs Data Mesh: The Evolution of Data Transformation.” DevIQ, May 2022. Accessed 23 July 2022.
Desjardins, Jeff. “Infographic: How Much Data is Generated Each Day?” Visual Capitalist, 15 April 2019. Accessed 26 July 2022.
Greengard, Samuel. “Top 10 Hyperconverged Infrastructure (HCI) Solutions.” Datamation, 22 December 2020. Accessed 23 July 2022.
Harvey, Cynthia. “Flash vs. SSD Storage: Is there a Difference?” Enterprise Storage Forum, 10 July 2018. Accessed 23 July 2022.
Harvey, Cynthia. “What Is Software Defined Storage? Features & Benefits.” Enterprise Storage Forum, 22 February 2018. Accessed 23 July 2022.
Hecht, Gil. “4 Predictions for storage and backup security in 2022.” Continuity Software, 09 January 2022. Accessed 22 July 2022.
Jacobi, Jonl. “NVMe SSDs: Everything you need to know about this insanely fast storage.” PCWorld, 10 March 2019. Accessed 22 July 2022
Pritchard, Stephen. “Briefing: Cloud storage performance metrics.” Computer Weekly, 16 July 2021. Accessed 23 July 2022
Robb, Drew. “Best Enterprise Backup Software & Solutions 2022.” Enterprise Storage Forum, 09 April 2021. Accessed 23 July 2022.
Sheldon, Robert. “On-premises STaaS shifts storage buying to Opex model.” TechTarget, 10 August 2020. Accessed 22 July 2022.
“Simplify Your Storage Ownership, Forever.” PureStorage. Accessed 20 July 2022.
Stockton, Ben. “Hot Storage vs Cold Storage in 2022: Instant Access vs Long-Term Archives.” Cloudwards, 29 September 2021. Accessed 22 July 2022.
“The Cost Savings of SAN-to-SAN Replication.” Secure Infrastructure and Services, 31 March 2016. Accessed 16 July 2022.
“Video Surveillance.” Object-Storage.Info, 18 December 2019. Accessed 25 July 2022.
“What is a Data Lake?” Amazon Web Services, n.d. Accessed 17 July 2022.
“What is enterprise cloud storage?” Spectrum Enterprise, n.d. Accessed 28 July 2022.
“What is SAN (Storage Area Network).” NetApp, n.d. Accessed 25 July 2022.
“What is software-defined storage?” RedHat, 08 March 2018. Accessed 16 July 2022.
Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.
A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this research to identify and quantify the potential strategic impacts caused by vendors. Use Info-Tech’s approach to look at the strategic impact from various perspectives to better prepare for issues that may arise.
By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.
Like most people, organizations are poor at assessing the likelihood of risk. If the past few years have taught us anything, it is that the probability of a risk occurring is far more flexible in the formula Risk = Likelihood * Impact than we ever thought possible. The impacts of these risks have been catastrophic, and organizations need to be more adaptive in managing them to strengthen their strategic plans.
Frank Sewell,
Research Director, Vendor Management
Info-Tech Research Group
Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.
A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.
Identifying and managing a vendor’s potential strategic impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes affect strategic plans.
Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.
Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
Prioritize and classify your vendors with quantifiable, standardized rankings.
Prioritize focus on your high-risk vendors.
Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Impacts Tool.
Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market. Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.
This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.
This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.
The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.
When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.
Below are some things no one expected to happen in the last few years:
of IT professionals are more concerned about being a victim of ransomware than they were a year ago.
of Microsoft’s non-essential employees shifted to working from home in 2020, joining the 18% already remote.
of organizations invested in web conferencing technology to facilitate collaboration.
Source: Info-Tech Tech Trends Survey 2022
Make sure you have the right people at the table to identify and plan to manage impacts.
Very few people could have predicted that a global pandemic would interrupt business on the scale experienced today. Organizations should look at their lessons learned and incorporate adaptable preparations into their strategic planning moving forward.
The IT market is an ever-shifting environment. Larger companies often gobble up smaller ones to control their sectors. Incorporating plans to manage those shifts in ownership will be key to many strategic plans that depend on niche vendor solutions for success. Be sure to monitor the potentially affected markets on an ongoing cadence.
Organizations need to accept that shortages will recur periodically and that preparing for them will significantly increase the success potential of long-term strategic plans. Understand what your business needs to stock for project needs and where those supplies are located, and plan how to rapidly access and distribute them as required if supply chain disruptions occur.
For example:
Sometimes an organization has the right mindset to take advantage of the changes in the market but can fail to plan for the particulars.
When your strategic plan changes, you need to revisit all the steps in the processes to ensure a successful outcome.
It is important to identify potential risks to strategic plans to manage the risk and be agile enough in planning to adapt to the changing environments.
Info-Tech Insight
Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.
(Adapted from COSO)
Organizations build portions of their strategies around chosen vendors and should protect those plans against the risks of unforeseen acquisitions in the market.
Is your vendor solvent? Does it have enough staff to accommodate your needs? Has its long-term planning been affected by changes in the market? Is it unique in its space?
Organizations’ strategic plans need to be adaptable to avoid vendors’ negative actions causing an expedited shift in priorities.
For example, Philip's recall of ventilators impacted its products and the availability of its competitor’s products as demand overwhelmed the market.
Organizations need to become better at risk assessment and actively manage the identified risks to their strategic plans.
Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.
Strategic risk impacts are often unanticipated, causing unforeseen downstream effects. Anticipating the potential changes in the global IT market and continuously monitoring vendors’ risk levels can help organizations modify their strategic alignment with the new norms.
Review your strategic plans for new risks and evolving likelihood on a regular basis.
Keep in mind Risk = Likelihood x Impact (R=L*I).
Impact (I) tends to remain the same, while Likelihood (L) is a very flexible variable.
Organizations need to be reviewing their strategic risk plans considering the likelihood of incidents in the global market.
Pandemics, extreme weather, and wars that affect global supply chains are a current reality, not unlikely scenarios.
Sometimes disasters occur despite our best plans to manage them.
When this happens, it is important to document the lessons learned and improve our plans going forward.
Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.
Download the Strategic Risk Impact Tool
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Industry: Airline
Impact categories: Pandemic, Lockdowns, Travel Bans, Increased Fuel Prices
The pandemic prompted systemic change to the overall strategic planning of the airline industry.
Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market.
Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.
Olaganathan, Rajee. “Impact of COVID-19 on airline industry and strategic plan for its recovery with special reference to data analytics technology.” Global Journal of Engineering and Technology Advances, vol 7, no 1, 2021, pp. 033-046.
Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012.
Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Info-Tech's expert analyst guidance will help you save money, align stakeholders, and speed up the application selection process.
Info-Tech's workshop will help you implement a repeatable, data-driven approach that accelerates software selection efforts.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Determine how to establish the foundation of your security operations.
Assess the maturity of your prevention, detection, analysis, and response processes.
Design a target state and improve your governance and policy solutions.
Make your case to the board and develop a roadmap for your prioritized security initiatives.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify security obligations and the security operations program’s pressure posture.
Assess current people, process, and technology capabilities.
Determine foundational controls and complete system and asset inventory.
Identified the foundational elements needed for planning before a security operations program can be built
1.1 Define your security obligations and assess your security pressure posture.
1.2 Determine current knowledge and skill gaps.
1.3 Shine a spotlight on services worth monitoring.
1.4 Assess and document your information system environment.
Customized security pressure posture
Current knowledge and skills gaps
Log register of essential services
Asset management inventory
Identify the maturity level of existing security operations program processes.
Current maturity assessment of security operations processes
2.1 Assess the current maturity level of the existing security operations program processes.
Current maturity assessment
Design your optimized target state.
Improve your security operations processes with governance and policy solutions.
Identify and prioritize gap initiatives.
A comprehensive list of initiatives to reach ideal target state
Optimized security operations with repeatable and standardized policies
3.1 Complete standardized policy templates.
3.2 Map out your ideal target state.
3.3 Identify gap initiatives.
Security operations policies
Gap analysis between current and target states
List of prioritized initiatives
Formalize project strategy with a project charter.
Determine your sourcing strategy for in-house or outsourced security operations processes.
Assign responsibilities and complete an implementation roadmap.
An overarching and documented strategy and vision for your security operations
A thorough rationale for in-house or outsourced security operations processes
Assigned and documented responsibilities for key projects
4.1 Complete a security operations project charter.
4.2 Determine in-house vs. outsourcing rationale.
4.3 Identify dependencies of your initiatives and prioritize initiatives in phases of implementation.
4.4 Complete a security operations roadmap.
Security operations project charter
In-house vs. outsourcing rationale
Initiatives organized according to phases of development
Planned and achievable security operations roadmap
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read our executive brief to understand everyday struggles regarding application maintenance, the root causes, and our methodology to overcome these. We show you how we can support you.
Identify your stakeholders and understand their drivers.
Identify the right level of governance appropriate to your company and business context for your application maintenance. That ensures that people uphold standards across maintenance practices.
Most companies cannot do everything for all applications and systems. Build your maintenance triage and prioritization rules to safeguard your company, maximize business value generation and IT risks and requirements.
Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the breadth of the regulation’s requirements and document roles and responsibilities.
Define your GDPR scope and prioritize initiatives based on risk.
Understand the requirements for a record of processing and determine who will own it.
Document your DPO decision and align security strategy to data privacy.
Prioritize any initiatives driven out of Phases 1-4 and begin developing policies that help in the documentation effort.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Kick-off the workshop; understand and define GDPR as it exists in your organizational context.
Prioritize your business units based on GDPR risk.
Assign roles and responsibilities.
1.1 Kick-off and introductions.
1.2 High-level overview of weekly activities and outcomes.
1.3 Identify and define GDPR initiative within your organization’s context.
1.4 Determine what actions have been done to prepare; how have regulations been handled in the past?
1.5 Identify key business units for GDPR committee.
1.6 Document business units and functions that are within scope.
1.7 Prioritize business units based on GDPR.
1.8 Formalize stakeholder support.
Prioritized business units based on GDPR risk
GDPR Compliance RACI Chart
Know the rationale behind a record of processing.
Determine who will own the record of processing.
2.1 Understand the necessity for a record of processing.
2.2 Determine for each prioritized business unit: are you a controller or processor?
2.3 Develop a record of processing for most-critical business units.
2.4 Perform legitimate interest assessments.
2.5 Document an iterative process for creating a record of processing.
Initial record of processing: 1-2 activities
Initial legitimate interest assessment: 1-2 activities
Determination of who will own the record of processing
Review existing security controls and highlight potential requirements.
Ensure the initiatives you’ll be working on align with existing controls and future goals.
3.1 Determine the appetite to align the GDPR project to data classification and data discovery.
3.2 Discuss the benefits of data discovery and classification.
3.3 Review existing incident response plans and highlight gaps.
3.4 Review existing security controls and highlight potential requirements.
3.5 Review all initiatives highlighted during days 1-3.
Highlighted gaps in current incident response and security program controls
Documented all future initiatives
Review project plan and initiatives and prioritize.
Finalize outputs of the workshop, with a strong understanding of next steps.
4.1 Analyze the necessity for a data protection officer and document decision.
4.2 Review project plan and initiatives.
4.3 Prioritize all current initiatives based on regulatory compliance, cost, and ease to implement.
4.4 Develop a data protection policy.
4.5 Finalize key deliverables created during the workshop.
4.6 Present the GDPR project to key stakeholders.
4.7 Workshop executive presentation and debrief.
GDPR framework and prioritized initiatives
Data Protection Policy
List of key tools
Communication plans
Workshop summary documentation
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin your proactive SAP licensing journey by understanding which information to gather and assessing the current state and gaps.
Review current licensing models and determine which licensing models will most appropriately fit your environment.
Review SAP’s contract types and assess which best fit the organization’s licensing needs.
Conduct negotiations, purchase licensing, and finalize a licensing management strategy.
The saying goes, "as time goes by," but these days, we should say "as speed picks up." We're already in month two, so high time we take a look at the priorities you hopefully already set at the end of last year.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess the organization’s readiness for change and evaluate the PMO’s OCM capabilities.
Build an organic desire for change throughout the organization by developing a sponsorship action plan through the PMO and taking a proactive approach to change impacts.
Ensure stakeholders are engaged and ready for change by developing effective communication, transition, and training plans.
Determine accountabilities and establish a process for tracking business outcomes after the project team has packed up and moved onto the next project.
Institute an Organizational Change Management Playbook through the PMO that covers tools, processes, and tactics that will scale all of the organization’s project efforts.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Assess the organization’s readiness for change and evaluate the PMO’s OCM capabilities.
Estimate the relative difficulty and effort required for managing organizational change through a specific project.
Create a rough but concrete timeline that aligns organizational change management activities with project scope.
A better understanding of the cultural appetite for change and of where the PMO needs to focus its efforts to improve OCM capabilities.
A project plan that includes disciplined organizational change management from start to finish.
1.1 Assess the organization’s current readiness for change.
1.2 Perform a change management SWOT analysis to assess the PMO’s capabilities.
1.3 Define OCM success metrics.
1.4 Establish and map out a core OCM project to pilot through the workshop.
Organizational Change Management Capabilities Assessment
A diagnosis of the PMO’s strengths and weaknesses around change management, as well as the opportunities and threats associated with driving an OCM strategy through the PMO
Criteria for implementation success
Project Level Assessment
Analyze the impact of the change across various dimensions of the business.
Develop a strategy to manage change impacts to best ensure stakeholder adoption.
Improved planning for both your project management and organizational change management efforts.
A more empathetic understanding of how the change will be received in order to rightsize the PMO’s OCM effort and maximize adoption.
2.1 Develop a sponsorship action plan through the PMO.
2.2 Determine the relevant considerations for analyzing the change impacts of a project.
2.3 Analyze the depth of each impact for each stakeholder group.
2.4 Establish a game plan to manage individual change impacts.
2.5 Document the risk assumptions and opportunities stemming from the impact analysis.
Sponsorship Action Plan
Organizational Change Management Capabilities Assessment
Risk and Opportunity Assessment
Define a clear and compelling vision for change.
Define roles and responsibilities of the core project team for OCM.
Identify potential types and sources of resistance and enthusiasm.
Create a stakeholder map that visualizes relative influence and interest of stakeholders.
Develop an engagement plan for cultivating support for change while eliciting requirements.
Begin to communicate a compelling vision for change.
Delegate and divide work on elements of the transition plan among the project team and support staff.
Begin developing a communications plan that appeals to unique needs and attitudes of different stakeholders.
Cultivate support for change while eliciting requirements.
3.1 Involve the right people to drive and facilitate change.
3.2 Solidify the vision of change to reinforce and sustain leadership and commitment.
3.3 Proactively identify potential skeptics in order to engage them early and address their concerns.
3.4 Stay one step ahead of potential saboteurs to prevent them from spreading dissent.
3.5 Find opportunities to empower enthusiasts to stay motivated and promote change by encouraging others.
3.6 Formalize the stakeholder analysis to identify change champions and blockers.
3.7 Formalize the engagement plan to begin cultivating support while eliciting requirements.
RACI table
Stakeholder Analysis
Engagement Plan
Communications plan requirements
Develop a realistic, effective, and adaptable transition plan, including:Clarity around leadership and vision.Well-defined plans for targeting unique groups with specific messages.Resistance and contingency plans.Templates for gathering feedback and evaluating success.
Clarity around leadership and vision.
Well-defined plans for targeting unique groups with specific messages.
Resistance and contingency plans.
Templates for gathering feedback and evaluating success.
Execute the transition in coordination with the timeline and structure of the core project.
Communicate the action plan and vision for change.
Target specific stakeholder and user groups with unique messages.
Deal with risks, resistance, and contingencies.
Evaluate success through feedback and metrics.
4.1 Sustain changes by adapting people, processes, and technologies to accept the transition.
4.2 Decide which action to take on enablers and blockers.
4.3 Start developing the training plan early to ensure training is properly timed and communicated.
4.4 Sketch a communications timeline based on a classic change curve to accommodate natural resistance.
4.5 Define plans to deal with resistance to change, objections, and fatigue.
4.6 Consolidate and refine communication plan requirements for each stakeholder and group.
4.7 Build the communications delivery plan.
4.8 Define the feedback and evaluation process to ensure the project achieves its objectives.
4.9 Formalize the transition plan.
Training Plan
Resistance Plan
Communications Plan
Transition Plan
Establish post-project benefits tracking timeline and commitment plans.
Institute a playbook for managing organizational change, including:
A process for ensuring the intended business outcomes are tracked and monitored after the project is completed.
Repeat and scale best practices around organizational change to future PMO projects.
Continue to build your capabilities around managing organizational change.
Increase the effectiveness and value of organizational change management.
5.1 Review lessons learned to improve organizational change management as a core PM discipline.
5.2 Monitor capacity for change.
5.3 Define roles and responsibilities.
5.4 Formalize and communicate the organizational change management playbook.
5.5 Regularly reassess the value and success of organizational change management.
Lessons learned
Organizational Change Capability Assessment
Organizational Change Management Playbook
PMOs, if you don't know who is responsible for org change, it's you.
"Organizational change management has been a huge weakness for IT departments and business units, putting projects and programs at risk – especially large, complex, transformational projects.
During workshops with clients, I find that the root of this problem is twofold: project planning tends to fixate on technology and neglects the behavioral and cultural factors that inhibit user adoption; further, accountabilities for managing change and helping to realize the intended business outcomes post-project are not properly defined.
It makes sense for the PMO to be the org-change leader. In project ecosystems where no one seems willing to seize this opportunity, the PMO can take action and realize the benefits and accolades that will come from coordinating and consistently driving successful project outcomes."
Matt Burton,
Senior Manager, Project Portfolio Management
Info-Tech Research Group
Make your PMO the change leader it’s already expected to be. Unless accountabilities for organizational change management (OCM) have been otherwise explicitly defined, you should accept that, to the rest of the organization – including its chief officers – the PMO is already assumed to be the change leader.
Don’t shy away from or neglect this role. It’s not just the business outcomes of the organization’s projects that will benefit; the long-term sustainability of the PMO itself will be significantly strengthened by making OCM a core competency.
The constraints that drive project management (time, scope, and budget) are insufficient for driving the overall success of project efforts.
For instance, a project may come in on time, on budget, and in scope, but…
…then that “successful project” represents a massive waste of the organization’s time and resources.
A supplement to project management is needed to ensure that the intended value is realized.
Mission (Not) Accomplished
50% Fifty percent of respondents in a KPMG survey indicated that projects fail to achieve what they originally intended. (Source: NZ Project management survey)
56% Only fifty-six percent of strategic projects meet their original business goals. (Source: PMI)
70% Lack of user adoption is the main cause for seventy percent of failed projects. (Source: Collins, 2013)
Organizational change management is the practice through which the PMO can improve user adoption rates and maximize project benefits.
Why OCM effectiveness correlates to project success:
Without OCM, IT might finish the project but fail to realize the intended outcomes.
In the long term, a lack of OCM could erode IT’s ability to work with the business.
OCM is a framework for managing the introduction of new business processes and technologies to ensure stakeholder adoption.
OCM involves tools, templates, and processes that are intended to help project leaders analyze the impacts of a change during the planning phase, engage stakeholders throughout the project lifecycle, as well as train and transition users towards the new technologies and processes being implemented.
OCM is a separate body of knowledge, but as a practice it is inseparable from both project management or business analysis.
Anytime you are starting a project or program that will depend on users and stakeholders to give up their old way of doing things, change will force people to become novices again, leading to lost productivity and added stress.
CM can help improve project outcomes on any project where you need people to adopt new tools and procedures, comply with new policies, learn new skills and behaviors, or understand and support new processes.
"What is the goal of change management? Getting people to adopt a new way of doing business." – BA, Natural Resources Company
82% of CEOs identify organizational change management as a priority. (D&B Consulting) But Only 18% of organizations characterize themselves as “Highly Effective” at OCM. (PMI)
On average, 95% percent of projects with excellent OCM meet or exceed their objectives. (Prosci) VS For projects with poor OCM, the number of projects that meet objectives drops to 15%. (Prosci)
82% of projects with excellent OCM practices are completed on budget. (Prosci) VS For projects with poor OCM, the number of projects that stay on budget drops to 51%. (Prosci)
71% of projects with excellent OCM practices stay on schedule. (Prosci) VS For projects with poor OCM practices, only 16% stay on schedule. (Prosci)
IT Processes Ranked by Effectiveness:
IT Processes Ranked by Importance:
Based on 3,884 responses to Info-Tech’s Management and Governance Diagnostic, June 2016
While the importance of change management is widely recognized across organizations, the statistics around change remain dismal.
Indeed, it’s an understatement to say that change is difficult.
People are generally – in the near-term at least – resistant to change, especially large, transformational changes that will impact the day-to-day way of doing things, or that involve changing personal values, social norms, and other deep-seated assumptions.
"There is nothing more difficult to take in hand, more perilous to conduct, or more uncertain in its success, than to take the lead in the introduction of a new order of things." – Niccolo Machiavelli
70% - Change failure rates are extremely high. It is estimated that up to seventy percent of all change initiatives fail – a figure that has held steady since the 1990s. (McKinsey & Company)
25% - In a recent survey of 276 large and midsize organizations, only twenty-five percent of respondents felt that the gains from projects were sustained over time. (Towers Watson)
22% - While eighty-seven percent of survey respondents trained their managers to “manage change,” only 22% felt the training was truly effective. (Towers Watson)
Who is accountable for change success? …anyone?...
To its peril, OCM commonly falls into a grey area, somewhere in between project management and portfolio management, and somewhere in between being a concern of IT and a concern of the business.
While OCM is a separate discipline from project management, it is commonly thought that OCM is something that project managers and project teams do. While in some cases this might be true, it is far from a universal truth.
The end result: without a centralized approach, accountabilities for key OCM tasks are opaque at best – and the ball for these tasks is, more often than not, dropped altogether.
29% - Twenty-nine percent of change initiatives are launched without any formal OCM plan whatsoever.
"That’s 29 percent of leaders with blind faith in the power of prayer to Saint Jude, the patron saint of desperate cases and lost causes." – Torben Rick
#1 Organizational resistance to change is cited as the #1 challenge to project success that PMOs face. (Source: PM Solutions)
90% Companies with mature PMOs that effectively manage change meet expectations 90% of the time. (Source: Jacobs-Long)
A centralized approach to OCM is most effective, and the PMO is already a centralized project office and is already accountable for project outcomes.
What’s more, in organizations where accountabilities for OCM are not explicitly defined, the PMO will likely already be assumed to be the default change leader by the wider organization.
It makes sense for the PMO to accept this accountability – in the short term at least – and claim the benefits that will come from coordinating and consistently driving successful project outcomes.
In the long term, OCM leadership will help the PMO to become a strategic partner with the executive layer and the business side.
Short-term gains made by the PMO can be used to spark dialogues with those who authorize project spending and have the implicit fiduciary obligation to drive project benefits.
Ultimately, it’s their job to explicitly transfer that obligation, along with the commensurate resourcing and authority for OCM activities.
"With organizations demanding increasing value, PMOs will need to focus more and more on strategy, innovation, agility, and stakeholder engagement. And, in particular, developing expertise in organizational change management will be essential to their success." – PM Solutions, 2014
28% PMOs that are highly agile and able to respond quickly to changing conditions are 28% more likely to successfully complete strategic initiatives (69% vs. 41%). (PMI)
In other words, without heightened competencies around org-change, the PMO of tomorrow will surely sink like a stone in the face of increasingly unstable external factors and accelerated project demands.
With the advice and tools in Info-Tech’s Drive Organizational Change from the PMO blueprint, the PMO can provide the right OCM expertise at each phase of a project.
Business strategy-oriented OCM models such as John Kotter’s 8-Step model assume the change agent is in a position of senior leadership, able to shape corporate vision, culture, and values.
General-purpose OCM frameworks such as ACMP’s Standard for Change Management, CMI’s CMBoK, and Prosci’s ADKAR model are very comprehensive and need to be configured to PMO-specific initiatives.
References and Further Reading
Info-Tech’s organizational change management model adapts the best practices from a wide range of proven models and distills it into a step-by-step process that can be applied to any IT-enabled project.
| COBIT Section | COBIT Management Practice | Related Blueprint Steps |
|---|---|---|
| BAI05.01 | Establish the desire to change. | 1.1 / 2.1 / 2.2 |
| BAI05.02 | Form an effective implementation team. | 1.2 |
| BAI05.03 | Communicate the desired vision. | 2.1 / 3.2 |
| BAI05.03 | Empower role players and identify short-term wins. | 3.2 / 3.3 |
| BAI05.05 | Enable operation and use. | 3.1 |
| BAI05.06 | Embed new approaches. | 4.1 / 5.1 |
| BAI05.07 | Sustain changes. | 5.1 |
COBIT 5 is the leading framework for the governance and management of enterprise IT.
Screenshot of Info-Tech’s IT Management & Governance Framework.
Human behavior is largely a blind spot during the planning phase.
In IT especially, project planning tends to fixate on technology and underestimate the behavioral and cultural factors that inhibit user adoption. Whether change is project-specific or continuous, it’s more important to instill the desire to change than to apply specific tools and techniques. Accountability for instilling this desire should start with the project sponsor, with direct support from the PMO.
Don’t mistake change management for a “soft” skill.
Persuading people to change requires a “soft,” empathetic approach to keep them motivated and engaged. But don’t mistake “soft” for easy. Managing the people part of change is amongst the toughest work there is, and it requires a comfort and competency with uncertainty, ambiguity, and conflict. If a change initiative is going to be successful (especially a large, transformational change), this tough work needs to be done – and the more impactful the change, the earlier it is done, the better.
In “continuous change” environments, change still needs to be managed.
Transformation and change are increasingly becoming the new normal. While this normality may help make people more open to change in general, specific changes still need to be planned, communicated, and managed. Agility and continuous improvement are good, but can degenerate into volatility if change isn’t managed properly. People will perceive change to be volatile and undesirable if their expectations aren’t managed through communications and engagement planning.
Info-Tech’s Drive Organizational Change from the PMO blueprint can be implemented quickly and can usually be done with the PMO’s own authority, without the need for additional or dedicated change resources.
15% - The average costs for effective OCM are 10%–15% of the overall project budget. (AMR Research)
200% - Small projects with excellent OCM practices report a 200% return-on-investment. (Change First)
650% - Large projects with excellent OCM practices report a 650% return-on-investment. (Change First)
Industry Manufacturing
Source Info-Tech Client
A medium-sized manufacturing company with offices all over the world was going through a consolidation of processes and data by implementing a corporate-wide ERP system to replace the fragmented systems that were previously in place. The goal was to have consistency in process, expectations, and quality, as well as improve efficiency in interdepartmental processes.
Up to this point, every subsidiary was using their own system to track data and sharing information was complicated and slow. It was causing key business opportunities to be compromised or even lost.
The organization was not very good in closing out projects. Initiatives went on for too long, and the original business benefits were usually not realized.
The primary culprit was recognized as mismanaged organizational change. People weren’t aware early enough, and were often left out of the feedback process.
Employees often felt like changes were being dictated to them, and they didn’t understand the wider benefits of the changes. This led to an unnecessary number of resistors, adding to the complexity of successfully completing a project.
Implementing an ERP worldwide was something that the company couldn’t gamble on, so proper organizational change management was a focus.
A thorough stakeholder analysis was done, and champions were identified for each stakeholder group throughout the organization.
Involving these champions early gave them the time to work within their groups and to manage expectations. The result was savings of 2–4 weeks of implementation time and $10,000.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Diagnostics and consistent frameworks used throughout all four options
| Phase 1 | Phase 2 | Phase 3 | Phase 4 | Phase 5 | |
|---|---|---|---|---|---|
| Best-Practice Toolkit |
1.1 Assess the organization’s readiness for change. 1.2 Define the structure and scope of the PMO’s pilot OCM initiative. |
2.1 Foster OCM considerations during the ideation phase. 2.2 Perform an organizational change impact assessment. |
3.1 Ensure stakeholders are engaged and ready for change. 3.2 Develop and execute the transition plan. 3.3 Establish HR and training plans. |
4.1 Determine accountabilities for benefits attainment. | 5.1 Institute an OCM playbook. |
| Guided Implementations |
|
|
|
|
|
| Onsite Workshop |
Module 1: Prepare the PMO for change leadership. |
Module 2: Plant the seeds for change during planning and initiation. |
Module 3: Facilitate change adoption throughout the organization. |
Module 4: Establish a post-project benefits attainment process. |
Module 5: Solidify the PMO’s role as change leader. |
|
Phase 1 Results: OCM Capabilities Assessment |
Phase 2 Results: Change Impact Analysis |
Phase 3 Results: Communications and Transition Plans |
Phase 4 Results: A benefits tracking process for sponsors |
Phase 5 Results: OCM Playbook |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Preparation | Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|---|
| Activities |
Organize and Plan Workshop
|
Assess OCM Capabilities
|
Analyze Impact of the Change
|
Develop Engagement & Transition Plans
|
Institute an OCM Playbook
|
| Deliverables |
|
|
|
|
|
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 week
Start with an analyst kick off call:
Then complete these activities…
With these tools & templates:
Work with an analyst to:
Then complete these activities…
With these tools & templates:
Continuous change and transition are increasingly common in organizations in 2016.
A state of constant change can make managing change more difficult in some ways, but easier in others.
By managing organizational change more effectively, the PMO can build credibility to manage both business and IT projects.
"The greatest danger in times of turbulence is not the turbulence; it is to act with yesterday’s logic." – Peter Drucker
In this phase, we will gauge your PMO’s abilities to effectively facilitate change based upon your change management capability levels and your wider organization’s responsiveness to change.
There are many moving parts involved in successfully realizing an organizational change.
For instance, even with an effective change toolkit and strong leadership support, you may still fail to achieve project benefits due to such factors as a staff environment resistant to change or poor process discipline.
Use Info-Tech’s Organizational Change Management Capabilities Assessment to assess your readiness for change across 7 categories:
Download Info-Tech’s Organizational Change Management Capabilities Assessment.
Use the drop downs to indicate the degree to which you agree or disagree with each of the statements in the survey.
Info-Tech Insight
Every organization has some change management capability.
Even if you find yourself in a fledgling or nascent PMO, with no formal change management tools or processes, you can still leverage other categories of change management effectiveness.
If you can, build upon people-related assets like “Organizational Knowledge” and “Cultural Readiness” as you start to hone your OCM toolkit and process.
Tab 3 of the Assessment tool shows your capabilities graph.
Focus on improving the first capability dimension (from left/front to right/back) that rates below 10.
Tab 4 of the Assessment tool reveals Info-Tech’s recommendations based upon your survey responses.
Use the red/yellow/green boxes to focus your efforts.
The content in the recommendations boxes is based around these categories and the advice therein is designed to help you to, in the near term, bring your capabilities up to the next level.
Each of Info-Tech’s seven OCM capabilities match up with different steps and phases in this blueprint.
We recommend that you consume this blueprint in a linear fashion, as each phase matches up to a different set of OCM activities to be executed at each phase of a project. However, you can use the legend below to locate how and where this blueprint will address each capability.
| Cultural Readiness | 2.1 / 2.2 / 3.1 / 3.2 / 3.3 |
|---|---|
| Leadership Support | 2.1 / 4.1 / 5.1 |
| Organizational Knowledge | 2.1 / 3.1 / 3.2 |
| Change Management Skills | 2.1 / 2.2 / 3.1 / 3.2 / 3.3 |
| Toolkit & Templates | 2.1 / 2.2 / 3.1 / 3.2 / 3.3 / 4.1 / 5.1 |
| Process Discipline | 2.1 / 2.2 / 3.1 / 3.2 / 3.3 / 4.1 / 5.1 |
| KPIs & Metrics | 3.2 / 5.1 |
Info-Tech Insight
Organizational change must be planned in advance and managed through all phases of a project.
Organizational change management must be embedded as a key aspect throughout the project, not merely a set of tactics added to execution phases.
Now that you have a sense of your change management strengths and weaknesses, you can begin to formalize the organizational specifics of these.
Gather PMO and IT staff, as well as other key project and business stakeholders, and perform a SWOT analysis based on your Capabilities Assessment.
Follow these steps to complete the SWOT analysis:
Use the SWOT Analysis Template on the next slide to document results.
Use the examples provided in the SWOT analysis to kick-start the discussion.
The purpose of the SWOT is to begin to define the goals of this implementation by assessing your change management capabilities and cultivating executive level, business unit, PMO, and IT alignment around the most critical opportunities and challenges.
|
Strengths
|
Weaknesses
|
|
Opportunities
|
Threats
|
Before you move on to develop and implement your OCM processes, spend some time documenting how change management success will be defined for your organization and what conditions will be necessary for success to be achieved.
With the same group of individuals who participated in the SWOT exercise, discuss the below criteria. You can make this a sticky note or a whiteboard activity to help document discussion points.
| What conditions are necessary for OCM to succeed? | How will success be defined? |
|---|---|
|
|
|
|
Use the table below to document any additional factors or uncertainties that could impact implementation success.
These could be external factors that may impact the PMO, or they could be logistical considerations pertaining to staffing or infrastructure that may be required to support additional change management processes and procedures.
"[A]ll bets are off when it comes to change. People scatter in all directions. Your past experiences may help in some way, but what you do today and how you do it are the new measures people will use to evaluate you." – Tres Roeder
| Consideration | Description of Need | Potential Resource Implications | Potential Next Steps | Timeline |
|---|---|---|---|---|
| e.g. The PMO will need to train PMs concerning new processes. | We will not only need to train PM staff in the new processes and documentation requirements, but we will also have to provide ongoing training, be it monthly, quarterly, or yearly. | Members of PMO staff will be required to support this training. | Analyze impact of redeploying existing resources vs. outsourcing. | Q3 2016 |
| e.g. We will need to communicate new OCM requirements to the business and wider organization. | The PMO will be taking on added communication requirements, needing to advertise to a wider audience than it has before. | None | Work with business side to expand the PMO’s communications network and look into leveraging existing communication portals. | Next month |
In subsequent phases of this blueprint, we will help the PMO develop an OCM strategy that aligns with your organization’s project timelines.
In this step (1.2), we will do some pre-work for you by determining a change initiative to pilot during this process and defining some of the roles and responsibilities for the OCM activities that we’ll develop in this blueprint.
In keeping with the need to align organizational change management activities with the actual timeline of the project, the next three phases of this blueprint will move from discussing OCM in general to applying OCM considerations to a single project.
As you narrow your focus to the organizational change stemming from a specific initiative, review the below considerations to help inform the decisions that you make during the activities in this step.
The need for OCM rigor will vary depending on project size and complexity.
While we recommend that every project has some aspect of change management to it, you can adjust OCM requirements accordingly, depending on the type of change being introduced.
| Incremental Change | → | Transformational Change |
|---|---|---|
|
Organizational change management is highly recommended and beneficial for projects that require people to:
|
Organizational change management is required for projects that require people to:
|
Phases 2, 3, and 4 of this blueprint will guide you through the process of managing organizational change around a specific project. Select one now that is currently in your request or planning stages to pilot through the activities in this blueprint. We recommend choosing one that involves a large, transformational change.
Use Info-Tech’s project levels to define the complexity of the project that you’ve chosen to pilot.
Defining your project level will help determine how much effort and detail is required to complete steps in this blueprint – and, beyond this, these levels can help you determine how much OCM rigor to apply across each of the projects in your portfolio.
| Incremental Change | → | Transformational Change |
|---|---|---|
| Level 1 | Level 2 | Level 3 |
|
|
|
For a more comprehensive assessment of project levels and degrees of risk, see Info-Tech’s Create Project Management Success blueprint – and in particular, our Project Level Assessment Tool.
What is the project changing?
How will it work?
What are the implications of doing nothing?
What are the phases in execution?
What is the desired outcome?
What can be measured? How?
When should it be measured?
List the goals.
Align with business and IT goals.
List the costs:
Software costs
Hardware costs
Implementation costs
List the risks:
Business risks
Technology risks
Implementation risks
| Planned Project Activities & Milestones | Timeline | Owner(s) | Status | |
|---|---|---|---|---|
| 1. | Example: Vendor Evaluation | Finish by Q4-17 | Jessie Villar | In progress |
| 2. | Example: Define Administrative Policies | Finish by Q4-17 | Gerry Anantha | Starting Q2 |
The key to change management success is ensuring that the right OCM activities are carried out at the right time. The below graphic serves as a quick view of what OCM activities entail and when they should be done.
| Project Phase or Milestone | Estimated Start Date | Estimated End Date | Associated OCM Requirement(s) |
|---|---|---|---|
| e.g. Planning | e.g. Already in progress | e.g. July | e.g. Impact Assessment |
| e.g. Requirements & Design | e.g. August | e.g. October | e.g. Stakeholder Engagement & Transition Planning |
Info-Tech Insight
Proactive change management is easier to execute and infinitely more effective than managing change reactively. A reactive approach to OCM is bound to fail. The better equipped the PMO is to plan OCM activities in advance of projects, the more effective those OCM efforts will be.
The PMO leader will need to delegate responsibility for many to all of these OCM activities throughout the project lifecycle.
Compile a list of PMO staff, project workers, and other stakeholders who will likely be required to support these processes at each step, keeping in mind that we will be doing a more thorough consideration of the resources required to support an OCM program in Phase 3.
| OCM Activity | Resources Available to Support |
|---|---|
| Impact Assessment | |
| Stakeholder Engagement | |
| Transition Planning | |
| Training | |
| Communications | |
| Evaluation and Monitoring |
Info-Tech Insight
OCM processes require a diverse network to support them.
While we advocate an approach to org change that is centralized through the PMO, this doesn’t change the fact that the PMO’s OCM processes will need to engage the entirety of the project eco-system.
In addition to IT/PMO directors, org change processes will engage a group as varied as project sponsors, project managers, business analysts, communications leads, and HR/training leads.
Ensure that you are considering resources and infrastructure beyond IT as you plan your OCM processes – and engage these stakeholders early in this planning process.
In many cases, the core team only has one or two people responsible for impact analysis and plan development in addition to you, the sponsor, who is accountable for leadership and benefits realization.
For larger initiatives, the core team might include several co-sponsors or advisors from different departments or lines of business, along with a handful of staff working together on analysis and planning.
Some team structure templates/examples:
Small (e.g. Office 365)
Medium-Large (e.g. business process initiative)
Complex Transformational (e.g. business model initiative, company reorg)
In keeping with the eclectic network of stakeholders that is required to support OCM processes, Phase 2 is broken up into sections that will, by turn, engage project sponsors, project managers, business analysts, communications leads, and HR/training leads.
At each step, our intention is to arm the PMO with a toolkit and a set of processes that will help foster a project culture that is proactive about change.
"It is amazing what you can accomplish if you do not care who gets the credit." – Harry Truman
| Project Step | PMO | Sponsor | Project Manager | Business Analyst | Blueprint Reference |
|---|---|---|---|---|---|
| Make a high-level case for change. |
A |
R | R/C | C | 1.1 |
| Initiate project/change planning. | A | C | R | C | 1.2 |
| Analyze full breadth and depth of impact. | A | C | R | R | 1.3 |
| Assess communications and training requirements. | A | C | R | R | 2.1 |
| Develop communications, training, and other transition plans. | A | R | C | R | 2.2-3 |
| Approve and communicate transition plans. | A | C | R | C | 2.4 |
| Analyze impact and progress. | A | C | R | R | 3.1 |
| Revise project/change planning. | A | C | R | C | 3.2 |
| Highlight and leverage successes. | A | R | C | C | 3.3 |
Use Info-Tech’s Transition Team Communications Template to help communicate the outcomes of this step.
Download Info-Tech’s Transition Team Communications Template.
"Managers and user communities need to feel like they are a part of a project instead of feeling like the project is happening to them. It isn't just a matter of sending a few emails or putting up a page on a project website." – Ross Latham
Industry Natural Resources
Source Interview
"The hard systems – they’re easy. It’s the soft systems that are challenging... Be hard on the process. Be easy on the people." – Business Analyst, natural resources company
Take Info-Tech’s OCM capabilities questionnaire and receive custom analyst recommendations concerning next steps.
Work with a seasoned analyst to assess your PMO’s strengths, weaknesses, opportunities, and threats to becoming an org change leader.
Work with an analyst to clarify how the success of this initiative will be measured and what conditions are necessary for success.
Receive custom analyst insights on rightsizing your OCM planning efforts based on project size, timeline, and resource availability.
Harness analyst experience to develop a project-specific timeline for the PMO’s change management activities to better plan your efforts and resources.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 week
Discuss these issues with an analyst:
Then complete these activities…
With these tools & templates:
Work with an analyst to:
Then complete these activities…
With these tools & templates:
Org Change Step #1: Make the case for change during the request phase
Initiation→Planning→Execution→Monitoring & Controlling→Closing
Even before project planning and initiation begin, sponsors and requestors have org change responsibilities around communicating the need for a change and demonstrating their commitment to that change.
In this step, we will look at the OCM considerations that need to be factored in during project ideation.
The slides ahead will cover what the PMO can do to help foster these considerations among project sponsors and requestors.
While this project may already be in the planning phase, the activities in the slides ahead will help lay a solid OCM foundation as you move ahead into the impact assessment and stakeholder engagement steps in this phase.
Strongly recommended: include the sponsor for your pilot OCM project in many of the following activities (see individual activity slides for direction).
Info-Tech Insight
Make active sponsorship a criteria when scoring new requests.
Projects with active sponsors are far more likely to succeed than those where the sponsor cannot be identified or where she/he is unable or unwilling to champion the initiative throughout the organization.
Consider the engagement level of sponsors when prioritizing new requests. Without this support, the likelihood of a change initiative succeeding is far diminished.
Somewhere along the way a stereotype arose of the project sponsor as a disengaged executive who dreams up a project idea and – regardless of that idea’s feasibility or merit – secures funding, pats themselves on the back, and does not materialize again until the project is over to pat themselves on the back again.
Indeed, it’s exaggerated, based partly on the fact that sponsors are almost always extremely busy individuals, with very demanding day jobs on top of their responsibilities as sponsors. The stereotype doesn’t capture the very real day-to-day project-level responsibilities of project sponsors.
Leading change management institute, Prosci, has developed a checklist of 10 identifiable traits and responsibilities that PMO leaders and project managers should help to foster among project sponsors. As Prosci states, the checklist “can be used as an audit tool to see if you are utilizing best practices in how you engage senior leaders on your change initiatives.”
Are your sponsors:
Many change initiatives require significant investments of political capital to garner approval, funding, and involvement from key executives. This process can take months or even years before the project is staffed and implementation begins.
| Executive/Stakeholder | Degree of Support | Ability to Influence | Potential Contribution/Engagement Strategy |
|---|---|---|---|
| Board of Directors | Med | High | |
| CEO | |||
| CFO | |||
| CIO | |||
| CxO |
“The stakes of having poorly engaged executive sponsors are high, as are the consequences and costs. PMI research into executive sponsorship shows that one in three unsuccessful projects fail to meet goals due to poorly engaged executive sponsors.”
– PMI, 2014
Build desire for change.
The project sponsor is accountable for defining the high-level scope and benefits of the project. The PMO needs to work with the sponsor during the ideation phase to help establish the need for the proposed change.
Use the table below to begin developing a compelling vision and story of change. If you have not already defined high-level goals and deliverables for your project, download Info-Tech’s Light Project Request Form (a Detailed Project Request Form is also available).
| Why is there a need to change? | |
|---|---|
| How will change benefit the organization? | |
| How did we determine this is the right change? | |
| What would happen if we didn’t change? | |
| How will we measure success? |
See Info-Tech’s Optimize Project Intake, Approval, and Prioritization blueprint for more detailed advice on working with requestors to define requirements and business value of new requests.
Crucial facts, data, and figures are made more digestible, memorable, and actionable when they are conveyed through a compelling storyline.
While you certainly need high-level scope elements and a rigorous cost-benefit analysis in your business case, projects that require organizational change also need a compelling story or vision to influence groups of stakeholders.
As the PMO works with sponsors to identify and document the goals and benefits of change, begin to sketch a narrative that will be compelling to the organization’s varied audiences.
Structuring an effective project narrative:
Research shows (Research and impacts cited in Torben Rick’s “Change Management Require[s] a Compelling Story,” 2014) that when managers and employees are asked about what most inspires them in their work, their responses are evenly split across five forms of impact:
"Storytelling enables the individuals in an organization to see themselves and the organization in a different light, and accordingly take decisions and change their behavior in accordance with these new perceptions, insights, and identities." – Steve Denning
Info-Tech Insight
A micro-to-macro change narrative. A compelling org change story needs to address all five of these impacts in order to optimally engage employees in change. In crafting a narrative that covers both the micro and macro levels, you will be laying a solid foundation for adoption throughout the organization.
Using a whiteboard to capture the discussion, address the 5 levels of change impact covered on the previous slide.
Whatever story you develop to communicate the goals and the benefits of the change, ultimately it should be the sponsor who communicates this message to the organization at large.
Given the competing demands that senior leaders face, the PMO still has a pivotal role to play in helping to plan and facilitate these communications.
The PMO should help sponsors by providing insights to shape change messaging (refer to the characteristics outlined in the table below for assistance) and by developing a sponsorship action plan (Activity 2.1.4).
| Tips for communicating a change story effectively: | |
|---|---|
| Identify and appeal to the audience’s unique frames of reference. | e.g. “Most of you remember when we…” |
| Include concrete, vivid details to help visualize change. | e.g. “In the future, when a sales rep visits a customer in Wisconsin, they’ll be able to process a $100,000 order in seconds instead of hours.” |
| Connect the past, present, and future with at least one continuous theme. | e.g. “These new capabilities reaffirm our long-standing commitment to customers, as well as our philosophy of continuously finding ways to be more responsive to their needs.” |
“[T]he sponsor is the preferred sender of messages related to the business reasons and organizational implications for a particular initiative; therefore, effective sponsorship is crucial in building an awareness of the need for change.
Sponsorship is also critical in building the desire to participate and support the change with each employee and in reinforcing the change.”
– Prosci
Use the below dimensions to gauge your organization’s appetite for change. Analyzing this will help determine the form and force of communications.
In the next slide, we will base aspects of your sponsorship action plan on whether an organization’s indicator is “high” or “low” across these three dimensions.
Three key dimensions determine the appetite for cultural change (Dimensions taken from Joanna Malgorzata Michalak’s “Cultural Catalysts and Barriers of Organizational Change Management: a Preliminary Overview,” 2010):
| Power Distance | Refers to the acceptance that power is distributed unequally throughout the organization. Organizations with a high power distance indicator show that the unequal power distribution is accepted by the less powerful employees. |
|---|---|
| Individualism | Organizations that score high in individualism have employees who are more independent; those who score low in individualism fall into the collectivism side where employees are strongly tied to one another or their groups. |
| Uncertainty Avoidance | Describes the level of acceptance that an organization has towards uncertainty. Those who score high in this area find that their employees do not favor “uncertain” situations, while those that score low in this area find that their employees are comfortable with change and uncertainty. |
"Societies with a high indicator of power distance, individualism, and uncertainty avoidance create vital inertial forces against transformation." – Michalak
| Group | Activity | Est. Weekly Effort | Comments/Frequency |
|---|---|---|---|
| Project Team | Ad hoc check-in on progress | 30 mins | Try to be visible at least once a week |
| Attend status meetings | 30 mins | Every second Tuesday, 9 am | |
| Senior Managers | Touch base informally | 45 mins | Aim for bi-weekly, one-on-one touchpoints |
| Lead steering committee meetings | 60 mins | First Thursday of the month, 3 pm | |
| End Users | Organization-wide emails | Ad hoc, 20 mins | As required, with PMO assistance |
"To manage change is to tell people what to do... but to lead change is to show people how to be." – Weick & Quinn
Use Info-Tech’s Transition Team Communications Template to help communicate the outcomes of this step.
The following activities should be recorded in the template:
Activity 2.1.2
In addition, the outcome of Activity 2.1.4, the “Sponsorship Action Plan,” should be converted to a format such as Word and provided to the project sponsor.
Download Info-Tech’s Transition Team Communications Template.
"In most work situations, the meaning of a change is likely to be as important, if not more so, than the change itself."
– Roethlisberger (cited in Burke)
In the previous step, we established a process and some accountabilities to help the PMO and project sponsors make the case for change during the ideation and initiation phase of a project.
In this step, we will help with the project planning phase by establishing a process for analyzing how the change will impact various dimensions of the business and how to manage these impacts to best ensure stakeholder adoption.
Brace for Impact…
A thorough analysis of change impacts will help the PMO:
In the absence of an assigned change manager, organizational change impact assessments are typically performed by a business analyst or the project manager assigned to the change initiative.
Sample RACI for this activity. Define these accountabilities for your organization before proceeding with this step.
| Project Sponsor | PMO | PM or BA | |
|---|---|---|---|
| Survey impact dimensions | I | A | R |
| Analyze impacts across multiple stakeholder groups | I | A | R |
| Assess required OCM rigor | I | A/R | C |
| Manage individual impacts | I | A | R |
Info-Tech Insight
Bring perspective to an imperfect view.
No individual has a comprehensive view of the potential impact of change.
Impact assessment and analysis is most effective when multiple viewpoints are coordinated using a well-defined list of considerations that cover a wide breadth of dimensions.
Revisit and refine the impact analysis throughout planning and execution, as challenges to adoption become more clear.
Info-Tech’s Organizational Change Management Impact Analysis Tool helps to document the change impact across multiple dimensions, enabling the PMO to review the analysis with others to ensure that the most important impacts are captured. The tool also helps to effectively monitor each impact throughout project execution.
Download Info-Tech’s Organizational Change Impact Analysis Tool.
Info-Tech Insight
Anticipate the unexpected. Impact analysis is the cornerstone of any OCM strategy. By shining a light on considerations that might have otherwise escaped project planners and decision makers, an impact analysis is an essential component to change management and project success.
The “2. Set Up” tab of the Impact Tool is where you enter project-specific data pertaining to the change initiative.
The inputs on this tab are used to auto-populate fields and drop-downs on subsequent tabs of the analysis.
Document the stakeholders (by individual or group) associated with the project who will be subject to the impacts.
You are allowed up to 15 entries. Try to make this list comprehensive. Missing any key stakeholders will threaten the value of this activity as a whole.
If you find that you have more than 15 individual stakeholders, you can group individuals into stakeholder groups.
Keep in mind...
An impact analysis is not a stakeholder management exercise.
Impact assessments cover:
Stakeholder management covers:
We will cover the latter in the next step.
“As a general principle, project teams should always treat every stakeholder initially as a recipient of change. Every stakeholder management plan should have, as an end goal, to change recipients’ habits or behaviors.”
– PMI, 2015
Use the survey on tab 3 of the Impact Analysis Tool to determine the dimensions of change that are relevant.
The impact analysis is fueled by the thirteen-question survey on tab 3 of the tool.
This survey addresses a comprehensive assortment of change dimensions, ranging from customer-facing considerations, to employee concerns, to resourcing, logistical, and technological questions.
Once you have determined the dimensions that are impacted by the change, you can go on to assess how individual stakeholders and stakeholder groups are affected by the change.
Screenshot of tab “3. Impact Survey,” showing the 13-question survey that drives the impact analysis.
Ideally, the survey should be performed by a group of project stakeholders together. Use the drop-downs in column K to record your responses.
"A new system will impact roles, responsibilities, and how business is conducted within an organization. A clear understanding of the impact of change allows the business to design a plan and address the different levels of changes accordingly. This approach creates user acceptance and buy-in."
– January Paulk, Panorama Consulting
As you assess change impacts, keep in mind that no impact will be felt the same across the organization. Depth of impact can vary depending on the frequency (will the impact be felt daily, weekly, monthly?), the actions necessitated by it (e.g. will it change the way the job is done or is it simply a minor process tweak?), and the anticipated response of the stakeholder (support, resistance, indifference?).
Use the Organizational Change Depth Scale below to help visualize various depths of impact. The deeper the impact, the tougher the job of managing change will be.
| Procedural | Behavioral | Interpersonal | Vocational | Cultural |
|---|---|---|---|---|
| Procedural change involves changes to explicit procedures, rules, policies, processes, etc. | Behavioral change is similar to procedural change, but goes deeper to involve the changing tacit or unconscious habits. | Interpersonal change goes beyond behavioral change to involve changing relationships, teams, locations, reporting structures, and other social interactions. | Vocational change requires acquiring new knowledge and skills, and accepting the loss or decline in the value or relevance of previously acquired knowledge and skills. | Cultural change goes beyond interpersonal and vocational change to involve changing personal values, social norms, and assumptions about the meaning of good vs. bad or right vs. wrong. |
| Example: providing sales reps with mobile access to the CRM application to let them update records from the field. | Example: requiring sales reps to use tablets equipped with a custom mobile application for placing orders from the field. | Example: migrating sales reps to work 100% remotely. | Example: migrating technical support staff to field service and sales support roles. | Example: changing the operating model to a more service-based value proposition or focus. |
See the next slide for an accompanying screenshot of a change impact table from tab 4 of the Analysis Tool.
The stakeholder groups entered on the Set Up will auto-populate in column B of each table.
Your “yes” responses from the survey tab will auto-populate in the cells to the right of the “Change Impact” cells.
Use the drop-downs in this column to select how often the impact will be felt for each group (e.g. daily, weekly, periodically, one time, or never).
“Actions” include “change to core job duties,” “change to how time is spent,” “confirm awareness of change,” etc.
Use the drop-downs to hypothesize what the stakeholder response might be. For now, for the purpose of the impact analysis, a guess is fine. We will come back to build a communications plan based on actual responses in Phase 3 of this blueprint.
Based upon your assessment of each individual impact, the Analysis Tool will provide you with an “Overall Impact Rating” in tab 5.
Projects in the red should have maximum change governance, applying a full suite of OCM tools and templates, as well as revisiting the impact analysis exercise regularly to help monitor progress.
Increased communication and training efforts, as well as cross-functional partnerships, will also be key for success.
Projects in the yellow also require a high level of change governance. Follow the steps and activities in this blueprint closely, paying close attention to the stakeholder engagement activities in the next step to help sway resistors and leverage change champions.
In order to free up resources for those OCM initiatives that require more discipline, projects in green can ease up in their OCM efforts somewhat. With a high likelihood of adoption as is, stakeholder engagement and communication efforts can be minimized somewhat for these projects, so long as the PMO is in regular contact with key stakeholders.
"All change is personal. Each person typically asks: 'What’s in it for me?'" – William T. Craddock
Top-Five Highest Risk Impacts table: This table displays the highest risk impacts based on frequency and action inputs on Tab 4.
Top-Five Most Impacted Stakeholders table: Here you’ll find the stakeholders, ranked again based on frequency and action, who will be most impacted by the proposed changes.
Top Five Supporters table: These are the 5 stakeholders most likely to support changes, based on the Anticipated Response column on Tab 4.
The stakeholder groups entered on the Set Up Tab will auto-populate in column B of each table.
In addition to these outputs, this tab also lists top five change resistors, and has an impact register and list of potential impacts to watch out for (i.e. your “maybe” responses from tab 3).
A proper risk analysis often reveals risks and mitigations that are more important to other people in the organization than those managing the change. Failure to do a risk analysis on other people’s behalf can be viewed as negligence.
In the table below, document the risks related to the assumptions being made about the upcoming change. What are the risks that your assumptions are wrong? Can steps be taken to avoid these risks?
| Risk Assumption | Magnitude if Assumption Wrong | Likelihood That Assumption Is Wrong | Mitigation Strategy | Assessment |
|---|---|---|---|---|
| e.g. Customers will accept shipping fees for overweight items > 10 pounds | Low | High | It's a percentage of our business, and usually accompanies a sharply discounted product. We need to extend discretionary discounting on shipping to supervisory staff to mitigate the risk of lost business. | Re-assess after each quarter. |
"One strategy to minimize the impact is to determine the right implementation pace, which will vary depending on the size of the company and the complexity of the project" – Chirantan Basu
Use the table below to brainstorm the business opportunities arising from your change initiative. Consider if the PMO can take steps to help improve the outcomes either through supporting the project execution or through providing support to the business.
| Opportunity Assumption | Potential Value | Likelihood That Assumption Is Wrong | Leverage Strategy | Assessment |
|---|---|---|---|---|
| e.g. Customer satisfaction can increase as delivery time frames for the remaining custom products radically shrink and services extend greatly. | High | Medium | Reset the expectations of this market segment so that they go from being surprised by good service to expecting it. | Our competitors will not be able to react to this. |
Info-Tech Insight
The bigger the change, the bigger the opportunity. Project and change management has traditionally focused on a defensive posture because organizations so often fail to mitigate risk. Good change managers also watch for opportunities to improve and exploit the outcomes of the change.
Now that you’ve assessed the impacts of the change, and the accompanying risks and opportunities, use the table below to document metrics that can be used to help assess the management of the change.
| Metric | Calculation | How to Collect | Who to Report to | Frequency |
|---|---|---|---|---|
| Price overrides for new shipping costs | It is entered as a line item on invoices, so it can be calculated as % of shipping fees discounted. | Custom report from CRM (already developed). | Project Steering Committee | Project Steering Committee |
If your organization doesn’t have a standard business case document, use one of Info-Tech’s templates. We have two templates to choose from, depending on the size of the project and the amount of rigor required:
Download Info-Tech’s Comprehensive Business Case Template for large, complex projects or our Fast Track Business Case Template for smaller ones.
Work with an analyst to exercise your storytelling muscles, building out a process to help make the case for change throughout the organization.
Utilize analyst experience to help develop a sponsorship action plan to help facilitate more engaged change project sponsors.
Get an analyst perspective on how each impact may affect different stakeholders in order to assist with the project and OCM planning process.
Rightsize your response to change impacts by developing a game plan to mitigate each one according to adoption likelihood.
Work with the analyst to translate the risks and opportunities identified during the impact analysis into points of consideration to help inform and improve the business case for the project.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 4 to 6 weeks
Discuss these issues with analyst:
Then complete these activities…
With these tools & templates:
Discuss these issues with analyst:
Then complete these activities…
With these tools & templates:
Discuss these issues with analyst:
Then complete these activities…
With these tools & templates:
Empowerment: Increased worker mobility, effect of millennials in the workforce, and lower average tenure means that people are less tolerant of a hierarchical, command-and-control approach to change.
Noise: Inundation with communications and diversity of channels means the traditional “broadcast” approach to communicating change doesn’t work (i.e. you can’t expect every email to get everyone’s attention).
As a result, disciplines around organizational change tend to be less linear and deliberate than they were in the past.
"People don’t resist change. They resist being changed."
How to manage change in organizations of today and the future:
Accountabilities for change management are still required. While change management needs to adopt more collaborative and organic approaches, org change success still depends on assigning appropriate accountabilities. What’s changed in the move to matrix structure is that accountabilities need to be facilitated more collaboratively.
PMO leaders and IT experts often find themselves asked to help implement or troubleshoot technology-related business projects that are already in flight.
The PMO will end up with perceived or de facto responsibility for inadequate planning, communications, and training around technology-enabled change.
Projects led by the IT PMO tend to be more vulnerable to underestimating the impact on people and processes on the business side.
Make sure you engage stakeholders and representatives (e.g. “power users”) from user populations early enough to refine and validate your impact assessments.
Projects led by people on the business side tend to be more vulnerable to underestimating the implications of technology changes.
Make sure IT is involved early enough to identify and prepare for challenges and opportunities involving integration, user training, etc.
"A major impediment to more successful software development projects is a corporate culture that results in a lack of collaboration because business executives view the IT departments as "order takers," a view disputed by IT leaders."
– David Ramel (cited by Ben Linders)
Stakeholders will not only be highly involved in the process improvement initiative, but they also may be participants, so it’s essential that you get their buy-in for the initiative upfront.
Use Info-Tech’s Stakeholder Engagement Workbook to help plan how stakeholders rate in terms of engagement with the project.
Once you have identified where different stakeholders fall in terms of interests, influence, and support for/engagement with the change initiative, you can structure your communication plan (to be developed in step 3.2) based on where individuals and stakeholder groups fall.
Download Info-Tech’s Stakeholder Engagement Workbook.
The engagement plan is a structured and documented approach for:
Download Info-Tech’s Stakeholder Engagement Workbook.
Refer to your project level assessment from 1.2.2:
Info-Tech Insight
The more transformational the change, the more it will affect the org chart – not just after the implementation, but also through the transition.
Take time early in the project to define the reporting structure for the project/transition team, as well as any teams and roles supporting the transition.
Use the RACI table on the next slide to clarify who will be accountable, responsible, consulted, and informed for key tasks and activities around this change initiative.
Perform a RACI exercise pertaining to your pilot change initiative to clarify who to include in the stakeholder engagement activity.
Don’t reinvent the wheel: revisit the list of stakeholders and stakeholder groups from your impact assessment. The purpose of the RACI is to bring some clarity to project-specific responsibilities.
| Tasks | PMO | Project Manager | Sr. Executives | Technology SME | Business Lead | Process Owner | HR | Trainers | Communications |
|---|---|---|---|---|---|---|---|---|---|
| Meeting project objectives | A | R | A | R | R | ||||
| Identifying risks and opportunities | A | R | A | C | C | C | C | I | I |
| Building the action plan | A | R | C | R | R | R | R | R | R |
| Planning and delivering communications | A | R | C | C | C | C | C | R | A |
| Planning and delivering training | A | R | C | C | C | C | R | A | C |
| Gathering and analyzing feedback and KPIs | A | R | C | C | C | C | C | R | R |
Copy the results of this RACI exercise into tab 1 of the Stakeholder Engagement Workbook. In addition, it can be used to inform the designated RACI section in the Transition Plan Template. Revise the RACI Table there as needed.
Define key stakeholders (or stakeholder groups) who are affected by the project or are in positions to enable or block change.
In tab three of the Stakeholder Engagement Workbook, compile the list of stakeholders who are touched by the change and whose adoption of the change will be key to project success.
To save time, you can copy and paste your stakeholder list from the Set Up tab of the Organizational Change Management Impact Analysis Tool into the table below and edit the list as needed.
Formal stakeholder analysis should be:
Info-Tech Insight
Resistance is, in many cases, avoidable. Resistance is commonly provided by people who are upset about not being involved in the communication. Missed opportunities are the same: they usually could have been avoided easily had somebody known in time. Use the steps ahead as an opportunity to ensure no one has been missed.
Use tab 4 of the Stakeholder Engagement Workbook to systematically assess each stakeholder's influence, interest, and potential contribution to the project as well as to develop plans for engaging each stakeholder or stakeholder group.
Use the drop-downs to select stakeholders and stakeholder groups. These will automatically populate based on your inputs in tab 3.
Rate each stakeholder on a scale of 1 to 10 in terms of her/his influence in the organization. Not only do these rankings feed the stakeholder map that gets generated on the next slide, but they will help you identify change champions and resistors with influence.
Similar to the ranking under “Influence,” rate the “Interest” and “Potential Contribution” to help identify stakeholder engagement.
Document how you will engage each stakeholder and stakeholder group and document how soon you should communicate with them concerning the change. See the following slides for advice on eliciting change input.
Use the elicitation methods on the following slides to engage stakeholders and gather change requirements.
| Method | Description | Assessment and Best Practices | Stakeholder Effort | BA/PMO Effort |
|---|---|---|---|---|
| Casual Observation | The process of observing stakeholders performing tasks where the stakeholders are unaware they are being observed. | Capture true behavior through observation of stakeholders performing tasks without informing them that they are being observed. This information can be valuable for mapping business process; however, it is difficult to isolate the core business activities from unnecessary actions. | Low | Medium |
| Formal Observation | The process of observing stakeholders performing tasks where the stakeholders are aware they are being observed. | Formal observation allows business analysts to isolate and study the core activities in a business process because the stakeholder is aware they are being observed. Stakeholders may become distrusting of the business analyst and modify their behavior if they feel their job responsibilities or job security are at risk. | Low | Medium |
Info-Tech Insight
Observing stakeholders does not uncover any information about the target state. Be sure to use contextual observation in conjunction with other techniques to discover the target state.
| Method | Description | Assessment and Best Practices | Stakeholder Effort | BA/PMO Effort |
|---|---|---|---|---|
| Closed-Response Survey | A survey that has fixed responses for each answer. A Likert-scale (or similar measures) can be used to have respondents evaluate and prioritize possible requirements. | Closed-response surveys can be sent to large groups and used to quickly gauge user interest in different functional areas. They are easy for users to fill out and don’t require a high investment of time. However, their main deficit is that they are likely to miss novel requirements that are not listed. As such, closed-response surveys are best used after initial elicitation or brainstorming to validate feature groups. | Low | Medium |
| Open-Response Survey | A survey that has open-ended response fields. Questions are fixed, but respondents are free to populate the field in their own words. Open-response surveys take longer to fill out than closed, but can garner deeper insights. | Open-response surveys are a useful supplement (and occasionally a replacement) for group elicitation techniques, like focus groups, when you need to receive an initial list of requirements from a broad cross-section of stakeholders. Their primary shortcoming is the analyst can’t immediately follow up on interesting points. However, they are particularly useful for reaching stakeholders who are unavailable for individual one-on-ones or group meetings. | Medium | Medium |
Info-Tech Insight
Surveys can be useful mechanisms for initial drafting of raw requirements (open response) and gauging user interest in proposed requirements or feature sets (closed response). However, they should not be the sole focus of your elicitation program due to lack of interactivity and two-way dialogue with the business analyst.
| Method | Description | Assessment and Best Practices | Stakeholder Effort | BA/PMO Effort |
|---|---|---|---|---|
|
Structured One-on-One Interview |
In a structured one-on-one interview, the business analyst has a fixed list of questions to ask the stakeholder and follows up where necessary. | Structured interviews provide the opportunity to quickly hone in on areas of concern that were identified during process mapping or group elicitation techniques. They should be employed with purpose – to receive specific stakeholder feedback on proposed requirements or help identify systemic constraints. Generally speaking, they should take 30 minutes or less to complete. | Low | Medium |
|
Unstructured One-on-One Interview |
In an unstructured one-on-one interview, the business analyst allows the conversation to flow freely. The BA may have broad themes to touch on, but does not run down a specific question list. | Unstructured interviews are most useful for initial elicitation when brainstorming a draft list of potential requirements is paramount. Unstructured interviews work best with senior stakeholders (sponsors or power users), since they can be time consuming if they’re applied to a large sample size. It’s important for BAs not to stifle open dialogue and allow the participants to speak openly. They should take 60 minutes or less to complete. | Medium | Low |
Info-Tech Insight
Interviews should be used with “high-value targets.” Those who receive one-on-one face time can help generate good requirements, as well as allow effective communication around requirements at a later point (i.e. during the analysis and validation phases).
| Method | Description | Assessment and Best Practices | Stakeholder Effort | BA/PMO Effort |
|---|---|---|---|---|
| Focus Group | Focus groups are sessions held between a small group (typically ten individuals or less) and an experienced facilitator who leads the conversation in a productive direction. | Focus groups are highly effective for initial requirements brainstorming. The best practice is to structure them in a cross-functional manner to ensure multiple viewpoints are represented and the conversation doesn’t become dominated by one particular individual. Facilitators must be wary of “groupthink” in these meetings (the tendency to converge on a single POV). | Medium | Medium |
Info-Tech Insight
Group elicitation techniques are most useful for gathering a wide spectrum of requirements from a broad group of stakeholders. Individual or observational techniques are typically needed for further follow-up and in-depth analysis with critical power users or sponsors.
"Each person has a learning curve. Take the time to assess staff individually as some don’t adjust to change as well as others. Some never will." – CEO, Manufacturing Firm
Review all of these elicitation methods as you go through the workbook as a group. Be sure to document and discuss any other elicitation methods that might be specific to your organization.
| Elicitation method | Target stakeholder group(s) | PMO staff responsible for eliciting input | Next update to PMO |
|---|---|---|---|
| One-on-one structured interview | HR and Sales | Karla Molina | August 1 |
Info-Tech Insight
Engagement paves the way for smoother communications. The “engagement” approach (rather than simply “communication”) turns stakeholders and users into advocates who help boost your message, sustain change, and realize benefits without constant, direct intervention.
Tab 5 of the Workbook provides an output – a stakeholder map – based on your inputs in the previous tab. Use the stakeholder map to inform your communications requirements considerations in the next tab of the workbook as well as your transition plan in the next step.
This is a screenshot of the “Stakeholder Analysis” from tab 5 of the Workbook. The four quadrants of the map are:
Top Quadrants: Supporters
Bottom Quadrant: Blockers
Use the Communications Requirements tab in the Stakeholder Engagement Workbook.
Do this as a 1–2 hour project team planning session.
The table will automatically generate a list of stakeholders based on your stakeholder analysis.
Update the assumptions that you made about the impact of the change in the Impact Analysis with results of stakeholder engagement and elicitation activities.
Use the table on this tab to refine these assumptions as needed before solidifying your communications plan.
Define the action required from each stakeholder or stakeholder group (if any) for change to be successful.
Continually refine messages and methods for communicating with each stakeholder and stakeholder group.
Note words that work well and words that don’t. For example, some buzzwords might have negative connotations from previous failed initiatives.
Designate who is responsible for developing and honing the communications plan (see details in the following section on developing the transition plan).
After completing this section you will have a realistic, effective, and adaptable transition plan that includes:
These activities will enable you to:
"Everyone loves change: take what you know and replace it with a promise. Then overlay that promise with the memory of accumulated missed efforts, half-baked attempts, and roads of abandoned promises."
Once the stakeholder engagement step has been completed, the PMO needs to facilitate the involvement of the transition team to help carry out transition planning and communications strategies.
You should have already sketched out a core transition team in step 1.2.6 of this blueprint. As with all org change activities, ensuring that individuals are made accountable for the execution of the following activities will be key for the long-term success of your change initiative.
Refer to the team structure examples from Activity 1.2.6 of this blueprint if you are still finalizing your transition team.
Download Info-Tech’s Transition Plan Template to help capture and record the outcomes of the activities in this step.
By now the project sponsor, project manager, and business analysts (or equivalent) should have defined project timelines, requirements, and other key details. Use these to start your communications planning process.
If your members of the transition team are also part of the core project team, meet with them to elicit the project timeline and requirements.
| Project Milestone | Milestone Time Frame | Communications Activities | Activity Timing | Notes |
|---|---|---|---|---|
| Business Case Approval |
|
|||
| Pilot Go-Live |
|
|||
| Full Rollout Approval |
|
|||
| Full Rollout |
|
|||
| Benefits Assessment |
|
Info-Tech Insight
Communicate, communicate, communicate.
Staff are 34% more likely to adapt to change quickly during the implementation and adoption phases when they are provided with a timeline of impending changes specific to their department. (Source: McLean & Company)
OCM experts use terms like “Valley of Despair” to describe temporary drops in support and morale that inevitably occur with any significant change. Don’t let these temporary drops derail your change efforts.
Anticipate setbacks and make sure the project plan accommodates the time and energy required to sustain and reinforce the initiative as people move through stages of resistance.
Based on Don Kelley and Daryl Conner’s Emotional Cycle of Change.
Identify critical points in the change curve:
Leveraging the stakeholder analyses you’ve already performed in steps 2.2 and 3.1, customize your communications strategy for the individual stakeholder groups.
Think about where each of the groups falls within the Organizational Change Depth Scale (below) to determine the type of communications approach required. Don’t forget: the deeper the change, the tougher the job of managing change will be.
| Procedural | Behavioral | Interpersonal | Vocational | Cultural |
|---|---|---|---|---|
|
Position
|
Incentivize
|
Empathize
|
Educate
|
Inspire
|
| Depth Levels | Stakeholder Groups | Tactics |
|---|---|---|
| Procedural | Position: Provide explanation of what exactly has changed and specific procedural instructions of what exactly people must do differently to ensure they remember to make adjustments as effortlessly as possible. | |
| Behavioral | Incentivize: Break old habits and establish new ones by adjusting the context of formal and informal incentives (including objective rewards, contextual nudges, cues, and informal recognition). | |
| Interpersonal | Empathize: Offer genuine recognition and support for disruptions of personal networks (a significant source of personal well-being) that may result from changing work relationships. Show how leadership shares the burden of such sacrifices. | |
| Vocational | Educate: Provide a range of learning options (formal and self-directed) to provide the knowledge and skills people need to learn and succeed in changed roles. | |
| Cultural | Inspire: Frame incentives in a vocabulary that reflects any shift in what types of things are seen as “good” or “normal” in the organization. |
Straightforward → Complex
When managing interpersonal, vocational, or cultural changes, you will be required to incorporate more inspirational messaging and gestures of empathy than you typically might in a business communication.
Communications that require an appeal to people’s emotions can be, of course, very powerful, but they are difficult to craft. As a result, oftentimes messages that are meant to inspire do the exact opposite, coming across as farfetched or meaningless platitudes, rather than evocative and actionable calls to change.
Refer to the tactics below for assistance when crafting more complex change communications that require an appeal to people’s emotions and imaginations.
"Instead of resisting any emotion, the best way to dispel it is to enter it fully, embrace it and see through your resistance."
Build upon the more high-level change story that you developed in step 1.1 by giving more specificity to the change for specific stakeholder groups.
Questions to address in your communication strategy include: How will the change benefit the organization and its people? How have we confirmed there is a need for change? What would happen if we didn’t change? How will the change leverage existing strengths – what will stay the same? How will we know when we get to the desired state?
Remember these guidelines to help your messages resonate:
Info-Tech Insight
Change thy language, change thyself.
Jargon, acronyms, and technical terms represent deeply entrenched cultural habits and assumptions.
Continuing to use jargon or acronyms after a transition tends to drag people back to old ways of thinking and working.
You don’t need to invent a new batch of buzzwords for every change (nor should you), but every change is an opportunity to listen for words and phrases that have lost their meaning through overuse and abuse.
If there are multiple messages or impacts that need to be communicated to a single group or audience, you may need to do multiple Message Canvases per group. Refer back to your Stakeholder Engagement Workbook to help inform the stakeholder groups and messages that this activity should address.
Go to tab 6 of the Organizational Change Impact Analysis Toolfor multiple message canvas template boxes that you can use. These messages can then help inform your communication plan on tab 7 of that tool.
Review your options for communicating your change. This slide covers traditional methods of communication, while the following slides cover some options for multimedia mass-communications.
| Method | Best Practices |
|---|---|
| Email announcements are necessary for every organizational change initiative but are never sufficient. Treat email as a formalizing medium, not a medium of effective communication when organizational change is concerned. Use email to invite people to in-person meetings, make announcements across teams and geographical areas at the same time, and share formal details. | |
| Team Meeting | Team meetings help sell change. Body language and other in-person cues are invaluable when trying to influence people. Team meetings also provide an opportunity to gauge a group’s response to an announcement and gives the audience an opportunity to ask questions and get clarification. |
| One-on-One | One-on-ones are more effective than team meetings in their power to influence and gauge individual responses, but aren’t feasible for large numbers of stakeholders. Use one-on-ones selectively: identify key stakeholders and influencers who are most able to either advocate change on your behalf or provide feedback (or both). |
| Internal Site / Repository | Internal sites and repositories help sustain change by making knowledge available after the implementation. People don’t retain information very well when it isn’t relevant to them. Much of their training will be forgotten if they don’t apply that knowledge for several weeks or months. Use internal sites and repositories for how-to guides and standard operating procedures. |
| Method | Best Practices |
|---|---|
| User Interfaces | User interface (UI) design is overlooked as a communication method. Often a simple UI refinement with the clearer prompts or warnings is more effective and efficient than additional training and repeated email reminders. |
| Social Media | Social media is widely and deeply embraced by people publicly, and is increasingly useful within organizations. Look for ways to leverage existing internal social tools. Avoid trying to introduce new social channels to communicate change unless social transformation is within the scope of the core project’s goals; the social tool itself might become as much of an organizational change management challenge as the original project. |
| Posters & Marketing Collateral | Posters and other marketing collateral are common communication tools in retail and hospitality industries that change managers in other industries often don’t think of. Making key messages a vivid, visual part of people’s everyday environment is a very effective way to communicate. On the down side, marketing collateral requires professional design skills and can be costly to create. Professional copywriting is also advisable to ensure your message resonates. |
| Video | Videos are well worth the cost to produce when the change is transformational in nature, as in cultural changes. Videos are useful for both communicating the vision and as part of the training plan. |
This is a screenshot from the “Stakeholder/Audience” section of Info-Tech’s Transition Plan Template. Use the template to document your communication strategy for each audience and your delivery plan.
"The role of project communication is to inspire, instigate, inform or educate and ultimately lead to a desired action. Project communication is not a well presented collection of words; rather it is something that propels a series of actions."
Info-Tech Insight
Repetition is crucial. People need to be exposed to a message 7 times before it sticks. Using a variety of delivery formats helps ensure people will notice and remember key messages. Mix things up to keep employees engaged and looking forward to the next update.
"While creating and administering a survey represent(s) additional time and cost to the project, there are a number of benefits to be considered: 1) Collecting this information forces regular and systematic review of the project as it is perceived by the impacted organizations, 2) As the survey is used from project to project it can be improved and reused, 3) The survey can quickly collect feedback from a large part of the organization, increasing the visibility of the project and reducing unanticipated or unwelcome reactions."
Use the survey and questionnaire templates on the following two slides for assistance in eliciting feedback. Record the evaluation and feedback gathering process in the Transition Plan Template.
Use email to distribute a questionnaire (such as the example below) to project stakeholders to elicit feedback.
In addition to receiving invaluable opinions from key stakeholders and the frontline workers, utilizing questionnaires will also help involve employees in the change, making them feel more engaged and part of the change process.
| Interviewee | Date | ||
|---|---|---|---|
| Stakeholder Group | Interviewer | ||
| Question | Response | Notes | |
| How do you think this change will affect you? | |||
| How do you think this change will affect the organization? | |||
| How long do you expect the change to take? | |||
| What do you think might cause the project/change to fail? | |||
| What do you think are the most critical success factors? | |||
Similar to a questionnaire, a survey is a great way to assess the lay of the land in terms of your org change efforts and the likelihood of adoption.
Using a free online survey tool like Survey Monkey, Typeform, or Google Forms, surveys are quick and easy to generate and deploy. Use the below example as a template to build from.
Use survey and questionnaire feedback as an occasion to revisit the Impact Analysis Tool and reassess the impacts and roadblocks based on hard feedback.
1=Strongly Disagree, 2=Disagree, 3=Somewhat Disagree, 4=Somewhat Agree, 5=Agree, 6=Strongly Agree
1=Very Negative, 2=Negative, 3=Somewhat Negative, 4=Somewhat Positive, 5=Positive, 6=Very Positive
The slides that follow walk you through activities to assess the different “faces of change” around your OCM initiative and to perform an objections handling exercise.
Assessing people’s emotional responses to the change will enable the PMO and transition team to:
Carol Beatty’s distinction between “easy work,” “hard work,” and “tough work” can be revealing in terms of the high failure rate on many change initiatives. (“The Tough Work of Managing Change.” Queen’s University IRC. 2015.)
That is what makes organizational change “tough,” as opposed to merely hard. Managing change requires mental and emotional toughness to deal with uncertainty, ambiguity, and conflict.
Use the table below to document where different stakeholders and stakeholder groups fall within the spectrum.
| Response | Symptoms | Examples |
|---|---|---|
| Active Subversion | Publicly or privately disparaging the transition (in some cases privately disparaging while pretending to support); encouraging people to continue doing things the old way or to leave the organization altogether. | Group/Name |
| Quiet Resistance | Refusing to adopt change, continuing to do things the old way (including seemingly trivial or symbolic things). Non-participative. | Group/Name |
| Vocal Skepticism | Asking questions; questioning the why, what, and how of change, but continuing to show willingness to participate and try new things. | Group/Name |
| Neutrality / Uncertainty | Non-vocal participation, perhaps with some negative body language, but continuing to show tacit willingness to try new things. | Group/Name |
| Vocal Approval | Publicly and privately signaling buy-in for the change. | Group/Name |
| Quiet Support | Actively helping to enable change to succeed without necessarily being a cheerleader or trying to rally others around the transition. | Group/Name |
| Active Leadership | Visibly championing the change and helping to rally others around the transition. | Group/Name |
Use the below tactics across the “faces of change” spectrum to help inform the PMO’s responses to sources of objection and resistance and its tactics for leveraging support.
| Response | Engagement Strategies and Tactics |
|---|---|
| Active Subversion | Firmly communicate the boundaries of acceptable response to change: resistance is a natural response to change, but actively encouraging other people to resist change should not be tolerated. Active subversion often indicates the need to find a new role or depart the organization. |
| Quiet Resistance | Resistance is a natural response to change. Use the Change Curve to accommodate a moderate degree and period of resistance. Use the OCM Depth Scale to ensure communications strategies address the irrational sources of resistance. |
| Vocal Skepticism | Skepticism can be a healthy sign. Skeptics tend to be invested in the organization’s success and can be turned into vocal and active supporters if they feel their questions and concerns have been heard and addressed. |
| Neutrality / Uncertainty | Most fence-sitters will approve and support change when they start to see concrete benefits and successes, but are equally likely to become skeptics and resisters when they see signs of failure or a critical mass of skepticism, resistance, or simply ambivalence. |
| Vocal Approval | Make sure that espoused approval for change isn’t masking resistance or subversion. Engage vocal supporters to convert them into active enablers or champions of change. |
| Quiet Support | Engage quiet supporters to participate where their skills or social and political capital might help enable change across the organization. This could either be formal or informal, as too much formal engagement can invite minor disagreements and slow down change. |
| Active Leadership | Engage some of the active cheerleaders and champions of change to help deliver communications (and in some cases training) to their respective groups or teams. |
| What If... | Do This: | To avoid: |
|---|---|---|
| You aren’t on board with the change? | Fake it to your staff, then communicate with your superiors to gather the information you need to buy in to the change. | Starting the change process off on the wrong foot. If your staff believe that you don’t buy in to the change, but you are asking them to do so, they are not going to commit to it. |
| When you introduce the change, a saboteur throws a tantrum? | If the employee storms out, let them. If they raise uninformed objections in the meeting that are interrupting your introduction, ask them to leave and meet with them privately later on. Schedule an ad hoc one-on-one meeting. | A debate at the announcement. It’s an introduction to the change and questions are good, but it’s not the time for debate. Leave this for the team meetings, focus groups, and one-on-ones when all staff have digested the information. |
| Your staff don’t trust you? | Don’t make the announcement. Find an Enthusiast or another manager that you trust to make the announcement. | Your staff blocking any information you give them or immediately rejecting anything you ask of them. Even if you are telling the absolute truth, if your staff don’t trust you, they won’t believe anything you say. |
| An experienced skeptic has seen this tried before and states it won’t work? | Leverage their experience after highlighting how the situation and current environment is different. Ask the employee what went wrong before. | Reinventing a process that didn’t work in the past and frustrating a very valuable segment of your staff. Don’t miss out on the wealth of information this Skeptic has to offer. |
Use the Objections Handling Template on the next slide to brainstorm specific objections and forms of resistance and to strategize about the more effective responses and mitigation strategies.
Copy these objections and responses into the designated section of the Transition Plan Template. Continue to revise objections and responses there if needed.
| Objection | Source of Objection | PMO Response |
|---|---|---|
| We tried this two years ago. | Vocal skepticism | Enabling processes and technologies needed time to mature. We now have the right process discipline, technologies, and skills in place to support the system. In addition, a dedicated role has been created to oversee all aspects of the system during and after implementation. |
| Why aren’t we using [another solution]? | Uncertainty | We spent 12 months evaluating, testing, and piloting solutions before selecting [this solution]. A comprehensive report on the selection process is available on the project’s internal site [here]. |
Info-Tech Insight
There is insight in resistance. The individuals best positioned to provide insight and influence change positively are also best positioned to create resistance. These people should be engaged throughout the implementation process. Their insights will very likely identify risks, barriers, and opportunities that need to be addressed.
Highlighting quick wins or “bright spots” helps you go from communicating change to more persuasively demonstrating change.
Specifically, quick wins help:
Take the time to assess and plan quick wins as early as possible in the planning process. You can revisit the impact assessment for assistance in identifying potential quick wins; more so, work with the project team and other stakeholders to help identify quick wins as they emerge throughout the planning and execution phases.
Make sure you highlight bright spots as part of the larger story and vision around change. The purpose is to continue to build or sustain momentum and morale through the transition.
"The quick win does not have to be profound or have a long-term impact on your organization, but needs to be something that many stakeholders agree is a good thing… You can often identify quick wins by simply asking stakeholders if they have any quick-win recommendations that could result in immediate benefits to the organization."
Info-Tech Insight
Stay positive. Our natural tendency is to look for what’s not working and try to fix it. While it’s important to address negatives, it’s equally important to highlight positives to keep people committed and motivated around change.
Upon completion of the activities in this step, the PMO Director is responsible for ensuring that outcomes have been documented and recorded in the Transition Plan Template. Activities to be recorded include:
Going forward, successful change will require that many responsibilities be delegated beyond the PMO and core transition team.
Download Info-Tech’s Transition Plan Template.
"Whenever you let up before the job is done, critical momentum can be lost and regression may follow." – John Kotter, Leading Change
The PMO’s OCM approach should leverage organizational design and development capabilities already in place.
Recommendations in this section are meant to help the PMO and transition team understand HR and training plan activities in the context of the overall transition process.
Where organizational design and development capabilities are low, the following steps will help you do just enough planning around HR, and training and development to enable the specific change.
In some cases the need for improved OCM will reveal the need for improved organizational design and development capabilities.
This section will walk you through the basic steps of developing HR, training, and development plans to support and enable the change.
For comprehensive guidance and tools on role, job, and team design, see Info-Tech’s Transform IT Through Strategic Organizational Design blueprint.
Info-Tech Insight
Don’t make training a hurdle to adoption. Training and other disruptions take time and energy away from work. Ineffective training takes credibility away from change leaders and seems to validate the efforts of saboteurs and skeptics. The PMO needs to ensure that training sessions are as focused and useful as possible.
Refer back to Activity 3.2.4. Use the placement of each stakeholder group on the Organizational Change Depth Scale (below) to determine the type of HR and training approach required. Don’t impose training rigor where it isn’t required.
| Procedural | Behavioral | Interpersonal | Vocational | Cultural |
|---|---|---|---|---|
| Simply changing procedures doesn’t generally require HR involvement (unless HR procedures are affected). | Changing behaviors requires breaking old habits and establishing new ones, often using incentives and disincentives. | Changing teams, roles, and locations means changing people’s relationships, which adds disruption to people’s lives and challenges for any change initiative. | Changing people’s roles and responsibilities requires providing ways to acquire knowledge and skills they need to learn and succeed. | Changing values and norms in the organization (i.e. what type of things are seen as “good” or “normal”) requires deep disruption and persistence. |
| Typically no HR involvement. | HR consultation recommended to help change incentives, compensation, and training strategies. | HR consultation strongly recommended to help define roles, jobs, and teams. | HR responsibility recommended to develop training and development programs. | HR involvement recommended. |
22%
In a recent survey of 276 large and midsize organizations, eighty-seven percent of survey respondents trained their managers to “manage change,” but only 22% felt the training was truly effective. (Towers Watson)
Revisit the high-level project schedule from steps 1.2.4 and 3.4.1 to create a tentative timeline for HR and training activities.
Revise this timeline throughout the implementation process, and refine the timing and specifics of these activities as you move from the development to the deployment phase.
| Project Milestone | Milestone Time Frame | HR/Training Activities | Activity Timing | Notes |
|---|---|---|---|---|
| Business Case Approval |
|
|||
| Pilot Go-Live |
|
|||
| Full Rollout Approval |
|
|||
| Full Rollout |
|
|||
| Benefits Assessment |
|
"The reason it’s going to hurt is you’re going from a state where you knew everything to one where you’re starting over again."
– BA, Natural Resources Company
Use the final tab in the Stakeholder Engagement Workbook, “7. Training Requirements,” to begin fleshing out a training plan for project stakeholders.
The table will automatically generate a list of stakeholders based on your stakeholder analysis.
If your stakeholder list has grown or changed since the stakeholder engagement exercise in step 3.1, update the “Stakeholder List” tab in the tool.
Estimate when training can begin, when training needs to be completed, and the total hours required.
Training too early and too late are both common mistakes. Training too late hurts morale and creates risks. Training too early is often wasted and creates the need for retraining as knowledge and skills are lost without immediate relevance to their work.
Brainstorm or identify potential opportunities to leverage for training (such as using existing resources and combining multiple training programs).
Review the Change Management Impact Analysis to assess skills and knowledge required for each group in order for the change to succeed.
Depending on the type of change being introduced, you may need to have more in-depth conversations with technical advisors, project management staff, and project sponsors concerning gaps and required content.
Ultimately, the training plan will have to be put into action, which will require that the key logistical decisions are made concerning content and training delivery.
“95% of learning leaders from organizations that are very effective at implementing important change initiatives find best practices by partnering with a company or an individual with experience in the type of change, twice as often as ineffective organizations.”
Source: Implementing and Supporting Training for Important Change Initiatives.
Training content should be developed and delivered by people with training experience and expertise, working closely with subject matter experts. In the absence of such individuals, partnering with experienced trainers is a cost that should be considered.
The long-term success of the change is contingent on having the resources to maintain and support the tool, process, or business change being implemented. Otherwise, resourcing shortfalls could threaten the integrity of the new way of doing things post-change, threatening people’s trust and faith in the validity of the change as a whole.
Use the table below to assess and record skills requirements. Refer to the tactics on the next slide for assistance in filling gaps.
| Skill Required | Description of Need | Possible Resources | Recommended Next Steps | Timeline |
|---|---|---|---|---|
| Mobile Dev | Users expect mobile access to services. We need knowledge of various mobile platforms, languages or frameworks, and UX/UI requirements for mobile. |
|
|
Probably Q1 2015 |
| DBAs | Currently have only one DBA, which creates a bottleneck. We need some DBA redundancy to mitigate risk of single point of failure. |
|
|
Q3 2014 |
| Options: | Benefits: | Drawbacks: |
|---|---|---|
| Redeploy staff internally |
|
|
| Outsource |
|
|
| Contract |
|
|
| Hire externally |
|
|
Info-Tech Insight
Try more ad hoc training methods to offset uncertain project timelines.
One of the top challenges organizations face around training is getting it timed right, given the changes to schedule and delays that occur on many projects.
One tactic is to take a more ad hoc approach to training, such as making IT staff available in centralized locations after implementation to address staff issues as they come up.
This will not only help eliminate the waste that can come from poorly timed and ineffective training sessions, but it will also help with employee morale, giving individuals a sense that they haven’t been left alone to navigate unfamiliar processes or technologies.
Industry Manufacturing
Source Info-Tech Client
"The cause of slow adoption is often not anger or denial, but a genuine lack of understanding and need for clarification. Avoid snap decisions about a lack of adoption until staff understand the details." – IT Manager
Move away from a command-and-control approach to change by working with the analyst to develop a strategy that engages stakeholders in the change, making them feel like they are a part of it.
Work with the analyst to fine-tune the stakeholder messaging across various stakeholder responses to change.
Utilize analyst experience and perspective in order to develop strategy for effectively evaluating stakeholder feedback early enough that resistance and suggestions can be accommodated with the OCM strategy and project plan.
Utilize analyst experience and perspective in order to develop an objections handling strategy to deal with resistance, objections, and fatigue.
Receive custom analyst insights on rightsizing training content and timing your training sessions effectively.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 to 2 weeks
Discuss these issues with analyst:
Then complete these activities…
With these tools & templates:
Organizations rarely close the loop on project benefits once a project has been completed.
With all this in mind, in this step we will round out our PMO-driven org change process by defining how the PMO can help to better facilitate the benefits realization process.
This section will walk you through the basic steps of developing a benefits attainment process through the PMO.
For comprehensive guidance and tools, see Info-Tech’s Establish the Benefits Realization Process.
Info-Tech Insight
Two of a kind. OCM, like benefits realization, is often treated as “nice to have” rather than “must do.” These two processes are both critical to real project success; define benefits properly during intake and let OCM take the reigns after the project kicks off.
Benefits realization ensures that the benefits defined in the business case are used to define a project’s expected value, and to facilitate the delivery of this value after the project is closed. The process begins when benefits are first defined in the business case, continues as benefits are managed through project execution, and ends when the loop is closed and the benefits are actually realized after the project is closed.
| Benefits Realization | ||
|---|---|---|
| Define | Manage | Realize |
| Initial Request | Project Kick Off | *Solution Is Deployed |
| ↓ | ↓ | ↓ |
| Business Case Approved | Project Execution | Solution Maintenance |
| ↓ | ↓ | ↓ |
| PM Assigned | *Project Close | Solution Decommissioned |
*For the purposes of this step, we will limit our focus to the PMO’s responsibilities for benefits attainment at project close-out and in the project’s aftermath to ensure that responsibilities for tracking business outcomes post-project have been properly defined and resourced.
As the project closes, responsibility for benefits tracking passes from the project team to the project sponsor. In many cases, the PMO will need to function as an intermediary here, soliciting the sponsor’s involvement when the time comes.
The project manager and team will likely move onto another project and the sponsor (in concert with the PMO) will be responsible for measuring and reporting benefits realization.
As benefits realization is measured, results should be collated by the PMO to validate results and help flag lagging benefits.
The PMO should ensure the participation of the project sponsor, the project manager, and any applicable members of the business side and the project team for this step.
Ideally, the CIO and steering committee members should be involved as well. At the very least, they should be informed of the decisions made as soon as possible.
Initiation-Planning-Execution-Monitoring & Controlling-Closing
The post-project phase is the most challenging because the project team and sponsor will likely be busy with other projects and work.
Conducting a post-implementation review for every project will force sponsors and other stakeholders to assess actual benefits realization and identify lagging benefits.
If the project is not achieving its benefits, a remediation plan should be created to attempt to capture these benefits as soon as possible.
| Agenda Item | |
|---|---|
| Assess Benefits Realization |
|
| Assess Quality |
|
| Discuss Ongoing Issues |
|
| Discuss Training |
|
| Assess Ongoing Costs |
|
| Assess Customer Satisfaction |
|
The realization stage is the most difficult to execute and oversee. The project team will have moved on, and unless someone takes accountability for measuring benefits, progress will not be measured. Use the sample RACI table below to help define roles and responsibilities for post-project benefits attainment.
| Process Step | Responsible | Accountable | Consulted | Informed |
|---|---|---|---|---|
| Track project benefits realization and document progress | Project sponsor | Project sponsor | PMO (can provide tracking tools and guidance), and directors or managers in the affected business unit who will help gather necessary metrics for the sponsor (e.g. report an increase in sales 3 months post-project) | PMO (can collect data and consolidate benefits realization progress across projects) |
| Identify lagging benefits and perform root cause analysis | Project sponsor and PMO | Project sponsor and PMO | Affected business unit | CIO, IT steering committee |
| Adjust benefits realization plan as needed | Project sponsor | Project sponsor | Project manager, affected business units | Any stakeholders impacted by changes to plan |
| Report project success | PMO | PMO | Project sponsor | IT and project steering committees |
Info-Tech Insight
A business accountability: Ultimately, the sponsor must help close this loop on benefits realization. The PMO can provide tracking tools and gather and report on results, but the sponsor must hold stakeholders accountable for actually measuring the success of projects.
While project sponsors should be accountable for measuring actual benefits realization after the project is closed, the PMO can provide monitoring tools and it should collect measurements and compare results across the portfolio.
Steps in a benefits tracking process.
"Checking the results of a decision against its expectations shows executives what their strengths are, where they need to improve, and where they lack knowledge or information."
– Peter Drucker
Download Info-Tech’s Portfolio Benefits Tracking Tool to help solidify the process from the previous step.
Simply publishing a set of best practices will not have an impact unless accountability is consistently enforced. Increasing accountability should not be complicated. Focus on publicly recognizing benefit success. As the process matures, you should be able to use benefits as a more frequent input to your budgeting process.
Info-Tech Insight
Don’t forget OCM best practices throughout the benefits tracking process. If benefits are lagging, the PMO should revisit phase 3 of this blueprint to consider how challenges to adoption are negatively impacting benefits attainment.
Get custom insights into how the benefits tracking process should be carried out post-project at your organization to ensure that intended project outcomes are effectively monitored and, in the long run, achieved.
Let our analysts customize a home-grown benefits tracking tool for your organization to ensure that the PMO and project sponsors are able to easily track benefits over time and effectively pivot on lagging benefits.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1 to 2 weeks
Discuss these issues with an analyst:
Then complete these activities…
With these tools & templates:
We return to a question that we started with in the Executive Brief of this blueprint: who is accountable for organizational change?
If nobody has explicit accountability for organizational change on each project, the Officers of the corporation retained it. Find out who is assumed to have this accountability.
Info-Tech Insight
Will the sponsor please stand up?
Project sponsors should be accountable for the results of project changes. Otherwise, people might assume it’s the PMO or project team.
Change Management Capabilities
Progressively build a stable set of core capabilities.
The basic science of human behavior underlying change management is unlikely to change. Effective engagement, communication, and management of uncertainty are valuable capabilities regardless of context and project specifics.
Organizational Context
Regularly update recurring activities and artifacts.
The organization and the environment in which it exists will constantly evolve. Reusing or recycling key artifacts will save time and improve collaboration (by leveraging shared knowledge), but you should plan to update them on at least a quarterly or annual basis.
Future Project Requirements
Approach every project as unique.
One project might involve more technology risk while another might require more careful communications. Make sure you divide your time and effort appropriately for each particular project to make the most out of your change management playbook.
Info-Tech Insight
Continuous Change. Continuous Improvement. Change is an ongoing process. Your approach to managing change should be continually refined to keep up with changes in technology, corporate strategy, and people involved.
1. With your pilot OCM initiative in mind, retrospectively brainstorm lessons learned using the template below. Info-Tech recommends doing this with the transition team. Have people spend 10-15 minutes brainstorming individually or in 2- to 3-person groups, then spend 15-30 minutes presenting and discussing findings collectively.
| What worked? | What didn't work? | What was missing? |
|---|---|---|
2. Develop recommendations based on the brainstorming and analysis above.
| Continue... | Stop... | Start... |
|---|---|---|
Perform the Organizational Change Management Capabilities Assessment in the wake of the OCM pilot initiative and lessons learned exercise to assess capabilities’ improvements.
As your OCM processes start to scale out over a range of projects across the organization, revisit the assessment on a quarterly or bi-annual basis to help focus your improvement efforts across the 7 change management categories that drive the survey.
Info-Tech Insight
Continual OCM improvement is a collaborative effort.
The most powerful way to drive continual improvement of your organizational change management practices is to continually share progress, wins, challenges, feedback, and other OCM related concerns with stakeholders. At the end of the day, the PMO’s efforts to become a change leader will all come down to stakeholder perceptions based upon employee morale and benefits realized.
Info-Tech Insight
Avoid creating unnecessary fiefdoms.
Make sure any permanent roles are embedded in the organization (e.g. within the PMO) and have leadership support.
Copy the RACI table from Activity 3.1.1. and repurpose it to help define the roles and responsibilities.
Include this RACI when you formalize your OCM Playbook.
Download Info-Tech’s Organizational Change Management Playbook.
Use the Value tab in the Organizational Change Management Capabilities Assessment to monitor the value and success of OCM.
Measure past performance and create a baseline for future success:
As you scale out an OCM program for all of the organization’s projects based on your pilot initiative, work with the analyst to investigate and define the right accountabilities for ongoing, long-term OCM.
Formalize a programmatic process for organizational change management in Info-Tech’s playbook template.
Develop a Project Portfolio Management Strategy
Optimize Project Intake, Approval, and Prioritization
Develop a Resource Management Strategy for the New Reality
Establish the Benefits Realization Process
Project Portfolio Management Diagnostic Program: The Project Portfolio Management Diagnostic Program is a low effort, high impact program designed to help project owners assess and improve their PPM practices. Gather and report on all aspects of your PPM environment in order to understand where you stand and how you can improve.
Basu, Chirantan. “Top Organizational Change Risks.” Chiron. Web. June 14, 2016.
Beatty, Carol. “The Tough Work of Managing Change.” Queens University. 2015. Web. June 14, 2016.
Brown, Deborah. “Change Management: Some Statistics.” D&B Consulting Inc. May 15, 2014. Web. June 14, 2016.
Burke, W. Warner. Organizational Change: Theory and Practice. 4th Edition. London: Sage, 2008.
Buus, Inger. “Rebalancing Leaders in Times of Turbulence.” Mannaz. February 8, 2013. Web. June 14, 2016.
Change First. “Feedback from our ROI change management survey.” 2010. Web. June 14, 2016.
Collins, Jeff. “The Connection between User Adoption and Project Management Success.” Innovative Management Solutions. Sept. 21, 2013. Web. June 14, 2016.
Craddock, William. “Change Management in the Strategic Alignment of Project Portfolios.” PMI. 2015. Web. June 14, 2016.
Denning, Steve. “The Four Stories you Need to Lead Deep Organizational Change.” Forbes. July 25, 2011. Web. June 14, 2016.
Drucker, Peter. “What Makes an Effective Executive.” Harvard Business Review. June 2004. Web. June 14, 2016
Elwin, Toby. “Highlight Change Management – An Introduction to Appreciative Inquiry.” July 6, 2012. Web. June 14, 2016.
Enstrom, Christopher. “Employee Power: The Bases of Power Used by Front-Line Employees to Effect Organizational Change.” MA Thesis. University of Calgary. April 2003. Web. June 14, 2016.
Ewenstein, Boris, Wesley Smith, and Ashvin Sologar. “Changing Change Management.” McKinsey & Company. July 2015. Web. June 14, 2016.
International Project Leadership Academy. “Why Projects Fail: Facts and Figures.” Web. June 14, 2016.
Jacobs-Long, Ann. “EPMO’s Can Make A Difference In Your Organization.” May 9, 2012. Web. June 14, 2016.
Kotter, John. Leading Change. Boston: Harvard Business School Press, 1996.
Latham, Ross. “Information Management Advice 55 Change Management: Preparing for Change.” TAHO. March 2014. Web. June 14, 2016.
Linders, Ben. “Finding Ways to Improve Business – IT Collaboration.” InfoQ. June 6, 2013. Web. June 14, 2016
Machiavelli, Niccolo. The Prince, selections from The Discourses and other writings. Ed. John Plamenatz. London: Fontana/Collins, 1972.
Michalak, Joanna Malgorzata. “Cultural Catalyst and Barriers to Organizational Change Management: a Preliminary Overview.” Journal of Intercultural Management. 2:2. November 2010. Web. June 14, 2016.
Miller, David, and Mike Oliver. “Engaging Stakeholder for Project Success.” PMI. 2015. Web. June 14, 2016.
Parker, John. “How Business Analysts Can Identify Quick Wins.” EnFocus Solutions. February 15, 2013. Web. June 14, 2016.
Paulk, January. “The Fundamental Role a Change Impact Analysis Plays in an ERP Implementation.” Panorma Consulting Solutions. March 24, 2014. Web. June 14, 2016.
Petouhoff, Natalie, Tamra Chandler, and Beth Montag-Schmaltz. “The Business Impact of Change Management.” Graziadio Business Review. 2006. Web. June 14, 2016.
PM Solutions. “The State of the PMO 2014.” 2014. Web. June 14, 2016.
PMI. “Pulse of the Profession: Enabling Organizational Change Throughout Strategic Initiatives.” March 2014. Web. June 14, 2016.
PMI. “Pulse of the Profession: Executive Sponsor Engagement.” October 2014. Web. June 14, 2016.
PMI. “Pulse of the Profession: the High Cost of Low Performance.” February 2014. Web. June 14, 2016.
Powers, Larry, and Ketil Been. “The Value of Organizational Change Management.” Boxley Group. 2014. Web. June 14, 2016.
Prosci. “Best Practices in Change Management – 2014 Edition: Executive Overview.” Web. June 14, 2016.
Prosci. “Change Management Sponsor Checklist.” Web. June 14, 2016.
Prosci. “Cost-benefit analysis for change management.” 2014. Web. June 14, 2016.
Prosci. “Five Levers of Organizational Change.” 2016. Web. June 14, 2016.
Rick, Torben. “Change Management Requires a Compelling Story.” Meliorate. October 3, 2014. Web. June 14, 2016.
Rick, Torben. “The Success Rate of Organizational Change Initiatives.” Meliorate. October 13, 2014. Web. June 14, 2016.
Schwartz, Claire. “Implementing and Monitoring Organizational Change: Part 3.” Daptiv Blogs. June 24, 2013. Web. June 14, 2016.
Simcik, Shawna. “Shift Happens! The Art of Change Management.” Innovative Career Consulting, Inc. Web. June 14, 2016.
Stewart Group. “Emotional Intelligence.” 2014. Web. June 14, 2016.
Thakur, Sidharth. “Improve your Project’s Communication with These Inspirational Quotes.” Ed. Linda Richter. Bright Hub Project Management. June 9, 2012. Web. June 14, 2016.
Training Folks. “Implementing and Supporting Training for Important Change Initiatives.” 2012. Web. June 14, 2016.
Warren, Karen. “Make your Training Count: The Right Training at the Right Time.” Decoded. April 12, 2015. Web. June 14, 2016.
Willis Towers Watson. “Only One-Quarter of Employers Are Sustaining Gains from Change Management Initiatives, Towers Watson Survey Finds.” August 29, 2013. Web. June 14, 2016.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Push past the hype and understand what the metaverse really means for IT.

On October 28, 2021, Mark Zuckerberg got up on stage and announced Facebook's rebranding to Meta and its intent to build out a new business line around the metaverse concept. Just a few days later, Microsoft's CEO Satya Nadella put forward his own idea of the metaverse at Microsoft Ignite. Seeing two of Silicon Valley's most influential companies pitch a vision of avatar-driven virtual reality collaboration sparked our collective curiosity. At the heart of it lies the question, "What is the metaverse, anyway?“
If you strip back the narrative of the companies selling you the solutions, the metaverse can be viewed as technological convergence. Years of development on mixed reality, AI, immersive digital environments, and real-time communication are culminating in a totally new user experience. The metaverse makes the digital as real as the physical. At least, that's the vision.
It will be years yet before the metaverse visions pitched to us from Silicon Valley stages are realized. In the meantime, understanding the individual technologies contributing to that vision can help CIOs realize business value today. Join me as we delve into the metaverse.
Brian Jackson
Research Director, CIO
Info-Tech Research Group
The term “metaverse” was coined by author Neal Stephenson in the 1992 novel “Snow Crash.” In the novel, main character Hiro Protagonist interacts with others in a digitally defined space. Twenty-five years after its release, the cult classic is influential among Silicon Valley's elite. Stephenson has played some key roles in Silicon Valley firms. He became the first employee at Blue Origin, the space venture founded by Jeff Bezos, in 2006, and later became chief futurist at augmented reality firm Magic Leap in 2014. Stephenson also popularized the Hindu concept "avatar" in his writing, paving the way for people to embody digitally rendered models to participate in the metaverse (Vanity Fair, 2017).
Even earlier concepts of the metaverse were examined in the 1980s, with William Gibson’s “Neuromancer” exploring the same idea as cyberspace. Gibson's novel was influenced by his time in Seattle, where friend and Microsoft executive Eileen Gunn took him to hacker bars where he'd eavesdrop on "the poetics of the technological subculture" (Medium, 2022). Other visions of a virtual reality mecca were brought to life in the movies, including the 1982 Disney release “Tron,” the 1999 flick “The Matrix,” and 2018’s “Ready Player One.”
There's a common set of traits among these sci-fi narratives that help us understand what Silicon Valley tech firms are now set to commercialize: users interact with one another in a digitally rendered virtual world, with a sense of presence provided through the use of a head-mounted display.

Image courtesy nealstephenson.com
Mark Zuckerberg is all in on the metaverse, announcing October 28, 2021, that Facebook would be rebranded to Meta. The new brand took effect on December 1, and Facebook began trading under the new stock ticker MVRS on certain exchanges. On February 15, 2022, Zuckerberg announced at a company meeting that his employees will be known as Metamates. The company's new values are to live in the future, build awesome things, and focus on long-term impact. Its motto is simply "Meta, Metamates, me" (“Out With the Facebookers. In With the Metamates,” The New York Times, 2022).
Meta's Reality Labs division will be responsible for developing its metaverse product, using Meta Quest, its virtual reality head-mounted displays. Meta's early metaverse environment, Horizon Worlds, rolled out to Quest users in the US and Canada in early December 2021. This drove a growth in its monthly user base by ten times, to 300,000 people. The product includes Horizon Venues, tailored to attending live events in VR, but not Horizon Workrooms, a VR conferencing experience that remains invite-only. Horizon Worlds provides users tools to construct their own 3D digital environments and had been used to create 10,000 separate worlds by mid-February 2022 (“Meta’s Social VR Platform Horizon Hits 300,000 Users,“ The Verge, 2022).
In the future, Meta plans to amplify the building tools in its metaverse platform with generative AI. For example, users can give speech commands to create scenes and objects in VR. Project CAIRaoke brings a voice assistant to an augmented reality headset that can help users complete tasks like cooking a stew. Zuckerberg also announced Meta is working on a universal speech translator across all languages (Reuters, 2022).
Investment in the metaverse:
$10 billion in 2021
Key People:
CEO Mark Zuckerberg
CTO Andrew Bosworth
Chief Product Officer Chris Cox
(Source: “Meta Spent $10 Billion on the Metaverse in 2021, Dragging Down Profit,” The New York Times, 2022)
In March 2021 Microsoft announced Mesh, an application that allows organizations to build out a metaverse environment. Mesh is being integrated into other Microsoft hardware and software, including its head-mounted display, the HoloLens, a mixed reality device. The Mesh for HoloLens experience allows users to collaborate around digital content projected into the real world. In November, Microsoft announced a Mesh integration with Microsoft Teams. This integration brings users into an immersive experience in a fully virtual world. This VR environment makes use of AltspaceVR, a VR application Microsoft first released in May 2015 (Microsoft Innovation Stories, 2021).
Last Fall, Microsoft also announced it is rebranding its Dynamics 365 Connected Store solution to Dynamics 365 Connected Spaces, signaling its expansion from retail to all spaces. The solution uses cognitive vision to create a digital twin of an organization’s physical space and generate analytics about people’s behavior (Microsoft Dynamics 365 Blog, 2021).
In the future, Microsoft wants to make "holoportation" a part of its metaverse experience. Under development at Microsoft Research, the technology captures people and things in photorealistic 3D to be projected into mixed reality environments (Microsoft Research, 2022). It also has plans to offer developers AI-powered tools for avatars, session management, spatial rendering, and synchronization across multiple users. Open standards will allow Mesh to be accessed across a range of devices, from AR and VR headsets, smartphones, tablets, and PCs.
Microsoft has been developing multi-user experiences in immersive 3D environments though its video game division for more than two decades. Its capabilities here will help advance its efforts to create metaverse environments for the enterprise.
Investment in the metaverse:
In January 2022, Microsoft agreed to acquire Activision Blizzard for $68.7 billion. In addition to acquiring several major gaming studios for its own gaming platforms, Microsoft said the acquisition will play a key role in the development of its metaverse.
Key People:
CEO Satya Nadella
CEO of Microsoft Gaming Phil Spencer
Microsoft Technical Research Fellow Alex Kipman
Meta
|
Microsoft
|
![]() |
![]() |
| NVIDIA Omniverse
“The metaverse for engineers,” Omniverse is a developer toolset to allow organizations to build out their own unique metaverse visions.
|
TeamViewer’s Remote as a Service Platform
Initially focusing on providing workers remote connectivity to work desktops, devices, and robotics, TeamViewer offers a range of software as a service products. Recent acquisitions to this platform see it connecting enterprise workflows to frontline workers using mixed reality headsets and adding more 3D visualization development tools to create digital twins. Clients include Coca-Cola and BMW. |
“The metaverse matters in the future. TeamViewer is already making the metaverse tangible in terms of the value that it brings.” (Dr. Hendrik Witt, Chief Product Officer, TeamViewer)
The metaverse is a platform combining multiple technologies to enable social and economic activity in a digital world that is connected to the physical world.

A metaverse experience must combine the three P’s: user presence is represented, the world is persistent, and data is portable.
Mixed reality encompasses both virtual reality and augmented reality. Both involve allowing users to immerse themselves in digital content using a head-mounted device or with a smartphone for a less immersive effect. Virtual reality is a completely digital world that is constructed as separate from the physical world. VR headsets take up a user's entire field of vision and must also have a mechanism to allow the user to interact in their virtual environment. Augmented reality is a digital overlay mapped on top of the real world. These headsets are transparent, allowing the user to clearly see their real environment, and projects digital content on top of it. These headsets must have a way to map the surrounding environment in 3D in order to project digital content in the right place and at the right scale.
Meta acquired virtual reality developer Oculus VR Inc. and its set of head-mounted displays in 2014. It continues to develop new hardware under the Oculus brand, most recently releasing the Oculus Quest 2. Oculus Quest hardware is required to access Meta's early metaverse platform, Horizon Worlds.
Microsoft's HoloLens hardware is a mixed reality headset. Its visor that can project digital content into the main portion of the user's field of vision and speakers capable of spatial audio. The HoloLens has been deployed at enterprises around the world, particularly in scenarios where workers typically have their hands busy. For example, it can be used to view digital schematics of a machine while a worker is performing maintenance or to allow a remote expert to "see through the eyes" of a worker.
Microsoft's Mesh metaverse platform, which allows for remote collaboration around digital content, was demonstrated on a HoloLens at Microsoft Ignite in November 2021. Mesh is also being integrated into AltspaceVR, an application that allows companies to hold meetings in VR with “enterprise-grade security features including secure sign-ins, session management and privacy compliance" (Microsoft Innovation Stories, 2021).
If you've played a video game in the past decade, you've experienced an immersive 3D environment, perhaps even in a multiplayer environment with many other users at the same time. The video game industry grew quickly during the pandemic, with users spending more time and money on video games. Massive multiplayer online games like Fortnite provide more than a gaming environment. Users socialize with their friends and attend concerts featuring famous performers. They also spend money on different appearances or gestures to express themselves in the environment. When they are not playing the game, they are often watching other players stream their experience in the game. In many ways, the consumer metaverse already exists on platforms like Fortnite. At the same time, gaming developers are improving the engines for these experiences and getting closer to approximating the real world both visually and in terms of physics.
In the enterprise space, immersive 3D environments are also becoming more popular. Manufacturing firms are building digital twins to represent entire factories, modeling their real physical environments in digital space. For example, BMW’s “factory of the future” uses NVIDIA Omniverse to create a digital twin of its assembly system, simulated down to the detail of digital workers. BMW uses this simulation to plan reconfiguration of its factory to accommodate new car models and to train robots with synthetic data (“NVIDIA Omniverse,” NVIDIA, 2021).
Horizon Workrooms is Meta's business-focused application of Horizon Worlds. It facilitates a VR workspace where colleagues can interact with others’ avatars, access their computer, use videoconferencing, and sketch out ideas on a whiteboard. With the Oculus Quest 2 headset, passthrough mode allows users to add their physical desk to the virtual environment (Oculus, 2022).
AltspaceVR is Microsoft's early metaverse environment and it can be accessed with Oculus, HTC Vive, Windows Mixed Reality, or in desktop mode. Separately, Microsoft Studios has been developing digital 3D environments for its Xbox video game platform for yeas. In January 2022, Microsoft acquired games studio Activision Blizzard for $68.7 billion, saying the games studio would play a key role in the development of the metaverse.
If the metaverse is going to be a good place to collaborate, then communication must feel as natural as it does in the real world. At the same time, it will need to have a few more controls at the users’ disposal so they can focus in on the conversation they choose. Audio will be a major part of the communication experience, augmented by expressive avatars and text.
Mixed reality headsets come with integrated microphones and speakers to enable voice communications. Spatial audio will also be an important component of voice exchange in the metaverse. When you are in a videoconference conversation with 50 participants, every one of those people will sound as though they are sitting right next to you. In the metaverse, each person will sound louder or quieter based on how distant their avatar is from you. This will allow large groups of people to get together in one digital space and have multiple conversations happening simultaneously. In some situations, there will also be a need for groups to form a “party” as they navigate the metaverse, meaning they would stay linked through a live audio connection even if their avatars were not in the same digital space. Augmented reality headsets also allow remote users to “see through the eyes” of the person wearing the headset through a front-facing camera. This is useful for hands-on tasks where expert guidance is required.
People will also need to communicate with people not in the metaverse. More conventional videoconference windows or chat boxes will be imported into these environments as 2D panels, allowing users to integrate them into the context of their digital space.
Facebook Messenger is a text chat and video chat application that is already integrated into Facebook’s platform. Facebook also owns WhatsApp, a messaging platform that offers group chat and encrypted messaging.
Microsoft Teams is Microsoft’s application that combines presence-based text chat and videoconferencing between individuals and groups. Dynamics 365 Remote Assist is its augmented reality application designed for HoloLens wearers or mobile device users to share their real-time view with experts.
Metaverse platforms provide users with no-code and low-code options to build out their own environments. So far this looks like playing a game of Minecraft. Users in the digital environment use native tools to place geometric shapes and add textures. Other metaverse platforms allow users to design models or textures with tools outside the platform, often even programming behaviors for the objects, and then import them into the metaverse. These tools can be used effectively, but it can be a tedious way to create a customized digital space.
Generative AI will address that by taking direction from users and quickly generating content to provide the desired metaverse setting. Generative AI can create content that’s meaningful based on natural inputs like language or visual information. For example, a user might give voice commands to a smart assistant and have a metaverse environment created or take photos of a real-world object from different angles to have its likeness digitally imported.
Synthetic data will also play a role in the metaverse. Instead of relying only on people to create a lot of relevant data to train AI, metaverse platform providers will also use simulated data to provide context. NVIDIA’s Omniverse Replicator engine provides this capability and can be used to train self-driving cars and manipulator robots for a factory environment (NVIDIA Newsroom, 2021).
Meta is planning to use generative AI to allow users to construct their VR environments. It will allow users to describe a world to a voice assistant and have it created for them. Users could also speak to each other in different languages with the aid of a universal translator. Separately, Project CAIRaoke combines cognitive vision with a voice assistant to help a user cook dinner. It keeps track of where the ingredients are in the kitchen and guides the user through the steps (Reuters, 2022).
Microsoft Mesh includes AI resources to help create natural interactions through speech and vision learning models. HoloLens 2 already uses AI models to track users’ hands and eye movements as well as map content onto the physical world. This will be reinforced in the cloud through Microsoft Azure’s AI capabilities (Microsoft Innovation Stories, 2021).
Blockchain technology provides a decentralized digital ledger that immutably records transactions. A specific blockchain can either be permissioned, with one central party determining who gets access, or permissionless, in which anyone with the means can transact on the blockchain. The permissionless variety emerged in 2008 as the foundation of Bitcoin. It's been a disruptive force in the financial industry, with Bitcoin inspiring a long list of offshoot cryptocurrencies, and now even central banks are examining moving to a digital currency standard.
In the past couple of years, blockchain has spurred a new economy around digital assets. Smart contracts can be used to create a token on a blockchain and bind it to a specific digital asset. These assets are called non-fungible tokens (NFTs). Owners of NFTs can prove their chain of ownership and sell their tokens to others on a variety of marketplaces.
Blockchain could be useful in the metaverse to track digital identity, manage digital assets, and enable data portability. Users could register their own avatars as NFTs to prove they are the real person behind their digital representation. They may also want a way to verify they own a virtual plot of land or demonstrate the scarcity of the digital clothing they are wearing in the metaverse. If users want to leave a certain metaverse platform, they could export their avatar and digital assets to a digital wallet and transfer them to another platform that supports the same standards.
In the past, centralized platforms that create economies in a virtual world were able to create digital currencies and sell specific assets to users without the need for blockchain. Second Life is a good example, with Linden Labs providing a virtual token called Linden Dollars that users can exchange to buy goods and services from each other within the virtual world. Second Life processes 345 million transactions a year for virtual goods and reports a GDP of $650 million, which would put it ahead of some countries (VentureBeat, 2022). However, the value is trapped within Second Life and can't be exported elsewhere.
Meta ended its Diem project in early 2022, winding down its plan to offer a digital currency pegged to US dollars. Assets were sold to Silvergate Bank for $182 million. On February 24, blockchain developer Atmos announced it wanted to bring the project back to life. Composed of many of the original developers that created Diem while it was still a Facebook project, the firm plans to raise funds based on the pitch that the new iteration will be "Libra without Facebook“ (CoinDesk, 2022).
Microsoft expanded its team of blockchain developers after its lead executive in this area stated the firm is closely watching cryptocurrencies and NFTs. Blockchain Director York Rhodes tweeted on November 8, 2021, that he was expanding his team and was interested to connect with candidates "obsessed with Turing complete, scarce programmable objects that you can own & transfer & link to the real world through a social contract.”
Improve maturity in these four areas first
|
![]() |
Risks
|
Mitigations
|
Risks
| Mitigations
|
Risks
| Mitigations
|
Risks
| Mitigations
|
CIO Priorities 2022
Priorities to compete in the digital economy.
Microsoft Teams Cookbook
Recipes for best practices and use cases for Microsoft Teams.
Run Better Meetings
Hybrid, virtual, or in person – set meeting best practices that support your desired meeting norms.
Double Your Organization’s Effectiveness With a Digital Twin
Digital twin: A living, breathing reflection.
Dr. Hendrik Witt
|
Kevin Tucker
|
Cannavò, Alberto, and F. Lamberti. “How Blockchain, Virtual Reality and Augmented Reality Are Converging, and Why.” IEEE Consumer Electronics Magazine, vol. 10, no. 5, Sept. 2020, pp. 6-13. IEEE Xplore. Web.
Culliford, Elizabeth. “Meta’s Zuckerberg Unveils AI Projects Aimed at Building Metaverse Future.” Reuters, 24 Feb. 2022. Web.
Davies, Nahla. “Cybersecurity and the Metaverse: Pioneering Safely into a New Digital World.” GlobalSign Blog, 10 Dec. 2021. GlobalSign by GMO. Web.
Doctorow, Cory. “Neuromancer Today.” Medium, 10 Feb. 2022. Web.
Heath, Alex. “Meta’s Social VR Platform Horizon Hits 300,000 Users.” The Verge, 17 Feb. 2022. Web.
“Holoportation™.” Microsoft Research, 22 Feb. 2022. Microsoft. Accessed 3 March 2022.
Isaac, Mike. “Meta Spent $10 Billion on the Metaverse in 2021, Dragging down Profit.” The New York Times, 2 Feb. 2022. Web.
Isaac, Mike, and Sheera Frenkel. “Out With the Facebookers. In With the Metamates.” The New York Times, 15 Feb. 2022. Web.
Langston, Jennifer. “‘You Can Actually Feel like You’re in the Same Place’: Microsoft Mesh Powers Shared Experiences in Mixed Reality.” Microsoft Innovation Stories, 2 Mar. 2021. Microsoft. Web.
“Maple Leaf Sports & Entertainment and AWS Team Up to Transform Experiences for Canadian Sports Fans.” Amazon Press Center, 23 Feb. 2022. Amazon.com. Accessed 24 Feb. 2022. Web.
Marquez, Reynaldo. “How Microsoft Will Move To The Web 3.0, Blockchain Division To Expand.” Bitcoinist.com, 8 Nov. 2021. Web.
Metinko, Chris. “Securing The Metaverse—What’s Needed For The Next Chapter Of The Internet.” Crunchbase News, 6 Dec. 2021. Web.
Metz, Rachel Metz. “Why You Can’t Have Legs in Virtual Reality (Yet).” CNN, 15 Feb. 2022. Accessed 16 Feb. 2022.
“Microsoft to Acquire Activision Blizzard to Bring the Joy and Community of Gaming to Everyone, across Every Device.” Microsoft News Center, 18 Jan. 2022. Microsoft. Web.
Nath, Ojasvi. “Big Tech Is Betting Big on Metaverse: Should Enterprises Follow Suit?” Toolbox, 15 Feb. 2022. Accessed 24 Feb. 2022.
“NVIDIA Announces Omniverse Replicator Synthetic-Data-Generation Engine for Training AIs.” NVIDIA Newsroom, 9 Nov. 2021. NVIDIA. Accessed 9 Mar. 2022.
“NVIDIA Omniverse - Designing, Optimizing and Operating the Factory of the Future. 2021. YouTube, uploaded by NVIDIA, 13 April 2021. Web.
Peters, Jay. “Disney Has Appointed a Leader for Its Metaverse Strategy.” The Verge, 15 Feb. 2022. Web.
Robinson, Joanna. The Sci-Fi Guru Who Predicted Google Earth Explains Silicon Valley’s Latest Obsession.” Vanity Fair, 23 June 2017. Accessed 13 Feb. 2022.
Scoble, Robert. “New Startup Mixes Reality with Computer Vision and Sets the Stage for an Entire Industry.” Scobleizer, 17 Feb. 2022. Web.
Seward, Zack. “Ex-Meta Coders Raising $200M to Bring Diem Blockchain to Life: Sources.” CoinDesk, 24 Feb. 2022. Web.
Shrestha, Rakesh, et al. “A New Type of Blockchain for Secure Message Exchange in VANET.” Digital Communications and Networks, vol. 6, no. 2, May 2020, pp. 177-186. ScienceDirect. Web.
Sood, Vishal. “Gain a New Perspective with Dynamics 365 Connected Spaces.” Microsoft Dynamics 365 Blog, 2 Nov. 2021. Microsoft. Web.
Takahashi, Dean. “Philip Rosedale’s High Fidelity Cuts Deal with Second Life Maker Linden Lab.” VentureBeat, 13 Jan. 2022 Web.
“TeamViewer Capital Markets Day 2021.” TeamViewer, 10 Nov. 2021. Accessed 22 Feb. 2022.
VR for Work. Oculus.com. Accessed 1 Mar. 2022.
Wunderman Thompson Intelligence. “New Trend Report: Into the Metaverse.” Wunderman Thompson, 14 Sept. 2021. Accessed 16 Feb. 2022.
The IT ecosystem consists of at least 9 main areas. And every day, new challenges come to the forefront.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Lay down the foundations for security risk management, including roles and responsibilities and a defined risk tolerance level.
Define frequency and impact rankings then assess the risk of your project.
Catalog an inventory of individual risks to create an overall risk profile.
Communicate the risk-based conclusions and leverage these in security decision making.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Build the foundation needed for a security risk management program.
Define roles and responsibilities of the risk executive.
Define an information security risk tolerance level.
Clearly defined roles and responsibilities.
Defined risk tolerance level.
1.1 Define the security executive function RACI chart.
1.2 Assess business context for security risk management.
1.3 Standardize risk terminology assumptions.
1.4 Conduct preliminary evaluation of risk scenarios to determine your risk tolerance level.
1.5 Decide on a custom risk factor weighting.
1.6 Finalize the risk tolerance level.
1.7 Begin threat and risk assessment.
Defined risk executive functions
Risk governance RACI chart
Defined quantified risk tolerance and risk factor weightings
Determine when and how to conduct threat and risk assessments (TRAs).
Complete one or two TRAs, as time permits during the workshop.
Developed process for how to conduct threat and risk assessments.
Deep risk analysis for one or two IT projects/initiatives.
2.1 Determine when to initiate a risk assessment.
2.2 Review appropriate data classification scheme.
2.3 Identify system elements and perform data discovery.
2.4 Map data types to the elements.
2.5 Identify STRIDE threats and assess risk factors.
2.6 Determine risk actions taking place and assign countermeasures.
2.7 Calculate mitigated risk severity based on actions.
2.8 If necessary, revisit risk tolerance.
2.9 Document threat and risk assessment methodology.
Define scope of system elements and data within assessment
Mapping of data to different system elements
Threat identification and associated risk severity
Defined risk actions to take place in threat and risk assessment process
Complete one or two TRAs, as time permits during the workshop.
Deep risk analysis for one or two IT projects/initiatives, as time permits.
3.1 Continue threat and risk assessment activities.
3.2 As time permits, one to two threat and risk assessment activities will be performed as part of the workshop.
3.3 Review risk assessment results and compare to risk tolerance level.
One to two threat and risk assessment activities performed
Validation of the risk tolerance level
Collect, analyze, and aggregate all individual risks into the security risk register.
Plan for the future of risk management.
Established risk register to provide overview of the organizational aggregate risk profile.
Ability to communicate risk to other stakeholders as needed.
4.1 Begin building a risk register.
4.2 Identify individual risks and threats that exist in the organization.
4.3 Decide risk responses, depending on the risk level as it relates to the risk tolerance.
4.4 If necessary, revisit risk tolerance.
4.5 Identify which stakeholders sign off on each risk.
4.6 Plan for the future of risk management.
4.7 Determine how to present risk to senior management.
Risk register, with an inventory of risks and a macro view of the organization’s risk
Defined risk-based initiatives to complete
Plan for securing and managing the risk register
Establish an enterprise architecture practice that:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
You need to define a sound set of design principles before commencing with the design of your EA organization.
The EA operating model structure should be rigid but pliable enough to fit the needs of the stakeholders it provide services to.
A phased approach and a good communications strategy are key to the success of the new EA organization.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify how EA looks within the organization and ensure all the necessary skills are accounted for within the function.
EA is designed to be the most appropriately placed and structured for the organization.
1.1 Place the EA department.
1.2 Define roles for each team member.
1.3 Find internal and external talent.
1.4 Create job descriptions with required proficiencies.
EA organization design
Role-based skills and competencies
Talent acquisition strategy
Job descriptions
Create a thorough engagement model to interact with stakeholders.
An understanding of each process within the engagement model.
Create stakeholder interaction cards to plan your conversations.
2.1 Define each engagement process for your organization.
2.2 Document stakeholder interactions.
EA Operating Model Template
EA Stakeholder Engagement Model Template
Develop EA boards, alongside a charter and policies to effectively govern the function.
Governance that aids the EA function instead of being a bureaucratic obstacle.
Adherence to governace.
3.1 Outline the architecture review process.
3.2 Position the architecture review board.
3.3 Create a committee charter.
3.4 Make effective governance policy.
Architecture Board Charter Template
EA Policy Template
Create an operating model that is influenced by universal standards including TOGAF, Zachmans, and DoDAF.
A thoroughly articulated development framework.
Understanding of the views that influence each domain.
4.1 Tailor an architecture development framework to your organizational context.
EA Operating Model Template
Enterprise Architecture Views Taxonomy
Create a change management and communication plan or roadmap to execute the operating model.
Build a plan that takes change management and communication into consideration to achieve the wanted benefits of an EA program.
Effectively execute the roadmap.
5.1 Create a sponsorship action plan.
5.2 Outline a communication plan.
5.3 Execute a communication roadmap.
Sponsorship Action Plan
EA Communication Plan Template
EA Roadmap
Organizations can struggle to understand what service-level agreements (SLAs) are required and how they can differ depending on the service type. In addition, these other challenges can also cloud an organization’s knowledge of SLAs:
SLAs need to have clear, easy-to-measure objectives, to meet expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to its obligations.
This project will provide several benefits and learnings for almost all IT workers:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand key components and elements of an SLA.
Properly evaluate an SLA for required elements.
1.1 SLA overview, objectives, SLA types, service levels
1.2 SLA elements and objectives
1.3 SLA components: monitoring, reporting, and remedies
1.4 SLA checklist review
SLA Checklist
Evaluation Process
SLA Checklist
Evaluation Process
SLA Checklist
Evaluation Process
SLA Checklist
Evaluation Process
Apply knowledge of SLA elements to create internal SLA requirements.
Templated SLAs that meet requirements.
Framework to manage SLOs.
2.1 Creating SLA criteria and requirements
2.2 SLA templates and policy
2.3 SLA evaluation activity
2.4 SLA Management Framework
2.5 SLA monitoring, tracking, and remedy reconciliation
Internal SLA Management Framework
Evaluation of current SLAs
SLA tracking and trending
Internal SLA Management Framework
Evaluation of current SLAs
SLA tracking and trending
Internal SLA Management Framework
Evaluation of current SLAs
SLA tracking and trending
Internal SLA Management Framework
Evaluation of current SLAs
SLA tracking and trending
Internal SLA Management Framework
Evaluation of current SLAs
SLA tracking and trending
Hold Service Providers more accountable to their contractual obligations with meaningful SLA components & remedies
Every year organizations outsource more and more IT infrastructure to the cloud, and IT operations to managed service providers. This increase in outsourcing presents an increase in risk to the CIO to save on IT spend through outsourcing while maintaining required and expected service levels to internal customers and the organization. Ensuring that the service provider constantly meets their obligations so that the CIO can meet their obligation to the organization can be a constant challenge. This brings forth the importance of the Service Level Agreement.
Research clearly indicates that there is a general lack of knowledge when comes to understanding the key elements of a Service Level Agreement (SLA). Even less understanding of the importance of the components of Service Levels and the Service Level Objectives (SLO) that service provider needs to meet so that the outsourced service consistently meets requirements of the organization. Most service providers are very good at providing the contracted service and they all are very good at presenting SLOs that are easy to meet with very few or no ramifications if they don’t meet their objectives. IT leaders need to be more resolute in only accepting SLOs that are meaningful to their requirements and have meaningful, proactive reporting and associated remedies to hold service providers accountable to their obligations.
Ted Walker
Principal Research Director, Vendor Practice
Info-Tech Research Group
Vendors provide service level commitments to customers in contracts to show a level of trust, performance, availability, security, and responsiveness in an effort create a sense of confidence that their service or platform will meet your organization’s requirements and expectations. Sifting through these promises can be challenging for many IT Leaders. Customers struggle to understand and evaluate what’s in the SLA – are they meaningful and protect your investment? Not understanding the details of SLAs applicable to various types of Service (SaaS, MSP, Service Desk, DR, ISP) can lead to financial and compliance risk for the organization as well as poor customer satisfaction.
This project will provide IT leadership the knowledge & tools that will allow them to:
Hold service providers more accountable to their contractual obligations with meaningful SLA components and remedies
IT Leadership doesn't know how to evaluate an SLA.
Misunderstanding of obligations given the type of service provided (SAAS, IAAS, DR/BCP, Service Desk)
Expectations not being met, leading to poor service from the provider.
No way to hold provider accountable.
SLAS are designed to ensure that outsourced IT services meet the requirements and expectations of the organization. Well-written SLAs with all the required elements, metrics, and remedies will allow IT departments to provide the service levels to their customer and avoid financial and contractual risk to the organization.
Service types
Agreement Types
Performance Metrics
Example SaaS Provider
SLA Management Framework
To understand which SLAs are required for your organization and how they can differ depending on the service type. In addition, these other challenges can also cloud your knowledge of SLAs
There are several unknowns that SLA can present to different departments within the organization:
Info-Tech has a three-step approach to effective SLAs
There are some basic components that every SLA should have – most don’t have half of what is required
Info-Tech Insight
SLAs need to have clear, easy to measure objectives to meet your expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to their obligations.
SLAs come in many variations and for many service types. Understanding what needs to be in them is one of the keys to reducing risk to your organization.
“One of the biggest mistakes an IT leader can make is ignoring the ‘A’ in SLA,” adds Wendy M. Pfeiffer, CIO at Nutanix. “
An agreement isn’t a one-sided declaration of IT capabilities, nor is it a one-sided demand of business requirements,” she says. “An agreement involves creating a shared understanding of desired service delivery and quality, calculating costs related to expectations, and then agreeing to outcomes in exchange for investment.” (15 SLA mistakes IT leaders still make | CIO)
Most organizations don’t have a full understanding of what SLAs they require and how to ensure they are met by the vendor. Other obstacles that SLAs can present are:
55% of businesses do not find all of their service desk metrics useful or valuable (Freshservice.com)
27% of businesses spend four to seven hours a month collating metric reports (Freshservice.com)
Understand SLA Elements
Phase Content:
Outcome:
This phase will present you with an understanding of the elements of an SLA: What they are, why you need them, and how to validate them.
Create Requirements
Phase Content:
Outcome:
This phase will leverage knowledge gained in Phase 1 and guide you through the creation of SLA requirements, criteria, and templates to ensure that providers meet the service level obligations needed for various service types to meet your organization’s service expectations.
Manage Obligations
Phase Content:
Outcome:
This phase will provide you with an SLA management framework and the best practices that will allow you to effectively manage service providers and their SLA obligations.
SLAs need to have clear, easy-to-measure objectives to meet your expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to their obligations.
Not understanding the required elements of an SLA and not having meaningful remedies to hold service providers accountable to their obligations can present several risk factors to your organization.
Creating standard SLA criteria for your organization’s service providers will ensure consistent service levels for your business units and customers.
SLAs can have appropriate SLOs and remedies but without effective management processes they could become meaningless.
Be sure to set SLAs that are easily measurable from regularly accessible data and that are straight forward to interpret.
Beware of low, easy to attain service levels and metrics/KPIs. Service levels need to meet your expectations and needs not the vendor’s.
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
SLA Tracker & Trending Tool
Track the provider’s SLO attainment and see how their performance is trending over time
SLA Evaluation Tool
Evaluate SLA service levels, metrics, credit values, reporting, and other elements
SLA Template & Metrics Reference Guide
Reference guide for typical SLA metrics with a generic SLA Template
Service-Level Agreement Checklist
Complete SLA component checklist for core SLA and contractual elements.
Service-Level Agreement Evaluation Tool
Evaluate each component of the SLA , including service levels, metrics, credit values, reporting, and processes to meet your requirements
Once you have this knowledge you will be able to create and negotiate SLA requirements to meet your organization’s needs and then manage them effectively throughout the term of the agreement.
InfoTech Insight:
Right-size your requirements and create your SLO criteria based on risk mitigation and create measurements that motivate the desired behavior from the SLA.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way wound help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | |
|---|---|---|
| Understanding SLAs | SLA Templating & Management | |
| Activities | 1.1 SLA overview, objectives, SLA types, service levels 1.2 SLA elements and objectives 1.3 SLA components – monitoring, reporting, remedies 1.4 SLA Checklist review |
2.1 Creating SLA criteria and requirements 2.2 SLA policy & template 2.3 SLA evaluation activity 2.4 SLA management framework 2.5 SLA monitoring, tracking, remedy reconciliation |
| Deliverables |
|
|
Phase 1
Understand SLA Elements
Phase Steps
Create Requirements
Manage Obligations
An SLA is an overarching contractual agreement between a service provider and a customer (can be external or internal) that describes the services that will be delivered by the provider. It describes the service levels and associated performance metrics and expectations, how the provider will show it has attained the SLAs, and defines any remedies or credits that would apply if the provider fails to meet its commitments. Some SLAs also include a change or revision process.
SLAs come in a few forms. Some are unique, separate, standalone documents that define the service types and levels in more detail and is customized to your needs. Some are separate documents that apply to a service and are web posted or linked to an MSA or SSA. The most common is to have them embedded in, or as an appendix to an MSA or SSA. When negotiating an MSA it’s generally more effective to negotiate better service levels and metrics at the same time.
To be effective, SLAs need to have clearly described objectives that define the service type(s) that the service provider will perform, along with commitment to associated measurable metrics or KPIs that are sufficient to meet your expectations. The goal of these service levels and metrics is to ensure that the service provider is committed to providing the service that you require, and to allow you to maintain service levels to your customers whether internal or external.
There are several more common service-related elements of an SLA. These generally include:
These are construct components of an SLA that outline their roles and responsibilities, T&Cs, escalation process, etc.
In addition, there are several contractual-type elements including, but not limited to:
Service-level SLA
Customer-based SLA
Multi-level SLA
InfoTech Insight: Beware of low, easy to attain Service levels and metrics/KPIs. Service levels need to meet your requirements, expectations, and needs not the vendor’s.
The objective of the service levels and service credits are to:
Service types
There are several service types that can be part of an SLA. Service types are the different nature of services associated with the SLA that the provider is performing and being measured against. These can include:
Service Desk, SaaS, PaaS, IaaS, ISP/Telecom/Network MSP, DR & BCP, Co-location security ops, SOW.
Each service type should have standard service level targets or obligations that can vary depending on your requirements and reliance on the service being provided.
Service levels
Service levels are measurable targets, metrics, or KPIs that the service provider has committed to for the particular service type. Service levels are the key element of SLAs – they are the performance expectations set between you and the provider. The service performance of the provider is measured against the service level commitments. The ability of the provider to consistently meet these metrics will allow your organization to fully benefit from the objectives of the service and associated SLAs. Most service levels are time related but not all are.
Common service levels are:
Response times, resolution times per percent, restore/recovery times, accuracy, availability/uptime, completion/milestones, updating/communication, latency.
Each service level has standard or minimum metrics for the provider. The metrics, or KPIs, should be relatively easy to measure and report against on a regular basis. Service levels are generally negotiable to meet your requirements.
Using this checklist will help you review a provider’s SLA to ensure it contains adequate service levels and remedies as well as contract-type elements.
Instructions:
Use the checklist to identify the principal service level elements as well as the contractual-type elements within the SLA.
Review the SLA and use the dropdowns in the checklist to verify if the element is in the SLA and whether it is within acceptable parameters as well the page or section for reference.
The checklist contains a list of service types that can be used for reference of what SLA elements you should expect to see in that service type SLA.
Download the SLA Checklist Tool
As mentioned, well-defined service levels are key to the success of the SLA. Validating that the metrics/KPIs are being met on a consistent basis requires regular monitoring and reporting. These elements of the SLA are how you hold the provider accountable to the SLA commitments and obligations. To achieve the service level, the service must be monitored to validate that timelines are met and accuracy is achieved.
Too many SLAs do not have these elements as often the provider tries to put the onus on the customer to monitor their performance of the service levels. .
Service-level reports validate the performance of the service provider to the SLA metrics or KPIs. If the metrics are met, then by rights, the service provider is doing its job and performing up to expectations of the SLA and your organization.
Research shows that credit values that equate to just a few dollars, when you are paying the provider tens of thousands of dollars a month for a service or product, the credit is insignificant and therefore doesn’t incent the provider to achieve or maintain a service level.
Along with meaningful credit values, there must be a defined credit calculation method and credit redemption process in the SLA.
Credit calculation. The credit calculation should be simple and straight forward. Many times, we see providers define complicated methods of calculating the credit value. In some cases complicated service levels require higher effort to monitor and report on, but this shouldn’t mean that the credit for missing the service level needs to require the same effort to calculate. Do a sample credit calculation to validate if the potential credit value is meaningful enough or meets your requirements.
Credit redemption process. The SLA should define the process of how a credit is provided to the customer. Ideally the process should be fairly automated by the service provider. If the report shows a missed service level, that should trigger a credit calculation and credit value posted to account followed by notification. In many SLAs that we review, the credit process is either poorly defined or not defined at all. When it is defined, the process typically requires the customer to follow an onerous process and submit a credit request that must then be validated by the provider and then, if approved, posted to your account to be applied at year end as long as you are in complete compliance with the agreement and up-to-date on your account etc. This is what we need to avoid in provider-written SLAs. You need a proactive process where the service provider takes responsibility for missing an SLA and automatically assigns an accurate credit to your account with an email notice.
Secondary level remedies. These are remedies for partial performance. For example, the platform is accessible but some major modules are not working (i.e.: the payroll platform is up and running and accessible but the tax table is not working properly so you can’t complete your payroll run on-time). Consider the requirement of a service level, metric, and remedy for critical components of a service and not just the platform availability.
Info-Tech Insight SLA’s without adequate remedies to hold the vendor accountable to their commitments make the SLAs essentially meaningless.
Attaining service-level commitments by the provider within an SLA can depend on other factors that could greatly influence their performance to service levels. Most of these other factors are common and should be defined in the SLA as exclusions or exceptions. Exceptions/exclusions can typically apply to credit calculations as well. Typical exceptions to attaining service levels are:
Attention should be taken to review the exceptions to ensure they are in fact not within the reasonable control of the provider. Many times the provider will list several exclusions. Often these are not reasonable or can be avoided, and in most cases, they allow the service provider the opportunity to show unjustified service-level achievements. These should be negotiated out of the SLA.
The SLA Evaluation Tool will allow you evaluate an SLA for content. Enter details into the tool and evaluate the service levels and SLA elements and components to ensure the agreement contains adequate SLOs to meet your organization’s service requirements.
Instructions:
Review and identify SLA elements within the service provider’s SLA.
Enter service-level details into the tool and rate the SLOs.
Enter service elements details, validate that all required elements are in the SLA, and rate them accordingly.
Capture and evaluate service-level SLO calculations.
Review the overall rating for the SLA and create a targeted list for improvements with the service provider.
Download the SLA Evaluation Tool
SLA – Service-Level Agreement The promise or commitment
SLO – Service-Level Objective The goals or targets
Other common names are Metrics and Key Performance Indicators (KPIs )
SLI – Service-Level Indicator How did we do? Did we achieve the objectives?
Other common names: attainment, results, actual
Info-Tech Insight:
Web-posted SLAs that are not embedded within a signed MSA, can present uncertainty and risk as they can change at any time and typically without direct notice to the customer
Understand SLA Elements
Phase 2
Create Requirements
Phase Steps
Manage Obligations
With your understanding of the types of SLAs and the elements that comprise a well-written agreement
After creating templates for minimum-service metrics & KPIs, reporting criteria templates, process, and timing, the next step should be to work on contract-type elements and additional service-level components. These elements should include:
These templates or criteria minimums can be used as guidelines or policy when creating or negotiating SLAs with a service provider.
Start your initial element templates for your strategic vendors and most common service types: SaaS, IaaS, Service Desk, SecOps, etc. The goal of SLA templates is to create simple minimum guidelines for service levels that will allow you to meet your internal SLAs and expectations. Having SLA templates will show the service provider that you understand your requirements and may put you in a better negotiating position when reviewing with the provider.
When considering SLO metrics or KPIs consider the SMART guidance:
Simple: A KPI should be easy to measure. It should not be complicated, and the purpose behind recording it must be documented and communicated.
Measurable: A KPI that cannot be measured will not help in the decision-making process. The selected KPIs must be measurable, whether qualitatively or quantitatively. The procedure for measuring the KPIs must be consistent and well-defined.
Actionable: KPIs should contribute to the decision-making process of your organization. A KPI that does not make any such contributions serves no purpose.
Relevant: KPIs must be related to operations or functions that a security team seeks to assess.
Time-based: KPIs should be flexible enough to demonstrate changes over time. In a practical sense, an ideal KPI can be grouped together by different time intervals.
(Guide for Security Operations Metrics)
Download the SLA Template & Metrics Reference Guide
*Credit values are not standard values, rather general ranges that our research shows to be the typical ranges that credit values should be for a given missed service level
Once you have created service-level element criteria templates for your organization’s requirements, it’s time to document a negotiation position or strategy to use when negotiating with service providers. Not all providers are flexible with their SLA commitments, in fact most are reluctant to change or create “unique” SLOs for individual customers. Particularly cloud vendors providing IaaS, SaaS, or PaaS, SLAs. ISP/Telcom, Co-Lo and DR/BU providers also have standard SLOs that they don’t like to stray far from. On the other hand, security ops (SIEM), service desk, hardware, and SOW/PS providers who are generally contracted to provide variable services are somewhat more flexible with their SLAs and more willing to meet your requirements.
The goal of creating internal SLA templates and policies is to set a minimum baseline of service levels that your organization is willing to accept, and that will meet their requirements and expectations for the outsourced service. Using these templated SLOs will set the basis for negotiating the entire SLA with the provider. You can set the SLA purpose, objectives, roles, and responsibilities and then achieve these from the service provider with solid SLOs and associated reporting and remedies.
Info-Tech Insight
Web-posted SLAs that are not embedded within a signed MSA can present uncertainty and risk as they can change at any time and typically without direct notice to the customer
Understand SLA Elements
Create Requirements
Phase 3
Manage Obligations
Phase Steps
The next step to effective SLAs is the management component. It could be fruitless if you were to spend your time and efforts negotiating your required service levels and metrics and don’t have some level of managing the SLA. In that situation you would have no way of knowing if the service provider is attaining their SLOs.
There are several key elements to effective SLA management:
SLA Monitoring → Concise Reporting → Attainment Tracking → Score Carding →Remedy Reconciliation
“A shift we’re beginning to see is an increased use of data and process discovery tools to measure SLAs,” says Borowski of West Monroe. “While not pervasive yet, these tools represent an opportunity to identify the most meaningful metrics and objectively measure performance (e.g., cycle time, quality, compliance). When provided by the client, it also eliminates the dependency on provider tools as the source-of-truth for performance data.” – Stephanie Overby
SLO Attainment Tracking
A primary goal of proactive and automated reporting and credit process is to capture the provider’s attainment data into a tracker or vendor scorecard. These tracking scorecards can easily create status reports and performance trending of service providers, to IT leadership as well as feed QBR agenda content.
Remedy Reconciliation
Regardless of how a credit is processed it should be tracked and reconciled with internal stakeholders and accounting to ensure credits are duly applied or received from the provider and in a timely manner. Tracking and reconciliation must also align with your payment terms, whether monthly or annually.
“While the adage, ‘You can't manage what you don't measure,’ continues to be true, the downside for organizations using metrics is that the provider will change their behavior to maximize their scores on performance benchmarks.” – Rob Lemos
An important activity in the SLA management framework is to track the provider’s SLO attainment on a monthly or quarterly basis. In addition, if an SLO is missed, an associated credit needs to be tracked and captured. This activity allows you to capture the SLOs from the SLA and track them continually and provide data for trending and review at vendor performance meetings and executive updates.
Instructions: Enter SLOs from the SLA as applicable.
Each month, from the provider’s reports or dashboards, enter the SLO metric attainment.
When an SLO is met, the cell will turn green. If the SLO is missed, the cell will turn red and a corresponding cell in the Credit Tracker will turn green, meaning that a credit needs to be reconciled.
Use the Trending tab to view trending graphs of key service levels and SLOs.
Download the SLO Tracker and Trending Tool
Collecting attainment data with scorecards or tracking tools provides summary information on the performance of the service provider to their SLA obligations. This information should be used for regular reviews both internally and with the provider.
Regular attainment reviews should be used for:
Some organizations choose to review SLA performance with providers at regular QBRs or at specific SLA review meetings
This should be determined based on the criticality, risk, and strategic importance of the provider’s service. Providers that provide essential services like ERP, payroll, CRM, HRIS, IaaS etc. should be reviewed much more regularly to ensure that any decline in service is identified early and addressed properly in accordance with the service provider. Negative trending performance should also be documented for consideration at renewal time.
Service providers that consistently miss key service level metrics or KPIs present financial and security risk to the organization. Poor performance of a service provider reflects directly on the IT leadership and will affect many other business aspects of the organization including:
Communication is key. Poor performance of a service provider needs to be dealt with in a timely manner in order to avoid more critical impact of the poor performance. Actions taken with the provider can also vary depending again on the criticality, risk, and strategic importance of the provider’s service.
Performance reviews should provide the actions required with the goal of:
To avoid the issues and challenges of dealing with chronic poor performance, consider a Persistent or Chronic Failure clause into the SLA contract language. These clauses can define chronic failure, scenarios, ramifications there of, and defined options for the client including increased credit values, non-monetary remedies, and termination options without liability.
Info-Tech Insight
It’s difficult to prevent chronic poor performance but you can certainly track it and deal with it in a way that reduces risk and cost to your organization.
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
1-888-670-8889
Improve IT-Business Alignment Through an Internal SLA
Data center Co-location SLA & Service Definition Template
Ensure Cloud Security in IaaS, PaaS, and SaaS Environments
Henderson, George. “3 Most Common Types of Service Level Agreement (SLA).” Master of Project Academy. N.d. Web.
“Guide to Security Operations Metrics.” Logsign. Oct 5, 2020. Web.
Lemos, Rob. “4 lessons from SOC metrics: What your SpecOps team needs to know.” TechBeacon. N.d. Web.
“Measuring and Making the Most of Service Desk Metrics.” Freshworks. N.d. Web.
Overby, Stephanie. “15 SLA Mistakes IT Leaders Still Make.” CIO. Jan 21, 2021.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.
Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.
Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.
Indicates the ownership of datasets and the high-level data flows across the organization.
1.1 Review & discuss typical pitfalls (and their causes) of major data management initiatives.
1.2 Discuss the main business capabilities of the organization and how they interact.
1.3 Discuss the business processes running inside and across business capabilities and the datasets involved.
1.4 Create the Enterprise Business Process Model (EBPM).
Understanding typical pitfalls (and their causes) of major data management initiatives.
Business capabilities map
Business processes map
Enterprise Business Process Model (EBPM)
Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.
Design the high-level data progression pipeline.
2.1 Review and discuss the concept of a data pipeline in general, as well as the vertical zones: data creation, accumulation, augmentation, and consumption.
2.2 Identify these zones in the enterprise business model.
2.3 Review and discuss multi-lane data progression.
2.4 Identify different speed lanes in the enterprise business model.
Understanding of a data pipeline design, including its zones.
EBPM mapping to Data Pipeline Zones
Understanding of multi-lane data progression
EBPM mapping to Multi-Speed Data Progression Lanes
Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).
Use of appropriate data design pattern for each zone with calibration on the data progression speed.
3.1 Review and discuss various data design patterns.
3.2 Discuss and select the data design pattern selection for data pipeline components.
3.3 Discuss applicability of data model industry standards (if available).
Understanding of various data design patterns.
Data Design Patterns mapping to the data pipeline.
Selection of an applicable data model from available industry standards.
Create an effective internal SLA by following a structured process to report current service levels and set realistic expectations with the business. This includes:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Establish the SLA pilot project and clearly document the problems and challenges that it will address.
Expedite the SLA process by thoroughly, carefully, and clearly defining the current achievable service levels.
Create a living document that aligns business needs with IT targets by discovering the impact of your current service level offerings through a conversation with business peers.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Analyze strategic CIO competencies and assess business stakeholder satisfaction with IT using Info-Tech's CIO Business Vision Diagnostic and CXO-CIO Alignment Program.
Evaluate strategic CIO competencies and business stakeholder relationships.
Create a personal development plan and stakeholder management strategy.
Develop a scorecard to track personal development initiatives.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Gather and review information from business stakeholders.
Assess strategic CIO competencies and business stakeholder relationships.
Gathered information to create a personal development plan and stakeholder management strategy.
Analyzed the information from diagnostics and determined the appropriate next steps.
Identified and prioritized strategic CIO competency gaps.
Evaluated the power, impact, and support of key business stakeholders.
1.1 Conduct CIO Business Vision diagnostic
1.2 Conduct CXO-CIO Alignment program
1.3 Assess CIO competencies
1.4 Assess business stakeholder relationships
CIO Business Vision results
CXO-CIO Alignment Program results
CIO competency gaps
Executive Stakeholder Power Map
Create a personal development plan and stakeholder management strategy.
Track your personal development and establish checkpoints to revise initiatives.
Identified personal development and stakeholder engagement initiatives to bridge high priority competency gaps.
Identified key performance indicators and benchmarks/targets to track competency development.
2.1 Create a personal development plan
2.2 Create a stakeholder management strategy
2.3 Establish key performance indicators and benchmarks/targets
Personal Development Plan
Stakeholder Management Strategy
Strategic CIO Competency Scorecard
You are looking to lose your dependency on Active Directory (AD), and you need to tackle infrastructure technical debt, but there are challenges:
Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build all new systems with cloud integration in mind. Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code.
Understand what Active Directory is and why Azure Active Directory does not replace it.
It’s about Kerberos and New Technology LAN Manager (NTLM).
![]() |
Many organizations that want to innovate and migrate from on-premises applications to software as a service (SaaS) and cloud services are held hostage by their legacy Active Directory (AD). Microsoft did a good job taking over from Novell back in the late 90s, but its hooks into businesses are so deep that many have become dependent on AD services to manage devices and users, when in fact AD falls far short of needed capabilities, restricting innovation and progress. Despite Microsoft’s Azure becoming prominent in the world of cloud services, Azure AD is not a replacement for on-premises AD. While Azure AD is a secure authentication store that can contain users and groups, that is where the similarities end. In fact, Microsoft itself has an architecture to mitigate the shortcomings of Azure AD by recommending organizations migrate to a hybrid model, especially for businesses that have an in-house footprint of servers and applications. If you are a greenfield business and intend to take advantage of software, infrastructure, and platform as a service (SaaS, IaaS, and PaaS), as well as Microsoft 365 in Azure, then Azure AD is for you and you don’t have to worry about the need for AD. John Donovan |
Legacy AD was never built for modern infrastructure |
When Microsoft built AD as a free component for the Windows Server environment to replace Windows NT before the demise of Novell Directory Services in 2001, it never meant Active Directory to work outside the corporate network with Microsoft apps and devices. While it began as a central managing system for users and PCs on Microsoft operating systems, with one user per PC, the IT ecosystem has changed dramatically over the last 20 years, with cloud adoption, SaaS, IaaS, PaaS, and everything as a service. To make matters worse, work-from-anywhere has become a serious security challenge. |
|---|---|
Build all new systems with cloud integration in mind |
Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code. Ensure you are engaged when the business is assessing new apps. Stop the practice of the business purchasing apps without IT’s involvement; for example, if your marketing department is asking you for your Domain credentials for a vendor when you were not informed of this purchase. |
Hybrid AD is a solution but not a long-term goal |
Economically, Microsoft has no interest in replacing AD anytime soon. Microsoft wants that revenue and has built components like Azure AD Connect to mitigate the AD dependency issue, which is basically holding your organization hostage. In fact, Microsoft has advised that a hybrid solution will remain because, as we will investigate, Azure AD is not legacy AD. |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
You are looking to lose your dependency on Active Directory, and you need to tackle infrastructure technical debt, but there are challenges.
|
|
|
Info-Tech Insight
Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.
From NT to the cloud
| AD 2001 | Exchange Server 2003 | SharePoint 2007 | Server 2008 R2 | BYOD Security Risk | All in Cloud 2015 |
|---|---|---|---|---|---|
|
|
|
|
|
|
AD is the backbone of many organizations’ IT infrastructure
73% of organizations say their infrastructure is built on AD.
82% say their applications depend on AD data.
89% say AD enables authenticated access to file servers.
90% say AD is the main source for authentication.
Source: Dimensions research: Active Directory Modernization :
Info-Tech Insight
Organizations fail to move away from AD for many reasons, including:
Physical and logical structure
Authentication, authorization, and auditing

AD creates infrastructure technical debt and is difficult to migrate away from.

Info-Tech Insight
Due to the pervasive nature of Active Directory in the IT ecosystem, IT organizations are reluctant to migrate away from AD to modernize and innovate.
Migration to Microsoft 365 in Azure has forced IT departments’ hand, and now that they have dipped their toe in the proverbial cloud “lake,” they see a way out of the mounting technical debt.
Neglecting Active Directory security
98% of data breaches came from external sources.
85% of data breach took weeks or even longer to discover.
The biggest challenge for recovery after an Active Directory security breach is identifying the source of the breach, determining the extent of the breach, and creating a safe and secure environment.
Info-Tech Insight
Neglecting legacy Active Directory security will lead to cyberattacks. Malicious users can steal credentials and hijack data or corrupt your systems.
AD event logs
84% of organizations that had a breach had evidence of that breach in their event logs.
It’s widely estimated that Active Directory remains at the backbone of 90% of Global Fortune 1000 companies’ business infrastructure (Lepide, 2021), and with that comes risk. The risks include:
AD is dependent on Windows Server

"Azure Active Directory is not designed to be the cloud version of Active Directory. It is not a domain controller or a directory in the cloud that will provide the exact same capabilities with AD. It actually provides many more capabilities in a different way.
That’s why there is no actual ‘migration’ path from Active Directory to Azure Active Directory. You can synchronize your on-premises directories (Active Directory or other) to Azure Active Directory but not migrate your computer accounts, group policies, OU etc."
– Gregory Hall,
Brand Representative for Microsoft
(Source: Spiceworks)

Note: AD Federated Services (ADFS) is not a replacement for AD. It’s a bolt-on that requires maintenance, support, and it is not a liberating service.
Many companies are:
Given these trends, Active Directory is becoming obsolete in terms of identity management and permissions.
One of the core principles of Azure AD is that the user is the security boundary, not the network.
Kerberos is the default authentication and authorization protocol for AD. Kerberos is involved in nearly everything from the time you log on to accessing Sysvol, which is used to deliver policy and logon scripts to domain members from the Domain Controller.
Info-Tech Insight
If you are struggling to get away from AD, Kerberos and NTML are to blame. Working around them is difficult. Azure AD uses SAML2.0 OpenID Connect and OAuth2.0.
| Feature | Azure AD DS | Self-managed AD DS |
|---|---|---|
| Managed service | ✓ | ✕ |
| Secure deployments | ✓ | Administrator secures the deployment |
| DNS server | ✓ (managed service) | ✓ |
| Domain or Enterprise administrator privileges | ✕ | ✓ |
| Domain join | ✓ | ✓ |
| Domain authentication using NTLM and Kerberos | ✓ | ✓ |
| Kerberos-constrained delegation | Resource-based | Resource-based and account-based |
| Custom OU structure | ✓ | ✓ |
| Group Policy | ✓ | ✓ |
| Schema extensions | ✕ | ✓ |
| AD domain/forest trusts | ✓ (one-way outbound forest trusts only) | ✓ |
| Secure LDAP (LDAPS) | ✓ | ✓ |
| LDAP read | ✓ | ✓ |
| LDAP write | ✓ (within the managed domain) | ✓ |
| Geo-distributed deployments | ✓ | ✓ |
Source: “Compare self-managed Active Directory Domain Services...” Azure documentation, 2022
How AD poses issues that impact the user experience
IT organizations are under pressure to enable work-from-home/work-from-anywhere.
When considering retiring Active Directory from your environment, look at alternatives that can assist with those legacy application servers, handle Kerberos and NTML, and support LDAP.
What to look for
If you are embedded in Windows systems but looking for an alternative to AD, you need a similar solution but one that is capable of working in the cloud and on premises.
Aside from protocols and supporting utilities, also consider additional features that can help you retire your Active Directory while maintaining highly secure access control and a strong security posture.
These are just a few examples of the many alternatives available.
The business is now driving your Active Directory migration
What IT must deal with in the modern world of work:
Organizations are making decisions that impact Active Directory, from enabling work-from-anywhere to dealing with malicious threats such as ransomware. Mergers and acquisitions also bring complexity with multiple AD domains.
The business is putting pressure on IT to become creative with security strategies, alternative authentication and authorization, and migration to SaaS and cloud services.
Discovery |
Assessment |
Proof of Concept |
Migration |
Cloud Operations |
|---|---|---|---|---|
| ☐ Catalog your applications.
☐ Define your users, groups and usage. ☐ Identify network interdependencies and complexity. ☐ Know your security and compliance regulations. ☐ Document your disaster recovery plan and recovery point and time objectives (RPO/RTO). |
☐ Build a methodology for migrating apps to IaaS. ☐ Develop a migration team using internal resources and/or outsourcing. ☐ Use Microsoft resources for specific skill sets. ☐ Map on-premises third-party solutions to determine how easily they will migrate. ☐ Create a plan to retire and archive legacy data. |
☐ Test your workload: Start small and prove value with a phased approach. ☐ Estimate cloud costs. ☐ Determine the amount and size of your compute and storage requirements. ☐ Understand security requirements and the need for network and security controls. ☐ Assess network performance. ☐ Qualify and test the tools and solutions needed for the migration. |
☐ Create a blueprint of your desired cloud environment. ☐ Establish a rollback plan. ☐ Identify tools for automating migration and syncing data. ☐ Understand the implications of the production-day data move. |
☐ Keep up with the pace of innovation. ☐ Leverage 24/7 support via skilled Azure resources. ☐ Stay on top of system maintenance and upgrades. ☐ Consider service-level agreement requirements, governance, security, compliance, performance, and uptime. |
Manage the Active Directory in the Service Desk
SoftwareReviews: Microsoft Azure Active Directory
“2012 Data Breach Investigations Report.” Verizon, 2012. Web.
“2022 Data Breach Investigations Report.” Verizon, 2012. Web.
“22 Best Alternatives to Microsoft Active Directory.” The Geek Page, 16 Feb 2022. Accessed 12 Sept. 2022.
Altieri, Matt. “Infrastructure Technical Debt.” Device 42, 20 May 2019. Accessed Sept 2022.
“Are You Ready to Make the Move from ADFS to Azure AD?’” Steeves and Associates, 29 April 2021. Accessed 28 Sept. 2022.
Blanton, Sean. “Can I Replace Active Directory with Azure AD? No, Here’s Why.” JumpCloud, 9 Mar 2021. Accessed Sept. 2022.
Chai, Wesley, and Alexander S. Gillis. “What is Active Directory and how does it work?” TechTarget, June 2021. Accessed 10 Sept. 2022.
Cogan, Sam. “Azure Active Directory is not Active Directory!” SamCogan.com, Oct 2020. Accessed Sept. 2022.
“Compare Active Directory to Azure Active Directory.” Azure documentation, Microsoft Learn, 18 Aug. 2022. Accessed 12 Sept. 2022.
"Compare self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services." Azure documentation, Microsoft Learn, 23 Aug. 2022. Accessed Sept. 2022.
“Dimensional Research, Active Directory Modernization: A Survey of IT Professionals.” Quest, 2017. Accessed Sept 2022.
Grillenmeier, Guido. “Now’s the Time to Rethink Active Directory Security.“ Semperis, 4 Aug 2021. Accessed Oct. 2013.
“How does your Active Directory align to today’s business?” Quest Software, 2017, accessed Sept 2022
Lewis, Jack “On-Premises Active Directory: Can I remove it and go full cloud?” Softcat, Dec.2020. Accessed 15 Sept 2022.
Loshin, Peter. “What is Kerberos?” TechTarget, Sept 2021. Accessed Sept 2022.
Mann, Terry. “Why Cybersecurity Must Include Active Directory.” Lepide, 20 Sept. 2021. Accessed Sept. 2022.
Roberts, Travis. “Azure AD without on-prem Windows Active Directory?” 4sysops, 25 Oct. 2021. Accessed Sept. 2022.
“Understanding Active Directory® & its architecture.” ActiveReach, Jan 2022. Accessed Sept. 2022.
“What is Active Directory Migration?” Quest Software Inc, 2022. Accessed Sept 2022.
The project isn’t over if the new product or system isn’t being used. How do you ensure that what you’ve put in place isn’t going to be ignored or only partially adopted? People are more complicated than any new system and managing them through the change needs careful planning.
Cultivating a herd mentality, where people adopt new technology merely because everyone else is, is an important goal in getting the bulk of users using the new product or system. The herd needs to gather momentum though and this can be done by using the more tech-able and enthused to lead the rest on the journey. Identifying and engaging these key resources early in the process will greatly assist in starting the flow.
While communication is key throughout, involving staff in proof-of-concept activities and contests and using the train-the-trainer techniques and technology champions will all start the momentum toward technology adoption. Group activities will address the bulk of users, but laggards may need special attention.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This document will help you to ensure that newly implemented systems and technologies are correctly adopted by the intended recipients.
The project is over. The new technology is implemented. Now how do we make sure it's used?
Technology endlessly changes and evolves. Similarly, business directions and requirements change, and these changes need to be supported by technology. Improved functionality and evolvement of systems, along with systems becoming redundant or unsupported, means that maintaining a static environment is virtually impossible.
Enormous amounts of IT budget are allocated to these changes each year. But once the project is over, how do you manage that change and ensure the systems are being used? Planning your technology adoption is vital.
The obstacles to technology adoption can be many and various, covering a broad spectrum of areas including:
Start by identifying, understanding, categorizing, and defining barriers and put in place a system to:
For every IT initiative that will be directly used by users, consider the question, “Will the final product be readily accepted by those who are going to use it?” There is no point in implementing a product that no one is prepared to use. Gaining user acceptance is much more than just ticking a box in a project plan once UAT is complete.
Prosci specializes in change. Its ADKAR model outlines what’s required to bring individuals along on the change journey.
The project is seen as complete. Significant investments have been made, but the technology either isn’t being used or is only partially in use.
Even worse. The failure to adopt the new technology by some means that the older systems are still being used. There are now two systems that fail to interact; business processes are being affected and there is widespread confusion.
Benefits promised to the business are not being realized. Projected revenue increases, savings, or efficiencies that were forecast are now starting to be seen as under threat.
The project should be over, but the fact that the technology is not being used has created a perception that the implementation is not complete and the project needs to continue.
People are far more complicated than any technology being implemented.
Consider carefully your approach.
There isn’t always adequate communications about what’s changing in the workplace.
Fear of change is natural and often not rational. Whether the fear is about job loss or not being able to adapt to change; it needs to be managed.
Training can be insufficient or ineffective and when this happens people are left feeling like they don’t have the skills to make the change.
A lack of executive support for change means the change is seen as less important.
The excitement the project team and business feels about the change is not necessarily shared throughout the business. Some may just see the change as more work, changing something that already works, or a reason to reduce staff levels.
Whether it’s a lack of confidence generally with technology or concern about a new or changing tool, a lack of confidence is a huge barrier.
There is a cost with managing people during a change, and budget must be allocated to allow for it.
Since Sigmund Freud there has been endless work to understand people’s minds.
Don’t underestimate the effect that people’s reactions to change can have on your project.
Communication plans are designed to properly manage change. Managing change can be easier when we have the right tools and information to adapt to new circumstances. The Kubler-Ross change curve illustrates the expected steps on the path to acceptance of change. With the proper communications strategy, each can be managed appropriately
The rapidly changing technology landscape in our world has always meant that an enthusiasm or willingness to embrace change has been advantageous. Many of us have seen how the older generation has struggled with that change and been left behind.
In the work environment, the events of the past two years have increased pressure on those slow to adopt as in many cases they couldn't perform their tasks without new tools. Previously, for example, those who may have been reluctant to use digital tools and would instead opt for face-to-face meetings, suddenly found themselves without an option as physical meetings were no longer possible. Similarly, digital collaboration tools that had been present in the market for some time were suddenly more heavily used so everyone could continue to work together in the “online world.”
At this stage no one is sure what the "new normal" will be in the post-pandemic world, but what has been clearly revealed is that people are prepared to change given the right motivation.
“Technology adoption is about the psychology of change.”
Bryan Tutor – Executive Counsellor, Info-Tech
Consider your staff and industry when looking at the Everett Rogers curve. A technology organization may have less laggards than a traditional manufacturing one.
In Everett Rogers’ book Diffusion of Innovations 5th Edition (Free Press, 2005), Rogers places adopters of innovations into five different categories.
Innovators are technology enthusiasts. Technology is a central interest of theirs, either at work, at home, or both. They tend to aggressively pursue new products and technologies and are likely to want to be involved in any new technology being implemented as soon as possible, even before the product is ready to be released.
For people like this the completeness of the new technology or the performance can often be secondary because of their drive to get new technology as soon as possible. They are trailblazers and are not only happy to step out of their comfort zone but also actively seek to do so.
Although they only make up about 2.5% of the total, their enthusiasm, and hopefully endorsement of new technology, offers reassurance to others.
Innovators can be very useful for testing before implementation but are generally more interested in the technology itself rather than the value the technology will add to the business.
Whereas Innovators tend to be technologists, Early Adopters are visionaries that like to be on board with new technologies very early in the lifecycle. Because they are visionaries, they tend to be looking for more than just improvement – a revolutionary breakthrough. They are prepared to take high risks to try something new and although they are very demanding as far as product features and performance are concerned, they are less price-sensitive than other groups.
Early Adopters are often motivated by personal success. They are willing to serve as references to other adopter groups. They are influential, seen as trendsetters, and are of utmost importance to win over.
Early adopters are key. Their enthusiasm for technology, personal drive, and influence make them a powerful tool in driving adoption.
This group is comprised of pragmatists. The first two adopter groups belong to early adoption, but for a product to be fully adopted the mainstream needs to be won over, starting with the Early Majority.
The Early Majority share some of the Early Adopters’ ability to relate to technology. However, they are driven by a strong sense of practicality. They know that new products aren’t always successful. Consequently, they are content to wait and see how others fare with the technology before investing in it themselves. They want to see well-established references before adopting the technology and to be shown there is no risk.
Because there are so many people in this segment (roughly 34%), winning these people over is essential for the technology to be adopted.
The Late Majority are the conservatives. This group is generally about the same size as the Early Majority. They share all the concerns of the Early Majority; however, they are more resistant to change and are more content with the status quo than eager to progress to new technology. People in the Early Majority group are comfortable with their ability to handle new technology. People in the Late Majority are not.
As a result, these conservatives prefer to wait until something has become an established standard and take part only at the end of the adoption period. Even then, they want to see lots of support and ensure that there is proof there is no risk in them adopting it.
This group is made up of the skeptics and constitutes 16% of the total. These people want nothing to do with new technology and are generally only content with technological change when it is invisible to them. These skeptics have a strong belief that disruptive new technologies rarely deliver the value promised and are almost always worried about unintended consequences.
Laggards need to be dealt with carefully as their criticism can be damaging and without them it is difficult for a product to become fully adopted. Unfortunately, the effort required for this to happen is often disproportional to the size of the group.
People aren’t born laggards. Technology projects that have failed in the past can alter people’s attitudes, especially if there was a negative impact on their working lives. Use empathy when dealing with people and respect their hesitancy.
Technology adoption is all about people; and therefore, the techniques required to drive that adoption need to be people oriented.
The following techniques are carefully selected with the intention of being impactful on all the different categories described previously.
There are multitudes of different methods to get people to adopt new technology, but which is the most appropriate for your situation? Generally, it’s a combination.
Use your staff to get your message across.
This technique involves training key members of staff so they can train others. It is important that those selected are strong communicators, are well respected by others, and have some expertise in technology.
Marketing should be continuous throughout the change to encourage familiarity.
Communication is key as people are comfortable with what is familiar to them. Marketing is an important tool for convincing adopters that the new product is mainstream, widely adopted and successful.
Tailored for individuals.
One-on-one training sometimes is the only way to train if you have staff with special needs or who are performing unique tasks.
It is generally highly effective but inefficient as it only addresses individuals.
Similar roles, attitudes, and abilities.
Group training is one of the most common methods to start people on their journey toward new technology. Its effectiveness with the two largest groups, Early Majority and Late Majority, make it a primary tool in technology adoption.
The last resort.
The transition can’t go on forever.
At some point the new technology needs to be fully adopted and if necessary, force may have to be used.
Contests can generate excitement and create an explorative approach to new technology. People should not feel pressured. It should be enjoyable and not compulsory.
Incentives don’t have to be large.
For some staff, merely taking management’s lead is not enough. Using “Nudge” techniques to give that extra incentive is quite effective. Incentivizing staff either financially or through rewards, recognition, or promotion is a successful adoption technique for some.
Encouragement to adopt from receiving tangible benefit
Draws more attention to the new technology
Additional expense to business or project
Possible poor precedent for subsequent changes
Early Adopter: Desire for personal success makes incentives enticing.
Early Majority: Prepared to change, but extra incentive will assist.
Late Majority: Conservative attitude means incentive may need to be larger.
Innovator: Enthusiasm for new technology means incentive not necessary.
Laggard: Sceptical about change. Only a large incentive likely to make a difference.
Strong internal advocates for your new technology are very powerful.
Champions take on new technology and then use their influence to promote it in the organization. Using managers as champions to actively and vigorously promote the change is particularly effective.
Follow the crowd.
Herd behavior is when people discount their own information and follow others. Ideally all adopters would understand the reason and advantages in adopting new technology, but practically, the result is most important.
Gain early input and encourage buy-in.
Proof of concept projects give early indications of the viability of a new initiative. Involving the end users in these projects can be beneficial in gaining their support
Involve adopters early on
Valuable feedback and indications of future issues
If POC isn’t fully successful, it may leave lingering negativity
Usually, involvement from small selection of staff
What works for who?
Engage your technology enthusiasts early to help refine your product, train other staff, and act as champions. A combination of marketing and group training will develop a herd mentality. Finally, don’t neglect the laggards as they can prevent project completion.

Although there are different size categories, none can be ignored. Consider your budget when dealing with smaller groups, but also consider their impact.
We don’t want people to revert.
Don’t assume that because your staff have been trained and have access to the new technology that they will keep using it in the way they were trained. Or that they won’t revert back to their old methods or system.
Put in place methods to remove completely or remove access to old systems. Schedule refresh training or skill enhancement sessions and stay vigilant.

Principal Research Advisor, Info-Tech Research Group
With over 30 years in the IT industry, Paul brings to his work his experience as a Strategic Planner, Consultant, Enterprise Architect, IT Business Owner, Technologist, and Manager. Paul has worked with both small and large companies, local and international, and has had senior roles in government and the finance industry.
Principal Research Advisor, Info-Tech Research Group
Scott Young is a Director of Infrastructure Research at Info-Tech Research Group. Scott has worked in the technology field for over 17 years, with a strong focus on telecommunications and enterprise infrastructure architecture. He brings extensive practical experience in these areas of specialization, including IP networks, server hardware and OS, storage, and virtualization.
Use Info-Tech’s workbook to gather information about user groups, business processes, and day-to-day tasks to gain familiarity with your adopters.
Governance and Management of Enterprise Software Implementation
Use our research to engage users and receive timely feedback through demonstrations. Our iterative methodology with a task list focused on the business’ must-have functionality allows staff to return to their daily work sooner.
Quality Management User Satisfaction Survey
This IT satisfaction survey will assist you with early information to use for categorizing your users.
Master Organizational Change Management Practices
Using a soft, empathetic approach to change management is something that all PMOs should understand. Use our research to ensure you have an effective OCM plan that will ensure project success.
Beylis, Guillermo. “COVID-19 accelerates technology adoption and deepens inequality among workers in Latin America and the Caribbean.” World Bank Blogs, 4 March 2021. Web.
Cleland, Kelley. “Successful User Adoption Strategies.” Insight Voices, 25 Apr. 2017. Web.
Hiatt, Jeff. “The Prosci ADKAR ® Model.” PROSCI, 1994. Web.
Malik, Priyanka. “The Kübler Ross Change Curve in the Workplace.” whatfix, 24 Feb. 2022. Web.
Medhaugir, Tore. “6 Ways to Encourage Software Adoption.” XAIT, 9 March 2021. Web.
Narayanan, Vishy. “What PwC Australia learned about fast tracking tech adoption during COVID-19” PWC, 13 Oct. 2020. Web.
Sridharan, Mithun. “Crossing the Chasm: Technology Adoption Lifecycle.” Think Insights, 28 Jun 2022. Web.
Implementing exponential IT will require businesses to work with external vendors to facilitate the rapid adoption of cutting-edge technologies such as generative artificial intelligence. IT leaders must:
These challenges require new skills which build trust and collaboration among vendors.
Outcome-based relationships require a higher degree of trust than traditional vendor relationships. Build trust by sharing risks and rewards.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This research walks you through how to assess your capabilities to undertake a new model of vendor relationships and drive exponential IT.
This tool will facilitate your readiness assessment.
|
Exponential IT brings with it an exciting new world of cutting-edge technology and increasingly accelerated growth of business and IT. But adopting and driving change through this paradigm requires new capabilities to grow impactful and meaningful partnerships with external vendors who can help implement technologies like artificial intelligence and virtual reality. Building outcome-based partnerships involves working very closely with vendors who, in many cases, will have just as much to lose as the organizations implementing these new technologies. This requires a greater degree of trust between parties than a standard vendor relationship. It also drastically increases the risks to both organizations; as each loses some control over data and outcomes, they must trust that the other organization will follow through on commitments and obligations. Outcome-based partnerships build upon traditional vendor management practices and create the potential for organizations to embrace emerging technology in new ways. Kim Osborne Rodriguez |
|
Exponential IT drives change |
Vendor relationships must evolve |
To deliver exponential value |
|---|---|---|
|
Implementing exponential IT will require businesses to work with external vendors to facilitate the rapid adoption of cutting-edge technologies such as generative artificial intelligence. IT leaders must:
These challenges require new skills which build trust and collaboration with vendors. |
Traditional vendor management approaches are still important for organizations to develop and maintain. But exponential relationships bring new challenges:
IT leaders must adapt traditional vendor management capabilities to successfully lead this change. |
Outcome-based relationships should not be undertaken lightly as they can significantly impact the risk profile of the organization. Use this research to:
Exponential value relationships will help drive exponential IT and autonomization of the enterprise. |
Info-Tech Insight
Outcome-based partnerships require a higher degree of trust than traditional vendor relationships. Build trust by sharing risks and rewards.
An outcome-based relationship requires a higher level of mutual trust than traditional vendor relationships. This requires shared reward and shared risk.
Don’t forget about traditional vendor management relationships! Not all vendor relationships can (or should) be outcome-based.
INDUSTRY: Technology
SOURCE: Press Release
Microsoft and OpenAI partner on Azure, Teams, and Microsoft Office suite
In January 2023, Microsoft announced a $10 billion investment in OpenAI, allowing OpenAI to continue scaling its flagship large language model, ChatGPT, and giving Microsoft first access to deploy OpenAI’s products in services like GitHub, Microsoft Office, and Microsoft Teams.
Shared risk
Issues with OpenAI’s platforms could have a debilitating effect on Microsoft’s own reputation – much like Google’s $100 billion stock loss following a blunder by its AI platform Bard – not to mention the financial loss if the platform does not live up to the hype.
Shared reward
This was a particularly important strategic move by Microsoft, as its main competitors develop their own AI models in a race to the top. This investment also gave OpenAI the resources to continue scaling and evolving its services much faster than it would be capable of on its own. If OpenAI’s products succeed, there is a significant upside for both companies.
|
Traditional procurement |
Vendor management |
Exponential vendor relationships |
|---|---|---|
|
|
Use this research to successfully |
Use Info-Tech’s research to Jump Start Your Vendor Management Initiative.
Eighty-seven percent of organizations are currently experiencing talent shortages or expect to within a few years.
Sixty-three percent of IT leaders plan to implement AI in their organizations by the end of 2023.
|
Build trust |
Successfully managing exponential relationships requires increased trust and the ability to share both risks and rewards. Outcome-based vendors typically have greater access to intellectual property, customer data, and proprietary methods, which can pose a risk to the organization if this information is used to benefit competitors. Build mutual trust by sharing both risks and rewards. |
|---|---|
|
Manage risk |
Outcome-based relationships with external vendors can drastically affect an organization’s risk profile. Carefully consider third-party risk and shared risk, including ESG risk, as well as the business risk of losing control over capabilities and assets. Qualified risk specialists (such as legal, regulatory, contract, intellectual property law) should be consulted before entering outcome-based relationships. |
|
Drive outcomes |
Fostering strategic relationships can be instrumental in times of crisis, when being the customer of choice for key vendors can push your organization up the line from the vendor’s side – but be careful about relying on this too much. Vendor objectives may not align with yours, and in the end, everyone needs to protect themselves. |
Exponential Relationships Readiness Assessment
Determine your readiness to build exponential value relationships.
Our research indicates that most organizations would take months to prepare this type of assessment without using our research. That’s over 80 person-hours spent researching and gathering data to support due diligence, for a total cost of thousands of dollars. Doesn’t your staff have better things to do?
Start by answering a few brief questions, then return to this slide at the end to see how much your answers have changed.
Use Info-Tech’s research to Exponential Relationships Readiness Assessment.
|
Questions |
Before |
After |
|---|---|---|
|
To what extent are you satisfied with your current vendor management approach? |
||
|
How many of your current vendors would you describe as being of strategic importance? |
||
|
How much do you spend on vendors annually? |
||
|
How much value do you derive from your vendor relationships annually? |
||
|
Do you have a vendor management strategy? |
||
|
What outcomes are you looking to achieve through your vendor relationships? |
||
|
How well do you understand the core capabilities needed to drive successful vendor management? |
||
|
How well do you understand your current readiness to engage in outcome-based vendor relationships? |
||
|
Do you feel comfortable managing the risks when working with organizations to implement artificial intelligence and other autonomous capabilities? |
Manage your budget and spending to stay on track throughout your relationship.
“Most organizations underestimate the amount of time, money, and skill required to build and maintain a successful relationship with another organization. The investment in exponential relationships is exponential in itself – as are the returns.”
This step involves the following participants:
Activities:
Why is this important?
Build it into your practice:
|
Budget procedures |
Financial alignment |
Adaptability |
Financial analysis |
Reporting & compliance |
|---|---|---|---|---|
|
Clearly articulate and communicate budgets, with proactive analysis and reporting. |
There is a strong, direct alignment between financial outcomes and organizational strategy and goals. |
Financial structures can manage many different types of relationships and structures without major overhaul. |
Proactive financial analysis is conducted regularly, with actionable insights. |
This exceeds legal requirements and includes proactive and actionable reporting. |
Drive exponential value by becoming a customer of choice.
“The more complex the business environment becomes — for instance, as new technologies emerge or as innovation cycles get faster — the more such relationships make sense. And the better companies get at managing individual relationships, the more likely it is that they will become “partners of choice” and be able to build entire portfolios of practical and value-creating partnerships.”
This step involves the following participants:
Activities:
Why is this important?
Build it into your practice:
|
Strategic alignment |
Follow-through |
Information sharing |
Shared risk & rewards |
Communication |
|---|---|---|---|---|
|
Work with vendors to create roadmaps and strategies to drive mutual success. |
Ensure demands are reasonable and consistently follow through on commitments. |
Proactively and freely share relevant information between parties. |
Equitably share responsibility for outcomes and benefits from success. |
Ensure clear, proactive, and frequent communication occurs between parties. |
Outcomes management focuses on results, not methods.
According to Jennifer Robinson, senior editor at Gallup, “This approach focuses people and teams on a concrete result, not the process required to achieve it. Leaders define outcomes and, along with managers, set parameters and guidelines. Employees, then, have a high degree of autonomy to use their own unique talents to reach goals their own way.” (Forbes, 2023)
In the context of exponential relationships, vendors can be given a high degree of autonomy provided they meet their objectives.
This step involves the following participants:
Activities:
Why is this important?
Build it into your practice:
|
Goal setting |
Negotiation |
Performance tracking |
Issue |
Scope management |
|---|---|---|---|---|
|
Set specific, measurable and actionable goals, and communicate them with stakeholders. |
Clearly articulate and agree upon measurable outcomes between all parties. |
Proactively track progress toward goals/outcomes and discuss results with vendors regularly. |
Openly discuss potential issues and challenges on a regular basis. Find collaborative solutions to problems. |
Proactively manage scope and discuss with vendors on a regular basis. |
Exponential IT means exponential risk – and exponential rewards.
One of the key differentiators between traditional vendor relationships and exponential relationships is the degree to which risk is shared between parties. This is not possible in all industries, which may limit companies’ ability to participate in this type of exponential relationship.
This step involves the following participants:
Activities:
Why is this important?
Build it into your practice:
Info-Tech Insight
Some highly regulated industries (such as finance) are prevented from transferring certain types of risk. In these industries, it may be much more difficult to form vendor relationships.
Customers care about ESG. You should too.
Protect yourself against third-party ESG risks by considering the environmental and social impacts of your vendors.
Third-party ESG risks can include the following:
Working with vendors that have a poor record of ESG carries a very real reputational risk for organizations who do not undertake appropriate due diligence.
Seventy-seven percent of customers believe companies have a responsibility to manufacture sustainably.
Sixty-eight percent of customers believe businesses should ensure their suppliers meet high social and environmental standards.
Fifty-five percent of customers consider the environmental impact of production in their purchasing decisions.
|
Third-party risk |
Value chain |
Data management |
Regulatory & compliance |
Monitoring & reporting |
|---|---|---|---|---|
|
Understand and assess third-party risk, including ESG risk, in potential relationships. |
Assess risk throughout the value chain for all parties and balance risk among parties. |
Proactively assess and manage potential data risks, including intellectual property and strategic data. |
Manage regulatory and compliance risks, including understanding risk transfer and ultimate risk holder. |
Proactive and open monitoring and reporting of risks, including regular communication among stakeholders. |
Contract management is a critical part of vendor management.
Well-managed contracts include clearly defined pricing, performance-based outcomes, clear roles and responsibilities, and appropriate remedies for failure to meet requirements. In outcome-based relationships, contracts are generally used as a secondary method of enforcing performance, with relationship management being the primary method of addressing challenges and ensuring performance.
This step involves the following participants:
Activities:
|
Pricing |
Performance outcomes |
Roles and responsibilities |
Remedies |
Payment |
|---|---|---|---|---|
|
Pricing is clearly defined in contracts so that the total cost is understood including all fees, optional pricing, and set caps on increases. |
Contracts are performance-based whenever possible, including deliverables, milestones, service levels, due dates, and outcomes. |
Each party's roles and responsibilities are clearly defined in the contract documents with adequate detail. |
Contracts contain appropriate remedies for a vendor's failure to meet SLAs, due dates, and other obligations. |
Payment is made after performance targets are met, approved, or accepted. |
1-3 hours
Download the Exponential Relationships Readiness Assessment tool.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
This step involves the following participants:
Activities:
Consider the following recommendations based on your readiness assessment scores:
1 hour
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Jump Start Your Vendor Management Initiative
Create and implement a vendor management framework to begin obtaining measurable results in 90 days.
Elevate Your Vendor Management Initiative
Transform your VMI from tactical to strategic to maximize its impact and value
Evaluate Your Vendor Account Team to Optimize Vendor Relations
Understand the value of knowing your account team’s influence in the organization, and your influence, to drive results.
Build an IT Risk Management Program
Mitigate the IT risks that could negatively impact your organization.
Build an IT Budget
Effective IT budgets are more than a spreadsheet. They tell a story.
Adopt an Exponential IT Mindset
Thrive through the next paradigm shift..
|
Kim Osborne Rodriguez |
|
Kim is a professional engineer and Registered Communications Distribution Designer (RCDD) with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach, with a track record of supporting successful projects. Kim holds a Bachelor’s degree in Honours Mechatronics Engineering and an option in Management Sciences from the University of Waterloo. |
|
Jack Hakimian Jack has more than 25 years of technology and management consulting experience. He has served multibillion-dollar organizations in multiple industries including financial services and telecommunications. Jack also served several large public sector institutions. He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master’s degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management. |
|
Michael Tweedie Mike Tweedie brings over 25 years as a technology executive. He’s led several large transformation projects across core infrastructure, application and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management. Mike holds a Bachelor’s degree in Architecture from Ryerson University. |
|
Scott Bickley Scott Bickley is a Practice Lead & Principal Research Director at Info-Tech Research Group, focused on Vendor Management and Contract Review. He also has experience in the areas of IT Asset Management (ITAM), Software Asset Management (SAM), and technology procurement along with a deep background in operations, engineering, and quality systems management. Scott holds a B.S. in Justice Studies from Frostburg State University. He also holds active IAITAM certification designations of CSAM and CMAM and is a Certified Scrum Master (SCM). |
|
Donna Bales Donna Bales is a Principal Research Director in the CIO Practice at Info-Tech Research Group, specializing in research and advisory services in IT risk, governance, and compliance. She brings over 25 years of experience in strategic consulting and product development and has a history of success in leading complex, multistakeholder industry initiatives. Donna has a bachelor’s degree in economics from the University of Western Ontario. |
|
Jennifer Perrier Jennifer has 25 years of experience in the information technology and human resources research space, joining Info-Tech in 1998 as the first research analyst with the company. Over the years, she has served as a research analyst and research manager, as well as in a range of roles leading the development and delivery of offerings across Info-Tech’s product and service portfolio, including workshops and the launch of industry roundtables and benchmarking. She was also Research Lead for McLean & Company, the HR advisory division of Info-Tech, during its start-up years. Jennifer’s research expertise spans the areas of IT strategic planning, governance, policy and process management, people management, leadership, organizational change management, performance benchmarking, and cross-industry IT comparative analysis. She has produced and overseen the development of hundreds of publications across the full breadth of both the IT and HR domains in multiple industries. In 2022, Jennifer joined Info-Tech’s IT Financial Management Practice with a focus on developing financial transparency to foster meaningful dialogue between IT and its stakeholders and drive better technology investment decisions. |
|
Phil Bode Phil has 30+ years of experience with IT procurement-related topics: contract drafting and review, negotiations, RFXs, procurement processes, and vendor management. Phil has been a frequent speaker at conferences, a contributor to magazine articles in CIO Magazine and ComputerWorld, and quoted in many other magazines. He is a co-author of the book The Art of Creating a Quality RFP. Phil has a Bachelor of Science in Business Administration with a double major of Finance and Entrepreneurship and a Bachelor of Science in Business Administration with a major of Accounting, both from the University of Arizona. |
|
Erin Morgan |
|
Renee Stanley |
Note: Additional contributors did not wish to be identified.
Andrea, Dave. “Plante Moran’s 2022 Working Relations Index® (WRI) Study shows supplier relations can improve amid industry crisis.” Plante Moran, 25 Aug 2022. Accessed 18 May 2023.
Andrea, Dave. “Trust between suppliers and OEMs can better prepare you for the next crisis.” Plante Moran, 9 Sept 2020. Accessed 17 May 2023.
Cleary, Shannon, and Carolan McLarney. “Organizational Benefits of an Effective Vendor Management Strategy.” IUP Journal of Supply Chain Management, Vol. 16, Issue 4, Dec 2019.
De Backer, Ruth, and Eileen Kelly Rinaudo. “Improving the management of complex business partnerships.” McKinsey, 21 March 2019. Accessed 9 May 2023 .
Dennean, Kevin et al. “Let's chat about ChatGPT.” UBS, 22 Feb 2023. Accessed 26 May 2023.
F&I Tools. “Nissan Worldwide Vehicle Sales Report.” Factory Warranty List, 2022. Accessed 18 May 2023.
Gomez, Robin. “Adopting ChatGPT and Generative AI in Retail Customer Service.” Radial, 235, April 2023. Accessed 10 May 2023.
Harms, Thomas and Kristina Rogers. “How collaboration can drive value for you, your partners and the planet.” EY, 26 Oct 2021. Accessed 10 May 2023.
Hedge & Co. “Toyota, Honda finish 1-2; General Motors finishes at 3rd in annual Supplier Working Relations Study.” PR Newswire, 23 May 2022. Accessed 17 May 2023.
Henke Jr, John W., and T. Thomas. "Lost supplier trust, lost profits." Supply Chain Management Review, May 2014. Accessed 17 May 2023.
Information Services Group, Inc. “Global Demand for IT and Business Services Continues Upward Surge in Q2, ISG Index™ Finds.” BusinessWire, 7 July 2021. Accessed 8 May 2023.
Kasanoff, Bruce. “New Study Reveals Costs Of Bad Supplier Relationships.” Forbes, 6 Aug 2014. Accessed 17 May 2023.
Macrotrends. “Nissan Motor Gross Profit 2010-2022.” Macrotrends. Accessed 18 May 2023.
Macrotrends. “Toyota Gross Profit 2010-2022.” Macrotrends. Accessed 18 May 2023.
McKinsey. “Mind the [skills] gap.” McKinsey, 27 Jan 2021. Accessed 18 May 2023.
Morgan, Blake. “7 Examples of How Digital Transformation Impacted Business Performance.” Forbes, 21 Jul 2019. Accessed 10 May 2023.
Nissan Motor Corporation. “Nissan reports strong financial results for fiscal year 2022.” Nissan Global Newsroom, 11 May 2023. Accessed 18 May 2023.
“OpenAI and Microsoft extend partnership.” Open AI, 23 Jan 2023. Accessed 26 May 2023.
Pearson, Bryan. “The Apple Of Its Aisles: How Best Buy Lured One Of The Biggest Brands.“ Forbes, 23 Apr 2015. Accessed 23 May 2023.
Perifanis, Nikolaos-Alexandros and Fotis Kitsios. “Investigating the Influence of Artificial Intelligence on Business Value in the Digital Era of Strategy: A Literature Review.” Information, 2 Feb 2023. Accessed 10 May 2023.
Scott, Tim and Nathan Spitse. “Third-party risk is becoming a first priority challenge.” Deloitte. Accessed 18 May 2023.
Stanley, Renee. Interview by Kim Osborne Rodriguez, 17 May 2023.
Statista. “Toyota's retail vehicle sales from 2017 to 2021.” Statista, 27 Jul 2022. Accessed 18 May 2023.
Tlili, Ahmed, et al. “What if the devil is my guardian angel: ChatGPT as a case study of using chatbots in education.” Smart Learning Environments, 22 Feb 2023. Accessed 9 May 2023.
Vitasek, Kate. “Outcome-Based Management: What It Is, Why It Matters And How To Make It Happen.” Forbes, 12 Jan 2023. Accessed 9 May 2023.
Under the best of circumstances, mainframe systems are complex, expensive, and difficult to scale. In today’s world, applications written for mainframe legacy systems also present significant operational challenges to customers compounded by the dwindling pool of engineers who specialize in these outdated technologies. Many organizations want to migrate their legacy applications to the cloud but to do so they need to go through a lengthy migration process that is made more challenging by the complexity of mainframe applications.
The most common tactic is for the organization to better realize their z/Series options and adopt a strategy built on complexity and workload understanding. To make the evident, obvious, the options here for the non-commodity are not as broad as with commodity server platforms and the mainframe is arguably the most widely used and complex non-commodity platform on the market.
This research will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint will help you assess the fit, purpose, and price; develop strategies for overcoming potential challenges; and determine the future of z/Series for your organization.
Use this tool to play with the pre-populated values or insert your own amounts to compare possible database decisions, and determine the TCO of each. Note that common assumptions can often be false; for example, open-source Cassandra running on many inexpensive commodity servers can actually have a higher TCO over six years than a Cassandra environment running on a larger single expensive piece of hardware. Therefore, calculating TCO is an essential part of the database decision process.
“A number of market conditions have coalesced in a way that is increasingly driving existing mainframe customers to consider running their application workloads on alternative platforms. In 2020, the World Economic Forum noted that 42% of core skills required to perform existing jobs are expected to change by 2022, and that more than 1 billion workers need to be reskilled by 2030.” – Dale Vecchio
Your Challenge |
It seems like anytime there’s a new CIO who is not from the mainframe world there is immediate pressure to get off this platform. However, just as there is a high financial commitment required to stay on System Z, moving off is risky and potentially more costly. You need to truly understand the scale and complexity ahead of the organization. |
|---|---|
Common Obstacles |
Under the best of circumstances, mainframe systems are complex, expensive, and difficult to scale. In today’s world, applications written for mainframe legacy systems also present significant operational challenges to customers compounded by the dwindling pool of engineers who specialize in these outdated technologies. Many organizations want to migrate their legacy applications to the cloud, but to do so they need to go through a lengthy migration process that is made more challenging by the complexity of mainframe applications. |
Info-Tech Approach |
The most common tactic is for the organization to better realize its z/Series options and adopt a strategy built on complexity and workload understanding. To make the evident, obvious: the options here for the non-commodity are not as broad as with commodity server platforms and the mainframe is arguably the most widely used and complex non-commodity platform on the market. |
Problem statement: The z/Series remains a vital platform for many businesses and continues to deliver exceptional reliability and performance and play a key role in the enterprise. With the limited and aging resources at hand, CIOs and the like must continually review and understand their migration path with the same regard as any other distributed system roadmap. |
This research is designed for: IT strategic direction decision makers. IT managers responsible for an existing z/Series platform. Organizations evaluating platforms for mission critical applications. |
This research will help you:
|
Good Luck.
![]() |
Modernize the mainframe … here we go again. Prior to 2020, most organizations were muddling around in “year eleven of the four-year plan” to exit the mainframe platform where a medium-term commitment to the platform existed. Since 2020, it appears the appetite for the mainframe platform changed. Again. Discussions mostly seem to be about what the options are beyond hardware outsourcing or re-platforming to “cloud” migration of workloads – mostly planning and strategy topics. A word of caution: it would appear unwise to stand in front of the exit door for fear of being trampled. Hardware expirations between now and 2025 are motivating hosting deployments. Others are in migration activities, and some have already decommissioned and migrated but now are trying to rehab the operations team now lacking direction and/or structure. |
Darin Stahl |
Thinking of modernizing your mainframe can cause you angst so grab a fidget spinner and relax because we have you covered!
External Business Pressures:
Internal Considerations:
With multiple control points to be addressed, care must be taken to simplify your options while addressing all concerns to ease operational load.
Dating back to 2011, Darin Stahl has been the primary z/Series subject matter expert within the Infrastructure & Operations Research team. Below represents the percentage of calls, per industry, where z/Series advisory has been provided by Darin*: 37% - State Government 19% - Insurance 11% - Municipality 8% - Federal Government 8% - Financial Services 5% - Higher Education 3% - Retail 3% - Hospitality/Resort 3% - Logistics and Transportation 3% - Utility Based on the Info-Tech call history, there is a consistent cross section of industry members who not only rely upon the mainframe but are also considering migration options. |
Note:Of course, this only represents industries who are Info-Tech members and who called for advisory services about the mainframe. There may well be more Info-Tech members with mainframes who have no topic to discuss with us about the mainframe specifically. Why do we mention this? We caution against suggesting things like, ”somewhat less than 50% of mainframes live in state data centers” or any other extrapolated inference from this data. Our viewpoint and discussion is based on the cases and the calls that we have taken over the years. *37+ enterprise calls were reviewed and sampled. |
For most workloads “scale out" (e.g. virtualized cloud or IaaS ) is going to provide obvious and quantifiable benefits. However, with some workloads (extremely large analytics or batch processing ) a "scale up" approach is more optimal. But the scale up is really limited to very specific workloads. Despite some assumptions, the gains made when moving from scale up to scale out are not linear. Obviously, when you scale out from a performance perspective you experience a drop in what a single unit of compute can do. Additionally, there will be latency introduced in the form of network overhead, transactions, and replication into operations that were previously done just bypassing object references within a single frame. Some applications or use cases will have to be architected or written differently (thinking about the high-demand analytic workloads at large scale). Remember the “grid computing” craze that hit us during the early part of this century? It was advantageous for many to distribute work across a grid of computing devices for applications but the advantage gained was contingent on the workload able to be parsed out as work units and then pulled back together through the application. There can be some interesting and negative consequences for analytics or batch operations in a large scale as mentioned above. Bottom line, as experienced previously with Microfocus mainframe ports to x86, the batch operations simply take much longer to complete. |
Big Data Considerations*:
|
Below is a summary of concerns regarding core mainframe skills:
|
The Challenge An aging workforce, specialized skills, and high salary expectations
The In-House Solution: Build your mentorship program to create a viable succession plan
|
Migrate to another platform |
Use a hosting provider |
Outsource |
Re-platform (cloud/vendors) |
Reinvest |
|---|---|---|---|---|
There are several challenges to overcome in a migration project, from finding an appropriate alternative platform to rewriting legacy code. Many organizations have incurred huge costs in the attempt, only to be unsuccessful in the end, so make this decision carefully. |
Organizations often have highly sensitive data on their mainframes (e.g. financial data), so many of these organizations are reluctant to have this data live outside of their four walls. However, the convenience of using a hosting provider makes this an attractive option to consider. |
The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house. |
A customer can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings |
If you’re staying with the mainframe and keeping it in-house, it’s important to continue to invest in this platform, keep it current, and look for opportunities to optimize its value. |
If this sounds like your organization, it’s time to do the analysis so you can decide and get clarity on the future of the mainframe in your organization.
|
*3 of the top 4 challenges related to shortfalls of alternative platforms
|
*Source: Maximize the Value of IBM Mainframes in My Business |
Potential for reduced costs
Reliable infrastructure and experienced staff
So, what are the risks?
The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house. The options here for the non-commodity (z/Series, IBM Power platforms, for example) are not as broad as with commodity server platforms. More confusingly, the term “outsourcing” for these can include: |
Traditional/Colocation – A customer transitions their hardware environment to a provider’s data center. The provider can then manage the hardware and “system.” Onsite Outsourcing – Here a provider will support the hardware/system environment at the client’s site. The provider may acquire the customer’s hardware and provide software licenses. This could also include hiring or “rebadging” staff supporting the platform. This type of arrangement is typically part of a larger services or application transformation. While low risk, it is not as cost-effective as other deployment models. Managed Hosting – A customer transitions their legacy application environment to an off-prem hosted multi-tenanted environment. It will provide the most cost savings following the transition, stabilization, and disposal of existing environment. Some providers will provide software licensing, and some will also support “Bring Your Own,” as permitted by IBM terms for example. |
Info-Tech Insight Technical debt for non-commodity platforms isn’t only hardware based. Moving an application written for the mainframe onto a “cheaper” hardware platform (or outsourced deployment) leaves the more critical problems and frequently introduces a raft of new ones. |
While the majority of the coded functionality (JCLs, programs, etc.) migrate easily, there will be a need to re-code or re-write objects – especially if any object, code, or location references are not exactly the same in the new environment. Micro Focus has solid experience in this but if consider it within the context of an 80/20 rule (the actual metrics might be much better than that), meaning that some level of rework would have to be accomplished as an overhead to the exercise. Build that thought into your thinking and business case. |
AWS Cloud
Azure Cloud
Micro Focus COBOL (Visual COBOL)
|
Yeah, a complication for this situation is the legacy code. While re-platforming/re-hosting non-COBOL code is not new, we have not had many member observations compared to the re-platforming/re-hosting of COBOL functionality initiatives. That being said, there are a couple of interesting opportunities to explore. |
NTT Data Services (GLOBAL)
ModernSystems (or ModSys) has relevant experience.
ATOS, as a hosting vendor mostly referenced by customers with global locations in a short-term transition posture, could be an option. Lastly, the other Managed Services vendors with NATURAL and Adabas capabilities: |
*92% of organizations that added capacity said TCO is lower than for commodity servers (compared to 50% of those who did not add capacity) |
*63% of organizations that added capacity said finding resources is not very difficult (compared to 42% of those who did not add capacity) |
![]() |
![]() |
| Temporary workaround. This would align with a technical solution allowing the VASM files to be accessed using platforms other than on mainframe hardware (Micro Focus or other file store trickery). This can be accomplished relatively quickly but does run the risk of technology obsolesce for the workaround at some point in the future. Bulk conversion. This method would involve the extract/transform/load of the historical records into the new application platform. Often the order of the conversion is completed on work newest to oldest (the idea is that the newest historical records would have the highest likelihood of an access need), but all files would be converted to the new application and the old data store destroyed. Forward convert, which would have files undergo the extract/transform/load conversion into the new application as they are accessed or reopened. This method would keep historical records indefinitely or until they are converted – or the legal retention schedule allows for their destruction (hopefully no file must be kept forever). This could be a cost-efficient approach since the historical files remaining on the VSAM platform would be shrunk over time based on demand from the district attorney process. The conversion process could be automated and scripted, with a QR step allowing for the records to be deleted from the old platform. |
Info-Tech Insight It is not usual for organizations to leverage options #2 and #3 above to move the functionality forward while containing the scope creep and costs for the data conversions. |
Note: Enterprise job scheduling is a topic with low member interest or demand. Since our published research is driven by members’ interest and needs, the lack of activity or member demand would obviously be a significant influence into our ability to aggregate shared member insight, trends, or best practices in our published agenda.
|
|
✓ Advanced Systems Concepts ✓ BMC ✓ Broadcom ✓ HCL ✓ Fortra |
✓ Redwood ✓ SMA Technologies ✓ StoneBranch ✓ Tidal Software ✓ Vinzant Software |
Creating vendor profiles will help quickly filter the solution providers that directly meet your z/Series needs.
ActiveBatch
| Workload Management: | ||
Summary Founded in 1981, ASCs ActiveBatch “provides a central automation hub for scheduling and monitoring so that business-critical systems, like CRM, ERP, Big Data, BI, ETL tools, work order management, project management, and consulting systems, work together seamlessly with minimal human intervention.”* URL Coverage: Global |
Amazon EC2 Hadoop Ecosystem IBM Cognos DataStage IBM PureData (Netezza) Informatica Cloud Microsoft Azure Microsoft Dynamics AX Microsoft SharePoint Microsoft Team Foundation Server |
Oracle EBS Oracle PeopleSoft SAP BusinessObjects ServiceNow Teradata VMware Windows Linux Unix IBM i |
*Advanced Systems Concepts, Inc.
Control-M
Workload Management: | ||
Summary Founded in 1980, BMCs Control-M product “simplifies application and data workflow orchestration on premises or as a service. It makes it easy to build, define, schedule, manage, and monitor production workflows, ensuring visibility, reliability, and improving SLAs.”* URL bmc.com/it-solutions/control-m.html Coverage: Global | AWS Azure Google Cloud Platform Cognos IBM InfoSphere DataStage SAP HANA Oracle EBS Oracle PeopleSoft BusinessObjects | ServiceNow Teradata VMware Windows Linux Unix IBM i IBM z/OS zLinux |
*BMC
Atomic Automation
Autosys Workload Automation
Workload Management: | ||
Summary Broadcom offers Atomic Automation and Autosys Workload Automation which ”gives you the agility, speed and reliability required for effective digital business automation. From a single unified platform, Atomic centrally provides the orchestration and automation capabilities needed accelerate your digital transformation and support the growth of your company.”* URL broadcom.com/products/software/automation/automic-automation broadcom.com/products/software/automation/autosys Coverage: Global
| Windows MacOS Linux UNIX AWS Azure Google Cloud Platform VMware z/OS zLinux System i OpenVMS Banner Ecometry | Hadoop Oracle EBS Oracle PeopleSoft SAP BusinessObjects ServiceNow Teradata VMware Windows Linux Unix IBM i |
Workload Automation
Workload Management: | |||
Summary “HCL Workload Automation streamlined modelling, advanced AI and open integration for observability. Accelerate the digital transformation of modern enterprises, ensuring business agility and resilience with our latest version of one stop automation platform. Orchestrate unattended and event-driven tasks for IT and business processes from legacy to cloud and kubernetes systems.”* URL hcltechsw.com/workload-automation Coverage: Global
| Windows MacOS Linux UNIX AWS Azure Google Cloud Platform VMware z/OS zLinux System i OpenVMS IBM SoftLayer IBM BigInsights | IBM Cognos Hadoop Microsoft Dynamics 365 Microsoft Dynamics AX Microsoft SQL Server Oracle E-Business Suite PeopleSoft SAP ServiceNow Apache Oozie Informatica PowerCenter IBM InfoSphere DataStage Salesforce BusinessObjects BI | IBM Sterling Connect:Direct IBM WebSphere MQ IBM Cloudant Apache Spark |
JAMS Scheduler
Workload Management: | ||
Summary Fortra’s “JAMS is a centralized workload automation and job scheduling solution that runs, monitors, and manages jobs and workflows that support critical business processes. JAMS reliably orchestrates the critical IT processes that run your business. Our comprehensive workload automation and job scheduling solution provides a single pane of glass to manage, execute, and monitor jobs—regardless of platforms or applications.”* URL Coverage: Global
| OpenVMS OS/400 Unix Windows z/OS SAP Oracle Microsoft Infor Workday AWS Azure Google Cloud Compute ServiceNow Salesforce | Micro Focus Microsoft Dynamics 365 Microsoft Dynamics AX Microsoft SQL Server MySQL NeoBatch Netezza Oracle PL/SQL Oracle E-Business Suite PeopleSoft SAP SAS Symitar |
*JAMS
Redwood SaaS
Workload Management: | ||
Summary Founded in 1993 and delivered as a SaaS solution, ”Redwood lets you orchestrate securely and reliably across any application, service or server, in the cloud or on-premises, all inside a single platform. Automation solutions are at the core of critical business operations such as forecasting, replenishment, reconciliation, financial close, order to cash, billing, reporting, and more. Enterprises in every industry — from manufacturing, utility, retail, and biotech to healthcare, banking, and aerospace.”* URL Coverage: Global
| OpenVMS OS/400 Unix Windows z/OS SAP Oracle Microsoft Infor Workday AWS Azure Google Cloud Compute ServiceNow Salesforce | Github Office 365 Slack Dropbox Tableau Informatica SAP BusinessObjects Cognos Microsoft Power BI Amazon QuickSight VMware Xen Kubernetes |
Robot Scheduler
Workload Management: | |
Summary “Robot Schedule’s workload automation capabilities allow users to automate everything from simple jobs to complex, event-driven processes on multiple platforms and centralize management from your most reliable system: IBM i. Just create a calendar of when and how jobs should run, and the software will do the rest.”* URL fortra.com/products/job-scheduling-software-ibm-i Coverage: Global
| IBM i (System i, iSeries, AS/400) AIX/UNIX Linux Windows SQL/Server Domino JD Edwards EnterpriseOne SAP Automate Schedule (formerly Skybot Scheduler) |
OpCon
Workload Management: | |||
Summary Founded in1980, SMA offers to “save time, reduce error, and free your IT staff to work on more strategic contributions with OpCon from SMA Technologies. OpCon offers powerful, easy-to-use workload automation and orchestration to eliminate manual tasks and manage workloads across business-critical operations. It's the perfect fit for financial institutions, insurance companies, and other transactional businesses.”* URL Coverage: Global | Windows Linux Unix z/Series IBM i Unisys Oracle SAP Microsoft Dynamics AX Infor M3 Sage Cegid Temenos | FICS Microsoft Azure Data Management Microsoft Azure VM Amazon EC2/AWS Web Services RESTful Docker Google Cloud VMware ServiceNow Commvault Microsoft WSUS Microsoft Orchestrator | Java JBoss Asysco AMT Tuxedo ART Nutanix Corelation Symitar Fiserv DNA Fiserv XP2 |
Universal Automation Center (UAC)
Workload Management: | |||
Summary Founded in 1999, ”the Stonebranch Universal Automation Center (UAC) is an enterprise-grade business automation solution that goes beyond traditional job scheduling. UAC's event-based workload automation solution is designed to automate and orchestrate system jobs and tasks across all mainframe, on-prem, and hybrid IT environments. IT operations teams gain complete visibility and advanced control with a single web-based controller, while removing the need to run individual job schedulers across platforms.”* URL stonebranch.com/it-automation-solutions/enterprise-job-scheduling Coverage: Global | Windows Linux Unix z/Series Apache Kafka AWS Databricks Docker GitHub Google Cloud Informatica | Jenkins Jscape Kubernetes Microsoft Azure Microsoft SQL Microsoft Teams PagerDuty PeopleSoft Petnaho RedHat Ansible Salesforce | SAP ServiceNow Slack SMTP and IMAP Snowflake Tableau VMware |
Workload Automation
Workload Management: | |||
Summary Founded in 1979, Tidal’s Workload Automation will “simplify management and execution of end-to-end business processes with our unified automation platform. Orchestrate workflows whether they're running on-prem, in the cloud or hybrid environments.”* URL Coverage: Global | CentOS Linux Microsoft Windows Server Open VMS Oracle Cloud Oracle Enterprise Linux Red Hat Enterprise Server Suse Enterprise Tandem NSK Ubuntu UNIX HPUX (PA-RISC, Itanium) Solaris (Sparc, X86) | AIX, iSeries z/Linux z/OS Amazon AWS Microsoft Azure Oracle OCI Google Cloud ServiceNow Kubernetes VMware Cisco UCS SAP R/3 & SAP S/4HANA Oracle E-Business | Oracle ERP Cloud PeopleSoft JD Edwards Hadoop Oracle DB Microsoft SQL SAP BusinessObjects IBM Cognos FTP/FTPS/SFTP Informatica |
Global ECS
Workload Management: | |
Summary Founded in 1987, Global ECS can “simplify operations in all areas of production with the GECS automation framework. Use a single solution to schedule, coordinate and monitor file transfers, database operations, scripts, web services, executables and SAP jobs. Maximize efficiency for all operations across multiple business units intelligently and automatically.”* URL Coverage: Global | Windows Linux Unix iSeries SAP R/3 & SAP S/4HANA Oracle, SQL/Server |
Activities:
This activity involves the following participants:
IT strategic direction decision makers
IT managers responsible for an existing z/Series platform
Organizations evaluating platforms for mission critical applications
Outcomes of this step:
This checkpoint process creates transparency around agreement costs with the business and gives the business an opportunity to re-evaluate its requirements for a potentially leaner agreement.
The Scale Up vs. Scale Out TCO Tool provides organizations with a framework for estimating the costs associated with purchasing and licensing for a scale-up and scale-out environment over a multi-year period. Use this tool to:
| ![]() |
Info-Tech InsightWatch out for inaccurate financial information. Ensure that the financials for cost match your maintenance and contract terms. | Use the Scale Up vs. Scale Out TCO Tool to determine your TCO options. |
Effectively Acquire Infrastructure Services
Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.
Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
There are very few IT infrastructure components you should be housing internally – outsource everything else.
Build Your Infrastructure Roadmap
Move beyond alignment: Put yourself in the driver’s seat for true business value.
Make the most of cloud for your organization.
Drive consensus by outlining how your organization will use the cloud.
Build a Strategy for Big Data Platforms
Know where to start and where to focus attention in the implementation of a big data strategy.
Improve your RFPs to gain leverage and get better results.
![]() |
Darin Stahl, Principal Research Advisor, Info-Tech Research Group Darin is a Principal Research Advisor within the Infrastructure Practice, and leveraging 38+ years of experience, his areas of focus include: IT Operations Management, Service Desk, Infrastructure Outsourcing, Managed Services, Cloud Infrastructure, DRP/BCP, Printer Management, Managed Print Services, Application Performance Monitoring/ APM, Managed FTP, non-commodity servers (z/Series, mainframe, IBM i, AIX, Power PC). |
![]() |
Troy Cheeseman, Practice Lead, Info-Tech Research Group Troy has over 25 years of IT management experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT Operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) start-ups. |
“AWS Announces AWS Mainframe Modernization.” Business Wire, 30 Nov. 2021.
de Valence, Phil. “Migrating a Mainframe to AWS in 5 Steps with Astadia?” AWS, 23 Mar. 2018.
Graham, Nyela. “New study shows mainframes still popular despite the rise of cloud—though times are changing…fast?” WatersTechnology, 12 Sept. 2022.
“Legacy applications can be revitalized with API.” MuleSoft, 2022.
Vecchio, Dale. “The Benefits of Running Mainframe Applications on LzLabs Software Defined Mainframe® & Microsoft Azure.” LzLabs Sites, Mar. 2021.
In early April, I already wrote about exit plans and how they are the latest burning platform.
As of the end of May 2025, we have both Microsoft and Google reassuring European clients about their sovereign cloud solutions. There are even air-gapped options for military applications. These messages come as a result of the trade war between the US and the rest of the world.
There is also the other, more mundane example of over-reliance on a single vendor: the Bloomberg-terminal outage of May 21st, 2025. That global outage severely disrupted financial markets. It caused traders to lose access to real-time data, analytics, and pricing information for approximately 90 minutes. This widespread system failure delayed critical government bond auctions in the UK, Portugal, Sweden, and the EU.
It serves as a reminder of the heavy reliance on the Bloomberg Terminal, which is considered an industry standard despite its high annual cost. While some Bloomberg services like instant messaging remained functional, allowing limited communication among traders, the core disruption led to significant frustration and slowed down trading activities.
You want to think about this for a moment. Bloomberg is, just like Google and Microsoft are, cornerstones in their respective industries. MS, Google, and Amazon even in many more industries.
So the issue goes beyond the “panic of the day.” Every day, there will be some announcement that sends markets reeling and companies fearing. Granted, the period we go through today can have grave consequences, but at the same time, it may be over in the coming months or years.
Let's take a step back and see if we can locate the larger issue at stake. I dare to say that the underlying issue is trust. We are losing trust in one another at a fast pace. Not between business partners, meaning companies who are, in a transaction or relationship, are more or less equal. Regardless of their geolocation, people are keen to do business together in a predictable, mutually beneficial way. And as long as that situation is stable, there is little need, beyond compliance and normal sound practices, to start to distrust each other.
Trouble brews when other factors come into play. I want to focus on two of them in this article.
The past few years have seen a large increase in power of the cloud computing platforms. The pandemic of 2019 through to 2023 changed our way of working and gave a big boost to these platforms. Of course, they were already establishing their dominance in the early 2010s.
Amazon launched SQS in 2004 with S3 (storage) and EC2 (compute) in 2006. Azure launched in 2008 as a PaaS platform for .NET developers, and became really available in 2010. Since then, it grew into the IaaS (infrastructure as a service) platform we know today. Google's Cloud Platform (GCP) launched in 2008 and added components such as BigQuery, Compute Engine and Storage in the 2010s.
Since the pandemic, we've seen another boost to their popularity. These platforms solidified their lead through several vectors:
Companies made decisions on these premises. A prime example is the use of native cloud functions. These make life easier for developers. Native functions allow for serverless functionality to be made available to clients, and to do so in a non-infra-based way. It gives the impression of less complexity to the management. They are also easily scalable.
This comes at a cost, however. The cost is vendor lock-in. And with vendor lock-in, comes increased pricing power for the vendor.
For a long time, it seems EU companies' attitude was: “It won't be such an issue, after all, there are multiple cloud vendors and if all else fails, we just go back.” The reality is much starker, I suspect that cloud providers with this level of market power will increase their pricing significantly.
in come two elements:
The latest push to their market power came as an unintended consequence of EU Law: DORA. That EU law requires companies to have testable exit plans in place. But it goes well beyond this. The EU has increased the regulatory burden on companies significantly. BusinessEurope, a supranational organization, estimates that in the past five years, the Eu managed to release over 13,000 legislative acts. This is compared to 3,500 in the US.
Coming back to DORA, this law requires EU companies to actually test their exit plans and show proof of it to the EU ESAs (European Supervisory Agency). The reaction I have seen in industry representative organizations is complacency.
The cost of compliance is significant; hence, companies try to limit their exposure to the law as much as possible. They typically do this by limiting the applicability scope of the law to their business, based on the wording of the law. And herein lies the trap. This is not lost on the IT providers. They see that companies do the heavy lifting for them. What do I mean by that? Several large providers are looked at by the EU as systemic providers. They fall under direct supervision by the ESAs.
For local EU providers, it is what it is, but for non-EU providers, they get to show their goodwill, using sovereign IT services. I will come back to this in the next point, US unpredictability and laws. But the main point is: we are giving them more market power, and we have less contractual power. Why? Because we are showing them that we will go to great lengths to keep using their services.
US companies must comply with US law. So far, so good. Current US legislation also already requires US companies to share data on non-US citizens.
This last one is of particular concern. Not so much because of its contents, but because it is an Executive Order.
We know that the current (May 2025) US government mostly works through executive orders. Let's not forget that executive orders are a legitimate way to implement policy, This means that the US government could use access to cloud services as a lever to obtain more favorable trade rules.
The EU responds to this (the laws and executive order) by implementing several sovereignty countermeasures like GDPR, DORA, Digital markets Act (DMA), Data Governance Act (DGA), Cybersecurity Act and the upcoming European Health Data Act (EHDS). This is called the “Brussels Effect.”
Europe is also investing in several strategic initiatives such as
This points to a new dynamic between the EU and the US, EU-based companies simply cannot trust their US counterparts anymore to the degree they could before. The sad thing is, that there is no difference on the interpersonal level. It is just that companies must comply with their respective laws.
Hence, Microsoft, Google, and AWS and any other US provider cannot legally provide sovereign cloud services. In a strict legal sense, Microsoft and Google cannot absolutely guarantee that they can completely insulate EU companies and citizens from all US law enforcement requests for data, despite their robust efforts and sovereign cloud offerings. This is because they are US companies, subject to US law and US jurisdiction. The CLOUD act and FISA section 702 compel US companies to comply.
Moreover, there is the nature of sovereign cloud offerings:
And lastly, there are the legal challenges to the EU data privacy Framework (DPF)
This all means that while the cloud providers are doing everything they can, and I'm assuming they are acting in good faith. The fact that they are US entities means however that they are subject to all US legislation and executive orders. And we cannot trust this last part. Again, this is why the EU is pursuing its digital sovereignty initiatives and why some highly sensitive EU public sector entities are gravitating towards truly EU-owned and operated cloud solutions.
If your provider goes bankrupt, you do not have a leg to stand on. Most jurisdictions, including the EU and US, have the following elements regarding bankruptcy:
Automatic Stay: Upon a bankruptcy filing (in most jurisdictions, including the US and EU), an “automatic stay” is immediately imposed. This is a court order that stops most collection activities against the debtor. For you as a customer, this can mean you might be prevented from:
Debtor's Estate and Creditor Priority
So, while I understand the wait and see stance in regard to exit plans, given where we are, it is in my opinion the wrong thing to do. Companies must make actionable exit plans and prepare beforehand for the exit. That means that you have to:
If you want more detailed steps on how to get there, feel free to contact me.
Passwordless is the right direction even if it’s not your final destination.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Back in 2004 we were promised "the end of passwords" – why, then, are we still struggling with them today?
Users have been burdened with unrealistic expectations when it comes to their part in maintaining enterprise security. Given the massive rise in the threat landscape, it is time for Infrastructure to adopt a user-experience-based approach if we want to move the needle on improving security posture.
"If you buy the premise…you buy the bit."
Johnny Carson
Build the case, both to business stakeholders and end users, that "password" is not a synonym for "security."
Be ready for some objection handling!
"There is no doubt that over time, people are going to rely less and less on passwords. People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure."
Bill Gates
A massive worm attack against ARPANET prompted the initial research into password strength
Password strength can be expressed as a function of randomness or entropy. The greater the entropy the harder for an attacker to guess the password.

Table: Modern password security for users
Ian Maddox and Kyle Moschetto, Google Cloud Solutions Architects
From this research, increasing password complexity (length, special characters, etc.) became the "best practice" to secure critical systems.

Image courtesy of Randall Munroe XKCD Comics (CC BY-NC 2.5)
It turns out that humans however are really bad at remembering complex passwords.
An Intel study (2016) suggested that the average enterprise employee needed to remember 27 passwords. A more recent study from LastPass puts that number closer to 191.
Over the course of a single year, researchers at the University of California, Berkeley identified and tracked nearly 2 billion compromised credentials.
3.8 million were obtained via social engineering, another 788K from keyloggers. That's approx. 250,000 clear text credentials harvested every week!
The entirety of the password ecosystem has significant vulnerabilities in multiple areas:
Even the 36M encrypted credentials compromised every week are just going to be stored and cracked later.
Source: Google, University of California, Berkeley, International Computer Science Institute
Image courtesy of NVIDIA, NVIDIA Grace |
|
Image: IBM Quantum System One (CES 2020) by IBM Research is licensed under CC BY-ND 2.0 |
|
"Give me a place to stand, and a lever long enough, and I will move the world."
Archimedes
Chances are you are already paying for one or more of these technologies from a current vendor:
Global Market of $12.8B
~16.7% CAGR
Source: Report Linker, 2022.
Passwordless technologies focus on alternate authentication factors to supplement or replace shared secrets.
![]() |
Something you knowShared secrets have well-known significant modern-day problems, but only when used in isolation. For end users, consider time-limited single use options, password managers, rate-limited login attempts, and reset rather than retrieval requests. On the system side, never forget strong cryptographic hashing along with a side of salt and pepper when storing passwords. Something you haveA token (now known as a cryptographic identification device) such as a pass card, fob, smartphone, or USB key that is expected to be physically under the control of the user and is uniquely identifiable by the system. Easily decoupled in the event the token is lost, but potentially expensive and time-consuming to reprovision. Something you are or doCommonly referred to as biometrics, there are two primary classes. The first is measurable physical characteristics of the user such as a fingerprint, facial image, or retinal scan. The second class is a series of behavioral traits such as expected location, time of day, or device. These traits can be linked together in a conditional access policy. Unlike other authentication factors, biometrics DO NOT provide for exact matches and instead rely on a confidence interval. A balance must be struck against the user experience of false negatives and the security risk of a false positive. |
Does the solution support the full variety of end-user devices you have in use?
Can the solution be configured with your existing single sign-on or central identity broker?
Users already want a better experience than passwords.
What new behavior are you expecting (compelling) from the user?
How often and under what conditions will that behavior occur?
Where are the points of failure in the solution?
Consider technical elements like session thresholds for reauthorization, but also elements like automation and self-service.
Understand the exact responsibilities Infra&Ops have in the event of a system or user failure.
As many solutions are based in the public cloud, manage stakeholder expectations accordingly.
"Move the goalposts…and declare victory."
Informal Fallacy (yet very effective…)
Get the easy wins in the bank and then lay the groundwork for the long campaign ahead.
You're not going to get to a passwordless world overnight. You might not even get there for many years. But an agile approach to the journey ensures you will realize value every step of the way:
"Backup Vs. Archiving: Know the Difference." Open-E. Accessed 05 Mar 2022.Web.
G, Denis. "How to Build Retention Policy." MSP360, Jan 3, 2020. Accessed 10 Mar 2022.
Ipsen, Adam. "Archive Vs. Backup: What's the Difference? A Definition Guide." BackupAssist, 28 Mar 2017. Accessed 04 Mar 2022.
Kang, Soo. "Mitigating the Expense of E-Discovery; Recognizing the Difference Between Back-Ups and Archived Data." Zasio Enterprises, 08 Oct 2015. Accessed 3 Mar 2022.
Mayer, Alex. "The 3-2-1 Backup Rule – An Efficient Data Protection Strategy." Naviko. Accessed 12 Mar 2022.
Steel, Amber. "LastPass Reveals 8 Truths about Passwords in the New Password Exposé." LastPass Blog, 1 Nov. 2017. Web.
"The Global Passwordless Authentication Market Size Is Estimated to Be USD 12.79 Billion in 2021 and Is Predicted to Reach USD 53.64 Billion by 2030 With a CAGR of 16.7% From 2022-2030." Report Linker, 9 June 2022. Web.
"What Is Data-Archiving?" Proofpoint. Accessed 07 Mar 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a clear project vision that outlines the goals and objectives for the HRIS strategy. Subsequently, construct an HRIS business model that is informed by enablers, barriers, and the organizational, IT, and HR needs.
Gather high-level requirements to determine the ideal future state. Explore solution alternatives and choose the path that is best aligned with the organization's needs.
Identify roadmap initiatives. Prioritize initiatives based on importance and effort.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the importance of creating an HRIS strategy before proceeding with software selection and implementation.
Learn why a large percentage of HRIS projects fail and how to avoid common mistakes.
Set expectations for the HRIS strategy and understand Info-Tech’s HRIS methodology.
Complete a project charter to gain buy-in, build a project team, and track project success.
A go/no-go decision on the project appropriateness.
Project stakeholders identified.
Project team created with defined roles and responsibilities.
Finalized project charter to gain buy-in.
1.1 Set a direction for the project by clarifying the focus.
1.2 Identify the right stakeholders for your project team.
1.3 Identify HRIS needs, barriers, and enablers.
1.4 Map the current state of your HRIS.
1.5 Align your business goals with your HR goals and objectives.
Project vision
Defined project roles and responsibilities
Completed HRIS business model
Completed current state map and thorough understanding of the HR technology landscape
Strategy alignment between HR and the business
Gain a thorough understanding of the HRIS-related pains felt throughout the organization.
Use stakeholder-identified pains to directly inform the HRIS strategy and long-term solution.
Visualize your ideal processes and realize the art of the possible.
Requirements to strengthen the business case and inform the strategy.
The art of the possible.
2.1 Requirements gathering.
2.2 Sketch ideal future state processes.
2.3 Establish process owners.
2.4 Determine guiding principles.
2.5 Identify metrics.
Pain points classified by data, people, process, and technology
Ideal future process vision
Assigned process owners, guiding principles, and metrics for each HR process in scope
Brainstorm and prioritize short- and long-term HRIS tasks.
Understand next steps for the HRIS project.
3.1 Create a high-level implementation plan that shows dependencies.
3.2 Identify risks and mitigation efforts.
3.3 Finalize stakeholder presentation.
Completed implementation plan
Completed risk management plan
HRIS stakeholder presentation
Organizations that take data seriously should:
Analytics is a journey, not a destination. This journey can eventually result in some level of sophisticated AI/machine learning in your organization. Every organization needs to mobilize its resources and enhance its analytics capabilities to quickly and incrementally add value to data products and services. However, most organizations fail to mobilize their resources in this way.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This phase helps you understand your organization's data landscape and current analytics environment so you gain a deeper understanding of your future analytics needs.
This phase introduces you to data operating model frameworks and provides a step-by-step guide on how to capture the right analytics operating model for your organization.
This phase helps you implement your chosen analytics operating model, as well as establish an engagement model and communications plan.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Achieve a clear understanding and case for data analytics.
A successful analytics operating model starts with a good understanding of your analytical needs.
1.1 Review the business context.
1.2 Understand your analytics needs.
1.3 Draft analytics ideas and use cases.
1.4 Capture minimum viable analytics.
Documentation of analytics products and services
Achieve a clear understanding of your organization's analytics capability and mapping across organizational functions.
Understand your organization's data landscape and current analytics environment to gain a deeper understanding of your future analytics needs.
2.1 Capture your analytics capabilities.
2.2 Map capabilities to a hub-and-spoke model.
2.3 Document operating model results.
Capability assessment results
Capture the right analytics operating model for your organization.
Explore data operating model frameworks.
Capture the right analytics operating model for your organization using a step-by-step guide.
3.1 Discuss your operating model results.
3.2 Review your organizational structure’s pros and cons.
3.3 Map resources to target structure.
3.4 Brainstorm initiatives to develop your analytics capabilities.
Target operating model
Formalize your analytics organizational structure and prepare to implement your chosen analytics operating model.
Implement your chosen analytics operating model.
Establish an engagement model and communications plan.
4.1 Document your target organizational structure and RACI.
4.2 Establish an analytics engagement model.
4.3 Develop an analytics communications plan.
Reporting and analytics responsibility matrix (RACI)
Analytics engagement model
Analytics communications plan
Analytics organizational chart
There are four key scenarios or entry points for IT as the acquiring organization in M&As:
Consider the ideal scenario for your IT organization.
Acquisitions are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:
Prepare for a growth/integration transaction by:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.
Create a standardized approach for how your IT organization should address acquisitions.
Evaluate the target organizations to minimize risk and have an established integration project plan.
Deliver on the integration project plan successfully and communicate IT’s transaction value to the business.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish the transaction foundation.
Discover the motivation for acquiring.
Formalize the program plan.
Create the valuation framework.
Strategize the transaction and finalize the M&A strategy and approach.
All major stakeholders are on the same page.
Set up crucial elements to facilitate the success of the transaction.
Have a repeatable transaction strategy that can be reused for multiple organizations.
1.1 Conduct the CIO Business Vision and CEO-CIO Alignment Diagnostics.
1.2 Identify key stakeholders and outline their relationship to the M&A process.
1.3 Identify the rationale for the company's decision to pursue an acquisition.
1.4 Assess the IT/digital strategy.
1.5 Identify pain points and opportunities tied to the acquisition.
1.6 Create the IT vision and mission statements and identify IT guiding principles and the transition team.
1.7 Document the M&A governance.
1.8 Establish program metrics.
1.9 Create the valuation framework.
1.10 Establish the integration strategy.
1.11 Conduct a RACI.
1.12 Create the communication plan.
1.13 Prepare to assess target organization(s).
Business perspectives of IT
Stakeholder network map for M&A transactions
Business context implications for IT
IT’s acquiring strategic direction
Governance structure
M&A program metrics
IT valuation framework
Integration strategy
RACI
Communication plan
Prepared to assess target organization(s)
Establish the transaction foundation.
Discover the motivation for integration.
Assess the target organization(s).
Create the valuation framework.
Plan the integration roadmap.
All major stakeholders are on the same page.
Methodology identified to assess organizations during due diligence.
Methodology can be reused for multiple organizations.
Integration activities are planned and assigned.
2.1 Gather and evaluate the stakeholders involved, M&A strategy, future-state operating model, and governance.
2.2 Review the business rationale for the acquisition.
2.3 Establish the integration strategy.
2.4 Create the due diligence charter.
2.5 Create a list of IT artifacts to be reviewed in the data room.
2.6 Conduct a technical debt assessment.
2.7 Assess the current culture and identify the goal culture.
2.8 Identify the needed workforce supply.
2.9 Create the valuation framework.
2.10 Establish the integration roadmap.
2.11 Establish and align project metrics with identified tasks.
2.12 Estimate integration costs.
Stakeholder map
IT strategy assessment
IT operating model and IT governance structure defined
Business context implications for IT
Integration strategy
Due diligence charter
Data room artifacts
Technical debt assessment
Culture assessment
Workforce supply identified
IT valuation framework
Integration roadmap and associated resourcing
Establish the transaction foundation.
Discover the motivation for integration.
Plan the integration roadmap.
Prepare employees for the transition.
Engage in integration.
Assess the transaction outcomes.
All major stakeholders are on the same page.
Integration activities are planned and assigned.
Employees are set up for a smooth and successful transition.
Integration strategy and roadmap executed to benefit the organization.
Review what went well and identify improvements to be made in future transactions.
3.1 Identify key stakeholders and determine IT transaction team.
3.2 Gather and evaluate the M&A strategy, future-state operating model, and governance.
3.3 Review the business rationale for the acquisition.
3.4 Establish the integration strategy.
3.5 Prioritize integration tasks.
3.6 Establish the integration roadmap.
3.7 Establish and align project metrics with identified tasks.
3.8 Estimate integration costs.
3.9 Assess the current culture and identify the goal culture.
3.10 Identify the needed workforce supply.
3.11 Create an employee transition plan.
3.12 Create functional workplans for employees.
3.13 Complete the integration by regularly updating the project plan.
3.14 Begin to rationalize the IT environment where possible and necessary.
3.15 Confirm integration costs.
3.16 Review IT’s transaction value.
3.17 Conduct a transaction and integration SWOT.
3.18 Review the playbook and prepare for future transactions.
M&A transaction team
Stakeholder map
IT strategy assessed
IT operating model and IT governance structure defined
Business context implications for IT
Integration strategy
Integration roadmap and associated resourcing
Culture assessment
Workforce supply identified
Employee transition plan
Employee functional workplans
Updated integration project plan
Rationalized IT environment
SWOT of transaction
M&A Buy Playbook refined for future transactions
IT has always been an afterthought in the M&A process, often brought in last minute once the deal is nearly, if not completely, solidified. This is a mistake. When IT is brought into the process late, the business misses opportunities to generate value related to the transaction and has less awareness of critical risks or inaccuracies.
To prevent this mistake, IT leadership needs to develop strong business relationships and gain respect for their innovative suggestions. In fact, when it comes to modern M&A activity, IT should be the ones suggesting potential transactions to meet business needs, specifically when it comes to modernizing the business or adopting digital capabilities.
IT needs to stop waiting to be invited to the acquisition or divestiture table. IT needs to suggest that the table be constructed and actively work toward achieving the strategic objectives of the business.
There are four key scenarios or entry points for IT as the acquiring organization in M&As:
Consider the ideal scenario for your IT organization.
Some of the obstacles IT faces include:
These obstacles often arise when IT waits to be invited into the transaction process and misses critical opportunities.
Prepare for a growth/integration transaction by:
As the number of merger, acquisition, and divestiture transactions continues to increase, so too does IT’s opportunity to leverage the growing digital nature of these transactions and get involved at the onset.
The total value of transactions in the year after the pandemic started was $1.3 billion – a 93% increase in value compared to before the pandemic. (Nasdaq)
Virtual deal-making will be the preferred method of 55% of organizations in the post-pandemic world. (Wall Street Journal, 2020)
Only half of M&A deals involve IT (Source: IMAA Institute, 2017)
In hindsight, it’s clear to see: Involving IT is just good business.
47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion. (Source: IMAA Institute, 2017)
“40% of acquiring businesses discovered a cybersecurity problem at an acquisition.” (Source: Okta)
Acquisitions and divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:
A merger looks at the equal combination of two entities or organizations. Mergers are rare in the M&A space, as the organizations will combine assets and services in a completely equal 50/50 split. Two organizations may also choose to divest business entities and merge as a new company.
The most common transaction in the M&A space, where an organization will acquire or purchase another organization or entities of another organization. This type of transaction has a clear owner who will be able to make legal decisions regarding the acquired organization.
An organization may decide to sell partial elements of a business to an acquiring organization. They will separate this business entity from the rest of the organization and continue to operate the other components of the business.
A true merger does not exist, as there is always someone initiating the discussion. As a result, most M&A activity falls into acquisition or divestiture categories.
This blueprint is only focused on the buy side:
The sell side is focused on:
For more information on divestitures or selling your entire organization, check out Info-Tech’s Mergers & Acquisitions: The Sell Blueprint.

1. Proactive |
2. Discovery & Strategy |
3. Due Diligence & Preparation |
4. Execution & Value Realization |
|
Phase Steps |
|
|
|
|
Phase Outcomes |
Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture. |
Create a standardized approach for how your IT organization should address acquisitions. |
Evaluate the target organizations successfully and establish an integration project plan. |
Deliver on the integration project plan successfully and communicate IT’s transaction value to the business. |
1. Proactive | 2. Discovery & Strategy | 3. Due Diligence & Preparation | 4. Execution & Value Realization |
|
|
|
|
As an IT executive, take control of when you get involved in a growth transaction. Do this by proactively identifying acquisition targets, demonstrating the value of IT, and ensuring that integration of IT environments does not lead to unnecessary and costly decisions.
CIOs on the forefront of digital transformation need to actively look for and suggest opportunities to acquire or partner on new digital capabilities to respond to rapidly changing business needs.
IT organizations that have an effective M&A program plan are more prepared for the buying transaction, enabling a successful outcome. A structured strategy is particularly necessary for organizations expected to deliver M&As rapidly and frequently.
Most IT synergies can be realized in due diligence. It is more impactful to consider IT processes and practices (e.g. contracts and culture) in due diligence rather than later in the integration.
IT needs to realize synergies within the first 100 days of integration. The most successful transactions are when IT continuously realizes synergies a year after the transaction and beyond.
The M&A Buy Playbook should be a reusable document that enables your IT organization to successfully deliver on any acquisition transaction.
See a one-page overview of each phase of the transaction.
Read a one-page case study for each phase of the transaction.
Manage the integration process of the acquisition using this SharePoint template.
Manage the integration process of the acquisition using this Excel tool if you can’t or don’t want to use SharePoint.
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 6 to 10 calls over the course of 2 to 4 months.
Phase 1 |
Phase 2 | Phase 3 | Phase 4 |
|
|
|
|
As the number of merger, acquisition, or divestiture transactions driven by digital means continues to increase, IT has an opportunity to not just be involved in a transaction but actively seek out potential deals.
In the Proactive phase, the business is not currently considering a transaction. However, the business could consider one to reach its strategic goals. IT organizations that have developed respected relationships with the business leaders can suggest these potential transactions.
Understand the business’ perspective of IT, determine who the critical M&A stakeholders are, valuate the IT environment, and examine how it supports the business goals in order to suggest an M&A transaction.
In doing so, IT isn’t waiting to be invited to the transaction table – it’s creating it.
Goal: To support the organization in reaching its strategic goals by suggesting M&A activities that will enable the organization to reach its objectives faster and with greater-value outcomes.
Before coming into the Proactive phase, you should have addressed the following:
Review the Executive Brief for more information on mergers, acquisitions, and divestitures for purchasing organizations.
Understand how the business perceives IT and establish strong relationships with critical M&A stakeholders.
Misalignment in target state requires further communication between the CIO and CEO to ensure IT is striving toward an agreed-upon direction.
The core services of IT are important when determining what IT should focus on. The most important services with the lowest satisfaction offer the largest area of improvement for IT to drive business value.
Input: IT organization expertise and the CEO-CIO Alignment diagnostic
Output: An understanding of an executive business stakeholder’s perception of IT
Materials: CEO-CIO Alignment diagnostic, M&A Buy Playbook
Participants: IT executive/CIO, Business executive/CEO
Download the sample report.
Record the results in the M&A Buy Playbook.
2 weeks
Input: IT organization expertise, CIO BV diagnostic
Output: An understanding of business stakeholder perception of certain IT capabilities and services
Materials: CIO Business Vision diagnostic, Computer, Whiteboard and markers, M&A Buy Playbook
Participants: IT executive/CIO, Senior business leaders
Download the sample report.
Record the results in the M&A Buy Playbook.
Example:
Your stakeholder map defines the influence landscape that the M&A transaction will occur within. This will identify who holds various levels of accountability and decision-making authority when a transaction does take place.
Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.
1-3 hours
Input: List of M&A stakeholders
Output: Relationships among M&A stakeholders and influencers
Materials: M&A Buy Playbook
Participants: IT executive leadership
Record the results in the M&A Buy Playbook.
There are four areas in the map, and the stakeholders within each area should be treated differently.
Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.
Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.
Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.
30 minutes
Input: Stakeholder map, Stakeholder list
Output: Categorization of stakeholders and influencers
Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook
Participants: IT executive leadership, Stakeholders
How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?
Record the results in the M&A Buy Playbook.
| Level of Support | |||||
Supporter |
Evangelist |
Neutral |
Blocker |
||
| Stakeholder Category | Player | Critical | High | High | Critical |
| Mediator | Medium | Low | Low | Medium | |
| Noisemaker | High | Medium | Medium | High | |
| Spectator | Low | Irrelevant | Irrelevant | Low |
Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How significant is that stakeholder to the M&A or divestiture process?
These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.
30 minutes
Input: Stakeholder matrix
Output: Stakeholder and influencer prioritization
Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook
Participants: IT executive leadership, M&A/divestiture stakeholders
Stakeholder |
Category |
Level of Support |
Prioritization |
| CMO | Spectator | Neutral | Irrelevant |
| CIO | Player | Supporter | Critical |
Record the results in the M&A Buy Playbook.
Type |
Quadrant |
Actions |
| Players | High influence, high interest – actively engage | Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success. |
| Mediators | High influence, low interest – keep satisfied | They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders. |
| Noisemakers | Low influence, high interest – keep informed | Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them. |
| Spectators | Low influence, low interest – monitor | They are followers. Keep them in the loop by providing clarity on objectives and status updates. |
Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying stakeholder groups, the IT executive leader can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of Mediators and Players are met.
30 minutes
Input: Stakeholder priority, Stakeholder categorization, Stakeholder influence
Output: Stakeholder communication plan
Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook
Participants: IT executive leadership, M&A/divestiture stakeholders
The purpose of this activity is to make a communication plan for each of the stakeholders identified in the previous activities, especially those who will have a critical role in the M&A transaction process.
Record the results in the M&A Buy Playbook.
Identify critical opportunities to optimize IT and meet strategic business goals through a merger, acquisition, or divestiture.
Four ways to create value through digital
1 day
Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk
Output: Valuation of IT
Materials: Relevant templates/tools listed on the following slides, Capital budget, Operating budget, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership
The purpose of this activity is to demonstrate that IT is not simply an operational functional area that diminishes business resources. Rather, IT contributes significant value to the business.
Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.
Record the results in the M&A Buy Playbook.
Data valuation identifies how you monetize the information that your organization owns.
When valuating the information and data that exists in an organization, there are many things to consider.
Info-Tech has two tools that can support this process:
Data Collection |
Insight Creation |
Value Creation |
Data Valuation |
| 01 Data Source
02 Data Collection Method 03 Data |
04 Data Analysis
05 Insight 06 Insight Delivery |
07 Consumer
08 Value in Data |
09 Value Dimension
10 Value Metrics Group 11 Value Metrics |
When valuating the applications and their users in an organization, consider using a business process map. This shows how business is transacted in the company by identifying which IT applications support these processes and which business groups have access to them. Info-Tech has a business process mapping tool that can support this process:
User Costs |
Total User Costs |
Derived Productivity Ratio (DPR) |
Total DPR |
Application Value |
|||
| # of users | % time spent using IT | Fully burdened salary | Multiply values from the 3 user costs columns | Revenue per employee | Average cost per employee | (Revenue P.E) ÷ (Average cost P.E) | (User costs) X (DPR) |
IT and Business Costs |
Total IT and Business Costs |
Net Value of Applications |
|||
| Application maintenance | Downtime costs (include disaster exposure) | Common costs allocated to applications | Fully loaded costs of active (FTE) users | Sum of values from the four IT and business costs columns | (Application value) – (IT and business costs) |
(Source: CSO)
The purpose of this exercise is to provide a high-level infrastructure valuation that will contribute to valuating your IT environment.
Calculating the value of the infrastructure will require different methods depending on the environment. For example, a fully cloud-hosted organization will have different costs than a fully on-premises IT environment.
Item |
Costs/Value |
| Hardware Assets Total Value | +$3.2 million |
| Hardware Leased/Service Agreement | -$ |
| Software Purchased | +$ |
| Software Leased/Service Agreement | -$ |
| Operational Tools | |
| Network | |
| Disaster Recovery | |
| Antivirus | |
| Data Centers | |
| Service Desk | |
| Other Licenses | |
| Total: |
For additional support, download the M&A Runbook for Infrastructure and Operations.
The purpose of this exercise is to provide a high-level risk assessment that will contribute to valuating your IT environment. For a more in-depth risk assessment, please refer to the Info-Tech tools below:
Probability of Risk Occurrence |
Occurrence Criteria
|
| Negligible | Very Unlikely; ‹20% |
| Very Low | Unlikely; 20 to 40% |
| Low | Possible; 40 to 60% |
| Moderately Low | Likely; 60 to 80% |
| Moderate | Almost Certain; ›80% |
Note: If needed, you can customize this scale with the severity designations that you prefer. However, make sure you are always consistent with it when conducting a risk assessment.
Financial & Reputational Impact |
Budgetary and Reputational Implications
|
| Negligible | (‹$10,000; Internal IT stakeholders aware of risk event occurrence) |
| Very Low | ($10,000 to $25,000; Business customers aware of risk event occurrence) |
| Low | ($25,000 to $50,000; Board of directors aware of risk event occurrence) |
| Moderately Low | ($50,000 to $100,000; External customers aware of risk event occurrence) |
| Moderate | (›$100,000; Media coverage or regulatory body aware of risk event occurrence) |
Risk Category Details |
Probability of Occurrence |
Estimated Financial Impact |
Estimated Severity (Probability X Impact) |
| Capacity Planning | |||
| Enterprise Architecture | |||
| Externally Originated Attack | |||
| Hardware Configuration Errors | |||
| Hardware Performance | |||
| Internally Originated Attack | |||
| IT Staffing | |||
| Project Scoping | |||
| Software Implementation Errors | |||
| Technology Evaluation and Selection | |||
| Physical Threats | |||
| Resource Threats | |||
| Personnel Threats | |||
| Technical Threats | |||
| Total: |
4 hours
Input: IT strategy, Digital strategy, Business strategy
Output: An understanding of an executive business stakeholder’s perception of IT, Alignment of IT/digital strategy and overall organization strategy
Materials: Computer, Whiteboard and markers, M&A Buy Playbook
Participants: IT executive/CIO, Business executive/CEO
The purpose of this activity is to review the business and IT strategies that exist to determine if there are critical capabilities that are not being supported.
Ideally, the IT and digital strategies would have been created following development of the business strategy. However, sometimes the business strategy does not directly call out the capabilities it requires IT to support.
For additional support, see Build a Business-Aligned IT Strategy.
Record the results in the M&A Buy Playbook.
Establish strong relationships with critical M&A stakeholders and position IT as an innovative business partner that can suggest growth opportunities.
1-2 hours
Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade
Output: List of pain points or opportunities that IT can address
Materials: Computer, Whiteboard and markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Business stakeholders
The purpose of this activity is to determine the pain points and opportunities that exist for the organization. These can be external or internal to the organization.
Opportunities and pain points can be trends, other departments’ initiatives, business perspectives of IT, etc.
Record the results in the M&A Buy Playbook.
1-2 hours
Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade, List of pain points and opportunities
Output: An understanding of an executive business stakeholder’s perception of IT, Foundations for growth strategy
Materials: Computer, Whiteboard and markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Business stakeholders
The purpose of this activity is to determine whether a growth or separation strategy might be a good suggestion to the business in order to meet its business objectives.
Record the results in the M&A Buy Playbook.
1-2 hours
Input: Growth or separation strategy opportunities to support business goals, Stakeholder communication plan, Rationale for the suggestion
Output: M&A transaction opportunities suggested
Materials: M&A Buy Playbook
Participants: IT executive/CIO, Business executive/CEO
The purpose of this activity is to recommend a merger, acquisition, or divestiture to the business.
With technology and digital driving many transactions, leverage this opening and begin the discussions with your business on how and why an acquisition would be a great opportunity.
Record the results in the M&A Buy Playbook.
Develop progressive relationships and strong communication with key stakeholders to suggest or be aware of transformational opportunities that can be achieved through growth or reduction strategies such as mergers, acquisitions, or divestitures.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|
|
|
|
Pre-Work | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
| Establish the Transaction Foundation | Discover the Motivation for Acquiring | Formalize the Program Plan | Create the Valuation Framework | Strategize the Transaction | Next Steps and Wrap-Up (offsite) | |
Activities |
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
|
The Discovery & Strategy phase during an acquisition is a unique opportunity for many IT organizations. IT organizations that can participate in the acquisition transaction at this stage are likely considered a strategic partner of the business.
For one-off acquisitions, IT being invited during this stage of the process is rare. However, for organizations that are preparing to engage in many acquisitions over the coming years, this type of strategy will greatly benefit from IT involvement. Again, the likelihood of participating in an M&A transaction is increasing, making it a smart IT leadership decision to, at the very least, loosely prepare a program plan that can act as a strategic pillar throughout the transaction.
During this phase of the pre-transaction state, IT will also be asked to participate in ensuring that the potential organization being sought will be able to meet any IT-specific search criteria that was set when the transaction was put into motion.
Goal: To identify a repeatable program plan that IT can leverage when acquiring all or parts of another organization’s IT environment, ensuring customer satisfaction and business continuity
Before coming into the Discovery & Strategy phase, you should have addressed the following:
Establish an M&A program plan that can be repeated across acquisitions.
Vision Statements |
Mission Statements |
|
Characteristics |
|
|
Samples |
To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce. (Source: Business News Daily) | IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset. (Source: Forbes, 2013) |
2 hours
Input: Business objectives, IT capabilities, Rationale for the transaction
Output: IT’s mission and vision statements for growth strategies tied to mergers, acquisitions, and divestitures
Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create mission and vision statements that reflect IT’s intent and method to support the organization as it pursues a growth strategy.
Record the results in the M&A Buy Playbook.
IT guiding principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting IT investment portfolio management, solution development, and procurement decisions.
Info-Tech has identified a set of characteristics that IT principles should possess. These characteristics ensure the IT principles are relevant and followed in the organization.
Approach focused. IT principles should be focused on the approach – how the organization is built, transformed, and operated – as opposed to what needs to be built, which is defined by both functional and non-functional requirements.
Business relevant. Create IT principles that are specific to the organization. Tie IT principles to the organization’s priorities and strategic aspirations.
Long lasting. Build IT principles that will withstand the test of time.
Prescriptive. Inform and direct decision making with actionable IT principles. Avoid truisms, general statements, and observations.
Verifiable. If compliance can’t be verified, people are less likely to follow the principle.
Easily Digestible. IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren’t a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.
Followed. Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously communicated to all stakeholders to achieve and maintain buy-in.
In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.
IT Principle Name |
IT Principle Statement |
| 1. Risk Management | We will ensure that the organization’s IT Risk Management Register is properly updated to reflect all potential risks and that a plan of action against those risks has been identified. |
| 2. Transparent Communication | We will ensure employees are spoken to with respect and transparency throughout the transaction process. |
| 3. Integration for Success | We will create an integration strategy that enables the organization and clearly communicates the resources required to succeed. |
| 4. Managed Data | We will handle data creation, modification, integration, and use across the enterprise in compliance with our data governance policy. |
| 5. Establish a single IT Environment | We will identify, prioritize, and manage the applications and services that IT provides in order to eliminate redundant technology and maximize the value that users and customers experience. |
| 6. Compliance With Laws and Regulations | We will operate in compliance with all applicable laws and regulations for both our organization and the potentially purchased organization. |
| 7. Defined Value | We will create a plan of action that aligns with the organization’s defined value expectations. |
| 8. Network Readiness | We will ensure that employees and customers have immediate access to the network with minimal or no outages. |
| 9. Operating to Succeed | We will bring all of IT into a central operating model within two years of the transaction. |
2 hours
Input: Business objectives, IT capabilities, Rationale for the transaction, Mission and vision statements
Output: IT’s guiding principles for growth strategies tied to mergers, acquisitions, and divestitures
Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create the guiding principles that will direct the IT organization throughout the growth strategy process.
Record the results in the M&A Buy Playbook.
Consider the following capabilities when looking at who should be a part of the M&A transaction team.
Employees who have a significant role in ensuring that these capabilities are being delivered will be a top priority.
An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy.
It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design.
The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.
As you assess the current operating model, consider the following:
Info-Tech Insight
Investing time up-front getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and allowing your model to change as the business changes.
4 hours
Input: Current operating model, IT strategy, IT capabilities, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements
Output: Future-state operating model
Materials: Operating model, Capability overlay, Flip charts/whiteboard, Markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to establish what the future-state operating model will be if your organization needs to adjust to support a growth transaction.
An example operating model is included in the M&A Buy Playbook. This process benefits from strong reference architecture and capability mapping ahead of time.
Record the results in the M&A Buy Playbook.
Input: IT capabilities, Future-state operating model, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements
Output: Transition team
Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create a team that will support your IT organization throughout the transaction. Determining which capabilities and therefore which roles will be required ensures that the business will continue to get the operational support it needs.
For more information, see Redesign Your Organizational Structure
1-2 hours
Input: List of governing bodies, Governing body committee profiles, Governance structure
Output: Documented method on how decisions are made as it relates to the M&A transaction
Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to determine the method in which decisions are made throughout the M&A transaction as it relates to IT. This will require understanding both governing bodies internal to IT and those external to IT.
Record the results in the M&A Buy Playbook.
Strategy: These groups will focus on decisions that directly connect to the strategic direction of the organization.
Design & Build: The second tier of groups will oversee prioritization of a certain area of governance as well as design and build decisions that feed into strategic decisions.
Run: The lowest level of governance will be oversight of more-specific initiatives and capabilities within IT.
Expect tier overlap. Some committees will operate in areas that cover two or three of these governance tiers.
Upper management will measure IT’s success based on your ability to support the underlying reasons for the M&A. Using business metrics will help assure business stakeholders that IT understands their needs and is working with the business to achieve them.
| S pecific | Make sure the objective is clear and detailed. |
| M easurable | Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective. |
| A ctionable | Objectives become actionable when specific initiatives designed to achieve the objective are identified. |
| R ealistic | Objectives must be achievable given your current resources or known available resources. |
| T ime-Bound | An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline. |
1. Proactive | 2. Discovery & Strategy | 3. Valuation & Due Diligence | 4. Execution & Value Realization |
|
|
|
|
1-2 hours
Input: IT capabilities, Mission, vision, and guiding principles, Rationale for the acquisition
Output: Program metrics to support IT throughout the M&A process
Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to determine how IT’s success throughout a growth transaction will be measured and determined.
Record the results in the M&A Buy Playbook.
Identify IT’s plan of action when it comes to the acquisition and align IT’s integration strategy with the business’ M&A strategy.
The approach IT takes will depend on the business objectives for the M&A.
Key considerations when choosing an IT integration strategy include:
1-2 hours
Input: Business integration strategy, Guiding principles, M&A governance
Output: IT’s integration strategy
Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to determine IT’s approach to integration. The approach might differ slightly from transaction to transaction. However, the business’ approach to transactions should give insight into the general integration strategy IT should adopt.
Record the results in the M&A Buy Playbook.
Business M&A Strategy |
Resultant Technology Strategy |
M&A Magnitude (% of Acquirer Assets, Income, or Market Value) |
IT Integration Posture |
| A. Horizontal | Adopt One Model | ‹10% | Absorption |
| 10 to 75% | Absorption or Best-of-Breed | ||
| ›75% | Best-of-Breed | ||
| B. Vertical | Create Links Between Critical Systems | Any |
|
| C. Conglomerate | Independent Model | Any | Preservation |
| D. Hybrid: Horizontal & Conglomerate | Independent Model | Any | Preservation |
1-2 hours
Input: IT capabilities, Transition team, Integration strategy
Output: Completed RACI for transition team
Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to identify the core accountabilities and responsibilities for the roles identified as critical to your transition team. While there might be slight variation from transaction to transaction, ideally each role should be performing certain tasks.
Record the results in the M&A Buy Playbook.
Three key dimensions determine the appetite for cultural change:
1-2 hours
Input: IT’s M&A mission, vision, and guiding principles, M&A transition team, IT integration strategy, RACI
Output: IT’s M&A communication plan
Materials: Flip charts/whiteboard, Markers, RACI, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create a communication plan that IT can leverage throughout the initiative.
Record the results in the M&A Buy Playbook.
As soon as you have identified organizations to consider, it’s imperative to assess critical risks. Most IT leaders can attest that they will receive little to no notice when they have to assess the IT organization of a potential purchase. As a result, having a standardized template to quickly gauge the value of the business can be critical.
1-2 hours
Input: Publicized historical risk events, Solutions and vendor contracts likely in the works, Trends
Output: IT’s valuation of the potential organization(s) for acquisition
Materials: M&A Buy Playbook
Participants: IT executive/CIO
The purpose of this activity is to assess the organization(s) that your organization is considering purchasing.
Record the results in the M&A Buy Playbook.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|
|
|
|
Pre-Work | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
| Establish the Transaction Foundation | Discover the Motivation for Integration | Assess the Target Organization(s) | Create the Valuation Framework | Plan the Integration Roadmap | Next Steps and Wrap-Up (offsite) | |
Activities |
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
|
The Due Diligence & Preparation phase during an acquisition is a critical time for IT. If IT fails to proactively participate in this phase, IT will have to merely react to integration expectations set by the business.
While not all IT organizations are able to participate in this phase, the evolving nature of M&As to be driven by digital and technological capabilities increases the rationale for IT being at the table. Identifying critical IT risks, which will inevitably be business risks, begins during the due diligence phase.
This is also the opportunity for IT to plan how it will execute the planned integration strategy. Having access to critical information only available in data rooms will further enable IT to successfully plan and execute the acquisition to deliver the value the business is seeking through a growth transaction.
Goal: To thoroughly evaluate all potential risks associated with the organization(s) being pursued and create a detailed plan for integrating the IT environments
Before coming into the Due Diligence & Preparation phase, you must have addressed the following:
Before coming into the Due Diligence & Preparation phase, we recommend addressing the following:
All three elements of the Technology Value Trinity work in harmony to deliver business value and achieve strategic needs. As one changes, the others need to change as well.
Too often strategy, operating model and organizational design, and governance are considered separate practices. As a result, “strategic documents” end up being wish lists, and projects continue to be prioritized based on who shouts the loudest – not based on what is in the best interest of the organization.
This step of the process is when IT should actively evaluate the target organization being pursued for acquisition.
1-2 hours
Input: Key roles for the transaction team, M&A governance, Target metrics, Selected integration strategy framework, RACI of key transaction tasks for the transaction team
Output: IT Due Diligence Charter
Materials: M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create a charter leveraging the items completed in the previous phase, as listed on the Due Diligence Prerequisite Checklist slide, to gain executive sign-off.
Record the results in the M&A Buy Playbook.
4 hours
Input: Future-state operating model, M&A governance, Target metrics, Selected integration strategy framework, RACI of key transaction tasks for the transaction team
Output: List of items to acquire and review in the data room
Materials: Critical domain lists on following slides, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team
The purpose of this activity is to create a list of the key artifacts that should be asked for and reviewed during the due diligence process.
Record the results in the M&A Buy Playbook.
Each critical domain will likely have different stakeholders who know that domain best. Communicate with these stakeholders throughout the M&A process to make sure you are getting accurate information and interpreting it correctly.
Domain |
Stakeholders |
Key Artifacts |
Key Information to request |
| Business |
|
|
|
| Leadership/IT Executive |
|
|
|
| Data & Analytics |
|
|
|
| Applications |
|
|
|
| Infrastructure |
|
|
|
| Products and Services |
|
|
|
Domain | Stakeholders | Key Artifacts | Key Information to request |
| Operations |
|
|
|
| IT Processes |
|
|
|
| IT People |
|
|
|
| Security |
|
|
|
| Projects |
|
|
|
| Vendors |
|
|
|
Focus on solving the problems you need to address.
Analyzing technical debt has value in that the analysis can help your organization make better risk management and resource allocation decisions.
Do you have any of these challenges?
“This isn’t a philosophical exercise. Knowing what you want to get out of this analysis informs the type of technical debt you will calculate and the approach you will take.” (Scott Buchholz, CTO, Deloitte Government & Public Services Practice, The Wall Street Journal, 2015)
1-2 hours
Input: Participant views on organizational tech debt, Five to ten key technical debts, Business impact scoring scales, Reasonable next-quarter scenarios for each technical debt, Technical debt business impact analysis
Output: Initial list of tech debt for the target organization
Materials: Whiteboard, Sticky notes, Technical Debt Business Impact Analysis Tool, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Business leaders, Transition team
The purpose of this activity is to assess the technical debt of the other IT organization. Taking on unnecessary technical debt is one of the biggest risks to the IT environment
Record the results in the M&A Buy Playbook.
The IT valuation conducted during due diligence can have a significant impact on the final financials of the transaction for the business.
1 day
Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk
Output: Valuation of target organization’s IT
Materials: Relevant templates/tools, Capital budget, Operating budget, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Prospective IT organization
The purpose of this activity is to valuate the other IT organization.
Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.
Record the results in the M&A Buy Playbook.
The culture that the target organization is currently embracing. Their established and undefined governance practices will lend insight into this.
The culture that your organization is currently embracing. Examine people’s attitudes and behaviors within IT toward their jobs and the organization.
What will the future culture of the IT organization be once integration is complete? Are there aspects that your current organization and the target organization embrace that are worth considering?
Competitive
|
Innovative
|
Traditional
|
Cooperative
|
3-4 hours
Input: Cultural assessments for current IT organization, Cultural assessment for target IT organization
Output: Goal for IT culture
Materials: IT Culture Diagnostic, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, IT employees of current organization, IT employees of target organization, Company M&A team
The purpose of this activity is to assess the different cultures that might exist within the IT environments of both organizations. More importantly, your IT organization can select its desired IT culture for the long term if it does not already exist.
Record the results in the M&A Buy Playbook.
Have an established plan of action toward integration across all domains and a strategy toward resources.
80% of integration should happen within the first two years. (Source: CIO Dive)
70% of M&A IT integrations fail due to components that could and should be addressed at the beginning. (Source: The Wall Street Journal, 2019)
Integration is not rationalization. Once the organization has integrated, it can prepare to rationalize the IT environment.
Set up a meeting with your IT due diligence team to:
Use this opportunity to:
Domain | Independent Models | Create Links Between Critical Systems | Move Key Capabilities to Common Systems | Adopt One Model |
Data & Analytics |
|
|
|
|
Applications |
|
|
|
|
Domain | Independent Models | Create Links Between Critical Systems | Move Key Capabilities to Common Systems | Adopt One Model |
Infrastructure |
|
|
|
|
IT People & Processes |
|
|
|
|
Domain | Independent Models | Create Links Between Critical Systems | Move Key Capabilities to Common Systems | Adopt One Model |
Leadership/IT Executive |
|
|
|
|
Vendors |
|
|
|
|
Domain | Independent Models | Create Links Between Critical Systems | Move Key Capabilities to Common Systems | Adopt One Model |
Security |
|
|
|
|
Projects |
|
|
|
|
2 hours
Input: Integration tasks, Transition team, M&A RACI
Output: Prioritized integration list
Materials: Integration task checklist, Integration roadmap
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to prioritize the different integration tasks that your organization has identified as necessary to this transaction. Some tasks might not be relevant for this particular transaction, and others might be critical.
Record the updates in the M&A Integration Project Management Tool (SharePoint).
Record the updates in the M&A Integration Project Management Tool (Excel).
Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners
Output: Integration roadmap
Materials: M&A Integration Project Plan Tool (SharePoint), M&A Integration Project Plan Tool (Excel)
Participants: IT executive/CIO, IT senior leadership, Transition team, Company M&A team
The purpose of this activity is to create a roadmap to support IT throughout the integration process. Using the information gathered in previous activities, you can create a roadmap that will ensure a smooth integration.
Record the updates in the M&A Integration Project Management Tool (SharePoint).
Record the updates in the M&A Integration Project Management Tool (Excel).
For more information, check out the SharePoint Template: Step-by-Step Deployment Guide.
Don’t be a short-term thinker when it comes to workforce planning! IT teams that only consider the headcount needed on day one of the new entity will end up scrambling to find skilled resources to fill workforce gaps later in the transition period.
Input: IT strategy, Prioritized integration tasks
Output: A clear indication of how many resources are required for each role and the number of resources that the organization actually has
Materials: Resource Management Supply-Demand Calculator
Participants: IT executive/CIO, IT senior leadership, Target organization employees, Company M&A team, Transition team
The purpose of this activity is to determine the anticipated amount of work that will be required to support projects (like integration), administrative, and keep-the-lights-on activities.
Record the results in the Resource Management Supply-Demand Calculator.
Resource Capacity Confidence. This figure is based on your confidence in supply confidence, demand stability, and the supply-demand ratio.
Integration costs are more related to the degree of change required than the size of the transaction.
3-4 hours
Input: Integration tasks, Transition team, Valuation of current IT environment, Valuation of target IT environment, Outputs from data room, Technical debt, Employees
Output: List of anticipated costs required to support IT integration
Materials: Integration task checklist, Integration roadmap, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team
The purpose of this activity is to estimate the costs that will be associated with the integration. It’s important to ensure a realistic figure is identified and communicated to the larger M&A team within your company as early in the process as possible. This ensures that the funding required for the transaction is secured and budgeted for in the overarching transaction.
Record the results in the M&A Buy Playbook.
Being transparent throughout the process is critical. Do not hesitate to tell employees the likelihood that their job may be made redundant. This will ensure a high level of trust and credibility for those who remain with the organization after the transaction.
3-4 hours
Input: IT strategy, IT organizational design, Resource Supply-Demand Calculator output
Output: Employee transition plans
Materials: M&A Buy Playbook, Whiteboard, Sticky notes, Markers
Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team
The purpose of this activity is to create a transition plan for employees.
**Note that if someone’s future role is a layoff, then there is no need to record anything for skills needed or method for skill development.
Record the results in the M&A Buy Playbook.
3-4 hours
Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners
Output: Employee functional workplans
Materials: M&A Buy Playbook, Learning and development tools
Participants: IT executive/CIO, IT senior leadership, IT management team, Company M&A team, Transition team
The purpose of this activity is to create a functional workplan for the different employees so that they know what their key role and responsibilities are once the transaction occurs.
It is recommended that each employee have a functional workplan. Leverage the IT managers to support this task.
Record the results in the M&A Buy Playbook.
3-4 hours
Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners, M&A goals
Output: Integration-specific metrics to measure success
Materials: Roadmap template, M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Transition team
The purpose of this activity is to understand how to measure the success of the integration project by aligning metrics to each identified task.
Record the results in the M&A Buy Playbook.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|
|
|
|
Pre-Work | Day 1 | Day 2 | Day 3 | Engage in Integration | Day 4 | |
| Establish the Transaction Foundation | Discover the Motivation for Integration | Plan the Integration Roadmap | Prepare Employees for the Transition | Engage in Integration | Assess the Transaction Outcomes (Must be within 30 days of transaction date) | |
Activities |
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
|
Once the transaction comes to a close, it’s time for IT to deliver on the critical integration tasks. Set the organization up for success by having an integration roadmap. Retaining critical IT staff throughout this process will also be imperative to the overall transaction success.
Throughout the integration process, roadblocks will arise and need to be addressed. However, by ensuring that employees, technology, and processes are planned for ahead of the transaction, you as IT will be able to weather those unexpected concerns with greater ease.
Now that you as an IT leader have engaged in an acquisition, demonstrating the value IT was able to provide to the process is critical to establishing a positive and respected relationship with other senior leaders in the business. Be prepared to identify the positives and communicate this value to advance the business’ perception of IT.
Goal: To carry out the planned integration activities and deliver the intended value to the business
Before coming into the Execution & Value Realization phase, you must have addressed the following:
Before coming into the Execution & Value Realization phase, we recommend addressing the following:
Successfully execute on the integration and strategize how to rationalize the two (or more) IT environments and update the project plan, strategizing against any roadblocks as they might come.
Input: RACI chart, List of critical applications, List of vendor contracts, List of infrastructure assets, List of data assets
Output: Rationalized IT environment
Materials: Software Terms & Conditions Evaluation Tool
Participants: IT executive/CIO, IT senior leadership, Vendor management
The purpose of this activity is to rationalize the IT environment to reduce and eliminate redundant technology.
This will not be a quick and easy activity to complete. It will require strong negotiation on the behalf of the vendor management team.
For additional information and support for this activity, see the blueprint Master Contract Review and Negotiations for Software Agreements.
Input: Prioritized integration tasks, Integration RACI, Activity owners
Output: Updated integration project plan
Materials: M&A Integration Project Management Tool
Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team
The purpose of this activity is to ensure that the project plan is continuously updated as your transaction team continues to execute on the various components outlined in the project plan.
Record the updates in the M&A Integration Project Management Tool (SharePoint).
Record the updates in the M&A Integration Project Management Tool (Excel).
Review the value that IT was able to generate around the transaction and strategize on how to improve future acquisition transactions.
3-4 hours
Input: Integration tasks, Transition team, Previous RACI, Estimated costs
Output: Actual integration costs
Materials: M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team
The purpose of this activity is to confirm the associated costs around integration. While the integration costs would have been estimated previously, it’s important to confirm the costs that were associated with the integration in order to provide an accurate and up-to-date report to the company’s M&A team.
Record the results in the M&A Buy Playbook.
The ultimate goal of the M&A is to achieve and deliver deal objectives. Early in the M&A, IT must identify, prioritize, and execute upon synergies that deliver value to the business and its shareholders. Continue to measure IT’s contribution toward achieving the organization’s M&A goals throughout the integration by keeping track of cost savings and synergies that have been achieved. When these achievements happen, communicate them and celebrate success.
Once 80% of the necessary synergies are realized, executive pressure will diminish. However, IT must continue to work toward the technology end state to avoid delayed progression.
3-4 hours
Input: Prioritized integration tasks, Integration RACI, Activity owners, M&A company goals
Output: Transaction value
Materials: M&A Buy Playbook
Participants: IT executive/CIO, IT senior leadership, Company's M&A team
The purpose of this activity is to track how your IT organization performed against the originally identified metrics.
Record the results in the M&A Buy Playbook.
2 hours
Input: Integration costs, Retention rates, Value IT contributed to the transaction
Output: Strengths, weaknesses, opportunities, and threats
Materials: Flip charts, Markers, Sticky notes
Participants: IT executive/CIO, IT senior leadership, Business transaction team
The purpose of this activity is to assess the positive and negative elements of the transaction.
Record the results in the M&A Buy Playbook.
4 hours
Input: Transaction and integration SWOT
Output: Refined M&A playbook
Materials: M&A Buy Playbook
Participants: IT executive/CIO
The purpose of this activity is to revise the playbook and ensure it is ready to go for future transactions.
Record the results in the M&A Buy Playbook.
Congratulations, you have completed the M&A Buy Blueprint!
Rather than reacting to a transaction, you have been proactive in tackling this initiative. You now have a process to fall back on in which you can be an innovative IT leader by suggesting how and why the business should engage in an acquisition. You now have:
Now that you have done all of this, reflect on what went well and what can be improved in case if you have to do this all again in a future transaction.
| Ibrahim Abdel-Kader
Research Analyst | CIO Info-Tech Research Group |
Brittany Lutes
Senior Research Analyst | CIO Info-Tech Research Group |
|
| John Annand
Principal Research Director | Infrastructure Info-Tech Research Group |
Scott Bickley
Principal Research Director | Vendor Management Info-Tech Research Group |
|
| Cole Cioran
Practice Lead | Applications Info-Tech Research Group |
Dana Daher
Research Analyst | Strategy & Innovation Info-Tech Research Group |
|
| Eric Dolinar
Manager | M&A Consulting Deloitte Canada |
Christoph Egel
Director, Solution Design & Deliver Cooper Tire & Rubber Company |
|
| Nora Fisher
Vice President | Executive Services Advisory Info-Tech Research Group |
Larry Fretz
Vice President | Industry Info-Tech Research Group |
| David Glazer
Vice President of Analytics Kroll |
Jack Hakimian
Senior Vice President | Workshops and Delivery Info-Tech Research Group |
|
| Gord Harrison
Senior Vice President | Research & Advisory Info-Tech Research Group |
Valence Howden
Principal Research Director | CIO Info-Tech Research Group |
|
| Jennifer Jones
Research Director | Industry Info-Tech Research Group |
Nancy McCuaig
Senior Vice President | Chief Technology and Data Office IGM Financial Inc. |
|
| Carlene McCubbin
Practice Lead | CIO Info-Tech Research Group |
Kenneth McGee
Research Fellow | Strategy & Innovation Info-Tech Research Group |
|
| Nayma Naser
Associate Deloitte |
Andy Neill
Practice Lead | Data & Analytics, Enterprise Architecture Info-Tech Research Group |
| Rick Pittman
Vice President | Research Info-Tech Research Group |
Rocco Rao
Research Director | Industry Info-Tech Research Group |
|
| Mark Rosa
Senior Vice President & Chief Information Officer Mohegan Gaming and Entertainment |
Tracy-Lynn Reid
Research Lead | People & Leadership Info-Tech Research Group |
|
| Jim Robson
Senior Vice President | Shared Enterprise Services (retired) Great-West Life |
Steven Schmidt
Senior Managing Partner Advisory | Executive Services Info-Tech Research Group |
|
| Nikki Seventikidis
Senior Manager | Finance Initiative & Continuous Improvement CST Consultants Inc. |
Allison Straker
Research Director | CIO Info-Tech Research Group |
|
| Justin Waelz
Senior Network & Systems Administrator Info-Tech Research Group |
Sallie Wright
Executive Counselor Info-Tech Research Group |
“5 Ways for CIOs to Accelerate Value During Mergers and Acquisitions.” Okta, n.d. Web.
Altintepe, Hakan. “Mergers and acquisitions speed up digital transformation.” CIO.com, 27 July 2018. Web.
“America’s elite law firms are booming.” The Economist, 15 July 2021. Web.
Barbaglia, Pamela, and Joshua Franklin. “Global M&A sets Q1 record as dealmakers shape post-COVID world.” Nasdaq, 1 April 2021. Web.
Boyce, Paul. “Mergers and Acquisitions Definition: Types, Advantages, and Disadvantages.” BoyceWire, 8 Oct. 2020. Web.
Bradt, George. “83% Of Mergers Fail -- Leverage A 100-Day Action Plan For Success Instead.” Forbes, 27 Jan. 2015. Web.
Capgemini. “Mergers and Acquisitions: Get CIOs, IT Leaders Involved Early.” Channel e2e, 19 June 2020. Web.
Chandra, Sumit, et al. “Make Or Break: The Critical Role Of IT In Post-Merger Integration.” IMAA Institute, 2016. Web.
Deloitte. “How to Calculate Technical Debt.” The Wall Street Journal, 21 Jan. 2015. Web.
Ernst & Young. “IT As A Driver Of M&A Success.” IMAA Institute, 2017. Web.
Fernandes, Nuno. “M&As In 2021: How To Improve The Odds Of A Successful Deal.” Forbes, 23 March 2021. Web.
“Five steps to a better 'technology fit' in mergers and acquisitions.” BCS, 7 Nov. 2019. Web.
Fricke, Pierre. “The Biggest Opportunity You’re Missing During an M&Aamp; IT Integration.” Rackspace, 4 Nov. 2020. Web.
Garrison, David W. “Most Mergers Fail Because People Aren't Boxes.” Forbes, 24 June 2019. Web.
Harroch, Richard. “What You Need To Know About Mergers & Acquisitions: 12 Key Considerations When Selling Your Company.” Forbes, 27 Aug. 2018. Web.
Hope, Michele. “M&A Integration: New Ways To Contain The IT Cost Of Mergers, Acquisitions And Migrations.” Iron Mountain, n.d. Web.
“How Agile Project Management Principles Can Modernize M&A.” Business.com, 13 April 2020. Web.
Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 Jan. 2013. Web.
Kanter, Rosabeth Moss. “What We Can Learn About Unity from Hostile Takeovers.” Harvard Business Review, 12 Nov. 2020. Web.
Koller, Tim, et al. “Valuation: Measuring and Managing the Value of Companies, 7th edition.” McKinsey & Company, 2020. Web.
Labate, John. “M&A Alternatives Take Center Stage: Survey.” The Wall Street Journal, 30 Oct. 2020. Web.
Lerner, Maya Ber. “How to Calculate ROI on Infrastructure Automation.” DevOps.com, 1 July 2020. Web.
Loten, Angus. “Companies Without a Tech Plan in M&A Deals Face Higher IT Costs.” The Wall Street Journal, 18 June 2019. Web.
Low, Jia Jen. “Tackling the tech integration challenge of mergers today” Tech HQ, 6 Jan. 2020. Web.
Lucas, Suzanne. “5 Reasons Turnover Should Scare You.” Inc. 22 March 2013. Web.
“M&A Trends Survey: The future of M&A. Deal trends in a changing world.” Deloitte, Oct. 2020. Web.
Maheshwari, Adi, and Manish Dabas. “Six strategies tech companies are using for successful divesting.” EY, 1 Aug. 2020. Web.
Majaski, Christina. “Mergers and Acquisitions: What's the Difference?” Investopedia, 30 Apr. 2021.
“Mergers & Acquisitions: Top 5 Technology Considerations.” Teksetra, 21 Jul. 2020. Web.
“Mergers Acquisitions M&A Process.” Corporate Finance Institute, n.d. Web.
“Mergers and acquisitions: A means to gain technology and expertise.” DLA Piper, 2020. Web.
Nash, Kim S. “CIOs Take Larger Role in Pre-IPO Prep Work.” The Wall Street Journal, 5 March 2015. Web.
Paszti, Laila. “Canada: Emerging Trends In Information Technology (IT) Mergers And Acquisitions.” Mondaq, 24 Oct. 2019. Web.
Patel, Kiison. “The 8 Biggest M&A Failures of All Time” Deal Room, 9 Sept. 2021. Web.
Peek, Sean, and Paula Fernandes. “What Is a Vision Statement?” Business News Daily, 7 May 2020. Web.
Ravid, Barak. “Tech execs focus on growth amid increasingly competitive M&A market.” EY, 28 April 2021. Web.
Resch, Scott. “5 Questions with a Mergers & Acquisitions Expert.” CIO, 25 June 2019. Web.
Salsberg, Brian. “Four tips for estimating one-time M&A integration costs.” EY, 17 Oct. 2019. Web.
Samuels, Mark. “Mergers and acquisitions: Five ways tech can smooth the way.” ZDNet, 15 Aug. 2018. Web.
“SAP Divestiture Projects: Options, Approach and Challenges.” Cognizant, May, 2014. Web.
Steeves, Dave. “7 Rules for Surviving a Merger & Acquisition Technology Integration.” Steeves and Associates, 5 Feb. 2020. Web.
Tanaszi, Margaret. “Calculating IT Value in Business Terms.” CSO, 27 May 2004. Web.
“The CIO Playbook. Nine Steps CIOs Must Take For Successful Divestitures.” SNP, 2016. Web.
“The Role of IT in Supporting Mergers and Acquisitions.” Cognizant, Feb. 2015. Web.
Torres, Roberto. “M&A playbook: How to prepare for the cost, staff and tech hurdles.” CIO Dive, 14 Nov. 2019. Web.
“Valuation Methods.” Corporate Finance Institute, n.d. Web.
Weller, Joe. “The Ultimate Guide to the M&A Process for Buyers and Sellers.” Smartsheet, 16 May 2019. Web.
M365 projects are fraught with obstacles. Common mistakes organizations make include:
There are three primary areas where organizations fail in a successful implementation of M365: training, adoption, and information governance. While it is not up to IT to ensure every user is well trained, it is their initial responsibility to find champions, SMEs, and business-based trainers and manage information governance from the backup, retention, and security aspects of data management.
Migrating to M365 is a disruptive move for most organizations. It poses risk to untrained IT staff, including admins, help desk, and security teams. The aim for organizations, especially in this new hybrid workspace, is to maintain efficiencies through collaboration, share information in a secure environment, and work from anywhere, any time.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
There are three primary goals when deploying Microsoft 365: productivity, security and compliance, and collaborative functionality. On top of these you need to meet the business KPIs and IT’s drive for adoption and usage. This research will guide you through the important considerations that are often overlooked as this powerful suite of tools is rolled out to the organization.
![]() |
There are three primary objectives when deploying Microsoft 365: from a business perspective, the expectations are based on productivity; from an IT perspective, the expectations are based on IT efficiencies, security, and compliance; and from an organizational perspective, they are based on a digital employee experience and collaborative functionality. Of course, all these expectations are based on one primary objective, and that is user adoption of Teams, OneDrive, and SharePoint Online. A mass adoption, along with a high usage rate and a change in the way users work, is required for your investment in M365 to be considered successful. So, adoption is your first step, and that can be tracked and analyzed through analytics in M365 or other tools. But what else needs to be considered once you have released M365 on your organization? What about backup? What about security? What about sharing data outside your business? What about self-service? What about ongoing training? M365 is a powerful suite of tools, and taking advantage of all that it entails should be IT’s primary goal. How to accomplish that, efficiently and securely, is up to you! |
John Donovan |
Collaboration, efficiencies, and cost savings need to be earned |
Migrating to M365 is a disruptive move for most organizations. Additionally, it poses risk to untrained IT staff, including admins, help desk, and security teams. The aim for organizations, especially in this new hybrid workspace, is to maintain efficiencies through collaboration, share information in a secure environment, and work from anywhere, any time. However, organizations need to manage their licensing and storage costs and build this new way of working through post-deployment planning. By reducing their hardware and software footprint they can ensure they have earned these savings and efficiencies. |
Understand any shortcomings in M365 or pay the price |
Failing to understand any shortcomings M365 poses for your organization can ruin your chances at a successful implementation. Commonly overlooked expenses include backup and archiving, especially for regulated organizations; spending on risk mitigation through third-party tools for security; and paying a premium to Microsoft to use its Azure offerings with Microsoft Sentinel, Microsoft Defender, or any security add-on that comes at a price above your E5 license, which is expensive in itself. |
Spend time with users to understand how they will use M365 |
Understanding business processes is key to anticipating how your end users will adopt M365. By spending time with the staff and understanding their day-to-day activities and interactions, you can build better training scenarios to suit their needs and help them understand how the apps in M365 can help them do their job. On top of this you need to meet the business KPIs and IT’s drive for adoption and usage. Encourage early adopters to become trainers and champions. Success will soon follow. |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
M365 is a full suite of tools for collaboration, communication, and productivity, but organizations find the platform is not used to its full advantage and fail to get full value from their license subscription. Many users are unsure which tool to use when: Do you use Teams or Viva Engage, MS Project or Planner? When do you use SharePoint versus OneDrive? From an IT perspective, finding time to help users at the outset is difficult – it’s quite the task to set up governance, security, and backup. Yet training staff must be a priority if the implementation is to succeed. |
M365 projects are fraught with obstacles. Common mistakes organizations make include:
|
To define your post-migration tasks and projects:
Failure to take meaningful action will not bode well for your M365 journey. |
There are three primary areas where organizations fail in a successful implementation of M365: training, adoption, and information governance. While it is not up to IT to ensure every user is well trained, it is their initial responsibility to find champions, SMEs, and business-based trainers and to manage information governance from backup, retention, and security aspects of data management.
What IT teams are saying
Top IT reasons for adopting M365
61% More collaborative working style
54% Cost savings
51% Improved cybersecurity
49% Greater mobility
Define Vision |
Build Team |
Plan Projects |
Execute |
|---|---|---|---|
Define your vision and what your priorities are for M365. Understand how to reach your vision. |
Ensure you have an executive sponsor, develop champions, and build a team of SMEs. |
List all projects in a to-be scenario. Rank and prioritize projects to understand impact and difficulty. |
Build your roadmap, create timelines, and ensure you have enough resources and time to execute and deliver to the business. |

A clear understanding of the business purpose and processes, along with insight into the organizational culture, will help you align the right apps with the right tasks. This approach will bring about better adoption and collaboration and cancel out the shadow IT products we see in every business silo.
To give organizations insight into the adoption of services in M365, Microsoft provides built-in usage analytics in Power BI, with templates for visualization and custom reports. There are third-party tools out there, but why pay more? However, the template app is not free; you do need a Power BI Pro license.
Usage Analytics pulls data from ActiveDirectory, including location, department, and organization, giving you deeper insight into how users are behaving. It can collect up to 12 months of data to analyze.
Reports that can be created include Adoption, Usage, Communication, Collaboration (how OneDrive and SharePoint are being used), Storage (cloud storage for mailboxes, OneDrive, and SharePoint), and Mobility (which clients and devices are used to connect to Teams, email, Yammer, etc.).
Admin Roles |
Best Practices |
|---|---|
|
Only assign two to four global admins, depending on the size of the organization. Too many admins increases security risk. In larger organizations, segment admin roles using role-based access control. Because admins have access to sensitive data, you’ll want to assign the least permissive role so they can access only the tools and data they need to do their job. Enable MFA for all admins except one break-glass account that is stored in the cloud and not synced. Ensure a complex password, stored securely, and use only in the event of an MFA outage. Due to the large number of admin roles available and the challenges that brings with it, Microsoft has a built-in tool to compare roles in the admin portal. This can help you determine which role should be used for specific tasks. |
Identity Checklist
Determine your training needs and align with your business processes. Choose training modalities that will give users the best chance of success. Consider one or many training methods, such as:
Why is M365 backup so important?
Accidental Data Deletion.
If a user is deleted, that deletion gets replicated across the network. Backup can save you here by restoring that user.
Internal and External Security Threats.
Malicious internal deletion of data and external threats including viruses, ransomware, and malware can severely damage a business and its reputation. A clean backup can easily restore the business’ uninfected data.
Legal and Compliance Requirements.
While e-discovery and legal hold are available to retain sensitive data, a third-party backup solution can easily search and restore all data to meet regulatory requirements – without depending on someone to ensure a policy was set.
Retention Policy Gaps.
Retention policies are not a substitute for backup. While they can be used to retain or delete content, they are difficult to keep track of and manage. Backups offer greater latitude in retention and better security for that data.
Legacy |
Microsoft 365 |
|---|---|
SharePoint 2016/19 |
SharePoint Online |
Microsoft Exchange Server |
Microsoft Exchange in Azure |
Skype for Business Server |
Teams |
Trello |
Planner 2022 |
System Center Configuration Manager (SCCM) |
Endpoint Manager, Intune, Autopilot |
File servers |
OneDrive |
Access |
Power Apps |
To meet the objectives of cost reduction and rationalization, look at synergies that M365 brings to the table. Determine what you are currently using to meet collaboration, storage, and security needs and plan to use the equivalent in your Microsoft entitlement.
There are plenty of preconfigured security features contained in M365, but what’s available to you depends on your license. For example, Microsoft Defender, which has many preset policies, is built-in for E5 licenses, but if you have E3 licenses Defender is an add-on.
Three elements in security policies are profiles, policies, and policy settings.
Check your license entitlement before you start purchasing add-ons or third-party solutions. Security and compliance are not optional in today’s cybersecurity risk world. With many organizations offering hybrid and remote work arrangements and bring-your-own-device (BYOD) policies, it is necessary to protect your data at the tenant level. Defender for Microsoft 365 is a tool that can protect both your exchange and collaboration environments.
More information: Microsoft 365 Defender
NOTE: You must have Azure AD Premium and Windows 10 V1703 or later as well as Intune or other MDM service to use Autopilot. There is a monthly usage fee based on volume of data transmitted. These fees can add up over time.
For more details visit the following Microsoft Learn pages:

Info-Tech’s research on zero-touch provisioning goes into more detail on Intune and Autopilot:
Simplify Remote Deployment With Zero-Touch Provisioning

Drive Ongoing Adoption With an M365 Center of Excellence
Simplify Remote Deployment With Zero-Touch Provisioning
“5 Reasons Why Microsoft Office 365 Backup Is Important.” Apps 4Rent, Dec 2021, Accessed Oct 2022 .
Chandrasekhar, Aishwarya. “Office 365 Migration Best Practices & Challenges 2022.” Saketa, 31 Mar 2022. Accessed Oct. 2022.
Chronlund, Daniel. “The Fundamental Checklist – Secure your Microsoft 365 Tenant”. Daniel Chronlund Cloud Tech Blog,1 Feb 2019. Accessed 1 Oct 2022.
Davies, Joe. “The Microsoft 365 Enterprise Deployment Guide.” Tech Community, Microsoft, 19 Sept 2018. Accessed 2 Oct 2022.
Dillaway, Kevin. “I Upgraded to Microsoft 365 E5, Now What?!.” SpyGlassMTG, 10 Jan 2022. Accessed 4 Oct. 2022.
Hartsel, Joe. “How to Make Your Office 365 Implementation Project a Success.” Centric, 20 Dec 2021. Accessed 2 Oct. 2022.
Jha, Mohit. “The Ultimate Microsoft Office 365 Migration Checklist for Pre & Post Migration.” Office365 Tips.Org, 24 June 2022. Accessed Sept. 2022.
Lang, John. “Why organizations don't realize the full value of Microsoft 365.“Business IT, 29 Nov 202I. Accessed 10 Oct 2022.
Mason, Quinn. “How to increase Office 365 / Microsoft 365 user adoption.” Sharegate, 19 Sept 2019. Accessed 3 Oct 2022.
McDermott, Matt. “6-Point Office 365 Post-Migration Checklist.” Spanning , 12 July 2019 . Accessed 4 Oct 2022.
“Microsoft 365 usage analytics.” Microsoft 365, Microsoft, 25 Oct 2022. Web.
Sharma, Megha. “Office 365 Pre & Post Migration Checklist.’” Kernel Data Recovery, 26 July 2022. Accessed 30 Sept. 2022.
Sivertsen, Per. “How to avoid a failed M365 implementation? Infotechtion, 19 Dec 2021. Accessed 2 Oct. 2022.
St. Hilaire, Dan. “Most Common Mistakes with Office 365 Deployment (and How to Avoid Them).“ KnowledgeWave, 4Mar 2019. Accessed Oct. 2022.
“Under the Hood of Microsoft 365 and Office 365 Adoption.” SoftwareONE, 2019. Web.
Build an event management practice that is situated in the larger service management environment. Purposefully choose valuable events to track and predefine their associated actions to cut down on data clutter.
Event management is useless in isolation. The goals come from the pain points of other ITSM practices. Build handoffs to other service management practices to drive the proper action when an event is detected.
Create a repeatable framework to define monitored events, their root cause, and their associated action. Record your monitored events in a catalog to stay organized.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Engineer your event management practice with tracked events informed by the business impact of the related systems, applications, and services. This storyboard will help you properly define and catalog events so you can properly respond when alerted.
Use this tool to define your workflow for adding new events to track. This cookbook includes the considerations you need to include for every tracked event as well as the roles and responsibilities of those involved with event management.
Use this tool to record your tracked events and alerts in one place. This catalog allows you to record the rationale, root-cause, action, and data governance for all your monitored events.
Use this template to help define your event management handoffs to other service management practices including change management, incident management, and problem management.
Use this tool to implement and continually improve upon your event management process. Record, prioritize, and assign your action items from the event management blueprint.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine goals and challenges for event management and set the scope to business-critical systems.
Defined system scope of Event Management
Roles and responsibilities defined
1.1 List your goals and challenges
1.2 Monitoring and event management RACI
1.3 Abbreviated business impact analysis
Event Management RACI (as part of the Event Management Cookbook)
Abbreviated BIA (as part of the Event Management Cookbook)
Define your in-scope configuration items and their operational conditions
Operational conditions, related CIs and dependencies, and CI thresholds defined
2.1 Define operational conditions for systems
2.2 Define related CIs and dependencies
2.3 Define conditions for CIs
2.4 Perform root-cause analysis for complex condition relationships
2.5 Set thresholds for CIs
Event Management Catalog
Pre-define actions for every monitored event
Thresholds and actions tied to each monitored event
3.1 Set thresholds to monitor
3.2 Add actions and handoffs to event management
Event Catalog
Event Management Workflows
Effectively implement event management
Establish an event management roadmap for implementation and continual improvement
4.1 Define your data policy for event management
4.2 Identify areas for improvement and establish an implementation plan
Event Catalog
Event Management Roadmap
Event management is useless in isolation.
Event management creates no value when implemented in isolation. However, that does not mean event management is not valuable overall. It must simply be integrated properly in the service management environment to inform and drive the appropriate actions.
Every step of engineering event management, from choosing which events to monitor to actioning the events when they are detected, is a purposeful and explicit activity. Ensuring that event management has open lines of communication and actions tied to related practices (e.g. problem, incident, and change) allows efficient action when needed.
Catalog your monitored events using a standardized framework to allow you to know:
Properly engineering event management allows you to effectively monitor and understand your IT environment and bolster the proactivity of the related service management practices.
Benedict Chang
Research Analyst, Infrastructure & Operations
Info-Tech Research Group
Strive for proactivity. Implement event management to reduce response times of technical teams to solve (potential) incidents when system performance degrades.
Build an integrated event management practice where developers, service desk, and operations can all rely on event logs and metrics.
Define the scope of event management including the systems to track, their operational conditions, related configuration items (CIs), and associated actions of the tracked events.
Managed services, subscription services, and cloud services have reduced the traditional visibility of on- premises tools.
System(s) complexity and integration with the above services has increased, making true cause and effect difficult to ascertain.
Clearly define a limited number of operational objectives that may benefit from event management.
Focus only on the key systems whose value is worth the effort and expense of implementing event management.
Understand what event information is available from the CIs of those systems and map those against your operational objectives.
Write a data retention policy that balances operational, audit, and debugging needs against cost and data security needs.
More is NOT better. Even in an AI-enabled world, every event must be collected with a specific objective in mind. Defining the purpose of each tracked event will cut down on data clutter and response time when events are detected.
In 2020, 33% of organizations listed network monitoring as their number one priority for network spending. 27% of organizations listed network monitoring infrastructure as their number two priority.
Source: EMA, 2020; n=350
33% of all IT organizations reported that end users detected and reported incidents before the network operations team was aware of them.
Source: EMA, 2020; n=350
64% of enterprises use 4-10 monitoring tools to troubleshoot their network.
Source: EMA, 2020; n=350
Define how event management informs other management practices.
Monitoring and event management can be used to establish and analyze your baseline. The more you know about your system baselines, the easier it will be to detect exceptions.
Events can inform needed changes to stay compliant or to resolve incidents and problems. However, it doesn’t mean that changes can be implemented without the proper authorization.
The best use case for event management is to detect and resolve incidents and problems before end users or IT are even aware.
Events sitting in isolation are useless if there isn’t an effective way to pass potential tickets off to incident management to mitigate and resolve.
Events can identify problems before they become incidents. However, you must establish proper data logging to inform problem prioritization and actioning.
| 1. Situate Event Management in Your Service Management Environment | 2. Define Your Monitoring Thresholds and Accompanying Actions | 3. Start Monitoring and Implement Event Management | |
|
Phase Steps |
1.1 Set Operational and Informational Goals 1.2 Scope Monitoring and States of Interest |
2.1 Define Conditions and Related CIs 2.2 Set Monitoring Thresholds and Alerts 2.3 Action Your Events |
3.1 Define Your Data Policy 3.2 Define Future State |
|
Event Cookbook Event Catalog |
|||
|
Phase Outcomes |
Monitoring and Event Management RACI Abbreviated BIA |
Event Workflow |
Event Management Roadmap |
The goals come from the pain points of other ITSM practices. Build handoffs to other service management practices to drive the proper action when an event is detected.
Trying to organize a catalog of events is difficult when working from the bottom up. Start with the business drivers of event management to keep the scope manageable.
Defining tracked events with their known conditions, root cause, and associated actions allows you to be proactive when events occur.
Start small if need be. It is better and easier to track a few items with proper actions than to try to analyze events as they occur.
Even in an AI-enabled world, every event must be collected with a specific objective in mind. Defining the purpose of each tracked event will cut down on data clutter and response time when events are detected.
Supplement the predictive value of a single event by aggregating it with other events.
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Event Management Cookbook
Use the framework in the Event Management Cookbook to populate your event catalog with properly tracked and actioned events.
Event Management RACI
Define the roles and responsibilities needed in event management.
Event Management Workflow
Define the lifecycle and handoffs for event management.
Event Catalog
Consolidate and organize your tracked events.
Event Roadmap
Roadmap your initiatives for future improvement.
INDUSTRY - Research and Advisory
SOURCE - Anonymous Interview
One staff member’s workstation had been infected with a virus that was probing the network with a wide variety of usernames and passwords, trying to find an entry point. Along with the obvious security threat, there existed the more mundane concern that workers occasionally found themselves locked out of their machine and needed to contact the service desk to regain access.
The system administrator wrote a script that runs hourly to see if there is a problem with an individual’s workstation. The script records the computer's name, the user involved, the reason for the password lockout, and the number of bad login attempts. If the IT technician on duty notices a greater than normal volume of bad password attempts coming from a single account, they will reach out to the account holder and inquire about potential issues.
The IT department has successfully proactively managed two distinct but related problems: first, they have prevented several instances of unplanned work by reaching out to potential lockouts before they receive an incident report. They have also successfully leveraged event management to probe for indicators of a security threat before there is a breach.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 1 | Phase 2 | Phase 3 |
|---|
|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #2: Introduce the Cookbook and explore the business impact analysis. |
Call #4: Define operational conditions. |
Call #6: Define actions and related practices. |
Call #8: Identify and prioritize improvements. |
|
Call #3: Define system scope and related CIs/ dependencies. |
Call #5: Define thresholds and alerts. |
Call #7: Define data policy. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 6 to 12 calls over the course of 4 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| Situate Event Management in Your Service Management Environment | Define Your Event Management Scope | Define Thresholds and Actions | Start Monitoring and Implement Event Management | Next Steps and Wrap-Up (offsite) | |
|
Activities |
1.1 3.1 Set Thresholds to Monitor 3.2 Add Actions and Handoffs to Event Management Introductions 1.2 Operational and Informational Goals and Challenges 1.3 Event Management Scope 1.4 Roles and Responsibilities |
2.1 Define Operational Conditions for Systems 2.2 Define Related CIs and Dependencies 2.3 Define Conditions for CIs 2.4 Perform Root-Cause Analysis for Complex Condition Relationships 2.4 Set Thresholds for CIs |
3.1 Set Thresholds to Monitor 3.2 Add Actions and Handoffs to Event Management |
4.1 Define Your Data Policy for Event Management 4.2 Identify Areas for Improvement and Future Steps 4.3 Summarize Workshop |
5.1 Complete In-Progress Deliverables From Previous Four Days 5.2 Set Up Review Time for Workshop Deliverables and to Discuss Next Steps |
| Deliverables |
|
|
|
|
|
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
1.1 Set Operational and Informational Goals |
2.1 Define Conditions and Related CIs |
3.1 Define Your Data Policy |
Engineer Your Event Management Process
1.1.1 List your goals and challenges
1.1.2 Build a RACI chart for event management
1.2.1 Set your scope using business impact
Infrastructure management team
IT managers
1.1.1 List your goals and challenges
1.1.2 Build a RACI chart for event management
Set the overall scope of event management by defining the governing goals. You will also define who is involved in event management as well as their responsibilities.
Infrastructure management team
IT managers
Define the goals and challenges of event management as well as their data proxies.
Have a RACI matrix to define roles and responsibilities in event management.
Event management needs to interact with the following service management practices:
Event management may log real-time data for operational goals and non-real time data for informational goals
|
Event Management |
||||
|---|---|---|---|---|
|
Operational Goals (real-time) |
Informational Goals (non-real time) |
|||
|
Incident Response & Prevention |
Availability Scaling |
Availability Scaling |
Modeling and Testing |
Investigation/ Compliance |
Gather a diverse group of IT staff in a room with a whiteboard.
Have each participant write down their top five specific outcomes they want from improved event management.
Consolidate similar ideas.
Prioritize the goals.
Record these goals in your Event Management Cookbook.
| Priority | Example Goals |
|---|---|
| 1 | Reduce response time for incidents |
| 2 | Improve audit compliance |
| 3 | Improve risk analysis |
| 4 | Improve forecasting for resource acquisition |
| 5 | More accurate RCAs |
The infrastructure team is accountable for deciding which events to track, how to track, and how to action the events when detected.
The service desk may respond to events that are indicative of incidents. Setting a root cause for events allows for quicker troubleshooting, diagnosis, and resolution of the incident.
Problem and change management may be involved with certain event alerts as the resultant action could be to investigate the root cause of the alert (problem management) or build and approve a change to resolve the problem (change management).
Download the Event Management Cookbook
| Event Management Task | IT Manager | SME | IT Infrastructure Manager | Service Desk | Configuration Manager | (Event Monitoring System) | Change Manager | Problem Manager |
| Defining systems and configuration items to monitor | R | C | AR | R | ||||
| Defining states of operation | R | C | AR | C | ||||
| Defining event and event thresholds to monitor | R | C | AR | I | I | |||
| Actioning event thresholds: Log | A | R | ||||||
| Actioning event thresholds: Monitor | I | R | A | R | ||||
| Actioning event thresholds: Submit incident/change/problem ticket | R | R | A | R | R | I | I | |
| Close alert for resolved issues | AR | RC | RC | |||||
1.2.1 Set your scope using business impact
Situate Event Management in Your Service Management Environment
Tracking too many events across too many tools could decrease your responsiveness to incidents. Start tracking only what is actionable to keep the signal-to-noise ratio of events as high as possible.
11 Tools: 52">
Source: Riverbed, 2016
| Systems/Services/Applications | Tier | |
|---|---|---|
| 1 | Core Infrastructure | Gold |
| 2 | Internet Access | Gold |
| 3 | Public-Facing Website | Gold |
| 4 | ERP | Silver |
| … | ||
| 15 | PaperSave | Bronze |
It might be tempting to jump ahead and preselect important applications. However, even if an application is not on the top 10 list, it may have cross-dependencies that make it more valuable than originally thought.
For a more comprehensive BIA, see Create a Right-Sized Disaster Recovery Plan
Download the Event Management Cookbook
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
1.1 Set Operational and Informational Goals | 2.1 Define Conditions and Related CIs | 3.1 Define Your Data Policy |
Engineer Your Event Management Process
2.1.1 Define performance conditions
2.1.2 Decompose services into related CIs
For each monitored system, define the conditions of interest and related CIs.
Business system owners
Infrastructure manager
IT managers
List of conditions of interest and related CIs for each monitored system.
2.2.1 Verify your CI conditions with a root-cause analysis
2.2.2 Set thresholds for your events
Set monitoring thresholds for each CI related to each condition of interest.
Business system managers
Infrastructure manager
IT managers
Service desk manager
List of events to track along with their root cause.
Separate the serious from trivial to keep the signal-to-noise ratio high.
You must set your own monitoring criteria based on operational needs. Events triggering an action should be reviewed via an assessment of the potential project and associated risks.
Examples:
Web sever – how many pages per minute
Network – Mbps
Storage – I/O read/writes per sec
Web Server – page load failures
Network – packets dropped
Storage – disk errors
Web Server – % load
Network – % utilization
Storage – % full
RCAs postulate why systems go down; use the RCA to inform yourself of the events leading up to the system going down.
| Dependency | CIs | Tool | Metrics |
|---|---|---|---|
| ISP | WAN | SNMP Traps | Latency |
| Telemetry | Packet Loss | ||
| SNMP Pooling | Jitter | ||
| Network Performance | Web Server | Response Time | |
| Connection Stage Errors | |||
| Web Server | Web Page | DOM Load Time | |
| Performance | |||
| Page Load Time | |||
At the end of the day, most of us can only monitor what our systems let us. Some (like Exchange Servers) offer a crippling number of parameters to choose from. Other (like MPLS) connections are opaque black boxes giving up only the barest of information. The metrics you choose are largely governed by the art of the possible.
Exhaustive RCAs proved that 54% of issues were not caused by storage.
INDUSTRY - Enterprise IT
SOURCE - ESG, 2017
Despite a laser focus on building nothing but all-flash storage arrays, Nimble continued to field a dizzying number of support calls.
Variability and complexity across infrastructure, applications, and configurations – each customer install being ever so slightly different – meant that the problem of customer downtime seemed inescapable.
Nimble embedded thousands of sensors into its arrays, both at a hardware level and in the code. Thousands of sensors per array multiplied by 7,500 customers meant millions of data points per second.
This data was then analyzed against 12,000 anonymized app-data gap-related incidents.
Patterns began to emerge, ones that persisted across complex customer/array/configuration combinations.
These patterns were turned into signatures, then acted on.
54% of app-data gap related incidents were in fact related to non-storage factors! Sub-optimal configuration, bad practices, poor integration with other systems, and even VM or hosts were at the root cause of over half of reported incidents.
Establishing that your system is working fine is more than IT best practice – by quickly eliminating potential options the right team can get working on the right system faster thus restoring the service more quickly.
Event data determined to be of minimal predictive value is shunted aside.
De-duplication and combination of similar events to trigger a response based on the number or value of events, rather than for individual events.
Ignoring events that occur downstream of a known failed system. Relies on accurate models of system relationships.
Initiating the appropriate response. This could be simple logging, any of the exception event responses, an alert requiring human intervention, or a pre-programmed script.
If the event management team toggles the threshold for an alert too low (e.g. one is generated every time a CPU load reaches 60% capacity), they will generate too many false positives and create far too much work for themselves, generating alert fatigue. If they go the other direction and set their thresholds too high, there will be too many false negatives – problems will slip through and cause future disruptions.
| Dependency | Metrics | Threshold |
| Network Performance | Latency | 150ms |
| Packet Loss | 10% | |
| Jitter | >1ms | |
| Web Server | Response Time | 750ms |
| Performance | ||
| Connection Stage Errors | 2 | |
| Web Page Performance | DOM Load time | 1100ms |
| Page Load time | 1200ms | |
2.3.1 Set actions for your thresholds
2.3.2 Build your event management workflow
With your list of tracked events from the previous step, build associated actions and define the handoff from event management to related practices.
Event management team
Infrastructure team
Change manager
Problem manager
Incident manager
Event management workflow
For informational alerts, log the event for future analysis.
For a warning or exception event or a set of events with a well-known root cause, you may have an automated resolution tied to detection.
For warnings and exceptions, human intervention may be needed. This could include manual monitoring or a handoff to incident, change, or problem management.
| Outcome | Metrics | Threshold | Response (s) | |
|---|---|---|---|---|
| Network Performance | Latency | 150ms | Problem Management | Tag to Problem Ticket 1701 |
| Web Page Performance | DOM Load time | 1100ms | Change Management | |
Download the Event Management Catalog
|
Data Fields |
|
|---|---|
|
Device |
Date/time |
|
Component |
Parameters in exception |
|
Type of failure |
Value |
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
1.1 Set Operational and Informational Goals | 2.1 Define Conditions and Related CIs | 3.1 Define Your Data Policy |
3.1.1 Define data policy needs
3.2.1 Build your roadmap
Business system owners
Infrastructure manager
IT managers
Activities
3.1.1 Define data policy needs
Your overall goals from Phase 1 will help define your data retention needs. Document these policy statements in a data policy.
CIO
Infrastructure manager
IT managers
Service desk manager
Outcomes of this step
Data retention policy statements for event management
|
Logs |
Metrics |
||
|---|---|---|---|
|
A log is a complete record of events from a period:
|
Missing entries in logs can be just as telling as the values existing in other entries. | A metric is a numeric value that gives information about a system, generally over a time series. | Adjusting the time series allows different views of the data. |
|
Logs are generally internal constructs to a system:
|
Completeness and context make logs excellent for:
|
As a time series, metrics operate predictably and consistently regardless of system activity. |
This independence makes them ideal for:
|
|
Large amounts of log data can make it difficult to:
|
Context insensitivity means we can apply the same metric to dissimilar systems:
|
||
Source: SolarWinds
| Security | Logs may contain sensitive information. Best practice is to ensure logs are secure at rest and in transit. Tailor your security protocol to your compliance regulations (PCI, etc.). |
|---|---|
| Architecture and Availability | When production infrastructure goes down, logging tends to go down as well. Holes in your data stream make it much more difficult to determine root causes of incidents. An independent secondary architecture helps solve problems when your primary is offline. At the very least, system agents should be able to buffer data until the pipeline is back online. |
| Performance | Log data grows: organically with the rest of the enterprise and geometrically in the event of a major incident. Your infrastructure design needs to support peak loads to prevent it from being overwhelmed when you need it the most. |
| Access Control | Events have value for multiple process owners in your enterprise. You need to enable access but also ensure data consistency as each group performs their own analysis on the data. |
| Retention | Near-real time data is valuable operationally; historic data is valuable strategically. Find a balance between the two, keeping in mind your obligations under compliance frameworks (GDPR, etc.). |
| Metrics/Log | Retention Period | Data Sensitivity | Data Rate |
|---|---|---|---|
| Latency | 150ms | No | |
| Packet Loss | 10% | No | |
| Jitter | >1ms | No | |
| Response Time | 750ms | No | |
| HAProxy Log | 7 days | Yes | 3GB/day |
| DOM Load time | 1100ms | ||
| Page Load time | 1200ms | ||
| User Access | 3 years | Yes |
Download the Event Management Catalog
3.2.1 Build your roadmap
Event management maturity is slowly built over time. Define your future actions in a roadmap to stay on track.
CIO
Infrastructure manager
IT managers
Event management roadmap and action items
Engineer your event management practice to be predictive. For example:
If the expected consequence is not observed there are three places to look:
While impractical to look at every action resulting from an alert, a regular review process will help improve your process. Effective alerts are crafted with specific and measurable outcomes.
False positives are worse than missed positives as they undermine confidence in the entire process from stakeholders and operators. If you need a starting point, action your false positives first.
Mind Your Event Management Errors
Source: IEEE Communications Magazine March 2012
You now have several core systems, their CIs, conditions, and their related events listed in the Event Catalog. Keep the Catalog as your single reference point to help manage your tracked events across multiple tools.
The Event Management Cookbook is designed to be used over and over. Keep your tracked events standard by running through the steps in the Cookbook.
An additional step you could take is to pull the Cookbook out for event tracking for each new system added to your IT environment. Adding events in the Catalog during application onboarding is a good way to manage and measure configuration.
Use the framework in the Event Management Cookbook to populate your event catalog with properly tracked and actioned events.
Add the following in-scope goals for future improvement. Include owner, timeline, progress, and priority.
You now have a structured event management process with a start on a properly tracked and actioned event catalog. This will help you detect incidents before they become incidents, changes needed to the IT environment, and problems before they spread.
Continue to use the Event Management Cookbook to add new monitored events to your Event Catalog. This ensures future events will be held to the same or better standard, which allows you to avoid drowning in too much data.
Lastly, stay on track and continually mature your event management practice using your Event Management Roadmap.
Contact your account representative for more information
workshops@infotech.com
1-888-670-8889
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Define and document the roles and responsibilities in event management.
Define and prioritize in-scope systems and services for event management.
Improve customer service by driving consistency in your support approach and meeting SLAs.
Don’t let persistent problems govern your department
Build a service configuration management practice around the IT services that are most important to the organization.
DeMattia, Adam. “Assessing the Financial Impact of HPE InfoSight Predictive Analytics.” ESG, Softchoice, Sept. 2017. Web.
Hale, Brad. “Estimating Log Generation for Security Information Event and Log Management.” SolarWinds, n.d. Web.
Ho, Cheng-Yuan, et al. “Statistical Analysis of False Positives and False Negatives from Real Traffic with Intrusion Detection/Prevention Systems.” IEEE Communications Magazine, vol. 50, no. 3, 2012, pp. 146-154.
ITIL Foundation ITIL 4 Edition = ITIL 4. The Stationery Office, 2019.
McGillicuddy, Shamus. “EMA: Network Management Megatrends 2016.” Riverbed, April 2016. Web.
McGillicuddy, Shamus. “Network Management Megatrends 2020.” Enterprise Management Associates, APCON, 2020. Web.
Rivas, Genesis. “Event Management: Everything You Need to Know about This ITIL Process.” GB Advisors, 22 Feb. 2021. Web.
“Service Operations Processes.” ITIL Version 3 Chapters, 21 May 2010. Web.
IT communications are often considered ineffective. This is demonstrated by:
Communications is a responsibility of all members of IT. This is demonstrated through:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This capstone blueprint highlights the components, best practices, and importance of good communication for all IT employees.
IT town halls must deliver value to employees, or they will withdraw and miss key messages. To engage employees, use well-crafted communications in an event that includes crowd-sourced contents, peer involvement, recognition, significant Q&A time allotment, organizational discussions, and goal alignment.
This template provides a framework to build your own IT Year In Review presentation. An IT Year In Review presentation typically covers the major accomplishments, challenges, and initiatives of an organization's information technology (IT) department over the past year.
Brittany Lutes
Research Director
Info-Tech Research Group
Diana MacPherson
Senior Research Analyst
Info-Tech Research Group
IT rarely engages in proper communications. We speak at, inform, or tell our audience what we believe to be important. But true communications seldom take place.
Communications only occur when channels are created to ensure the continuous opportunity to obtain two-way feedback. It is a skill that is developed over time, with no individual having an innate ability to be better at communications. Each person in IT needs to work toward developing their personal communications style. The problem is we rarely invest in development or training related to communications. Information and technology fields spend time and money developing hard skills within IT, not soft ones.
The benefits associated with communications are immense: higher business satisfaction, funding for IT initiatives, increased employee engagement, better IT to business alignment, and the general ability to form ongoing partnerships with stakeholders. So, for IT departments looking to obtain these benefits through true communications, develop the necessary skills.
| Your Challenge | Common Obstacles | Info-Tech’s Approach |
IT communications are often considered ineffective. This is demonstrated by:
|
Frequently, these barriers have prevented IT communications from being effective:
|
Communications is a responsibility of all members of IT. This is demonstrated through:
|
Info-Tech Insight
No one is born a good communicator. Every IT employee needs to spend the time and effort to grow their communication skills as constant change and worsening IT crises mean that IT cannot afford to communicate poorly anymore.
The bottom line? For every 10% increase in communications there 8.6% increase in overall IT satisfaction. Therefore, when IT communicates with the organization, stakeholders are more likely to be satisfied with IT overall.
Info-Tech Diagnostic Programs, N=330 organizations
IT struggles to communicate effectively with the organization:
Effective IT communications are rare:
53% of CXOs believe poor communication between business and IT is a barrier to innovation.
Source: Info-Tech CEO-CIO Alignment Survey, 2022
“69% of those in management positions don’t feel comfortable even communicating with their staff.”
Source: TeamStage, 2022
The Info-Tech difference:
Communicating Up to Board or Executives
Communicating Across the Organization
Communicating Within IT
Overarching insight
IT cannot afford to communicate poorly given the overwhelming impact and frequency of change related to technology. Learn to communicate well or get out of the way of someone who can.
| Insight 1: The skills needed to communicate effectively as a frontline employee or a CIO are the same. It’s important to begin the development of these skills from the beginning of one’s career. |
| Insight 2: Time is a non-renewable resource. Any communication needs to be considered valuable and engaging by the audience or they will be unforgiving. |
| Insight 3: Don’t make data your star. It is a supporting character. People can argue about the collection methods or interpretation of the data, but they cannot argue the story you share. |
| Insight 4: Measure if the communication is being received and resulting in the desired outcome. If not, modify what and how the message is being expressed. |
| Insight 5: Messages are also non-verbal. Practice using your voice and body to set the right tone and impact your audience. |
Two-Way
Incorporate feedback loops into your communication efforts. Providing stakeholders with the opportunity to voice their opinions and ideas will help gain their commitment and buy-in.
Timely
Frequent communications mitigate rumors and the spread of misinformation. Provide warning before the implementation of any changes whenever possible. Communicate as soon as possible after decisions have been made.
Consistent
Make sure the messaging is consistent across departments, mediums, and presenters. Provide managers with key phrases to support the consistency of messages.
Open & Honest
Transparency is a critical component of communication. Always tell employees that you will share information as soon as you can. This may not be as soon as you receive the information but as soon as sharing it is acceptable.
Authentic
Write messages in a way that embodies the personality of the organization. Don’t spin information; position it within the wider organizational context.
Targeted
Use your target audience profiles to determine which audiences need to consume which messages and what mediums should be employed.
IT needs to communicate well because:
“Poor communication results in employee misunderstanding and errors that cost approximately $37 billion.”
– Intranet Connections, 2019
What makes internal communications effective?
To be effective, internal communications must be strategic. They should directly support organizational objectives, reinforce key messages to make sure they drive action, and facilitate two-way dialogue, not just one-way messaging.
Methods to determine effectiveness:
“‘Effectiveness’ can mean different things, and effectiveness for your project is going to look different than it would for any other project.”
– Gale McCreary in WikiHow, 2022
Keep in mind:
| 1 | 2 | 3 |
|---|---|---|
| Priorities Differ | Words Matter | The Power of Three |
| What’s important to you as CIO is very different from what is important to a board or executive leadership team or even the individual members of these groups. Share only what is important or relevant to the stakeholder(s). | Simplify the message into common language whenever possible. A good test is to ensure that someone without any technical background could understand the message. | Keep every slide to three points with no more than three words. You are the one to translate this information into a worth-while story to share. |
“Today’s CIOs have a story to tell. They must change the old narrative and describe the art of the (newly) possible. A great leader rises to the occasion and shares a vision that inspires the entire organization.”
– Dan Roberts, CIO, 2019
DEFINING INSIGHT
Stop presenting what is important to you as the CIO and present to the board what is important to them.
Why does IT need to communicate with the board?
FRAMEWORK
CHECKLIST
Do’s & Don’ts of Communicating Board Presentations:
Do: Ensure you know all the members of the board and their strengths/areas of focus.
Do: Ensure the IT objectives and initiatives align to the business objectives.
Do: Avoid using any technical jargon.
Do: Limit the amount of data you are using to present information. If it can’t stand alone, it isn’t a strong enough data point.
Do: Avoid providing IT service metrics or other operational statistics.
Do: Demonstrate how the organization’s revenue is impacted by IT activities.
Do: Tell a story that is compelling and excited.
OUTCOME
Organization Alignment
Stakeholder Buy-In
Awareness on Technology Trends
Risks
DEFINING INSIGHT
Business leaders care about themselves and their goals – present ideas and initiatives that lean into this self-interest.
Why does IT need to communicate business updates?
FRAMEWORK
CHECKLIST
Do’s & Don’ts of Communicating Business Updates:
Do: Ensure IT is given sufficient time to present with the rest of the business leaders.
Do: Ensure the goals of IT are clear and can be depicted visually.
Do: Tie every IT goal to the objectives of different business leaders.
Do: Avoid using any technical jargon.
Do: Reinforce the positive benefits business leaders can expect.
Do: Avoid providing IT service metrics or other operational statistics.
Do: Demonstrate how IT is driving the digital transformation of the organization.
OUTCOME
Better Reputation
Executive Buy-In
Digital Transformation
Relationship Building
| 1 | 2 | 3 |
|---|---|---|
| Competing to Be Heard | Measure Impact | Enhance the IT Brand |
| IT messages are often competing with a variety of other communications simultaneously taking place in the organization. Avoid the information-overload paradox by communicating necessary, timely, and relevant information. | Don’t underestimate the benefit of qualitative feedback that comes from talking to people within the organization. Ensure they read/heard and absorbed the communication. | IT might be a business enabler, but if it is never communicated as such to the organization, it will only be seen as a support function. Use purposeful communications to change the IT narrative. |
Less than 50% of internal communications lean on a proper framework to support their communication activities.
– Philip Nunn, iabc, 2020
DEFINING INSIGHT
IT leaders struggle to communicate how the IT strategy is aligned to the overall business objectives using a common language understood by all.
Why does IT need to communicate its strategic objectives?
FRAMEWORK
CHECKLIST
Do’s & Don’ts of Communicating IT Strategic Objectives:
Do: Ensure all IT leaders are aware of and understand the objectives in the IT strategy.
Do: Ensure there is a visual representation of IT’s goals.
Do: Ensure the IT objectives and initiatives align to the business objectives.
Do: Avoid using any technical jargon.
Do: Provide metrics if they are relevant, timely, and immediately understandable.
Do: Avoid providing IT service metrics or other operational statistics.
Do: Demonstrate how the future of the organization will benefit from IT initiatives.
OUTCOME
Organization Alignment
Stakeholder Buy-In
Role Clarity
Demonstrate Growth
DEFINING INSIGHT
A crisis communication should fit onto a sticky note. If it’s not clear, concise, and reassuring, it won’t be effectively understood by the audience.
Why does IT need to communicate when a crisis occurs?
FRAMEWORK
CHECKLIST
Do’s & Don’ts of Communicating During a Crisis:
Do: Provide timely and regular updates about the crisis to all stakeholders.
Do: Involve the Board or ELT immediately for transparency.
Do: Avoid providing too much information in a crisis communication.
Do: Have crisis communication statements ready to be shared at any time for possible or common IT crises.
Do: Highlight that employee safety and wellbeing is top priority.
Do: Work with members of the public relations team to prepare any external communications that might be required.
OUTCOME
Ready to Act
Reduce Fears
Maintain Trust
Eliminate Negative Reactions
Keep in mind:
| 1 | 2 | 3 |
|---|---|---|
| Training for All | Listening Is Critical | Reinforce Collaboration |
| From the service desk technician to CIO, every person within IT needs to have a basic ability to communicate. Invest in the training necessary to develop this skill set. | It seems simple, but as humans we do an innately poor job at listening to others. It’s important you hear employee concerns, feedback, and recommendations, enabling the two-way aspect of communication. | IT employees will reflect the types of communications they see. If IT leaders and managers cannot collaborate together, then teams will also struggle, leading to productivity and quality losses. |
“IT professionals who […] enroll in communications training have a chance to both upgrade their professional capabilities and set themselves apart in a crowded field of technology specialists.”
– Mark Schlesinger, Forbes, 2021
DEFINING INSIGHT
Depending on IT goals, the structure might need to change to support better communication among IT employees.
Why does IT need to communicate IT activities?
FRAMEWORK
CHECKLIST
Do’s & Don’ts of Communicating IT Activities:
Do: Provide metrics that define how success of the project will be measured.
Do: Demonstrate how each project aligns to the overarching objectives of the organization.
Do: Avoid having large meetings that include stakeholders from two or more projects.
Do: Consistently create a safe space for employees to communicate risks related to the project(s).
Do: Ensure the right tools are being leveraged for in-office, hybrid, and virtual environments to support project collaboration.
Do: Leverage a project management software to reduce unnecessary communications.
OUTCOME
Stakeholder Adoption
Resource Allocation
Meet Responsibly
Encourage Engagement
DEFINING INSIGHT
Employees are looking for empathy to be demonstrated by those they are interacting with, from their peers to managers. Yet, we rarely provide it.
Why does IT need to communicate on regularly with itself?
FRAMEWORK
CHECKLIST
Do’s & Don’ts of Communicating within IT:
Do: Have responses for likely questions prepared and ready to go.
Do: Ensure that all leaders are sharing the same messages with their teams.
Do: Avoid providing irrelevant or confusing information.
Do: Speak with your team on a regular basis.
Do: Reinforce the messages of the organization every chance possible.
Do: Ensure employees feel empowered to do their jobs effectively.
Do: Engage employees in dialogue. The worst employee experience is when they are only spoken at, not engaged with.
OUTCOME
Increased Collaboration
Role Clarity
Prevent Rumors
Organizational Insight
Amazon
INDUSTRY
E-Commerce
SOURCE
Harvard Business Review
Jeff Bezos has definitely taken on unorthodox approaches to business and leadership, but one that many might not know about is his approach to communication. Some of the key elements that he focused on in the early 2000s when Amazon was becoming a multi-billion-dollar empire included:
Results
While he was creating the Amazon empire, 85% of Jeff Bezos’ communication was written in a way that an eighth grader could read. Communicating in a way that was easy to understand and encouraging his leadership team to do so as well is one of the many reasons this business has grown to an estimated value of over $800B.
“If you cannot simplify a message and communicate it compellingly, believe me, you cannot get the masses to follow you.”
– Indra Nooyi, in Harvard Business Review, 2022
| Demonstrated Communication Behavior | |
| Level 1: Follow | Has sufficient communication skills for effective dialogue with others. |
| Level 2: Assist | Has sufficient communication skills for effective dialogue with customers, suppliers, and partners. |
| Level 3: Apply | Demonstrates effective communication skills. |
| Level 4: Enable | Communicates fluently, orally, and in writing and can present complex information to both technical and non-technical audiences. |
| Level 5: Ensure, Advise | Communicates effectively both formally and informally. |
| Level 6: Initiate, Influence | Communicates effectively at all levels to both technical and non-technical audiences. |
| Level 7: Set Strategy, Inspire, Mobilize | Understands, explains, and presents complex ideas to audiences at all levels in a persuasive and convincing manner. |
Source: Skills Framework for the Information Age, 2021
| Goal | Key Performance Indicator (KPI) | Related Resource |
| Obtain board buy-in for IT strategic initiatives | X% of IT initiatives that were approved to be funded. Number of times technical initiatives were asked to be explained further. | Using our Board Presentation Review service |
| Establish stronger relationships with executive leaders | X% of business leadership satisfied with the statement “IT communicates with your group effectively.” | Using the CIO Business Vision Diagnostic |
| Organizationally, people know what products and services IT provides | X% of end users who are satisfied with communications around changing services or applications. | Using the End-User Satisfaction Survey |
| Organizational reach and understanding of the crisis. | Number of follow-up tickets or requests related to the crisis after the initial crisis communication was sent. | Using templates and tools for crisis communications |
| Project stakeholders receive sufficient communication throughout the initiative. | X% overall satisfaction with the quality of the project communications. | Using the PPM Customer Satisfaction Diagnostic |
| Employee feedback is provided, heard, and acted on | X% of satisfaction employees have with managers or IT leadership to act on employee feedback. | Using the Employee Engagement Diagnostic Program |
Introduction
Communications overview.
Plan
Plan your communications using a strategic tool.
Compose
Create your own message.
Deliver
Practice delivering your own message.
Contact your account representative for more information. workshops@infotech.com 1-888-670-8889
Anuja Agrawal
National Communications Director
PwC
Anuja is an accomplished global communications professional, with extensive experience in the insurance, banking, financial, and professional services industries in Asia, the US, and Canada. She is currently the National Communications Director at PwC Canada. Her prior work experience includes communication leadership roles at Deutsche Bank, GE, Aviva, and Veritas. Anuja works closely with senior business leaders and key stakeholders to deliver measurable results and effective change and culture building programs. Anuja has experience in both internal and external communications, including strategic leadership communication, employee engagement, PR and media management, digital and social media, and M&A/change and crisis management. Anuja believes in leveraging digital tools and technology-enabled solutions, combined with in-person engagement, to help improve the quality of dialogue and increase interactive communication within the organization to help build an inclusive culture of belonging.
Nastaran Bisheban
Chief Technology Officer
KFC Canada
A passionate technologist, and seasoned transformational leader. A software engineer and computer scientist by education, a certified Project Manager that holds an MBA in Leadership with Honors and Distinction from University of Liverpool. A public speaker on various disciplines of technology and data strategy with a Harvard Business School executive leadership program training to round it all. Challenges status quo and conventional practices; is an advocate for taking calculated risk and following the principle of continuous improvement. With multiple computer software and project management publications she is a strategic mentor and board member on various non-profit organizations. Nastaran sees the world as a better place only when everyone has a seat at the table and is an active advocate for diversity and inclusion.
Heidi Davidson
Co-Founder & CEO
Galvanize Worldwide and Galvanize On Demand
Dr. Heidi Davidson is the co-founder and CEO of Galvanize Worldwide, the largest distributed network of marketing and communications experts in the world. She also is the co-founder and CEO of Galvanize On Demand, a tech platform that matches marketing and communications freelancers with client projects. Now with 167 active experts, the Galvanize team delivers startup advisory work, outsourced marketing, training, and crisis communications to organizations of all sizes. Before Galvanize, Heidi spent four years as part of the turnaround team at BlackBerry as the Chief Communications Officer and SVP of Corporate Marketing, where she helped the company move from a device manufacturer to a security software provider.
Eli Gladstone
Co-Founder
Speaker Labs
Eli is a co-founder of Speaker Labs. He has spent over six years helping countless individuals overcome their public speaking fears and communicate with clarity and confidence. When he’s not coaching others on how to build and deliver the perfect presentation, you’ll probably find him reading some weird books, teaching his kids how to ski or play tennis, or trying to develop a good-enough jumpshot to avoid being a liability on the basketball court.
Francisco Mahfuz
Keynote Speaker & Storytelling Coach
Francisco Mahfuz has been telling stories in front of audiences for a decade and even became a National Champion of public speaking. Today, Francisco is a keynote speaker and storytelling coach and offers communication training to individuals and international organizations and has worked with organizations like Pepsi, HP, the United Nations, Santander, and Cornell University. He’s the author of Bare: A Guide to Brutally Honest Public Speaking and the host of The Storypowers Podcast, and he’s been part of the IESE MBA communications course since 2020. He’s received a BA in English Literature from Birkbeck University in London.
Sarah Shortreed
EVP & CTO
ATCO Ltd.
Sarah Shortreed is ATCO’s Executive Vice President and Chief Technology Officer. Her responsibilities include leading ATCO’s Information Technology (IT) function as it continues to drive agility and collaboration throughout ATCO’s global businesses and expanding and enhancing its enterprise IT strategy, including establishing ATCO’s technology roadmap for the future. Ms. Shortreed’s skill and expertise are drawn from her more than 30-year career that spans many industries and includes executive roles in business consulting, complex multi-stakeholder programs, operations, sales, customer relationship management, and product management. She was recently the Chief Information Officer at Bruce Power and has previously worked at BlackBerry, IBM, and Union Gas. She sits on the Board of Governors for the University of Western Ontario and is the current Chair of the Chief Information Officer (CIO) Committee at the Conference Board of Canada.
Eric Silverberg
Co-Founder
Speaker Labs
Eric is a co-founder of Speaker Labs and has helped thousands of people build their public speaking confidence and become more dynamic and engaging communicators. When he’s not running workshops to help people grow in their careers, there’s a good chance you’ll find him with his wife and dog, drinking Diet Coke, and rewatching iconic episodes of the reality TV show Survivor! He’s such a die-hard fan, that you’ll probably see him playing the game one day.
Stephanie Stewart
Communications Officer & DR Coordinator
Info Security Services Simon Fraser University
Steve Strout
President
Miovision Technologies
Mr. Strout is a recognized and experienced technology leader with extensive experience in delivering value. He has successfully led business and technology transformations by leveraging many dozens of complex global SFDC, Oracle, and SAP projects. He is especially adept at leading what some call “Project Rescues” – saving people’s careers where projects have gone awry; always driving “on-time and on-budget.” Mr. Strout is the current President of Miovision Technologies and the former CEO and board member of the Americas’ SAP Users” Group (ASUG). His wealth of practical knowledge comes from 30 years of extensive experience in many CxO and executive roles at some prestigious organizations such as Vonage, Sabre, BlackBerry, Shred-it, The Thomson Corporation (now Thomson Reuters), and Morris Communications. He has served on boards including Customer Advisory Boards of Apple, AgriSource Data, Dell, Edgewise, EMC, LogiSense, Socrates.ai, Spiro Carbon Group, and Unifi.
Plus an additional two contributors who wish to remain anonymous.
During a crisis it is important to communicate to employees through messages that convey calm and are transparent and tailored to your audience. Use the Crisis Communication Guides to:
“Communication in the Workplace Statistics: Importance and Effectiveness in 2022.” TeamStage, 2022.
Gallo, Carmine. “How Great Leaders Communicate.” Harvard Business Review, 23 November 2022
Guthrie, Georgina. “Why Good Internal Communications Matter Now More than Ever.” Nulab, 15 December 2021.
Lambden, Duncan. “The Importance of Effective Workplace Communication – Statistics for 2022.” Expert Market, 13 June 2022.
“Mapping SFIA Levels of Responsibilities to Behavioural Factors.” Skills Framework for the Information Age, 2021.
McCreary, Gale. “How to Measure the Effectiveness of Communication: 14 Steps.” WikiHow, 31 March 2023.
Nowak, Marcin. “Top 7 Communication Problems in the Workplace.” MIT Enterprise Forum CEE, 2021.
Nunn, Philip. “Messaging That Works: A Unique Framework to Maximize Communication Success.” iabc, 26 October 2020.
Picincu, Andra. “How to Measure Effective Communications.” Small Business Chron. 12 January 2021.
Price. David A. “Pixar Story Rules.” Stories From the Frontiers of Knowledge, 2011.
Roberts, Dan. “How CIOs Become Visionary Communicators.” CIO, 2019.
Schlesinger, Mark. “Why building effective communication skill in IT is incredibly important.” Forbes, 2021.
Stanten, Andrew. “Planning for the Worst: Crisis Communications 101.” CIO, 25 May 2017.
State of the American Workplace Report. Gallup, 6 February 2020.
“The CIO Revolution.” IBM, 2021.
“The State of High Performing Teams in Tech 2022.” Hypercontex, 2022.
Walters, Katlin. “Top 5 Ways to Measure Internal Communication.” Intranet Connections, 30 May 2019.
Brilliant little and very amusing way to deal with a scammer.
But do not copy this method as it will actually reveal quite a bit and confirm that your email is valid and active.
Addressing and managing the negotiation debriefing process will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This phase will help you debrief after each negotiation session and identify the parts of your strategy that must be modified before your next negotiation session.
This phase will help you conduct evaluations at three critical points after the negotiations have concluded.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Improve negotiation skills and outcomes; share lessons learned.
Understand the value of debriefing sessions during the negotiation process.
Understand how to use the Info-Tech After Negotiations Tool.
A better understanding of how and when to debrief during the negotiation process to leverage key insights.
The After Negotiations Tool will be reviewed and configured for the customer’s environment (as applicable).
1.1 Debrief after each negotiation session
1.2 Determine next steps
1.3 Return to preparation phase
1.4 Conduct Post Mortem #1
1.5 Conduct Implementation Assessment
1.6 Conduct Post Mortem #2
Negotiation Session Debrief Checklist and Questionnaire
Next Steps Checklist
Discussion
Post Mortem #1 Checklist & Dashboard
Implementation Assessment Checklist and Questionnaire
Post Mortem #2 Checklist & Dashboard
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you understand the spectrum of different Agile xOps working modes and how best to leverage them and build an architecture and toolset that support rapid continuous IT operations
IT Operations continue to be challenged by increasing needs for scale and speed, often in the face of constrained resources and time. For most, Agile methodologies have become a foundational part of tackling this problem. Since then, we've seen Agile evolve into DevOps, which started a trend into different categories of "xOps" that are too many to count. How does one make sense of the xOps spectrum? What is InfraOps and where does it fit in?
Ultimately, all these methodologies and approaches are there to serve the same purpose: increase effectiveness through automation and improve governance through visibility. The key is to understand what tools and methodologies will deliver actual benefits to your IT operation and to the organization as a whole.
By defining your end goals and framing solutions based on the type of visibility and features you need, you can enable speed and reliability without losing control of the work.
InfraOps, when applied well, should be the embodiment of the governance policies as expressed by standards in architecture and automation.
|
Understand the xOps spectrum |
There are as many different types of "xOps" as there are business models and IT teams. To pick the approaches that deliver the best value to your organization and that align to your way of operating, it's important to understand the different major categories in the spectrum and how they do or don't apply to your IT approach. |
|---|---|
|
How to optimize the Ops in DevOps |
InfraOps is one of the major methodologies to address a key problem in IT at cloud scale: eliminating friction and error from your deliveries and outputs. The good news is there are architectures, tools, and frameworks you can easily leverage to make adopting this approach easier. |
|
Evolve to integration and build a virtuous cycle |
Ultimately your DevOps and InfraOps approaches should embody your governance needs via architecture and process. As time goes on, however, both your IT footprint and your business environment will shift. Build your tools, telemetry, and governance to anticipate and adapt to change and build a virtuous cycle between development needs and IT Operations tools and governance. |
There is no definitive list of x's in the xOps spectrum. Different organizations and teams will divide and define these in different ways. In many cases, the definitions and domains of various xOps will overlap.
Some of the commonly adopted and defined xOps models are listed here.
Shifting left or right isn't an either/or choice. They're more like opposite sides of the same coin. Like the different xOps approaches, usually more than one shift approach will apply to your IT Operations.
With the shift from execution to governing and validating, the role of deployment falls downstream of IT Operations.
IT Operations needs to move to a mindset that focuses on creating the guardrails, enforced standards, and compliance rules that need to be used downstream, then apply those standards using automation and tooling to remove friction and error from the interstitia (the white spaces between chevrons) of the various phases.
Your tools can be broken into two categories:
Keep in mind that while your infrastructure architecture is usually an either/or choice, your automation approach should use any and all tooling that helps.
Hyperconvergence is the next phase of convergence, virtualizing servers, networks, and storage on a single server/storage appliance. Capacity scales as more appliances are added to a cluster or stack.
The disruptive departure:
HCI follows convergence trends of the past ten years but is also a departure from how IT infrastructure has traditionally been provisioned and managed.
HCI is at the same time a logical progression of infrastructure convergence and a disruptive departure.
HCI can be the foundation block for a fully software defined data center, a prerequisite for private cloud.
Key attributes of a cloud are automation, resource elasticity, and self-service. This kind of agility is impossible if physical infrastructure needs intervention.
Virtualization alone does not a private cloud make, but complete stack virtualization (software defined) running on a hands-off preconfigured HCI appliance (or group of appliances) provides a solid foundation for building cloud services.
Silo-busting and private cloud sound great, but are your people and processes able to manage the change?
In traditional infrastructure, performance and capacity are managed as distinct though complementary jobs. An all-in-one approach may not work.
Use Case Example: Composable AI flow
Data Ingestion > Data Cleaning/Tagging > Training > Conclusion
Where it's useful
Considerations
Many organizations using a traditional approach report resource stranding as having an impact of 20% or more on efficiency. When focusing specifically on the stranding of memory in workloads, the number can often approach 40%.
Infrastructure as code (IaC) is the process of managing and provisioning computer data centers through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.
Before IaC, IT personnel would have to manually change configurations to manage their infrastructure. Maybe they would use throwaway scripts to automate some tasks, but that was the extent of it.
With IaC, your infrastructure's configuration takes the form of a code file, making it easy to edit, copy, and distribute.
Orchestration describes the automated arrangement, coordination, and management of complex computer systems, middleware, and services.
This usage of orchestration is often discussed in the context of service-oriented architecture, virtualization, provisioning, converged infrastructure, and dynamic data center topics. Orchestration in this sense is about aligning the business request with the applications, data, and infrastructure.
It defines the policies and service levels through automated workflows,
provisioning, and change management. This creates an application-aligned infrastructure that can be scaled up or down based on the needs of each application.
As the requirement for more resources or a new application is triggered, automated tools now can perform tasks that previously could only be done by multiple administrators operating on their individual pieces of the physical stack.
Orchestration also provides centralized management of the resource pool, including billing, metering, and chargeback for consumption. For example, orchestration reduces the time and effort for deploying multiple instances of a single application.
Automation and orchestration tools can be key components of an effective governance toolkit too! Remember to understand what data can be pulled from your various tools and leveraged for other purposes such as cost management and portfolio roadmapping.
Configuration Management
|
Configuration Management |
|
|---|---|
|
CI/CD |
|
|
Container |
|
|
Cloud-Specific |
|
|
PaaS |
Automation and orchestration tools and software offerings are plentiful, and many of them have a different focus on where in the application delivery ecosystem they provide automation functionality.
Often there are different tools for different deployment and service models as well as for different functional phases for each service model.
Let the large ecosystem of tools be your ally. Leverage the right tools where needed and then address the complexity of tools using a master orchestration scheme.
Additionally, most tools do not cover all aspects required for most automation implementations, especially in hybrid cloud scenarios.
As such, often multiple tools must be deployed, which can lead to fragmentation and loss of unified controls.
Many enterprises address this fragmentation using a cloud management platform approach.
One method of achieving this is to establish a higher layer of orchestration – an "orchestrator of orchestrators," or metaorchestration.
In complex scenarios, this can be a challenge that requires customization and development.
| Toolkit | Pros | Cons | Tips |
|---|---|---|---|
| HCI | Easy scale out | Shift in skills required | Good for enabling automation and hybridization with current-gen public cloud services |
| CI | Maximal workload resource efficiency | Investment in new fabrics and technologies | Useful for very dynamic or highly scalable workloads like AI |
| IaC | Error reduction and standardization | Managing drift in standards and requirements | Leverage a standards and exception process to keep track of drift |
| A&O | Key enabler of DevOps automation within phases | Usually requires multiple toolsets/frameworks | Use the right tools and stitch together at the metaorchestration layer |
| Metaorchestration | Reduces the complexity of a diverse A&O and IaC toolkit | Requires understanding of the entire ecosystems of tools used | Key layer of visibility and control for governance |
Remember, the goal is to increase speed AND reliability. That's why we focus on removing friction from our delivery pipelines.
Remember that, especially in modern and rapid methodologies, your IT footprint can drift unexpectedly. This means you need a real feedback mechanism on where the friction moves to next.
This is particularly important in more Agile methodologies.
| Plan | Code | Test | Deploy | Monitor | |
|---|---|---|---|---|---|
| Incoming Friction | |||||
| In-Cycle Friction | |||||
| Outgoing Friction |
Map your ops groups to the delivery cycles in your pipeline. How many delivery cycles do you have or need?
Good InfraOps is a reflection of governance policies, expressed by standards in architecture and automation.
Evaluate Hyperconverged Infrastructure for Your Infrastructure Roadmap
Banks, Ethan, host. "Choosing Your Next Infrastructure." Datanauts, episode 094, Packet Pushers, 26 July 2017. Podcast.
"Composable Infrastructure Solutions." Hewlett Packard Canada, n.d. Web.
"Composable Infrastructure Technology." Liqid Inc., n.d. Web.
"DataOps architecture design." Azure Architecture Center, Microsoft Learn, n.d. Web.
Tan, Pei Send. "Differences: DevOps, ITOps, MLOps, DataOps, ModelOps, AIOps, SecOps, DevSecOps." Medium, 5 July 2021. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Bring the business into the room, align your objectives for choosing certain cloud capabilities, and characterize your ideal PaaS environment as a result of your understanding of what the business is trying to achieve. Understand how to right-size your application in the cloud to maintain or improve its performance.
Assess the application against Info-Tech’s design scorecard to evaluate the right design approach to migrating the application to PaaS. Pick the appropriate cloud path and begin the first step to migrating your app – gathering your requirements.
[infographic]
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This publication will validate if the PMP certification is still valuable and worth your time. In addition, you will gain different perspectives related to other PMI and non-PMI certifications. You will gain a better understanding of the evolution of the PMBOK Guide, and the significant changes made from PMBOK 6th edition to the 7th edition.
I often get asked, “Is the PMP worth it?” I then proceed with a question of my own: “If it gets you an interview or a foot in the door or bolsters your salary, would it be worth it?” Typically, the answer is a resounding “YES!”
CIO magazine ranked the PMP as the top project management certification in North America because it demonstrates that you have the specific skills employers seek, dedication to excellence, and the capacity to perform at the highest levels.
Given its popularity and the demand in the marketplace, I strongly believe it is still worth your time and investment. The PMP is a globally recognized certification that has dominated for decades. It is hard to overlook the fact that the Project Management Institute (PMI) has more than 1.2 million PMP certification holders worldwide and is still considered the gold standard for project management.
Yes, it’s worth it. It gets you interviews, a foot in the door, and bolsters your salary. Oh, and it makes you a more complete project manager.
Your Challenge
The PMP certification has lost its sizzle while other emerging certifications have started to penetrate the market. It’s hard to distinguish which certification still holds weight. |
Common Obstacles
There are other, less intensive certifications available. It’s unclear what will be popular in the future. |
Info-Tech's Approach
There are a lot of certification options out there, and every day there seems to be a new one that pops up. Wait and see how the market reacts before investing your time and money in a new certification. |
The PMP certification is still valuable and worthy of your time in 2023.
DIY Toolkit"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." |
Guide Implementation"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." |
Workshop"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." |
Consulting"Our team does not have the time or knowledge to take this project on. We need assistance through the entirety of the this project." |
The PMI’s flagship PMP certification numbers have not significantly increased from 2021 to 2022. However, PMP substantially outpaces all competitors with over 1.2 million certified PMPs.
Source: projectmanagement.com
Source: PMI, “PMP Certification.” PMI, “Why You Should Get the PMP.”
79% of project managers surveyed have the PMP certification out of 30,000 respondents in 40 countries.
The PMP became table stakes for jobs in project management and PMO’s.
Source: PMI’s Earning Power: Project Management Salary Survey—Twelfth Edition (2021)
Timeline adapted from Wikipedia, “Project Management Body of Knowledge.”
Roughly every 3-5 years, the PMI has released a new PMBOK version. It’s unclear if there will be an eighth edition.
Source: projectmanagement.com as of July 2022


PMP – Project Management Professional
It is a concerning trend that their bread and butter, the PMP flagship certification, has largely stalled in 2022. We are unsure if this was attributed to them being displaced by competitors such as the Agile Alliance, their own Agile offerings, or the market’s lackluster reaction to PMBOK Guide – Seventh Edition.
Source: projectmanagement.com as of July 2022

The PMI’s membership appears to have a direct correlation to the PMP numbers. As the PMP number stalls, so do the PMI’s memberships.
Source: projectmanagement.com as of July 2022
Source: projectmanagement.com as of July 2022
PRINCE2 and CSM appear to be the more popular ones in the market.
In April 2022, CIO.com outlined other popular project management certifications outside of the PMI.
Source: CIO.com
Source: PMI, Narrowing The Talent Gap, 2021

Source: PMI, “Agile Certifications,” and ScrumAlliance, “Become a Certified ScrumMaster.”
There is a lot of chatter about which Agile certification is better, and the jury is still out with no consensus. There are pros and cons to both certifications. We believe the PMI-ACP will give you more mileage and flexibility because of its breath of coverage in the Agile practice compared to the CSM.
1. PMI, Talent Gap, 2021.
2. PM Network, 2019.
The median salary for PMP holders in the US is 25% higher than those without PMP certification.
On a global level, the Project Management Professional (PMP) certification has been shown to bolster salary levels. Holders of the PMP certification report higher median salaries than those without a PMP certification – 16% higher on average across the 40 countries surveyed.
Source: PMI, Earning Power, 2021
Source: PMI, Narrowing The Talent Gap, 2021.
According to the PMI Megatrends 2022 report, they have identified six areas as the top digital-age skills for product delivery:
Many organizations aren’t considering candidates who don’t have project-related qualifications. Indeed, many more are increasing the requirements for their qualifications than those who are reducing it.
Source: PMI, Narrowing The Talent Gap, 2021
Currently, there is an imbalance with more emphasis of training on tools, processes, techniques, and methodologies rather than business acumen skills, collaboration, and management skills. With the explosion of remote work, training needs to be revamped and, in some cases, redesigned altogether to accommodate remote employees.

Lack of strategic prioritization is evident in how training and development is being done, with organizations largely not embracing a diversity of learning preferences and opportunities.
Source: PMI, Narrowing The Talent Gap, 2021
Project managers are evolving. No longer creatures of scope, schedule, and budget alone, they are now – enabled by new technology – focusing on influencing outcomes, building relationships, and achieving the strategic goals of their organizations.
Source: PMI, Narrowing the Talent Gap, 2021
Talent managers will need to retool their toolbox to fill the capability gap and to look beyond where the role is geographically based by embracing flexible staffing models.
They will need to evolve their talent strategies in line with changing business priorities.
Organizations should be actively working to increase the diversity of candidates and upskilling young people in underrepresented communities as a priority.
Most organizations are still relying on traditional approaches to recruit talent. Although we are prioritizing power skills and business acumen, we are still searching in the same, shrinking pool of talent.
Source: PMI, Narrowing the Talent Gap, 2021.
“Agile Certifications for Every Step in Your Career.” PMI. Web.
“Become a Certified ScrumMaster and Help Your Team Thrive.” ScrumAlliance. Web.
“Become a Project Manager.” PMI. Accessed 14 Sept. 2022.
Bucero, A. “The Next Evolution: Young Project Managers Will Change the Profession: Here's What Organizations Need to Know.” PM Network, 2019, 33(6), 26–27.
“Certification Framework.” PMI. Accessed 14 Sept. 2022.
“Certifications.” PMI. Accessed 14 Sept. 2022.
DePrisco, Mike. Global Megatrends 2022. “Foreword.” PMI, 2022. Accessed 14 Sept. 2022.
Earning Power: Project Management Salary Survey. 12th ed. PMI, 2021. Accessed 14 Sept. 2022.
“Global Research From PMI and PwC Reveals Attributes and Strategies of the World’s Leading Project Management Offices.” PMI, 1 Mar. 2022. Press Release. Accessed 14 Sept. 2022.
Narrowing the Talent Gap. PMI, 2021. Accessed 14 Sept. 2022.
“PMP Certification.” PMI. Accessed 4 Aug. 2022.
“Project Management Body of Knowledge.” Wikipedia, Wikimedia Foundation, 29 Aug. 2022.
“Project Portfolio Management Pulse Survey 2021.” PwC. Accessed 30 Aug. 2022.
Talent Gap: Ten-Year Employment Trends, Costs, and Global Implications. PMI. Accessed 14 Sept. 2022.
“The Critical Path.” ProjectManagement.com. Accessed 14 Sept. 2022.
“True Business Agility Starts Here.” PMI. Accessed 14 Sept. 2022.
White, Sarah K. and Sharon Florentine. “Top 15 Project Management Certifications.” CIO.com, 22 Apr. 2022. Web.
“Why You Should Get the PMP.” PMI. Accessed 14 Sept. 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This phase addresses the benefits and challenges of incident response communications and offers advice on how to assemble a communications team and develop a threat escalation protocol.
This phase focuses on creating an internal and external communications plan, managing incident fallout, and conducting a post-incident review.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Engage stakeholders to develop a vision for the project and perform a comprehensive assessment of existing service desks.
Outline the target state of the consolidated service desk and assess logistics and cost of consolidation.
Build a project roadmap and communication plan.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify and engage key stakeholders.
Conduct an executive visioning session to define the scope and goals of the consolidation.
A list of key stakeholders and an engagement plan to identify needs and garner support for the change.
A common vision for the consolidation initiative with clearly defined goals and objectives.
1.1 Identify key stakeholders and develop an engagement plan.
1.2 Brainstorm desired service desk attributes.
1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk.
1.4 Define project goals, principles, and KPIs.
Stakeholder Engagement Workbook
Executive Presentation
Assess the overall maturity, structure, organizational design, and performance of each service desk.
Assess current ITSM tools and how well they are meeting needs.
A robust current state assessment of each service desk.
An understanding of agent skills, satisfaction, roles, and responsibilities.
An evaluation of existing ITSM tools and technology.
2.1 Review the results of diagnostics programs.
2.2 Map organizational structure and roles for each service desk.
2.3 Assess overall maturity and environment of each service desk.
2.4 Assess current information system environment.
Consolidate Service Desk Assessment Tool
Define the target state for consolidated service desk.
Identify requirements for the service desk and a supporting solution.
Detailed requirements and vision for the consolidated service desk.
Gap analysis of current vs. target state.
Documented standardized processes and procedures.
3.1 Identify requirements for target consolidated service desk.
3.2 Build requirements document and shortlist for ITSM tool.
3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state.
3.4 Document standardized processes for new service desk.
Consolidate Service Desk Scorecard Tool
Consolidated Service Desk SOP
Break down the consolidation project into specific initiatives with a detailed timeline and assigned responsibilities.
Plan the logistics and cost of the consolidation for process, technology, and facilities.
Develop a communications plan.
Initial analysis of the logistics and cost considerations to achieve the target.
A detailed project roadmap to migrate to a consolidated service desk.
A communications plan with responses to anticipated questions and objections.
4.1 Plan the logistics of the transition.
4.2 Assess the cost and savings of consolidation to refine business case.
4.3 Identify initiatives and develop a project roadmap.
4.4 Plan communications for each stakeholder group.
Consolidation TCO Tool
Consolidation Roadmap
Executive Presentation
Communications Plan
News Bulletin & FAQ Template
Manage the dark side of growth.
"It’s tempting to focus strategic planning on the processes and technology that will underpin the consolidated service desk. Consistent processes and a reliable tool will cement the consolidation, but they are not what will hold you back.
The most common barrier to a successful consolidation is workforce resistance to change. Cultural difference, perceived risks, and organizational inertia can hinder data gathering, deter collaboration, and impede progress from the start.
Building a consolidated service desk is first and foremost an exercise in organizational change. Garner executive support for the project, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often. The key is to create a shared vision for the project and engage those who will be most affected."
Sandi Conrad
Senior Director, Infrastructure Practice
Info-Tech Research Group
Every organization must grow to survive. Good growth makes an organization more agile, responsive, and competitive, which leads to further growth.
The proliferation of service desks is a hallmark of good growth when it empowers the service of diverse end users, geographies, or technologies.
Growth has its dark side. Bad growth within a business can hinder agility, responsiveness, and competitiveness, leading to stagnation.
Supporting a large number of service desks can be costly and inefficient, and produce poor or inconsistent customer service, especially when each service desk uses different ITSM processes and technologies.
Manage the dark side of growth. Consolidating service desks can help standardize ITSM processes, improve customer service, improve service desk efficiency, and reduce total support costs. A consolidation is a highly visible and mission critical project, and one that will change the public face of IT. Organizations need to get it right.
Building a consolidated service desk is an exercise in organizational change. The success of the project will hinge on how well the organization engages those who will be most affected by the change. Build a guiding coalition for the project, create a shared vision, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often.
Use a structured approach to facilitate the development of a shared strategic vision, design a detailed consolidated architecture, and anticipate resistance to change to ensure the organization reaps project benefits.
Info-Tech Insight
End-user satisfaction is a more reliable measure of a successful consolidation.
The project will generate many cost savings, but they will take time to manifest, and are best seen as an indirect consequence of the pursuit of customer service.
Info-Tech Insight
Business units facing a service desk consolidation are often concerned that the project will lead to a loss of access to IT resources. Focus on building a customer-focused consolidated service desk to assuage those fears and earn their support.
2nd out of 45
On average, IT leaders and process owners rank the service desk 2nd in terms of importance out of 45 core IT processes. Source: Info-Tech Research Group, Management and Governance Diagnostic (2015, n = 486)
42.1%
On average, end users who were satisfied with service desk effectiveness rated all other IT services 42.1% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey 2015, n = 133)
38.0%
On average, end users who were satisfied with service desk timeliness rated all other IT services 38.0% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey (2015, n = 133)
In most organizations, the greatest hurdles that consolidation projects face are related to people rather than process or technology.
In a survey of 168 service delivery organizations without a consolidated service desk, the Service Desk Institute found that the largest internal barrier to putting in place a consolidated service desk was organizational resistance to change.
Specifically, more than 56% of respondents reported that the different cultures of each service unit would hinder the level of collaboration such an initiative would require.
Service Desk Institute (n = 168, 2007)
Info-Tech Insight
Use a phased approach to overcome resistance to change. Focus on quick-win implementations that bring two or three service desks together in a short time frame and add additional service desks over time.
Every organization must grow to survive, and relies heavily on its IT infrastructure to do that. Good growth makes an organization more agile, responsive, and competitive, and leads to further growth.
However, growth has its dark side. Bad growth hobbles agility, responsiveness, and competitiveness, and leads to stagnation.
As organizations grow organically and through mergers, their IT functions create multiple service desks across the enterprise to support:
A hallmark of bad growth is the proliferation of redundant and often incompatible ITSM services and processes.
Project triggers:
| Challenge | Impact |
|---|---|
| Incompatible Technologies |
|
| Inconsistent Processes |
|
| Lack of Data Integration |
|
| Low Customer Satisfaction |
|
A successful consolidation can significantly reduce cost per transaction, speed up service delivery, and improve the customer experience through:
| Project Outcome |
Expected Benefit |
|---|---|
| Integrated information | The capacity to produce quick, accurate, and segmented reports of service levels across the organization. |
| Integrated staffing | Flexible management of resources that better responds to organizational needs. |
| Integrated technology | Reduced tool procurement costs, improved data integration, and increased information security. |
| Standardized processes | Efficient and timely customer service and a more consistent customer experience. |
The foundation of a successful service desk consolidation initiative is a robust current state assessment. Given the project’s complexity, however, determining the right level of detail to include in the evaluation of existing service desks can be challenging.
The Info-Tech approach to service desk consolidation includes:
The project blueprint walks through a method that helps identify which processes and technologies from each service desk work best, and it draws on them to build a target state for the consolidated service desk.
Inspiring your target state from internal tools and best practices is much more efficient than developing new tools and processes from scratch.
Info-Tech Insight
The two key hurdles that a successful service desk consolidation must overcome are organizational complexity and resistance to change.
Effective planning during the current state assessment can overcome these challenges.
Identify existing best practices for migration to the consolidated service desk to foster agent engagement and get the consolidated service desk up quickly.
Phase 1: Develop a Shared Vision
Phase 2: Design the Consolidation
Phase 3: Plan the Transition
Whether or not your project requires multiple transition waves to complete the consolidation depends on the complexity of the environment.
For a more detailed breakdown of this project’s steps and deliverables, see the next section.
| Phases | Phase 1: Develop a Shared Vision | Phase 2: Design the Consolidated Service Desk | Phase 3: Plan the Transition |
|---|---|---|---|
| Steps | 1.1 - Identify and engage key stakeholders | 2.1 - Design target consolidated service desk | 3.1 - Build the project roadmap |
| 1.2 - Develop a vision to give the project direction | |||
| 1.3 - Conduct a full assessment of each service desk | 2.2 - Assess logistics and cost of consolidation | 3.2 - Communicate the change | |
| Tools & Templates | Executive Presentation | Consolidate Service Desk Scorecard Tool | Service Desk Consolidation Roadmap |
| Consolidate Service Desk Assessment Tool | Consolidated Service Desk SOP | Communications and Training Plan Template | |
| Service Desk Efficiency Calculator | News Bulletin & FAQ Template | ||
| Service Desk Consolidation TCO Comparison Tool |
Facilitate the extension of service management best practices to other business functions to improve productivity and position IT as a strategic partner.
Build essential incident, service request, and knowledge management processes to create a sustainable service desk that meets business needs.
Build a continual improvement plan for the service desk to review and evaluate key processes and services, and manage the progress of improvement initiatives.
Build essential incident, service request, and knowledge management processes to create a sustainable service desk that boosts business value.
Review mid-market and enterprise service desk tools, select an ITSM solution, and build an implementation plan to ensure your investment meets your needs.
Build a strategic roadmap to consolidate service desks to reduce end-user support costs and sustain end-user satisfaction.
Our Approach to the Service Desk
Service desk optimization goes beyond the blind adoption of best practices.
Info-Tech’s approach focuses on controlling support costs and making the most of IT’s service management expertise to improve productivity.
Complete the projects sequentially or in any order.
Industry: Higher Education
Source: Oxford University, IT Services
Background
Until 2011, three disparate information technology organizations offered IT services, while each college had local IT officers responsible for purchasing and IT management.
ITS Service Desk Consolidation Project
Oxford merged the administration of these three IT organizations into IT Services (ITS) in 2012, and began planning for the consolidation of five independent help desks into a single robust service desk.
Complication
The relative autonomy of the five service desks had led to the proliferation of different tools and processes, licensing headaches, and confusion from end users about where to acquire IT service.
Oxford University IT at a Glance
Help Desks:
"IT Services are aiming to provide a consolidated service which provides a unified and coherent experience for users. The aim is to deliver a ‘joined-up’ customer experience when users are asking for any form of help from IT Services. It will be easier for users to obtain support for their IT – whatever the need, service or system." – Oxford University, IT Services
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Diagnostics and consistent frameworks used throughout all four options
| 1. Develop shared vision | 2. Design consolidation | 3. Plan transition | |
|---|---|---|---|
| Best-Practice Toolkit |
1.1 Identify and engage key stakeholders 1.2 Develop a vision to give the project direction 1.3 Conduct a full assessment of each service desk |
2.1 Design target consolidated service desk 2.2 Assess logistics and cost of consolidation |
3.1 Build project roadmap 3.2 Communicate the change |
| Guided Implementations |
|
|
|
| Onsite Workshop |
Module 1: Engage stakeholders to develop a vision for the service desk Module 2: Conduct a full assessment of each service desk |
Module 3: Design target consolidated service desk | Module 4: Plan for the transition |
|
Phase 1 Outcomes:
|
Phase 2 Outcomes:
|
Phase 3 Outcomes:
|
| GI | Measured Value |
|---|---|
| Phase 1: |
|
| Phase 2: |
|
| Phase 3: |
|
| Total savings | $10,800 |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Pre-Workshop | Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|---|
| Activities |
Module 0: Gather relevant data 0.1 Conduct CIO Business Vision Survey 0.2 Conduct End-User Satisfaction Survey 0.3 Measure Agent Satisfaction |
Module 1: Engage stakeholders to develop a vision for the service desk 1.1 Identify key stakeholders and develop an engagement plan 1.2 Brainstorm desired service desk attributes 1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk 1.4 Define project goals, principles, and KPIs |
Module 2: Conduct a full assessment of each service desk 2.1 Review the results of diagnostic programs 2.2 Map organizational structure and roles for each service desk 2.3 Assess overall maturity and environment of each service desk 2.4 Assess current information system environment |
Module 3: Design target consolidated service desk 3.1 Identify requirements for target consolidated service desk 3.2 Build requirements document and shortlist for ITSM tool 3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state 3.4 Document standardized processes for new service desk |
Module 4: Plan for the transition 4.1 Plan the logistics of the transition 4.2 Assess the cost and savings of consolidation to refine business case 4.3 Identify initiatives and develop a project roadmap 4.4 Plan communications for each stakeholder group |
| Deliverables |
|
|
|
|
|
Don’t get bogged down in the details. A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting and evaluating unnecessary information that will only distract and slow down the project, losing management interest and buy-in.
Leverage the Consolidate Service Desk Assessment Tool to gather the data you need to evaluate your existing service desks.
Select the target state that is right for your organization. Don’t feel pressured to move to a complete consolidation with a single point of contact if it wouldn’t be compatible with your organization’s needs and abilities, or if it wouldn’t be adopted by your end users. Design an appropriate level of standardization and centralization for the service desk and reinforce and improve processes moving forward.
Leverage the Consolidate Service Desk Scorecard Tool to analyze the gap between your existing processes and your target state.
Getting people on board is key to the success of the consolidation, and a communication plan is essential to do so. Develop targeted messaging for each stakeholder group, keeping in mind that your end users are just as critical to success as your staff. Know your audience, communicate to them often and openly, and ensure that every communication has a purpose.
Leverage the Communications Plan and Consolidation News Bulletin & FAQ Template to plan your communications.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 4-8
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Stakeholder Engagement Workbook
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Consolidate Service Desk Executive Presentation
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Consolidate Service Desk Assessment Tool
IT Skills Inventory and Gap Assessment Tool
Develop a shared vision
1.1 Identify and engage key stakeholders
1.2 Develop a vision to give the project direction
1.3 Conduct a full assessment of each service desk
Industry: Higher Education
Source: Oxford University, IT Services
The merging of Oxford’s disparate IT organizations was motivated primarily to improve end-user service and efficiency.
Similarly, ITS positioned the SDCP as an “operational change,” not to save costs, but to provide better service to their customers.
"The University is quite unique in the current climate in that reduction in costs was not one of the key drivers behind the project. The goal was to deliver improved efficiencies and offer a single point of contact for their user base." – Peter Hubbard, ITSM Consultant Pink Elephant
Oxford recognized early that they needed an open and collaborative environment to succeed.
Key IT and business personnel participated in a “vision workshop” to determine long- and short-term objectives, and to decide priorities for the consolidated service desk.
"Without key support at this stage many projects fail to deliver the expected outcomes. The workshop involved the key stakeholders of the project and was deemed a successful and positive exercise, delivering value to this stage of the project by clarifying the future desired state of the Service Desk." – John Ireland, Director of Customer Service & Project Sponsor
IT Services introduced a Service Desk Consolidation Project Blog very early into the project, to keep everyone up-to-date and maintain key stakeholder buy-in.
Constant consultation with people at all levels led to continuous improvement and new insights.
"We also became aware that staff are facing different changes depending on the nature of their work and which toolset they use (i.e. RT, Altiris, ITSM). Everyone will have to change the way they do things at least a little – but the changes depend on where you are starting from!" – Jonathan Marks, Project Manager
Service desk consolidation means combining multiple service desks into one centralized, single point of contact.
Consolidation must include people, process, and technology:
Consolidation can take the form of:
Service Desk 1 - Service Desk 2 - Service Desk 3
↓
Consolidated Service Desk
Info-Tech Insight
Consolidation isn’t for everyone.
Before you embark on the project, think about unique requirements for your organization that may necessitate more than one service desk, such as location-specific language. Ask yourself if consolidation makes sense for your organization and would achieve a benefit for the organization, before proceeding.
Use a RACI table (e.g. in the following section) to clarify who is to be accountable, responsible, consulted, and informed.
Info-Tech Insight
The more transformational the change, the more it will affect the organizational chart – not just after the implementation but through the transition.
Take time early in the project to define the reporting structure for the project/transition team, as well as any teams and roles supporting the transition.
RACI = Responsible, Accountable, Consulted, Informed
The RACI chart will provide clarity for overarching roles and responsibilities during the consolidation.
| Task | Project Sponsor | Project Manager | Sr. Executives | SMEs | Business Lead | Service Desk Managers | HR | Trainers | Communications |
|---|---|---|---|---|---|---|---|---|---|
| Meeting project objectives | A | R | A | R | R | ||||
| Identifying risks and opportunities | R | A | A | C | C | C | C | I | I |
| Assessing current state | I | A | I | R | C | R | |||
| Defining target state | I | A | I | C | C | R | |||
| Planning logistics | I | A | I | R | R | C | R | ||
| Building the action plan | I | A | C | R | R | R | R | R | R |
| Planning and delivering communications | I | A | C | C | C | C | R | R | A |
| Planning and delivering training | I | A | C | C | C | C | R | R | C |
| Gathering and analyzing feedback and KPIs | I | A | C | C | C | C | C | R | R |
Why is a stakeholder analysis essential?
Info-Tech Insight
Be diverse and aware. When identifying key stakeholders for the project, make sure to include a rich diversity of stakeholder expertise, geography, and tactics. Also, step back and add silent members to your list. The loudest voices and heaviest campaigners are not necessarily your key stakeholders.
Goal: Create a prioritized list of people who are affected or can affect your project so you can plan stakeholder engagement and communication.
Outcome: A list of key stakeholders to include on your steering committee and your project team, and to communicate with throughout the project.
According to the Project Management Institute, only 25% of individuals fully commit to change. The remaining 75% either resist or simply accept the change. Gathering stakeholder concerns is a powerful way to gain buy-in.
Solicit direct feedback from the organization to gain critical insights into their perceptions of IT.
We recommend completing at least the End-User Satisfaction survey as part of your service desk consolidation assessment and planning. An analyst will help you set up the diagnostic and walk through the report with you.
To book a diagnostic, or get a copy of our questions to inform your own survey, visit Info-Tech’s Benchmarking Tools, contact your account manager, or call toll-free 1-888-670-8889 (US) or 1-844-618-3192 (CAN).
Data-Driven Diagnostics:
End-User Satisfaction Survey
CIO Business Vision
Review the results of your diagnostics in step 1.3
Use Info-Tech’s Stakeholder Engagement Workbook to formalize an engagement strategy
The engagement plan is a structured and documented approach for gathering requirements by eliciting input and validating plans for change and cultivating sponsorship and support from key stakeholders early in the project lifecycle.
The Stakeholder Engagement Workbook situates stakeholders on a grid that identifies which ones have the most interest in and influence on your project, to assist you in developing a tailored engagement strategy.
You can also use this analysis to help develop a communications plan for each type of stakeholder in step 3.2.
| Method | Description | Assessment and Best Practices | Stakeholder Effort | Business Analyst Effort |
|---|---|---|---|---|
| Structured One-on-One Interview | In a structured one-on-one interview, the business analyst has a fixed list of questions to ask the stakeholder and follows up where necessary. | Structured interviews provide the opportunity to quickly hone in on areas of concern that were identified during process mapping or group elicitation techniques. They should be employed with purpose – to receive specific stakeholder feedback on proposed requirements or help identify systemic constraints. Generally speaking, they should be 30 minutes or less. | Low |
Medium |
| Unstructured One-on-One Interview | In an unstructured one-on-one interview, the business analyst allows the conversation to flow freely. The BA may have broad themes to touch on, but does not run down a specific question list. | Unstructured interviews are most useful for initial elicitation, when brainstorming a draft list of potential requirements is paramount. Unstructured interviews work best with senior stakeholders (sponsors or power users), since they can be time consuming if they’re applied to a large sample size. It’s important for BAs not to stifle open dialog and allow the participants to speak openly. They should be 60 minutes or less. | Medium | Low |
Develop a shared vision
1.1 Get buy-in from key stakeholders
1.2 Develop a vision to give the project direction
1.3 Conduct a full assessment of each service desk
A shared vision for the consolidated service desk that:
An executive visioning session can take up to two days of focused effort and activities with the purpose of defining the short and long-term view, objectives, and priorities for the new consolidated service desk.
The session should include the following participants:
The session should include the following tasks:
The activities throughout this step are designed to be included as part of the visioning session
A consolidated service desk should include the following aspects:
Consolidated Service Desk
Document in the Consolidate Service Desk Executive Presentation, slide 6.
| Consolidated Service Desk Model | Level of Consolidation | ||
|---|---|---|---|
| Partial | Complete | ||
| Type of Consolidation | Virtual | ||
| Physical | |||
| Hybrid | ✓ | ||
3. As a group, brainstorm and document a list of attributes that the consolidated service desk should have.
Examples:
Document in the Consolidate Service Desk Executive Presentation, slide 7.
Build desire for change.
In addition to standard high-level scope elements, consolidation projects that require organizational change also need a compelling story or vision to influence groups of stakeholders.
Use the vision table below to begin developing a compelling vision and story of change.
| Why is there a need to consolidate service desks? | |
| How will consolidation benefit the organization? The stakeholders? | |
| How did we determine this is the right change? | |
| What would happen if we didn’t consolidate? | |
| How will we measure success? |
A service desk consolidation project requires a compelling vision to energize staff and stakeholders toward a unified goal over a sustained period of time.
Great visions:
Info-Tech Insight
Tell a story. Stories pack a lot of information into few words. They are easy to write, remember, and most importantly – share. It’s worth spending a little extra time to get the details right.
Stories serve to give the consolidation real-world context by describing what the future state will mean for both staff and users of the service desk. The story should sum up the core of the experience of using the consolidated service desk and reflect how the service desk will fit into the life of the user.
Stories should include:
Imagine if…
… users could access one single online service that allows them to submit a ticket through a self-service portal and service catalog, view the status of their ticket, and receive updates about organization-wide outages and announcements. They never have to guess who to contact for help with a particular type of issue or how to contact them as there is only one point of contact for all types of incidents and service requests.
… all users receive consistent service delivery regardless of their location, and never try to circumvent the help desk or go straight to a particular technician for help as there is only one way to get help by submitting a ticket through a single service desk.
… tickets from any location could be easily tracked, prioritized, and escalated using standardized definitions and workflows to ensure consistent service delivery and allow for one set of SLAs to be defined and met across the organization.
Service Desk Institute (n = 20, 2007)
A survey of 233 service desks considering consolidation found that of the 20 organizations that were in the planning stages of consolidation, the biggest driver was to improve service delivery and/or increase productivity.
This is in line with the recommendation that improved service quality should be the main consolidation driver over reducing costs.
Service Desk Institute (n = 43, 2007)
The drivers were similar among the 43 organizations that had already implemented a consolidated service desk, with improved service delivery and increased productivity again the primary driver.
Aligning with best practice was the second most cited driver.
Use the results of your stakeholder analysis and interviews to facilitate a discussion among recommended participants and document the purpose of the consolidation project, the goals the project aims to achieve, and the guiding principles that must be followed.
Use the following example to guide your discussion:
| Purpose | The purpose of consolidating service desks is to improve service delivery to end users and free up more time and resources to achieve the organization’s core mission. |
|---|---|
| Goals |
|
| Guiding Principles |
The consolidated service desk must:
|
The primary driver for consolidation of service desks is improved service delivery and increased productivity. This should relate to the primary benefits delivered by the consolidation, most importantly, improved end-user satisfaction.
A survey of 43 organizations that have implemented a consolidated service desk identified the key benefits delivered by the consolidation (see chart at right).
Source: Service Desk Institute (n = 43, 2007)
Info-Tech Insight
Cost reduction may be an important benefit delivered by the consolidation effort, but it should not be the most valuable benefit delivered. Focus communications on anticipated benefits for improved service delivery and end-user satisfaction to gain buy-in for the project.
Document in the Executive Presentation, slide 10
| Stop | Start | Continue |
|---|---|---|
|
|
|
| Strengths (Internal) | Weaknesses (Internal) |
|
|
| Opportunities (External) | Threats (External) |
|
|
…to help you conduct your SWOT analysis on the service desk.
| Strengths (Internal) | Weaknesses (Internal) |
|
|
| Opportunities (External) | Threats (External) |
|
|
| Helpful to achieving the objective | Harmful to achieving the objective | |
|---|---|---|
| Internal origin attributes of the organization | Strengths | Weaknesses |
|
External Origin attributes of the environment |
Opportunities | Threats |
Frame the project in terms of the change and impact it will have on:
Service desk consolidation will likely have a significant impact in all three categories by standardizing processes, implementing a single service management tool, and reallocating resources. Framing the project in this way will ensure that no aspect goes forgotten.
For each of the three categories, you will identify:
People
Process
Technology
Complete an executive presentation using the decisions made throughout this step
Develop a shared vision
1.1 Get buy-in from key stakeholders
1.2 Develop a vision to give the project direction
1.3 Conduct a full assessment of each service desk
Industry: Higher Education
Source: Oxford University, IT Services
Oxford ITS instigated the service desk consolidation project in the fall of 2012.
A new ITSM solution was formally acquired in the spring 2014, and amalgamated workflows designed.
Throughout this period, at least 3 detailed process analyses occurred in close consultation with the affected IT units.
Responsibility for understanding each existing process (incident, services, change management, etc.) were assigned to members of the project team.
They determined which of the existing processes were most effective, and these served as the baseline – saving time and effort in the long run by sticking with tested processes that work.
Almost from day one, the Oxford consolidation team made sure to consult closely with each relevant ITS team about their processes and the tools they used to manage their workflows.
This was done both in structured interviews during the visioning stage and informally at periodic points throughout the project.
The result was the discovery of many underlying similarities. This information was then instrumental to determining a realistic baseline from which to design the new consolidated service desk.
"We may give our activities different names or use different tools to manage our work but in all cases common sense has prevailed and it’s perhaps not so surprising that we have common challenges that we choose to tackle in similar ways." – Andrew Goff, Change Management at Oxford ITS
Before you begin planning for the consolidation, make sure you have a clear picture of the magnitude of what you plan on consolidating.
Evaluate the current state of each help desk being considered for consolidation. This should include an inventory of:
Info-Tech Insight
A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting unnecessary information that will only distract and slow down the project.
| Poor Processes | vs. | Optimized Processes |
|---|---|---|
|
Inconsistent or poor processes affect the business through:
|
Standardized service desk processes increase user and technician satisfaction and lower costs to support through:
|
1. Facilitate a discussion among recommended participants to discuss the structure of each service desk. Decide which model best describes each service desk:
2. Use a flip chart or whiteboard to draw the architecture of each service desk, using the example on the right as a guide.
The Consolidate Service Desk Assessment Tool will provide insight into the overall health of each existing service desk along two vectors:
Together these answers offer a snapshot of the health, efficiency, performance, and perceived value of each service desk under evaluation.
This tool will assist you through the current state assessment process, which should follow these steps:
These activities will be described in more detail throughout this step of the project.
Send a copy of the Consolidate Service Desk Assessment Tool to the Service Desk Manager (or other designated party) of each service desk that will be considered as part of the consolidation.
Instruct them to complete tab 2 of the tool, the Environment Survey:
This assessment will provide an overview of key metrics to assess the performance of each service desk, including:
Use the IT Skills Inventory and Gap Assessment Tool to assess agent skills and identify gaps or overlaps.
Agent Satisfaction
Measure employee satisfaction and engagement to identify strong teams.
Roles and Responsibilities
Gather a clear picture of each service desk’s organizational hierarchy, roles, and responsibilities.
Agent Utilization
Obtain a snapshot of service desk productivity by calculating the average amount of time an agent is handling calls, divided by the average amount of time an agent is at work.
Send the Skills Coverage Tool tab to each Service Desk Manager, who will either send it to the individuals who make up their service desk with instructions to rate themselves, or complete the assessment together with individuals as part of one-on-one meetings for discussing development plans.
IT Skills Inventory and Gap Assessment Tool will enable you to:
| Tier 1 Help Desk Lead | Tier 2 Help Desk Lead | Tier 2 Apps Support Lead | Tier 3 Specialist Support Lead |
| Tier 1 Specialist | Name Title | Name Title | Name Title |
| Tier 1 Specialist | Name Title | Name Title | Name Title |
| Name Title | Name Title | Name Title | |
| Name Title | Name Title | ||
Agent satisfaction forms a key metric within the Consolidate Service Desk Assessment Tool, and it can be evaluated in a variety of ways. Choose the approach that best suits your organization and time restraints for the project.
Determine agent satisfaction on the basis of a robust (and anonymous) survey of service desk agents. Like the end-user satisfaction score, this measure is ideally computed as a percentage.
There are several ways to measure agent satisfaction:
Ideally, your service desks are already on the same ITSM platform, but if not, a comprehensive assessment of current tools is the first step toward a single, consolidated solution.
Include the following in your tools assessment:
Info-Tech Insight
Document not only the service management tools that are used but also any of their unique and necessary functions and configurations that users may have come to rely upon, such as remote support, self-serve, or chat support, in order to inform requirements in the next phase.
Inventory your IT environment, including:
User Devices
Servers
Data centers
In addition to identifying the range of devices you currently support, assess:
Info-Tech Insight
The capabilities and configuration of your existing infrastructure and applications could limit your consolidation plans. A comprehensive technology assessment of not only the service desk tools but also the range of devices and applications your service desks supports will help you to prepare for any potential limitations or obstacles a consolidated service desk may present.
Document information on number of devices supported and number of desktop images associated with each service desk in the section on “Technology Data” of the Consolidate Service Desk Assessment Tool.
Use a RACI chart to assign overarching responsibilities for the consolidation project.
Map out the organizational structure and flow of each service desk and discuss the model that best describes each.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 2-4
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
Consolidate Service Desk Scorecard Tool
Review findings with analyst:
Then complete these activities…
With these tools & templates:
Service Desk Efficiency Calculator
Service Desk Consolidation TCO Comparison Tool
Phase 2 Results:
Design consolidation
2.1 Design target consolidated service desk
2.2 Assess logistics and cost of consolidation
Industry: Higher Education
Source: Oxford University, IT Services
"Since our last update, a review and re-planning exercise has reassessed the project approach, milestones, and time scales. This has highlighted some significant hurdles to transition which needed to be addressed, resulting primarily from the size of the project and the importance to the department of a smooth and well-planned transition to the new processes and toolset." – John Ireland, Director of Customer Service & Project Sponsor
Despite careful planning and its ultimate success, Oxford’s consolidation effort still encountered some significant hurdles along the way – deadlines were sometimes missed and important processes overlooked.
These bumps can be mitigated by building flexibility into your plan:
Info-Tech Insight
Ensure that the project lead is someone conversant in ITSM, so that they are equipped to understand and react to the unique challenges and expectations of a consolidation and can easily communicate with process owners.
With approval for the project established and a clear idea of the current state of each service desk, narrow down the vision for the consolidated service desk into a specific picture of the target state.
The target state should provide answers to the following types of questions:
Process:
People:
Technology:
Info-Tech Insight
Select the target state that is right for your organization. Don’t feel pressured to select the highest target state or a complete consolidation. Instead select the target state that is most compatible with your organization’s current needs and capabilities.
Identify three primary categories where the consolidation project is expected to yield benefits to the business. Use the example on the right to guide your discussion.
Efficiency and effectiveness are standard benefits for this project, but the third category may depend on your organization.
Identify 1-3 key performance indicators (KPIs) associated with each benefit category, which will be used to measure the success of the consolidation project. Ensure that each has a baseline measure that can be reassessed after the consolidation.
Efficiency
Streamlined processes to reduce duplication of efforts
Resourcing
Improved allocation of human and financial resources
Effectiveness
Service delivery will be more accessible and standardized
| Efficiency | ||||
|---|---|---|---|---|
| Business Value | KPI | Current Metric | Short-Term (6 month) Target | Long-Term (1 year) Target |
| Streamlined processes to reduce duplication of efforts | Improved response time | 2 hours | 1 hour | 30 minutes |
| Effectiveness | ||||
|---|---|---|---|---|
| Business Value | KPI | Current Metric | Short-Term (6 month) Target | Long-Term (1 year) Target |
| Service delivery will be more accessible and standardized | Improved first call resolution (% resolved at Tier 1) | 50% | 60% | 70% |
Service Requests:
Incident Management:
Knowledgebase:
Reporting:
Evaluate how your processes compare with the best practices defined here. If you need further guidance on how to standardize these processes after planning the consolidation, follow Info-Tech’s blueprint, Standardize the Service Desk.
Consider the following unique process considerations for consolidation:
Info-Tech Insight
Don’t do it all at once. Consolidation will lead to some level of standardization. It will be reinforced and improved later through ongoing reengineering and process improvement efforts (continual improvement management).
Example:
Whiteboard:
Consider the following people-related elements when designing your target state:
Consider the following unique people considerations for consolidation:
Info-Tech Insight
Identify SMEs and individuals who are knowledgeable about a particular location, end-user base, technology, or service offering. They may be able to take on a different, greater role due to the reorganization that would make better use of their skills and capabilities and improve morale.
Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.
Example:
Whiteboard:
Info-Tech Insight
Talk to staff at each service desk to ask about their tool needs and requirements to support their work. Invite them to demonstrate how they use their tools to learn about customization, configuration, and functionality in place and to help inform requirements. Engaging staff in the process will ensure that the new consolidated tool will be supported and adopted by staff.
Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.
Example:
Whiteboard:
| Features | Description |
|---|---|
| Modules |
|
|
Self-Serve |
|
| Enterprise Service Management Needs |
|
| Workflow Automation |
|
| License Maintenance Costs |
|
| Configuration Costs |
|
| Speed / Performance |
|
| Vendor Support |
|
Create a requirements list for the service desk tool.
Create a demo script:
Using information from the requirements list, determine which features will be important for the team to see during a demo. Focus on areas where usability is a concern, for example:
Evaluate current tool:
Consider alternatives:
Info-Tech regularly evaluates ITSM solution providers and ranks each in terms of functionality and affordability. The results are published in the Enterprise and Mid-Market Service Desk Software Vendor Landscapes.
After selecting a solution, follow the Build an ITSM Tool Implementation Plan project to develop an implementation plan to ensure the tool is appropriately designed, installed, and tested and that technicians are sufficiently trained to ensure successful deployment and adoption of the tool.
The purpose of this tool is to organize the data from up to six service desks that are part of a service desk consolidation initiative. Displaying this data in an organized fashion, while offering a robust comparative analysis, should facilitate the process of establishing a new baseline for the consolidated service desk.
Use the results on tab 4 of the Consolidate Service Desk Assessment Tool. Enter the data from each service desk into tab “2. InfoCards” of the Consolidate Service Desk Scorecard Tool.
Data from up to six service desks (up to six copies of the assessment tool) can be entered into this tool for comparison.
The values entered on this tab will be used in calculating the overall metric score for each service desk, allowing you to compare the performance of existing service desks against each other and against your target state.
Develop one set of standard operating procedures to ensure consistent service delivery across locations.
One set of standard operating procedures for the new service desk is essential for a successful consolidation.
Info-Tech’s Consolidated Service Desk SOP Template provides a detailed example of documenting procedures for service delivery, roles and responsibilities, escalation and prioritization rules, workflows for incidents and service requests, and resolution targets to help ensure consistent service expectations across locations.
Use this template as a guide to develop or refine your SOP and define the processes for the consolidated service desk.
Design consolidation
2.1 Design target consolidated state
2.2 Assess logistics and cost
Industry: US Coast Guard
Source: CIO Rear Adm. Robert E. Day, Jr. (retired)
The US Coast Guard was providing internal IT support for 42,000 members on active duty from 11 distinct regional IT service centers around the US.
Pain Points
Admiral Day was the CIO from 2009 to 2014. In 2011, he lead an initiative to consolidate USCG service desks.
Relocating to a new location involved potentially higher implementation costs, which was a significant disadvantage.
Ultimately, the relocation reinforced the national mandate of the consolidated service desk. The new organization would act as a single point of contact for the support of all 42,000 members of the US Coast Guard.
"Before our regional desks tended to take on different flavors and processes. Today, users get the same experience whether they’re in Alaska or Maryland by calling one number: (855) CG-FIX IT." – Rear Adm. Robert E. Day, Jr. (retired)
A detailed project roadmap will help break down the project into manageable tasks to reach the target state, but there is no value to this if the target state is not achievable or realistic.
Don’t forget to assess the logistics of the consolidation that can be overlooked during the planning phase:
Info-Tech Insight
Language barriers can form significant hurdles or even roadblocks for the consolidation project. Don’t overlook the importance of unique language requirements and ensure the consolidated service desk will be able to support end-user needs.
Identify tasks that should form part of the roadmap and document in the roadmap tool.
Identify costs that should be included in the TCO assessment and document in the TCO tool.
Discuss and identify any logistic and cost considerations that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.
Keep in mind that if your target state involves reorganization of resources and the creation of resources, there will be additional staffing tasks that should form part of the consolidation plan. These include:
If new positions will be created, follow these steps to mitigate risks:
For more guidance on hiring help desk staff, see Info-Tech’s blueprint, Manage Help Desk Staffing.
Be sensitive to employee concerns.
Develop guiding principles for the consolidation to ensure that employee satisfaction remains a priority throughout the consolidation.
Examples include:
Info-Tech Insight
The most talented employees can be lost in the migration to a consolidated service desk, resulting in organizational loss of core knowledge. Mitigate this risk using measurement strategies, competency modeling, and knowledge sharing to reduce ambiguity and discomfort of affected employees.
Identify tasks that should form part of the roadmap and document in the roadmap tool.
Identify costs that should be included in the TCO assessment and document in the TCO tool.
Discuss and identify any logistic and cost considerations surrounding resources and staffing that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.
How do organizations calculate the staffing implications of a service desk consolidation?
The Service Desk Efficiency Calculator uses the ITIL Gross Staffing Model to think through the impact of consolidating service desk processes.
To estimate the impact of the consolidation on staffing levels, estimate what will happen to three variables:
All things being equal, a reduction in ticket volume (through outsourcing or the implementation of self-serve options, for example), will reduce your staffing requirements (all things being equal). The same goes for a reduction in the average call resolution rate.
Constraints:
Spare capacity: Many organizations are motivated to consolidate service desks by potential reductions in staffing costs. However, this is only true if your service desk agents have spare capacity to take on the consolidated ticket volume. If they don’t, you will still need the same number of agents to do the work at the consolidated service desk.
Agent capabilities: If your agents have specialised skills that you need to maintain the same level of service, you won’t be able to reduce staffing until agents are cross-trained.
The third tab of the Service Desk Efficiency Calculator will quantify:
Facilitate a discussion around the results.
Evaluate where you are now and where you hope to be. Focus on the efficiency gains expected from the outsourcing project. Review the expected gains in average resolution time, the expected impact on service desk ticket volume, and the associated productivity gains.
Use this information to refine the business case and project plan for the consolidation, if needed.
Typical cost savings for a service desk consolidation are highlighted below:
People 10-20% savings (through resource pooling and reallocation)
Process 5-10% savings (through process simplification and efficiencies gained)
Technology 10-15% savings (through improved call routing and ITSM tool consolidation)
Facilities 5-10% savings (through site selection and redesign)
Cost savings should be balanced against the costs of the consolidation itself (including hiring for consolidation project managers or consultants, moving expenses, legal fees, etc.)
Evaluate consolidation costs using the TCO Comparison Tool described in the next section.
Since completing the executive visioning session in step 1.2, you should have completed the following activities:
The next step will be to develop a project roadmap to achieve the consolidation vision.
Before doing this, check back in with the project sponsor and business executives to refine the business case, obtain necessary approvals, and secure buy-in.
If necessary, add to the executive presentation you completed in step 1.2, copying results of the deliverables you have completed since:
Identify process requirements and desired characteristics for the target consolidated service desk.
Review the results of the Consolidate Service Desk Scorecard Tool to identify top performing service desks and glean best practices.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 2-4
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Service Desk Consolidation Roadmap
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Service Desk Consolidation Communications and Training Plan Template
Service Desk Consolidation News Bulletin & FAQ Template
Plan the consolidation
3.1 Build the project roadmap
3.2 Communicate the change
A detailed roadmap to migrate to a single, consolidated service desk, including:
Industry: Healthcare
Source: Organizational insider
A large US healthcare facilities organization implemented a service desk consolidation initiative in early 2013. Only 18 months later, they reluctantly decided to return to their previous service desk model.
Two disparate service desks:
One virtually-consolidated service desk servicing many facilities spread geographically over two distinct locations.
The main feature of the new virtual service desk was a single, pooled ticket queue drawn from all the end users and facilities in the new geographic regions.
Document the list of initiatives in the Service Desk Consolidation Roadmap.
In order to translate your newly made decisions regarding the target state and logistical considerations into a successful consolidation strategy, create an exhaustive list of all the steps and sub-steps that will lead you from your current state to your target state.
Use the next few steps to finish brainstorming the initiative list, identify risks and dependencies, and construct a detailed timeline populated with specific project steps.
Start with the list you have been curating throughout the current and future state assessments. If you are completing this project as a workshop, add to the initiative list you have been developing on the whiteboard.
Try to organize your initiatives into groups of related tasks. Begin arranging your initiatives into people, process, technology, or other categories.
| Whiteboard | People | Process | Technology | Other |
|---|---|---|---|---|
| Risk - degree of impact if activities do not go as planned | High |
A – High Risk, Low Frequency Tasks that are rarely done and are high risk. Focus attention here with careful planning (e.g. consolidation) |
B – High Risk, High Frequency Tasks that are performed regularly and must be watched closely each time (e.g. security authorizations) |
| ↕ |
C – Low Risk, Low Frequency Tasks that are performed regularly with limited impact or risk (e.g. server upgrades) |
D – Low Risk, High Frequency Tasks that are done all the time and are not risky (e.g. password resets) |
|
| Low | ↔ | High | |
| Frequency - how often the activity has been performed | |||
Service desk consolidations fit in category A
The project manager, service desk managers, and subject matter experts (SMEs) of different areas, departments, or locations should identify risks for each of the processes, tools, resource groups (people), and any data exchanges and moves that will be part of the project or impacted by the project.
Process - For each process, validate that workflows can remain intact throughout the consolidation project. If any gaps may occur in the process flows, develop a plan to be implemented in parallel with the consolidation to ensure service isn’t interrupted.
Technology - For a tool consolidation, upgrade, or replacement, verify that there is a plan in place to ensure continuation of service delivery processes throughout the change.
Make a plan for if and how data from the old tool(s) will be migrated to the new tool, and how the new tool will be installed and configured.
People - For movement of staff, particularly with termination, identify any risks that may occur and involve your HR and legal departments to ensure all movement is compliant with larger processes within the organization.
Info-Tech Insight
Don’t overlook the little things. Sometimes the most minor-seeming components of the consolidation can cause the greatest difficulty. For example, don’t assume that the service desk phone number can simply roll over to a new location and support the call load of a combined service desk. Verify it.
Use the outcome of this activity to complete your consolidation roadmap.
Document your initiatives on tab 2 of the Service Desk Consolidation Roadmap or map it out on a whiteboard.
Adjust initiatives in the consolidation roadmap if necessary.
The transition date will be used in communications in the next step.
Info-Tech Insight
Consolidating service desks doesn’t have to be done in one shot, replacing all your help desks, tools, and moving staff all at the same time. You can take a phased approach to consolidating, moving one location, department, or tool at a time to ease the transition.
Design consolidation
3.1 Build the project roadmap
3.2 Communicate the change
Industry: Higher Education
Source: Oxford University, IT Services
ITS ran a one-day ITSM “business simulation” for the CIO and direct reports, increasing executive buy-in.
“ The business simulation was incredibly effective as a way of getting management buy-in – it really showed what we are driving at. It’s a way of making it real, bringing people on board. ” – John Ireland, Director of Customer Service
Detailed use cases were envisioned referencing particular ITIL processes as the backbone of the process framework.
“ The use cases were very helpful, they were used […] in getting a broad engagement from teams across our department and getting buy-in from the distributed IT staff who we work with across the wider University. ” – John Ireland, Director of Customer Service
“ We in the project team would love to hear your view on this project and service management in general, so please feel free to comment on this blog post, contact us using the project email address […] or, for further information visit the project SharePoint site […] ” – Oxford ITS SDCP blog post
A communications plan should address three elements:
Goals of communication:
Email and Newsletters
Email and newsletters are convenient and can be transmitted to large audiences easily, but most users are inundated with email already and may not notice or read the message.
Face-to-Face Communication
Face-to-face communication helps to ensure that users are receiving and understanding a clear message, and allows them to voice their concerns and clarify any confusion or questions.
Internal Website/Drive
Internal sites help sustain change by making knowledge available after the consolidation, but won’t be retained beforehand.
Business units:
Be attentive to the concerns of business unit management about loss of power. Appease worries about the potential risk of reduced service quality and support responsiveness that may have been experienced in prior corporate consolidation efforts.
Make the value of the consolidation clear, and involve business unit management in the organizational change process.
Focus on producing a customer-focused consolidated service desk. It will assuage fears over the loss of control and influence. Business units may be relinquishing control of their service desk, but they should retain the same level of influence.
Employees:
Employees are often fearful of the impact of a consolidation on their jobs. These fears should be addressed and alleviated as soon as possible.
Design a communication plan outlining the changes and the reasons motivating it.
Put support programs in place for displaced and surviving employees.
Motivate employees during the transition and increase employee involvement in the change.
Educate and train employees who make the transition to the new structure and new job demands.
Info-Tech Insight
Know your audience. Be wary of using technical jargon or acronyms that may seem like common knowledge within your department but would not be part of the vocabulary of non-technical audiences. Ensure your communications are suitable for the audience. If you need to use jargon or acronyms, explain what you mean.
Document your decisions in the communications plan template
Section 4 of the communications plan on objections and question handling will be completed in activity 3.2.2.
Optional Activity
If you completed the Stakeholder Engagement Workbook in step 1.1, you may also complete the Communications tab in that workbook to further develop your plan to engage stakeholders.
Communicate and track changes: Identify and communicate changes to all stakeholders affected by the change to ensure they are aware of any downtime and can plan their own activities accordingly.
Isolate testing: Test changes within a safe non-production environment to eliminate the risk of system outages that result from defects discovered during testing.
Document back-out plans: Documented back-out/backup plans enable quick recovery in the event that the change fails.
Organizations that have more mature and defined change management processes experience less unplanned downtime when implementing change across the organization.
| What? |
1. Adapt people to the change
|
2. Adapt processes to the change
|
3. Adapt technologies to the change
|
|---|---|---|---|
| How? | Work with HR on any changes involving job design, personnel changes, or compensation. | Work with enterprise architects or business analysts to manage significant changes to processes that may impact the business and service levels. |
See Info-Tech’s Optimize the Change Management Processblueprint to use a disciplined change control process for technology changes. |
Info-Tech Insight
Organizational change management (OCM) is widely recognized as a key component of project success, yet many organizations struggle to get adoption for new tools, policies, and procedures. Use Info-Tech’s blueprint on driving organizational change to develop a strategy and toolkit to achieve project success.
Leverage the Stakeholder Engagement Workbook from step 1.1 as well as Info-Tech’s blueprint on driving organizational change for more tactics on change management, particularly managing and engaging various personas.
Business
Employees
End Users
Document your questions and responses in section 4 of the communications plan template. This should be continually updated.
| Group | Objection/Question | Response |
|---|---|---|
| Service desk staff | I’m comfortable with the service desk tool we’ve been using here and won’t know how to use the new one. | We carefully evaluated the new solution against our requirements and selected it as the one that will provide the best service to our users and be user friendly. We tested the solution through user-acceptance testing to ensure staff will be comfortable using it, and we will provide comprehensive training to all users of the tool before launching it. |
| End user | I’m used to going to my favorite technician for help. How will I get service now? | We are initiating a single point of contact so that you will know exactly where to go to get help quickly and easily, so that we can more quickly escalate your issue to the appropriate technician, and so that we can resolve it and notify you as soon as possible. This will make our service more effective and efficient than you having to find one individual who may be tied up with other work or unavailable. |
Keep the following in mind when formulating your responses:
The Service Desk Consolidation News Bulletin & FAQ Template is intended to be an example that you can follow or modify for your own organization. It provides a summary of how the consolidation project will change how end users interact with the service desk.
The bulletin is targeted for mass distribution to end users. A similar letter may be developed for service desk staff, though face-to-face communication is recommended.
Instructions:
Industry: Higher Education
Source: Oxford University, IT Services
Oxford’s new consolidated service desk went live April 20, 2015.
They moved from 3 distinct tools and 5 disparate help desks to a single service desk with one robust ITSM solution, all grounded by a unified set of processes and an integrated workflow.
The success of this project hinged upon:
"We have had a few teething issues to deal with, but overall this has been a very smooth transition given the scale of it." – ICTF Trinity Term 2015 IT Services Report
Create a list of specific tasks that will form the consolidation project on sticky notes and organize into people, process, technology, and other categories to inform the roadmap.
Brainstorm anticipated questions and objections that will arise from various stakeholder groups and prepare consistent responses to each.
Standardize the Service Desk - Provide timely and effective responses to user requests and resolutions of all incidents.
Extend the Service Desk to the Enterprise - Position IT as an innovator.
Build a Continual Improvement Plan for the Service Desk - Teach your old service desk new tricks.
Adopt Lean IT to Streamline the Service Desk - Turn your service desk into a Lean, keen, value-creating machine.
Vendor Landscape: Enterprise Service Desk Software - Move past tickets to proactive, integrated service.
Vendor Landscape: Mid-Market Service Desk Software - Ensure the productivity of the help desk with the right platform.
Build an ITSM Tool Implementation Plan - Nail your ITSM tool implementation from the outset.
Drive Organizational Change from the PMO - Don’t let bad change happen to good projects.
Stacey Keener - IT Manager for the Human Health and Performance Directorate, Johnson Space Center, NASA
Umar Reed - Director of IT Support Services US Denton US LLP
Maurice Pryce - IT Manager City of Roswell, Georgia
Ian Goodhart - Senior Business Analyst Allegis Group
Gerry Veugelaers - Service Delivery Manager New Zealand Defence Force
Alisa Salley Rogers - Senior Service Desk Analyst HCA IT&S Central/West Texas Division
Eddie Vidal - IS Service Desk Managers University of Miami
John Conklin - Chief Information Officer Helen of Troy LP
Russ Coles - Senior Manager, Computer Applications York Region District Schoolboard
John Seddon - Principal Vanguard Consulting
Ryan van Biljon - Director, Technical Services Samanage
Rear Admiral Robert E. Day Jr. (ret.) - Chief Information Officer United States Coast Guard
George Bartha - Manager of Information Technology Unifrax
Peter Hubbard - IT Service Management Consultant Pink Elephant
Andre Gaudreau - Manager of School Technology Operations York Region District School Board
Craig Nekola - Manager, Information Technology Anoka County
Hoen, Jim. “The Single Point of Contact: Driving Support Process Improvements with a Consolidated IT Help-Desk Approach.” TechTeam Global Inc. September 2005.
Hubbard, Peter. “Leading University embarks on IT transformation programme to deliver improved levels of service excellence.” Pink Elephant. http://pinkelephant.co.uk/about/case-studies/service-management-case-study/
IBM Global Services. “Service Desk: Consolidation, Relocation, Status Quo.” IBM. June 2005.
Keener, Stacey. “Help Desks: a Problem of Astronomical Proportions.” Government CIO Magazine. 1 February 2015.
McKaughan, Jeff. “Efficiency Driver.” U.S. Coast Guard Forum Jul. 2013. Web. http://www.intergraphgovsolutions.com/documents/CoastGuardForumJuly2013.pdf
Numara Footprints. “The Top 10 Reasons for Implementing a Consolidated Service Desk.” Numara Software.
Roy, Gerry, and Frederieke Winkler Prins. “How to Improve Service Quality through Service Desk Consolidation.” BMC Software.
Smith, Andrew. “The Consolidated Service Desk – An Achievable Goal?” The Service Desk Institute.
Wolfe, Brandon. “Is it Time for IT Service Desk Consolidation?” Samanage. 4 August 2015.
IBM i remains a vital platform and now many CIOs, CTOs, and IT leaders are faced with the same IBM i challenges regardless of industry focus: how do you evaluate the future viability of this platform, assess the future fit and purpose, develop strategies, and determine the future of this platform for your organization?
For organizations that are struggling with the iSeries/IBM i platform, resourcing challenges are typically the culprit. An aging population of RPG programmers and system administrators means organizations need to be more pro-active in maintaining in-house expertise. Migrating off the iSeries/IBM i platform is a difficult option for most organizations due to complexity, switching costs in the short term, and a higher long-term TCO.
The most common tactic is for the organization to better understand their IBM i options and adopt some level of outsourcing for the non-commodity platform retaining the application support/development in-house. To make the evident, obvious; the options here for the non-commodity are not as broad as with commodity server platforms. Options include co-location, onsite outsourcing, managed and public cloud services.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This project will help you evaluate the future viability of this platform; assess the fit, purpose, and price; develop strategies for overcoming potential challenges; and determine the future of this platform for your organization.
Use this scoring sheet to help you define and evaluate IBM i vendor responses.
IBM i remains a vital platform and now many CIO, CTO, and IT leaders are faced with the same IBM i challenges regardless of industry focus; how do you evaluate the future viability of this platform, assess the future fit and purpose, develop strategies, and determine the future of this platform for your organization?
For organizations that are struggling with the iSeries/IBM i platform, resourcing challenges are typically the culprit. An aging population of RPG programmers and system administrators means organizations need to be more proactive in maintaining in-house expertise. Migrating off the iSeries/IBM i platform is a difficult option for most organizations due to complexity, switching costs in the short term, and a higher long-term TCO.
The most common tactic is for the organization to better understand its IBM i options and adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house. To make the evident, obvious: the options here for the non-commodity are not as broad as with commodity server platforms. Options include co-location, onsite outsourcing, managed hosting, and public cloud services.
“For over twenty years, IBM was ‘king,’ dominating the large computer market. By the 1980s, the world had woken up to the fact that the IBM mainframe was expensive and difficult, taking a long time and a lot of work to get anything done. Eager for a new solution, tech professionals turned to the brave new concept of distributed systems for a more efficient alternative. On June 21, 1988, IBM announced the launch of the AS/400, their answer to distributed computing.” (Dale Perkins)
We help IT leaders make the most of their IBM i environment.
The IBM i remains a vital platform for many businesses and continues to deliver exceptional reliability and performance and play a key role in the enterprise. With the limited resources at hand, CIOs and the like must continually review and understand their migration path with the same regard as any other distributed system roadmap.
Thought ModelWe will investigate the aspect of different IBM i scenarios as they impact business, what that means, and how that can guide the questions that you are asking as you move to an aligned IBM i IT strategy. Our model considers:
Info-Tech InsightsWith multiple control points to be addressed, care must be taken in simplifying your options while addressing all concerns to ease operational load. | ![]() |
| “The IBM i Reality” – Darin Stahl Most members relying on business applications/workloads running on non-commodity platforms (zSeries, IBM i, Solaris, AIX, etc.) are first motivated to get out from under the perceived higher costs for the hardware platform. An additional challenge for non-commodity platforms is that from an IT Operations Management perspective they become an island with a diminishing number of integrated operations skills and solutions such as backup/restore and monitoring tools. The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support and development in-house. | Key challenges with current IBM i environments:
|
| Co-Location A customer transitions their hardware environment to a provider’s data center. The provider can then manage the hardware and “system.” | Onsite Outsourcing A provider will support the hardware/system environment at the client’s site. | Managed Hosting A customer transitions their legacy application environment to an off-prem hosted, multi-tenanted environment. | Public Cloud A customer can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings “re-host.” |
Provider manages the data center hardware environment.
| Abstract Here a provider manages the system data center environment and hardware; however, the client’s in-house IBM i team manages the IBM i hardware environment and the system applications. The client manages all of the licenses associated with the platform as well as the hardware asset management considerations. This is typically part of a larger services or application transformation. This effectively outsources the data center management while maintaining all IBM i technical operations in-house. Advantages
| Considerations
Info-Tech InsightsThis model is extremely attractive for organizations looking to reduce their data center management footprint. Idea for the SMB. |
A provider will support the hardware/system environment at the client’s site.
| Abstract Here a provider will support and manage the hardware/system environment at the client’s site. The provider may acquire the customer’s hardware and provide software licenses. This could also include hiring or “rebadging” staff supporting the platform. This type of arrangement is typically part of a larger services or application transformation. While low risk, it is not as cost-effective as other deployment models. Advantages
| Considerations
Info-Tech InsightsDepending on the application lifecycle and viability, in-house skill and technical depth is a key consideration when developing your IBM i strategy. |
Transition legacy application environment to an off-prem hosted multi-tenanted environment.
| Abstract This type of arrangement is typically part of an application migration or transformation. In this model, a client can “re-platform” the application into an off-premises-hosted provider platform. This would yield many of the cloud benefits however in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application. Advantages
| Considerations
Info-Tech InsightsThere is a difference between a “re-host” and “re-platform” migration strategy. Determine which solution aligns to the application requirements. |
Leverage “public cloud” alternatives with AWS, Google, or Microsoft AZURE.
| Abstract This type of arrangement is typically part of a larger migration or application transformation. While low risk, it is not as cost-effective as other deployment models. In this model, client can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings “re-host.” This would yield many of the cloud benefits however in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux). Advantages
| Considerations
Info-Tech InsightsThis model is extremely attractive for organizations that consume primarily cloud services and have a large remote workforce. |
|
Info-Tech InsightsCreating vendor profiles will help quickly filter the solution providers that directly meet your IBM i needs. |
Vendor Profile #1 | Rowton IT | |
| Summary of Vendor “Rowton IT thrive on creating robust and simple solutions to today's complex IT problems. We have a highly skilled and motivated workforce that will guarantee the right solution. Working with select business partners, we can offer competitive and cost effective packages tailored to suit your budget and/or business requirements. Our knowledge and experience cover vast areas of IT including technical design, provision and installation of hardware (Wintel and IBM Midrange), technical engineering services, support services, IT project management, application testing, documentation and training.” | IBM i Services
| |
URL Regional Coverage: | ![]() | |
Vendor Profile #2 | Connectria | |
| Summary of Vendor “Every journey starts with a single step and for Connectria, that step happened to be with the world’s largest bank, Deutsche Bank. Followed quickly by our second client, IBM. Since then, we have added over 1,000 clients worldwide. For 25 years, each customer, large or small, has relied on Connectria to deliver on promises made to make it easy to do business with us through flexible terms, scalable solutions, and straightforward pricing. Join us on our journey.” | IBM i Services
| |
Regional Coverage: | ![]() | |
Vendor Profile #3 | Mid-Range | |
| Summary of Vendor “Founded in 1988 and profitable throughout all of those 31 years, we have a solid track record of success. At Mid-Range, we use our expertise to assess your unique needs, in order to proactively develop the most effective IT solution for your requirements. Our full-service approach to technology and our diverse and in-depth industry expertise keep our clients coming back year after year. Serving clients across North America in a variety of industries, from small and emerging organizations to large, established enterprises – we’ve seen it all. Whether you need hardware or software solutions, disaster recovery and high availability, managed services or hosting or full ERP services with our JD Edwards offerings – we have the methods and expertise to help.” | IBM i Services
| |
URL Regional Coverage: | ![]() | |
This check-point process creates transparency around agreement costs with the business and gives the business an opportunity to re-evaluate its requirements for a potentially leaner agreement.
|
Vendor Profile Template | [Vendor Name] | |
| Summary of Vendor [Vendor Summary] | IBM i Services
| |
URL Regional Coverage: | *Insert the Vendor Logo* | |
| Use the IT Infrastructure Outsourcing Scoring Tool to manage vendor responses. | |
| Use Info-Tech’s IT Infrastructure Outsourcing Scoring Tool to systematically score your vendor responses. The overall quality of the IBM i questions can help you understand what it might be like to work with the vendor. Consider the following questions:
Once you have the vendor responses, you will select two or three vendors to continue assessing in more depth leading to an eventual final selection. | ![]() |
Watch out for misleading scores that result from poorly designed criteria weightings.
Vendor Conference CallDevelop an agenda for the conference call. Here is a sample agenda:
Commonly Debated Question: Many organizations worry that if vendors can identify each other, they will price fix. However, price fixing is extremely rare due to its consequences and most vendors likely have a good idea which other vendors are participating in the bid. Another thought is that revealing vendors could either result in a higher level of competition or cause some vendors to give up:
| Vendor WorkshopA vendor workshop day is an interactive way to provide context to your vendors and to better understand the vendors’ offerings. The virtual or in-person interaction also offers a great way to understand what it’s like to work with each vendor and decide whether you could build a partnership with them in the long run. The main focus of the workshop is the vendors’ service solution presentation. Here is a sample agenda for a two-day workshop: Day 1
|
| Use the IT Infrastructure Outsourcing Scoring Tool to manage vendor responses. | |
Effectively Acquire Infrastructure Services
Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.
Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
There are very few IT infrastructure components you should be housing internally – outsource everything else.
Build Your Infrastructure Roadmap
Move beyond alignment: Put yourself in the driver’s seat for true business value.
Define Your Cloud Vision
Make the most of cloud for your organization.
Document Your Cloud Strategy
Drive consensus by outlining how your organization will use the cloud.
Create a Right-Sized Disaster Recovery Plan
Close the gap between your DR capabilities and service continuity requirements.
Create a Better RFP Process
Improve your RFPs to gain leverage and get better results.
![]() | Darin Stahl, Principal Research Advisor, Info-Tech Research Group Principal Research Advisor within the Infrastructure Practice and leveraging 38+ years of experience, his areas of focus include: IT Operations Management, Service Desk, Infrastructure Outsourcing, Managed Services, Cloud Infrastructure, DRP/BCP, Printer Management, Managed Print Services, Application Performance Monitoring (APM), Managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC). |
![]() | Troy Cheeseman, Practice Lead, Info-Tech Research Group Troy has over 24 years of experience and has championed large, enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT Operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) start-ups. |
![]() | Dan Duffy, President & Owner, Mid-Range Dan Duffy is the President and Founder of Mid-Range Computer Group Inc., an IBM Platinum Business Partner. Dan and his team have been providing the Canadian and American IBM Power market with IBM infrastructure solutions including private cloud, hosting and disaster recovery, high availability and data center services since 1988. He has served on numerous boards and associations including the Toronto Users Group for Mid-Range Systems (TUG), the IBM Business Partners of the Americas Advisory Council, the Cornell Club of Toronto, and the Notre Dame Club of Toronto. Dan holds a Bachelor of Science from Cornell University. |
![]() | George Goodall, Executive Advisor, Info-Tech Research Group George Goodall is an Executive Advisor in the Research Executive Services practice at Info-Tech Research Group. George has over 20 years of experience in IT consulting, enterprise software sales, project management, and workshop delivery. His primary focus is the unique challenges and opportunities in organizations with small and constrained IT operations. In his long tenure at Info-Tech, George has covered diverse topics including voice communications, storage, and strategy and governance. |
“Companies using IBM i (formerly known as i5/OS).” Enlyft, 21 July 2021. Web.
Connor, Clare. “IBM i and Meeting the Challenges of Modernization.” Ensono, 22 Mar. 2022. Web.
Huntington, Tom. “60+ IBM i User Groups and Communities to Join?” HelpSystems, 16 Dec. 2021. Web.
Perkins, Dale. “The Road to Power Cloud: June 21st 1988 to now. The Journey Continues.” Mid-Range, 1 Nov. 2021. Web.
Prickett Morgan, Timothy. “How IBM STACKS UP POWER8 AGAINST XEON SERVERS.” The Next Platform, 13 Oct. 2015. Web.
“Why is AS/400 still used? Four reasons to stick with a classic.” NTT, 21 July 2016. Web.
Appendix – | AWS
|
Appendix – |
|
Appendix – | Azure
|
Appendix – | IBM
|
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
IT leaders who get personally involved in recruitment see better results. Read this section to learn how leader are getting involved, and how to take the first steps.
Heading into 2020, flexible work is table stakes. Read this section to learn what organizations offer and how you can take advantage of opportunities your competitors are missing.
Ethics and transparency are emerging as key considerations for employees. How can you build a culture that supports this? Read this section to learn how.
Your staff is the biggest line item in your budget, but are you using data to make decisions about your people they way you do in other areas of the business? Read this section to learn how analytics can be applied to the workforce no matter what level you are starting at.
With the rapid pace of technological change, it is becoming increasingly harder to hire skilled people for critical roles. Read this section to learn how some IT departments are turning to in-house training to fill the skill gap.
What do an employee's last few days with your company look like? For most organizations, they are filled with writing rushed documentation, hosting last-minute training sessions and finishing up odd jobs. Read this section to understand the crucial opportunity most IT departments are missing when it comes to departing staff.
It is now 2020 and the GDPR has been in effect for almost 2 years. Many companies thought: been there, done that. And for a while the regulators let some time go by.
The first warnings appeared quickly enough. Eg; in September 2018, the French regulator warned a company that they needed to get consent of their customers for getting geolocation based data.
That same month, an airline was hacked and, on top of the reputational damage and costs to fix the IT systems, it faced the threat of a stiff fine.
Even though we not have really noticed, fines started being imposed as early as January 2019.
Wrong! The fines are levied in a number of cases. And to make it difficult to estimate, there are guidelines that will shape the decision making process, but no hard and fast rules!
The GDPR is very complex and consists of both articles and associated recitals that you need to be in compliance with. it is amuch about the letter as it is about the spirit.
We have a clear view on what most of those cases are.
And more importantly, when you follow our guidelines, you will be well placed to answer any questions by your clients and cooperate with the regulator in a proactive way.
They will never come after me. I'm too small.
And besides, I have my privacy policy and cookie notice in place
Company size has nothing to do with it.
While in the beginning, it seemed mostly a game for the big players (for names, you have to contact us) that is just perception.
As early as March 2018 a €10M revenue company was fined around €120,000. 2 days later another company with operating revenues of around €6.2M was fined close to €200.000 for failing to abide by the DSRR stipulatons.
Don't know what these are?
Fill out the form below and we'll let you in on the good stuff.
Reduced infection rates in compromised areas are providing hope that these difficult times will pass. However, organizations are facing harsh realities in real time. With significant reductions in revenue, employers are facing pressure to quickly implement cost-cutting strategies, resulting in mass layoffs of valuable employees.
Employees are an organization’s greatest asset. When faced with cost-cutting pressures, look for redeployment opportunities that use talent as a resource to get through hard times before resorting to difficult layoff decisions.
Make the most of your workforce in this unprecedented situation by following McLean & Company’s process to initiate redeployment efforts and reduce costs. If all else fails, follow our guidance on planning for layoffs and considerations when doing so.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Set a strategy with senior leadership, brainstorm underused and understaffed employee segments and departments, then determine an approach to redeployments and layoffs.
Collect key information, prepare and redeploy, and roll up information across the organization.
Plan for layoffs, execute on the layoff plan, and communicate to employees.
Monitor departmental performance, review organizational performance, and determine next steps.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use Info-Tech’s methodology to establish an effective service management program with proper oversight.
Let’s make the case for enterprise business analysis!
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
We commonly recognize the value of effective business analysis at a project or tactical level. A good business analysis professional can support the business by identifying its needs and recommending solutions to address them.
Now, wouldn't it be great if we could do the same thing at a higher level?
Enterprise (or strategic) business analysis is all about seeing that bigger picture, an approach that makes any business analysis professional a highly valuable contributor to their organization. It focuses on the enterprise, not a specific project or line of business.
Leading the business analysis effort at an enterprise level ensures that your business is not only doing things right, but also doing the right things; aligned with the strategic vision of your organization to improve the way decisions are made, options are analyzed, and successful results are realized.

Vincent Mirabelli
Principal Research Director, Applications Delivery and Management
Info-Tech Research Group
Your Challenge
Common Obstacles
Info-Tech's Approach
Let's make the case for enterprise business analysis!
Enterprise business analysis can help you reframe the debate between IT and the business, since it sees everyone as part of the business. It can effectively break down silos, support the development of holistic strategies to address internal and external risks, and remove bias and politics from decision making.
Phase 1 |
Phase 2 |
|---|---|
1.1 Define enterprise business analysis 1.2 Identify your pains and opportunities |
2.1 Set your vision 2.2 Define your roadmap and next steps 2.3 Complete your executive communications deck |
Effective business analysis helps guide an organization through improvements to processes, products, and services. Business analysts "straddle the line between IT and the business to help bridge the gap and improve efficiency" in an organization (CIO, 2019).
They are most heavily involved in:
In a survey, business analysts indicated that of their total working time, they spend 31% performing business analysis planning and 41% performing elicitation and analysis (PMI, 2017).
By including a business analyst in a project, organizations benefit by:
(IAG, 2009)
87% |
Reduced time overspending |
|---|---|
75% |
Prevented budget overspending |
78% |
Reduction in missed functionality |
Input
Output
Materials
Participants
Download the Communicate the Case for Enterprise Business Analysis template
Info-Tech's CIO Business Vision Survey data highlights the importance of IT projects in supporting the business to achieve its strategic goals.
However, Info-Tech's CEO-CIO Alignment Survey (N=124) data indicates that CEOs perceive IT as poorly aligned with the business' strategic goals.
Info-Tech's CIO-CEO Alignment Diagnostics
43% |
of CEOs believe that business goals are going unsupported by IT. |
|---|---|
60% |
of CEOs believe that IT must improve understanding of business goals. |
80% |
of CIOs/CEOs are misaligned on the target role of IT. |
30% |
of business stakeholders support their IT departments. |
According to famed management and quality thought leader and pioneer W. Edwards Deming, 94% of issues in the workplace are systemic cause significant organizational pain.
Yet we continue to address them on the surface, rather than acknowledge how ingrained they are in our culture, systems, and processes.
For example, we:
Band-aid solutions rarely have the desired effect, particularly in the long-term.
Our solutions should likewise focus on the systemic/macro environment. We can do this via projects, products and services, but those don't always address the larger issues.
If we take the work our business analysis currently does in defining needs and solutions, and elevate this to the strategic level, the results can be impactful.
Only 18% of organizations have mature (optimized or established) business analysis practices.
With that higher level of maturity comes increased levels of capability, efficiency, and effectiveness in delivering value to people, processes, and technology. Through such efforts, they're better equipped and able to connect the strategy of their organization to the projects, processes, and products they deliver.
They shift focus from "figuring business analysis out" to truly unleashing its potential, with business analysts contributing in strategic and tactical ways.

(Adapted from PMI, 2017)
Business analysts are best suited to connect the strategic with the tactical, the systems, and the operations. They maintain the most objective lens regarding how people, process, and technology connect and relate, and the most skilled of them can remove bias and politics from their perspective.
Input
Output
Materials
Participants
Download the Communicate the Case for Enterprise Business Analysis template
Enterprise business analysis (sometimes referred to as strategy analysis) "…focuses on defining the future and transition states needed to address the business need, and the work required is defined both by that need and the scope of the solution space. It covers strategic thinking in business analysis, as well as the discovery or imagining of possible solutions that will enable the enterprise to create greater value for stakeholders and/or capture more value for itself."
(Source: "Business Analysis Body of Knowledge," v3)
Organizations with high-performing business analysis programs experience an enhanced alignment between strategy and operations. This contributes to improved organizational performance. We see this in financial (69% vs. 45%) and strategic performance (66% vs. 21%), also organizational agility (40% vs. 14%) and management of operational projects (62% vs. 29%). (PMI, 2017)
When comparing enterprise with traditional business analysis, we see stark differences in the size and scope of their view, where they operate, and the role they play in organizational decision making.
| Enterprise | Traditional | |
|---|---|---|
| Decision making | Guides and influences | Executes |
| Time horizon | 2-10 years | 0-2 years |
| Focus | Strategy, connecting the strategic to the operational | Operational, optimizing how business is done, and keeping the lights on |
| Domain | Whole organization Broader marketplace |
Only stakeholder lines of business relevant to the current project, product or service |
| Organizational Level | Executive/Leadership | Project |
(Adapted from Schulich School of Business)
Maturity can't be rushed. Build your enterprise business analysis program on a solid foundation of leading and consistent business analysis practices to secure buy-in and have a program that is sustainable in the long term.

(Adapted from PMI, 2017)
The biggest sources of project failure include:
Source: MindTools.com, 2023.
Enterprise business analysis addresses these sources and more.
It brings a holistic view of the organization, improving collaboration and decision making across the many lines of business, effectively breaking down silos.
In addition to ensuring we're doing the right things, not just doing things right in the form of improved requirements and more accurate business cases, or ensuring return on investment (ROI) and monitoring the broader landscape, enterprise business analysis also supports:
Pains, gains, threats, and opportunities can come at your organization from anywhere. Be it a new product launch, an international expansion, or a new competitor, it can be challenging to keep up.
This is where an enterprise business analyst can be the most helpful.
By keeping a pulse on the external and internal environments, they can support growth, manage risks, and view your organization through multiple lenses and perspectives to get a single, complete picture.
External |
Internal |
|
|---|---|---|
Identifying competitive forces |
In the global environment |
Organizational strengths and weaknesses |
|
|
|
Download the Communicate the Case for Enterprise Business Analysis template
Input
Output
Materials
Participants
Phase 1 | Phase 2 |
|---|---|
1.1 Define enterprise business analysis 1.2 Identify your pains and opportunities | 2.1 Set your vision 2.2 Define your roadmap and next steps 2.3 Complete your executive communications deck |
This phase will walk you through the following activities:
This phase involves the following participants:
Your vision becomes your "north star," guiding your journey and decisions.
When thinking about a vision statement for enterprise business analysis, think about:
Always remember: Your goal is not your vision!
Not knowing the difference will prevent you from both dreaming big and achieving your dream.
Your vision represents where you want to go. It's what you want to do.
Your goals represent how you want to achieve your vision.
Your vision shouldn't be so far out that it doesn't feel real, nor so short term that it gets bogged down in details. Finding balance will take some trial and error and will be different depending on your organization.
Download the Communicate the Case for Enterprise Business Analysis template
Input
Output
Materials
Participants
Training
Competencies and capabilities
Structure and alignment
Methods and processes
Tools, techniques, and templates
Governance
Download the Communicate the Case for Enterprise Business Analysis template
Input
Output
Materials
Participants
From completing the enterprise business analysis inventory, you will have a comprehensive list of all available assets.
The next question is, how can this be leveraged to start building for the future?
To operationalize enterprise business analysis, consider:
The Now, Next, Later technique is a method for prioritizing and planning improvements or tasks. This involves breaking down a list of tasks or improvements into three categories:
By using this technique, you can prioritize and plan the most important tasks, while allowing the flexibility to adjust as necessary.
This technique also helps clarify what must be done first vs. what can wait. This prioritizes the most important things while keeping track of what must be done next, maintaining a smooth development/improvement process.

Ultimately, the choice of priority and timing is yours. Recognize that items may change categories as new information arises.
Download the Communicate the Case for Enterprise Business Analysis template
Input
Output
Materials
Participants
Use the results of your completed exercises to build your executive communication slide deck, to make the case for enterprise business analysis
| Slide Header | Associated Exercise | Rationale |
|---|---|---|
| Pains and opportunities | 1.1.2 Discuss your disconnects between strategy and tactics 1.2.1 Identify your pains and opportunities |
This helps build the case for enterprise business analysis (EBA), leveraging the existing pains felt in the organization. This will draw the connection for your stakeholders. |
| Our vision and goals | 2.1.1 Define your vision and goals | Defines where you want to go and what effort will be required. |
| What is enterprise business analysis | 1.1.1 How is BA being used in our organization today? |
Defines the discipline of EBA and how it can support and mature your organization. |
| Expected benefits | Pre-populated supporting content | What's in it for us? This section helps answer that question. What benefits can we expect, and is this worth the investment of time and effort? |
| Making this a reality | 2.1.2 Identify your EBA inventory | Identifies what the organization presently has that makes the effort easier. It doesn't feel as daunting if there are existing people, processes, and technologies in place and in use today. |
| Next steps | 2.2.1 Now, Next, Later | A prioritized list of action items. This will demonstrate the work involved, but broken down over time, into smaller, more manageable pieces. |
| Metric | Description | Target Improvement/Reduction |
|---|---|---|
| Improved stakeholder satisfaction | Lines of business and previously siloed departments/divisions will be more satisfied with time spent on solution involvement and outcomes. | 10% year 1, 20% year 2 |
| Reduction in misaligned/non-priority project work | Reduction in projects, products, and services with no clear alignment to organizational goals. With that, resource costs can be allocated to other, higher-value solutions. | 10% year 1, 25% year 2 |
| Improved delivery agility/lead time | With improved alignment comes reduced conflict and political infighting. As a result, the velocity of solution delivery will increase. | 10% |
Bossert, Oliver and Björn Münstermann. "Business's 'It's not my problem' IT problem." McKinsey Digital. 30 March, 2023.
Brule, Glenn R. "The Lay of the Land: Enterprise Analysis." Modern Analyst.
"Business Analysis: Leading Organizations to Better Outcomes." Project Management Institute (PMI), 2017
Corporate Finance Institute. "Strategic Analysis." Updated 14 March 2023
IAG Consulting. Business Analysis Benchmark Report, 2009.
International Institute of Business Analysis. "A Guide to the Business Analysis Body of Knowledge" (BABOK Guide) version 3.
Mirabelli, Vincent. "Business Analysis Foundations: Enterprise" LinkedIn Learning, February 2022.
- - "Essential Techniques in Enterprise Analysis" LinkedIn Learning, September 2022.
- - "The Essentials of Enterprise Analysis" Love the Process Academy. May 2020.
- - "The Value of Enterprise Analysis." VincentMirabelli.com
Praslova, Ludmila N. "Today's Most Critical Workplace Challenges Are About Systems." Harvard Business Review. 10 January 2023.
Pratt, Mary K. and Sarah K. White. "What is a business analyst? A key role for business-IT efficiency." CIO. 17 April, 2019.
Project Management Institute. "Business Analysis: Leading Organizations to Better Outcomes." October 2017.
Sali, Sema. "The Importance of Strategic Business Analysis in Successful Project Outcomes." International Institute of Business Analysis. 26 May 2022.
- - "What Does Enterprise Analysis Look Like? Objectives and Key Results." International Institute of Business Analysis. 02 June 2022.
Shaker, Kareem. "Why do projects really fail?" Project Management Institute, PM Network. July 2010.
"Strategic Analysis: Definition, Types and Benefits" Voxco. 25 February 2022.
"The Difference Between Enterprise Analysis and Business Analysis." Schulich School of Business, Executive Education Center. 24 September 2018 (Updated June 2022)
"Why Do Projects Fail: Learning How to Avoid Project Failure." MindTools.com. Accessed 24 April 2023.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
State the success criteria of your application management practice through defined objectives and metrics. Assess your maturity.
Structure your application management governance model with the right process and roles. Inject product ownership into your practice.
Build your application management optimization roadmap to achieve your target state.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
State the success criteria of your application management practice through defined objectives and metrics.
Assess your maturity.
Grounded stakeholder expectations
Application management maturity and identification of optimization opportunities
1.1 Set your objectives.
1.2 Assess your maturity.
Application management objectives and metrics
Application management maturity and optimization opportunities
Structure your application management governance model with the right process and roles.
Inject product ownership into your practice.
Management approach aligned to product value and criticality
Management techniques to govern the product backlog
Target-state application management process and roles
2.1 Select your management approach.
2.2 Manage your single product backlog.
2.3 Optimize your management process.
2.4 Define your management roles.
Application management approach for each application
Product backlog management practices
Application management process
Application management roles and responsibilities and communication flow
Build your application management optimization roadmap to achieve your target state.
Optimization opportunities
Application management optimization roadmap
3.1 Build your optimization roadmap.
Application management optimization roadmap
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Select the top automation candidates to score some quick wins.
Map and optimize process flows for each task you wish to automate.
Build a process around managing IT automation to drive value over the long term.
Build a long-term roadmap to enhance your organization's automation capabilities.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify top candidates for automation.
Plan to achieve quick wins with automation for early value.
1.1 Identify MRW pain points.
1.2 Drill down pain points into tasks.
1.3 Estimate the MRW involved in each task.
1.4 Rank the tasks based on value and ease.
1.5 Select top candidates and define metrics.
1.6 Draft project charters.
MRW pain points
MRW tasks
Estimate of MRW involved in each task
Ranking of tasks for suitability for automation
Top candidates for automation & success metrics
Project charter(s)
Map and optimize the process flow of the top candidate(s).
Requirements for automation of the top task(s).
2.1 Map process flows.
2.2 Review and optimize process flows.
2.3 Clarify logic and finalize future-state process flows.
Current-state process flows
Optimized process flows
Future-state process flows with complete logic
Develop a lightweight process for rolling out automation and for managing the automation program.
Ability to measure and to demonstrate success of each task automation, and of the program as a whole.
3.1 Kick off your test plan for each automation.
3.2 Define process for automation rollout.
3.3 Define process to manage your automation program.
3.4 Define metrics to measure success of your automation program.
Test plan considerations
Automation rollout process
Automation program management process
Automation program metrics
Build a roadmap to enhance automation capabilities.
A clear timeline of initiatives that will drive improvement in the automation program to reduce MRW.
4.1 Build a roadmap for next steps.
IT automation roadmap
Automation can be very, very good, or very, very bad.
Do it right, and you can make your life a whole lot easier.
Do it wrong, and you can suffer some serious pain.
All too often, automation is deployed willy-nilly, without regard to the overall systems or business processes in which it lives.
IT professionals should follow a disciplined and consistent approach to automation to ensure that they maximize its value for their organization.
Derek Shank,
Research Analyst, Infrastructure & Operations
Info-Tech Research Group
Follow our methodology to focus IT automation on reducing toil.
Queues create waste and are extremely damaging. Like a tire fire, once you get started, they’re almost impossible to stamp out!
(Source: Edwards, citing Donald G. Reinersten: The Principles of Product Development Flow: Second Generation Lean Product Development )
Every additional layer of complexity multiplies points of failure. Beyond a certain level of complexity, troubleshooting can become a nightmare.
Today, Operations is responsible for the outcomes of a full stack of a very complex, software-defined, API-enabled system running on infrastructure they may or may not own.
– Edwards
The systems built under each new technology paradigm never fully replace the systems built under the old paradigms. It’s not uncommon for an enterprise to have an accumulation of systems built over 10-15 years and have no budget, risk appetite, or even a viable path to replace them all. With each shift, who bares [SIC] the brunt of the responsibility for making sure the old and the new hang together? Operations, of course. With each new advance, Operations juggles more complexity and more layers of legacy technologies than ever before.
– Edwards
Personnel resources in most IT organizations overlap heavily between “build” and “run.”
Some CIOs see a Sys Admin and want to replace them with a Roomba. I see a Sys Admin and want to build them an Iron Man suit.
– Deepak Giridharagopal, CTO, Puppet
When we automate, we can make sure we do something the same way every time and produce a consistent result.
We can design an automated execution that will ship logs that provide the context of the action for a detailed audit trail.
Because the C-suite relies on upwards communication — often filtered and sanitized by the time it reaches them — executives don’t see the bottlenecks and broken processes that are stalling progress.
– Andi Mann
To get the full ROI on your automation, you need to treat it like an employee. When you hire an employee, you invest in that person. You spend time and resources training and nurturing new employees so they can reach their full potential. The investment in a new employee is no different than your investment in automation.– Edwards
| Example of How to Estimate Dollar Value Impact of Automation | |||
|---|---|---|---|
| Metric | Timeline | Target | Value |
| Hours of manual repetitive work | 12 months | 20% reduction | $48,000/yr.(1) |
| Hours of project capacity | 18 months | 30% increase | $108,000/yr.(2) |
| Downtime caused by errors | 6 months | 50% reduction | $62,500/yr.(3) |
1 15 FTEs x 80k/yr.; 20% of time on MRW, reduced by 20%
2 15 FTEs x 80k/yr.; 30% project capacity, increased by 30%
3 25k/hr. of downtime.; 5 hours per year of downtime caused by errors
Industry Financial Services
Source Interview
An IT infrastructure manager had established DR failover procedures, but these required a lot of manual work to execute. His team lacked the expertise to build automation for the failover.
The manager hired consultants to build scripts that would execute portions of the failover and pause at certain points to report on outcomes and ask the human operator whether to proceed with the next step.
The infrastructure team reduced their achievable RTOs as follows:
Tier 1: 2.5h → 0.5h
Tier 2: 4h → 1.5h
Tier 3: 8h → 2.5h
And now, anyone on the team could execute the entire failover!
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| 1. Select Candidates | 2. Map Process Flows | 3. Build Process | 4. Build Roadmap | |
|---|---|---|---|---|
| Best-Practice Toolkit |
1.1 Identify MRW pain points 1.2 Drill down pain points into tasks 1.3 Estimate the MRW involved in each task 1.4 Rank the tasks based on value and ease 1.5 Select top candidates and define metrics 1.6 Draft project charters |
2.1 Map process flows 2.2 Review and optimize process flows 2.3 Clarify logic and finalize future-state process flows |
3.1 Kick off your test plan for each automation 3.2 Define process for automation rollout 3.3 Define process to manage your automation program 3.4 Define metrics to measure success of your automation program |
4.1 Build automation roadmap |
| Guided Implementations |
Introduce methodology. Review automation candidates. Review success metrics. |
Review process flows. Review end-to-end process flows. |
Review testing considerations. Review automation SDLC. Review automation program metrics. |
Review automation roadmap. |
| Onsite Workshop | Module 1: Identify Automation Candidates |
Module 2: Map and Optimize Processes |
Module 3: Build a Process for Managing Automation |
Module 4: Build Automation Roadmap |
| Phase 1 Results: Automation candidates and success metrics |
Phase 2 Results: End-to-end process flows for automation |
Phase 3 Results: Automation SDLC process, and automation program management process |
Phase 4 Results: Automation roadmap |
Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organizational value streams and their business capabilities with key data governance dimensions and initiatives. Info-Tech's approach will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Data governance is a strategic program that will help your organization control data by managing the people, processes, and information technology needed to ensure that accurate and consistent data policies exist across varying lines of the business, enabling data-driven insight. This research will provide an overview of data governance and its importance to your organization, assist in making the case and securing buy-in for data governance, identify data governance best practices and the challenges associated with them, and provide guidance on how to implement data governance best practices for a successful launch.
This workbook will help your organization understand the business and user context by leveraging your business capability map and value streams, develop data use cases using Info-Tech's framework for building data use cases, and gauge the current state of your organization's data culture.
This business needs gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization. This template provides a framework for data requirements and a mapping methodology for creating use cases.
This tool will help your organization plan the sequence of activities, capture start dates and expected completion dates, and create a roadmap that can be effectively communicated to the organization.
Use this template to document information about key data assets such as data definition, source system, possible values, data sensitivity, data steward, and usage of the data.
This template will help get the backing required to get a data governance project rolling. The program charter will help communicate the project purpose, define the scope, and identify the project team, roles, and responsibilities.
This policy establishes uniform data governance standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of your organization.
Use this exemplar to understand how to establish data governance in your organization. Follow along with the sections of the blueprint Establish Data Governance and complete the document as you progress.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify key business data assets that need to be governed.
Create a unifying vision for the data governance program.
Understand the value of data governance and how it can help the organization better leverage its data.
Gain knowledge of how data governance can benefit both IT and the business.
1.1 Establish business context, value, and scope of data governance at the organization
1.2 Introduction to Info-Tech’s data governance framework
1.3 Discuss vision and mission for data governance
1.4 Understand your business architecture, including your business capability map and value streams
1.5 Build use cases aligned to core business capabilities
Sample use cases (tied to the business capability map) and a repeatable use case framework
Vision and mission for data governance
Assess which data contains value and/or risk and determine metrics that will determine how valuable the data is to the organization.
Assess where the organization currently stands in data governance initiatives.
Determine gaps between the current and future states of the data governance program.
Gain a holistic understanding of organizational data and how it flows through business units and systems.
Identify which data should fall under the governance umbrella.
Determine a practical starting point for the program.
2.1 Understand your current data governance capabilities and maturity
2.2 Set target-state data governance capabilities
Current state of data governance maturity
Definition of target state
Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.
Determine timing of the initiatives.
Establish clear direction for the data governance program.
Step-by-step outline of how to create effective data governance, with true business-IT collaboration.
3.1 Evaluate and prioritize performance gaps
3.2 Develop and consolidate data governance target-state initiatives
3.3 Define the role of data governance: data domain to data governance role mapping
Target-state data governance initiatives
Data domain to data governance role mapping
Consolidate the roadmap and other strategies to determine the plan of action from Day One.
Create the required policies, procedures, and positions for data governance to be sustainable and effective.
Prioritized initiatives with dependencies mapped out.
A clearly communicated plan for data governance that will have full business backing.
4.1 Identify and prioritize next steps
4.2 Define roles and responsibilities and complete a high-level RACI
4.3 Wrap-up and discuss next steps and post-workshop support
Initialized roadmap
Initialized RACI
Data governance does not sit as an island on its own in the organization – it must align with and be driven by your enterprise governance. As you build out data governance in your organization, it’s important to keep in mind that this program is meant to be an enabling framework of oversight and accountabilities for managing, handling, and protecting your company’s data assets. It should never be perceived as bureaucratic or inhibiting to your data users. It should deliver agreed-upon models that are conducive to your organization’s operating culture, offering clarity on who can do what with the data and via what means. Data governance is the key enabler for bringing high-quality, trusted, secure, and discoverable data to the right users across your organization. Promote and drive the responsible and ethical use of data while helping to build and foster an organizational culture of data excellence.
Crystal Singh
Director, Research & Advisory, Data & Analytics Practice
Info-Tech Research Group
The amount of data within organizations is growing at an exponential rate, creating a need to adopt a formal approach to governing data. However, many organizations remain uninformed on how to effectively govern their data. Comprehensive data governance should define leadership, accountability, and responsibility related to data use and handling and be supported by a well-oiled operating model and relevant policies and procedures. This will help ensure the right data gets to the right people at the right time, using the right mechanisms.
Organizations are faced with challenges associated with changing data landscapes, evolving business models, industry disruptions, regulatory and compliance obligations, and changing and maturing user landscape and demand for data. Although the need for a data governance program is often evident, organizations miss the mark when their data governance efforts are not directly aligned to delivering measurable business value. Initiatives should support key strategic initiatives, as well as value streams and their underlying business capabilities.
Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organizational value streams and their business capabilities with key data governance dimensions and initiatives. Organizations should:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operating costs, missed opportunities, eroded stakeholder satisfaction, and increased business risk.
As you embark on establishing data governance in your organization, it’s vital to ensure from the get-go that you define the drivers and business context for the program. Data governance should never be attempted without direction on how the program will yield measurable business value.
“Data processing and cleanup can consume more than half of an analytics team’s time, including that of highly paid data scientists, which limits scalability and frustrates employees.” – Petzold, et al., 2020
“The productivity of employees across the organization can suffer.” – Petzold, et al., 2020
Respondents to McKinsey’s 2019 Global Data Transformation Survey reported that an average of 30% of their total enterprise time was spent on non-value-added tasks because of poor data quality and availability. – Petzold, et al., 2020
78% of companies (and 92% of top-tier companies) have a corporate initiative to become more data-driven. – Alation, 2020
But despite these ambitions, there appears to be a “data culture disconnect” – 58% of leaders overestimate the current data culture of their enterprises, giving a grade higher than the one produced by the study. – Fregoni, 2020
Respond to industry disruptors
Optimize the way you serve your stakeholders and customers
Develop products and services to meet ever-evolving needs
Manage operations and mitigate risk
Data Disengaged
You have a low appetite for data and rarely use data for decision making.
Data Enabled
Technology, data architecture, and people and processes are optimized and supported by data governance.
Data Driven
You are differentiating and competing on data and analytics; described as a “data first” organization. You’re collaborating through data. Data is an asset.
Data governance is an enabling framework of decision rights, responsibilities, and accountabilities for data assets across the enterprise.
Data governance is:
If done correctly, data governance is not:
Conformance: Establishing data governance to meet regulations and compliance requirements.
Performance: Establishing data governance to fuel data-driven decision making for driving business value and managing and mitigating business risk.
“Albert Einstein is said to have remarked, ‘The world cannot be changed without changing our thinking.’ What is clear is that the greatest barrier to data success today is business culture, not lagging technology. “– Randy Bean, 2020
“It is not enough for companies to embrace modern data architectures, agile methodologies, and integrated business-data teams, or to establish centers of excellence to accelerate data initiatives, when only about 1 in 4 executives reported that their organization has successfully forged a data culture.”– Randy Bean, 2020
Data-driven culture = “data matters to our company”
Data debt is “the accumulated cost that is associated with the sub-optimal governance of data assets in an enterprise, like technical debt.”
Data debt is a problem for 78% of organizations.
40% of organizations say individuals within the business do not trust data insights.
66% of organizations say a backlog of data debt is impacting new data management initiatives.
33% of organizations are not able to get value from a new system or technology investment.
30% of organizations are unable to become data-driven.
Source: Experian, 2020
Only 3% of companies’ data meets basic quality standards. (Source: Nagle, et al., 2017)
Organizations suspect 28% of their customer and prospect data is inaccurate in some way. (Source: Experian, 2020)
Only 51% of organizations consider the current state of their CRM or ERP data to be clean, allowing them to fully leverage it. (Source: Experian, 2020)
35% of organizations say they’re not able to see a ROI for data management initiatives. (Source: Experian, 2020)
Make the available data governance tools and technology work for you:
While data governance tools and technologies are no panacea, leverage their automated and AI-enabled capabilities to augment your data governance program.
Put data governance into the context of the business:
Start substantiating early on how you are going to measure success as your data governance program evolves.
Key considerations:
Data Governance Leadership & Org Structure Definition
Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.
Data Governance Charter and Policies
Create a charter for your program and build/refresh associated policies.
Data Culture Diagnostic
Understand the organization’s current data culture, perception of data, value of data, and knowledge gaps.
Use Case Build and Prioritization
Build a use case that is tied to business capabilities. Prioritize accordingly.
Business Data Glossary
Build and/or refresh the business’ glossary for addressing data definitions and standardization issues.
Tools & Technology
Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).
Data governance leadership and sponsorship is key.
Ensure strategic business alignment.
Build and foster a culture of data excellence.
Evolve along the data journey.
Make data governance an enabler, not a hindrance.
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face the impact of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Data governance should not sit as an island in your organization. It must continuously align with the organization’s enterprise governance function. It shouldn’t be perceived as a pet project of IT, but rather as an enterprise-wide, business-driven initiative.
Ensure your data governance program delivers measurable business value by aligning the associated data governance initiatives with the business architecture. Leverage the measures of success or KPIs of the underlying business capabilities to demonstrate the value data governance has yielded for the organization.
Data governance remains the foundation of all forms of reporting and analytics. Advanced capabilities such as AI and machine learning require effectively governed data to fuel their success.
Tailor your data literacy program to meet your organization’s needs, filling your range of knowledge gaps and catering to your different levels of stakeholders. When it comes to rolling out a data literacy program, there is no one-size-fits-all solution. Your data literacy program is intended to fill the knowledge gaps about data, as they exist in your organization. It should be targeted across the board – from your executive leadership and management through to the subject matter experts across different lines of the business in your organization.
| 1. Build Business and User Context | 2. Understand Your Current Data Governance Capabilities | 3. Build a Target State Roadmap and Plan | |
|---|---|---|---|
| Phase Steps |
|
|
|
| Phase Outcomes |
|
|
|
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Data Governance Planning and Roadmapping Workbook
Use the Data Governance Planning and Roadmapping Workbook as you plan, build, roll-out, and scale data governance in your organization.
Data Use Case Framework Template
This template takes you through a business needs gathering activity to highlight and create relevant use cases around the organization’s data-related problems and opportunities.
Business Data Glossary
Use this template to document the key data assets that are to be governed and create a data flow diagram for your organization.
Data Culture Diagnostic and Scorecard
Leverage Info-Tech’s Data Culture Diagnostic to understand how your organization scores across 10 areas relating to data culture.
Data Governance Planning and Roadmapping Workbook
In phases 1 and 2 of this blueprint, we will help you establish the business context, define your business drivers and KPIs, and understand your current data governance capabilities and strengths.
In phase 3, we will help you develop a plan and a roadmap for addressing any gaps and improving the relevant data governance capabilities so that data is well positioned to deliver on those defined business metrics.
"Our team, has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
| 1. Build Business and User context | 2. Understand Your Current Data Governance Capabilities | 3. Build a Target State Roadmap and Plan | |
|---|---|---|---|
| Best-Practice Toolkit |
|
|
|
| Guided Implementation |
|
|
|
| Phase Outcomes |
|
|
|
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.
| Day 1 | Day 2 | Day 3 | Day 4 | |
|---|---|---|---|---|
| Establish Business Context and Value | Understand Current Data Governance Capabilities and Plot Target-State Levels | Build Data Domain to Data Governance Role Mapping | Formulate a Plan to Get to Your Target State | |
| Activities |
|
|
|
|
| Deliverables |
|
|
|
|
“When business users are invited to participate in the conversation around data with data users and IT, it adds a fundamental dimension — business context. Without a real understanding of how data ties back to the business, the value of analysis and insights can get lost.” – Jason Lim, Alation
This phase will guide you through the following activities:
This phase involves the following participants:
Activities
1.1.1 Identify Your Business Capabilities
1.1.2 Categorize Your Organization’s Key Business Capabilities
1.1.3 Develop a Strategy Map Tied to Data Governance
This step will guide you through the following activities:
Outcomes of this step
Gaining a sound understanding of your business architecture (value streams and business capabilities) is a critical foundation for establishing and sustaining a data governance program that delivers measurable business value.
Confirm your organization's existing business capability map or initiate the formulation of a business capability map:
Note: A business capability defines what a business does to enable value creation. Business capabilities are business terms defined using descriptive nouns such as “Marketing” or “Research and Development.” They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome.
Input
Output
Materials
Participants
For more information, refer to Info-Tech’s Document Your Business Architecture.
Value streams connect business goals to the organization’s value realization activities. These value realization activities, in turn, depend on data.
If the organization does not have a business architecture function to conduct and guide Activity 1.1.1, you can leverage the following approach:
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face the possibilities of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, negative impact to reputation and brand, and/or increased exposure to business risk.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Info-Tech’s Industry Reference Architecture for Retail Banking.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Higher Education.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Local Government.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Manufacturing.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Retail.
A business capability defines what a business does to enable value creation. Business capabilities represent stable business functions and typically will have a defined business outcome.
Business capabilities can be thought of as business terms defined using descriptive nouns such as “Marketing” or “Research and Development.”
If your organization doesn’t already have a business capability map, you can leverage the following approach to build one. This initiative requires a good understanding of the business. By working with the right stakeholders, you can develop a business capability map that speaks a common language and accurately depicts your business.
Working with the stakeholders as described above:
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
For more information, refer to Info-Tech’s Document Your Business Architecture.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Retail Banking
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail Banking.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Higher Education
For this business capability map, download Info-Tech’s Industry Reference Architecture for Higher Education.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Local Government
For this business capability map, download Info-Tech’s Industry Reference Architecture for Local Government.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Manufacturing
For this business capability map, download Info-Tech’s Industry Reference Architecture for Manufacturing.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Retail
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail.
Determine which capabilities are considered high priority in your organization.
This categorization/prioritization exercise helps highlight prime areas of opportunity for building use cases, determining prioritization, and the overall optimization of data and data governance.
Input
Output
Materials
Participants
For more information, refer to Info-Tech’s Document Your Business Architecture.
This exercise is useful in ensuring the data governance program is focused and aligned to support the priorities and direction of the business.
Example: Retail
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail.
Identify the strategic objectives for the business. Knowing the key strategic objectives will drive business-data governance alignment. It’s important to make sure the right strategic objectives of the organization have been identified and are well understood.
Guide to creating your map: Starting with strategic objectives, map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance to initiatives that support those capabilities. This is one approach to help you prioritize the data initiatives that deliver the most value to the organization.
Input
Output
Materials
Participants
Download Info-Tech’s Data Governance Planning and Roadmapping Workbook
Start with the strategic objectives, then map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance initiatives that support those capabilities. This process will help you prioritize the data initiatives that deliver the most value to the organization.
Example: Retail
For this strategy map, download Info-Tech’s Industry Reference Architecture for Retail.
Activities
1.2.1 Build High-Value Use Cases
This step will guide you through the following activities:
Outcomes of this step
One of the most important aspects when building use cases is to ensure you include KPIs or measures of success. You have to be able to demonstrate how the use case ties back to the organizational priorities or delivers measurable business value. Leverage the KPIs and success factors of the business capabilities tied to each particular use case.
This business needs-gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization.
Tip: Don’t conclude these use case discussions without substantiating what measures of success will be used to demonstrate the business value of the effort to produce the desired future state, as relevant to each particular use case.
Input
Output
Materials
Participants
Download Info-Tech’s Data Use Case Framework Template
Leveraging your business capability map, build use cases that align with the organization’s key business capabilities.
Consider:
Info-Tech’s Data Requirements and Mapping Methodology for Creating Use Cases
The resulting use cases are to be prioritized and leveraged for informing the business case and the data governance capabilities optimization plan.
Taken from Info-Tech’s Data Use Case Framework Template
This phase will guide you through the following activities:
This phase involves the following participants:
This step will guide you through the following activities:
Outcomes of this step
A well-defined data governance program will deliver:
The key components of establishing sustainable enterprise data governance, taken from Info-Tech’s Data Governance Framework:
The office of the chief data officer (CDO):
“Compared to most of their C-suite colleagues, the CDO is faced with a unique set of problems. The role is still being defined. The chief data officer is bringing a new dimension and focus to the organization: ‘data.’ ”
– Carruthers and Jackson, 2020
“The title matters. In my opinion, you can’t have a CDO without executive authority. Otherwise no one will listen.”
– Anonymous European CDO
“The reporting structure depends on who’s the ‘glue’ that ties together all these uniquely skilled individuals.”
– John Kemp, Senior Director, Executive Services, Info-Tech Research Group
Who are best suited to be data owners?
Data owners are typically senior business leaders with the following characteristics:
Data governance working groups:
Traditionally, data stewards:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Enabling business capabilities with data governance role definitions
“Generate excitement for data: When people are excited and committed to the vision of data enablement, they’re more likely to help ensure that data is high quality and safe.” – Petzold, et al., 2020
Operating Model
Defining your data governance operating model will help create a well-oiled program that sustainably delivers value to the organization and manages risks while building and fostering a culture of data excellence along the way. Some organizations are able to establish a formal data governance office, whether independent or attached to the office of the chief data officer. Regardless of how you are organized, data governance requires a home, a leader, and an operating model to ensure its sustainability and evolution.
Examples of focus areas for your operating model:
The key is to determine what style will work best in your organization, taking into consideration your organizational culture, executive leadership support (present and ongoing), catalysts such as other enterprise-wide transformative and modernization initiatives, and/or regulatory and compliances drivers.
Furthermore, communication with the wider organization of data producers, users, and consumers is one of the core elements of the overall data governance communications plan.
Communication is vital for ensuring acceptance of new processes, rules, guidelines, and technologies by all data producers and users as well as for sharing success stories of the program.
“Leading organizations invest in change management to build data supporters and convert the skeptics. This can be the most difficult part of the program, as it requires motivating employees to use data and encouraging producers to share it (and ideally improve its quality at the source)[.]” – Petzold, et al., 2020
Examples of focus areas for your operating model (continued):
Preparing people for change well in advance will allow them to take the steps necessary to adapt and reduce potential confrontation. By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Aligning your data governance to the organization's value realization activities enables you to leverage the KPIs of those business capabilities to demonstrate tangible and measurable value. Use terms and language that will resonate with your senior business leadership.
Launching a data governance program will bring with it a level of disruption to the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
“Data standards are the rules by which data are described and recorded. In order to share, exchange, and understand data, we must standardize the format as well as the meaning.” – U.S. Geological Survey
Examples of data policies:
“Organizational culture can accelerate the application of analytics, amplify its power, and steer companies away from risky outcomes.” – Petzold, et al., 2020
What does a healthy data culture look like?
Building a culture of data excellence.
Leverage Info-Tech’s Data Culture Diagnostic to understand your organization’s culture around data.
Contact your Info-Tech Account Representative for more information on the Data Culture Diagnostic
“People are at the heart of every culture, and one of the biggest challenges to creating a data culture is bringing everyone into the fold.” – Lim, Alation
“Companies that have succeeded in their data-driven efforts understand that forging a data culture is a relentless pursuit, and magic bullets and bromides do not deliver results.” – Randy Bean, 2020
There is a trusted, single source of data the whole company can draw from.
There’s a business glossary and data catalog and users know what the data fields mean.
Users have access to data and analytics tools. Employees can leverage data immediately to resolve a situation, perform an activity, or make a decision – including frontline workers.
Data literacy, the ability to collect, manage, evaluate, and apply data in a critical manner, is high.
Data is used for decision making. The company encourages decisions based on objective data and the intelligent application of it.
Data governance will support your organization’s ethical use and handling of data by facilitating definition around important factors, such as:
Activities
2.2.1 Gauge Your Organization’s Current Data Culture
This step will guide you through the following activities:
Outcomes of this step
Conduct a Data Culture Survey or Diagnostic
The objectives of conducting a data culture survey are to increase the understanding of the organization's data culture, your users’ appetite for data, and their appreciation for data in terms of governance, quality, accessibility, ownership, and stewardship. To perform a data culture survey:
Input
Output
Materials
Participants
Contact your Info-Tech Account Representative for details on launching a Data Culture Diagnostic.
“Achieving data success is a journey, not a sprint.” Companies that set a clear course, with reasonable expectations and phased results over a period of time, get to the destination faster.” – Randy Bean, 2020
This phase will guide you through the following activities:
This phase involves the following participants:
This step will guide you through the following activities:
Outcomes of this step
Key considerations:
Sample milestones:
Data Governance Leadership & Org Structure Definition
Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.
Data Governance Charter and Policies
Create a charter for your program and build/refresh associated policies.
Data Culture Diagnostic
Understand the organization’s current data culture, perception of data, value of data, and knowledge gaps.
Use Case Build and Prioritization
Build a use case that is tied to business capabilities. Prioritize accordingly.
Business Data Glossary/Catalog
Build and/or refresh the business’ glossary for addressing data definitions and standardization issues.
Tools & Technology
Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).
Define key roles for getting started.
Start small and then scale – deliver early wins.
Start understanding data knowledge gaps, building the program, and delivering.
Make the available data governance tools and technology work for you.
Sample data governance roadmap milestones:
Key Considerations:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Enable business capabilities with data governance role definitions.
These are some of the data governance tools and technology players. Check out SoftwareReviews for help making better software decisions.
The data steward must be empowered and backed politically with decision-making authority, or the role becomes stale and powerless.
Ensuring compliance can be difficult. Data stewards may experience pushback from stakeholders who must deliver on the policies, procedures, and processes that the data steward enforces.
Because the data steward must enforce data processes and liaise with so many different people and departments within the organization, the data steward role should be their primary full-time job function – where possible.
However, in circumstances where budget doesn’t allow a full-time data steward role, develop these skills within the organization by adding data steward responsibilities to individuals who are already managing data sets for their department or line of business.
A stewardship role is generally more about managing the cultural change that data governance brings. This requires the steward to have exceptional interpersonal skills that will assist in building relationships across departmental boundaries and ensuring that all stakeholders within the organization believe in the initiative, understand the anticipated outcomes, and take some level of responsibility for its success.
Data governance initiatives must contain a strong organizational disruption component. A clear and concise communication strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.
By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organization’s culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.
Because a data governance initiative will involve data-driven business units across the organization, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.
Attempting to implement change without an effective communication plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Launching a data governance initiative is guaranteed to disrupt the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
To create a strong vision for data governance, there must be participation from the business and IT. A common vision will articulate the state the organization wishes to achieve and how it will reach that state. Visioning helps to develop long-term goals and direction.
Once the vision is established, it must be effectively communicated to everyone, especially those who are involved in creating, managing, disposing, or archiving data.
The data governance program should be periodically refined. This will ensure the organization continues to incorporate best methods and practices as the organization grows and data needs evolve.
A successful data governance communications plan involves making the initiative visible and promoting staff awareness. Educate the team on how data is collected, distributed, and used, what internal processes use data, and how that data is used across departmental boundaries.
By demonstrating how data governance will affect staff directly, you create a deeper level of understanding across lines of business, and ultimately, a higher level of acceptance for new processes, rules, and guidelines.
A clear and concise communications strategy will raise the profile of data governance within the organization, and staff will understand how the program will benefit them and how they can share in the success of the initiative. This will end up providing support for the initiative across the board.
Focus on literacy and communication: include training in the communication plan. Providing training for data users on the correct procedures for updating and verifying the accuracy of data, data quality, and standardized data policies will help validate how data governance will benefit them and the organization.
The data governance program is responsible for continuously promoting the value of data to the organization. The data governance program should seek a variety of ways to educate the organization and data stakeholders on the benefit of data management.
Even if data policies and procedures are created, they will be highly ineffective if they are not properly communicated to the data producers and users alike.
There needs to be a communication plan that highlights how the data producer and user will be affected, what their new responsibilities are, and the value of that change.
To learn how to manage organizational change, refer to Info-Tech’s Master Organizational Change Management Practices.
It can be difficult to understand what a policy is, and what it is not. Start by identifying the differences between a policy and standards, guidelines, and procedures.
The following are key elements of a good policy:
| Heading | Descriptions |
|---|---|
| Purpose | Describes the factors or circumstances that mandate the existence of the policy. Also states the policy’s basic objectives and what the policy is meant to achieve. |
| Scope | Defines to whom and to what systems this policy applies. Lists the employees required to comply or simply indicates “all” if all must comply. Also indicates any exclusions or exceptions, i.e. those people, elements, or situations that are not covered by this policy or where special consideration may be made. |
| Definitions | Define any key terms, acronyms, or concepts that will be used in the policy. A standard glossary approach is sufficient. |
| Policy Statements | Describe the rules that comprise the policy. This typically takes the form of a series of short prescriptive and proscriptive statements. Sub-dividing this section into sub-sections may be required depending on the length or complexity of the policy. |
| Non-Compliance | Clearly describe consequences (legal and/or disciplinary) for employee non-compliance with the policy. It may be pertinent to describe the escalation process for repeated non-compliance. |
| Agreement | Confirms understanding of the policy and provides a designated space to attest to the document. |
Most organizations have problems with policy management. These include:
Technology should be used as a means to solve these problems and effectively monitor, enforce, and communicate policies.
Product Overview
myPolicies is a web-based solution to create, distribute, and manage corporate policies, procedures, and forms. Our solution provides policy managers with the tools they need to mitigate the risk of sanctions and reduce the administrative burden of policy management. It also enables employees to find the documents relevant to them and build a culture of compliance.
Some key success factors for policy management include:
myPolicies
Data policies are short statements that seek to manage the creation, acquisition, integrity, security, compliance, and quality of data. These policies vary amongst organizations, depending on your specific data needs.
Trust
Availability
Security
Compliance
Info-Tech’s Data Management Policy:
This policy establishes uniform data management standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of the organization. This policy applies to all critical data and to all staff who may be creators and/or users of such data.
Info-Tech’s Data Entry Policy:
The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of an organization. It is essential that required data be sourced appropriately and entered into databases and applications in an accurate and complete manner to ensure the reliability and validity of the data and decisions made based on the data.
Info-Tech’s Data Provenance Policy:
Create policies to keep your data's value, such as:
Info-Tech’s Data Integration and Virtualization Policy:
This policy aims to assure the organization, staff, and other interested parties that data integration, replication, and virtualization risks are taken seriously. Staff must use the policy (and supporting guidelines) when deciding whether to integrate, replicate, or virtualize data sets.
Although they can be highly subjective, metrics are extremely important to data governance success.
Policies are great to have from a legal perspective, but unless they are followed, they will not benefit the organization.
Review metrics on an ongoing basis with those data owners/stewards who are accountable, the data governance steering committee, and the executive sponsors.
Examples include:
Have a fundamental data definition model for the entire business to adhere to. Those in the positions that generate and produce data must follow the common set of standards developed by the steering committee and be accountable for the creation of valid, clean data.
By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organization’s culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.
Because a data governance initiative will involve data-driven business units across the organization, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.
Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Data governance initiatives will very likely bring about a level of organizational disruption. A clear and concise communications strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.
Launching a data governance program will bring with it a level of disruption to the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Build Your Business and User Context
Work with your core team of stakeholders to build out your data governance strategy map, aligning data governance initiatives with business capabilities, value streams, and, ultimately, your strategic priorities.
Formulate a Plan to Get to Your Target State
Develop a data governance future state roadmap and plan based on an understanding of your current data governance capabilities, your operating environment, and the driving needs of your business.
Key to building and fostering a data-driven culture.
Streamline your data management program with our simplified framework.
Be the voice of data in a time of transformation.
| Name | Position | Company |
|---|---|---|
| David N. Weber | Executive Director - Planning, Research and Effectiveness | Palm Beach State College |
| Izabela Edmunds | Information Architect | Mott MacDonald |
| Andy Neill | Practice Lead, Data & Analytics | Info-Tech Research Group |
| Dirk Coetsee | Research Director, Data & Analytics | Info-Tech Research Group |
| Graham Price | Executive Advisor, Advisory Executive Services | Info-Tech Research Group |
| Igor Ikonnikov | Research Director, Data & Analytics | Info-Tech Research Group |
| Jean Bujold | Senior Workshop Delivery Director | Info-Tech Research Group |
| Rajesh Parab | Research Director, Data & Analytics | Info-Tech Research Group |
| Reddy Doddipalli | Senior Workshop Director | Info-Tech Research Group |
| Valence Howden | Principal Research Director, CIO | Info-Tech Research Group |
Alation. “The Alation State of Data Culture Report – Q3 2020.” Alation, 2020. Accessed 25 June 2021.
Allott, Joseph, et al. “Data: The next wave in forestry productivity.” McKinsey & Company, 27 Oct. 2020. Accessed 25 June 2021.
Bean, Randy. “Why Culture Is the Greatest Barrier to Data Success.” MIT Sloan Management Review, 30 Sept. 2020. Accessed 25 June 2021.
Brence, Thomas. “Overcoming the Operationalization Challenge with Data Governance at New York Life.” Informatica, 18 March 2020. Accessed 25 June 2021.
Bullmore, Simon, and Stuart Coleman. “ODI Inside Business – a checklist for leaders.” Open Data Institute, 19 Oct. 2020. Accessed 25 June 2021.
Canadian Institute for Health Information. “Developing and implementing accurate national standards for Canadian health care information.” Canadian Institute for Health Information. Accessed 25 June 2021.
Carruthers, Caroline, and Peter Jackson. “The Secret Ingredients of the Successful CDO.” IRM UK Connects, 23 Feb. 2017.
Dashboards. “Useful KPIs for Healthy Hospital Quality Management.” Dashboards. Accessed 25 June 2021.
Dashboards. “Why (and How) You Should Improve Data Literacy in Your Organization Today.” Dashboards. Accessed 25 June 2021.
Datapine. “Healthcare Key Performance Indicators and Metrics.” Datapine. Accessed 25 June 2021.
Datapine. “KPI Examples & Templates: Measure what matters the most and really impacts your success.” Datapine. Accessed 25 June 2021.
Diaz, Alejandro, et al. “Why data culture matters.” McKinsey Quarterly, Sept. 2018. Accessed 25 June 2021.
Everett, Dan. “Chief Data Officer (CDO): One Job, Four Roles.” Informatica, 9 Sept. 2020. Accessed 25 June 2021.
Experian. “10 signs you are sitting on a pile of data debt.” Experian. Accessed 25 June 2021.
Fregoni, Silvia. “New Research Reveals Why Some Business Leaders Still Ignore the Data.” Silicon Angle, 1 Oct. 2020.
Informatica. Holistic Data Governance: A Framework for Competitive Advantage. Informatica, 2017. Accessed 25 June 2021.
Knight, Michelle. “What Is a Data Catalog?” Dataversity, 28 Dec. 2017. Web.
Lim, Jason. “Alation 2020.3: Getting Business Users in the Game.” Alation, 2020. Accessed 25 June 2021.
McDonagh, Mariann. “Automating Data Governance.” Erwin, 29 Oct. 2020. Accessed 25 June 2021.
NewVantage Partners. Data-Driven Business Transformation: Connecting Data/AI Investment to Business Outcomes. NewVantage Partners, 2020. Accessed 25 June 2021.
Olavsrud, Thor. “What is data governance? A best practices framework for managing data assets.” CIO.com, 18 March 2021. Accessed 25 June 2021.
Open Data Institute. “Introduction to data ethics and the data ethics canvas.” Open Data Institute, 2020. Accessed 25 June 2021.
Open Data Institute. “The UK National Data Strategy 2020: doing data ethically.” Open Data Institute, 17 Nov. 2020. Accessed 25 June 2021.
Open Data Institute. “What is the Data Ethics Canvas?” Open Data Institute, 3 July 2019. Accessed 25 June 2021.
Pathak, Rahul. “Becoming a Data-Driven Enterprise: Meeting the Challenges, Changing the Culture.” MIT Sloan Management Review, 28 Sept. 2020. Accessed 25 June 2021.
Redman, Thomas, et al. “Only 3% of Companies’ Data Meets Basic Quality Standards.” Harvard Business Review. 11 Sept 2017.
Petzold, Bryan, et al. “Designing data governance that delivers value.” McKinsey & Company, 26 June 2020. Accessed 25 June 2021.
Smaje, Kate. “How six companies are using technology and data to transform themselves.” McKinsey & Company, 12 Aug. 2020. Accessed 25 June 2021.
Talend. “The Definitive Guide to Data Governance.” Talend. Accessed 25 June 2021.
“The Powerfully Simple Modern Data Catalog.” Atlan, 2021. Web.
U.S. Geological Survey. “Data Management: Data Standards.” U.S. Geological Survey. Accessed 25 June 2021.
Waller, David. “10 Steps to Creating a Data-Driven Culture.” Harvard Business Review, 6 Feb. 2020. Accessed 25 June 2021.
“What is the Difference Between A Business Glossary, A Data Dictionary, and A Data Catalog, and How Do They Play A Role In Modern Data Management?” Analytics8, 23 June 2021. Web.
Wikipedia. “RFM (market research).” Wikipedia. Accessed 25 June 2021.
Windheuser, Christoph, and Nina Wainwright. “Data in a Modern Digital Business.” Thoughtworks, 12 May 2020. Accessed 25 June 2021.
Wright, Tom. “Digital Marketing KPIs - The 12 Key Metrics You Should Be Tracking.” Cascade, 3 March 2021. Accessed 25 June 2021.
Businesses are expected to balance achieving innovation through initiatives that transform the organization with effective risk management. While this is nothing new, added challenges arise due to:
Address digital risk to build digital resilience. In the process, you will drive transformation and maintain digital trust among your employees, end users, and consumers by:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Discover an overview of what digital risk is, learn how to assess risk factors for the five primary categories of digital risk, see several industry-specific scenarios, and explore how to plan for and mitigate identified risks.
Begin building the digital risk profile for your organization, identify where your key areas of risk exposure exist, and assign ownership and accountability among the organization’s business units.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Develop an understanding and standard definition of what digital risk is, who it impacts, and its relevance to the organization.
Understand what digital risk means and how it differs from traditional enterprise or cybersecurity risk.
Develop a definition of digital risk that recognizes the unique external and internal considerations of your organization.
1.1 Review the business context
1.2 Review the current roles of enterprise, IT, and cyber risk management within the organization
1.3 Define digital transformation and list transformation initiatives
1.4 Define digital risk in the context of the organization
1.5 Define digital resilience in the context of the organization
Digital risk drivers
Applicable definition of digital risk
Applicable definition of digital resilience
Understand the roles digital risk management and your digital risk profile have in helping your organization achieve safe, transformative growth.
An overview and understanding of digital risk categories and subsequent individual digital risk factors for the organization
Industry considerations that highlight the importance of managing digital risk
A structured approach to managing the categories of digital risk
2.1 Review and discuss industry case studies and industry examples of digital transformation and digital risk
2.2 Revise the organization's list of digital transformation initiatives (past, current, and future)
2.3 Begin to build your organization's Digital Risk Management Charter (with inputs from Module 1)
2.4 Revise, customize, and complete a Digital Risk Management Charter for the organization
Digital Risk Management Charter
Industry-specific digital risks, factors, considerations, and scenarios
The organization's digital risks mapped to its digital transformation initiatives
Develop an initial digital risk profile that identifies the organization’s core areas of focus in managing digital risk.
A unique digital risk profile for the organization
Digital risk management initiatives that are mapped against the organization's current strategic initiatives and aligned to meet your digital resilience objectives and benchmarks
3.1 Review category control questions within the Digital Risk Profile Tool
3.2 Complete all sections (tabs) within the Digital Risk Profile Tool
3.3 Assess the results of your Digital Risk Profile Tool
3.4 Discuss and assign initial weightings for ownership of digital risk among the organization's stakeholders
Completion of all category tabs within the Digital Risk Profile Tool
Initial stakeholder ownership assignments of digital risk categories
Refine the digital risk management plan for the organization.
A targeted, organization-specific approach to managing digital risk as a part of the organization's projects and initiatives on an ongoing basis
An executive presentation that outlines digital risk management for your senior leadership team
4.1 Conduct brief information sessions with the relevant digital risk stakeholders identified in Module 3.
4.2 Review and revise the organization's Digital Risk Profile as necessary, including adjusting weightings for the digital risk categories
4.3 Begin to build an actionable digital risk management plan
4.4 Present your findings to the organization's relevant risk leaders and executive team
A finalized and assessed Digital Risk Profile Tool
Stakeholder ownership for digital risk management
A draft Digital Risk Management plan and Digital Risk Management Executive Report
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the need for a DPO and what qualities to look for in a strong candidate.
Understand your data retention requirements under the GDPR. Develop the necessary documentation.
Understand your website or application’s GDPR requirements to inform users on how you process their personal data and how cookies are used. Develop the necessary documentation.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This research will help you choose an appropriate measurement framework, set effective measures. and communicate and review your performance measures. Use Info-Tech's process to set meaningful measures that will inspire employees and drive performance.
This tool will help you set departmental goals based on organizational mission and business goals and choose appropriate measures and weightings for each goal. Use this template to plan a comprehensive employee measurement system.
This tool will help you set departmental goals based on your organizational mission and business goals, choose appropriate measures and weightings for each goal, and visualize you progress toward set goals. Use this template to plan and implement a comprehensive employee measurement system from setting goals to communicating results.
Feedback and coaching will improve performance, increase employee engagement, and build stronger employee manager relationships. Giving feedback is an essential part of a manger's job and if done timely can help employees to correct their behavior before it becomes a bigger problem.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Ensure that individual goals are informed by business ones.
Individuals understand how their goals contribute to organizational ones.
1.1 Understand how your department contributes to larger organizational goals.
1.2 Determine the timelines you need to measure employees against.
1.3 Set Business aligned department, team, and individual goals.
Business-aligned department and team goals
Business-aligned individual goals
Create holistic performance measures.
Holistic performance measures are created.
2.1 Choose your employee measurement framework: generic or individual.
2.2 Define appropriate employee measures for preestablished goals.
2.3 Determine employee measurement weightings to drive essential behaviors.
Determined measurement framework
Define employee measures.
Determined weightings
Learn how to communicate measures to stakeholders and review measures.
Learn how to communicate to stakeholders and coach employees through blockers.
3.1 Learn how to communicate selected performance measures to stakeholders.
3.2 How to coach employees though blockers.
3.3 Reviewing and updating measures.
Effective communication with stakeholders
Coaching and feedback
When to update
Train managers in relevant areas.
Training delivered to managers.
4.1 Deliver Build a Better Manager training to managers.
4.2
Manager training delivered
Your ChallengeIn today’s competitive environment, managers must assess and inspire employee performance in order to assess the achievement of business goals. Despite the importance of performance measures, many leaders struggle with choosing appropriate metrics. Performance measures are often misaligned with the larger strategy, gamed by employees, or are too narrow to provide an accurate picture of employee achievements. |
Common ObstaclesManagers who invest time in creating more effective performance measures will be rewarded with increased employee engagement and better employee performance. Too little time setting holistic employee measures often results in unintended behaviors and gaming of the system. Conversely, too much time setting employee measures will result in overreporting and underperforming employees. |
Info-Tech’s ApproachInfo-Tech helps managers translate organizational goals to employee measures. Communicating these to employees and other stakeholders will help managers keep better track of workforce productivity, maintain alignment with the organization’s business strategy, and improve overall results. |
Performance measures are not about punishing bad performance, but inspiring higher performance to achieve business goals.
Significant components of employee engagement are tied to employee performance measures.
Impact of Engagement on Performance
Source: McLean & Company Employee Engagement Survey Jan 2020-Jan 2023; N=5,185 IT Employees; were either Engaged or Disengaged (Almost Engaged and Indifferent were not included)
Engaged employees don’t just work harder, they deliver higher quality service and products.
Engaged employees are significantly more likely to agree that they regularly accomplish more than what’s expected of them, choose to work extra hours to improve results, and take pride in the work they do.
Without this sense of pride and ownership over the quality-of-service IT provides, IT departments are at serious risk of not being able to deliver quality service, on-time and on-budget.
Create meaningful performance measures to drive employee engagement by helping employees understand how they contribute to the organization.
Too many ineffective performance measures create more work for the manager rather than inspire employee performance. Determine if your measures are worth tracking – or if they are lacking.
Meaningful performance measures are: |
Ineffective performance measures are: |
|
Clearly linked to organizational mission, values, and objectives. Based on a holistic understanding of employee performance. Relevant to organizational decision-making. Accepted by employees and managers. Easily understood by employees and managers. Valid: relevant to the role and goals and within an employee’s control. Reliable: consistently applied to assess different employees doing the same job. |
Difficult to track, update, and communicate. Easily gamed by managers or employees. Narrowly focused on targets rather than the quality of work. The cause of unintended outcomes or incentive for the wrong behaviors. Overly complex or elaborate. Easily manipulated due to reliance on simple calculations. Negotiable without taking into account business needs, leading to lower performance standards. |
Phase Steps
1.1 Create business-aligned department and team goals
1.2 Create business-aligned individual goals
Phase Outcomes
Understand how your department contributes to larger organizational goals.
Determine the timelines you need to measure employees against.
Set business-aligned department, team, and individual goals.
Phase Steps
1.1 Choose measurement framework
1.2 Define employee measures
1.3 Determine weightings
Phase Outcomes
Choose your employee measurement framework: generic or individual.
Define appropriate employee measures for preestablished goals.
Determine employee measurement weightings to drive essential behaviors.
Ensure employee measures are communicated to the right stakeholders.
Phase Steps
1.1 Communicate to stakeholders
1.2 Coaching and feedback
1.3 When to update
Phase Outcomes
Communicate selected performance measure to stakeholders.
Learn how to coach employees though blockers.
Understand how to review and when to update measures.
DIY Toolkit
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
Guided Implementation
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
Workshop
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
Consulting
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is four to six calls over the course of two to four months.
The TY advisory service is tailored to your needs. It combines the best of traditional IT consulting expertise with the analysis and remedial solutions of an expert bureau.
When you observe specific symptoms, TY analyses the exact areas that contribute to these symptoms.
TY specializes in IT Operations and goes really deep in that area. We define IT Operations as the core service you deliver to your clients:
When you see your operation running smoothly, it looks obvious and simple, but it is not. IT Operations is a concerto, under the leadership of a competent IT Ops Conductor-Manager. IT Ops keeps the lights on and ensures your reputation with your clients and the market as a whole as a predictable and dependable business partner. And we help you achieve this, based on more than 30 years of IT Ops experience.
As most companies' business services are linked at the hip with IT, your IT Operations, in other words, are your key to a successful business.
That is why we work via a simple value-based proposition. We discuss your wants and together discover your needs. Once we all agree, only then do we make our proposal. Anything you learned on the way, is yours to keep and use.
Gert has advised clients on what to do before issues happen. We have also worked to bring companies back from the brink after serious events. TY has brought services back after big incidents.
You need to get it done, not in theory, but via actionable advice and if required, via our actions and implementation prowess. It's really elementary. Anyone can create a spreadsheet with to-do lists and talk about how resilience laws like DORA and NIS2 need to be implemented.
It's not the talk that counts, it's the walk. Service delivery is in our DNA. Resilience is our life.
Good governance directly ensures happy clients because staff knows what to do when and allows them leeway in improving the service. And this governance will satisfy auditors.
Incidents erode client confidence in your service and company. You must get them fixed in accordance with their importance,
You don't want repeat incidents! Tackle the root causes and fix issues permanently. Save money by doing this right.
You must update your services to stay the best in your field. Do it in a controlled yet efficient way. Lose overhead where you can, add the right controls where you must.
The base for most of your processes. You gotta know what you have and how it works together to provide the services to your clients.
IT monitoring delivers business value by catching issues before they become problems. With real-time insights into system performance and security, you can minimize downtime, improve efficiency, and make better decisions that keep your operations strong and your customers happy.
Bring all the IT Operations services together and measure how they perform versus set business relevant KPI's
Disaster recovery is your company's safety net for getting critical systems and data back up and running after a major disruption, focusing on fast IT recovery and minimizing financial and operational losses, whereas business continuity ensures the entire business keeps functioning during and after the crisis.
Business continuity is keeping your company running smoothly during disruptions by having the right plans, processes, and backups in place to minimize downtime and protect your operations, customers, and reputation. We go beyond disaster recovery and make sure your critical processes can continue to function.
Hope for the best, but plan for the worst. When you embark on a new venture, know how to get out of it. Planning to exit is best done in the very beginning, but better late than when it is too late.
We base our analysis on over 30 years experience in corporate and large volume dynamic services. Unique to our service is that we take your company culture into account, while we adjust the mindset of the experts working in these areas.
Your people are what will make these processes work efficiently. We take their ideas, hard capabilities and leadership capabilities into account and improve upon where needed. That helps your company and the people themselves.
We look at the existing governance and analyse where they are best in class or how we can make them more efficient. We identify the gaps and propose remedial updates. Our updates are verified through earlier work, vetted by first and second line and sometimes even regulators
Next we decide with you on how to implement the updates to the areas that need them.
Please schedule your complimentary 30-minute discovery call below.
There is no financial commitment required from you. During this meeting we discus further in detail the issue at hand and the direction of the ideal solution and the way of working.
We take in the information of our talks and prepare the the roadmap to the individualized solution for you.
By now, TY has a good idea of how we can help you, and we have prepared a roadmap to solving the issue. In this meeting we present the way forward our way of working and what it will require from you.
If you decide this is not what you expected, you are free to take the information provided so far and work with it yourself.
After the previous meeting and agreement in principle, you will have by now received our offer.
When you decide to work together, we start our partnership and solve the issue. We work to ensure you are fully satisfied with the result.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Our concise executive brief shows you why engagement is critical to IT performance in your company. We'll show you our methodology and the ways we can help you in handling this.
You can use our full engagement surveys.
Understand your employees' engagement drivers. Involve your team in brainstorming engagement initiatives.
Choose those initiatives that show the most promise with the most significant impact. Create your action plan and establish transparent and open, and ongoing communication with your team.
Knowledge transfer is an ongoing effort. Prioritize and define your initiatives.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate the readiness of the pilot functional group and Agile development processes to adopt scaled Agile practices.
Alleviate scaling issues and risks and introduce new opportunities to enhance business value delivery with Agile practices.
Roll out scaling Agile initiatives in a gradual, iterative approach and define the right metrics to demonstrate success.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify the business objectives and functional group drivers for adopting Agile practices to gauge the fit of scaling Agile.
Select the pilot project to demonstrate the value of scaling Agile.
Review and evaluate your current Agile development process and functional group structure.
Understanding of the notable business and functional group gaps that can derail the scaling of Agile.
Selection of a pilot program that will be used to gather metrics to continuously improve implementation and obtain buy-in for wider rollout.
Realization of the root causes behind functional group and process issues in the current Agile implementation.
1.1 Assess your pilot functional group
Fit assessment of functional group to pilot Agile scaling
Selection of pilot program
List of critical success factors
Think of solutions to address the root causes of current communication and process issues that can derail scaling initiatives.
Brainstorm opportunities to enhance the delivery of business value to customers.
Generate a target state for your scaled Agile implementation.
Defined Agile capabilities and services of your functional group.
Optimized functional group team structure, development process, and program framework to support scaled Agile in your context.
Identification and accommodation of the risks associated with implementing and executing Agile capabilities.
2.1 Define Agile capabilities at scale
2.2 Build your scaled Agile target state
Solutions to scaling issues and opportunities to deliver more business value
Agile capability map
Functional group team structure, Agile development process and program framework optimized to support scaled Agile
Risk assessment of scaling Agile initiatives
List metrics to gauge the success of your scaling Agile implementation.
Define the initiatives to scale Agile in your organization and to prepare for a wider rollout.
Strategic selection of the right metrics to demonstrate the value of scaling Agile initiatives.
Scaling Agile implementation roadmap based on current resource capacities, task complexities, and business priorities.
3.1 Create your implementation plan
List of metrics to gauge scaling Agile success
Scaling Agile implementation roadmap
Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.
The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.
Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint will help you:
Dispense with detailed analysis and customizations to present a quick snapshot of the road ahead.
Connectivity and security are tightly coupled
Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.
Many services are no longer within the network
The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.
Users are demanding an anywhere, any device access model
Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.
The enterprise network of 2020 and beyond is changing:
The above statements are all accurate for enterprise networks, though each potentially to differing levels depending on the business being supported by the network. Depending on how affected the network in question currently is and will be in the near future, there are different common network archetypes that are best able to address these concerns while delivering business value at an appropriate price point.
Understand what the business needs are and where users and resources are located.
Trust is a spectrum and tied tightly to security.
How will the network be deployed?
What tools are in the market to help achieve design principles?
Mission
Never ignore the basics. Start with revisiting the mission and vision of the business to address relevant needs.
Users
Identify where users will be accessing services from. Remote vs. “on net” is a design consideration now more than ever.
Resources
Identify required resources and their locations, on net vs. cloud.
Controls
Identify required controls in order to define control points and solutions.
Trust is a spectrum
Implicit
Trust everything within the network. Security is perimeter based and designed to stop external actors from entering the large trusted zone.
Controlled
Multiple zones of trust within the network. Segmentation is a standard practice to separate areas of higher and lower trust.
Zero
Verify trust. The network is set up to recognize and support the principle of least privilege where only required access is supported.
Archetypes are a good guide
Traditional
Services are provided from within the traditional network boundaries and security is provided at the network edge.
Hybrid
Services are provided both externally and from within the traditional network boundaries, and security is primarily at the network edge.
Inverted
Services are provided primarily externally, and security is cloud centric.
Abstract
A traditional network is one in which there are clear boundaries defined by a security perimeter. Trust can be applied within the network boundaries as appropriate, and traffic is generally routed through internally deployed control points that may be centralized. Traditional networks commonly include large firewalls and other “big iron” security and control devices.
Network Design Tenets
Control
In the traditional network, it is assumed that all required control points can be adequately deployed across hardware/software that is “on prem” and under the control of central IT.
Info-Tech Insight
With increased cloud services provided to end users, this network is now more commonly used in data centers or OT networks.
Abstract
A hybrid network is one that combines elements of a traditional network with cloud resources. As some of these resources are not fully under the control of IT and may be completely “offnet” or loosely coupled to the on-premises network, the security boundaries and control points are less likely to be centralized. Hybrid networks allow the flexibility and speed of cloud deployment without leaving behind traditional network constructs. This generally makes them expensive to secure and maintain.
Network Design Tenets
Control
The hallmark of a hybrid network is the blending of public and private resources. This blending tends to necessitate both public and private points of control that may not be homogenous.
Info-Tech Insight
With multiple control points to address, take care in simplifying designs while addressing all concerns to ease operational load.
Abstract
An inverted perimeter network is one in which security and control points cover the entire workflow, on or off net, from the consumer of services through to the services themselves with zero trust. Since the control plane is designed to encompass the workflow in a secure manner, much of the underlying connectivity can be abstracted. In an extreme version of this deployment, IT would abstract end-user access, and any cloud-based or on-premises resources would be securely published through the control plane with context-aware precision access.
Network Design Tenets
Control
An inverted network abstracts the lower-layer connectivity away and focuses on implementing a cloud-based zero trust control plane.
Info-Tech Insight
This model is extremely attractive for organizations that consume primarily cloud services and have a large remote work force.
“It is essential to have good tools, but it is also essential that the tools should be used in the right way.” — Wallace D. Wattles
Simplified branch office connectivity
Archetype Value: Traditional Networks
SD-WAN is generally not a way to slash spending by lowering WAN circuit costs. Though it is traditionally deployed across lower cost access, to minimize risk and realize the most benefits from the platform many organizations install multiple circuits with greater bandwidths at each endpoint when replacing the more costly traditional circuits. Though this maximizes the value of the technology investment, it will result in the end cost being similar to the traditional cost plus or minus a small percentage.
SD-WAN is a subset of software-defined networking (SDN) designed specifically to deploy a secure, centrally managed, connectivity agnostic, overlay network connecting multiple office locations. This technology can be used to replace, work in concert with, or augment more traditional costly connectivity such as MPLS or private point to point (PtP) circuits. In addition to the secure overlay, SD-WAN usually also enables policy-based, intelligent controls, based on traffic and circuit intelligence.
You have multiple endpoint locations connected by expensive lower bandwidth traditional circuits. Your target is to increase visibility and control while controlling costs if and where possible. Ease of centralized management and the ability to more rapidly turn up new locations are attractive.
Inline policy enforcement placed between users and cloud services
Archetype Value: Hybrid Networks
CASBs do not provide network protection; they are designed to provide compliance and enforcement of rules. Though CASBs are designed to give visibility and control into cloud traffic, they have limits to the data that they generally ingest and utilize. A CASB does not gather or report on cloud usage details, licencing information, financial costing, or whether the cloud resource usage is aligned with the deployment purpose.
A CASB is designed to establish security controls beyond a company’s environment. It is commonly deployed to augment traditional solutions to extend visibility and control into the cloud. To protect assets in the cloud, CASBs are designed to provide central policy control and apply services primarily in the areas of visibility, data security, threat protection, and compliance.
You a mixture of on-premises and cloud assets. In moving assets out to the cloud, you have lost the traditional controls that were implemented in the data center. You now need to have visibility and apply controls to the usage of these cloud assets.
Convergence of security and service access in the cloud
Archetype Value: Inverted Networks
Though the service will consist of many service offerings, SASE is not multiple services strung together. To present the value proposed by this platform, all functionality proposed must be provided by a single platform under a “single pane of glass.” SASE is not a mature and well-established service. The market is still solidifying, and the full-service definition remains somewhat fluid.
SASE exists at the intersection of network-as-a-service and network-security-as-a-service. It is a superset of many network and security cloud offerings such as CASB, secure web gateway, SD-WAN, and WAN optimization. Any services offered by a SASE provider will be cloud hosted, presented in a single stack, and controlled through a single pane of glass.
Your network is inverting, and services are provided primarily as cloud assets. In a full realization of this deployment’s value, you would abstract how and where users gain initial network access yet remain in control of the communications and data flow.
Activity: Network assessment in an hour
Review your design options with security and compliance in mind. Infrastructure is no longer a standalone entity and now tightly integrates with software-defined networks and security solutions.
Learn about the Enterprise Network Roadmap Technology Assessment Tool.
This workbook provides a high-level analysis of a technology’s readiness for adoption based on your organization’s needs.
Complete the Enterprise Network Roadmap Technology Assessment Tool.
Effectively Acquire Infrastructure Services
Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.
Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
There are very few IT infrastructure components you should be housing internally – outsource everything else.
Build Your Infrastructure Roadmap
Move beyond alignment: Put yourself in the driver’s seat for true business value.
Drive Successful Sourcing Outcomes With a Robust RFP Process
Leverage your vendor sourcing process to get better results.
Scott Young, Principal Research Advisor, Info-Tech Research Group
Scott Young is a Director of Infrastructure Research at Info-Tech Research Group. Scott has worked in the technology field for over 17 years, with a strong focus on telecommunications and enterprise infrastructure architecture. He brings extensive practical experience in these areas of specialization, including IP networks, server hardware and OS, storage, and virtualization.
Troy Cheeseman, Practice Lead, Info-Tech Research Group
Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.
Ahlgren, Bengt. “Design considerations for a network of information.” ACM Digital Library, 21 Dec. 2008.
Cox Business. “Digital transformation is here. Is your business ready to upgrade your mobile work equation?” BizJournals, 1 April 2022. Accessed April 2022.
Elmore, Ed. “Benefits of integrating security and networking with SASE.” Tech Radar, 1 April 2022. Web.
Greenfield, Dave. “From SD-WAN to SASE: How the WAN Evolution is Progressing.” Cato Networks, 19 May 2020. Web
Korolov, Maria. “What is SASE? A cloud service that marries SD-WAN with security.” Network World, 7 Sept. 2020. Web.
Korzeniowski, Paul, “CASB tools evolve to meet broader set of cloud security needs.” TechTarget, 26 July 2019. Accessed March 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This project will help you define a sourcing strategy for your application development team by assessing key factors about your products and your organization, including critical business, technical, and organizational factors. Use this analysis to select the optimal sourcing strategy for each situation.
This workbook is designed to capture the results of the activities in the storyboard. Each worksheet corresponds with an activity from the deck. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

Firms today are under continuous pressure to innovate and deliver new features to market faster while at the same time controlling costs. This has increased the need for higher throughput in their development teams along with a broadening of skills and knowledge. In the face of these challenges, there is a new focus on how firms source their development function. Should they continue to hire internally, offshore, or outsource? How do they decide which strategy is the right fit?
Info-Tech’s research shows that the sourcing strategy considerations have evolved beyond technical skills and costs. Identifying the right strategy has become a function of the characteristics of the organization, its culture, its reliance on the business for knowledge, its strategic value of the application, its vendor management skills, and its ability to internalize external knowledge. By assessing these factors firms can identify the best sourcing mix for their development portfolios.
Dr. Suneel Ghei
Principal Research Director, Application Development
Info-Tech Research Group
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
|
Choosing the right sourcing strategy is not just a question of technical skills! Successful sourcing is based on matching your organization’s culture, knowledge, and experiences to the right choice of internal or external partnership.
Business
|
|
![]() |
Three Perspectives + |
Three Steps = |
Your Sourcing Strategy |
| Many firms across all industries are making use of different sourcing strategies to drive innovation and solve business issues. According to a report by ReportLinker the global IT services outsourcing market reached US$413.8 billion in 2021. In a recent study of Canadian software firms, it was found that almost all firms take advantage of outside knowledge in their application development process. In most cases these firms also use outside resources to do development work, and about half the time they use externally built software packages in their products (Ghei, 2020)! Info-Tech InsightIn today’s diverse global markets, firms that wish to stay competitive must have a defined ability to take advantage of external knowledge and to optimize their IT services spend. | Modeling Absorptive Capacity for Open Innovation in the Canadian Software Industry (Source: Ghei, 2020; n=54.) 56% of software development firms are sourcing applications instead of resources. 68% of firms are sourcing external resources to develop software products. 91% of firms are leveraging knowledge from external sources. |

Insourcing allows you to stay close to more strategic applications. But choosing the right model requires a strong look inside your organization and your ability to provide business knowledge support to developers who may have different skills and cultures and are in different geographies.
Outsource Roles
|
Outsource Teams (or Projects)
|
Outsource Products
|
Outsourcing represents one of the most popular ways for organizations to source external knowledge and skills. The choice of model is a function of the organization’s ability to support the external resources and to absorb the knowledge back into the organization.
| Review Your Current Situation
Review the issues and opportunities related to application development and categorize them based on the key factors. |
Assess Build Versus Buy
Before choosing a sourcing model you must assess whether a particular product or function should be bought as a package or developed. |
Choose the Right Sourcing Strategy
Based on the research, use the modeling tool to match the situation to the appropriate sourcing solution. |
Review your current delivery posture for challenges and impediments.
Define a Sourcing Strategy for Your Development Team| Step 1.1 | Step 1.2 | Step 1.3 |
Business Challenges
Technology Challenges
Market Challenges
| ![]() Info-Tech InsightSourcing is a key tool to solve business and technical challenges and enhance market competitiveness when coupled with a robust definition of objectives and a way to measure success. |
Output: List of the key challenges in your software lifecycle. Breakdown of the list into categories to identify opportunities for sourcing
Participants: Product management team, Software development leadership team, Key stakeholders
Document results in the Define a Sourcing Strategy Workbook

Outcomes of this step
Understand in your context the benefits and drawbacks of build versus buy, leveraging Info-Tech’s recommended definitions as a starting point.
Define a Sourcing Strategy for Your Development Team
| Step 1.1 | Step 1.2 | Step 1.3 |
![]() |
Regardless of the industry, a common and challenging dilemma facing technology teams is to determine when they should build software or systems in-house versus when they should rely wholly on an outside vendor for delivering on their technology needs. The answer is not as cut and dried as one would expect. Any build versus buy decision may have an impact on strategic and operational plans. It touches every part of the organization, starting with individual projects and rolling up to the enterprise strategy. |
Do not ignore the impact of a build or buy decision on the various management levels in an IT organization.
| BUILD | BUY | ||
Multi-Source Best of Breed Integrate various technologies that provide subset(s) of the features needed for supporting the business functions. |
Vendor Add-Ons & Integrations Enhance an existing vendor’s offerings by using their system add-ons either as upgrades, new add-ons, or integrations. |
||
Pros
|
Cons
|
Pros
|
Cons
|
Multi-Source Custom Integrate systems built in-house with technologies developed by external organizations. |
Single Source Buy an application/system from one vendor only. |
||
Pros
|
Cons
|
Pros
|
Cons
|
30 minutes
Output: A common understanding of the different approaches to build versus buy applied to your organizational context
Participants: Product management team, Software development leadership team, Key stakeholders
Document results in the Define a Sourcing Strategy Workbook
Outcomes of this step
Choose your desired sourcing strategy based on your current state and needs.
Define a Sourcing Strategy for Your Development Team
| Step 1.1 | Step 1.2 | Step 1.3 |
| Business
Technical
Organizational
|
Product Knowledge
|
![]() |

Built to Outsource Development Teams
|
Results
|
![]() |
Vendor Management
|

Trying to Find the Right Match
|
Info-Tech’s Recommended Approach
|
Environment Complexity
|
![]() |

Seeking to Outsource Innovation
|
Info-Tech’s Recommended Approach
|
Choosing the right model |
![]() |
||||||
| Determinant | Key Questions to Ask | Onshore | Nearshore | Offshore | Outsource Role(s) | Outsource Team | Outsource Product(s) |
| Business Dependence | How much do you rely on business resources during the development cycle? | ||||||
| Absorptive Capacity | How successful has the organization been at bringing outside knowledge back into the firm? | ||||||
| Integration Complexity | How many integrations are required for the product to function – fewer than 5, 5-10, or more than 10? | ||||||
| Product Ownership | Do you have full-time product owners in place for the products? Do product owners have control of their roadmaps? | ||||||
| Organization Culture Fit | What are your organization’s communication and conflict resolution strategies? Is your organization geographically dispersed? | ||||||
| Vendor Mgmt Skills | What is your skill level in vendor management? How long are your longest-standing vendor relationships? | ||||||
60 minutes
Output: A scored matrix of the key drivers of the sourcing strategy
Participants: Development leaders, Product management team, Key stakeholders
Choose one of your products or product families and assess the factors below on a scale of None, Low, Medium, High, and Full.
Document results in the Define a Sourcing Strategy Workbook
By now you understand what goes into an effective sourcing strategy. Before implementing one, there are a few key items you need to consider:
![]() |
Start with a pilot
|
Apfel, Isabella, et al. “IT Project Member Turnover and Outsourcing Relationship Success: An Inverted-U Effect.” Developments, Opportunities and Challenges of Digitization, 2020. Web.
Benamati, John, and Rajkumar, T.M. “The Application Development Outsourcing Decision: An Application of the Technology Acceptance Model.” Journal of Computer Information Systems, vol. 42, no. 4, 2008, pp. 35-43. Web.
Benamati, John, and Rajkumar, T.M. “An Outsourcing Acceptance Model: An Application of TAM to Application Development Outsourcing Decisions.” Information Resources Management Journal, vol. 21, no. 2, pp. 80-102, 2008. Web.
Broekhuizen, T. L. J., et al. “Digital Platform Openness: Drivers, Dimensions and Outcomes.” Journal of Business Research, vol. 122, July 2019, pp. 902-914. Web.
Brook, Jacques W., and Albert Plugge. “Strategic Sourcing of R&D: The Determinants of Success.” Business Information Processing, vol. 55, Aug. 2010, pp. 26-42. Web.
Delen, G. P A.J., et al. “Foundations for Measuring IT-Outsourcing Success and Failure.” Journal of Systems and Software, vol. 156, Oct. 2019, pp. 113-125. Web.
Elnakeep, Eman, et al. “Models and Frameworks for IS Outsourcing Structure and Dimensions: A Holistic Study.” Lecture notes in Networks and Systems, 2019. Web.
Ghei, Suneel. Modeling Absorptive Capacity for Open Innovation in the Software Industry. 2020. Faculty of Graduate Studies, Athabasca University, 2020. DBA Dissertation.
“IT Outsourcing Market Research Report by Service Model, Organization Sizes, Deployment, Industry, Region – Global Forecast to 2027 – Cumulative Impact of COVID-19.” ReportLinker, April 2022. Web.
Jeong, Jongkil Jay, et al. “Enhancing the Application and Measurement of Relationship Quality in Future IT Outsourcing Studies.” 26th European Conference on Information Systems: Beyond Digitization – Facets of Socio-Tehcnical Change: Proceedings of ECIS 2018, Portsmouth, UK, June 23-28, 2018. Edited by Peter Bednar, et al., 2018. Web.
Könning, Michael. “Conceptualizing the Effect of Cultural Distance on IT Outsourcing Success.” Proceedings of Australasian Conference on Information Systems 2018, Sydney, Australia, Dec. 3-5, 2018. Edited by Matthew Noble, UTS ePress, 2018. Web.
Lee, Jae-Nam, et al. “Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach.” MIS Quarterly, vol. 43, no. 4, Dec. 2019, pp. 1201-1225. Web.
Loukis, Euripidis, et al. “Determinants of Software-as-a-Service Benefits and Impact on Firm Performance.” Decision Support Systems, vol. 117, Feb. 2019, pp. 38-47. Web.
Martensson, Anders. “Patterns in Application Development Sourcing in the Financial Industry.” Proceedings of the 13th European Conference of Information Systems, 2004. Web.
Martínez-Sánchez, Angel, et al. “The Relationship Between R&D, the Absorptive Capacity of Knowledge, Human Resource Flexibility and Innovation: Mediator Effects on Industrial Firms.” Journal of Business Research, vol. 118, Sept. 2020, pp. 431-440. Web.
Moreno, Valter, et al. “Outsourcing of IT and Absorptive Capacity: A Multiple Case Study in the Brazilian Insurance Sector.” Brazilian Business Review, vol. 17, no. 1, Jan.-Feb. 2020, pp. 97-113. Web.
Ozturk, Ebru. “The Impact of R&D Sourcing Strategies on Basic and Developmental R&D in Emerging Economies.” European Journal of Innovation Management, vol. 21, no. 7, May 2018, pp. 522-542. Web.
Ribas, Imma, et al. “Multi-Step Process for Selecting Strategic Sourcing Options When Designing Supply Chains.” Journal of Industrial Engineering and Management, vol. 14, no. 3, 2021, pp. 477-495. Web.
Striteska, Michaela Kotkova, and Viktor Prokop. “Dynamic Innovation Strategy Model in Practice of Innovation Leaders and Followers in CEE Countries – A Prerequisite for Building Innovative Ecosystems.” Sustainability, vol. 12, no. 9, May 2020. Web.
Thakur-Wernz, Pooja, et al. “Antecedents and Relative Performance of Sourcing Choices for New Product Development Projects.” Technovation, 2020. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint helps you develop an approach to understand your low- and no-code challenges and priorities and to shortlist, govern, and manage the right low- and no-code tools.
This template narrates a story to describe the need and expectations of your low- and no-code initiative to get buy-in from stakeholders and interested parties.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the personas of your low- and no-code users and their needs.
List the challenges low- and no-code is designed to solve or the opportunities you hope to exploit.
Identify the low- and no-code tools to address your needs.
Level set expectations on what low- and no-code can deliver.
Identify areas where low- and no-code can be the most beneficial.
Select the tools to best address your problem and opportunities.
1.1 Profile your digital end users
1.2 Set reasonable expectations
1.3 List your use cases
1.4 Shortlist your tools
Digital end-user skills assessment
Low- and no-code objectives and metrics
Low- and no-code use case opportunities
Low- and no-code tooling shortlist
Optimize your product delivery process to accommodate low- and no-code.
Review and improve your product delivery and management governance model.
Discuss how to improve your low- and no-code capacities.
Encourage business-IT collaborative practices and improve IT’s reputation.
Shift the right accountability and ownership to the business.
Equip digital end users with the right skills and competencies.
2.1 Adapt your delivery process
2.2 Transform your governance
2.3 Identify your low- and no-code capacities
Low- and no-code delivery process and guiding principles
Low- and no-code governance, including roles and responsibilities, product ownership and guardrails
List of low- and no-code capacity improvements
Design a CoE and/or CoP to support low- and no-code capabilities.
Build a roadmap to illustrate key low- and no-code initiatives.
Ensure coordinated, architected, and planned implementation and adoption of low- and no-code consistently across the organization.
Reaffirm support for digital end users new to low- and no-code.
Clearly communicate your approach to low- and no-code.
3.1 Support digital end users and facilitate cross-functional sharing
3.2 Yield results with a roadmap
Low- and no-code supportive body design (e.g. center of excellence, community of practice)
Low- and no-code roadmap
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a light business case to gain buy-in and define goals, milestones, and use cases.
Create your list of requirements and shortlist vendors.
The shift from isolated, task-based automations in your pilot to value-oriented, scaled automations brings new challenges and barriers to your organization such as:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This research walks you through the level setting of your scaled business process automation (BPA) expectations, factors to consider in defining your scaled BPA journey, and assessing your readiness to scale BPA.
Use this tool to identify key gaps in the people, processes, and technologies you need to support the scaling of business process automation (BPA). It also contains a canvas to facilitate your discussions around business process automation with your stakeholders and BPA teams.
Business and IT must work together to ensure the right automations are implemented and BPA is grown and matured in a sustainable way. However, many organizations are not ready to make this commitment. Managing the automation demand backlog, coordinating cross-functional effort and organizational change, and measuring BPA value are some of the leading factors challenging scaling BPA.
Pilot BPA with the intent to scale it. Pilots are safe starting points to establish your foundational governance and management practices and build the necessary relationships and collaborations for you to be successful. These factors will then allow you to explore more sophisticated, complicated, and innovative opportunities to drive new value to your team, department, and organization.

Andrew Kum-Seun
Research Director,
Application Delivery and Management
Info-Tech Research Group
The shift from isolated, task-based automations in your pilot to value-oriented and scaled automations brings new challenges and barriers to your organization:
Take a value-first approach in your scaling business process automation (BPA) journey. Low-risk, task-oriented automations are good starting points to introduce BPA but constrain the broader returns your organization wants. Business value can only scale when everything and everyone in your processes are working together to streamline the entire value stream rather than the small gains from optimizing small, isolated automations.
See Info-Tech's Build a Winning Business Process Automation Playbook blueprint for more information.
Design and communicate your approach to scale business process automation with Info-Tech's Scale Business Process Automation Readiness Assessment:

1.1.1 Define Your Scaling Objectives
This step involves the following participants:
Scaling BPA objectives
As industries evolve and adopt more tools and technology, their products, services, and business operating models become more complex. Task- and desktop-based automations are often not enough. More sophisticated and scaled automations are needed to simplify and streamline the process from end-to-end of complex operations and align them with organizational goals.
The value of scaling BPA is dependent on the organization's ability to scale with it. In other words, stakeholders should see an increase in business value without a substantial increase in resources and operational costs (e.g., there should be little difference if sending out 10 emails versus 1000).
Source: Stefanini Group
Pilot BPA implementations often involve the processes that are straightforward to automate or are already shortlisted to optimize. However, these low-hanging fruits will run out. Discovering new BPA opportunities can be challenged for a variety of reasons, such as:
BPA is not a cheap investment. A single RPA bot, for example, can cost between $5,000 to $15,000. This cost does not include the added cost for training, renewal fees, infrastructure set up and other variable and reoccurring costs that often come with RPA delivery and support (Blueprint). This reality can motivate BPA owners to favor existing technologies over other cheaper and more effective alternatives in an attempt boost their return on investment.
Good technical skills and tools, and the right mindset are critical to ensure BPA capabilities are deployed effectively. Low-code no-code (LCNC) can help but success isn't guaranteed. Lack of experience with low-code platforms is the biggest obstacle in low-code adoption according to 60% of respondents (Creatio). The learning curve has led some organizations to hire contractors to onboard BPA teams, hire new employees, or dedicate significant funding and resources to upskill internal resources.
How can I improve myself? | How can we improve my team? | How can we improve my organization? | |
|---|---|---|---|
Objectives |
|
|
|
Goals |
|
|
|
Key Question: Are stakeholders satisfied with how the BPA practice is meeting their automation needs?
Examples of Metrics:
Key Question: How do your automation solutions perform and meet your quality standards?
Examples of Metrics:
Key Question: How has automation improved the value your employees, teams, and the organization delivers?
Examples of Metrics:
Increase in revenue generation
Reduction in operational costs
Expansion of business capabilities with minimal increases in costs and risks
5 minutes
Scaled BPA value canvas
Record the results in the 2. Value Canvas Tab in the Scale Business Process Automation Readiness Assessment.

An application portfolio strategy details the direction, activities, and tactics to deliver on the promise of your application portfolio. It often includes:
See our Application Portfolio Management Foundations blueprint for more information.

Expected Outcome From Your Pilot: Your pilot would have recognized the roles that know how to effectively apply good BPA practices (e.g., process analysis and optimization) and are familiar with the BPA toolset. These individuals are prime candidates who can standardize your Build a Winning Business Process Automation Playbook, upskill interested teams, and build relationships among those involved in the delivery and use of BPA.
1.2.1 Discuss Your BPA Opportunities
1.2.2 Lay Out Your Scaling BPA Journey
This step involves the following participants:
A successful scaled BPA practice requires a continuous demand for BPA capabilities and the delivery of minimum viable automations (MVA) held together by a broader strategic roadmap.

An MVA focuses on a single and small process use case, involves minimal possible effort to improve, and is designed to satisfy a specific user group. Its purpose is to maximize learning and value and inform the further scaling of the BPA technology, approach, or practice.
See our Build a Winning Business Process Automation Playbook blueprint for more information.
Your scaling BPA recipe (approach) can involve multiple different flavors of various quantities to fit the needs and constraints of your organization and workers.
What and how many ingredients you need is dependent on three key questions:
Record the results in the 3. Scaled BPA Journey Tab in the Scale Business Process Automation Readiness Assessment.
![]() | Continuous business process optimization and automation |
![]() | Scope of Info-Tech's Build Your Business Process Automation Playbook blueprint |

Optimizing your scaled BPA practices and applying continuous improvements starts with monitoring the process after implementation.
Purpose of Monitoring
Metrics
Metrics are an important aspect of monitoring and sustaining the scaled practice. The metrics will help determine success and find areas where adjustments may be needed.
Hold retrospectives to identify any practice issues to be resolved or opportunities to undertake
The retrospective gives your organization the opportunity to review themselves and brainstorm solutions and a plan for improvements to be actioned. This session is reoccurring, typically, after key milestones. While it is important to allow all participants the opportunity to voice their opinions, feelings, and experiences, retrospectives must be positive, productive, and time boxed.
Prepare to Scale BPA
1.3.1 Assess Your Readiness to Scale BPA
This step involves the following participants:
"While most organizations are advised to start with automating the 'low hanging fruit' first, the truth is that it can create traps that will impede your ability to achieve RPA at scale. In fact, scaling RPA into the organizational structure is fundamentally different from implementing a conventional software product or other process automation."
– Blueprint
Degree of Required BPA Support
Technology Integration & Compatibility
Good Practices Toolkit
Controls & Measures
A single body and platform to coordinate, execute, and manage all automation solutions.

Distributed
Automation solutions are locally delivered and managed whether that is per business unit, type of technology, or vendor. Some collaboration and integration can occur among solutions but might be done without a holistic strategy or approach.

Hybrid
Automation solutions are locally delivered and managed and executed for isolated use cases. Broader and complex automations are centrally orchestrated and administered.

"Companies tend to underestimate the complexity of their business processes – and bots will frequently malfunction without an RPA design team that knows how to anticipate and prepare for most process exceptions. Unresolved process exceptions rank among the biggest RPA challenges, prompting frustrated users to revert to manual work."
– Eduardo Diquez, Auxis, 2020
Scenarios
Automation Operations
How will chaining multiple BPA technologies together impact your operating budget? Is there a limit on the number of active automations you can have at a single time?
User Licenses
How many users require access to the designer, orchestrator, and other functions of the BPA solution? Do they also require access to dependent applications, services, and databases?
System Enhancements
Are application and system upgrades and modernizations needed to support BPA? Is your infrastructure, data, and security controls capable of handling BPA demand?
Supporting Resources
Are dedicated resources needed to support, govern, and manage BPA across business and IT functions? Are internal resources or third-party providers preferred?
Training & Onboarding
Are end users and supporting resources trained to deliver, support, and/or use BPA? How will training and onboarding be facilitated: internally or via third party providers?
Your supportive body is a cross-functional group of individuals promoting collaboration and good BPA practices. It enables an organization to extract the full benefits from critical systems, guides the growth and evolution of strategic BPA implementations, and provides critical expertise to those that need it. A supportive body distinctly caters to optimizing and strengthening BPA governance, management, and operational practices for a single technology or business function or broadly across the entire organization encompassing all BPA capabilities.
See our Maximize the Benefits from Enterprise Applications With a Center of Excellence blueprint for more information.
What are my options?
Center of Excellence (CoE)
AND
Community of Practice (CoP)

As BPA scales, users and teams must not only think of how a BPA solution operates at a personal and technical level or what goals it is trying to achieve, but why it is worth doing and how the outcomes of the automated process will impact the organization's reputation, morality, and public perception.

"I think you're going to see a lot of corporations thinking about the corporate responsibility of [organizational change from automation], because studies show that consumers want and will only do business with socially responsible companies."
– Todd Lohr
Source: Appian, 2018.
Vision & Objectives
Clear direction and goals of the business process automation practice.
Governance
Defined BPA roles and responsibilities, processes, and technology controls.
Skills & Competencies
The capabilities users and support roles must have to be successful with BPA.
Business Process Management & Optimization
The tactics to document, analyze, optimize, and monitor business processes.
Business Process Automation Delivery
The tactics to review the fit of automation solutions and deliver and support according to end user needs and preferences.
Business Process Automation Platform
The capabilities to manage BPA platforms and ensure it supports the growing needs of the business.
Record the results in the 4. Readiness Assessment tab in Info-Tech's Scale Business Process Automation Readiness Assessment.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Alston, Roland. "With the Rise of Intelligent Automation, Ethics Matter Now More than Ever." Appian, 4 Sept. 2018. Web.
"Challenges of Achieving RPA at Scale." Blueprint, N.d. Web.
Dilmegani, Cem. "RPA Benefits: 20 Ways Bots Improve Businesses in 2023," AI Multiple, 9 Jan 2023. Web.
Diquez, Eduardo. "Struggling To Scale RPA? Discover The Secret to Success." Auxis, 30 Sept. 2020. Web.
"How much does Robotic Process Automation (RPA) Really Cost?" Blueprint, 14 Sept. 2021. Web.
"Liverpool City Council improves document process with Nintex." Nintex, n.d. Web.
"The State of Low-Code/No-Code." Creatio, 2021. Web.
"Using automation to enhance security and increase IT NPS to 90+ at Nutanix." Workato, n.d. Web.
"What Is Hyperautomation? A Complete Guide To One Of Gartner's Top Tech Trends." Stefanini Group, 26 Mar. 2021. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you craft a continual improvement register and a workflow to ensure sustained service improvements that fulfill ongoing increases in stakeholder expectations.
Use the Continual Improvement Register and Continual Improvement Workflow to help you brainstorm improvement items, get a better visibility into the items, and plan to execute improvements.
IT managers often learn how to standardize IT services. Where they usually fail is in keeping these improvements sustainable. It’s one thing to build a quality process, but it’s another challenge entirely to keep momentum and know what to do next.
To fill the gap, build a continual improvement plan to continuously increase value for stakeholders. This plan will help connect services, products, and practices with changing business needs.
Without a continual improvement plan, managers may find themselves lost and wonder what’s next. This will lead to misalignment between ongoing and increasingly high stakeholder expectations and your ability to fulfill these requirements.
Build a continual improvement program to engage executives, leaders, and subject matter experts (SMEs) to go beyond break fixes, enable proactive enhancements, and sustain process changes.
|
Mahmoud Ramin, Ph.D.
Senior Research Analyst Infrastructure and Operations Info-Tech Research Group |
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
|
Without continual improvement, any process maturity achieved around service quality will not be sustained. Organizations need to put in place an ongoing program to maintain their current maturity and continue to grow and improve by identifying new services and enhancing existing processes.
Purpose of continual improvementThere should be alignment between ongoing improvements of business products and services and management of these products and services. Continual improvement helps service providers adapt to changing environments. No matter how critical the service is to the business, failure to continually improve reduces the service value.
Continual improvement is one of the five elements of ITIL’s Service Value System (SVS). | Continual improvement should be documented in an improvement register to record and manage improvement initiatives.Continual improvement is a proactive approach to service management. It involves measuring the effectiveness and efficiency of people, processes, and technology to:
A continual improvement process helps service management move away from a reactive approach that focuses only on fixing problems as they occur. Info-Tech InsightMake sure the basics are in place before you embark on a continual improvement initiative. |
Provide an opportunity to stakeholders to define requirements and raise their concerns. |
Embed continual improvement in all service delivery procedures. |
Turn failures into improvement opportunities rather than contributing to a blame culture. |
Improve practice effectiveness that enhances IT efficiency. |
Improve end-user satisfaction that positively impacts brand reputation. |
Improve operational costs while maintaining a high level of satisfaction. |
Help the business become more proactive by identifying and improving services. |
It’s the responsibility of the organization’s leaders to develop and promote a continual improvement culture. Work with the business unit leads and communicate the benefits of continual improvement to get their buy-in for the practice and achieve the long-term impact.
A well-maintained continual improvement process creates a proper feedback mechanism for the following stakeholder groups:
|
An efficient feedback mechanism should be constructed around the following initiatives:
|
Stakeholders who participate in feedback activities should feel comfortable providing suggestions for improvement.
Work closely with the service desk team to build communication channels to conduct surveys. Avoid formal bureaucratic communications and enforce openness in communicating the value of feedback the stakeholders can provide. |
When conducting feedback activities with users, keep surveys anonymous and ensure users’ information is kept confidential. Make sure everyone else is comfortable providing feedback in a constructive way so that you can seek clarification and create a feedback loop.
| Build a six-step process for your continual improvement plan. Make it a loop, in which each step becomes an input for the next step. |
|
|
Understand the high-level business objectives to set the vision for continual improvement in a way that will align IT strategies with business strategies. Obtaining a clear picture of your organization’s goals and overall corporate strategy is one of the crucial first steps to continual improvement and will set the stage for the metrics you select. Document your continual improvement program goals and objectives. Knowing what your business is doing and understanding the impact of IT on the business will help you ensure that any metrics you collect will be business focused. Understanding the long-term vision of the business and its appetite for commitment and sponsorship will also inform your IT strategy and continual improvement goals. |
At this stage, you need to visualize improvement, considering your critical success factors.
Critical success factors (CSFs) are higher-level goals or requirements for success, such as improving end-user satisfaction. They’re factors that must be met in order to reach your IT and business strategic vision.
Select key performance indicators (KPIs) that will identify useful information for the initiative: Define KPIs for each CSF. These will usually involve a trend, as an increase or decrease in something. If KPIs already exist for your IT processes, re-evaluate them to assess their relevance to current strategy and redefine if necessary. Selected KPIs should provide a full picture of the health of targeted practice.
KPIs should cover these four vectors of practice performance:
|
Examples of key CSFs and KPIs for continual improvement
CSF |
KPI |
| Adopt and maintain an effective approach for continual improvement | Improve stakeholder satisfaction due to implementation of improvement initiatives. |
| Enhance stakeholder awareness about continual improvement plan and initiatives. | |
| Increase continual improvement adoption across the organization. | |
| Commit to effective continual improvement across the business | Improve the return on investment. |
| Increase the impact of the improvement initiatives on process maturity. | |
| Increase the rate of successful improvement initiatives. |
IT goals will help identify the target state, IT capabilities, and the initiatives that will need to be implemented to enable those capabilities. The vision statement is expressed in the present tense. It seeks to articulate the desired role of IT and how IT will be perceived. |
Strong IT vision statements have the following characteristics:
|
| Make sure to allocate continual improvement activities to the available resources and assess the requirement to bring in others to fulfill all tasks.
Brainstorm what steps should be included in a continual improvement program:
|
Match stakeholder skill sets with available resources to ensure continual improvement processes are handled properly. Brainstorm skills specific to the program:
|
The continual improvement activities will only be successful if specific roles and responsibilities are clearly identified.
Depending on available staff and resources, you may be able to have full-time continual improvement roles, or you may include continual improvement activities in individuals’ job descriptions. Each improvement action that you identify should have clear ownership and accountability to ensure that it is completed within the specified timeframe. Roles and responsibilities can be reassigned throughout the continual improvement process. Info-Tech InsightCreate cross-functional teams to improve perspective and not focus on only one small group when trying to problem solve. Having other teams hear and reframe the issue or talk about how they can help to solve issues as a team can create bigger solutions that will help the entire IT team, not just one group. | Consider assigning dedicated continual improvement roles
|
You need to understand the current state of service operations to understand how you can provide value through continual improvement. Give everyone an opportunity to provide feedback on IT services. Use Info-Tech’s End User Satisfaction Survey to define the state of your core IT services. Info-Tech InsightBecome proactive to improve satisfaction. Continual improvement is not only about identifying pain points and improving them. It enables you to proactively identify initiatives for further service improvement using both practice functionality and technology enablement. | Understand the current state of your IT practices Determine the maturity level of your IT areas to help you understand which processes need improvement. Involve the practice team in maturity assessment activities to get ideas and input from them. This will also help you get their buy-in and engagement for improvement. Leverage performance metrics to analyze performance level. Metrics play a key role in understanding what needs improvement. After you implement metrics, have an impact report regularly generated to monitor them. Use problem management to identify root causes for the identified gaps. Potential sources of problems can be:
|
|
A CIR is a document used for recording your action plan from the beginning to the end of the improvement project. If you just sit and plan for improvements without acting on them, nothing will improve. CIR helps you create an action plan and allows you to manage, track, and prioritize improvement suggestions. Consider tracking the following information in your CIR, adjusted to meet the needs of your organization:
|
Populate your register with ideas that come from your first round of assessments and use this document to continually add and track new ideas as they emerge. You can also consider using the register to track the outcomes and benefits of improvement initiatives after they have been completed. |
|
|
Download the Continual Improvement Register template
Input
|
Output
|
Materials
|
Participant
|
4. Prioritize initiativesPrioritization should be transparent and available to stakeholders.Some initiatives are more critical than others to achieve and should be prioritized accordingly. Some improvements require large investments and need an equally large effort, while some are relatively low-cost, low-effort improvements. Focus on low-hanging fruit and prioritize low-cost, low-effort improvements to help the organization with rapid growth. This will also help you get stakeholder buy-in for the rest of your continual improvement program. Prioritize improvement initiatives in your CIR to increase visibility and ensure larger improvement initiatives are done the next cycle. As one improvement cycle ends, the next cycle begins, which allows the continual improvement team to keep pace with changing business requirements. |
|
01 |
Keep the scope of the continual improvement process manageable at the beginning by focusing on a few key areas that you want to improve. |
|
02 |
From your list of proposed improvements, focus on a few of the top pain points and plan to address those. | |
03 |
Choose the right services to improve at the first stage of continual improvement to ensure that the continual improvement process delivers value to the business. |
2-3 hours
Input: List of initiatives for continual improvement
Output: Prioritized list of initiatives
Materials: Continual improvement register, Whiteboard/flip charts, Markers, Laptops
Participants: CIO, IT managers, Project managers, Continual improvement manager
Download the Continual Improvement Register template
Download the Continual Improvement Workflow template
| Make a business case for your action plan | Determine budget for implementing the improvement and move to execution. | Find out how long it takes to build the improvement in the practice. | Confirm the resources and skill sets you require for the improvement. | Communicate the improvement plan across the business for better visibility and for seamless organizational change management, if needed. | Lean into incremental improvements to ensure practice quality is sustained, not temporary. | Put in place an ongoing process to audit, enhance, and sustain the performance of the target practice. |
As part of the continual improvement plan, identify specific actions to be completed, along with ownership for each action.
The continual improvement process must:
|
For each action, identify:
|
Choose timelines:
|
Every organization is unique in terms of its services, processes, strengths, weaknesses, and needs, as well as the expectations of its end users. There is no single action plan that will work for everyone. The improvement plan will vary from organization to organization, but the key elements of the plan (i.e. specific priorities, timelines, targets, and responsibilities) should always be in place.
1. Throughout the improvement process, share information about both the status of the project and the impact of the improvement initiatives.
| 2. The end users should be kept in the loop so they can feel that their contribution is valued.
Info-Tech InsightTo be effective, continual improvement requires open and honest feedback from IT staff. Debriefings work well for capturing information about lessons learned. Break down the debriefings into smaller, individual activities completed within each phase of the project to better capture the large amount of data and lessons learned within that phase. |
|
|
Adjust improvement priority based on updated objectives. Justify the reason. Refer to your CIR to document it.
| Did you get there? Part of the measurement should include a review of CSFs and KPIs determined in step 1 (assess the future state). Some may need to be replaced.
| Outcomes of the continual improvement process should include:
For a guideline to determine a list of metrics, refer to Info-Tech’s blueprints: Info-Tech InsightMake sure you’re measuring the right things and considering all sources of information. Don’t rely on a single or very few metrics. Instead, consider a group of metrics to help you get a better holistic view of improvement initiatives and their impact on IT operations. |
What did you learn?
|
What obstacles prevented you from reaching your target condition?
|
| Info-Tech InsightRegardless of the cause, large differences between the EC and the AC provide great learning opportunities about how to approach change in the future. |
|
|
Think long-term to sustain changesThe continual improvement process is ongoing. When one improvement cycle ends, the next should begin in order to continually measure and evaluate processes.The goal of any framework is steady and continual improvement over time that resets the baseline to the current (and hopefully improved) level at the end of each cycle.Have processes in place to ensure that the improvements made will remain in place after the change is implemented. Each completed cycle is just another step toward your target state.
|
|
Build a Business-Aligned IT Strategy
Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation. |
|
Develop Meaningful Service Metrics
Reinforce service orientation in your IT organization by ensuring your IT metrics generate value-driven resource behavior. |
|
Improve Incident and Problem Management
Rise above firefighter mode with structured incident management to enable effective problem management. |
“Continual Improvement ITIL4 Practice Guide.” AXELOS, 2020. Accessed August 2022.
“5 Tips for Adopting ITIL 4’s Continual Improvement Management Practice.” SysAid, 2021. Accessed August 2022.
Jacob Gillingham. “ITIL Continual Service Improvement And 7-Step Improvement Process” Invensis Global Learning Services, 2022. Accessed August 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read our Time Study to understand how cybersecurity professionals allocate their time, what pain points they endure, and tactics that can be leveraged to better manage time.
This is a story that should make you perk up.
I know of a department that was eager to launch their new product. The strain was severe. The board was breathing down their necks. Rivals were catching up (or so they thought).
"Let's get this thing live, prove the market wants it, then we'll circle back and handle all the security and stability backlog items." For the product owner, at the time, that seemed the right thing to do.
They were hacked 48 hours after going live.
Customer information was stolen. The brand's reputation suffered. The decision led to a months-long legal nightmare. And they still had to completely rebuild the system. Making stability and security bolt-on items is never a good idea.
See, I understand. When the product owner is pressing for user experience enhancements and you're running out of time for launch, it's easy to overlook those "non-functional requirements." Yet, we should avoid blaming the product owner. The PO is under pressure from many stakeholders, and a delayed launch may also come with significant costs.
Load balancing isn't visible to customers, after all. Penetration testing doesn't excite them. Failure mechanisms don't matter to them. This statement is true until a malfunction impacts a client. Then it suddenly becomes the most important thing in the world.
However, I know that ignoring non-functional requirements (NFRs) can lead to failed businesses (or business lines). This elevates these issues beyond mere technical inconveniences. NFRs are designed with the client in mind.
Look at it this way. When your system crashes during periods of high traffic, how does the user experience change? How satisfied are customers when their personal information is stolen? When it takes 30 seconds for your website to load, how does that conversion rate look?
Let me expose you to some consultant figures. The average cost of IT outages is $5,600 per minute, according to a 2014 Gartner study. That figure can rise to $300,000 per hour for larger businesses. The reality is that in your department, you will rarely reach these numbers. When we look at current (2020-2025) and expected (2026) trends, the typical operational loss numbers in international commercial banking or insurance are closer to 100K for high-impact incidents that are handled within 2–3 hours.
Obviously, your numbers will vary. And if you don't know what your costs are, now would be a good time to discover that. This does not imply that you should simply accept the risks associated with such situations. You must fix or mitigate such opportunities for hackers to get in. Do so at the appropriate cost for your business.
Data breaches are a unique phenomenon. According to IBM's Cost of a Data Breach Report 2025, a data breach typically costs $4.44 million, and detecting and containing it takes an average of 241 days. Some preview data from the 2025 report include that 97% of organizations that reported on the study indicated that they lacked access controls for their AI systems. That means that many companies don't even have the basics in order. And AI-related breaches are just going to accelerate. AI security defenses will help lower the cost of such breaches.
Despite the decreasing cost of these breaches, I anticipate an increase in their frequency in the upcoming years.
This means that non-functional requirements in terms of security and resilience should take a more prominent place in the prioritizations. Your client depends on your systems being safe, resilient, and performant.
And yet, this is where some leaders make mistakes. I have the impression they believe that client-focused design means more functionality and elegant interfaces. They prioritize user experience enhancements over system reliability.
I want to share a key fact that distinguishes successful businesses: customers desire more than just a good product. It must always function for them. And that means following certain procedures. They are not there to hamper you; they are there to retain customers.
88% of online shoppers are less likely to visit a website again after a negative experience, according to research from Forrester. Amazon found that they lose 1% of sales for every 100 ms of latency. That 100 milliseconds adds up to millions of lost profits when billions of dollars are at stake.
You run the risk of more than just technical difficulties when you deprioritize safety. Customer trust, revenue stability, competitive advantage, adherence to the law, costs, and team morale are all at stake.
Allow me to illustrate what I see happening during development cycles.
The team tests the happy flow. The user successfully logs in. The user navigates with ease. The user makes the purchase without any problems. The user logs off without incident.
"Excellent! Publish it!"
However, what occurs if 1000 users attempt to log in at once? What occurs if an attempt is made to insert malicious code into your contact form? During a transaction, what happens if your database connection fails?
These are not extreme situations. These are real-life occurrences.
Fifty percent of data center managers and operators reported having an impactful outage in the previous three years, according to the Uptime Institute's 2025 Global Data Center Survey. Note that this is at the infra level. The biggest contributor is power outages. What role does power play in ensuring a smooth flow? Power will not always flow as you want it, so plan for lack of power and for spikes.
With regard to software failures, the spread of possible causes widens. AI is a big contributor. AI is typically brought in to accelerate development and assist in coding. But it tends to introduce subtle bugs and vulnerabilities that a seasoned developer has to review and solve.
Another upcoming article will discuss how faster release cycles often lead to a rush in testing. This should not be the case; by spending some time automating your (non-)regression test bank, you will gain speed. But you have to invest time in building the test suite.
Can your system handle success? This question should keep every executive awake at night.
I've witnessed businesses invest millions in advertising campaigns to drive traffic to systems that fail due to their success. Consider describing to your board how your greatest marketing victory became your worst operational mishap.
Managing traffic spikes is only one aspect of load balancing. It is about ensuring that your business can handle opportunities without being overwhelmed.
Let's now address the most pressing issue: security.
The majority of leaders consider security to be like insurance, something you hope you never need. The fact that security is more than just protection, however, will alter the way you approach every project. It's approval to develop.
According to the Ponemon Institute's 2025 Cost of Insider Threats Global Report, the average annualized cost of insider threats, defined as employee negligence, criminal insiders, and credential thieves, has risen to $17.4 million per incident, up from $15.4 million in 2022. The number of discovered and analyzed incidents increased from 3,269 in 2018 to 7,868 in 2025 research studies.
Cybersecurity Ventures predicts that cybercrime will cost the global economy $10.5 trillion annually by 2025.
The most fascinating thing, though, is that companies that invest in proactive security see measurable outcomes. Organizations that allocate over 10% of their IT budget to cybersecurity have a 2.5-fold higher chance of experiencing no security incidents than those that allocate less than 1%, per Deloitte's Future of Cyber Survey.
By hardening your systems against common attack vectors, you can scale quickly without worrying about the future. You can handle sensitive data with confidence, enter new markets without fear, establish partnerships that require trust, and focus on innovation instead of crisis management.
Allow me to explain this in a way that will satisfy your CFO.
Retention is equal to reliability. Customers return when a system functions reliably (given you sell items they want). The Harvard Business Review claims that a 5% increase in customer retention rates boosts profits by 25% to 95%. It is five to twenty-five times less expensive to retain customers than to acquire new ones.
Scalability is equal to security. Secure systems can handle larger client volumes, more sensitive data, and higher-value transactions. 69% of board members and C-suite executives think that privacy and cyber risks could affect their company's ability to grow, according to PwC.
Profit is equal to performance. You lose conversions for every second of load time. Google discovered that the likelihood of a bounce rises by 32% as page load time increases from 1 to 3 seconds. It increases by 90% from 1 second to 5 seconds. Walmart discovered that every second improvement in page load time led to a 2% increase in conversions.
Reputation is equal to resilience. Guess which company benefits when your system works while your competitors' systems fail? Failures reduce trust. 71% of consumers will actively advocate against companies they don't trust, and 67% of consumers will stop purchasing from them, according to Edelman's 2023 Trust Barometer. While the 2025 report does not present comparative numbers, distrust impacting consumer behavior is likely to be even more prevalent.
Reframe this discussion with your executives and team
The numbers support this point. Businesses that invest in operational resilience see three times higher profit margins and 2.5 times higher revenue growth than their counterparts, according to McKinsey's 2023 State of Organizations report. In 2025 we see a focus on AI, but the point remains.
These metrics will grab the attention when you're presenting them.
Although the average cost of downtime varies by industry, it is always high.
The impact of a security breach on customer lifetime value is equally uncomfortable. Following a data breach, 78% of consumers will cease interacting with a brand online, and 36% will never do so again, according to Ping Identity's 2023 Consumer Identity Breach Report.
Every second that the system is unavailable results in a rapidly mounting loss of money. That's about $3,170 per minute of full downtime for a business that makes $100 million a year. We're talking about $31,700 per minute for billion-dollar businesses. Again, your experience may differ, but it's important to note that this cost is often unseen yet undeniable. If you want to calculate this more granularly, then I have a calculation method for you that is easy to implement.
There is a discernible trend in the cost of rebuilding versus building correctly the first time. Resolving a problem in production can cost four to five times as much as fixing it during design, and it can cost up to 100 times as much as fixing it during the requirements and design phase, according to IBM's Systems Sciences Institute.
This is what you should do right away.
Please begin by reviewing your current primary systems. When they're under stress, what happens? What occurs if they are attacked? What occurs if they don't work? 40% of businesses that suffer a significant system failure never reopen, although only 23% of organizations have tested their disaster recovery plans in the previous year, according to Gartner. Companies we work with test their systems at least once per year. If the results are unsatisfactory, we conduct a retest to ensure they meet our standards.
Next, please determine the actual cost of addressing issues at a later stage. Add in the costs of customer attrition, security breaches, downtime, and reconstruction. To lend credibility to your calculations, try to work out exact numbers for your company. Industry standards (like in this article) will give you indicators, but you need to know your figures.
Third, recast your non-functional needs as business needs. Consider focusing on strategies for managing success rather than solely discussing load balancing. Instead of discussing security testing, focus on revenue protection.
Fourth, consider safety when defining "done." Until a feature is dependable, secure, and scalable, it isn't considered complete. Projects that incorporate non-functional requirements from the outset have a threefold higher chance of success, per the Standish Group's 2023 Chaos Report.
Fifth, use system dependability as a differentiator in the marketplace. You're up when your rivals are down. You're safe when they're compromised.
I understand that resilience isn't sexy. I am aware that UI enhancements are more exciting than infrastructure resilience.
And yet, I know that businesses that prioritize safety will survive and lead after seeing others thrive and fail based on this one choice. Customers trust them. They are capable of scaling without breaking. Because they are confident that their systems can manage whatever comes next, they are the ones who get a good night's sleep.
Resilient organizations are twice as likely to surpass customer satisfaction goals and are 2.5 times more likely to achieve revenue growth of 10% or more.
Resilience represents the most significant competitive advantage. You have a choice. Just keep in mind that your clients are depending on you to do the job correctly.
If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue, then it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard reviews the top ten pieces of advice for improving ticket queue management at the service desk.
This template includes several examples of service desk queue structures, followed by space to build your own model of your optimal service desk queue structure and document who is assigned to each queue and responsible for managing each queue.
Service Desk and IT leaders who are struggling with low efficiency, high backlogs, missed SLAs, and poor service desk metrics often think they need to hire more resources or get a new ITSM tool with better automation and AI capabilities. However, more often than not, the root cause of their challenges goes back to the fundamentals.
Strong ticket queue management processes are critical to the success of all other service desk processes. You can’t resolve incidents and fulfill service requests in time to meet SLAs without first getting the ticket to the right place efficiently and then managing all tickets in the queue effectively. It sounds simple, but we see a lot of struggles around queue management, from new tickets sitting too long before being assigned, to in-progress tickets getting buried in favor of easier or higher-priority tickets, to tickets jumping from queue to queue without progress, to a seemingly insurmountable backlog.
Once you have taken the time to clearly structure your queues, assign resources, and define your processes for routing tickets to and from queues and resolving tickets in the queue, you will start to see response and resolution time decrease along with the ticket backlog. However, accountability for queue management is often overlooked and is really key to success.

Natalie Sansone, PhD
Senior Research Analyst, Infrastructure & Operations
Info-Tech Research Group
If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.
A host of different factors influence service desk response time and resolution time, including process optimization and documentation, workflow automation, clearly defined prioritization and escalation rules, and a comprehensive and easily accessible knowledgebase.
However, the root cause of poor response and resolution time often comes down to the basics like ticket queue management. Without clearly defined processes and ownership for assigning and actioning tickets from the queue in the most effective order and manner, customer satisfaction will suffer.
*to email and web support tickets
Source: Freshdesk, 2021
A Freshworks analysis of 107 million service desk interactions found the relationship between CSAT and response time is stronger than resolution time - when customers receive prompt responses and regular updates, they place less value on actual resolution time.
Email/web
Ideally, the majority of tickets come into the ticket queue through email or a self-service portal, allowing for appropriate categorization, prioritization, and assignment.
Phone
For IT teams with a high volume of support requests coming in through the phone, reducing wait time in queue may be a priority.
Chat
Live chat is growing in popularity as an intake method and may require routing and distribution rules to prevent long or multiple queues.
Queue management is a set of processes and tools to direct and monitor tickets or manage ticket flow. It involves the following activities:
Without a clear and efficient process or accountability for moving incoming tickets to the right place, tickets will be worked on randomly, older tickets will get buried, the backlog will grow, and SLAs will be missed.
With effective queue management and ownership, tickets are quickly assigned to the right resource, worked on within the appropriate SLO/SLA, and actively monitored, leading to a more manageable backlog and good response and resolution times.
A growing backlog will quickly lead to frustrated and dissatisfied customers, causing them to avoid the service desk and seek alternate methods to get what they need, whether going directly to their favorite technician or their peers (otherwise known as shadow IT).
Build a mature ticket queue management process that allows your team to properly prioritize, assign, and work on tickets to maximize response and resolution times.
As queue management maturity increases:
Response time decreases
Resolution time decreases
Backlog decreases
End-user satisfaction increases

*Queues may be defined by skillset, role, ticket category, priority, or a hybrid.
Start small; don’t create a queue for every possible ticket type. Remember that someone needs to be accountable for each of these queues, so only build what you can monitor.
PROCESS INCLUDES: |
DEFINE THE FOLLOWING: |
|
|---|---|---|
TRIAGING INCOMING TICKETS |
|
|
WORKING ON ASSIGNED TICKETS |
|
|
The triage role is critical but difficult. Consider rotating your Tier 1 resources through this role, or your service desk team if you’re a very small group.
You decide which channels to enable and prioritize, not your users. Phone and chat are very interrupt-driven and should be reserved for high-priority issues if used. Your users may not understand that but can learn over time with training and reinforcement.
Priority matrixes are necessary for consistency but there are always circumstances that require judgment calls. Think about risk and expected outcome rather than simply type of issue alone. And if the impact is bigger than the initial classification, change it.
In some organizations, the same issue can be more critical if it happens to a certain user role (e.g. client facing, c-suite). Identify and flag VIP users and clearly define how their tickets should be prioritized.
If users are in different time zones, take their current business hours into account when choosing which ticket to work on.
Think of your service desk as an emergency room. Patients come in with different symptoms, and the triage nurse must quickly assess these symptoms to decide who the patient should see and how soon. Some urgent cases will need to see the doctor immediately, while others can wait in another queue (the waiting room) for a while before being dealt with. Some cases who come in through a priority channel (e.g. ambulance) may jump the queue. Checklists and criteria can help with this decision making, but some degree of judgement is also required and that comes with experience. The triage role is sometimes seen as a junior-level role, but it actually requires expertise to be done well.
Info-Tech’s blueprint Standardize the Service Desk will help you standardize and document core service desk processes and functions, including:
Someone must be responsible for monitoring all incoming and open tickets as well as assigned tickets in every queue to ensure they are routed and fulfilled appropriately. This person must have authority to view and coordinate all queues and Queue Managers.
Someone must be responsible for managing each queue, including assigning resources, balancing workload, and ensuring SLOs are met for the tickets within their queue. For example, the Apps Manager may be the Queue Manager for all tickets assigned to the Apps team queue.
Will you have a triage team who monitors and assigns all incoming tickets? What are their specific responsibilities (e.g. prioritize, categorize, attempt troubleshooting, assign or escalate)? If not, who is responsible for assigning new tickets and how is this done? Will the triage role be a rotating role, and if so, what will the schedule be?
Everyone who is assigned tickets should understand the ticket handling process and their specific responsibilities when it comes to queue management.
You may have multiple queue manager roles: one for each queue, and one who has visibility over all the queues. Typically, these roles make up only part of an individual’s job. Clearly define the responsibilities of the Queue Manager role; sample responsibilities are on the right.
Lack of authority over queues – especially those outside Tier 1 of the service desk – is one of the biggest pitfalls we see causing aging tickets and missed SLAs. Every queue needs clear ownership and accountability with everyone committed to meeting the same SLOs.
Specific responsibilities may include:
Ticket Documentation
Ticket descriptions and documentation must be kept accurate and up to date. This ensures that if the ticket is escalated or assigned to a new person, or the Queue Manager or Service Desk Manager needs to know what progress has been made on a ticket, that person doesn’t need to waste time with back-and-forth communication with the technician or end user.
Ticket Status
The ticket status field should change as the ticket moves toward resolution, and must be updated every time the status changes. This ensures that anyone looking at the ticket queue can quickly learn and communicate the status of a ticket, tickets don’t get lost or neglected, metrics are accurate (such as time to resolve), and SLAs are not impacted if a ticket is on hold.
For more guidance on ticket handling and documentation, download Info-Tech’s blueprint: Standardize the Service Desk.
Shift left means enabling fulfilment of repeatable tasks and requests via faster, lower-cost delivery channels, self-help tools, and automation.
Automation rules can be used to ensure tickets are assigned to the right person or queue, to alert necessary parties when a ticket is about to breach or has breached SLA, or to remind technicians when a ticket has sat in a queue or at a particular status for too long.
This can improve efficiency, reduce error, and bring greater visibility to both high-priority tickets and aging tickets in the backlog.
However, your processes, queues, and responsibilities must be clearly defined before you can build in automation.
For examples of rules, triggers, and fields you can automate to improve the efficiency of your queue management processes, see the next slide.
It can be overwhelming to support agents when their view is a long and never-ending queue. Set the default dashboard view to show only those tickets assigned to the viewer to make it appear more manageable and easier to organize.
The queue should quickly give your team all the information they need to prioritize their work, including ticket status, priority, category, due date, and updated timestamps. Configuration is important - if it’s confusing, clunky, or difficult to filter or sort, it will impact response and resolution times and can lead to missed tickets. Give your team input into configuration and use visuals such as color coding to help agents prioritize their work – for example, VIP tickets may be clearly flagged, critical or high priority tickets may be highlighted, tickets about to breach may be red.
Track metrics that give visibility into how quickly tickets are being resolved and how many aging tickets you have. Metrics may include:
Regularly review reports on these metrics with the team.
Make it an agenda item to review aging tickets, on hold tickets, and tickets about to breach or past breach with the team.
Take action on aging tickets to ensure progress is being made.
Set rules to close tickets after a certain number of attempts to reach unresponsive users (and change ticket status appropriately).
Schedule times for your team to tackle aged tickets or tickets in the backlog.
It can be easy for high priority work to constantly push down low priority work, leaving the lower priority tickets to constantly be ignored and users to be frustrated. If you’re struggling with aging tickets, backlog, and tickets breaching SLA, experiment with your team and queue structure to figure out the best resource distribution to handle your workload. This could mean rotating people through the triage role to allow them time to work through the backlog, reducing the number of people doing triage during slower volume periods, or giving technicians dedicated time to work through tickets. For help with forecasting demand and optimizing resources, see Staff the Service Desk to Meet Demand.
Map out your optimal ticket queue structure using the Service Desk Queue Structure Template. Follow the instructions in the template to complete it as a team.
The template includes several examples of service desk queue structures followed by space to build your own model of an optimal service desk queue structure and to document who is assigned to each queue and responsible for managing each queue.
The template is not meant to map out your entire service desk structure (e.g. tiers, escalation paths) or ticket resolution process, but simply the ticket queues and how a ticket moves between queues. For help documenting more detailed process workflows or service desk structure, see the blueprint Standardize the Service Desk.
This project will help you build and improve essential service desk processes including incident management, request fulfillment, and knowledge management to create a sustainable service desk.
This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.
This project will help you streamline your ticket intake process and identify improvements to your intake channels.
This project will help you determine your optimal service desk structure and staffing levels based on your unique environment, workload, and trends.
“What your Customers Really Want.” Freshdesk, 31 May 2021. Accessed May 2022.
Your organization has adopted Microsoft Teams, but users are not maximizing their use of it.
Collaboration is as much an art as a science. IT can help users collaborate more effectively in Teams by removing friction – while still maintaining guardrails – for users attempting to build out and experiment with features and capabilities.
Use Info-Tech’s Collaborate Effectively in Microsoft Teams to help collaboration flourish:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Set up your users for Teams collaboration success. Create a process that improves their ability to access, understand, and maximize their use of your chosen collaboration software solution.
The survey responses will inform your organization's collaboration use cases for Teams and help you to identify which features and apps to enable.
Use this Excel tool to help you document the organization’s key collaboration use cases and prioritize which Teams apps to implement and encourage adoption on.
You have adopted Teams, implemented it, and painted an early picture for your users on the basics. However, your organization is not yet maximizing its use of Teams' collaboration capabilities. Although web conferencing, channel-based collaboration, and chat are the most obvious ways Teams supports collaboration, users must explore Teams' functionality further to harness the application's full potential.
You should enable your users to expand their collaboration use cases in Teams, but not at the risk of being flooded with app requests, nor user confusion or dissatisfaction. Instead, develop a process to evaluate and integrate new apps that will benefit the organization. Encourage your users to request new apps that will benefit them, while proactively planning for app integration that users should be alerted to.
|
Emily Sugerman
Research Analyst, Infrastructure and Operations Info-Tech Research Group |
Your organization has adopted Microsoft Teams, but users are not getting the maximum benefit.
Use Info-Tech's Collaborate Effectively in Microsoft Teams to help collaboration flourish:
Collaboration is as much an art as a science. IT can help users collaborate more effectively in Teams by removing friction – while still maintaining guardrails – for users attempting to build out and experiment with features and capabilities.
Teams can do much more than chat, video conferencing, and document sharing. A fully-deployed Teams also lets users leverage apps and advanced collaboration features.
However, IT must create a process for evaluating and approving Microsoft and third-party apps, and for communicating changes to end users.
In the end, IT needs to support the business to get the best value out of Microsoft Teams: managing Teams effectively while also enabling end-user creativity.
“Within Teams, the third-party apps with 10,000 users and above rose nearly 40% year-over-year.”
Source: UC Today, 2023.
Use these tools to develop your plan to enable effective collaboration in Microsoft Teams.
An Excel tool for documenting the organization's key collaboration use cases and prioritizing which Teams apps to implement and encourage adoption of.
Use or adapt this survey to capture user perception of how effectively Teams supports collaboration needs.
Collaboration is as much an art as a science. IT can help users collaborate more effectively in Teams by removing friction – while still maintaining guardrails – for users attempting to build out and experiment with features and capabilities.
Users can browse the Teams app store and attempt to add unapproved apps, but they may not be able to distinguish between available and blocked apps. To avoid a bad user experience, communicate which apps they can add without additional approval and which they will need to send through an approval process.
Teams lets you customize the message users see when they request unapproved apps and/or redirect their request to your own URL. Review this step in the request process to ensure users are seeing the instructions that they need to see.
A Teams hub is where users can access a service catalog of approved Teams apps and submit service requests for new ones via the Make a Request button.
Section 1Collaborating Effectively in Teams for IT |
Section 2Collaborating Effectively in Teams for End Users |
If you:
Microsoft's vision for Teams collaboration is to enable end-user freedom. For example, out of the box, users can create their own teams and channels unless IT restricts this ability.
Teams is meant to be more than just chats and meetings. Microsoft is pushing Teams app integration so that Teams becomes, essentially, a landing page from which users can centralize their work and org updates.
In partnership with the business, IT must determine which guardrails are necessary to balance end-user collaboration and creativity with the need for governance and control.
Schubert & Glitsch find that enterprise collaboration systems (such as Teams) have characteristics that reflect the unstructured and creative nature of collaboration. These systems “are designed to support joint work among people in the workplace. . . [They] contain, for the most part, unstructured content such as documents, blogs, or news posts,” and their implementations “are often reported to follow a ‘bottom up' and rather experimental introduction approach.” The open-endedness of the tool requires users to be able to creatively and voluntarily apply it, which in turn requires more enterprise effort to help increase adoption over time through trial and error.
Source: Procedia Computer Science, 2015
Collaboration is as much an art as a science. IT can help users collaborate more effectively in Teams by removing friction – while still maintaining guardrails – for users attempting to build out and experiment with features and capabilities.
Input: Team input, Survey results
Output: List of Teams challenges experienced by the organization
Materials: Whiteboard (digital or physical)
Participants: Teams collaboration working group
Download the Microsoft Teams End-User Satisfaction Survey template
The term collaboration scenarios has been proposed to describe the types of collaboration behavior your software – in this case, Teams – must support (Schubert & Glitsch, 2015). A successful implementation of this kind of tool requires that you “identif[y] use cases and collaboration scenarios that best suit a specific company and the people working in it” (Schubert & Glitsch, 2016).
Teams tends to support the following kinds of collaboration and productivity goals (see list).
What types of collaboration scenarios arise in the user feedback in the previous activity? What do users most need to do?
Be proactive: Configure Microsoft Teams to match collaboration scenarios/use cases your users must engage in. This will help prevent an increase in shadow IT, where users attempt to bring in unapproved/unreviewed software that might duplicate your existing service catalog and/or circumvent the proper review and procurement process.
Input: Collaboration scenarios, Teams use cases
Output: Ranked list of Teams features to implement and/or promote
Materials: Microsoft Teams Planning Tool
Participants: Teams collaboration working group
NB: Microsoft has introduced a Teams Premium offering, with additional capabilities for meetings and webinars (including customized banding, meeting watermarks, and virtual webinar green rooms) and will paywall some features previously available without Premium (live caption translations, meeting data on attendee departure/arrival times) (“What is Microsoft Teams Premium?”, n.d.)
Download the Microsoft Teams Planning Tool
Users can browse and attempt to add unapproved apps in the Teams app store, but they may have difficulty distinguishing between available and blocked apps. To avoid a bad user experience, communicate to your users which apps they can add without additional approval, and which must be sent through an approval process.
icrosoft suggests that you regularly review the app usage report in the Teams admin center as “a signal about the demand for an app within your organization.” This will help you proactively determine which apps to evaluate for approval.
Teams allows you to customize the message users see when they request an unapproved app and/or redirect their request to your own URL. Review this step in the request process to ensure your users are seeing the instructions that they need to see.
Download the Service Request Workflow library
Follow the process in Reduce Shadow IT With a Service Request Catalog to build out a robust request management process and service catalog to continuously incorporate new non-standard requests and advertise new Teams apps:
Use Teams to help users access the company intranet for organizational information that is relevant to their roles.
This can be done in two ways:
(Venn diagram recreated from Microsoft Learn, 2023.)
The hub is where users can access a service catalog of approved Teams apps and submit service requests for a new one via a Make a Request button.
Where will users find approved Teams apps? How will you inform people about what's available? Once a new app is available, how is this communicated?
Improved satisfaction with Teams: Increased net promoter score (NPS)
Utilization of features: Increased daily average users on key features, apps, integrations
Timeliness: % of SLAs met for service request fulfillment
Improved communication to end users about Teams' functionality: Satisfaction with knowledgebase articles on Teams
Satisfaction with communication from IT
Section 1Collaborating Effectively in Teams for IT | Section 2Collaborating Effectively in Teams for End Users |
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Download the Microsoft Teams Collaboration Tool for an expanded list of features & apps
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Download the Microsoft Teams Planning Tool for an expanded list of features & apps
Mike Cavanagh
Global Service Desk Manager
Clearwater Seafoods LP
Benedict Chang, Senior Advisory Analyst
John Donovan, Principal Research Director
Allison Kinnaird, Practice Lead
P.J. Ryan, Research Director
Natalie Sansone, Research Director
Christine West, Managing Partner
Foster business relationships through sourcing-as-a-service. There is a direct correlation between service delivery dissatisfaction and increases in shadow IT. Whether the goal is to reduce shadow IT or gain control, improved customer service and fast delivery are key to making lasting changes.
Recipes for best practices and use cases for Teams. Microsoft Teams is not a standalone app. Successful utilization of Teams occurs when conceived in the broader context of how it integrates with M365. Understanding how information flows between Teams, SharePoint Online, and OneDrive for Business, for instance, will aid governance with permissions, information storage, and file sharing.
You bought it. Use it right. Map your organizational goals to the administration features available in the Office 365/M365 console. Your governance should reflect your requirements.
Mehta, Tejas. “The Home Site App for Microsoft Teams.” Microsoft Community Hub. https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/the-home-site-app-for-microsoft-teams/ba-p/1714255.
Overview: Viva Connections. 7 Mar. 2023, https://learn.microsoft.com/en-us/viva/connections/viva-connections-overview.
Rogers, Laura. “SharePoint Home Site in Teams.” Wonderlaura, 24 Jun 2021. https://wonderlaura.com/2021/06/24/sharepoint-home...
Schubert, Petra, and Johannes H. Glitsch. “Adding Structure to Enterprise Collaboration Systems: Identification of Use Cases and Collaboration Scenarios.” Procedia Computer Science, vol. 64, Jan. 2015, pp. 161–69. ScienceDirect, https://doi.org/10.1016/j.procs.2015.08.477.
Schubert, Petra, and Johannes Glitsch. “Use Cases and Collaboration Scenarios: How Employees Use Socially-Enabled Enterprise Collaboration Systems (ECS).” International Journal of Information Systems and Project Management, vol. 4, no. 2, Jan. 2016, pp. 41–62.
Thompson, Mark. “User Requests for Blocked Apps in the Teams Store.” Supersimple365, 5 Apr 2022, https://supersimple365.com/user-requests-for-apps-...
“What is Microsoft Teams Premium?” Breakwater IT, n.d., https://breakwaterit.co.uk/guides/microsoft-teams-...
Wills, Jonny. “Microsoft Teams Monthly Users Hits 280 Million.” UC Today, 25 Jan. 2023, https://www.uctoday.com/unified-communications/microsoft-teams-monthly-users-hits-280-million/.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Ensure that all key strategic stakeholders hold a current understanding of what is valuable to the organization and a sense of what will be valuable based on future needs.
Establish the process to evaluate spend on IT initiatives based on expected benefits, and implement the methods to monitor how well the initiatives achieve these benefits.
Re-evaluate, on a consistent basis, the accuracy of the value drivers stated in the value statement with respect to the organization’s current internal and external environments.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish the business value statement.
Understand the importance of implementing a benefits realization process.
Unified stakeholder perspectives of business value drivers
Establish supporters of the initiative
1.1 Understand what governance is and how a benefits realization process in governance will benefit the company.
1.2 Discuss the mission and vision of the company, and why it is important to establish the target state prior to defining value.
1.3 Brainstorm and narrow down organization value drivers.
Stakeholder buy-in on benefits realization process
Understanding of interrelations of mission, vision, and business value drivers
Final three prioritized value drivers
Completed business value statement
Establish the intake, assessment and prioritization, and output and monitoring processes that are involved with implementing benefits realization.
Assign cut-over dates and accountabilities.
Establish monitoring and tracking processes.
A thorough implementation plan that can be incorporated into existing governance documents
Stakeholder understanding of implemented process, process ownership
2.1 Devise the benefits realization process.
2.2 Establish launch dates, accountabilities, and exception handling on processes.
2.3 Devise compliance monitoring and exception tracking methods on the benefits realization process.
Benefits realization process incorporated into governance documentation
Actionable plan to implement benefits realization process
Reporting processes to ensure the successful delivery of the improved governance process
Implement a process to ensure that business value drivers remain current to the organization.
Align IT with the business and business to its environment
3.1 Determine regular review cycle to reassess business value drivers.
3.2 Determine the trigger events that may cause off-cycle revisits to value.
3.3 Devise compliance monitoring on value definition.
Agenda and tools to assess the business context to verify the accuracy of value
List of possible trigger events specific to your organization
Reporting processes to ensure the continuous adherence to the business value definition
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Know where to start and where to focus your attention in the implementation of an AI governance strategy.
Assess your current and target states in AI Governance.
Have a governing body to oversee AI Governance.
Create a basis for the organization’s AI governance model.
Keep record of services and interfaces to reduce waste.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify your organization's biggest Agile pain points so you can focus attention on those topics that are impacting your Agile capabilities the most.
Ensure that your organization has a solid understanding of Agile principles and practices to help ensure your Agile transformation is successful. Understand Agile's different way of working and identify the steps your organization will need to take to move from traditional Waterfall delivery to Agile.
The Backlog Management Module helps teams develop a better understanding of backlog management and user story decomposition. Improve your backlog quality by implementing a three-tiered backlog with quality filters.
The Scrum Simulation Module helps teams develop a better understanding of Scrum practices and the behavioral blockers affecting Agile teams and organizational culture. This module features two interactive simulations to encourage a deeper understanding of good Scrum practices and Agile principles.
The Estimation Module helps teams develop a better understanding of Agile estimation practices and how to apply them. Teams learn how Agile estimation and reconciliation provide reliable planning estimates.
The Product Owner Module helps teams understand product management fundamentals and a deeper understanding of the product owner role. Teams define their product management terminology, create quality filters for PBIs moving through the backlog, and develop their product roadmap approach for key audiences.
The Product Roadmapping Module helps teams understand product road mapping fundamentals. Teams learn to effectively use the six tools of Product Roadmapping.
Alex Ciraco and Hans Eckman
Application Practice
Info-Tech Research Group
Agile transformations are more likely to be successful when the entire organization genuinely understands Agile fundamentals, principles and practices, as well as the role each person plays in its success. Focus on developing a solid understanding of Agile practices so your organization can "Be Agile", not just "Do Agile".
| 1. Identify Common Agile Challenges |
2. Establish a Solid Foundation for Agile Delivery |
3. Agile Modules |
|
|---|---|---|---|
| Phase Steps |
1.1 Identify common agile challenges |
2.1 Align teams with Agile fundamentals 2.2 Interpret your common Agile challenges survey results 2.3 (Optional) Move stepwise to iterative Agile delivery 2.4 Identify insights and team feedback |
|
| Phase Outcomes |
Understand common challenges associated with Agile transformations and identify your organization's struggles. |
Establish and apply a uniform understanding of Agile fundamentals and principles. Create a roadmap for your transition to Agile delivery and prioritized challenges. |
Foster deeper understanding of Agile principles and practices to resolve pain points. |
Everyone's Agile journey is not the same.
78% of IT professionals believe the business is "usually" or "always" out of sync with project requirements.
Source: "10 Ways Requirements Can Sabotage Your Projects Right From the Start"
Only 34% of software is rated as both important and effective by users.
Leaders and stakeholders are frustrated with long lead times to implement changes. Agile/DevOps promotes smaller, more frequent releases to start earning value sooner.
Time to delivering value depends on Frequency of Releases
64% of IT professionals adopt Agile to enhance their ability to manage changing priorities.
71% of IT professionals found their ability to manage changing priorities improved after implementing Agile.
Traditional delivery processes work on the assumption that product requirements will remain constant throughout the SDLC. This results in delayed delivery of product enhancements which are critical to maintaining a positive customer experience.
Adapted from: "12th Annual State of Agile Report"
"…while there is value in the items on the right, we value the items on the left more."
– Source: "The Agile Manifesto"
|
We value. . . |
||
|---|---|---|
|
Individuals and Interactions |
OVER |
Processes and Tools |
|
Working Software |
OVER |
Comprehensive Documentation |
|
Customer Collaboration |
OVER |
Contract Negotiation |
|
Responding to Change |
OVER |
Following a Plan |
|
Being Agile |
OVER |
Being Prescriptive |
Collaboration
Iterations
Continual Improvement
Prioritization
A "One and Done" Approach (Planning & Documentation Based)
Elapsed time to deliver any value: Months to years
An "Iterative" Approach (Empirical/Evidence Based)
Elapsed time to deliver any value: Weeks
"Although Agile methods are increasingly being adopted in globally distributed settings, there is no panacea for success."
– "Negotiating Common Ground in Distributed Agile Development: A Case Study Perspective."
"Without proper planning, organizations can start throwing more resources at the work which spirals into the classic Waterfall issues of managing by schedule."
– Kristen Morton, Associate Implementation Architect,
OneShield Inc., Info-Tech Interview
With shared ownership instead of silos, we can deliver value at the end of every iteration (aka sprint)
* There are many Agile methodologies to choose from, but Scrum is by far the most widely used (and is shown above).
Key Elements of the Agile SDLC
A well-formed backlog can be thought of as a DEEP backlog:
(Perforce, 2018)
Expand the concepts of defining "ready" and "done" to include the other stages of a PBIs journey through product planning.
Info-Tech Insight: A quality filter ensures quality is met and teams are armed with the right information to work more efficiently and improve throughput.
Many steps in this blueprint are accompanied by supporting deliverables to help you accomplish your goals.
Common Agile Challenges Survey
Survey the organization to understand which of the common Agile challenges the organization is experiencing
Roadmap for Transition to Agile
Identify steps you will take to move your organization toward Agile delivery
|
IT Benefits |
Business Benefits |
|---|---|
|
|
Implementing quality and consistent Agile practices improves SDLC metrics and reduces time to value.
Align Agile coaching and practices to address your key pain points identified in the Common Agile Challenges Survey.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
What does a typical GI on this topic look like?
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 6 to 8 calls over the course of 1 to 2 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
|
Phases 1-2 |
Backlog Management |
Scrum Simulation |
Estimation |
Product Owner |
Product Roadmapping |
|
|---|---|---|---|---|---|---|
|
Establish a Solid Foundation for Agile Delivery |
Define the |
Assess the IT |
Bridge the Gap and |
Establish an Effective Product Owner Role |
Create Effective Product Roadmaps |
|
|
Activities |
1.1 Gather Agile challenges and gaps |
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
|
|
Agile Modules |
||||||
For additional assistance planning your workshop, please refer to the facilitation planning tool in the appendix.
Mentoring for Agile Teams
Get practical help and guidance on your Agile transformation journey.
Implement DevOps Practices That Work
Streamline business value delivery through the strategic adoption of DevOps practices.
Deliver on Your Digital Product Vision
Build a product vision your organization can take from strategy through execution.
Deliver Digital Products at Scale
Deliver value at the scale of your organization through defining enterprise product families.
Phase 1 |
Phase 2 |
Agile Modules |
|---|---|---|
|
1.1 Identify common Agile challenges |
2.1 Align teams with Agile fundamentals 2.2 Interpret your common Agile challenges survey results 2.3 (Optional) Move stepwise to iterative Agile delivery 2.4 Identify insights and team feedback |
|
This phase will walk you through the following activities:
This phase involves the following participants:
Develop Your Agile Approach for a Successful Transformation
1.1 Distribute Common Agile Challenges Survey and collect results
This step involves the following participants:
There isn't one approach that cures all the problems your Agile teams are facing. First, understand these common challenges, then develop a plan to address the root causes.
Use Info-Tech's Common Agile Challenges Survey to determine common issues and what problems individual teams are facing. Use the Agile modules and supporting guides in this blueprint to provide targeted support on what matters most.
Output
Participants
Record the results in the Roadmap for Transition to Agile Template
Phase 1 | Phase 2 | Agile Modules |
|---|---|---|
1.1 Identify common Agile challenges | 2.1 Align teams with Agile fundamentals 2.2 Interpret your common Agile challenges survey results 2.3 (Optional) Move stepwise to iterative Agile delivery 2.4 Identify insights and team feedback |
|
This phase will walk you through the following activities:
This phase involves the following participants:
2.1.1 Share what Agile means to you
2.1.2 (Optional) Contrast two delivery teams
2.1.3 (Optional) Dissect the Agilist's Oath
2.1.4 (Optional) Create your prototype definitions of ready
2.1.5 (Optional) Create your prototype definitions of done
2.1.6 Identify the challenges of implementing agile in your organization
|
What is Agile? |
Why do we do it? |
|---|---|
|
(e.g. Agile mindset, principles, and practices) |
(e.g. benefits) |
Output
Participants
Time to delivering value depends on frequency of releases.
Source: 5Q Partners
Companies also accelerated the pace of creating digital or digitally enhanced products and services.
(McKinsey, 2020 )
"The Digital Economy incorporates all economic activity reliant on or significantly enhanced by the use of digital inputs, including digital technologies, digital infrastructure, digital services and data."
(OECD Definition)
Where are you now?
Where do You Want to Be?
* Google Cloud/Accelerate State of DevOps 2021
A "One and Done" Approach (Planning & Documentation Based)
Elapsed time to deliver any value: Months to years
An "Iterative" Approach (Empirical/Evidence Based)
Elapsed time to deliver any value: Weeks
Discussion (5-10 minutes)


Discuss differences between these teams:
|
| What would have to happen at your organization to make working like this possible? |
|---|
|
Which aspects of the Agilist's Oath are "easy" in your org? |
|---|
|
Which aspects of the Agilist's Oath are "hard" in your org? |
|---|
"Although Agile methods are increasingly being adopted in globally distributed settings, there is no panacea for success."
– "Negotiating Common Ground in Distributed Agile Development: A Case Study Perspective."
"Without proper planning, organizations can start throwing more resources at the work which spirals into the classic Waterfall issues of managing by schedule."
– Kristen Morton, Associate Implementation Architect,
OneShield Inc., Info-Tech Interview
"…while there is value in the items on the right, we value the items on the left more."
– Source: "The Agile Manifesto"
|
We value. . . |
||
|---|---|---|
|
Individuals and Interactions |
OVER |
Processes and Tools |
|
Working Software |
OVER |
Comprehensive Documentation |
|
Customer Collaboration |
OVER |
Contract Negotiation |
|
Responding to Change |
OVER |
Following a Plan |
|
Being Agile |
OVER |
Being Prescriptive |
View additional transition models in the appendix
Key Elements of the Agile SDLC
* There are many Agile methodologies to choose from, but Scrum (shown above) is by far the most widely used.
|
Product Owner |
Scrum Master |
Team Members |
|
|---|---|---|---|
|
Responsible |
|
|
|
|
Accountable |
|
|
|
|
Consulted |
|
|
|
|
Informed |
|
|
|
| Are any of these challenges for your organization? | Done When: |
|---|---|
|
Project Backlog Refinement (PO & SM): Prepare user stories to be used in the next two to three future sprints. User stories are broken down into small manageable pieces of work that should not span sprints. If a user story is too big for a sprint, it is broken down further here. The estimation of the user story is examined, as well as the acceptance criteria, and each is adjusted as necessary from the Agile team members' input. |
Regularly over the project's lifespan |
|
Sprint Planning (PO, SM & Delivery Team): Discuss the work for the upcoming sprint with the business. Establish a clear understanding of the expectations of the team and the sprint. The product owner decides if priority and content of the user stories is still accurate. The development team decides what they believe can be completed in the sprint, using the user stories, in priority order, refined in backlog refinement. |
At/before the start of each sprint |
| Daily Stand-Up (SM & Delivery Team): Coordinate the team to communicate progress and identify any roadblocks as quickly as possible. This meeting should be kept to fifteen minutes. Longer conversations are tabled for a separate meeting. These are called "stand-ups" because attendees should stay standing for the duration, which helps keep the meeting short and focused. The questions each team member should answer at each meeting: What did I do since last stand-up? What will I do before the next stand-up? Do I have any roadblocks? |
Every day during the sprint |
| Sprint Demo (PO, SM, Delivery Team & Stakeholders): Review and demonstrate the work completed in the sprint with the business (demonstrate working and tested code which was developed during the sprint and gather stakeholder feedback). |
At the end of each sprint |
| Sprint Retrospective (SM & Delivery Team & PO): Discuss how the sprint worked to determine if anything can be changed to improve team efficiency. The intent of this meeting is not to find/place blame for things that went wrong, but instead to find ways to avoid/alleviate pain points. |
At the end of each sprint |
|
Ready |
Done |
|---|---|
|
|
* Note that your definitions of ready and done may vary from project to project, and they should be decided on collectively by the delivery team at the beginning of the project (part of setting their "norms") and updated if/when needed.
Step 1:
|
Definition of Ready |
Checklist: |
Definition of Done |
Checklist – For each user story: |
|---|---|---|---|
|
The checklist of things that must be true/done to begin the oil change. |
|
The checklist of things that must be true/done at the end of the oil change. |
|
Step 2:
Checklist – For each user story: |
|---|
|
Checklist – For each user story: |
|---|
|
Step 3:
|
Definition of Ready Checklist – For each user story: |
Disposition |
|---|---|
|
The value of story to the user is clearly indicated. |
Keep as is |
| The acceptance criteria for story have been clearly described. | Keep as is |
| User story dependencies identified. | Modify to: "Story has been traced to the project, epic, and sprint goal" |
| User story sized by delivery team. | Modify to: "User Stories have been sized by the Delivery team using Story Points" |
| Scrum team accepts user experience artifacts. | Keep as is |
| Performance criteria identified, where appropriate. | Keep as is |
| Person who will accept the user story is identified. |
Delete |
| The team knows how to demo the story. | Keep as is |
|
Add: "Any performance related criteria have been identified where appropriate" |
|
|
Add: "Any data model related changes have been identified where needed" |
Step 4:
Definition of Ready | Checklist – For each user story: |
|---|---|
User stories and related requirements contain clear descriptions of what is expected of a given functionality. Business value is identified. |
|
Record the results in the Roadmap for Transition to Agile Template
* This checklist helps Agile teams determine if the stories in their backlog are ready for sprint planning. As your team gains experience with Agile, tailor this list to your needs and follow it until the practice becomes second nature.
Step 5:
|
Definition of Done Checklist – For each user story: |
|---|
|
Definition of Done Checklist – For each user story: |
|---|
|
Step 6:
Definition of Ready Checklist – For each user story: | Disposition |
|---|---|
| Keep as is |
| Delete |
| Modify to: "All acceptance criteria for the user story have been met" |
| Modify to: "The user story is ready to be demonstrated to Stakeholders" |
| Keep as is |
| Keep as is |
| Modify to: "Unit, smoke and regression testing has been performed (preferably automated), all tests were passed" |
| Add: "Any performance related criteria associated with the story have been met" |
Step 7:
Definition of Done | Checklist – For each user story: |
|---|---|
When the user story is accepted by the product owner and is ready to be released. |
|
Record the results in the Roadmap for Transition to Agile Template
* This checklist helps Agile teams determine if the stories in their backlog are ready for sprint planning. As your team gains experience with Agile, tailor this list to your needs and follow it until the practice becomes second nature.
It turns out Waterfall is not as good at reducing risk and ensuring delivery after all.
| CHAOS RESOLUTION BY AGILE VERSUS WATERFALL | ||||
|---|---|---|---|---|
| Size | Method | Successful | Challenged | Failed |
| All Size Projects | Agile | 39% | 52% | 9% |
| Waterfall | 11% | 60% | 29% | |
Standish Group; CHAOS REPORT 2015
"I believe in this [Waterfall] concept, but the implementation described above is risky and invites failure."
– Winston W. Royce
|
Waterfall |
Agile |
|
|---|---|---|
|
Roles and Responsibilities |
Silo your resources Defined/segregated responsibilities Handoffs between siloes via documents |
Avoid siloes Collective responsibility Transitions instead of handoffs |
|
Belief System |
Trust the process Assign tasks to individuals |
Trust the delivery team Assign ownership/responsibilities to the team |
|
Planning Approach |
Create a detailed plan before work begins Follow the plan |
High level planning only The plan evolves over project lifetime |
|
Delivery Approach |
One and done (big bang delivery at end of project) |
Iterative delivery (regularly demonstrate working code) |
|
Governance Approach |
Phases and gates Artifacts and approvals |
Demo working tested code and get stakeholder feedback Support delivery team and eliminate roadblocks |
|
Approach to Stakeholders |
Involved at beginning and end of project "Arm's length" relationship with delivery team |
Involved throughout project (sprint by sprint) Closely involved with delivery team (through full time PO) |
|
Approach to Requirements/Scope |
One-time requirements gathering at start of project Scope is fixed at beginning of project ("carved in stone") |
On going requirements gathering and refinement over time Scope is roughly determined at beginning (expect change) |
|
Approach to Changing Requirements |
Treats change like it is "bad" Onerous CM process (discourages change) Scope changes "require approval" and are disruptive |
Accepts change as natural part of development. Light Change Management process (change is welcome) Scope changes are handled like all changes |
Valuable product delivered in multiple releases
If moving directly from Waterfall to Agile is too much for your organization, this can be a valuable interim step (but it won't give you the full benefits of Agile, so be careful about getting stuck here).
Record the results in the Roadmap for Transition to Agile Template
2.2.1 Review the results of your Common Agile Challenges Survey (30-60 minutes)
2.2.2 Align your support with your top five challenges
This step involves the following participants:
Outcomes of this step
Using the Agile Challenges support mapping on the following slides, build your transformation plan and supporting resources. You can build your plan by individual team results or as an enterprise approach.
| Priority | Agile Challenge | Module Name and Sequence |
|---|---|---|
| 1 |
|
|
| 2 |
|
|
| 3 |
|
|
| 4 |
|
|
| 5 |
|
|
Agile Challenges |
Supporting Resources |
|---|---|
| Difficulty establishing an effective product owner (PO) or uncertainty about the PO role |
Modules:
|
| Uncertainty about minimum viable product (MVP) and how to identify your MVP |
Modules:
|
| How non-Agile teams (like architecture, info sec, operations, etc.) work with Agile teams |
Modules:
|
| Project Governance/Gating processes that are unfriendly to Agile |
Modules:
|
| Uncertainty about the role of a PM/PMO in Agile |
Modules:
|
| Uncertainty about how to budget/plan Agile projects |
Modules:
|
| Creating an Agile friendly RFP/Contract (e.g. how to contract and work with an Agile vendor) |
Modules:
|
Note: Modules listed as (Future) are in development and may be available in draft format.
Agile Challenges | Supporting Resources |
|---|---|
| An Agile skills deficit (e.g. new-to-Agile teams who have difficulty "doing Agile right") | Modules:
|
| General resistance in the organization to process changes required by Agile | Modules:
|
| Lack of Agile training, piloting and coaching being offered by the organization | Modules:
|
| Different Agile approaches are used by different teams, making it difficult to work together | Modules:
|
| Backlog management challenges (e.g. how to manage a backlog, and make effective use of Epics, Features, User Stories, Tasks and Bugs) | Modules:
|
| Quality Assurance challenges (testing not being done well on Agile projects) | Modules:
|
| Hierarchical management practices and organization boundaries make it difficult to be Agile | Modules:
|
Note: Modules listed as (Future) are in development and may be available in draft format.
Agile Challenges | Supporting Resources |
|---|---|
| Difficulty with establishing autonomous Agile teams (self managing, cross functional teams that are empowered by the organization to deliver) | Modules:
|
| Lack of management support for Agile | Modules:
|
| Poor understanding of Agile estimation techniques and how to apply them effectively | Modules:
|
| Difficulty creating effective product roadmaps in Agile | Modules:
|
| How do we know when an Agile project is ready to go live | Modules:
|
| Sprint goals are not being consistently met, or Sprint deliverables that are full of bugs | Modules:
|
Note: Modules listed as (Future) are in development and may be available in draft format.
Note: Modules listed as (Future) are in development and may be available in draft format.
Agile Challenges | Supporting Resources |
|---|---|
| An Agile skills deficit (e.g. new-to-Agile teams who have difficulty "doing Agile right") | Blueprints: Perform an Agile Skills Assessment; Mentoring for Agile Teams |
| General resistance in the organization to process changes required by Agile | Blueprints: Master Organizational Change Management Practices |
| Lack of Agile training, piloting and coaching being offered by the organization | Blueprints: Perform an Agile Skills Assessment; Mentoring for Agile Teams |
| Different Agile approaches are used by different teams, making it difficult to work together | Blueprints: Create a Horizontally Optimized SDLC to Better Meet Business Demands, Extend Agile Practices Beyond IT |
| Backlog management challenges (e.g. how to manage a backlog, and make effective use of epics, features, user stories, tasks and bugs) | Blueprints: Deliver on Your Digital Product Vision, Managing Requirements in an Agile Environment |
| Quality Assurance challenges (testing not being done well on Agile projects) | Blueprints: Build a Software Quality Assurance Program, Automate Testing to Get More Done |
| Hierarchical management practices and organization boundaries make it difficult to be Agile | Blueprints: Master Organizational Change Management Practices |
Agile Challenges | Supporting Resources |
|---|---|
| Difficulty with establishing autonomous Agile teams (self managing, cross functional teams that are empowered by the organization to deliver) | Blueprints: Master Organizational Change Management Practices |
| Lack of management support for Agile | Blueprints: Master Organizational Change Management Practices |
| Poor understanding of Agile estimation techniques and how to apply them effectively | Blueprints: Estimate Software Delivery with Confidence, Managing Requirements in an Agile Environment |
| Difficulty creating effective product roadmaps in Agile | Blueprints: Deliver on Your Digital Product Vision |
| How do we know when an Agile project is ready to go live | Blueprints: Optimize Applications Release Management,Drive Business Value With a Right-Sized Project Gating Process, Managing Requirements in an Agile Environment |
| Sprint goals are not being consistently met, or sprint deliverables that are full of bugs | Blueprints: Build a Software Quality Assurance Program, Automate Testing to Get More Done, Managing Requirements in an Agile Environment |
2.3.1 (Optional) Identify a hypothetical project
2.3.2 (Optional) Capture your traditional delivery approach
2.3.3 (Optional) Consider what a two-phase delivery looks like
2.3.4 (Optional) Consider what a four-phase delivery looks like
2.3.5 (Optional) Consider what a four-phase delivery with monthly sprints looks like
2.3.6 (Optional) Decide on your target state and the steps required to get there
This step involves the following participants:
Outcomes of this step
Your transition to Agile and more frequent releases doesn't need to be all at once. Organizations may find it easier to build toward smaller iterations.
|
Name of your imaginary 2-year long project: |
e.g. Big Bang ERP |
|---|---|
|
Brief Project Description: |
e.g. Replace home-grown legacy ERP with a modern COTS product in a single release scheduled to be delivered in 24 months |
Record this in the Roadmap for Transition to Agile Template
For best results, complete these sub-exercises with representatives from as many functional areas as possible
(e.g. stakeholders, project management, business analysis, development, testing, operations, architecture, infosec)
|
Step |
Description |
Who is involved |
|---|---|---|
| 1 |
|
PM, Business Analysts, Stakeholders, etc. |
| 2 |
|
PM, Architects, InfoSec, ARB, Operations, etc. |
| 3 |
|
PM, Developers, etc. |
| 4 |
|
PM, Testers, etc. |
| 5 |
|
PM, Developers, Testers, Stakeholders, etc. |
| 6 |
|
PM, Developers, Testers, Operations, InfoSec, CAB, etc. |
| 7 |
|
PM, etc. |
Step | Description | Who is involved |
|---|---|---|
| 1 |
| PM, Business Analysts, Stakeholders, etc. |
| 2 |
| PM, Architects, InfoSec, ARB, Operations, etc. |
| 3 |
| PM, Developers, etc. |
| 4 |
| PM, Testers, etc. |
| 5 |
| PM, Developers, Testers, Stakeholders, etc. |
| 6 |
| PM, Developers, Testers, Operations, InfoSec, CAB, etc. |
| 7 |
| PM, etc. |
|
People |
Processes |
Technology |
|---|---|---|
|
|
|
How difficult would this be to achieve in your organization? (1-easy, 10-next to impossible)
e.g. 2
People | Processes | Technology |
|---|---|---|
| e.g. Heavy and time-consuming process steps (e.g. architecture reviews, data modelling, infosec approvals, change approval board) will need to be streamlined and made more "iteration-friendly." e.g. Gather detailed requirements only for Phase 1A, and leave the rest as high-level requirements to be more fully defined at the beginning of each subsequent phase. |
|
How difficult would this be to achieve in your organization? (1-easy, 10-next to impossible)
e.g. 5
People | Processes | Technology |
|---|---|---|
|
|
|
How difficult would this be to achieve in your organization? (1-easy, 10-next to impossible)
e.g. 8
|
Identify your current state from Exercises 2.3.1-2.3.5 |
e.g. One-and-done |
|---|---|
|
Identify your desired state from Exercises 2.3.1-2.3.5 |
e.g. 24x1 Month Sprints |
|
Now |
Next | Later | ||||||
|---|---|---|---|---|---|---|---|---|
|
What are you going to do now? |
What are you going to do very soon? |
What are you going to do in the future? |
||||||
|
Roadmap Item |
Who |
Date |
Roadmap Item |
Who |
Date |
Roadmap Item |
Who |
Date |
|
Work with Stakeholders to identify a product owner for the project. |
AC |
Jan 1 |
Break down full deliverable into 4 phases with high level requirements for each phase |
DL |
Feb 15 |
Work with operations to set up Dev, Test, Pre-Prod, and Prod environments for first phase (make use of automation/scripting) |
DL |
Apr 15 |
|
Work with PO and stakeholders to help them understand Agile approach |
Jan 15 |
Work with PO to create a project backlog for the first phase deliverable |
JK |
Feb 28 |
Work with QA group to select and implement test automation for the project (start with smoke and regression tests) |
AC |
Apr 30 |
|
|
Work with project gating body, architecture, infosec and operations to agree on incremental deliveries for the project and streamlined activities to get there |
AC |
Mar 15 |
||||||
Record the results in the Roadmap for Transition to Agile Template
2.4.1 Identify key insights and takeaways
2.4.2 Perform an exit survey
This step involves the following participants:
Outcomes of this step
| What key insights have you gained? | What takeaways have you identified? |
|---|---|
|
|
|
Download Survey Template: |
|---|
|
Backlog Management |
Scrum Simulation |
Estimation |
Product Owner |
Product Roadmapping |
|---|---|---|---|---|
|
1: User stories and the art of decomposition 2: Effective backlog management & refinement 3: Identify insights and team feedback |
1: Scrum sprint planning and retrospective simulation 2: Pass the balls – sprint velocity game |
1: Improve product backlog item estimation 2: Agile estimation fundamentals 3: Understand the wisdom of crowds 4: Identify insights and team feedback |
1: Understand product management fundamentals 2: The critical role of the product owner 3: Manage effective product backlogs and roadmaps 4: Identify insights and team feedback |
1: Identify your product roadmapping pains 2: The six "tools" of product roadmapping 3: Product roadmapping exercise |
Organizations often struggle with numerous pain points around Agile delivery.
The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.
Agile modules provide supporting activities:
Each module provides guidance and supporting activities related to a specific Agile challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.
This phase involves the following participants:
Backlog 1.1 Identify your backlog and user story decomposition pains
Backlog 1.2 What are user stories and why do we use them?
Backlog 1.3 User story decomposition: password reset
Backlog 1.4 (Optional) Decompose a real epic
This step involves the following participants:
Outcomes of this step
|
What are your specific backlog management and user story decomposition challenges? |
|---|
|
User stories are core to Agile delivery.
Good user story decomposition practices are key to doing Agile effectively.
|
Why do we capture requirements as user stories (what value do they provide)? |
|---|
|
How do they differ from traditional (should/shall) requirements (and are they better)? |
|---|
|
What else stands out to you about user stories? |
|---|
Example:
As a banking customer, I want to see the current balance of my accounts so that I can know how much money I have in each account.
User stories enable collaboration and conversations to fully determine actual business requirements over time.
e.g. As a banking customer, I want to see the current balance of my accounts so that I can know how much money I have in each account.
Requirements, determined within the iterations, outline the steps to complete the story: how the user will access their account, the types of funds allowed, etc.
User stories allow the product owners to prioritize and manage the product needs (think of them as "virtual sticky notes").
The process of taking large PBIs (e.g. epics and features) and breaking them down in to small PBIs (e.g. user stories and tasks) is called user story decomposition and is often challenging for new-to-Agile teams
| User Story 1: | User Story 2: | User Story 3: |
|---|---|---|
|
|
|
A single epic can be broken down into multiple user stories
| User Story 1: | User Story 2: | User Story 3: | User Story 4: |
|---|---|---|---|
|
|
|
|
|
Acceptance Criteria: |
Acceptance Criteria: |
Acceptance Criteria: |
Acceptance Criteria: |
Your audience will dictate the level of detail and granularity you should include in your enabler, but it is a good rule of thumb to stick to the feature level.
| Enablers | Description |
|---|---|
Enabler Epics | Non-functional and other technical requirements that support your features (e.g. data and system requirements) |
Enabler Capabilities of Features | |
Enabler Stories |
|
Exploration |
Architectural |
|---|---|
|
Any efforts toward learning customer or user needs and creation of solutions and alternatives. Exploration enablers are heavily linked to learning milestones. |
Any efforts toward building components of your architecture. These will often be linked to delivery teams other than your pure development team. |
| Infrastructure |
Compliance |
|
Any efforts toward building various development and testing environments. Again, these are artifacts that will relate to other delivery teams. |
Any efforts toward regulatory and compliance requirements in your development activities. These can be both internal and external. |
Source: Scaled Agile, "Enablers."
The following questions can be helpful in dissecting an epic down to the user story level. The same line of thinking can also be useful for bundling multiple small PBIs together.
As a ____ I want _____ so that ______
| User Story 1: | User Story 2: | User Story 3: |
|---|---|---|
|
|
|
Backlog 2.1 Identify enablers and blockers
This step involves the following participants:
Outcomes of this step
Use a tiered approach to managing your backlog, and always work on the highest priority items first.
A better way to view them is "pre-planning" and "planning."
A well-formed backlog can be thought of as a DEEP backlog:
(Perforce, 2018)
Each activity is a variation of measuring value and estimating effort to validate and prioritize a PBI.
A PBI meets our definition of done and passes through to the next backlog tier when it meets the appropriate criteria. Quality filters should exist between each tier.
Expand the concepts of defining "ready" and "done" to include the other stages of a PBIs journey through product planning.
Info-Tech Insight: A quality filter ensures quality is met and teams are armed with the right information to work more efficiently and improve throughput.
| Notes and Instructions |
|---|
|
The primary intent of this exercise is to explain the complex notion of MVP (it is one of the most misunderstood and contentious issues in Agile delivery). The exercise is intended to explain it in a simple and digestible way that will fundamentally change participants' understanding of MVP. Note that the slide contains animations. |
| Imagine that your stakeholder tells you they want a blue 4-door sedan (consider this our "MVP" at this point), and you decide to build it the traditional way. As you build it (tires, then frame, then body, then joint body with frame and install engine), the stakeholder doesn't have anything they can use, and so they are only happy (and able to get value) at the end when the entire car is finished (point out the stakeholder "faces" go from unhappy to happy in the end). |
| Animation 1: When we use Agile methods, we don't want to wait until the end before we have something the stakeholders can use. So instead of waiting until the entire car is completed, we decide our first iteration will be to give the stakeholder "a simple (blue) wheeled transportation device"…namely a skateboard that they can use for a little while (it's not a car, but it is something the stakeholder can use to get places). |
| Animation 2: After the stakeholder has tried out the skateboard, we ask for feedback. They tell us the skateboard helped them to get around faster than walking, but they don't like the fact that it is so hard to maintain your balance on it. So, we add a handle to the skateboard to turn it into a scooter. The stakeholder then uses the scooter for a while. Stakeholder feedback says staying balanced on the scooter is much easier, but they don't have a place to put groceries when they go shopping, so can we do something about that? |
| (Continued on next slide…) |
| Notes and Instructions |
|---|
| Animation 3: Next, we build the stakeholder a bicycle and let them use it for a while before asking for feedback. The stakeholder tells us they love the bicycle, but they admit they get tired on long trips, so is there something we can do about that? |
| Animation 4: So next we add a motor to the bicycle to turn it into a motorcycle, and again we give it to the stakeholder to use for a while. When we ask the stakeholder for feedback, they tell us that they love the motorcycle so much because they love the feeling of the wind in their hair, they've decided that they no longer want a 4-door sedan, but instead would prefer a blue 2-door convertible. |
| Animation 5: And so, for our last iteration, we build the stakeholder what they actually wanted (a blue 2-door convertible) instead of what they asked for (a blue 4-door sedan), and we see that they are happier than they would have been if we had delivered the traditional way. |
|
INSIGHTS:
|
|
NOT Like This: |
|
|---|---|
|
It's Like This: |
A great and wise pharaoh hires two architects to build his memorial pyramids.
Several years go by, and then…
Backlog 3.1 Identify key insights and takeaways
Backlog 3.2 Perform exit survey and capture results
This step involves the following participants:
Outcomes of this step
What key insights have you gained? | What takeaways have you identified? |
|---|---|
|
|
Download Survey Template: |
|---|
Backlog Management | Scrum Simulation | Estimation | Product Owner | Product Roadmapping |
|---|---|---|---|---|
1: User stories and the art of decomposition 2: Effective backlog management & refinement 3: Identify insights and team feedback | 1: Scrum sprint planning and retrospective simulation 2: Pass the balls – sprint velocity game | 1: Improve product backlog item estimation 2: Agile estimation fundamentals 3: Understand the wisdom of crowds 4: Identify insights and team feedback | 1: Understand product management fundamentals 2: The critical role of the product owner 3: Manage effective product backlogs and roadmaps 4: Identify insights and team feedback | 1: Identify your product roadmapping pains 2: The six "tools" of product roadmapping 3: Product roadmapping exercise |
Organizations often struggle with numerous pain points around Agile delivery.
The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.
Agile modules provide supporting activities:
Each module provides guidance and supporting activities related to a specific Agile challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.
This phase involves the following participants:
Scrum sprint planning and retrospective simulation
1.1 Identify your scrum pains
1.2 Review scrum simulation intro
1.3 Create a mock backlog
1.4 Review sprint 0
1.5 Determine a budget and timeline
1.6 Understand minimum viable product
1.7 Plan your first sprint
1.8 Do a sprint retrospective
1.9 "What if" exercise (understanding what a fluid backlog really means)
1.10 A sprint 1 example
1.11 Simulate more sprints
This step involves the following participants:
Outcomes of this step
Talk to the nature of the Scrum team:
Speak about the "bank realizes that the precise scope of the first release can only be fully known at the end of the project" statement and what it means.
Discuss exercise and everyone's roles (make sure everyone clear), make it as realistic as possible. Your level of participation will determine how much value you get.
Discuss any questions the participants might have about the background section on the introduction tab. The exercise has been defined in a way that minimizes the scope and complexity of the work to be done by assuming there are existing web-capable services exposed to the bank's legacy system(s) and that the project is mostly about putting a deployable web front end in place.
Speak about "definition of done": Why was it defined this way? What are the boundaries? What happens if we define it to be only up to unit testing?
This exercise is intended to help participants understand the steps involved in creating an initial backlog and deciding on their MVP.
Note: The output from this exercise will not be used in the remainder of the simulation (a backlog for the simulation already exists on tab Sprint 0) so don't overdo it on this exercise. Do enough to help the participants understand the basic steps involved (brainstorm features and functions for the app, group them into epics, and decide which will be in- and out-of-scope for MVP). Examples have been provided for all steps of this exercise and are shown in grey to indicate they should be replaced by the participants.
Step 1: Have all participants brainstorm "features and functions" that they think should be available in the online banking app (stop once you have what feels like a "good enough" list to move on to the next step) – these do not need to be captured as user stories just yet.
Step 2: Review the list of features and functions with participants and decide on several epics to capture groups of related features and functions (bill payments, etc.). Think of these as forming the high-level structure of your requirements. Now, organize all the features and functions from Step 1, into their appropriate epic (you can identify as many epics as you like, but try to keep them to a minimum).
Step 3: Point out that on the Introduction tab, you were told the bank wants the first release to go live as soon as possible. So have participants go over the list of features and functions and identify those that they feel are most important (and should therefore go into the first release – that is, the MVP), and which they would leave for future releases. Help participants think critically and in a structured way about how to make these very hard decisions. Point out that the product owner is the ultimate decision maker here, but that the entire team should have input into the decision. Point out that all the features and functions that make up the MVP will be referred to as the "project backlog," and all the rest will be known as the "product backlog" (these are of course, just logical separations, there is only one physical backlog).
Step 4: This step is optional and involves asking the participants to create user stories (e.g. "As a __, I want ___ so that ___") for all the epics and features and functions that make up their chosen MVP. This step is to get them used to creating user stories, because they will need to get used to doing this. Note that many who are new to Agile often have difficulty writing user stories and end up overdoing it (e.g. providing a long-winded list of things in the "I want ___" part of the user story for an epic) or struggling to come up with something for the "so that ____" part). Help them to get good at quickly capturing the gist of what should be in the user story (the details come later).
Total Number of Sprints = 305/20 = 15.25 → ROUND UP TO 16 (Why? You can't do a "partial sprint" – plus, give yourself a little breathing room.)
Cost Per Sprint = 6 x $75 x 8 x 10 = $36,000
Total Timeline = 16 * 2 = 32 Weeks
Total Cost of First Release = $36,000 x 16 = $572,000
Talk about the "commitment" a Scrum delivery team makes to the organization ("We can't tell you exactly what we will deliver, but based on what we know, if you give the team 32 weeks, we will deliver something like what is in the project backlog – subject to any changes our stakeholder tell us are needed"). Most importantly, the team commits to doing the most important backlog items first, so if we run out of time, the unfinished work will be the least valuable user stories. Lastly, to keep to the schedule/timeline, items may move in and out of the project backlog – this is part of the normal and important "horse trading" that takes place on health Agile projects.
Speak to the fact that this approach allows you to provide a "deterministic" answer about how long a project will take and how much it will cost while keeping the project requirements flexible.
This is an unprioritized list, organized to make sense, and includes a user story (plus some stuff), and "good enough estimates" – How good?... Eh! (shoulder shrug)
Point out the limited ("lazy") investment → Agile principle: simplicity, the art of maximizing the work not done.
Point out that only way to really understand a requirement is to see a working example (requirements often change once the stakeholders see a working example – the "that's not what I meant" factor).
Estimates are a balancing act (good enough that we understand the overall approximate size of this, and still acknowledges that more details will have to wait until we decide to put that requirement into a Sprint – remember, no one knows how long this project is going to take (or even what the final deliverable will look like) so don't over invest in estimates here.)
Sprint velocity calculation is just a best guess → be prepared to find that your initial guess was off (but you will know this early rather than at the end of the project). This should lead to a healthy discussion about why the discrepancy is happening (sprint retrospectives can help here). Note: Sprint velocity doesn't assume working evenings and weekends!
Speak to the importance of Sprint velocity being based on a "sustainable pace" by the delivery team. Calculations that implicitly expect sustained overtime in order to meet the delivery date must be avoided. Part of the power of Agile comes from this critical insight. Critical → Your project's execution will need to be adjusted to accommodate the actual sprint velocity of the team!
Point out the "project backlog" and separation from the "product backlog" (and no sprint backlog yet!).
Point out the function/benefits of the backlog:
Talk about large items in backlog (>20 pts) and how to deal with them (do we need to break them up now?).
Give participants time to review the backlog: Questions/What would you be doing if this were real/We're going to collectively work through this backlog.
Sprint 0 is your opportunity to: get organized as a team, do high level design, strategize on approach, think about test data, environments, etc. – it is the "Ready-Set" in "Ready-Set-Go."
Think about doing a High/Med/Low value determination for each user story.
Note: Refer to the facilitator slides for more guidance on how to deliver this exercise
Step 1: Brainstorm "Features and Functions" that the group feels would be needed for this app
Note: Refer to the facilitator slides for more guidance on how to deliver this exercise
Step 2: Identify your epics
|
Epics |
"Features and Functions" in This Epic |
|---|---|
|
Administration |
- Logon and logoff - Register for app - Reset password |
|
Accounts |
- See account balances - See a history of account transactions - Search for a transaction by payee/date/amount |
|
Bill payments |
- Set up payees for online bill payments - Pay a bill online - Schedule a bill payment for the future |
|
Deposits |
- Make a deposit online
|
|
E-transfers |
- Make an e-transfer
|
Note: Refer to the facilitator slides for more guidance on how to deliver this exercise
Step 3: Identify your MVP
Epics | "Features and Functions" in This Epic |
|---|---|
Administration | - Logon and logoff - Register for app |
Accounts | - See account balances - See a history of account transactions |
Bill payments | - Set up payees for online bill payments - Pay a bill online |
Epics | In Scope |
|---|---|
| Deposits | - Make a deposit online |
| Accounts | - Search for a transaction by payee/date/amount/etc. |
| Bill payments | - Schedule a bill payment for the future |
Note: Refer to the facilitator slides for more guidance on how to deliver this exercise
Step 3: Identify your MVP
Epics | "Features and Functions" in This Epic |
|---|---|
Administration | - Logon and logoff |
Accounts | - See account balances |
Bill payments | - Set up payees for online bill payments |
Epics | In Scope |
|---|---|
| Logon and Logoff | As a user, I want to logon/logoff the app so I can do my banking securely |
| Register for App | As a user, I want to register to use the app so I can bank online |
| See Account Balances | As a user, I want to see my account balances so that I know my current financial status |
| See a History of Account Transactions | As a user, I want to see a history of my account transactions, so I am aware of where my money goes |
| Set up Payees for Online Bill Payments | As a user, I want to set up payees so that I can easily pay my bills |
| Pay a Bill Online | As a user, I want to pay bills online, so they get paid on time |
Note: Refer to the facilitator slides for more guidance on how to deliver this exercise
Step 1: Set aside the Mock Backlog just created (you will be using the Backlog on Sprint 0 for remainder of exercise).
Step 2: Introduce and walk through the Backlog on the Sprint 0 tab in the Scrum Simulation Exercise.
Step 3: Discuss and answer any questions the participants may have about the Sprint 0 tab.
Step 4: Capture any important issues or clarifications from this discussion in the table below.
Note: Refer to the facilitator slides for more guidance on how to deliver this exercise
|
GIVEN |
Total Story Points in Project Backlog (First Release): | 307 Story Points |
|---|---|---|
| Expected Sprint Velocity: | 20 Story Points/Sprint | |
| Total Team Size (PO, SM and 4-person Delivery Team): | 6 People | |
| Blended Hourly Rate Per Team Member (assume 8hr day): | $75/Hour | |
| Sprint Duration: | 2 Weeks |
|
DETERMINE |
Expected Number of Sprints to Complete Project Backlog: | |
|---|---|---|
| Cost Per Sprint ($): | ||
| Total Expected Timeline (weeks): | ||
| Total Cost of First Release: |
Note: Refer to the facilitator slides for more guidance on how to deliver this exercise
Note: Refer to the facilitator slides for more guidance on how to deliver this exercise
The primary intent of this exercise is to explain the complex notion of MVP (it is one of the most misunderstood and contentious issues in Agile delivery). The exercise is intended to explain it in a simple and digestible way that will fundamentally change participants' understanding of MVP.
Note that the slide contains animations.
Imagine that your stakeholder tells you they want a blue 4-door sedan (consider this our "MVP" at this point), and you decide to build it the traditional way. As you build it (tires, then frame, then body, then joint body with frame and install engine), the stakeholder doesn't have anything they can use, and so they are only happy (and able to get value) at the end when the entire car is finished (point out the stakeholder "faces" go from unhappy to happy in the end).
Animation 1:
When we use Agile methods, we don't want to wait until the end before we have something the stakeholders can use. So instead of waiting until the entire car is completed, we decide our first iteration will be to give the stakeholder "a simple (blue) wheeled transportation device"…namely a skateboard that they can use for a little while (it's not a car, but it is something the stakeholder can use to get places).
Animation 2:
After the stakeholder has tried out the skateboard, we ask for feedback. They tell us the skateboard helped them to get around faster than walking, but they don't like the fact that it is so hard to maintain your balance on it. So, we add a handle to the skateboard to turn it into a scooter. The stakeholder then uses the scooter for a while. stakeholder feedback says staying balanced on the scooter is much easier, but they don't have a place to put groceries when they go shopping, so can we do something about that?
(Continued on next slide…)
Animation 3:
So next we build the stakeholder a bicycle and let them use it for a while before asking for feedback. The stakeholder tells us they love the bicycle, but they admit they get tired on long trips, so is there something we can do about that?
Animation 4:
So next we add a motor to the bicycle to turn it into a motorcycle, and again we give it to the stakeholder to use for a while. When we ask the stakeholder for feedback, they tell us that they LOVE the motorcycle so much, and that because they love the feeling of the wind in their hair, they've decided that they no longer want a 4-door sedan, but instead would prefer a blue 2-door convertible.
Animation 5:
And so, for our last iteration, we build the stakeholder what they wanted (a blue 2-door convertible) instead of what they asked for (a blue 4-door sedan), and we see that they are happier than they would have been if we had delivered the traditional way.
INSIGHTS:
An MVP cannot be fully known at the beginning of a project (it is the "journey" of creating the MVP with stakeholders that defines what it looks like in the end).
Sometimes, stakeholders don't (or can't) know what they want until they see it.
There is no "straight path" to your MVP, you determine the path forward based on what you learned in the previous iterations.
This approach is part of the "power of Agile" and demonstrates why Agile can produce better outcomes and happier stakeholders.
|
NOT Like This: |
|
|---|---|
|
It's Like This: |
A great and wise pharaoh hires two architects to build his memorial pyramids.
Several years go by, and then…
Step 1: Divide participants into independent Scrum delivery teams (max 7-8 people per team) and assign a PO (5 minutes)
Step 2: Instruct each team to work together to decide on their "MVP strategy" for delivering this project (10-15 minutes)
Step 3: Have each team decide on which user stories they would put in their first sprint backlog (5-10 minutes)
Step 4: Have each team report on their findings. (10 minutes)
|
Describe your team's "MVP strategy" for this project (Explain why you chose this strategy): |
Identify your first sprint backlog (Explain how this aligns with your MVP strategy): |
|---|---|
|
What, if anything, did you find interesting, insightful or valuable by having completed this exercise: |
|---|
Step 1: Thinking about the work you did in Exercise 3.2.7, identify what worked well and what didn't
Step 2: Create a list of "Start/Stop/Continue" items using the table below
Step 3: Present your list and discuss with other teams
|
Start: |
Stop: |
Continue: |
|---|---|---|
|
Scenario: |
How would you deal with this: |
|---|---|
|
After playing with and testing the Sprint 1 deliverable, your stakeholders find several small bugs that need to be fixed, along with some minor changes they would like made to the system. The total amount of effort to address all of these is estimated to be 4 story points in total. |
(e.g. First and foremost, put these requests into the Project Backlog, then…) |
|
Despite your best efforts, your stakeholders tell you that your Sprint 1 deliverable missed the mark by a wide margin, and they have major changes they want to see made to it. |
|
|
Several stakeholders have come forward and stated that they feel strongly that the "DEPOSIT – Deposit a cheque by taking a photo" User Story should be part of the first release, and they would like to see it moved from the Product Backlog to the project backlog (Important Note: they don't want this to change the delivery date for the first release) |
|
|
|
|
Discussion |
|---|
|
Discussion and learnings |
|---|
2.1 Execute the ball passing sprints
This step involves the following participants:
Outcomes of this step
Goal 1. Pass as many balls as possible (Story Points) through the system during each sprint.
Goal 2. Improve your estimation and velocity after each retrospective.
Points Completed
Rules:
Scoring:
Epic 1: 3 sprints
Group Retrospective
Epic 2: 3 sprints (repeat)
Goal 1: Pass as many balls (Story Points) through the system during each sprint.
Goal 2: Improve your estimation and velocity after each retrospective.
Rules:
Scoring:
Goal:
Pass as many balls as possible through the system during each cycle.
Game Setup
Use your phone's timer to create 2-minute cycles:
Facilitator Tips
Alternate Versions
Trends to Look For and Discuss
Trends to Look For and Discuss
3.1 Identify key insights and takeaways
3.2 Perform exit survey and capture results
This step involves the following participants:
Outcomes of this step
What key insights have you gained? | What takeaways have you identified? |
|---|---|
|
|
Download Survey Template: |
|---|
Backlog Management | Scrum Simulation | Estimation | Product Owner | Product Roadmapping |
|---|---|---|---|---|
1: User stories and the art of decomposition 2: Effective backlog management & refinement 3: Identify insights and team feedback | 1: Scrum sprint planning and retrospective simulation 2: Pass the balls – sprint velocity game | 1: Improve product backlog item estimation 2: Agile estimation fundamentals 3: Understand the wisdom of crowds 4: Identify insights and team feedback | 1: Understand product management fundamentals 2: The critical role of the product owner 3: Manage effective product backlogs and roadmaps 4: Identify insights and team feedback | 1: Identify your product roadmapping pains 2: The six "tools" of product roadmapping 3: Product roadmapping exercise |
Organizations often struggle with numerous pain points around Agile delivery.
The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.
Agile modules provide supporting activities:
Each module provides guidance and supporting activities related to a specific Agile Challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.
This phase involves the following participants:
1.1 Identify your estimation pains
1.2 (Optional) Why do we estimate?
1.3 How do you estimate now?
This step involves the following participants:
Outcomes of this step
Know the truth about estimates and their potential pitfalls.
Then, understand how Agile estimation works to avoid these pitfalls.
|
What are your specific Estimation challenges? |
|---|
|
|
Why would/should you do estimates? |
|---|
|
Source: DZone, 2013.
Why would/should you do estimates? |
|---|
|
2.1 (Optional) Estimate a real PBI
This step involves the following participants:
Outcomes of this step
The average rough order of magnitude estimates for software are off by is up to 400%.
Source: Boehm, 1981
|
66% |
Average cost overrun(1) |
|---|---|
|
33% |
Average schedule overrun (1) |
|
17% |
Average benefits shortfall)1) |
(1) % of software projects with given issue
Source: McKinsey & Company, 2012
All estimates are wrong, but some can be useful (leverage the "wisdom of crowds" to improve your estimation practices).
| Consensus-Building Techniques | ||
|---|---|---|
| Planning Poker |
Most popular by far (stick with one of these unless there is a good reason to consider others) |
This approach uses the Delphi method, where a group collectively estimates the size of a PBI, or user stories, with cards numbered by story points. See our Estimate Software Delivery With Confidence blueprint. |
| T-Shirt Sizing |
This approach involves collaboratively estimating PBIs against a non-numerical system (e.g. small, medium, large). See DZone and C# Corner for more information. |
|
| Dot Voting |
This approach involves giving participants a set number of dot stickers or marks and voting on the PBIs (and options) to deliver. See Dotmocracy and Wikipedia for more information. |
|
| Bucket System |
This approach categorizes PBIs by placing them into defined buckets, which can then be further broken down through dividing and conquering. See Agile Advice and Crisp's Blog for more information. |
|
| Affinity Mapping |
This approach involves the individual sizing and sorting of PBIs, and then the order of these PBIs are collaboratively edited. The grouping is then associated with numerical estimates or buckets if desired. See Getting Agile for more information. |
|
| Ordering Method |
This approach involves randomly ordering items on a scale ranging from low to high. Each member will take turns moving an item one spot lower or higher where it seems appropriate. See Apiumhub, Sheidaei Blog (variant), and SitePoint (Relative Mass Valuation) for more information. |
|
Ready | Done |
|---|---|
|
|
How do you assign a point value to a user story? There is no easy answer outside of leveraging the experience of the team. Sizes are based on relative comparisons to other PBIs or previously developed items. Example: "This user story is 3 points because it is expected to take 3 times more effort than that 1-point user story."Therefore, the measurement of a story point is only defined through the team's experience, as the team matures.
Can you equate a point to a unit of time? First and foremost, for the purposes of backlog prioritization, you don't need to know the time, just its size relative to other PBIs. For sprint planning, release planning, or any scenario where timing is a factor, you will need to have a reasonably accurate sprint capacity determined. Again, this comes down to experience.
Planning poker: This approach uses the Delphi method, where a group collectively estimates the size of a PBI or user story, using cards with story points on them.
Materials: Each participant has deck of cards, containing the numbers of the Fibonacci sequence.
Typical Participants: Product owner, scrum master (usually acts as facilitator), delivery team.
Steps:
Step 1: As a group, select a real epic, feature, or user story from one of your project backlogs which needs to be estimated:
|
PBI to be Estimated: |
As a ____ I want _____ so that ______ |
|---|
Step 2: Select one person in your group to act as the product owner and discuss/question the details of the selected PBI to improve your collective understanding of the requirement (the PO will do their best to explain the PBI and answer any questions).
Step 3: Make your first round of estimates using either T-shirt sizing or the Fibonacci sequence. Be sure to agree on the boundaries for these estimates (e.g. "extra-small" (XS) is any work that can be completed in less than an hour, while "extra-large" (XL) is anything that would take a single person a full sprint to deliver – a similar approach could be used for Fibonacci where a "1" is less than an hour's work, and "21" might be a single person for a full sprint). Don't share your answer until everyone has had a chance to decide on their Estimate value for the PBI.
Step 4: Have everyone share their chosen estimate value and briefly explain their reasoning for the estimate. If most estimate values are the same/similar, allow the group to decide whether they have reached a "collective agreement" on the estimate. If not, repeat step 3 now that everyone has had a chance to explain their initial Estimate.
Step 5: Capture the "collective" estimate for the PBI here:
|
Our collective estimate for this PBI: |
e.g. 8 story points |
|---|
3.1 Guess the number of jelly beans (Round 1) (15 minutes)
3.2 Compare the average of your guesses (15 minutes)
3.3 Guess the number of gumballs (Round 2) (15 minutes)
3.4 Compare your guesses against the actual number
This step involves the following participants:
Outcomes of this step
The exercise is intended to mimic the way Planning Poker is performed in Agile Estimation. Use the exercise to demonstrate the power of the Wisdom of Crowds and how, in circumstances where the exact answer to a question is not known, asking several people for their opinion often produces more accurate results than most/any individual opinion.
Some participants will tend to "shout out an answer" right away, so be sure to tell participants not to share their answers until everyone has had an opportunity to register their guess (this is particularly important in Round 1, where we are trying to get unvarnished guesses from the participants).
In Round 1:
In Round 2:
Download Survey Template: |
|---|
See slide notes for instructions.
See slide notes for instructions.
Download Survey Template: |
|---|
See slide notes for instructions.
4.1 Identify key insights and takeaways
4.2 Perform exit survey and capture results
This step involves the following participants:
Outcomes of this step
What key insights have you gained? | What takeaways have you identified? |
|---|---|
|
|
Download Survey Template: |
|---|
Backlog Management | Scrum Simulation | Estimation | Product Owner | Product Roadmapping |
|---|---|---|---|---|
1: User stories and the art of decomposition 2: Effective backlog management & refinement 3: Identify insights and team feedback | 1: Scrum sprint planning and retrospective simulation 2: Pass the balls – sprint velocity game | 1: Improve product backlog item estimation 2: Agile estimation fundamentals 3: Understand the wisdom of crowds 4: Identify insights and team feedback | 1: Understand product management fundamentals 2: The critical role of the product owner 3: Manage effective product backlogs and roadmaps 4: Identify insights and team feedback | 1: Identify your product roadmapping pains 2: The six "tools" of product roadmapping 3: Product roadmapping exercise |
Organizations often struggle with numerous pain points around Agile delivery.
The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.
Agile modules provide supporting activities:
Each module provides guidance and supporting activities related to a specific Agile Challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.
This phase involves the following participants:
1.1 Identify your product owner pains
1.2 What is a "product"? Who are your "consumers"?
1.3 Define your role terminology
This step involves the following participants:
A proper definition of a product recognizes three key facts.
|
What are your specific Product Owner challenges? |
|---|
|
30-60 minutes
The term "product" is used for consistency but would apply to services as well.
"Product" and "Service" are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:
"A product owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The product owner is someone who really 'owns' the product."
– – Robbin Schuurman,
"Tips for Starting Technical Product Managers"
Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).
Unfortunately, most product owners operate with an incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.
Start by piloting product families to determine which approaches work best for your organization.
Create a common definition of what a product is and identify products in your inventory.
Use scaling patterns to build operationally aligned product families.
Develop a roadmap strategy to align families and products to enterprise goals and priorities.
Use products and families to evaluate the delivery and organizational design improvements.
Product Portfolio
Groups of product families within an overall value stream or capability grouping.
Product Portfolio Manager
Product Family
A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.
Product Family Manager
Product
Single product composed of one or more applications and services.
Product Owner
Info-Tech Insight
The primary role conflict occurs when the product owner is a proxy for stakeholders or responsible for the delivery team. The product owner owns the product backlog. The delivery team owns the sprint backlog and delivery.
Product management terminology is inconsistent, creating confusion in organizations introducing these roles. Understand the roles, then define terms that work best for you.
Key milestones must be proactively managed. If a project manager is not available, those responsibilities need to be managed by the Product Owner or Scrum Master. Start with responsibility mapping to decide which role will be responsible.
| Term |
Definition |
|---|---|
|
Product Owner |
|
|
Product Manager |
|
2.1 Identify enablers and blockers
2.2 (Optional) Dissect this definition of the product owner role
The critical importance of establishing an effective product owner role (PO) for your Agile projects cannot be overstated.
Many new-to-Agile organizations do not fully appreciate the critical role played by the PO in Scrum, nor the fundamental changes the organization will need to make in support of the PO role. Both mistakes will reduce an organization's chances of successfully adopting Agile and achieving its promised benefits.
The PO role is critical to the proper prioritization of requirements and efficient decision-making during the project.
The PO role helps the organization to avoid "analysis paralysis" challenges often experienced in large command-and-control-style organizations.
A poorly chosen or disengaged product owner will almost certainly stifle your Agile project.
Note that for many organizations, "product owner" is not a formally recognized role, which can create HR issues. Some organizational education on Agile may be needed (especially if your organization is unionized).
Failing to establish effective product owners in your organization can be a "species-killing event" for your Agile transformation.
Available: Assign a PO that can focus full-time on the project. Make sure your PO can dedicate the time needed to fulfill this critical role.
Appropriate: It's best for the PO to have strong subject matter expertise (so-called "super users" are often selected to be POs) as well as strong communication, collaboration, facilitation, and arbitration skills. A good PO will understand how to negotiate the best outcomes for the project, considering all project constraints.
Authoritative: The PO must be empowered by your organization to speak authoritatively about priorities and goals and be able to answer questions from the project team quickly and efficiently. The PO must know when decisions can be made immediately and when they must be made in collaboration with other stakeholders – choosing a PO that is well-known and respected by stakeholders will help to make this more efficient.
It's critical to assign a PO that meets the three A's:
An effective product owner listens to (and effectively balances) the needs and constraints of three different groups:
Organizational needs/constraints represent what is most important to the organization overall, and typically revolve around things like cost, schedule, return on investment, time to market, risk mitigation, conforming to policies and regulations, etc.
Stakeholder needs/constraints represent what is most important to those who will be using the system and typically revolve around the delivery of value, ease of use, better outcomes, making their jobs easier and more efficient, getting what they ask for, etc.
Delivery Team needs/constraints represent what is most important to those who are tasked with delivering the project and cover a broad range that includes tools, skills, capabilities, technology limitations, capacity limits, adequate testing, architectural considerations, sustainable workload, clear direction and requirements, opportunities to innovate, getting sufficient input and feedback, support for clearing roadblocks, dependencies on other teams, etc.
An effective PO will expertly balance the needs of:
* For more, see Understanding Scrum: Why do Product Owners Have Three Ears
Although the PO plays a unique and central role in the success of an Agile project, it doesn't mean they "act alone."
The PO is ultimately responsible for managing and maintaining an effective backlog over the project lifecycle, but many people contribute to maintaining this backlog (on large projects, BA's are often the primary contributors to the backlog).
The PO role also relies heavily on stakeholders (to help define and elaborate user stories, provide input and feedback, answer questions, participate in sprint demos, participate in testing of sprint deliverables, etc.).
The PO role also relies heavily on the delivery team. Some backlog management and story elaboration is done by delivery team members instead of the PO (think: elaborating user story details, creating acceptance criteria, writing test plans for user stories, etc.).
The PO both contributes to these efforts and leads/oversees the efforts of others. The exact mix of "doing" and "leading" can be different on a case-by-case basis and is part of establishing the delivery team's norms.
Given the importance of the role, care must be taken to not overburden the product owner, especially on large projects.
While being ultimately responsible for the product backlog, a PO often relies on others to aid in backlog management and maintenance.
This is particularly true on large projects.
It is always best to assign a product owner "from the business," who will bring subject matter expertise and have established relationships with stakeholders.
When a PO from the business does not have enough time to fulfill the needs of the role completely (e.g. can only be a part-time PO, because they have a day job), assigning a proxy product owner can help to compensate for this.
The proxy PO acts on behalf of the PO in order to reduce the PO's workload or to otherwise support them.
Project participants (e.g. delivery team, stakeholders) should treat the PO and proxy PO as roughly equivalent.
Project managers (PMs) and business analysts (BAs) are often good candidates for the proxy PO role.
NOTE: It's highly advisable for the PO to attend all/most sprint demos in order to observe progress for themselves, and to identify any misalignment with expectations as early as possible (remember that the PO still has ultimate responsibility for the project outcomes).
Although not ideal, assigning a proxy PO can help to compensate for a PO who doesn't meet all three A's of Product Ownership.
It is up to the PO and proxy to decide how they will work together (e.g. establish their norms).
The PO and proxy must:
Sometimes, having multiple product owners makes sense.
It is always best to assign a single product owner to a project. However, under certain circumstances, it can make sense to use multiple POs.
For example, when implementing a large ERP system with many distinct modules (e.g. Finance, HR) it can be difficult to find a single PO who has sufficient subject matter expertise across all modules.
When assigning Multiple POs to a project, be sure to identify a "Lead PO" (who is given ultimate responsibility for the entire project) and have the remaining POs act like Proxy POs.
NOTE: Not surprisingly, it's highly advisable for the Lead PO to attend as many Sprint Demos as possible to observe progress for themselves, and to identify any misalignment with expectations as early as possible (remember that the Lead PO has ultimate responsibility for the project outcomes).
Although not ideal, assigning multiple POs to a project sometimes makes sense.
When needed, be sure to identify a "Lead PO" and have the other PO's act like Proxies.
| Enablers | Blockers | Mitigation |
|---|---|---|
| High business engagement and buy-in | Significant time is required to implement and train resources | Limit the scope for pilot project to allow time to learn |
| Organizational acceptance for change | Geographically distributed resources | Temporarily collocate all resources and acquire virtual communication technology |
| Existing tools can be customized for BRM | Difficulty injecting customers in demos | Educate customer groups on the importance of attendance and 'what's in it for them' |
|
Which aspects of the product owner are "easy" in your organization? |
Which aspects of the product owner are "hard" in your organization? |
|---|---|
3.1 Build a starting checklist of quality filters
This step involves the following participants:
Outcomes of this step
When managed properly, the product backlog is a powerful project management tool that directly contributes to project success.
The product owner's primary responsibility is to ensure this backlog is managed effectively.
A well-formed backlog can be thought of as a DEEP backlog:
(Perforce, 2018)
Each activity is a variation of measuring value and estimating effort to validate and prioritize a PBI.
A PBI meets our definition of done and passes through to the next backlog tier when it meets the appropriate criteria. Quality filters should exist between each tier.
Expand the concepts of defining "ready" and "done" to include the other stages of a PBIs journey through product planning.
Info-Tech Insight: A quality filter ensures quality is met and teams are armed with the right information to work more efficiently and improve throughput.
In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.
Adapted from: Pichler, "What Is Product Management?"
The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.
Match your roadmap and backlog to the needs of the product.
Product Managers do not have to choose between being tactical or strategic.
– Aha!, 2015
| Audience |
Business/ |
Users/Customers |
Delivery Teams |
|---|---|---|---|
|
Roadmap View |
Portfolio |
Product Family |
Technology |
|
Objectives |
To provide a snapshot |
To visualize and validate product strategy |
To coordinate broad technology and architecture decisions |
|
Artifacts |
Line items or sections of the roadmap are made up of individual products, and an artifact represents a disposition at its highest level. |
Artifacts are generally grouped by product teams and consist of strategic goals and the features that realize |
Artifacts are grouped by |
Business/ | Users/Customers | Delivery Teams |
|---|---|---|
Audience: | Audience: | Audience:
|
Level of Detail/Artifacts: | Level of Detail/Artifacts: | Level of Detail/Artifacts: |
Your product and product family roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but it can be done at a more granular level if an understanding of capabilities isn't available.

4.1 Identify key insights and takeaways
4.2 Perform exit survey and capture results
This step involves the following participants:
Outcomes of this step
| What key insights have you gained? | What takeaways have you identified? |
|---|---|
| (e.g. better understanding of Agile mindset, principles, and practices) | (e.g. how you can improve/spread Agile practices in the organization) |
Download Survey Template: |
|---|
Backlog Management | Scrum Simulation | Estimation | Product Owner | Product Roadmapping |
|---|---|---|---|---|
1: User stories and the art of decomposition 2: Effective backlog management & refinement 3: Identify insights and team feedback | 1: Scrum sprint planning and retrospective simulation 2: Pass the balls – sprint velocity game | 1: Improve product backlog item estimation 2: Agile estimation fundamentals 3: Understand the wisdom of crowds 4: Identify insights and team feedback | 1: Understand product management fundamentals 2: The critical role of the product owner 3: Manage effective product backlogs and roadmaps 4: Identify insights and team feedback | 1: Identify your product roadmapping pains 2: The six "tools" of product roadmapping 3: Product roadmapping exercise |
Organizations often struggle with numerous pain points around Agile delivery.
The Common Agile Challenges Survey results will help you identify and prioritize the organization's biggest (most cited) pain points. Treat these pain points like a backlog and address the biggest ones first.
Agile modules provide supporting activities:
Each module provides guidance and supporting activities related to a specific Agile challenge from your survey. These modules can be arranged to meet each organization's or team's needs while providing cohesive and consistent messaging. For additional supporting research, please visit the Agile / DevOps Resource Center.
This phase involves the following participants:
Roadmapping 1.1 Identify your product roadmapping pains
Roadmapping 1.2 The six "tools" of product roadmapping
Roadmapping 1.3 Product roadmapping exercise
| What is product management, and how does it differ from a project orientation? |
|---|
"A temporary endeavor undertaken to create a unique product, service, or result. The temporary nature of projects indicates a beginning and an end to the project work or a phase of the project work. Projects can stand alone or be part of a program or portfolio."
– PMBOK, PMI
"A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements."
– Deliver on Your Digital Product Vision,
Info-Tech Research Group
Any proper definition of product recognizes that they are long-term endeavors that don't end after the project finishes. Because of this, products need well thought out roadmaps.
Product Portfolio
Groups of product families within an overall value stream or capability grouping.
Product Portfolio Manager
Product Family
A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.
Product Family Manager
Product
Single product composed of one or more applications and services.
Product Owner
Info-Tech Insight
The primary role conflict occurs when the product owner is a proxy for stakeholders or responsible for the delivery team. The product owner owns the product backlog. The delivery team owns the sprint backlog and delivery.
For example,
|
Capture your organization's definition of product: |
|---|
* For more on Product Management see Deliver on Your Digital Product Vision
The six "tools" of product roadmapping
Roadmapping 3.1 Product roadmapping exercise
Roadmapping 3.2 Identify key insights and takeaways
Roadmapping 3.3 Perform an exit survey
The city of Binbetter is a picturesque place that is sadly in decline because local industry jobs are slowly relocating elsewhere. So, the local government has decided to do something to reinvigorate the city. Binbetter City Council has set aside money and a parcel of land they would like to develop into a venue that will attract visitors and generate revenue for the city.
Your team was hired to develop the site, and you have already spent time with city representatives to create a vision, goals and strategy for building out this venue (captured on the following slides). The city doesn't want to wait until the entire venue is completed before it opens to visitors, and so you have been instructed to build it incrementally in order to bring in much needed revenue as soon as possible.
Using the vision, goals, and strategy you have created, your team will need to plan out the build (i.e. create a roadmap and release plan for which parts of the venue to build and in which order). You can assume that visitors will come to the venue after your "Release 1", even while the rest is still under construction. Select one member of your team to be designated as the product owner. The entire team will work together to consider options and agree on a roadmap/release plan, but the product owner will be the ultimate decision-maker.
* Adapted from Rautiainen et al, Toward Agile Product and Portfolio Management, 2015
Vision, Goals, and StrategyProduct Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city |
Vision, Goals, and StrategyProduct Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city
Goals: The venue will include a Château-style Hotel, Gothic-style Cathedral, and a Monument dedicated to the city's founder, Ivy Binbetter. Strategy: Develop the venue incrementally, focusing on the highest value elements first (prioritizing both usages by visitors and revenue generation). |
|
Release 1 (MVP) |
|---|
Vision, Goals, and StrategyProduct Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city Goals: The venue will include a Château-style Hotel, Gothic-style Cathedral, and a Monument dedicated to the city's founder, Ivy Binbetter. Strategy: Develop the venue incrementally, focusing on the highest value elements first (prioritizing both usages by visitors and revenue generation).
|
| Release 2 | Release 3 | Release 4 | Release 5 |
|---|---|---|---|
Vision, Goals, and StrategyProduct Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city Goals: The venue will include a Château-style Hotel, Gothic-style Cathedral, and a Monument dedicated to the city's founder, Ivy Binbetter. Strategy: Develop the venue incrementally, focusing on the highest value elements first (prioritizing both usages by visitors and revenue generation).
|
Roadmap, Release Plan and Backlog
| Vision, Goals, and StrategyProduct Vision: Create an architecturally significant venue that will attract both locals and tourists while also generating revenue for the city Goals: The venue will include a Château-style Hotel, Gothic-style Cathedral, and a Monument dedicated to the city's founder, Ivy Binbetter. Strategy: Develop the venue incrementally, focusing on the highest value elements first (prioritizing both usages by visitors and revenue generation).
|
| What key insights have you gained? | What takeaways have you identified? |
|---|---|
|
|
Download Survey Template: |
|---|
Implement DevOps Practices That Work
Deliver on Your Digital Product Vision
Deliver Digital Products at Scale
"Agile Estimation Practice." DZone.com, 13 May 2013. Web.
"Announcing DORA 2021 Accelerate State of DevOps Report." Google Cloud Blog. Accessed 8 Nov. 2022.
"Are Your IT Strategy and Business Strategy Aligned?" 5Q Partners, 8 Jan. 2015. Accessed Oct. 2016.
A, Karen. "20 Mental Models for Product Managers." Medium, Product Management Insider, 2 Aug. 2018 . Web.
ADAMS, PAUL. "Product Teams: How to Build & Structure Product Teams for Growth." Inside Intercom, 30 Oct. 2019. Web.
Agile Alliance. "Product Owner." Agile Alliance. n.d. Web.
Ambysoft. "2018 IT Project Success Rates Survey Results." Ambysoft. 2018. Web.
Banfield, Richard, et al. "On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team." Pluralsight, 31 Jan. 2018. Web.
Bloch, Michael, Sven Blumberg, and Jurgen Laartz. "Delivering Large-Scale IT Projects on Time, on Budget, and on Value." McKinsey & Company, October 2012.
Blueprint. "10 Ways Requirements Can Sabotage Your Projects Right From the Start." Blueprint. 2012. Web.
Boehm, Barry W. Software Engineering Economics. New Jersey: Prentice Hall, 1981.
Breddels, Dajo, and Paul Kuijten. "Product Owner Value Game." Agile2015 Conference. 2015. Web.
Cagan, Martin. "Behind Every Great Product." Silicon Valley Product Group. 2005. Web.
"Chaos Report 2015." The Standish Group, 2015. Accessed 29 July 2022.
Cohn, Mike. Succeeding With Agile: Software Development Using Scrum. Addison-Wesley. 2010. Web.
Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997. Print.
Dyba, Tore, and Torgeir Dingsøyr. "Empirical Studies of Agile Software Development: A Systematic Review." Elsevier, ScienceDirect. 24 Jan. 2008. Web.
"How do you define a product?" Scrum.org. 4 Apr 2017, Web
EDUCAUSE. "Aligning IT Funding Models to the Pace of Technology Change." EDUCAUSE. 14 Dec. 2015. Web.
Eick, Stephen. "Does Code Decay? Assessing the Evidence from Change Management Data." IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.
"Enablers." Scaled Agile. n.d. Web.
"Epic." Scaled Agile. n.d. Web.
Eringa, Ron. "Evolution of the Product Owner." RonEringa.com. 12 June 2016. Web.
Fernandes, Thaisa. "Spotify Squad Framework - Part I." Medium.com. 6 Mar. 2017. Web.
Fowler, Martin. "Application Boundary." MartinFowler.com. 11 Sept. 2003. Web. 20 Nov. 2017.
Galen, Robert. "Measuring Technical Product Managership – What Does 'Good' Look Like ...." RGalen Consulting. 5 Aug. 2015. Web.
Hackshall, Robin. "Product Backlog Refinement." Scrum Alliance. 9 Oct. 2014. Web. Feb. 2019.
Halisky, Merland, and Luke Lackrone. "The Product Owner's Universe." Agile Alliance, Agile2016. 2016. Web.
Kamer, Jurriaan. "How to Build Your Own 'Spotify Model'." Medium.com. 9 Feb. 2018. Web.
Karlsson, Johan. "Backlog Grooming: Must-Know Tips for High-Value Products." Perforce. 18 May 2018. Web. Feb. 2019.
Lindstrom, Lowell. "7 Skills You Need to Be a Great Product Owner." Scrum Alliance. n.d. Web.
Lawrence, Richard, and Peter Green. "The Humanizing Work Guide to Splitting User Stories." Humanizing Work, 22 Oct. 2020. Web.
Leffingwell, Dean. "SAFe 5.0." Scaled Agile Inc. 2021. Web. Feb. 2021.
Lucero, Mario. "Product Backlog – Deep Model." Agilelucero. 8 Oct. 2014. Web.
Lukassen, Chris. "The Five Belts Of The Product Owner." Xebia.com. 20 Sept. 2016. Web.
Management 3.0. "Delegation Poker Product Image." Management 3.0. n.d. Web.
McCloskey, Heather. "Scaling Product Management: Secrets to Defeating Common Challenges." Scaling Product Management: Secrets to Defeating Common Challenges, ProductPlan, 12 July 2019 . Web.
McCloskey, Heather. "When and How to Scale Your Product Team." UserVoice Blog, UserVoice, 21 Feb. 2017 . Web.
Medium.com. "Exploring Key Elements of Spotify's Agile Scaling Model." Medium.com. 23 July 2018. Web.
Mironov, Rich. "Scaling Up Product Manager/Owner Teams: - Rich Mironov's Product Bytes." Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014 . Web.
"Most Agile Transformations Will Fail." Vitality Chicago Inc., 24 Jan. 2019.
Overeem, Barry. "A Product Owner Self-Assessment." Barry Overeem. 6 Mar. 2017. Web.
Overeem, Barry. "Retrospective: Using the Team Radar." Barry Overeem. 27 Feb. 2017. Web.
"PI Planning." Scaled Agile. n.d. Web.
"PI Planning."SAFe. 2020.
Pichler, Roman. "How to Scale the Scrum Product Owner." Roman Pichler, 28 June 2016 . Web.
Pichler, Roman. "Product Management Framework." Pichler Consulting Limited. 2014. Web.
Pichler, Roman. "Sprint Planning Tips for Technical Product Managers." LinkedIn. 4 Sept. 2018. Web.
Pichler, Roman. "What Is Product Management?" Pichler Consulting Limited. 26 Nov. 2014. Web.
Project Management Institute. A Guide to the Project Management Body of Knowledge (PMBOK Guide). 7th ed., Project Management Institute, 2021.
Radigan, Dan. "Putting the 'Flow' Back in Workflow With WIP Limits." Atlassian. n.d. Web.
Royce, Dr. Winston W. "Managing the Development of Large Software Systems." Scf.usc.edu. 1970. Web.
Schuurman, Robbin. "10 Tips for Technical Product Managers on Agile Product Management." Scrum.org. 28 Nov. 2017. Web.
Schuurman, Robbin. "10 Tips for Technical Product Managers on (Business) Value." Scrum.org. 30 Nov. 2017. Web.
Schuurman, Robbin. "10 Tips for Technical Product Managers on Product Backlog Management." Scrum.org. 5 Dec. 2017. Web.
Schuurman, Robbin. "10 Tips for Technical Product Managers on the Product Vision." Scrum.org. 29 Nov. 2017. Web.
Schuurman, Robbin. "Tips for Starting Technical Product Managers." Scrum.org. 27 Nov. 2017. Web.
Sharma, Rohit. "Scaling Product Teams the Structured Way." Monetary Musings, Monetary Musings, 28 Nov. 2016 . Web.
STEINER, ANNE. "Start to Scale Your Product Management: Multiple Teams Working on Single Product." Cprime, Cprime, 6 Aug. 2019 . Web.
Shirazi, Reza. "Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong." Austin VOP #50. 2 Oct. 2018. Web.
Standish Group, The. "The Standish Group 2015 Chaos Report." The Standish Group. 2015. Web.
Theus, Andre. "When Should You Scale the Product Management Team?" When Should You Scale the Product Management Team?, ProductPlan, 7 May 2019 . Web.
Todaro, Dave. "Splitting Epics and User Stories." Ascendle. n.d. Web. Feb. 2019.
Tolonen, Arto. "Scaling Product Management in a Single Product Company." Smartly.io - Digital Advertising Made Easy, Effective, and Enjoyable, Smartly.io, 26 Apr. 2018 . Web.
Ulrich, Catherine. "The 6 Types of Product Managers. Which One Do You Need?" Medium.com. 19 Dec. 2017. Web.
Vähäniitty, J. et al. "Chapter 7: Agile Product Management" in Towards Agile Product and Portfolio Management. Aalto University Software Process Research Group, 2010.
VersionOne. "12th Annual State of Agile Report." VersionOne. 9 April 2018. Web.
Verwijs, Christiaan. "Retrospective: Do The Team Radar." Medium.com. 10 Feb. 2017. Web.
"Why Agile Fails Because of Corporate Culture - DZone Agile." Dzone.Com. Accessed 31 Aug. 2021.
Collaboration
Team members leverage all their experience working towards a common goal.
Iterations
Cycles provide opportunities for more product feedback.
Prioritization
The most important needs are addressed in the current iteration.
Continual Improvement
Self-managing teams continually improve their approach for next iteration.
A well-formed backlog can be thought of as a DEEP backlog:
(Perforce, 2018)
Info-Tech Best Practice
Don't fully elaborate all of your PBIs at the beginning of the project instead, make sure they are elaborated "just in time." (Keep no more than 2 or 3 sprints worth of user stories in the Ready state.)
Scrum: Delivering related or grouped changes in fixed time intervals.
Kanban: Delivering independent items as soon as each is ready.
Delegate and Empower
Decision making must be delegated down within the organization, and all resources must be empowered and supported to make effective decisions.
Define Outcomes
Outcomes and goals must be clearly articulated and understood across the organization to ensure decisions are in line and stay within reasonable boundaries.
Make Risk informed decisions
Integrated risk information must be available with sufficient data to support decision making and design approaches at all levels of the organization.
Embed / Automate
Governance standards and activities need to be embedded in processes and practices. Optimal governance reduces its manual footprint while remaining viable. This also allows for more dynamic adaptation.
Establish standards and behavior
Standards and policies need to be defined as the foundation for embedding governance practices organizationally. These guardrails will create boundaries to reinforce delegated decision making.
Organizations should look to progress in their governance stages. Ad-Hoc, and controlled governance tends to be slow, expensive, and a poor fit for modern practices.
The goal as you progress in your stages is to delegate governance and empower teams to make optimal decisions in real-time, knowing that they are aligned with the understood best interests of the organization.
Automate governance for optimal velocity, while mitigating risks and driving value.
This puts your organization in the best position to be adaptive and able to react effectively to volatility and uncertainty.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand what a Lean management system is, review Lean philosophies, and examine simple Lean tools and activities.
Understand the implications of the scope of your Lean management program.
Examine the sections and content to include in your huddle board design.
Determine the actions required by leaders and the operating rhythm.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand Lean management.
Gain a common understanding of Lean management, the Lean management thought model, Lean philosophies, huddles, visual management, team growth, and voice of customer.
1.1 Define Lean management in your organization.
1.2 Create training materials.
Lean management definition
Customized training materials
Understand Lean management.
Determine the scope of your program.
Understand metrics and performance review.
Understand problem identification and continuous improvement.
Understand Kanban.
Understand Leader Standard Work.
Define the scope of the Lean management program.
2.1 Develop example operational metrics
2.2 Simulate problem section.
2.3 Simulate Kanban.
2.4 Build scoping tool.
Understand how to use operational metrics
Understand problem identification
Understand Kanban/daily tasks section
Defined scope for your program
Design the sections and content for your huddle board.
Initial huddle board design.
3.1 Design and build each section in your huddle board.
3.2 Simulate coaching conversations.
Initial huddle board design
Understanding of how to conduct a huddle
Design your Leader Standard Work activities.
Develop a schedule for executing Leader Standard Work.
Standard activities identified and documented.
Sample schedule developed.
4.1 Identify standard activities for leaders.
4.2 Develop a schedule for executing Leader Standard Work.
Leader Standard Work activities documented
Initial schedule for Leader Standard Work activities
Windows is no longer the only option. MacBooks and Chromebooks are justified, but now you have to manage them.
Managing end-user devices may be accomplished with a variety of solutions, but many of those solutions advocate integration with a Microsoft-friendly solution to take advantage of features such as conditional access, security functionality, and data governance.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Explore options, guidance and some best practices related to the management of Chromebooks and MacBooks in the enterprise environment and educational institutions. Our guidance will help you understand features and options available in a variety of solutions. We also provide guidance on selecting the best endpoint management solution for your own environment.
This tool will help you determine the features and options you want or need in an endpoint management solution.
Until recently, Windows devices dominated the workplace globally. Computing devices were also rare in many industries such as education. Administrators and administrative staff may have used Windows-based devices, but Chromebooks were not yet in use. Most universities and colleges were Windows-based in offices with some flavor of Unix in other areas, and Apple devices were gaining some popularity in certain circles.
That is a stark contrast compared to today, where Chromebooks dominate the classrooms and MacBooks and Chromebooks are making significant inroads into the enterprise environment. MacBooks are also a common sight on many university campuses. There is no doubt that while Windows may still be the dominant player, it is far from the only one in town.
Now that Chromebooks and MacBooks are a notable, if not significant, part of the education and enterprise environments, they must be afforded the same considerations as Windows devices in those environments when it comes to management. The good news is that there is no lack of available solutions for managing these devices, and the endpoint management landscape is continually evolving and improving.
P.J. Ryan
Research Director, Infrastructure & Operations
Info-Tech Research Group
Managing end-user devices may be accomplished with a variety of solutions, but many of those solutions advocate integration with a Microsoft-friendly solution to take advantage of features such as conditional access, security functionality, and data governance.
Google Admin Console is necessary to manage Chromebooks, but it can be paired with other tools. Implementation partnerships provide solutions to track the device lifecycle, track the repair lifecycle, sync with Google Admin Console as well as PowerSchool to provide a more complete picture of the user and device, and facilitate reminders to return the device, pay fees if necessary, pick up a device when a repair is complete, and more.
The Google Admin Console allows admins to follow an organizational unit (OU) structure very similar to what they may have used in Microsoft's Active Directory environment. This familiarity makes the task of administering Chromebooks easier for admins.
Chromebook management goes beyond securing and manipulating the device. Controls to protect the students while online, such as Safe Search and Safe Browsing, should also be implemented.
Most companies choose to use a dedicated MacBook management tool. Many unified endpoint management (UEM) tools can manage MacBooks to some extent, but admins tend to agree that a MacBook-focused endpoint management tool is best for MacBooks while a Windows-based endpoint management tool is best for Windows devices.
Some MacBook management solutions advocate integration with Windows UEM solutions to take advantage of Microsoft features such as conditional access, security functionality, and data governance. This approach can also be applied to Chromebooks.
"In 2018, Chromebooks represented an incredible 60 percent of all laptop or tablet devices in K-12 -- up from zero percent when the first Chromebook launched during the summer break in 2011."
– "Will Chromebooks Rule the Enterprise?" Computerworld
"Chromebooks were the best performing PC products in Q3 2020, with shipment volume increasing to a record-high 9.4 million units, up a whopping 122% year-on-year."
– Android Police
"Until the pandemic, Chrome OS' success was largely limited to U.S. schools. Demand in 2020 appears to have expanded beyond that small but critical part of the U.S. PC market."
– Geekwire
"In addition to running a huge number of Chrome Extensions and Apps at once, Chromebooks also run Android, Linux and Windows apps."
– "Will Chromebooks Rule the Enterprise?" Computerworld
GAC gives you a centralized console that will allow you to:
GAC can facilitate device management with features such as:
Device and user addition, group and organizational unit creation and administration, applying policies to devices and users – does all this remind you of your Active Directory environment?
GAC lets you administer users and devices with a similar approach.
Source: Google
You must be running the Chrome Enterprise Upgrade and have any licenses required by the approved partner to take advantage of this management option. The partner admin policies supersede GAC.
If you stop using the approved partner admin console to manage your devices, the polices and settings in GAC will immediately take over the devices.
Chromebook deployment becomes a challenge when device quantities grow. The enrollment process can be time consuming, and every device must be enrolled before it can be used by an employee or a student. Many admins enlist their full IT teams to assist in the short term. Some vendor partners may assist with distribution options if staffing levels permit. Recent developments from Google have opened additional options for device enrollment beyond the manual enrollment approach.
Most of the settings and features previously mentioned are also available for Education-licensed devices and users. Enterprise-specific features will not be available to Education licenses. (Active Directory integration with Education licenses, for example, is accomplished using a different approach)
An online search for Chromebook management solutions will reveal several software solutions that augment the capabilities of the Google Admin Console. Many of these solutions are focused on the education sector and classroom and student options, although the features would be beneficial to enterprises and educational organizations alike.
"There are many components to managing Chromebooks. Schools need to know which student has which device, which school has which device, and costs relating to repairs. Chromebook Management Software … facilitates these processes."
– VIZOR
"Macs now make up 23% of endpoints in enterprises."
– ComputerWeekly.com
"When given the choice, no less than 72% of employees choose Macs over PCs."
– "5 Reasons Mac is a must," Jamf
"IBM says it is 3X more expensive to manage PCs than Macs."
– Computerworld
"74% of those who previously used a PC for work experienced fewer issues now that they use a Mac"
– "Global Survey: Mac in the Enterprise," Jamf
"When enterprise moves to Mac, staff retention rates improve by 20%. That's quite a boost! "
– "5 Reasons Mac is a must," Jamf
Most Windows UEM tools are constantly improving, and it is only a matter of time before they rival many of the dedicated MacBook management tools out there.
Dedicated solutions advocate integration with UEM solutions to take advantage of conditional access, security functionality, and data governance features.
Jamf and Microsoft entered into a collaboration several years ago with the intention of making the MacBook management process easier and more secure.
Microsoft Intune and Jamf Pro: Better together to manage and secure Macs
Microsoft Conditional Access with Jamf Pro ensures that company data is only accessed by trusted users, on trusted devices, using trusted apps. Jamf extends this Enterprise Mobile + Security (EMS) functionality to Mac, iPhone and iPad.
– "Microsoft Intune and Jamf Pro," Jamf
There are many solutions available to manage end-user devices, and they come with a long list of options and features. Clarify your needs and define your requirements before you purchase another endpoint management tool. Don't purchase capabilities that you may never use.
Use the Endpoint Management Selection Tool to identify your desired endpoint solution features and compare vendor solution functionality based on your desired features.
|
Endpoint Management Selection Tool |
|||
|---|---|---|---|
|
In the first column, list out the desired features you want in an endpoint solution for your devices. Use the features provided if desired, or add your own and edit or delete the existing ones if necessary. As you look into various endpoint management solution vendors, list them in the columns in place of "Vendor 1," "Vendor 2," etc. Use the "Desired Feature" list as a checklist and change the values to "yes" or "no" in the corresponding box under the vendors' names. When complete, you will be able to look at all the features and compare vendors in a single table. |
|||
| Desired Feature | Vendor 1 | Vendor 2 | Vendor 3 |
| Organizational unit creation | Yes | No | Yes |
| Group creation | Yes | Yes | Yes |
| Ability to assign users to devices | No | Yes | Yes |
| Control of administrative permissions | Yes | Yes | Yes |
| Conditional access | No | Yes | Yes |
| Security policies enforced | Yes | No | Yes |
| Asset management | No | Yes | No |
| Single sign-on | Yes | Yes | Yes |
| Auto-deployment | No | Yes | No |
| Repair lifecycle tracking | No | Yes | No |
| Application deployment | Yes | Yes | No |
| Device tracking | Yes | Yes | Yes |
| Ability to enable encryption | Yes | No | Yes |
| Device wipe | Yes | No | Yes |
| Ability to enable/disable device tracking | No | No | Yes |
| User activity audit | No | No | No |
Modernize and Transform Your End-User Computing Strategy
This project helps support the workforce of the future by answering the following questions: What types of computing devices, provisioning models, and operating systems should be offered to end users? How will IT support devices? What are the policies and governance surrounding how devices are used? What actions are we taking and when? How do end-user devices support larger corporate priorities and strategies?
Best Unified Endpoint Management (UEM) Software 2022 | SoftwareReviews
Compare and evaluate unified endpoint management vendors using the most in-depth and unbiased buyer reports available. Download free comprehensive 40+ page reports to select the best unified endpoint management software for your organization.
Best Enterprise Mobile Management (EMM) Software 2022 | (softwarereviews.com)
Compare and evaluate enterprise mobile management vendors using the most in-depth and unbiased buyer reports available. Download free comprehensive 40+ page reports to select the best enterprise mobile management software for your organization.
Bridge, Tom. "Macs in the enterprise – what you need to know". Computerweekly.com, TechTarget. 27 May 2022. Accessed 12 Aug. 2022.
Copley-Woods, Haddayr. "5 reasons Mac is a must in the enterprise". Jamf.com, Jamf. 28 June 2022. Accessed 16 Aug. 2022.
Duke, Kent. "Chromebook sales skyrocketed in Q3 2020 with online education fueling demand." androidpolice.com, Android Police. 16 Nov 2020. Accessed 10 Aug. 2022.
Elgin, Mike. "Will Chromebooks Rule the Enterprise? (5 Reasons They May)". Computerworld.com, Computerworld. 30 Aug 2019. Accessed 10 Aug. 2022.
Evans, Jonny. "IBM says it is 3X more expensive to manage PCs than Macs". Computerworld.com, Computerworld. 19 Oct 2016. Accessed 23 Aug. 2022.
"Global Survey: Mac in the Enterprise". Jamf.com, Jamf. Accessed 16 Aug. 2022.
"How to Manage Chromebooks Like a Pro." Vizor.cloud, VIZOR. Accessed 10 Aug. 2022.
"Manage Chrome OS Devices with EMM Console". support.google.com, Google. Accessed 16 Aug. 2022.
Protalinski, Emil. "Chromebooks outsold Macs worldwide in 2020, cutting into Windows market share". Geekwire.com, Geekwire. 16 Feb 2021. Accessed 22 Aug. 2022.
Smith, Sean. "Microsoft Intune and Jamf Pro: Better together to manage and secure Macs". Jamf.com, Jamf. 20 April 2022. Accessed 16 Aug. 2022.
To guarantee success of the off-the-shelf AI implementation and deliver value, in addition to formulating a clear definition of the business case and understanding of data, organizations should also:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this practical and actionable framework that will guide you through the planning of your Off-the-Shelf AI product implementation.
Use this analysis tool to ensure the success of the implementation.
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
Info-Tech’s approach includes a framework that will guide organizations through the process of the Off-the-Shelf AI product selection. To guarantee success of the Off-the-Shelf AI implementation and deliver value, organization should start with clear definition of the business case and an understanding of data. Other steps include:
|
To guarantee the success of your Off-the-Shelf AI implementation and ensure it delivers value, you must start with a clear definition of the business case and an understanding of your data.
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
92.1%of companies say they are achieving returns on their data and AI investments |
91.7%said they were increasing investments in data and AI |
26.0%of companies have AI systems in widespread production |
However, CIO Magazine identified nine main hurdles to AI adoption based on the survey results:
|
| “Data and AI initiatives are becoming well established, investments are paying off, and companies are getting more economic value from AI.” (Source: NewVantage, 2022.)
“67% of companies are currently using machine learning, and 97% are using or planning to use it in the next year.” (Source: Deloitte, 2020) |
|||
|
Machine learning systems learn from experience and without explicit instructions. They learn patterns from data then analyze and make predictions based on past behavior and the patterns learned. Artificial intelligence is a combination of technologies and can include machine learning. AI systems perform tasks mimicking human intelligence such as learning from experience and problem solving. Most importantly, AI is making its own decisions without human intervention. The AI system can make assumptions, test these assumptions, and learn from the results.
|
“Machine learning is the study of computer algorithms that improve automatically through experience.” (Tom Mitchell, 1997) “At its simplest form, artificial intelligence is a field, which combines computer science and robust datasets, to enable problem-solving.” (IBM, “What is artificial intelligence?”) |
||||||
| ML/AI-Powered Products | Off-the-Shelf Pre-built and Pre-trained AI/ML Models |
|
|
Examples of OTS tools/products:
|
Examples of OTS models:
|
The data inputs for these models are defined, the developer has to conform to the provided schema, and the data outputs are usually fixed due to the particular task the OTS model is built to solve.
To guarantee the success of your Off-the-Shelf AI implementation and ensure it delivers value, you must start with a clear definition of the business case and an understanding of your data.
Question the value that AI adds to the tool you are evaluating. Don’t go after the tool simply because it has an AI label attached to it. AI/ML capabilities might add little value but increase implementation complexity. Define the problem you are solving and document business requirements for the tool or a model.
Know your data. Determine data requirements to:
Define the skills required for the implementation and assemble the team that will support the project from requirements to deployment and support, through its entire lifecycle. Don’t forget about production support and maintenance.
No need to reinvent the wheel and build a product you can buy, but be prepared to work around tool limitations, and make sure you understand the data and the model the tool is built on.
Using Off-the-Shelf-AI models enables an agile approach to system development. Faster POC and validation of ideas and approaches, but the model might not be customizable for your requirements.
To guarantee the success of your Off-the-Shelf AI implementation and ensure it delivers value, you must start with a clear definition of the business case and an understanding of your data.
Why do you need AI in your toolset?Business GoalsClearly defined problem statement and business requirements for the tool or a model will help you select the right solution that will deliver business value even if it does not have all the latest bells and whistles. |
Do you know the data required for implementation?DataExpected business outcome defines data requirements for implementation. Do you have the right data required to train and run the model? |
Is your organization ready for AI?People/Team/ SkillsNew skills and expertise are required through all phases of the implementation: design, build, deployment, support, and maintenance, as well as post-production support, scaling, and adoption. Data Architecture/ InfrastructureNew tool or model will impact your cloud and integration strategy. It will have to integrate with the existing infrastructure, in the cloud or on prem. |
What questions do you need to ask when choosing the solution?Product/ Tool or Model SelectionDo you know what model powers the AI tool? What data was used to train the tool and what data is required to run it? Ask the right questions. |
Are you measuring impact on your processes?Business and IT ProcessesBusiness processes need to be defined or updated to incorporate the output of the tool back into the business processes to deliver value. IT governance and support processes need to accommodate the new AI-powered tool. |
Realize and measure business value of your AI investmentValueDo you have a clear understanding of the value that AI will bring to your organization?Optimization?Increased revenue?Operational efficiency? |
| Business Goals and Value | Data | People/Team/ Skills | Infrastructure | Business and IT Processes | |
| AI/ML–powered tools |
|
|
|
|
|
| Off-the-shelf AI/ML pre-built models |
|
|
|
|
|
Why do you need AI in your toolset? What value will AI deliver? Have a clear understanding of business benefits and the value AI delivers through the tool.
Info-Tech InsightQuestion the value that AI adds to the tool you are evaluating. Don’t go after the tool simply because it has an AI label attached to it. AI/ML capabilities might add little value but increase implementation complexity. Define the problem you are solving and document business requirements for the tool or a model. | ![]() AAI solutions and technologies are helping organizations make faster decisions and predict future outcomes such as:
|
|
Use the Business Drivers tab to document:
|
|
|
|
|
Download the Off-the-Shelf AI Analysis Tool
Input
|
Output
|
Materials
|
Participants
|
Understand data required for implementationDo you have the right data to implement and run the AI-powered tool or AI/ML model? | Info-Tech InsightKnow your data. Determine data requirements to:
| ||||||||
| Availability | Quality | Preparation | Bias, Privacy, Security | Data Architecture | |||||
|
|
|
|
| |||||
2-3 hours
Use the Data tab to document the following for each data source or dataset:
|
Download the Off-the-Shelf AI Analysis Tool |
Input
| Output
| Materials
| Participants
|
|
|
Define the skills required for the implementation and assemble the team that will support the project through its entire lifecycle. Don’t forget about production, support, and maintenance.
1-2 hours
Input: Solution conceptual design, Current resource availability
Output: Roles required for the implementation of the solution, Resources gap analysis, Training and hiring plan
Materials: Whiteboard/Flip charts, Off-the-Shelf AI Analysis Tool, “People and Team” tab
Participants: Project lead, HR, Enterprise Architect
Download the Off-the-Shelf AI Analysis Tool
Download the Create an Architecture for AI blueprint
2-3 hours
Input: Solution conceptual design
Output: Infrastructure requirements, Infrastructure readiness assessment
Materials: Whiteboard/Flip charts, Off-the-Shelf AI Analysis Tool, “Infrastructure” tab
Participants: Infrastructure Architect, Solution Architect, Enterprise Architect, Data Architect, ML/AI Ops Engineer
Download the Off-the-Shelf AI Analysis Tool
| Data | Model | Implementation and Integration | Deployment | Security and Compliance |
|
|
|
|
|
Use Info-Tech’s Off-the-Shelf AI Analysis Tool, “Vendor Questionnaire” tab to track vendor responses to these questions.
Process automation, optimization, and improvement enabled by the technology and AI/ML-powered tools allow organizations to reduce manual work, streamline existing business processes, improve customer satisfaction, and get critical insights to assist decision making.
To take full advantage of the benefits and new capabilities enabled by the technology, make sure that business and IT processes reflect these changes:
2-3 hours
Input: Solution design, Existing business and IT processes
Output: Documented updates to the existing processes, Documented new business and IT processes
Materials: Whiteboard/Flip charts, Off-the-Shelf AI Analysis Tool, “Business and IT Processes” tab
Participants: Project lead, Business stakeholders, Business analyst
Download the Off-the-Shelf AI Analysis Tool
PROS:
Info-Tech Insight:No need to reinvent the wheel and build the product you can buy, but be prepared to work around tool limitations, and make sure you understand the data and the model the tool is built on. | CONS:
|
PROS:
|
CONS:
|
Using Off-the-Shelf AI models enables an agile approach to system development – faster POC and validation of ideas and approaches, but the model might not be customizable for your requirements.
Metrics and KPIs for this project will depend on the business goals and objectives that you will identify in Step 1 of the tool selection process.
Metrics might include:
Adryan, Boris. “Is it all machine learning?” Badryan, Oct. 20, 2015. Accessed Feb. 2022.
“AI-Powered Data Management Platform.” Informatica, N.d. Accessed Feb 2022.
Amazon Rekognition. “Automate your image and video analysis with machine learning.” AWS. N.d. Accessed Feb 2022.
“Artificial Intelligence (AI).” IBM Cloud Education, 3 June 2020. Accessed Feb 2022.
“Artificial intelligence (AI) vs machine learning (ML).” Microsoft Azure Documentation. Accessed Feb. 2022.
“Avante Garde in the Realm of AI” SearchUnify Cognitive Platform. Accessed Feb 2022.
“Azure Cognitive Services.” Microsoft. N.d. Accessed Feb 2022.
“Becoming an AI-fueled organization. State of AI in the enterprise, 4th edition,” Deloitte, 2020. Accessed Feb. 2022.
“Coveo Predictive Search.” Coveo, N.d. Accessed Feb 2022.
”Data and AI Leadership. Executive Survey 2022. Executive Summary of Findings.” NewVantage Partners. Accessed Feb 2022.
“Einstein Discovery in Tableau.” Tableau, N.d. Accessed Feb 2022.
Korolov, Maria. “9 biggest hurdles to AI adoption.” CIO, Feb 26, 2019. Accessed Feb 2022.
Meel, Vidushi. “What Is Deep Learning? An Easy to Understand Guide.” visio.ai. Accessed Feb. 2022.
Mitchell, Tom. “Machine Learning,” McGraw Hill, 1997.
Stewart, Matthew. “The Actual Difference Between Statistics and Machine Learning.” Towards Data Science, Mar 24, 2019. Accessed Feb 2022.
“Sentiment analysis with Cognitive Services.” Microsoft Azure Documentation. Accessed February 2022.
“Three Principles for Designing ML-Powered Products.” Spotify Blog. Oct 2019, Accessed Feb 2022.
“Video Intelligence API.” Google Cloud Platform. N.d. Accessed Feb 2022
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Building and maintaining your Active Directory does not have to be difficult. Standardized organization and monitoring with the proper metrics help you keep your data accurate and up to date.
Build a comprehensive Active Directory workflow library for service desk technicians to follow.
You may be experiencing one or more of the following:
To have a successful information security strategy, take these three factors into account:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read up on why you should build your customized information security strategy. Review our methodology and understand the four ways we can support you.
It all starts with risk appetite, yes, but security is something you want to get right. Determine your organizations' security pressures and business goals, and then determine your security program's goals.
Our best-of-breed security framework makes you perform a gap analysis between where you are and where you want to be (your target state). Once you know that, you can define your goals and duties.
With your design at this level, it is time to plan your roadmap.
Learn to use our methodology to manage security initiatives as you go. Identify the resources you need to execute the evolving strategy successfully.
Don’t just wonder what others are doing – use this report to see how companies are faring in their current state, where they want to target in their future state, and the ways they’re planning to raise their security posture.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read our concise Executive Brief to find out what this report contains.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Analyze the four key benefits of blockchain as they relate to the transportation and logistics industry to understand how the technology can resolve issues being experienced by industry incumbents.
Brainstorm a set of blockchain use cases for your organization and apply design thinking tactics to evaluate and select the optimal one to pitch to your executives for prototyping.
Effective service metrics will provide the following service gains:
Which will translate into the following relationship gains:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify the appropriate service metrics based on stakeholder needs.
Present the right metrics in the most interesting and stakeholder-centric way possible.
Run a pilot with a smaller sample of defined service metrics, then continuously validate your approach and make refinements to the processes.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define stakeholder needs for IT based on their success criteria and identify IT services that are tied to the delivery of business outcomes.
Derive meaningful service metrics based on identified IT services and validate that metrics can be collected and measured.
Design meaningful service metrics from stakeholder needs.
Validate that metrics can be collected and measured.
1.1 Determine stakeholder needs, goals, and pain points.
1.2 Determine the success criteria and related IT services.
1.3 Derive the service metrics.
1.4 Validate the data collection process.
1.5 Validate metrics with stakeholders.
Understand stakeholder priorities
Adopt a business-centric perspective to align IT and business views
Derive meaningful business metrics that are relevant to the stakeholders
Determine if and how the identified metrics can be collected and measured
Establish a feedback mechanism to have business stakeholders validate the meaningfulness of the metrics
Determine the most appropriate presentation format based on stakeholder needs.
Ensure the metrics are presented in the most interesting and stakeholder-centric way possible to guarantee that they are read and used.
2.1 Understand the different presentation options.
2.2 Assess stakeholder needs for information.
2.3 Select and design the metric report.
Learn about infographic, scorecard, formal report, and dashboard presentation options
Determine how stakeholders would like to view information and how the metrics can be presented to aid decision making
Select the most appropriate presentation format and create a rough draft of how the report should look
Run a pilot with a smaller sample of defined service metrics to validate your approach.
Make refinements to the implementation and maintenance processes prior to activating all service metrics.
High user acceptance and usability of the metrics.
Processes of identifying and presenting metrics are continuously validated and improved.
3.1 Select the pilot metrics.
3.2 Gather data and set initial targets.
3.3 Generate the reports and validate with stakeholders.
3.4 Implement the service metrics program.
3.5 Track and maintain the metrics program.
Select the metrics that should be first implemented based on urgency and impact
Complete the service intake form for a specific initiative
Create a process to gather data, measure baselines, and set initial targets
Establish a process to receive feedback from the business stakeholders once the report is generated
Identify the approach to implement the metrics program across the organization
Set up mechanism to ensure the success of the metrics program by assessing process adherence and process validity
“Service metrics are one of the key tools at IT’s disposal in articulating and ensuring its value to the business, yet metrics are rarely designed and used for that purpose.
Creating IT service metrics directly from business and stakeholder outcomes and goals, written from the business perspective and using business language, is critical to ensuring that the services that IT provides are meeting business needs.
The ability to measure, manage, and improve IT service performance in relation to critical business success factors, with properly designed metrics, embeds IT in the value chain of the business and ensures IT’s focus on where and how it enables business outcomes.”
Valence Howden,
Senior Manager, CIO Advisory
Info-Tech Research Group
This Research Is Designed For:
|
This Research Will Help You:
|
This Research Will Also Assist:
|
This Research Will Help Them
|
What are service metrics?Service metrics measure IT services in a way that relates to a business outcome. IT needs to measure performance from the business perspective using business language. |
Why do we need service metrics?
To ensure the business cares about the metrics that IT produces, start with business needs to make sure you’re measuring the right things. This will give IT the opportunity talk to the right stakeholders and develop metrics that will meet their business needs. Service metrics are designed with the business perspective in mind, so they are fully aligned with business objectives. |
| Perspectives Matter
Different stakeholders will require different types of metrics. A CEO may require metrics that provide a snapshot of the critical success of the company while a business manager is more concerned about the performance metrics of their department. |
What are the benefits of implementing service metrics?
Service metrics help IT communicate with the business in business terms and enables IT to articulate how and where they provide business value. Business stakeholders can also easily understand how IT services contribute to their success. |
| A significantly higher proportion of CIOs than CEOs feel that there is significant improvement necessary for business value metrics and stakeholder satisfaction reporting. | N=364
|
|
When considering only CEOs who said that stakeholder satisfaction reporting needed significant improvement, the average satisfaction score goes down to 61.6%, which is a drop in satisfaction of 12%.
|
| When the CIOs believe business value metrics weren’t required, 50% of their CEOs said that significant improvements were necessary.
|
|
A business process consists of multiple business activities. In many cases, these business activities require one or more supporting IT services.
|
For each business process, business stakeholders and their goals and objectives should be identified.
For each business activity that supports the completion of a business process, define the success criteria that must be met in order to produce the desirable outcome. Identify the IT services that are used by business stakeholders for each business activity. Measure the performance of these services from a business perspective to arrive at the appropriate service metrics. |
Stakeholders have different goals and objectives; therefore, it is critical to identify what type of metrics should be presented to each stakeholder.
Business Metrics
Determine Business SuccessBusiness metrics are derived from a pure business perspective. These are the metrics that the business stakeholders will measure themselves on, and business success is determined using these metrics. |
|
Service Metrics
Manage Service Value to the BusinessService metrics are used to measure IT service performance against business outcomes. These metrics, while relating to IT services, are presented in business terms and are tied to business goals. |
|
IT Metrics
Enable Operational ExcellenceIT metrics are internal to the IT organization and used to manage IT service delivery. These metrics are technical, IT-specific, and drive action for IT. They are not presented to the business, and are not written in business language. |
At the very least, IT needs to have a service-oriented view and understand the specific needs and objectives associated with each stakeholder.
Once IT can present service metrics that the business cares about, it can continue on the service provider journey by managing the performance of services based on business needs, determine and influence service demand, and assess service value to maximize benefits to the business.
|
Business Relationship ManagementBRM works to understand the goals and objectives of the business and inputs them into the design of the service metrics. Service MetricsBRM leverages service metrics to help IT organizations manage the relationship with the business. BRM articulates and manages expectations and ensures IT services are meeting business requirements. |
![]() | Service Level ManagementSLM works with the business to understand service requirements, which are key inputs in designing the service metrics. Service MetricsSLM leverages service metrics in overseeing the day-to-day delivery of IT services. It ensures they are provided to meet expected service level targets and objectives. |
Effective service metrics will provide the following service gains:
Conventional Wisdom |
Info-Tech Perspective |
| Metrics are measured from an application or technology perspective | Metrics need to be derived from a service and business outcome perspective. |
| The business doesn’t care about metrics | Metrics are not usually designed to speak in business terms about business outcomes. Linking metrics to business objectives creates metrics that the business cares about. |
| It is difficult to have a metrics discussion with the business | It is not a metrics/number discussion, it is a discussion on goals and outcomes. |
| Metrics are only presented for the implementation of the service, not the ongoing outcome of the service | IT needs to focus on service outcome and not project outcome. |
| Quality can’t be measured | Quality must be measured in order to properly manage services. |
1 |
2 |
3 |
| Design Your Metrics | Develop and Validate Reporting | Implement, Track, and Maintain |
|
|
|
| Start the development and creation of your service metrics by keeping business perspectives in mind, so they are fully aligned with business objectives. | Identify the most appropriate presentation format based on stakeholder preference and need for metrics. | Track goals and success metrics for your service metrics programs. It allows you to set long-term goals and track your results over time. |
The CIO must actively demonstrate support for the service metrics program and lead the initial discussions to determine what matters to business leaders.
It is critical to determine if the designed service metrics are fulfilling their intended purpose. The process of maintaining the service metrics program and the outcomes of implementing service metrics need to be monitored and tracked.
| Validating Service Metrics Design | |
Target Outcome |
Related Metrics |
| The business is enabled to identify and improve service performance to their end customer | # of improvement initiatives created based on service metrics $ cost savings/revenue generated due to actions derived from service metrics |
|
Procedure to validate the usefulness of IT metrics |
# / % of service metrics added/removed per year |
| Alignment between IT and business objectives and processes | Business’ satisfaction with IT |
It is critical to determine if the designed service metrics are fulfilling their intended purpose. The process of maintaining the service metrics program and the outcomes of implementing service metrics need to be monitored and tracked.
| Validating Service Metrics Process | |
Target Outcome | Related Metrics |
| Properly defined service metrics aligned with business goals/outcomes Easy understood measurement methodologies | % of services with (or without) defined service metrics % of service metrics tied to business goals |
| Consistent approach to review and adjust metrics | # of service metrics adjusted based on service reviews % of service metrics reviewed on schedule |
In a study done by the Aberdeen Group, organizations engaged in the use of metrics benchmarking and measurement have:
|
A service metric is defined for: “Response time for Business Application A”
The expected response time has not been achieved and this is visible in the service metrics. The reduced performance has been identified as having an impact of $250,000 per month in lost revenue potential. The service metric drove an action to perform a root-cause analysis, which identified a network switch issue and drove a resolution action to fix the technology and architect redundancy to ensure continuity. The fix eliminated the performance impact, allowing for recovery of the $250K per month in revenue, improved end-user confidence in the organization, and increased use of the application, creating additional revenue. |
| CASE STUDY |
Industry: Manufacturing | Source: CIO interview and case material |
| Situation
The manufacturing business operates within numerous countries and requires a lot of coordination of functions and governance oversight. The company has monthly meetings, both regional and national, and key management and executives travel to attend and participate in the meetings. ComplicationWhile the meetings provide a lot of organizational value, the business has grown significantly and the cost of business travel has started to become prohibitive. ActionIt was decided that only a few core meetings would require onsite face-to-face meetings, and for all other meetings, the company would look at alternative means. The face-to-face aspect of the meetings was still considered critical so they focused on options to retain that aspect. The IT organization identified that they could provide a video conferencing service to meet the business need. The initiative was approved and rolled out in the organization. |
Result:IT service metrics needed to be designed to confirm that the expected value outcome of the implementation of video conferencing was achieved. Under the direction of the CIO, the business goals and needs driving use of the service (i.e. reduction in travel costs, efficiency, no loss of positive outcome) were used to identify success criteria and key questions to confirm success. With this information, the service manager was able to implement relevant service metrics in business language and confirmed an 80% adoption rate and a 95% success rate in term meetings running as expected and achieving core outcomes. |
Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.
This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.
This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| 1. Design the Metrics | 2. Design Reports and Dashboards | 3. Implement, Track, and Maintain | |
Best-Practice Toolkit |
|
|
|
Guided Implementations |
|
|
|
Onsite Workshop |
Module 1: Derive Service Metrics From Business Goals |
Module 2: Select and Design Reports and Dashboards |
Module 3: Implement, Track, and Maintain Your Metrics to Ensure Success |
Phase 1 Outcome:
|
Phase 2 Outcome:
|
Phase 3 Outcome:
|
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
Design the Metrics |
Determine Presentation Format and Implement Metrics |
Gather Service Level Requirements |
Monitor and Improve Service Levels |
|
Activities |
|
|
|
|
Deliverables |
|
|
|
|
| PHASE 1 | PHASE 2 | PHASE 3 | ||
1.1Derive the Service Metrics |
1.2Validate the Metrics |
2.1Determine Reporting Format |
3.1Select Pilot Metrics |
3.2Activate and Maintain Metrics |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 1.1: Design Metrics | Step 1.2: Validate the Metrics |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
|
Step 1 Derive your service metrics Metrics Worksheet |
|
Step 2 Validate your metrics Metrics Worksheet |
|
Step 3 Confirm with stakeholders Metrics Tracking Sheet |
Defined IT Service Metrics |
| Service metrics must be designed with the business perspective in mind so they are fully aligned with business objectives.
Thus, IT must start by identifying specific stakeholder needs. The more IT understands about the business, the more relevant the metrics will be to the business stakeholders. |
|
1.1 Metrics Development Workbook
This workbook guides the development and creation of service metrics that are directly tied to stakeholder needs.
This process will ensure that your service metrics are designed with the business perspective in mind so they are fully aligned with business objectives.
Download the Metrics Development Workbook. |
|
1.1 0.5 Hour
Who are your stakeholders?
|
Video Conferencing Case Study For this phase, we will demonstrate how to derive the service metrics by going through the steps in the methodology. At a manufacturing company, the CIO’s main stakeholder is the CEO, whose chief concern is to improve the financial position of the company. |
1.2 0.5 Hour
What are their goals and pain points?
|
VC Case Study One of the top initiatives identified by the company to improve financial performance was to reduce expense. Because the company has several key locations in different states, company executives used to travel extensively to carry out meetings at each location. Therefore, travel expenses represent a significant proportion of operational expenses and reducing travel costs is a key goal for the company’s executives. |
1.3 0.5 HourWhat do the stakeholders need to know?
| VC Case Study The CEO needs to have assurance that without executives traveling to each location, remote meetings can be as effective as in-person meetings. These meetings must provide the same outcome and allow executives to collaborate and make similar strategic decisions without the onsite, physical presence. Therefore, the success criteria are:
|
1.4 1 HourWhat does IT need to measure?
| VC Case Study The IT department decides to implement the video conferencing service to reduce the number of onsite meetings. This technology would allow executives to meet remotely with both audio and video and is the best option to replicate a physical meeting. The service is initially available to senior executives and will be rolled out to all internal users once the initial implementation is deemed successful. To determine the success of the service, the following needs to be measured:
|
1.5 0.5 HourDerive your service metrics
| VC Case Study In the previous step, IT identified that it must measure the outcomes of VC meetings, quality of the VC meetings, and the reduction in travel expenses. From these, the appropriate service metrics can be derived to answer the needs of the CEO. IT needs to measure:
IT also identified the following business metrics:
|
| Can you measure it? | The first question IT must answer is whether the metric is measurable. IT must identify the data source, validate its ability to collect the data, and specify the data requirement. Not all metrics can be measured! |
| How will you measure it? | If the metric is measurable, the next step is to create a way to measure the actual data. In most cases, simple formulas that can be easily understood are the best approach. |
| Define your actions | Metrics must be used to drive or reinforce desirable outcomes and behaviors. Thus, IT must predetermine the necessary actions associated with the different metric levels, thresholds, or trends. |
1.6 0.5 HourINSTRUCTIONS
| VC Case Study Using the metric derived from the video conferencing service example, IT wants to measure the % of VC meetings successfully delivered. What are the data sources?
|
1.6 0.5 HourINSTRUCTIONS
| VC Case Study Data requirement for percent of successful VC meetings:
|
1.7 0.5 HourINSTRUCTIONS
| VC Case Study Metric: Percent of VC meetings delivered successfully IT is able to determine the total number of VC meetings that took place and the number of VC service requests to the help desk. That makes it possible to use the following formula to determine the success percentage of the VC service: ((total # VC) – (# of VC with identified incidents)) / (total # VC) * 100 |
1.7 1.5 HourINSTRUCTIONSCentered on the defined metrics and their calculations, IT can decide on the actions that should be driven out of each metric based on one of the following scenarios:
| VC Case Study If the success rate of the VC meetings is below 90%, IT needs to focus on determining if there is a common cause and identify if this is a consistent downward trend. A root-cause analysis is performed that identifies that network issues are causing difficulties, impacting the connection quality and usability of the VC service. |
1.8 1 Hour
INPUT: Selected service metrics, Discussion with the business
OUTPUT: Validated metrics with the business
Materials: Metrics with calculation methodology
Participants: IT and business stakeholders, Service owners
| Service Metric | Corresponding Business Goal |
Measurement Method |
Defined Actions |
| Who are IT’s stakeholders? | The financial institution provides various banking solutions to its customers. Retail banking is a core service offered by the bank and the VP of retail banking is a major stakeholder of IT. |
| What are their goals and pain points? | The VP of retail banking’s highest priorities are to increase revenue, increase market share, and maintain the bank’s brand and reputation amongst its customers. |
| What do they need to know? | In order to measure success, the VP of retail banking needs to determine performance in attracting new clients, retaining clients, expanding into new territory, and whether they have increased the number of services provided to existing clients. |
| What does IT need to measure? | The recent implementation of an online banking service is a key initiative that will keep the bank competitive and help retail banking meet its goals. The key indicators of this service are: the total number of clients, the number of products per client, percent of clients using online banking, number of clients by segment, service, territory. |
| Derive the service metrics | Based on the key indicators, IT can derive the following service metrics: 1. Number of product applications originated from online banking 2. Customer satisfaction/complaints As part of the process, IT also identified some business metrics, such as the number of online banking users per month or the number of times a client accesses online banking per month. |
| CASE STUDY |
Industry: Manufacturing | Source: CIO |
| Challenge | Solution | Results |
| The IT organization needed to generate metrics to show the business whether the video conferencing service was being adopted and if it was providing the expected outcome and value.
Standard IT metrics were technical and did not provide a business context that allowed for easy understanding of performance and decision making. |
The IT organization, working through the CIO and service managers, sat down with the key business stakeholders of the video conferencing service.
They discussed the goals for the meeting and defined the success criteria for those goals in the context of video conference meeting outcomes. The success criteria that were discussed were then translated into a set of questions (key performance indicators) that if answered, would show that the success criteria were achieved. |
The service manager identified what could be measured to answer the defined questions and eliminated any metrics that were either business metrics or non-IT related.
The remaining metrics were identified as the possible service metrics, and the ability to gather the information and produce the metric was confirmed. Service metrics were defined for:
|

|
|
1.1 |
|
Determine stakeholder needs, goals, and pain points
The onsite analyst will help you select key stakeholders and analyze their business objectives and current pain points. |
1.2 |
|
Determine the success criteria and related IT services
The analyst will facilitate a discussion to uncover the information that these stakeholders care about. The group will also identify the IT services that are supporting these objectives. |

1.5 |
|
Derive the service metrics
Based on the key performance indicators obtained in the previous page, derive meaningful business metrics that are relevant to the stakeholders. |
1.6 |
|
Validate the data collection process
The analyst will help the workshop group determine whether the identified metrics can be collected and measured. If so, a calculation methodology is created. |
1.7 |
|
Validate metrics with stakeholders
Establish a feedback mechanism to have business stakeholders validate the meaningfulness of the metrics. |
| PHASE 1 | PHASE 2 | PHASE 3 | ||
1.1Derive the Service Metrics | 1.2Validate the Metrics | 2.1Determine Reporting Format | 3.1Select Pilot Metrics | 3.2Activate and Maintain Metrics |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 2.1: Select Presentation Format | Step 2.2: Review Design |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
|
Step 1 Understand the pros and cons of different reporting styles |
|
Step 2 Determine your reporting and presentation style Presentation Format Selection |
|
Step 3 Design your metrics reports |
Validated Service Reports |
The reports must also display information in a way that generates actions. If your stakeholders cannot make decisions, kick off activities, or ask questions based on your reports, then they have no value.
| Dashboard (PwC. “Mega-Trends and Implications.”)
|
Infographic (PwC. “Healthcare’s new entrants.”)
|
| Report (PwC Blogs. “Northern Lights.”)
|
Scorecard (PwC. “Annual Report 2015.”)
|
A dashboard is a reporting method that provides a dynamic at-a-glance view of key metrics from the perspective of key stakeholders. It provides a quick graphical way to process important performance information in real time.
| Features
Typically web-based Dynamic data that is updated in real time |
Advantage
Aggregates a lot of information into a single view Presents metrics in a simplistic style that is well understood Provides a quick point-in-time view of performance Easy to consume visual presentation style |
Disadvantage
Complicated to set up well. Promotes a short-term outlook – focus on now, no historical performance and no future trends. Doesn’t provide the whole picture and story. Existing dashboard tools are often not customized enough to provide real value to each stakeholder. |
![]() (Source: PwC. “Mega-Trends and Implications.”) |
Metrics presented through online dashboards are calculated in real time, which allows for a dynamic, current view into the performance of IT services at any time. |
An infographic is a graphical representation of metrics or data, which is used to show information quickly and clearly. It’s based on the understanding that people retain and process visual information more readily than written details.
| Features
Turns dry into attractive –transforms data into eye-catching visual memory that is easier to retain Can be used as the intro to a formal report There are endless types of infographics |
Advantage
Easily consumable Easy to retain Eye catching Easily shared Spurs conversation Customizable |
Disadvantage
Require design expertise and resources Can be time consuming to generate Could be easily misinterpreted Message can be lost with poor design |
![]() (Source: PwC. “Healthcare’s new entrants…”) |
There is no limit when it comes to designing an infographic. The image used here visually articulates the effects of new entrants pulling away the market. |
A formal report is a more structured and official reporting style that contains detailed research, data, and information required to enable specific business decisions, and to help evaluate performance over a defined period of time.
| Definition
Metrics can be presented as a component of a periodic, formal report A physical document that presents detailed information to a particular audience |
Advantage
More detailed, more structured and broader reporting period Formal, shows IT has put in the effort Effectively presents a broader and more complete story Targets different stakeholders at the same time |
Disadvantage
Requires significant effort and resources Higher risk if the report does not meet the expectation of the business stakeholder Done at a specific time and only valuable for that specific time period Harder to change format |
![]() (Source: PwC Blogs. “Northern Lights: Where are we now?”) |
An effective report incorporates visuals to demonstrate key improvements.
Formal reports can still contain visuals, but they are accompanied with detailed explanations. |
A scorecard is a graphic view of the progress and performance over time of key performance metrics. These are in relation to specified goals based on identified critical stakeholder objectives.
| Features Incorporates multiple metrics effectively. Scores services against the most important organizational goals and objectives. Scorecards may tie back into strategy and different perspectives of success. | Advantage Quick view of performance against objectives Measure against a set of consistent objectives Easily consumable Easy to retain | Disadvantage Requires a lot of forethought |
![]() (PwC. “Annual Report 2015.”) |
Scorecards provide a summary of performance that is directly linked to the organizational KPIs. |
2.1 Metrics Presentation Format Selection Guide
In this section, you will determine the optimal reporting style for the service metrics.
This guide contains four questions, which will help IT organizations identify the most appropriate presentation format based on stakeholder preference and needs for metrics.
|
|
| Download the Metrics Presentation Format Selection Guide. | |
2.1 2 Hours
INPUT: Identified stakeholder and his/her role
OUTPUT: Proper presentation format based on need for information
Materials: Metrics Presentation Format Selection Guide
Participants: BRM, SLM, Program Manager
After deciding on the report type to be used to present the metric, the organization needs to consider how stakeholders will consume the metric.
There are three options based on stakeholder needs and available presentation options within IT.
2.2 30 Minutes
Be sure to consider access rights for more senior reports. Site and user access permissions may need to be defined based on the level of reporting.
| CASE STUDY |
Industry: Manufacturing | Source: CIO Interview |
| The Situation
The business had a clear need to understand if the implementation of video conferencing would allow previously onsite meetings to achieve the same level of effectiveness. Reporting ContextProvided reports had always been generated from an IT perspective and the business rarely used the information to make decisions. The metrics needed to help the business understand if the meetings were remaining effective and be tied into the financial reporting against travel expenses, but there would be limited visibility during the executive meetings. |
ApproachThe service manager reviewed the information that he had gathered to confirm how often they needed information related to the service. He also met with the CIO to get some insight into the reports that were already being provided to the business, including the ones that were most effective. ConsiderationsThe conversations identified that there was no need for a dynamic real-time view of the performance of the service, since tracking of cost savings and utility would be viewed monthly and quarterly. They also identified that the item would be discussed within a very small window of time during the management meetings. The SolutionIt was determined that the best style of reporting for the metric was an existing scorecard that was produced monthly, using some infographics to ensure that the information is clear at a glance to enable quick decision making. |

|
|
2.1 |
|
Understand the different presentation options
The onsite analyst will introduce the group to the communication vehicles of infographic, scorecard, formal report, and dashboard. |
2.1 |
|
Assess stakeholder needs for information
For selected stakeholders, the analyst will facilitate a discussion on how stakeholders would like to view information and how the metrics can be presented to aid decision making. |

2.2 |
|
Select and design the metric report
Based on the discussion, the working group will select the most appropriate presentation format and create a rough draft of how the report should look. |
| PHASE 1 | PHASE 2 | PHASE 3 | ||
1.1Derive the Service Metrics | 1.2Validate the Metrics | 2.1Determine Reporting Format | 3.1Select Pilot Metrics | 3.2Activate and Maintain Metrics |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Step 3.1: Select and Launch Pilot Metrics | Step 3.2: Track and Maintain the Metrics |
Start with an analyst kick-off call:
|
Review findings with analyst:
|
Then complete these activities…
|
Then complete these activities…
|
With these tools & templates:
|
With these tools & templates:
|
|
Step 1 Run your pilot Metrics Tracking Tool |
|
Step 2 Validate success Metrics Tracking Tool |
|
Step 3 Implement your metrics program in batches Metrics Tracking Tool |
Active Service Metrics Program |
This allows you to validate your approach and make refinements to the implementation and maintenance processes where necessary, prior to activating all service metrics.
3.1
The Metrics Tracking Tool will enable you to track goals and success metrics for your service metrics programs. It allows you to set long-term goals and track your results over time.
There are three sections in this tool:
|
3.1 30 MinutesINPUT: Identified services, Business feedback
OUTPUT: Services with most urgent need or impact
Materials: Service catalog or list of identified services
Participants: BRM, SLM, Business representatives
To start the implementation of your service metrics program and drive wider adoption, you need to run a pilot using a smaller subset of metrics.
To determine the sample for the pilot, consider metrics that:
Metrics that meet two or more criteria are ideal for the pilot
3.2 1 HourINPUT: Identified metrics
OUTPUT: A data collection mythology, Metrics tracking
Materials: Metrics
Participants: SLM, BRM, Service owner
You will need to start collection and validation of your identified data in order to calculate the results for your pilot metrics.
3.3 1 HourINPUT: Historical data/baseline data
OUTPUT: Realistic initial target for improvement
Materials: Metrics Tracking Tool
Participants: BRM, SLM, Service owner
Identify an initial service objective based on one or more of the following options:
The target may not always be a number - it could be a trend. The initial target will be changed after review with stakeholders
3.4 1 HourINPUT: SLM and BRM SOPs or responsibility documentations
OUTPUT: Integrate service metrics into the SLM/BRM role
Materials: SLM / BRM reports
Participants: SLM, BRM, CIO, Program manager, Service manager
The service metrics program is usually initiated, used, and maintained by the SLM and BRM functions.
Ensure that the metrics pilot is integrated with those functions by:
3.5 1 HourINPUT: Identified metrics, Selected presentation format
OUTPUT: Metrics reports that are ready for distribution
Materials: Metrics Presentation Format Selection Guide
Participants: BRM, SLM, CIO, Business representatives
Once you have completed the calculation for the pilot metrics:
3.6 1 HourINPUT: Feedback from pilot, Services in batch
OUTPUT: Systematic implementation of metrics
Materials: Metrics Tracking Tool
Participants: BRM, SLM, Program manager
Upon completion of the pilot, move to start the broader implementation of metrics across the organization:
3.7 1.5 HourINPUT: Feedback from business stakeholders
OUTPUT: Modification to individual metrics or to the process
Materials: Metrics Tracking Tool, Metrics Development Workbook
Participants: CIO, BRM, SLM, Program manager, Service owner
Once service metrics and reporting become active, it is necessary to determine the review time frame for your metrics to ensure they remain useful.
3.7
Based on the outcome of the review meeting, decide what needs to be done for each metric, using the following options:
| Add
A new metric is required or an existing metric needs large-scale changes (example: calculation method or scope). |
Change
A minor change is required to the presentation format or data. Note: a major change in a metric would be performed through the Add option. |
| Remove
The metric is no longer required, and it needs to be removed from reporting and data gathering. A final report date for that metric should be determined. |
Maintain
The metric is still useful and no changes are required to the metric, its measurement, or how it’s reported. |
| VC CASE STUDY | Industry: Manufacturing | Source: CIO Interview |
Reviewing the value of active metricsWhen the video conferencing service was initially implemented, it was performed as a pilot with a group of executives, and then expanded for use throughout the company. It was understood that prior to seeing the full benefit in cost reduction and increased efficiency and effectiveness, the rate of use and adoption had to be understood. The primary service metrics created for the service were based on tracking the number of requests for video conference meetings that were received by the IT organization. This identified the growth in use and could be used in conjunction with financial metrics related to travel to help identify the impact of the service through its growth phase. Once the service was adopted, this metric continued to be tracked but no longer showed growth or expanded adoption. The service manager was no longer sure this needed to be tracked. |
Key ActivityThe metrics around requests for video conference meetings were reviewed at the annual metrics review meeting with the business. The service manager asked if the need for the metric, the goal of tracking adoption, was still important for the business. The discussion identified that the adoption rate was over 80%, higher than anticipated, and that there was no value in continuing to track this metric. Based on the discussion, the adoption metrics were discontinued and removed from data gathering and reporting, while a success rate metric was added (how many meetings ran successfully and without issue) to ensure the ongoing value of the video conferencing service. |

![]() |
|
3.1 |
|
Select the pilot metrics
The onsite analyst will help the workshop group select the metrics that should be first implemented based on the urgency and impact of these metrics. |
3.2 |
|
Gather data and set initial targets
The analyst will help the group create a process to gather data, measure baselines, and set initial targets. |

3.5 |
|
Generate the reports and validate with stakeholders
The Info-Tech analyst will help the group establish a process to receive feedback from the business stakeholders once the report is generated. |
3.6 |
|
Implement the service metrics program
The analyst will facilitate a discussion on how to implement the metrics program across the organization. |
3.7 |
|
Track and maintain the metrics program
Set up a mechanism to ensure the success of the metrics program by assessing process adherence and process validity. |
Service metrics are critical to ensuring alignment of IT service performance and business service value achievement.
Service metrics reinforce positive business and end-user relationships by providing user-centric information that drives responsiveness and consistent service improvement.
Poorly designed metrics drive unintended and unproductive behaviors that have negative impacts on IT and produce negative service outcomes.
| Name | Organization |
| Joe Evers | Joe Evers Consulting |
| Glen Notman | Associate Partner, Citihub |
| David Parker | Client Program Manager, eHealth Ontario |
| Marianne Doran Collins | CIO, The CIO-Suite, LLC |
| Chris Kalbfleisch | Manager, Service Management, eHealth Ontario |
| Joshua Klingenberg | BHP Billiton Canada Inc. |
|
Design & Build a User-Facing Service Catalog The user-facing service catalog is the go-to place for IT service-related information. |
|
Unleash the True Value of IT by Transforming Into a Service Provider Earn your seat at the table and influence business strategy by becoming an IT service provider. |
Pollock, Bill. “Service Benchmarking and Measurement: Using Metrics to Drive Customer Satisfaction and Profits.” Aberdeen Group. June 2009. http://722consulting.com/ServiceBenchmarkingandMeasurement.pdf
PwC. “Mega-Trends and Implications.” RMI Discussion. LinkedIn SlideShare. September 2015. http://www.slideshare.net/AnandRaoPwC/mega-trends-and-implications-to-retirement
PwC. “Healthcare’s new entrants: Who will be the industry’s Amazon.com?” Health Research Institute. April 2014. https://www.pwc.com/us/en/health-industries/healthcare-new-entrants/assets/pwc-hri-new-entrant-chart-pack-v3.pdf
PwC. “Northern Lights: Where are we now?” PwC Blogs. 2012. http://pwc.blogs.com/files/12.09.06---northern-lights-2--summary.pdf
PwC. “PwC’s key performance indicators
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this blueprint to standardize your service desk by assessing your current capability and laying the foundations for your service desk, design an effective incident management workflow, design a request fulfillment process, and apply the discussions and activities to make an actionable plan for improving your service desk.
This tool is designed to assess your service desk process maturity, identify gaps, guide improvement efforts, and measure your progress.
Use this template to organize information about the service desk challenges that the organization is facing, make the case to build a right-sized service desk to address those challenges, and outline the recommended process changes.
Use the RACI template to determine roles for your service desk initiatives and to build ownership around them. Use the template and replace it with your organization's information.
The template will help you identify service desk roles and responsibilities, build ticket management processes, put in place sustainable knowledgebase practices, document ticket prioritization scheme and SLO, and document ticket workflows.
Use this tool to help review the quality of tickets handled by agents and discuss each technician's technical capabilities to handle tickets.
The Workflow Library provides examples of typical workflows that make up the bulk of the incident management and request fulfillment processes at the service desk.
The Ticket Categorization Schemes provide examples of ticket categories to organize the data in the service desk tool and produce reports that help managers manage the service desk and meet business requirements.
The Knowledge Manager's role is to collect, synthesize, organize, and manage corporate information in support of business units across the enterprise.
An accurate and comprehensive record of the incident management process, including a description of the incident, any workarounds identified, the root cause (if available), and the profile of the incident's source, will improve incident resolution time.
Use this template to develop a communication plan that outlines what stakeholders can expect as the process improvements recommended in the Standardize the Service Desk blueprint are implemented.
The Service Desk Roadmap helps track outstanding implementation activities from your service desk standardization project. Use the roadmap tool to define service desk project tasks, their owners, priorities, and timeline.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Discover your challenges and understand what roles, metrics, and ticket handling procedures are needed to tackle the challenges.
Set a clear understanding about the importance of service desk to your organization and service desk best practices.
1.1 Assess current state of the service desk.
1.2 Review service desk and shift-left strategy.
1.3 Identify service desk metrics and reports.
1.4 Identify ticket handling procedures
Current state assessment
Shift-left strategy and implications
Service desk metrics and reports
Ticket handling procedures
Build workflows for incident and critical incident tickets.
Distinguish incidents from service requests.
Ticket categorization facilitates ticket. routing and reporting.
Develop an SLA for your service desk team for a consistent service delivery.
2.1 Build incident and critical incident management workflows.
2.2 Design ticket categorization scheme and proper ticket handling guidelines.
2.3 Design incident escalation and prioritization guidelines.
Incident and critical incident management workflows
Ticket categorization scheme
Ticket escalation and prioritization guidelines
Build service request workflows and prepare self-service portal.
Standardize request fulfilment processes.
Prepare for better knowledge management and leverage self-service portal to facilitate shift-left strategy.
3.1 Build service request workflows.
3.2 Build a targeted knowledgebase.
3.3 Prepare for a self-serve portal project.
Distinguishing criteria for requests and projects
Service request workflows and SLAs
Knowledgebase article template, processes, and workflows
Now that you have laid the foundation of your service desk, put all the initiatives into an action plan.
Discuss priorities, set timeline, and identify effort for your service desk.
Identify the benefits and impacts of communicating service desk initiatives to stakeholders and define channels to communicate service desk changes.
4.1 Build an implementation roadmap.
4.2 Build a communication plan
Project implementation and task list with associated owners
Project communication plan and workshop summary presentation
"Customer service issues are rarely based on personality but are almost always a symptom of poor and inconsistent process. When service desk managers are looking to hire to resolve customer service issues and executives are pushing back, it’s time to look at improving process and the support strategy to make the best use of technicians’ time, tools, and knowledge sharing. Once improvements have been made, it’s easier to make the case to add people or introduce automation.
Replacing service desk solutions will also highlight issues around poor process. Without fixing the baseline services, the new solution will simply wrap your issues in a prettier package.
Ultimately, the service desk needs to be the entry point for users to get help and the rest of IT needs to provide the appropriate support to ensure the first line of interaction has the knowledge and tools they need to resolve quickly and preferably on first contact. If your plans include optimization to self-serve or automation, you’ll have a hard time getting there without standardizing first."
Principal Research Director, Infrastructure & Operations Practice
Info-Tech Research Group
Service desk improvement is an exercise in organizational change. Engage specialists across the IT organization in building the solution. Establish a single service-support team across the IT group and enforce it with a cooperative, customer-focused culture. Don’t be fooled by a tool that’s new. A new service desk tool alone won’t solve the problem. Service desk maturity improvements depend on putting in place the right people and processes to support the technology
Source: Info-Tech, 2019 Responses (N=189 organizations)
Info-Tech Research Group’s IT Management and Governance Diagnostic (MGD) program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified the service desk as an area to leverage.
Since 2013, Info-Tech has surveyed over 40,000 business stakeholders as part of our CIO Business Vision program.
Business stakeholders ranked the following 12 core IT services in terms of importance:
Learn more about the CIO Business Vision Program.
On average, organizations that were satisfied with service desk effectiveness rated all other IT processes 46% higher than dissatisfied end users.
Organizations that were satisfied with service desk timeliness rated all other IT processes 37% higher than dissatisfied end users.More than one hundred organizations engaged with Info-Tech, through advisory calls and workshops, for their service desk projects in 2016. Their goal was either to improve an existing service desk or build one from scratch.
Organizations that estimate the business impact of each project phase help us shed light on the average measured value of the engagements.
"The analysts are an amazing resource for this project. Their approach is very methodical, and they have the ability to fill in the big picture with detailed, actionable steps. There is a real opportunity for us to get off the treadmill and make real IT service management improvements"
- Rod Gula, IT Director
American Realty Advisors
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Project Summary
Service Desk Standard Operating Procedures
Service Desk Maturity Assessment Tool
Service Desk Implementation Roadmap
Incident, knowledge, and request management workflows
Improved training and knowledge transfer: Routine tasks can be delegated to junior staff (freeing senior staff to work on higher priority tasks).
IT automation, process optimization, and consistent operations: Defining, documenting, and then optimizing processes enables IT automation to be built on sound processes, so consistent positive results can be achieved.
Compliance: Compliance audits are more manageable because the documentation is already in place.
Transparency: Visually documented processes answer the common business question of “why does that take so long?”
Cost savings: Work solved at first contact or with a minimal number of escalations will result in greater efficiency and more cost-effective support. This will also lead to better customer service.
Tasks will be difficult to delegate, key staff become a bottleneck, knowledge transfer is inconsistent, and there is a longer onboarding process for new staff
IT automation built on poorly defined, unoptimized processes leads to inconsistent results.
Documenting SOPs to prepare for an audit becomes a major time-intensive project.
Other areas of the organization may not understand how IT operates, which can lead to confusion and unrealistic expectations.
Support costs are highest through inefficient processes, and proactive work becomes more difficult to schedule, making the organization vulnerable to costly disruptions.
Contact your account representative or email Workshops@InfoTech.com for more information.

Alignment on the challenges that the service desk faces, an assessment of the current state of service desk processes and technologies, and baseline metrics against which to measure improvements.
Deliverables
Embrace standardization
Increase business satisfaction
Reduce recurring issues
Increase efficiency and lower operating costs
When he joined Westminster College as CIO in 2006, the department faced several infrastructure challenges, including:
As the CIO investigated how to address the infrastructure challenges, he realized people cared deeply about how IT spent its time.
The project load of IT staff increased, with new projects coming in every day.
With a long project list, it became increasingly important to improve the transparency of project request and prioritization.
Some weeks, staff spent 80% of their time working on projects. Other weeks, support requirements might leave only 10% for project work.
He addressed the infrastructure challenges in part by analyzing IT’s routine processes.
Internally, IT had inefficient support processes that reduced the amount of time they could spend on projects.
They undertook an internal process analysis effort to identify processes that would have a return on investment if they were improved. The goal was to reduce operational support time so that project time could be increased.
Five years later, they had a better understanding of the organization's operational support time needs and were able to shift workloads to accommodate projects without compromising support.
Estimated Time: 45 minutes
A. As a group, outline the areas where you think the service desk is experiencing challenges or weaknesses. Use sticky notes or a whiteboard to separate the challenges into People, Process, and Technology so you have a wholistic view of the constraints across the department.
B. Think about the following:
C. Document challenges in the Service Desk Project Summary.
Participants:
A current-state assessment will help you build a foundation for process improvements. Current-state assessments follow a basic formula:
Ideally, the current-state assessment should align the delivery of IT services with organizational needs. The assessment should achieve the following goals:
“How do you know if you aren’t mature enough? Nothing – or everything – is recorded and tracked, customer satisfaction is low, frustration is high, and there are multiple requests and incidents that nobody ever bothers to address.”
Rob England
IT Consultant & Commentator
Owner Two Hills
Also known as The IT Skeptic
The Service Desk Maturity Assessmenttool helps organizations assess their service desk process maturity and focus the project on the activities that matter most.
The tool will help guide improvement efforts and measure your progress.
The tool is intended for periodic use. Review your answers each year and devise initiatives to improve the process performance where you need it most.
Where do I find the data?Consult:
This step will walk you through the following activities:
This step involves the following participants:
Identifying who is accountable for different support practices in the service desk will allow workload to be distributed effectively between functional teams and individuals. Closing the gaps in responsibilities will enable the execution of a shift-left strategy.
Deliverables
If you try to standardize service desk processes without engaging specialists in other parts of the IT organization, you will fail. Everyone in IT has a role to play in providing service support and meeting service-level agreements.
Specialists tend to distance themselves from service support as they progress through their career to focus on projects.
However, their cooperation is critical to the success of the new service desk. Not only do they contribute to the knowledgebase, but they also handle escalations from tiers 1 and 2.
Responsible: This person is the staff member who completes the work. Assign at least one Responsible for each task, but this could be more than one.
Accountable: This team member delegates a task and is the last person to review deliverables and/or task. Sometimes Responsible and Accountable can be the same staff. Make sure that you always assign only one Accountable for each task and not more.
Consulted: People who do not carry out the task but need to be consulted. Typically, these people are subject matter experts or stakeholders.
Informed: People who receive information about process execution and quality and need to stay informed regarding the task.
A RACI analysis is helpful with the following:
Notes:
Participants
What You'll Need
Regardless of the service desk structure chosen to meet your service support requirements, end users should be in no doubt about how to access the service.
Provide end users with:
A single point of contact will ensure:
This prevents ad hoc ticket channels such as shoulder grabs or direct emails, chats, or calls to a technician from interrupting work.
A single point of contact does not mean the service desk is only accessible through one intake channel, but rather all tickets are directed to the service desk (i.e. tier 1) to be resolved or redirected appropriately.
Source: Info-Tech, 2019 Responses (N=189 organizations)
Info-Tech Research Group’s IT Management and Governance Diagnostic (MGD) program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified the service desk as an area to leverage.
Since 2013, Info-Tech has surveyed over 40,000 business stakeholders as part of our CIO Business Vision program.
Business stakeholders ranked the following 12 core IT services in terms of importance:
Learn more about the CIO Business Vision Program.
On average, organizations that were satisfied with service desk effectiveness rated all other IT processes 46% higher than dissatisfied end users.
Organizations that were satisfied with service desk timeliness rated all other IT processes 37% higher than dissatisfied end users.More than one hundred organizations engaged with Info-Tech, through advisory calls and workshops, for their service desk projects in 2016. Their goal was either to improve an existing service desk or build one from scratch.
Organizations that estimate the business impact of each project phase help us shed light on the average measured value of the engagements.
"The analysts are an amazing resource for this project. Their approach is very methodical, and they have the ability to fill in the big picture with detailed, actionable steps. There is a real opportunity for us to get off the treadmill and make real IT service management improvements"
- Rod Gula, IT Director
American Realty Advisors
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Project Summary
Service Desk Standard Operating Procedures
Service Desk Maturity Assessment Tool
Service Desk Implementation Roadmap
Incident, knowledge, and request management workflows
Improved training and knowledge transfer: Routine tasks can be delegated to junior staff (freeing senior staff to work on higher priority tasks).
IT automation, process optimization, and consistent operations: Defining, documenting, and then optimizing processes enables IT automation to be built on sound processes, so consistent positive results can be achieved.
Compliance: Compliance audits are more manageable because the documentation is already in place.
Transparency: Visually documented processes answer the common business question of “why does that take so long?”
Cost savings: Work solved at first contact or with a minimal number of escalations will result in greater efficiency and more cost-effective support. This will also lead to better customer service.
Tasks will be difficult to delegate, key staff become a bottleneck, knowledge transfer is inconsistent, and there is a longer onboarding process for new staff
IT automation built on poorly defined, unoptimized processes leads to inconsistent results.
Documenting SOPs to prepare for an audit becomes a major time-intensive project.
Other areas of the organization may not understand how IT operates, which can lead to confusion and unrealistic expectations.
Support costs are highest through inefficient processes, and proactive work becomes more difficult to schedule, making the organization vulnerable to costly disruptions.
Contact your account representative or email Workshops@InfoTech.com for more information.

Alignment on the challenges that the service desk faces, an assessment of the current state of service desk processes and technologies, and baseline metrics against which to measure improvements.
Deliverables
Embrace standardization
Increase business satisfaction
Reduce recurring issues
Increase efficiency and lower operating costs
When he joined Westminster College as CIO in 2006, the department faced several infrastructure challenges, including:
As the CIO investigated how to address the infrastructure challenges, he realized people cared deeply about how IT spent its time.
The project load of IT staff increased, with new projects coming in every day.
With a long project list, it became increasingly important to improve the transparency of project request and prioritization.
Some weeks, staff spent 80% of their time working on projects. Other weeks, support requirements might leave only 10% for project work.
He addressed the infrastructure challenges in part by analyzing IT’s routine processes.
Internally, IT had inefficient support processes that reduced the amount of time they could spend on projects.
They undertook an internal process analysis effort to identify processes that would have a return on investment if they were improved. The goal was to reduce operational support time so that project time could be increased.
Five years later, they had a better understanding of the organization's operational support time needs and were able to shift workloads to accommodate projects without compromising support.
Estimated Time: 45 minutes
A. As a group, outline the areas where you think the service desk is experiencing challenges or weaknesses. Use sticky notes or a whiteboard to separate the challenges into People, Process, and Technology so you have a wholistic view of the constraints across the department.
B. Think about the following:
C. Document challenges in the Service Desk Project Summary.
Participants:
A current-state assessment will help you build a foundation for process improvements. Current-state assessments follow a basic formula:
Ideally, the current-state assessment should align the delivery of IT services with organizational needs. The assessment should achieve the following goals:
“How do you know if you aren’t mature enough? Nothing – or everything – is recorded and tracked, customer satisfaction is low, frustration is high, and there are multiple requests and incidents that nobody ever bothers to address.”
Rob England
IT Consultant & Commentator
Owner Two Hills
Also known as The IT Skeptic
The Service Desk Maturity Assessmenttool helps organizations assess their service desk process maturity and focus the project on the activities that matter most.
The tool will help guide improvement efforts and measure your progress.
The tool is intended for periodic use. Review your answers each year and devise initiatives to improve the process performance where you need it most.
Where do I find the data?Consult:
This step will walk you through the following activities:
This step involves the following participants:
Identifying who is accountable for different support practices in the service desk will allow workload to be distributed effectively between functional teams and individuals. Closing the gaps in responsibilities will enable the execution of a shift-left strategy.
Deliverables
If you try to standardize service desk processes without engaging specialists in other parts of the IT organization, you will fail. Everyone in IT has a role to play in providing service support and meeting service-level agreements.
Specialists tend to distance themselves from service support as they progress through their career to focus on projects.
However, their cooperation is critical to the success of the new service desk. Not only do they contribute to the knowledgebase, but they also handle escalations from tiers 1 and 2.
Responsible: This person is the staff member who completes the work. Assign at least one Responsible for each task, but this could be more than one.
Accountable: This team member delegates a task and is the last person to review deliverables and/or task. Sometimes Responsible and Accountable can be the same staff. Make sure that you always assign only one Accountable for each task and not more.
Consulted: People who do not carry out the task but need to be consulted. Typically, these people are subject matter experts or stakeholders.
Informed: People who receive information about process execution and quality and need to stay informed regarding the task.
A RACI analysis is helpful with the following:
Notes:
Participants
What You'll Need
A tiered generalist service desk with a first-tier resolution rate greater than 60% has the best operating cost and customer satisfaction of all competing service desk structural models.
Estimated Time: 45 minutes
Participants
Shift-left strategy:
Identify process gaps that you need to fill to support the shift-left strategy and discuss how you could adopt or improve the shift-left strategy, using the discussion questions below as a guide.
Which process gaps do you need to fill to identify ticket trends?
Which processes do you most need to improve to support a shift-left strategy?
Document in the Project Summary
Managers and analysts will have service desk metrics and reports that help set expectations and communicate service desk performance.
Deliverables
Start with the following questions:
Work with business unit leaders to develop an action plan.
Remember to communicate what you do to address stakeholder grievances.
The service recovery paradox is a situation in which end users think more highly of IT after the organization has corrected a problem with their service compared to how they would regard the company if the service had not been faulty in the first place.
The point is that addressing issues (and being seen to address issues) will significantly improve end-user satisfaction. Communicate that you’re listening and acting, and you should see satisfaction improve.
Presentation is everything:
If you are presenting outside of IT, or using operational metrics to create strategic information, be prepared to:
For example, “Number of incidents with ERP system has decreased by 5% after our last patch release. We are working on the next set of changes and expect the issues to continue to decrease.”
Tickets MUST:
Emphasize that reports are analyzed regularly and used to manage costs, improve services, and request more resources.
Service Desk Manager: Technical staff can help themselves analyze the backlog and improve service metrics if they’re looking at the right information. Ensure their service desk dashboards are helping them identify high-priority and quick-win tickets and anticipate potential SLA breaches.
Metrics should be tied to business requirements and show how well IT is meeting those requirements and where obstacles exist.
Technicians require mostly real-time information in the form of a dashboard, providing visibility into a prioritized list of tickets for which they are responsible.
Supervisors need tactical information to manage the team and set client expectations as well as track and meet strategic goals.
Managers and executives need summary information that supports strategic goals. Start by looking at executive goals for the support team and then working through some of the more tactical data that will help support those goals.
Example:
First-call resolution (FCR), end-user satisfaction, and number of tickets reopened all work together to give you a complete picture. As FCR goes up, so should end-user satisfaction, as number of tickets re-opened stays steady or declines. If the three metrics are heading in different directions, then you know you have a problem.
Internal metrics provide you with information about your actual performance. With the right continual improvement process, you can improve those metrics year over year, which is a better measure of the performance of your service desk.
Whether a given metric is the right one for your service desk will depend on several different factors, not the least of which include:
Take external metrics with a grain of salt. Most benchmarks represent what service desks do across different industries, not what they should do. There also might be significant differences between different industries in terms of the kinds of tickets they deal with, differences which the overall average obscures.
The right metrics can tell the business how hard IT works and how many resources it needs to perform:
Metrics should be tied to business requirements. They tell the story of how well IT is meeting those requirements and help identify when obstacles get in the way. The latter can be done by pointing to discrepancies between the internal metrics you expected to reach but didn’t and external metrics you trust.
Ultimately, everything boils down to cost containment (measured by cost per ticket) and quality of service (measured by customer satisfaction).
Cost per ticket is a measure of the efficiency of service support:
Cost per ticket is the total monthly operating expense of the service desk divided by the monthly ticket volume. Operating expense includes the following components:
Participants
What You'll Need
Managers and analysts will have best practices for ticket handling and troubleshooting to support ITSM data quality and improve first-tier resolution.
DELIVERABLES
If end users are avoiding your service desk, you may have an intake problem. Create alternative ways for users to seek help to manage the volume; keep in mind not every request is an emergency.
The two most efficient intake channels should be encouraged for the majority of tickets.
The two most traditional and fastest methods to get help must deal with emergencies and escalation effectively.
If many tickets are missing, help service support staff understand the need to collect the data. Reports will be inaccurate and meaningless if quality data isn’t entered into the ticketing system.
Better data leads to better decisions. Use the Ticket and Call Quality Assessment Toolto check-in on the ticket and call quality monthly for each technician and improve service desk data quality.
Participants
What You'll Needs
Workflows for incident management and critical incident management will improve the consistency and quality of service delivery and prepare the service desk to negotiate reliable service levels with the organization.
DELIVERABLES
End users think more highly of IT after the organization has corrected a problem with their service than they would have had the service not been faulty in the first place.
Use the service recovery paradox to your advantage. Address service desk challenges explicitly, develop incident management processes that get services back online quickly, and communicate the changes.
If you show that the service desk recovered well from the challenges end users raised, you will get greater loyalty from them.
The role of an incident coordinator or manager can be assigned to anyone inside the service desk that has a strong knowledge of incident resolution, attention to detail, and knows how to herd cats.
In organizations with high ticket volumes, a separate role may be necessary.
Everyone must recognize that incident management is a cross-IT organization process and it does not have to be a unique service desk process.
An incident coordinator is responsible for:
Ben Rodrigues developed a progressive plan to create a responsive, service-oriented culture for the service support organization.
"When I joined the organization, there wasn’t a service desk. People just phoned, emailed, maybe left [sticky] notes for who they thought in IT would resolve it. There wasn’t a lot of investment in developing clear processes. It was ‘Let’s call somebody in IT.’
I set up the service desk to clarify what we would do for end users and to establish some SLAs.
I didn’t commit to service levels right away. I needed to see how many resources and what skill sets I would need. I started by drafting some SLA targets and plugging them into our tracking application. I then monitored how we did on certain things and established if we needed other skill sets. Then I communicated those SOPs to the business, so that ‘if you have an issue, this is where you go, and this is how you do it,’ and then shared those KPIs with them.
I had monthly meetings with different function heads to say, ‘this is what I see your guys calling me about,’ and we worked on something together to make some of the pain disappear."
-Ben Rodrigues
Director, IT Services
Gamma Dynacare
End Users
Technicians
Managers
Consistent incident management processes will improve end-user satisfaction with all other IT services.
However, be prepared to overcome these common obstacles as you put the process in place, including:
Participants
What You’ll Need
Different ticket types are associated with radically different prioritization, routing, and service levels. For instance, most incidents are resolved within a business day, but requests take longer to implement.
If you fail to distinguish between ticket types, your metrics will obscure service desk performance.
Organizations sometimes mistakenly classify small projects as service requests, which can compromise your data, resulting in a negative impact to the perceived value of the service desk.
Defining the differences between service requests and incidents is not just for reporting purposes. It also has a major impact on how service is delivered.
Incidents are unexpected disruptions to normal business processes and require attempts to restore services as soon as possible (e.g. the printer is not working).
Service requests are tasks that don’t involve something that is broken or has an immediate impact on services. They do not require immediate resolution and can typically be scheduled (e.g. new software).
Estimated Time: 60 minutes
Participants
What You’ll Need
Discuss these elements to see how the organization will handle them.
Critical incidents are high-impact, high-urgency events that put the effectiveness and timeliness of the service desk center stage.
Build a workflow that focuses on quickly bringing together the right people to resolve the incident and reduces the chances of recurrence.
Estimated Time: 60 minutes
Participants
What You’ll Need
When it comes to communicating during major incidents, it’s important to get the information just right. Users don’t want too little, they don’t want too much, they just want what’s relevant to them, and they want that information at the right time.
As an IT professional, you may not have a background in communications, but it becomes an important part of your job. Broad guidelines for good communication during a critical incident are:
Why does communication matter?
Sending the wrong message, at the wrong time, to the wrong stakeholders, can result in:
End users understand that sometimes things break. What’s important to them is that (1) you don’t repeatedly have the same problem, (2) you keep them informed, and (3) you give them enough notice when their systems will be impacted and when service will be returned.
In the middle of resolving a critical incident, the last thing you have time for is worrying about crafting a good message. Create a series of templates to save time by providing automated, tailored messages for each stage of the process that can be quickly altered and sent out to the right stakeholders.
Once templates are in place, when the incident occurs, it’s simply a matter of:
Tell users the information they need to know when they need to know it. If a user is directly impacted, tell them that. If the incident does not directly affect the user, the communication may lead to decreased customer satisfaction or failure to pay attention to future relevant messaging.
You’ll need distinct messages for distinct audiences. For example:
Some questions to assist you:
Customer experience programs with a combination of relationship and transactional surveys tend to be more effective. Merging the two will give a wholistic picture of the customer experience.
Relationship surveys focus on obtaining feedback on the overall customer experience.
Transactional surveys are tied to a specific interaction or transaction your end users have with a specific product or service.
A simple quantitative survey at the closing of a ticket can inform the service desk manager of any issues that were not resolved to the end user’s satisfaction. Take advantage of workflows to escalate poor results immediately for quick follow-up.
If a more complex survey is required, you may wish to include some of these questions:
Please rate your overall satisfaction with the way your issue was handled (1=unsatisfactory, 5=fantastic)
Add an open-ended, qualitative question to put the number in context, and solicit critical feedback:
What could the service desk have done to improve your experience?
Successful customer satisfaction programs respond effectively to both positive and negative outcomes. Late or lack of responses to negative comments may increase customer frustration, while not responding at all to the positive comments may give the perception of indifference. If customers are taking the time to fill out the survey, good or bad, they should be followed up with
Take these steps to handle survey feedback:
When you combine the tracking and analysis of relationship and transactional survey data you will be able to dive into specific issues, identify trends and patterns, assess impact to users, and build a plan to make improvements.
Once the survey data is centralized, categorized, and available you can start to focus on metrics. At a minimum, for transactional surveys, consider tracking:
For relationship surveys, consider tracking:
Image Source: Info-Tech End User Satisfaction Report
Prioritize company-wide improvement initiatives by those that have the biggest impact to the entire customer base first and then communicate the plan to the organization using a variety of communication channels that will draw your customers in, e.g. dashboards, newsletters, email alerts.
Consider automating or using your ITSM notification system as a direct communication method to inform the service desk manager of negative survey results.
This step involves the following participants:
The reviewed ticket categorization scheme will be easier to use and deploy more consistently, which will improve the categorization of data and the reliability of reports.
DELIVERABLES
Too many options cause confusion; too few options provide little value. As you build the classification scheme over the next few slides, let call routing and reporting requirements be your guide.
Effective classification schemes are concise, easy to use correctly, and easy to maintain.
Don’t do it alone! Collaborate with managers in the specialized IT groups responsible for root-cause analysis to develop a categorization scheme that makes sense for them.
Start with asset types if asset management and configuration management processes figure prominently in your practice or on your service management implementation roadmap.
Building the Categories
Ask these questions:
Need to make quick progress? Use Info-Tech Research Group’s Service Desk Ticket Categorization Schemes template.
Think about how you will use the data to determine which components need to be included in reports. If components won’t be used for reporting, routing, or warranty, reporting down to the component level adds little value.
Start with asset services if service management generally figures prominently in your practice, especially service catalog management.
Building the Categories
Ask these questions:
Need to make quick progress? Use Info-Tech Research Group’s Service Desk Ticket Categorization Schemes template.
Remember, ticket categories are not your only source of reports. Enhance the classification scheme with resolution and status codes for more granular reporting.
Participants
What You’ll Need
Resolution codes differ from detailed resolution notes.
Ticket statuses are a helpful field for both IT and end users to identify the current status of the ticket and to initiate workflows.
Common Examples:
Resolution Codes
Status Fields
Discuss:
Draft:
Participants
What You’ll Need
The reviewed ticket escalation and prioritization will streamline queue management, improve the quality of escalations, and ensure agents work on the right tickets at the right time.
DELIVERABLES
Mission-critical systems or problems that affect many people should always come first (i.e. Severity Level 1).
The bulk of reported problems, however, are often individual problems with desktop PCs (i.e. Severity Level 3 or 4).
Some questions to consider when deciding on problem severity include:
Decide how many severity levels the organization needs the service desk to have. Four levels of severity are ideal for most organizations.
Estimated Time: 60 minutes
Document in the SOP
Participants
What You'll Need
Estimated Time: 60 minutes
Instructions:
For each incident priority level, define the associated:
Participants
What You'll Need
Use the table on the previous slide as a guide.
Escalation is not about admitting defeat, but about using your resources properly.
Defining procedures for escalation reduces the amount of time the service desk spends troubleshooting before allocating the incident to a higher service tier. This reduces the mean time to resolve and increases end-user satisfaction.
You can correlate escalation paths to ticket categories devised in step 2.2.
Estimated Time: 60 minutes
Instructions
Estimated Time: 60 minutes
Participants
What You'll Need
Workflows for service requests will improve the consistency and quality of service delivery and prepare the service desk to negotiate reliable service levels with the organization.
DELIVERABLES
Standardize requests to develop a consistent offering and prepare for a future service catalog.
Document service requests to identify time to fulfill and approvals.
Identify which service requests can be auto-approved and which will require a workflow to gain approval.
Document workflows and analyze them to identify ways to improve SLAs. If any approvals are interrupting technical processes, rearrange them so that approvals happen before the technical team is involved.
Determine support levels for each service offering and ensure your team can sustain them.
Where it makes sense, automate delivery of services such as software deployment.
The distinction between service requests and small projects has two use cases, which are two sides of the same resourcing issue.
What’s the difference between a service request and a small project?
Example: A mid-sized organization goes on a hiring blitz and needs to onboard 150 new employees in one quarter. Submitting and scheduling 150 requests for onboarding new employees would require much more time and resources.
Common Characteristics of Projects:
Projects require greater risk, effort, and resources than a service request and should be redirected to the PMO.
Standard Requests
Non-Standard Requests
The service desk can’t and shouldn’t distinguish between requests and projects on its own. Instead, engage stakeholders to determine where to draw the line.
Whatever criteria you choose, define them carefully.
Be pragmatic: there is no single best set of criteria and no single best definition for each criterion. The best criteria and definitions will be the ones that work in your organizational context.
Participants
What You'll Need
New service desk managers sometimes try to standardize request fulfilment processes on their own only to encounter either apathy or significant resistance to change.
Moving to a tiered generalist service desk with a service-oriented culture, a high first-tier generalist resolution rate, and collaborative T2 and T3 specialists can be a big change. It is critical to get the request workflows right.
Don’t go it alone. Engage a core team of process champions from all service support. With executive support, the right process building exercises can help you overcome resistance to change.
Consider running the process building activities in this project phase in a working session or a workshop setting.
If they build it, they will come. Service desk improvement is an exercise in organizational change that crosses IT disciplines. Organizations that fail to engage IT specialists from other silos often encounter resistance to change that jeopardizes the process improvements they are trying to make. Overcome resistance by highlighting how process changes will benefit different groups in IT and solicit the feedback of specialists who can affect or be affected by the changes.
Move approvals out of technical IT processes to make them more efficient. Evaluate all service requests to see where auto-approvals make sense. Where approvals are required, use tools and workflows to manage the process.
Example:
As standard service requests should follow standard, repeatable, and predictable steps to fulfill, they can be documented with workflows.
Ensure there is a standard and predictable methodology for assessing non-standard requests; inevitably those requests may still cause delay in fulfillment.
Create a process to ensure reasonable expectations of delivery can be set with the end user and then identify what technology requests should become part of the existing standard offerings.
Participants
What You'll Need
These should all be scheduled services. Anything that is requested as a rush needs to be marked as a higher urgency or priority to track end users who need training on the process.
Critique workflows for efficiencies and effectiveness:
Participants
What You'll Need
The section will introduce service catalogs and get the organization to envision what self-service tools it might include.
DELIVERABLES
Gathering, analyzing, storing & sharing knowledge to reduce the need to rediscover known solutions.
Organized repository of IT best practices and knowledge gained from practical experiences.
Give end users a chance to resolve simple issues themselves without submitting a ticket.
Shared resource for service desk staff and managers to share and use knowledge.
Service desk teams are often overwhelmed by the idea of building and maintaining a comprehensive integrated knowledgebase that covers an extensive amount of information.
Don’t let this idea stop you from building a knowledgebase! It takes time to build a comprehensive knowledgebase and you must start somewhere.
Start with existing documentation or knowledge that depends on the expertise of only a few people and is easy to document and you will already see the benefits.
Then continue to build and improve from there. Eventually, knowledge management will be a part of the culture.
Inventory and consolidate existing documentation, then evaluate it for audience relevancy, accuracy, and usability. Use the exercise and the next slides to develop a knowledgebase template.
Assign a knowledge manager to monitor creation and edit and maintain database.
The knowledge manager role will likely be a role assigned to an existing resource rather than a dedicated position.
Options include:
Determine which features your organization needs and check to see if your tools have them.
For more information on knowledgebase improvement, refer to Info-Tech’s Optimize the Service Desk With a Shift-Left Strategy.
Workflow should include:
Participants
What You’ll Need
Write and critique knowledgebase articles.
Audience: Technician
Audience: End users
Participants
What You’ll Need
The section prepares you to tackle a self-service portal project once the service desk standardization is complete.
DELIVERABLES
Some companies use vending machines as a form of self serve. Users can enter their purchase code and “buy” a thin client, mouse, keyboard, software, USB keys, tablet, headphones, or loaners.
Building the basics first will provide your users with immediate value. Incrementally add new features to your portal.
Don’t build a portal framed around current offerings and capabilities just for the sake of it. Build the portal based on what your users want and need if you want them to use it.
The portal should be designed for users to self-serve, and thus self-service must be seamless, clear, and attractive to users.
Keep in mind that users may not have high technical literacy or be familiar with terminology that you find commonplace. Use terms that are easy to understand.
Ensure that users can find what they’re looking for both by browsing the site and by using search functionality.
If multiple departments (i.e. HR, Finance) use or will use a portal, set up a shared portal so that users won’t have to guess where to go to ask for help.
You will know how to navigate the portal better than anyone, but that doesn’t mean it’s intuitive for a new user. Test the portal with users to collect and incorporate feedback.
Image source: Cherwell Service Management
Image source: Team Dynamix
For more information on building self-service portal, refer to Info-Tech’s Optimize the Service Desk with a Shift-Left Strategy
Participants
What You’ll Need
A service catalog is a communications device that lists the IT services offered by an organization. The service catalog is designed to enable the creation of a self-service portal for the end user. The portal augments the service desk so analysts can spend time managing incidents and providing technical support.
The big value comes from workflows:
There are three types of catalogs:
Image courtesy of University of Victoria
Sample Service Catalog Efforts
“I would say a client with 2,000 users and an IT department with a couple of hundred, then you're looking at six months before you have the catalog there.”
– Service Catalog Implementation Specialist,
Health Services
Identify stakeholders who can contribute to the project.
Evaluate tool options.
Identify the high-level tasks that need to be done.
Document the plan and tasks in the Service Desk Roadmap.
Examples of publicly posted service catalogs:
University of Victoria is an example of a catalog that started simple and now includes multiple divisions, notifications, systems status, communications, e-commerce, incident registration, and more.
Indiana University is a student, faculty, and staff service catalog and self-service portal that goes beyond IT services.
The communication plan and project summary will help project managers outline recommendations and communicate their benefits.
DELIVERABLES
An effective communication plan will:
Build a communication plan to:
Estimated Time: 45 minutes
Develop a stakeholder analysis.
Craft key messages tailored to each stakeholder group.
Finalize the communication plan.
Participants
The implementation plan will help track and categorize the next steps and finalize the project.
DELIVERABLES
Estimated Time: 45 minutes
Determine the sequence of improvement initiatives that have been identified throughout the project.
The purpose of this exercise is to define a timeline and commit to initiatives to reach your goals.
Instructions:
Participants
Document using the Roadmap tool.
ImplementHardware and Software Asset Management
Optimize Change Management Incident and Problem Management Build a Continual Improvement Plan for the Service DeskThe Standardize blueprint reviews service desk structures and metrics and builds essential processes and workflows for incident management, service request fulfillment, and knowledge management practices.
Once the service desk is operational, there are three paths to basic ITSM maturity:
Solicit targeted department feedback on core IT service capabilities, IT communications, and business enablement. Use the results to assess the satisfaction of end users, with each service broken down by department and seniority level.
“Help Desk Staffing Models: Simple Analysis Can Save You Money.” Giva, Inc., 2 Sept. 2009. Web.
Marrone et al. “IT Service Management: A Cross-national Study of ITIL Adoption.” Communications of the Association for Information Systems: Vol. 34, Article 49. 2014. PDF.
Rumburg, Jeff. “Metric of the Month: First Level Resolution Rate.” MetricNet, 2011. Web.
“Service Recovery Paradox.” Wikipedia, n.d. Web.
Tang, Xiaojun, and Yuki Todo. “A Study of Service Desk Setup in Implementing IT Service Management in Enterprises.” Technology and Investment: Vol. 4, pp. 190-196. 2013. PDF.
“The Survey of Adult Skills (PIAAC).” Organisation for Economic Co-operation and Development (OECD), 2016. Web.
Aligning your business with applications through your strategy will not only increase business satisfaction but also help to ensure you’re delivering applications that enable the organization’s goals.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This review guide provides organizations with a detailed assessment of their application strategy, ensuring that the applications enable the business strategy so that the organization can be more effective.The assessment provides criteria and exercises to provide actionable outcomes.
Using the MITRE ATT&CK® framework, Info-Tech’s approach helps you understand your preparedness and effective detection and mitigation actions.
This blueprint and associated tool are scalable for all types of organizations within various industry sectors, allowing them to know what types of risk they are facing and what security services are recommended to mitigate those risks.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Review a breakdown of each of the various attack vectors and their techniques for additional context and insight into the most prevalent attack tactics.
Map your current security protocols against the impacts of various techniques on your network to determine your risk preparedness.
Use your prioritized attack vectors to plan your next threat modeling session with confidence that the most pressing security concerns are being addressed with substantive remediation actions.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess the opportunities of web APIs.
Design and develop web APIs that support business processes and enable reusability.
Accommodate web API testing best practices in application test plans.
Monitor the usage and value of web APIs and plan for future optimizations and maintenance.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Gauge the importance of web APIs for achieving your organizational needs.
Understand how web APIs can be used to achieve below-the-line and above-the-line benefits.
Be aware of web API development pitfalls.
Understanding the revenue generation and process optimization opportunities web APIs can bring to your organization.
Knowledge of the current web API landscape.
1.1 Examine the opportunities web APIs can enable.
Establish a web API design and development process.
Design scalable web APIs around defined business process flows and rules.
Define the web service objects that the web APIs will expose.
Reusable web API designs.
Identification of data sets that will be available through web services.
Implement web API development best practices.
2.1 Define high-level design details based on web API requirements.
2.2 Define your process workflows and business rules.
2.3 Map the relationships among data tables through ERDs.
2.4 Define your data model by mapping the relationships among data tables through data flow diagrams.
2.5 Define your web service objects by effectively referencing your data model.
High-level web API design.
Business process flow.
Entity relationship diagrams.
Data flow diagrams.
Identification of web service objects.
Incorporate APIs into your existing testing practices.
Emphasize security testing with web APIs.
Learn of the web API testing and monitoring tool landscape.
Creation of a web API test plan.
3.1 Create a test plan for your web API.
Web API Test Plan.
Plan for iterative development and maintenance of web APIs.
Manage web APIs for versioning and reuse.
Establish a governance structure to manage changes to web APIs.
Implement web API monitoring and maintenance best practices.
Establishment of a process to manage future development and maintenance of web APIs.
4.1 Identify roles for your API development projects.
4.2 Develop governance for web API development.
RACI table that accommodates API development.
Web API operations governance structure.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assist your employees in setting appropriate development goals.
Review existing and identify new development activities that employees can undertake to achieve their goals.
Establish manager and employee follow-up accountabilities.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This trends and buyer’s guide will help you:
Create your own request for proposal (RFP) for your customer service management suite procurement process by customizing Info-Tech's RFP template.
Use this tool to assess your maturity and fit for a CSM solution. It will help identify your current CSM state and assist with the decision to move forward with a new solution or augment certain features.
Keep stakeholders engaged with simple and friction-free templates to document your progress for Rapid Application Selection.
Leverage a traceable and straightforward Vendor Evaluation Workbook to narrow the field of potential vendors and accelerate the application selection process.
Create an objective and fair scoring process to evaluate the RFPs and demonstrations provided by shortlisted vendors. Within this framework, provide a multidimensional evaluation that analyzes the solution's functional capabilities, architecture, costs, service support, and overall suitability in comparison to the organization's expressed requirements.
Create an organized and streamlined vendor demonstration process by clearly outlining your expectations for the demo. Use the demo as an opportunity to ensure that capabilities expressed by vendors are actually present within the considered solution.
The pandemic and growing younger demographic have shifted the terrain of customer service delivery. Customer service management (CSM) tools ensure organizations enhance customer acquisition, customer retention, and overall revenues into the future.
It is one thing to research customer service best practices; it is another to experience such service. Whether being put on hold for an hour with a telecommunications company, encountering voice biometric security with a bank, or receiving automated FAQs from a chatbot, we all perform our own primary research in customer service by going about our daily lives. Yet while the pandemic required a shift to this multichannel and digital assistant environment (to account for ongoing agent attrition), this trend was actually just accelerated. A growing younger demographic now prefers online communication channels to voice. Social media (whichever the platform) is a fundamental part of this demographic’s online presence and has instigated the need for customer service delivery to meet customers where they are – for both damage control and enhancing customer relationships.
Organizations delivering customer service across multiple product lines need to examine what delivery channels they need to satisfy customers, alongside assessing how customer loyalty and cross-selling can increase revenues and company reputation. Customer service management tools can assist and enable the future state.
Thomas Randall, Ph.D.
Research Director, Info-Tech Research Group
| Your Challenge | Common Obstacles | Info-Tech’s Solution |
|
|
This trends and buyer’s guide will help you:
|
The objective at the end of the day is to have a single interface that the front-line staff interacts with. I think that is the holy grail when we look at CSM technology. The objective that everyone has in mind is we'd all like to get to one screen and one window. Ultimately, the end game really hasn't changed: How can we make it easy for the agents and how can we minimize their errors? How can we streamline the process so they can work?
Colin Taylor, CEO, The Taylor Reach Group
| 1. Contextualize the CSM Landscape | 2. Select the Right CSM Vendor | |
|---|---|---|
| Phase Steps |
|
|
| Phase Outcomes |
|
|
Info-Tech Insight
Need help constructing your RFP? Use Info-Tech’s CSM Platform RFP Template!
| Phase 1 | Phase 2 |
|---|---|
|
Call #1: Discover if CSM tools are right for your organization. Understand what a CSM platform is and discover the “art of the possible.” Call #2: Identify right-sized vendors and build the business case to select a CSM platform. |
Call #3: Define your key CSM requirements. Call #4: Build procurement items, such as an RFP and demo script. Call #5: Evaluate vendors and perform final due diligence. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
The CSM selection process should be broken into segments:
| DIY Toolkit | Guided Implementation | Workshop | Consulting |
|---|---|---|---|
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to his the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks are used throughout all four options
Expert analyst guidance over five weeks on average to select and negotiate software
Save money, align stakeholders, speed up the process, and make better decisions
Use a repeatable, formal methodology to improve your application selection process
Better, faster results, guaranteed, included in membership
40 hours of expert analyst guidance
Project & stakeholder management assistance
Save money, align stakeholders, speed up the process, and make better decisions
Better, faster results, guaranteed, $25,000 standard engagement fee
| MULTIPLE CHANNELS Customers may resolve their issues via a variety of channels, including voice, SMS, email, social media, and live webchat. |
KNOWLEDGE BASE Provide a knowledge base for FAQs that is both customer facing (via customer portal) and agent facing (for live resolutions). |
| ANALYTICS Track customer satisfaction, agent performances, ticket resolutions, backlogs, traffic analysis, and other key performance indicators (KPIs). |
COLLABORATION Enable agents to escalate and collaborate within a unified platform (e.g. tagging colleagues to flag a relevant customer query). |
Info-Tech Insight
After-sales customer service is critical for creating, maintaining, and growing customer relationships. Organizations that fail to provide adequate service will be poorly positioned for future customer service and sales efforts.
INTEGRATIONS
Note what integrations are available for your contact center, CRM, or industry-specific solutions (e.g. inventory management) to get the most out of CSM.
SENTIMENT ANALYSIS
Reads, contextualizes, and categorizes tickets by sentiment (e.g. “positive”) before escalating to an appropriate agent.
AUTO-RESPONSE EDITOR
Built-in AI provides prewritten responses or auto-pulls the relevant knowledge article, assisting agents with speed to resolution.
ATTRIBUTES-BASED ROUTING
Learns over time how best to route tickets to appropriate agents based on skills, availability, or proximity of an agent (e.g. multilingual, local, or specialist agents).
AUTOMATED WORKFLOWS
CSM tool providers have varying usability for workflow building and enablement. Ensure your use cases align.
TICKET PRIORITIZATION
Adapts and prioritizes customer issues by service-level agreement (SLA), priority, and severity according to inputted KPIs.
Good technology will not fix a bad process. I don't care how good the technology is. If the use case is wrong and the process is wrong, it's not going to work.
Colin Taylor, CEO
The Taylor Reach Group
| Real-time | Pre-event | Post-event | |
|---|---|---|---|
| Channel example: Notifications via SMS or social media. | Channel example: Notifications via SMS or social media. | Channel example: Working with an agent or live chatbot. | Channel example: Working with an agent or live chatbot. |
| “Your car may need a check-up for faulty parts.” | “Here is a local garage to fix your tire pressure.” | “I see you have poor tire pressure. Here is a local garage.” | “Thank you for your patience, how can we help?” |
| Predictive Service The CSM recommends mitigation options to the customer before the issue occurs and before the customer knows they need it. |
Proactive Service The issue occurs but the CSM recommends mitigation options to the customer before the customer contacts the organization. |
Real-Time Service The organization offers real-time mitigation options while working with the customer to resolve the issue. |
Reactive Service The customer approaches the organization after the issue occurs, but the organization has no insight into the event. |
Organizations should ask whether they need a standalone CSM solution or a CSM as part of a broader suite of CXM tools. The latter is especially relevant if your organization already invests in a CXM platform.
Customer Service Complexity
Low complexity refers to primarily transactional inquiries. High complexity refers to service workflows for symptom analysis, problem identification, and solution delivery.
Product Complexity
High complexity refers to having a large number of brands and individual SKUs, technologically complex products, and products with many add-ons.
Info-Tech Insight
Use Info-Tech’s CSM Platform Opportunity Assessment Tool to discover your organization’s customer service maturity.
30 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the CSM Platform Opportunity Assessment Tool
| Bypass | Adopt |
|---|---|
| Monochannel approach You do not participate in multichannel campaigns or your customer personas are typically limited to one or two channels (e.g. voice or SMS). |
Multichannel approach You are pursuing multifaceted, customer-specific campaigns across a multitude of channels. |
| Small to mid-sized business with small CX team Do not buy what you do not need. Focus on the foundations of customer experience (CX) first before extending into a full-fledged CSM tool. |
Maturing CX department Customer service needs are extending into managing budgets, generating and segmenting leads, and measuring channel effectiveness. |
| Limited product range CSM tools typically gain return on investment (ROI) if the organization has a complex product range and is looking to increase cross-sell opportunities across different customer personas. |
Multiple product lines Customer base and product lines are large enough to engage in opportunities for cross- and up-selling. |
AkzoNobel
INDUSTRY
Retail
SOURCE
Sprinklr (2021)
Use CSM tools to unify the multichannel experience and reduce response time.
| Challenge | Solution | Results |
| AzkoNobel is a leading global paints and coatings company. AzkoNobel had 60+ fragmented customer service accounts on social media for multiple brands. There was little consistency in customer experience and agent responses. Moreover, the customer journey was not being tracked, resulting in lost opportunities for cross-selling across brands. The result: slow response times (up to one week) and unsatisfied customers, leaving the AzkoNobel brand in a vulnerable state. |
AkzoNobel leveraged Sprinklr, a customer experience software provider, to unify six social channels, 19 accounts, and six brands. Sprinklr aligned governance across social media channels with AzkoNobel’s strategic business goals, emphasizing the need for process, increasing revenue, and streamlining customer service. AzkoNobel was able to use keywords from customers’ inbound messaging to put an escalation process in place. |
Since bringing on Sprinklr in 2015-2016, unifying customer service channels under one multichannel platform resulted in:
|
| 1920s | 1950s | 1967-1973 | 1980-1990s | 2000-2010s |
|---|---|---|---|---|
| The introduction of lines of credit and growth of household appliance innovations meant households were buying products at an unprecedented rate. Department stores would set up customer service sections to assist with live fixes or returns. | Following the Great Depression and World War II, process, efficiency, and computational technology became defining features of customer service. These features were played out in call centers as automatic call distribution (ACD) technology began to scale. | With the development of private automatic branch exchange (PABX), AT&T introduced the toll-free telephone number. Companies began training staff and departments for customer service and building loyalty. With the development of interactive voice response (IVR) in 1973, call centers became increasingly more efficient at routing. | Analog technology shifted to digital and the term “contact center” was coined. These centers began being outsourced internationally. With the advent of the internet, CSM technology (in the early guise of a “help desk”) became equipped with computer telephony integration (CTI). | Software as a service (SaaS) and CRM maturation strengthened the retention and organization of customer data. Social media also enhanced consumer power as companies rushed to prevent online embarrassment. This prompted investment in multichannel customer service. |
2023
Go mobile first
85% of customers believe a company’s mobile website should be just as good as its desktop website. Enabling user-friendly mobile websites provides an effective channel to keep inbound calls down.
2024
Shift from multichannel to omnichannel
Integrating CSM tools with your broader CXM suite enables customer data to seamlessly travel between channels for an omnichannel experience.
2025
Enable predictive service
CSM tools integrate with Internet of Things (IoT) systems to provide automated notifications that alert staff of issues and mitigate issues with customers before the issue even occurs.
2026
Leverage predictive analytics for ML use cases
Use customers’ historic data and preferences to perform better automated customer service over time (e.g. providing personalized resolutions based on previous customer engagements).
Context and scenario play a huge role in measuring good customer service. Ensure your KPIs accurately reflect the incentives you want to give your customer support staff for delivering appropriate customer service.
David Thomas, Customer Service Specialist
Freedom Mobile
(Reve Chat, 2022)
BIOMETRICS
65% of customers say they would accept voice recognition to authorize their identity when calling a customer support line (GetApp, 2021).
PERSONALIZATION
51% of marketers, advocating for personalization across multiple touchpoints saw 300% ROI (KoMarketing, 2020).
SOCIAL MEDIA
29% of customers aged 18 to 39 prefer online chat communication before and after purchase (RingCentral, 2020).
SELF-SERVICE
92% of customers say they would use a knowledge base for self-service support if it was available (Vanilla, 2020).
Business Opportunity
Determine high-level understanding of the need that must be addressed, along with the project goals and affiliated key metrics. Establish KPIs to measure project success.
System Diagram
Determine the impact on the application portfolio and where integration is necessary.
Risks
Identify potential blockers and risk factors that will impede selection.
High-Level Requirements
Consider the business functions and processes affected.
People Impact
Confirm who will be affected by the output of the technology selection.
Overall Business Case
Calculate the ROI and the financial implications of the application selection. Highlight the overarching value.
2 hours
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Software Selection Workbook
Understanding business needs through requirements gathering is key to defining everything about what is being purchased, yet it is an area where people often make critical mistakes.
| Signs of poorly scoped requirements | Best practices |
|---|---|
|
|
Info-Tech Insight
Review Info-Tech’s requirements gathering methodology to improve your requirements gathering process.
As you gather requirements, decide which procurement route best suits your context.
| RFI (Request for Information) | RFQ (Request for Quotation) | RFP (Request for Proposal) | |
|---|---|---|---|
| Purpose and Usage |
Gather information about products/services when you know little about what’s available. Often followed by an RFP. |
Solicit pricing and delivery information for products/services with clearly defined requirements.
Best for standard or commodity products/services. |
Solicit formal proposals from vendors to conduct an evaluation and selection process. Formal and fair process; identical for each participating vendor. |
| Level of Intent |
Fact-finding – there is no commitment to engage the vendor. Vendors are often reluctant to provide quotes. |
Committed to procure a specific product/service at the lowest price. |
Intent to buy the products/services in the RFP. Business case/approval to spend is already obtained. |
| Level of Detail | High-level requirements and business goals. |
Detailed specifications of what products/services are needed. Detailed contract and delivery terms. |
Detailed business requirements and objectives. Standard questions and contract term requests for all vendors. |
| Response |
Generalized response with high-level product/services. Sometimes standard pricing quote. |
Price quote and confirmation of ability to fulfill desired terms. |
Detailed solution description, delivery approach, customized price quote, and additional requested information. Product demo and/or hands-on trial. |
Info-Tech Insight
If you are in a hurry, consider instead issuing Info-Tech’s Vendor Evaluation Workbook. This workbook speeds up the typical procurement process by adding RFP-like requirements (such as operational and technical requirements) while driving the procurement process via emphasis on high-value use cases.
Download the Vendor Evaluation Workbook
2 hours
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the CSM Platform RFP Scoring Tool
Download the CSM Platform RFP Template
Avoid vendor glitz and glamour shows by ensuring vendors are concretely applying their solution to your high-value use cases.
| 1 | Minimize the number of vendors to four to keep up the pace of the selection process. |
| 2 | Provide a demo script that captures your high-value use cases and differentiating requirements. |
| 3 | Ensure demos are booked close together and the selection committee attends all demos. |
Rapid-fire vendor investigative interview
Invite vendors to come onsite (or join you via videoconference) to demonstrate the product and answer questions. Use a highly targeted demo script to help identify how a vendor’s solution will fit your organization’s particular business capability needs.
Give each vendor 90 to 120 minutes to give a rapid-fire presentation. We suggest the following structure:
To ensure a consistent evaluation, vendors should be asked analogous questions and answers should be tabulated.
How to challenge the vendors in the investigative interview
To kick-start scripting your demo scenarios, leverage our CSM Platform Vendor Demo Script Template.
A vendor scoring model is a systematic method for effectively assessing competing vendors. A weighted-average scoring model is an approach that strikes a strong balance between rigor and evaluation speed.
| How do I build a scoring model? | What are some of the best practices? |
|---|---|
|
|
Info-Tech Insight
Even the best scoring model will still involve some “art” rather than science. Scoring categories such as vendor viability always entail a degree of subjective interpretation.
| Criteria | Description |
|---|---|
| Functional Capabilities | How well does the vendor align with the top-priority functional requirements identified in your accelerated needs assessment? What is the vendor’s functional breadth and depth? |
| Affordability | How affordable is this vendor? Consider a three-to-five-year total cost of ownership (TCO) that encompasses not just licensing costs but also implementation, integration, training, and ongoing support costs. |
| Architectural Fit | How well does this vendor align with your direction from an enterprise architecture perspective? How interoperable is the solution with existing applications in your technology stack? Does the solution meet your deployment model preferences? |
| Extensibility | How easy is it to augment the base solution with native or third-party add-ons as your business needs may evolve? |
| Scalability | How easy is it to expand the solution to support increased user, data, and/or customer volumes? Does the solution have any capacity constraints? |
| Vendor Viability | How viable is this vendor? Are they an established player with a proven track record or a new and untested entrant to the market? What is the financial health of the vendor? How committed are they to the particular solution category? |
| Vendor Vision | Does the vendor have a cogent and realistic product roadmap? Are they making sensible investments that align with your organization’s internal direction? |
| Emotional Footprint | How well does the vendor’s organizational culture and team dynamics align to yours? |
| Third-Party Assessments and/or References | How well-received is the vendor by unbiased third-party sources like SoftwareReviews? For larger projects, how well does the vendor perform in reference checks (and how closely do those references mirror your own situation)? |
You may be faced with multiple products, services, master service agreements, licensing models, service agreements, and more.
Use Info-Tech’s Contract Review Services to gain insights on your agreements.
Consider the aspects of a contract review:
Validate that a contract meets IT’s and the business’ needs by looking beyond the legal terminology. Use a practical set of questions, rules, and guidance to improve your value for dollar spent.
Download Master Contract Review and Negotiation for Software Agreements
The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.
Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.
The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.
Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.
Fact-based reviews of business software from IT professionals.
Product and category reports with state-of-the-art data visualization.
Top-tier data quality backed by a rigorous quality assurance process.
User-experience insight that reveals the intangibles of working with a vendor.
SoftwareReviews is powered by Info-Tech
Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive, unbiased data on today’s technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.
Click here to access SoftwareReviews
Comprehensive software reviews to make better IT decisions
We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.
Est. 2003 | WA, USA | MSFT:NASDAQ
Bio
To accelerate your digital transformation, you need a new type of business application. One that breaks down the silos between CRM and ERP, that’s powered by data and intelligence, and helps capture new business opportunities. That’s Microsoft Dynamics 365.
Offices
Microsoft is located all over the world. For a full list, see Microsoft Worldwide Sites.
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2003 (as Microsoft Dynamics CRM)
2005 Second version branded Dynamics 3.0.
2009 Dynamics CRM 4.0 (Titan) passes 1 million user mark.
2015 Announces availability of CRM Cloud design for FedRAMP compliance.
2016 Dynamics 365 released as successor to Dynamics CRM.
2016 Microsoft’s acquisition of LinkedIn provides line of data to 500 million users.
2021 First-party voice channel added to Dynamics 365.
2022 Announces Digital Contact Center Platform powered with Nuance AI, MS Teams, and Dynamics 365.
Microsoft is rapidly innovating in the customer experience technology marketspace. Alongside Dynamics 365’s omnichannel offering, Microsoft is building out its own native contact center platform. This will provide new opportunities for centralization without multivendor management between Dynamics 365, Microsoft Teams, and an additional third-party telephony or contact-center-as-a-service (CCaaS) vendor. SoftwareReviews reports suggest that Microsoft is a market leader in the area of product innovation for CSM, and this area of voice channel capability is where I see most industry interest.
Of course, Dynamics 365 is not a platform to get only for CSM functionality. Users will typically be a strong Microsoft shop already (using Dynamics 365 for customer relationship management) and are looking for native CSM features to enhance customer service workflow management and self-service.
Thomas Randall
Research Director, Info-Tech Research Group
Info-Tech Insight
Pricing for Microsoft Dynamics 365 is often contextualized to an organization’s needs. However, this can create complicated licensing structures. Two Info-Tech resources to assist are:
*This service may be used for other enterprise CSM providers too, including Salesforce, ServiceNow, SAP, and Oracle.
Contact your account manager to review your access to this service.
Est. 2010 | CA, USA | FRSH:NASDAQ
Bio
Freshworks' cloud-based customer support software, Freshdesk, makes customer happiness refreshingly easy. With powerful features, an easy-to-use interface, and a freemium pricing model, Freshdesk enables companies of all sizes to provide a seamless multichannel support experience across email, phone, web, chat, forums, social media, and mobile apps. Freshdesk’s capabilities include robust ticketing, SLA management, smart automations, intelligent reporting, and game mechanics to motivate agents.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2010
2011 Freshdesk forms a core component of product line.
2014 Raises significant capital in Series D round: $31M.
2016 Acquires Airwoot, enabling real-time customer support on social media.
2019 Raises $150M in Series H funding round.
2019 Acquires Natero, which predicts, analyzes, and drives customer behavior.
2021 Surpasses $300M in annual recurring revenues.
2021 Freshworks posts its IPO listing.
Freshworks stepped into the SaaS customer support marketspace in 2010 to attract dissatisfied Zendesk eSupport customers, following Zendesk’s large price increases that year (of 300%). After performing well during the pandemic, Freshworks has reinforced its global positioning in the CSM tool marketspace; SoftwareReviews data suggests Freshworks performs very well against its competitors for breadth and intuitiveness of its features.
Freshworks receives strong recommendations from Info-Tech’s members, boasting a broad product selection that enables opportunities for scaling and receiving a high rate of value return. Of note are Freshworks’ internal customer management solution and its native contact center offering, limiting multivendor management typically required for integrating separate IT service management (ITSM) and CCaaS solutions.
Thomas Randall
Research Director, Info-Tech Research Group
| Free | Growth | Pro | Enterprise |
|---|---|---|---|
|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 2006 | MA, USA | HUBS:NYSE
Bio
Help Scout is designed with your customers in mind. Provide email and live chat with a personal touch and deliver help content right where your customers need it, all in one place, all for one low price. The customer experience is simple and training staff is painless, but Help Scout still has all the powerful features you need to provide great support at scale. With best-in-class reporting, an integrated knowledge base, 50+ integrations, and a robust API, Help Scout lets your team focus on what really matters: your customers.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2011
2015 Raised $6M in Series A funding.
2015 Rebrands from Brightwurks to Help Scout.
2015 Named by Appstorm as one of six CSM tools to delight Mac users.
2016 iOS app released.
2017 Android app released.
2020 All employees instructed to work remotely.
2021 Raises $15M in Series B funding.
Help Scout provides a simplified, standalone CSM tool that operates like a shared email inbox. Best suited for mid-sized organizations, customers can expect live chat, in-app messaging, and knowledge-base functionality. A particular strength is Help Scout’s integration capabilities, with a wide range of CRM, eCommerce, marketing, and communication APIs available. This strength is also reflected in the data: SoftwareReviews lists Help Scout as first in its CSM category for ease of data integrations.
Customers who are expecting a broader range of channels (including voice, video cobrowsing, and so on) will not find good return on investment with Help Scout. However, for mid-sized organizations looking to begin maturing their customer service management, Help Scout provides a strong foundation – especially for enhancing in-house collaboration between support staff.
Thomas Randall
Research Director, Info-Tech Research Group
| Standard | Plus | Pro |
|---|---|---|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 2006 | MA, USA | HUBS:NYSE
Bio
HubSpot’s Service Hub brings all your customer service data and channels together in one place and helps scale your support through automation and self-service. The result? More time for proactive service that delights, retains, and grows your customer base. HubSpot provides software and support to help businesses grow better. The overall platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths:
Areas to Improve:
History
Founded 2006
2013 Opens first international office in Ireland.
2014 First IPO listing on NYSE, raising $140M.
2015 Milestone for acquiring 15,000 customers
2017 Acquires Kemvi for AI and ML support for sales teams.
2019 Acquires PieSync for customer data synchronization.
2021 Yamini Rangan is announced as new CEO.
2021 Records $1B in revenues.
HubSpot is a competitive player in the enterprise sales and marketing technology market. Offering an all-in-one platform, HubSpot allows users to leverage its CRM, marketing solutions, content management tool, and CSM tool. Across knowledge management, contact center integration, and customer self-service, SoftwareReviews data pits HubSpot as performing better than its enterprise competitors.
While customers can leverage HubSpot’s CSM tool independently, watch out for scope creep. HubSpot’s other offerings are tightly integrated and module extensions could quickly add up in price. HubSpot may not be affordable for most regional, mid-sized organizations, and a poor ROI may be expected. For instance, the Pro plan is required to get a knowledge base, which is typically a standard CSM feature – yet the same plan also comes with multicurrency support, which could remain unleveraged.
Thomas Randall
Research Director, Info-Tech Research Group
| Free | Starter | Pro | Enterprise |
|---|---|---|---|
|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 1999 | CA, USA | CRM:NYSE
Bio
Service Cloud customer service software gives you faster, smarter customer support. Salesforce provides customer relationship management software and applications focused on sales, customer service, marketing automation, analytics, and application development.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths:
Areas to Improve:
History
Founded 1999
2000 Salesforce launches its cloud-based products.
2003 The first Dreamforce (a leading CX conference) happens.
2005 Salesforce unveils AppExchange.
2013 Salesforce acquires ExactTarget and expands Marketing Cloud offering.
2016 Salesforce acquires Demandware, launches Commerce Cloud.
2019 Salesforce acquires Tableau to expand business intelligence capabilities.
2021 Salesforce buys major collaboration vendor Slack.
Salesforce was an early disruptor in CRM marketspace, placing a strong emphasis on a SaaS delivery model and end-user experience. This allowed Salesforce to rapidly gain market share at the expense of complacent enterprise application vendors. A series of savvy acquisitions over the years has allowed Salesforce to augment its core Sales and Service Clouds with a wide variety of other solutions, from ecommerce to marketing automation – and recently Slack for internal collaboration.
Salesforce Service Cloud Voice is now available to take advantage of integrating telephony and voice channels into your CRM. This service is still maturing, though, with Salesforce selecting Amazon Connect as its preferred integrator. However, Connect is not necessarily plug-and-play – it is a communications platform as a service, requiring you to build your own contact center solution. This is either a fantastic opportunity for creativity or a time suck of already tied-up resources.
Thomas Randall
Research Director, Info-Tech Research Group
| Service Cloud Essentials | Service Cloud Professional | Service Cloud Enterprise | Service Cloud Unlimited |
|---|---|---|---|
|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 2007 | CA, USA | ZEN:NYSE
Bio
Zendesk streamlines your support with time-saving tools like ticket views, triggers, and automations. This helps you get straight to what matters most – better customer service and more meaningful conversations. Today, Zendesk is the champion of great service everywhere for everyone and powers billions of conversations, connecting more than 100,000 brands with hundreds of millions of customers over telephony, chat, email, messaging, social channels, communities, review sites, and help centers.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Enterprise Vendor Ranking
(out of 7)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2007
2008 Initial seed funding of $500,000.
2009 Receives $6M through Series B Funding.
2009 Relocates from Copenhagen to San Francisco.
2014 Acquires Zopin Technologies.
2014 Listed on NYSE.
2015 Acquires We Are Cloud SAS.
2018 Launches Zendesk Sell.
Zendesk is a global player in the CSM tool marketspace and works with enterprises across a wide variety of industries. Unlike some other CSM players, Zendesk provides more service channels at its lowest licensing offer, affording organizations a quicker expansion in customer service delivery without making enterprise-grade investments. However, the price of the lowest licensing offer starts much higher than Zendesk’s competitors; organizations will need to consider if the cost to try Zendesk over an annual contract is within budget.
Unfortunately, SoftwareReviews data suggests that Zendesk may not always provide that immediate value, especially to mid-sized organizations. Zendesk is rated lower for vendor support and business value created. However, Zendesk provides strong functionality that competes with other enterprise players, and mid-sized organizations are continually impressed with Zendesk’s automation workflows.
Thomas Randall
Research Director, Info-Tech Research Group
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
| Team | Growth | Pro |
|---|---|---|
|
|
|
Est. 2002 | Poland | WSE:LVC
Bio
Manage all emails from customers in one app and save time on customer support. LiveChat is a real-time live-chat software tool for ecommerce sales and support that is helping ecommerce companies create a new sales channel. It serves more than 30,000 businesses in over 150 countries, including large brands like Adobe, Asus, LG, Acer, Better Business Bureau, and Air Asia and startups like SproutSocial, Animoto, and HasOffers.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Midmarket Vendor Ranking
(out of 8)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 2002
2006 50% of company stock bought by Capital Partners.
2008 Capital Partners sells entire stake to Naspers.
2011 LiveChat buys back majority of stakeholder shares.
2013 Listed by Red Herring in group of most innovative companies across Europe.
2014 Listed on Warsaw Stock Exchange.
2019 HelpDesk is launched.
2020 Offered services for free to organizations helping mitigate the pandemic.
LiveChat’s HelpDesk solution for CSM is a relatively recent solution (2019) that is proving very popular for small to mid-sized businesses (SMBs) – especially across Western Europe. SoftwareReviews’ data shows that HelpDesk is well-rated for breadth of features, usability and intuitiveness, and rate of improvement. Indeed, LiveChat has won and been shortlisted for several awards over the past decade for customer feedback, innovation, and fast growth to IPO.
When shortlisting LiveChat’s HelpDesk, SMBs should be careful of scope creep. LiveChat offers a range of other solutions that are intended to work together. The LiveChat self-titled product is designed to integrate with HelpDesk to provide ticketing, email management, and chat management. Moreover, LiveChat’s AI-based ChatBot (for automated webchat) comes with additional cost (starting at $52 team/month).
Thomas Randall
Research Director, Info-Tech Research Group
| Team Plan | Enterprise |
|---|---|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
Est. 1996 | India | Privately Owned
Bio
SupportCenter Plus is a web-based customer support software that lets organizations effectively manage customer tickets, their account and contact information, and their service contracts, and in the process provide a superior customer experience. ManageEngine is a division of Zoho.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Midmarket Vendor Ranking
(out of 8)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 1996
2002 Branches from Zoho to become division focused on IT management.
2004 Becomes an authorized MySQL Partner.
2009 Begins shift of offerings into the cloud.
2010 Tops 35,000 customers.
2011 Integration with Zoho Assist.
2015 Integration with Zoho Reports.
ManageEngine, as a division of Zoho, has its strengths in IT operations management (ITOM). SupportCenter thus scores well in our SoftwareReviews data for ease of customization, implementation, and administration. As ManageEngine is a frequently discussed low-cost vendor in the ITOM market, customers often get good scalability across IT, sales, and marketing teams. Although SupportCenter is aimed at the midmarket and is low cost, organizations have the benefit of ManageEngine’s global presence and backing by Zoho for viability.
However, because ManageEngine’s focus is ITOM, the breadth and quality of features for SupportCenter are not rated as well compared to its competitors. These features may be “good enough,” but usability and intuitiveness is not scored high. Organizations thinking about SupportCenter are recommended to identify their high-value use cases and perform user acceptance testing before adopting.
Thomas Randall
Research Director, Info-Tech Research Group
| Standard* | Pro* | Enterprise* |
|---|---|---|
|
|
|
*Pricing unavailable. Request quote.
See pricing on vendor’s website for latest information.
Est. 1996 | India | Privately Owned
Bio
Use the power of customer context to improve agent productivity, promote self-service, manage cross-functional service processes, and increase customer happiness. Zoho offers beautifully smart software to help you grow your business. With over 80 million users worldwide, Zoho's 55+ products (including Zoho Desk) aid your sales and marketing, support and collaboration, finance, and recruitment needs – letting you focus only on your business.
Offices
Stated Industry Specializations
SoftwareReviews’ CSM Midmarket Vendor Ranking
(out of 8)
Likeliness to Recommend
Plan to Renew
Satisfaction That Cost Is Fair Relative to Value
Strengths
Areas to Improve
History
Founded 1996
2001 Expands into Japan and shifts focus to SMBs.
2006 Zoho CRM is launched, alongside first Office suite.
2008 Reaches 1M users.
2009 Rebrands from AdventNet to Zoho Corp.
2011 Zoho Desk is built and launched.
2017 Zoho One, a suite of applications, is launched.
2020 Reaches 50M users.
Zoho Desk is one of the highest scoring CSM tool providers for likelihood to renew and recommend (98% and 90%, respectively). A major reason is that users receive a broad range of functionality for a lower-cost price model. There is also the capacity to scale with Zoho Desk as midmarket customers expand; companies can grow with Zoho and can receive high return on investment in the process.
However, while Zoho Desk can be used as a standalone CSM tool, there is danger of scope creep with other Zoho products. Zoho now has 50+ applications, all tied into one another. For Zoho Desk, customers may also lean into Zoho Assist (for troubleshooting customer problems via remote access) and Zoho Lens (for reality-based remote assistance, typically for plant machinery or servers). Consequently, customers should keep an eye on business value created if the scope of CSM grows wider.
Thomas Randall
Research Director, Info-Tech Research Group
| Standard | Pro | Enterprise |
|---|---|---|
|
|
|
*Pricing correct as of November 2022. Listed in USD and absent discounts.
See pricing on vendor’s website for latest information.
In this trends and buyer’s guide for CSM tool selection, we engaged in several activities to:
The result:
If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
Governance and Management of Enterprise Software Implementation
The Rapid Application Selection Framework
Build a Strong Technology Foundation for Customer Experience Management
Capers, Zach. “How the Pandemic Changed Customer Attitudes Toward Biometric Technology.” GetApp, 21 Feb. 2022. Accessed Nov. 2022.
Gomez, Jenny. “The Good, the Bad, and the Ugly: A History of Customer Service.” Lucidworks, 15 Jul. 2021. Accessed Nov. 2022.
Hoory. “History of Customer Service: How Did It All Begin?” Hoory, 24 Mar. 2022. Accessed Nov. 2022.
Patel, Snigdha. “Top 10 Customer Service Technology Trends to Follow in 2022.” Reve Chat, 21 Feb. 2021. Accessed Nov. 2022.
RingCentral. “The 2020 Customer Communications Review: A Survey of How Consumers Prefer to Communicate with Businesses.” RingCentral, 2020. Accessed Nov. 2022.
Robinson-Yu, Sarah. “What is a Knowledgebase? How Can It Help my Business?” Vanilla, 25 Feb. 2022. Accessed Nov. 2022.
Salesforce. “The Complete History of CRM.” Salesforce, n.d. Accessed Nov. 2022.
Salesforce. “State of the Connected Customer.” 5th ed. Salesforce, 2022. Accessed Nov. 2022.
Sprinklr. “How AzkoNobel UK Reduced Response Times and Increased Engagement.” Sprinklr, 2021. Accessed Nov. 2022.
Vermes, Krystle. “Study: 70% of Marketers Using Advanced Personalization Seeing 200% ROI.” KoMarketing, 2 Jun. 2020. Accessed Nov. 2022.
Colin Taylor
CEO
The Taylor Reach Group
Recognized as one of the leading contact/call center pioneers and experts, Colin has received 30 awards on two continents for excellence in contact center management and has been acknowledged as a leader and influencer on the topics of call/contact centers, customer service, and customer experience, in published rankings on Huffington Post, Call Center Helper, and MindShift. Colin was recognized as number 6 in the global 100 for customer service.
The Taylor Reach Group is a contact center, call center and customer experience (CX) consultancy specializing in CX consulting and call and contact center consulting, management, performance, technologies, site selection, tools, training development and center leadership training, center audits, benchmarking, and assessments.
David Thomas
Customer Service Specialist
Freedom Mobile
David Thomas has both managerial and hands-on experience with delivering quality service to Freedom Mobile customers. With several years being involved in training customer support and being at the forefront of retail during the pandemic, David has witnessed first-hand how to incentivize staff with the right metrics that create positive experiences for both staff and customers.
Freedom Mobile Inc. is a Canadian wireless telecommunications provider owned by Shaw Communications. It has 6% market share of Canada, mostly in urban areas of Ontario, British Columbia, and Alberta. Freedom Mobile is the fourth-largest wireless carrier in Canada.
A special thanks to three other anonymous contributors, all based in customer support and contact center roles for Canada’s National Park Booking Systems’ software provider.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The Launch the Project phase will walk through completing Info-Tech's project charter template. This phase will help build a balanced project team, create a change message and communication plan, and achieve buy-in from key stakeholders.
The Identify and Define Enterprise Services phase will help to target enterprise services offered by the IT team. They are offered to everyone in the organization, and are grouped together in logical categories for users to access them easily.
After completing this phase, all services IT offers to each LOB or functional group should have been identified. Each group should receive different services and display only these services in the catalog.
Completing the Services Definition Chart will help the business pick which information to include in the catalog. This phase also prepares the catalog to be extended into a technical service catalog through the inclusion of IT-facing fields.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
The purpose of this module is to help engage IT with business decision making.
This module will help build a foundation for the project to begin. The buy-in from key stakeholders is key to having them take onus on the project’s completion.
1.1 Assemble the project team.
1.2 Develop a communication plan.
1.3 Establish metrics for success.
1.4 Complete the project charter.
A list of project members, stakeholders, and a project leader.
A change message, communication strategy, and defined benefits for each user group.
Metrics used to monitor the usefulness of the catalog, both from a performance and monetary perspective.
A completed project charter to engage users in the initiative.
The purpose of this module is to review services which are offered across the entire organization.
A complete list of enterprise services defined from the user’s perspective to help them understand what is available to them.
2.1 Identify enterprise services used by almost everyone across the organization.
2.2 Categorize services into logical groups.
2.3 Define the services from the user’s perspective.
A complete understanding of enterprise services for both IT service providers and business users.
Logical groups for organizing the services in the catalog.
Completed definitions in business language, preferably reviewed by business users.
The purpose of this module is to define the remaining LOB services for business users, and separate them into functional groups.
Business users are not cluttered with LOB definitions that do not pertain to their business activities.
Business users are provided with only relevant IT information.
3.1 Identify the LOBs.
3.2 Determine which one of two methodologies is more suitable.
3.3 Identify LOB services using appropriate methodology.
3.4 Define services from a user perspective.
A structured view of the different functional groups within the business.
An easy to follow process for identifying all services for each LOB.
A list of every service for each LOB.
Completed definitions in business language, preferably reviewed by business users.
The purpose of this module is to guide the client to completing their service record definitions completely.
This module will finalize the deliverable for the client by defining every user-facing service in novice terms.
4.1 Understand the components to each service definition (information fields).
4.2 Pick which information to include in each definition.
4.3 Complete the service definitions.
A selection of information fields to be included in the service catalog.
A selection of information fields to be included in the service catalog.
A completed service record design, ready to be implemented with the right tool.
The catalog defines, documents, and organizes the services that IT delivers to the organization. The catalog also describes the features of the services and how the services are intended to be used.
The user-facing service catalog creates benefits for both the business and IT.
User-friendly, intuitive, and simple overview of the services that IT provides to the business.
The items you would see on the menu at a restaurant are an example of User Facing. The content is relatable and easy to understand.
Series of technical workflows, supporting services, and the technical components that are required to deliver a service.
The recipe book with cooking instructions is an example of Technical Facing. This catalog is intended for the IT teams and is “behind the scene.”
The sum of the people, processes, and technologies required to enable users to achieve a business outcome is a Service.
A service is used directly by the end users and is perceived as a coherent whole.
Business Users →Service = Application & Systems + People & Processes
In other words, put on your user hat and leave behind the technical jargons!
|
|
|
|
23% of IT is still viewed as a cost center. |
47% of business executives believe that business goals are going unsupported by IT. |
92% of IT leaders see the need to prove the business value of IT’s contribution. |
|
How a Service Catalog can help: |
||
|---|---|---|
|
Use the catalog to demonstrate how IT is an integral part of the organization and IT services are essential to achieve business objectives. |
Transform the perception of IT by articulating all the services that are provided through the service catalog in a user-friendly language. Source: Info-Tech Benchmarking and Diagnostic Programs |
Increase IT-business communication and collaboration through the service catalog initiative. Move from technology focused to service-oriented. |
The team must be balanced between representatives from the business and IT.
Communication plan to facilitate input from both sides and gain adoption.
Metrics should reflect the catalog benefits. Look to reduced number of service desk inquiries.
Project charter helps walk you through project preparation.
2.1 Identify the services that are used across the entire organization.
2.2 Users must be able to identify with the service categories.
2.3 Create basic definitions for enterprise services.
3.1 Identify the different lines of business (LOBs) in the organization.
3.2 Understand the differences between our two methodologies for identifying LOB services.
3.3 Use methodology 1 if you have thorough knowledge of the business.
3.4 Use methodology 2 if you only have an IT view of the LOB.
4.1 Understand the different components to each service definition, or the fields in the service record.
4.2 Identify which information to include for each service definition.
4.3 Define each enterprise service according to the information and field properties.
4.3 Define each LOB service according to the information and field properties.
Trying to implement too many services at once can be overwhelming for both IT and the users. You don’t have to define and implement all of your services in one release of the catalog.
Info-Tech recommends implementing services themselves in batches, starting with enterprise, and then grouping LOB services into separate releases. Why? It benefits both IT and business users:
Improve IT’s visibility within the organization by creating a single source of information for all the value creating services IT has to offer. The service catalog helps the business understand the value IT brings to each service, each line of business, and the overall organization.
The service catalog contains information which empowers business users to access IT services and information without the help of IT support staff. The reduction in routine inquiries decreases workload and increases morale within the IT support team, and allows IT to concentrate on providing higher value services.
Service catalog brings more control to your IT environment by reducing shadow IT activities. The service catalog communicates business requests responsively in a language the business users understand, thus eliminating the need for users to seek outside help.
The language of IT is often confusing for the business and the users don’t know what to do when they have a concern. With a user-facing service catalog, business users can access information through a single source of information, and better understand how to request access or receive support for a service through clear, consistent, and business-relevant language.
The service catalog enables users to “self-serve” IT services. Instead of calling the service desk every time an issue occurs, the users can rely on the service catalog for information. This simplified process not only reduces routine service requests, but also provides information in a faster, more efficient manner that increases productivity for both IT and the business.
With every service clearly defined, business users can better understand the current support level, communicate their expectation for IT accountability, and help IT align services with critical business strategies.
A project charter template with a few samples completed. The project charter helps you govern the project progress and responsibilities.
A full list of enterprise definitions with features and descriptions pre-populated. These are meant to get you on your feet defining your own enterprise services, or editing the ones already there.
Similar to the enterprise services deliverable, but with two separate deliverables focusing on different perspectives – functional groups services (e.g. HR and finance) and industry-specific services (e.g. education and government).
Get a taste of a completed service catalog with full service definitions and service record design. This is the final product of the service catalog design once all the steps and activities have been completed.
Need an IT-friendly breakdown of each service?
Keep better record of what technical components are required to deliver a service. The technical service catalog is the IT version of a user-facing catalog.
Want to know how much each IT service is costing you?
Get a better grip on the true cost of IT. Using service-based costing can help justify IT expenses and increase budgetary allotment.
Want to hold each business unit accountable for the IT services they use?
Some business units abuse their IT services because they are thought to be free. Keep them accountable and charge them for what they use.
No matter what size organization you may be, every organization can create a service catalog. Small businesses can benefit from the catalog the same way a large organization can. We have an easy step-by-step methodology to help introduce a catalog to your business.
It is common that users do not know where to go to obtain services from IT… We always end up with a serious time-crunch at the beginning of a new school year. With automated on- and off-boarding services, this could change for the better.
– Dean Obermeyer, Technology Coordinator, Los Alamos Public Schools
As the CIO and the project sponsor, you need to spearhead the development of the service catalog and communicate support to drive engagement and adoption.
The project leader acts on behalf of the CIO and must be a senior level staff member who has extensive knowledge of the organization and experiences marshalling resources.
Developing a service catalog requires dedication from many groups within IT and outside of IT.
The project leader must hold a visible, senior position and can marshal all the necessary resources to ensure the success of the project. Ability to exert impact and influence around both IT and the business is a must.
The user-facing service catalog cannot be successful if business input is not received.
The project leader must leverage his/her existing relationship with the business to test out the service definitions and the service record design.
Creating a service catalog is not an easy job and the project leader must continuously engage the team members to drive results and efficiency.
The highly visible nature of the service catalog means the project leader must produce a high-quality outcome that satisfies the business users.
Municipal Government
The IT department of a large municipal government in the United States provides services to a large number of customers in various government agencies.
Service Catalog Initiative
The municipal government allocated a significant amount of resources to answer routine inquiries that could have been avoided through user self-service. The government also found that they do not organize all the services IT provides, and they could not document and publish them to the customer. The government has already begun the service catalog initiative, but was struggling with how to identify services. Progress was slow because people were arguing amongst themselves – the project team became demoralized and the initiative was on the brink of failure.
Results
With Info-Tech’s onsite support, the government was able to follow a standardized methodology to identify and define services from the user perspective. The government was able to successfully communicate the initiative to the business before the full adoption of the service catalog.
We’re in demos with vendors right now to purchase an ITSM tool, and when the first vendor looked at our finished catalog, they were completely impressed.
- Client Feedback
[We feel] very confident. The group as a whole is pumped up and empowered – they're ready to pounce on it. We plan to stick to the schedule for the next three months, and then review progress/priorities. - Client Feedback
Healthcare Provider
The organization is a healthcare provider in Canada. It treats patients with medical emergencies, standard operations, and manages a faculty of staff ranging from nurses and clerks, to senior doctors. This organization is run across several hospitals, various local clinics, and research centers.
Service Catalog Initiative
Because the organization is publicly funded, it is subject to regular audit requirements – one of which is to have a service catalog in place.
The organization also would like to charge back its clients for IT-related costs. In order to do this, the organization must be able to trace it back to each service. Therefore, the first step would be to create a user-facing service catalog, followed by the technical service catalog, which then allows the organization to do service-based costing and chargeback.
Results
By leveraging Info-Tech’s expertise on the subject, the healthcare provider was able to fast-track its service catalog development and establish the groundwork for chargeback abilities.
"There is always some reticence going in, but none of that was apparent coming out. The group dynamic was very good. [Info-Tech] was able to get that response, and no one around the table was silent.
The [expectation] of the participants was that there was a purpose in doing the workshop. Everybody knew it was for multiple reasons, and everyone had their own accountability/stakes in the development of it. Highly engaged." - Client Feedback
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
|
Launch the Project |
Identify Enterprise Services |
Identify Line of Business Services |
Complete Service Definitions |
|
|---|---|---|---|---|
| Best-Practice Toolkit |
1.1 Assemble the project team. 1.2 Develop a communication plan. 1.3 Establish metrics for success. 1.4 Complete the project charter. |
2.1 Identify services available organization-wide. 2.2 Categorize services into logical groups. 2.3 Define the services. |
3.1 Identify different LOBs. 3.2 Pick one of two methodologies. 3.3 Use method to identify LOB services. |
4.1 Learn components to each service definition. 4.2 Pick which information to include in each definition. 4.3 Define each service accordingly. |
| Guided Implementations | Identify the project leader with the appropriate skills.
Assemble a well-rounded project team. Develop a mission statement and change messages. |
Create a comprehensive list of enterprise services that are used across the organization.
Create a categorization scheme that is based on the needs of the business users. |
Walk through the two Info-Tech methodologies and understand which one is applicable. Define LOB services using the appropriate methodology. |
Decide what should be included and what should be kept internal for the service record design. Complete the full service definitions. |
| Onsite Workshop | Phase 1 Results: Clear understanding of project objectives and support obtained from the business. |
Phase 2 Results: Enterprise services defined and categorized. |
Phase 3 Results: LOB services defined based on user perspective. |
Phase 4 Results: Service record designed according to how IT wishes to communicate to the business. |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|
| Activities | Launch the Project | Identify Enterprise Services | Identify Line of Business Services | Complete Service Definitions |
1.1 Assemble the project team. 1.2 Develop a communication plan. 1.3 Establish metrics for success. 1.4 Complete the project charter. | 2.1 Identify services available organization-wide. 2.2 Categorize services into logical groups. 2.3 Define the services. | 3.1 Identify different LOBs. 3.2 Pick one of two methodologies. 3.3 Use method to identify LOB services. | 4.1 Learn components to each service definition. 4.2 Pick which information to include in each definition. 4.3 Define each service accordingly. | |
| Deliverables |
|
|
|
|
Design & Build a User-Facing Service Catalog
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 1: Launch the project Proposed Time to Completion: 2 weeks |
|
|---|---|
| Step 1.2: Create change messages |
Step 1.2: Create change messages |
|
Start with an analyst kick off call:
|
Review findings with analyst:
|
|
Then complete these activities… |
Then complete these activities… |
|
With these tools & templates: Service Catalog Project Charter |
With these tools & templates: Service Catalog Project Charter |
The following section of slides outline how to effectively use Info-Tech’s sample project charter.
The Project Charter is used to govern the initiative throughout the project. IT should provide the foundation for project communication and monitoring.
It has been pre-populated with information appropriate for Service Catalog projects. Please review this sample text and change, add, or delete information as required.
Building the charter as a group will help you to clarify your key messages and help secure buy-in from critical stakeholders upfront.
You may feel like a full charter isn’t necessary, and depending on your organizational size, it might not be. However, the exercise of building the charter is important none-the-less. No matter your current climate, some elements of communicating the value and plans for implementing the catalog will be necessary.
Use Info-Tech’s Service Catalog Project Charter.
Good mission statements are directive, easy to understand, narrow in focus, and favor substance over vagueness.
While building your mission statement, think about what it is intended to do, i.e. keep the project team engaged and engage others to adopt the service catalog. Included in the project charter’s mission statement section is a brief description of the goals and objectives of the service catalog.
Info-Tech’s project charter contains two sample mission statements, along with additional tips to help you create yours.
Project leader will be the main catalyst for the creation of the catalog. This person is responsible for driving the whole initiative.
IT project participants’ input and business input will be pivotal to the creation of the catalog.
The project stakeholders are the senior executives who have a vested interest in the service catalog. IT must produce periodic and targeted communication to these stakeholders.
Your project team will be a major success factor for your service catalog. Involvement from IT management and the business is a must.
IT Service Desk Manager
Senior Manager/Director of Application
Senior Manager/Director of Infrastructure
Business IT Liaison
Business representatives from different LOBs
Input your project team, their roles, and relevant contact information into your project charter, Section 2.
Obtain explicit buy-in from both IT and business stakeholders.
The stakeholders could be your biggest champions for the service catalog initiative, or they could pull you back significantly. Engage the stakeholders at the start of the project and communicate the benefits of the service catalog to them to gain their approval.
| Stakeholders |
Benefits |
|---|---|
| CIO |
|
|
Manager of Service Desk |
|
|
Senior Manager/Director of Application & Infrastructure |
|
|
Senior Business Executives from Major LOBs |
|
Document a list of stakeholders, their involvement in the process (why they are stakeholders), and their contact information in Section 3.
Spread the word of service catalog implementation. Bring attention to your change message through effective mediums and organizational changes.
The methods of communication (e.g. newsletters, email broadcast, news of the day, automated messages) notify users of implementation.
In addition, it is important to know who will deliver the message (delivery strategy). Talking to the business leaders is very important, and you need IT executives to deliver the message. Work hard on obtaining their support as they are the ones communicating to their staff and could be your project champions.
The communication plan should consist of changes that will affect the way users interact with the catalog. Users should know of any meetings pertinent to the maintenance and improvement of the catalog, and ways to access the catalog (e.g. link on desktop/start menu).
The Qualities of Leadership: Leading Change
Your communication plan should serve as a rough guide. Communication happens in several unpredictable happenstances, but the overall message should be contained within.
One of the top challenges for organizations that are implementing a service catalog is the acceptance and adoption of the change. Effective planning for implementation and communication is pivotal. Ensure you create tailored plans for communication and understand how the change will impact staff.
“Better Service, Better Value.” It is important to have two change messages prepared: one for the IT department and one for business users.
Outline a few of the key benefits each user group will gain from adopting the service catalog (e.g. Faster, ease of use, convenient, consistent…)
Anticipate some resistances of service catalog adoption and prepare responses. These may be the other benefits which were not included in the change message (e.g. IT may be reluctant to think in business language.)
Host lunch & learns to demonstrate the value of the service catalog to both business and IT user groups.
These training sessions also serve as a great way to gather feedback from users regarding style and usability.
Pick your communication medium, and then identify your target audience. You should have a change message for each: the IT department and the business users. Pay careful consideration to wording and phrasing with regard for each.
In order to measure the success of your service catalog, you must establish baseline metrics to determine how much value the catalog is creating for your business.
The number of service catalog requests should be carefully monitored so that it does not fluctuate too greatly. In general, the number of requests via the service catalog should increase, which indicates a higher level of self-serve.
The number of inquiry calls should decrease because customers are able to self-serve routine IT inquiries that would otherwise have gone through the service desk.
The organization could adopt the following sample survey questions:
From 0-5: How satisfied are you with the functionality of the service catalog? How often do you turn to the service catalog first to solve IT problems?
The number of non-standard requests should decrease because a majority of services should eventually be covered in the service catalog. Users should be able to solve nearly any IT related problem through navigating the service catalog.
| Metric Description | Current Metric | Future Goal |
|---|---|---|
| Number of service requests via the Service Catalog | ||
| Number of inquiry calls to the service desk | ||
| Customer Satisfaction – specific question | ||
| Number of non-standard requests |
When measuring against your baseline, you should expect to see the following two monetary improvements:
(# of routine inquiry calls reduced) x (average time for a call) x (average service desk wage)
Routine inquiries often take up a significant portion of the service desk’s effort, and the majority of them can be answered via the service catalog, thus reducing the amount of time required for a service desk employee to engage in routine solutions. The reduction in routine inquiries allows IT to allocate resources to high-value services and provide higher quality of support.
Originally, the service desk of an organization answers 850 inquiries per month, and around 540 of them are routine inquiries requesting information on when a service is available, who they can contact if they want to receive a service, and what they need to do if they want access to a service, etc.
IT successfully communicated the introduction of the service catalog to the business and 3 months after the service catalog was implemented, the number of routine inquiries dropped to 60 per month. Given that the average time for IT to answer the inquiry is 10 minutes (0.167 hour) and the hourly wage of a service desk technician is $25, the monthly monetary cost saving of the service catalog is:
(540 – 60) x 0.167 x 25 = $2004.00
(Average additional cost of non-standard request) x (Reduction of non-standard request)
+
(Extra time IT spends on non-standard request fulfilment) x (Average wage)
Non-standard requests require a lot of time, and often a lot of money. IT frequently incurs additional cost because the business is not aware of how to properly request service or support. Not only can the service catalog standardize and streamline the service request process, it can also help IT define its job boundary and say no to the business if needed.
The IT department of an organization often finds itself dealing with last-minute, frustrating service requests from the business. For example, although equipment requests should be placed a week in advance, the business often requests equipment to be delivered the next day, leaving IT to pay for additional expedited shipping costs and/or working fanatically to allocate the equipment. Typically, these requests happen 4 times a month, with an additional cost of $200.00. IT staff work an extra 6 hours per each non-standard request at an hourly wage of $30.00.
With the service catalog, the users are now aware of the rules that are in place and can submit their request with more ease. IT can also refer the users to the service catalog when a non-standard request occurs, which helps IT to charge the cost to the department or not meet the terms of the business.
The monthly cost saving in this case is:
$200.00 x 4 + 6 hours x 30 = $980.00
The project charter is an important document to govern your project process. Support from the project sponsors is important and must be documented. Complete the following steps working with Info-Tech’s sample Project Charter.
The nature of government IT is quite complex: there are several different agencies located in a number of different areas. It is extremely important to communicate the idea of the service catalog to all the users, no matter the agency or location.
The IT department had yet to let business leaders of the various agencies know about the initiative and garner their support for the project. This has proven to be prohibitive for gaining adoption from all users.
The IT leaders met and identified all the opportunities to communicate the service catalog to the business leaders and end users.
To meet with the business leaders, IT leaders hosted a service level meeting with the business directors and managers. They adopted a steering committee for the continuation of the project.
To communicate with business users, IT leaders published announcements on the intranet website before releasing the catalog there as well.
Because IT communicated the initiative, support from business stakeholders was obtained early and business leaders were on board shortly after.
IT also managed to convince key business stakeholders to become project champions, and leveraged their network to communicate the initiative to their employees.
With this level of adoption, it meant that it was easier for IT to garner business participation in the project and to obtain feedback throughout.
The project received buy-in from the CIO and director of infrastructure. Together they assembled a team and project leader.
The two struggled to get buy-in from the rest of the team, however. They didn’t understand the catalog or its benefits and objectives. They were reluctant to change their old ways. They didn’t know how much work was required from them to accomplish the project.
With the Info-Tech analyst on site, the client was able to discuss the benefits within their team as well as the project team responsibilities.
The Info-Tech analyst convinced the group to move towards focusing on a business- and service-oriented mindset.
The workshop discussion was intended to get the entire team on board and engaged with meeting project objectives.
The project team had experienced full buy-in after the workshop. The CIO and director relived their struggles of getting project members on-board through proper communication and engagement.
Engaging the members of the project team with the discussion was key to having them take ownership in accomplishing the project.
The business users understood that the service catalog was to benefit their long-term IT service development.
| The following are sample activities that will be conducted by Info-Tech analysts with your team: | ||
|---|---|---|
| 1.1 |
|
Begin your project with a mission statement A strong mission statement that outlines the benefits of the project is needed to communicate the purpose of the project. The onsite Info-Tech analysts will help you customize the message and establish the foundation of the project charter. |
| 1.2 |
|
Identify project team members Our onsite analysts will help you identify high-value team members to contribute to this project. |
| 1.3 |
|
Identify important business and IT stakeholders Buy-in from senior IT and business management is a must. Info-Tech will help you identify the stakeholders and determine their level of influence and impact. |
| 1.4 |
|
Create a change message for the business and IT It is important to communicate changes early and the message must be tailored for each target audience. Our analysts will help you create an effective message by articulating the benefits of the service catalog to the business and to IT. |
| 1.5 |
|
Determine service project metrics To demonstrate the value of the service catalog, IT must come up with tangible metrics. Info-Tech’s analysts will provide some sample metrics as well as facilitate a discussion around which metrics should be tracked and monitored. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 2: Define Enterprise Services Proposed Time to Completion: 4 weeks | |
|---|---|
Step 2.1: Identify enterprise services | Step 2.2: Create service categories |
Start with an analyst kick off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates: Service Sample Enterprise Services | With these tools & templates: Sample Enterprise Services |
Documentation of all business-facing IT services is an intimidating task, and a lack of parameters around this process often leads to longer project times and unsatisfactory outcomes.
To streamline this process, separating enterprise services from line of business services allows IT to effectively and efficiently organize these services. This method increases the visibility of the service catalog through user-oriented communication plans.
If you are unsure whether a service is enterprise wide, ask yourself these two questions:
Included with this blueprint is Info-Tech’s Sample Enterprise Services definitions.
The sample contains dozens of services common across most organizations; however, as a whole, they are not complete for every organization. They must be modified according to the business’ needs. Phase two will serve as a guide to identifying an enterprise service as well as how to fill out the necessary fields.
Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.
The next slide will introduce you to the information for each service record that can be edited.
Below is an example of a service record and its necessary fields of information. This is information that can be kept, deleted, or expanded upon.
|
Name the service unambiguously and from the user’s perspective. |
Brief description of how the service allows users to perform tasks. |
Describe the functionality of the service and how it helps users to achieve their business objectives. |
Cluster the services into logical groups. |
| Service Name | Description | Features | Category |
|---|---|---|---|
| Email communication to connect with other employees, suppliers, and customers |
|
Communications |
Web Conferencing has already been defined as a service. Is Audio Conferencing its own service or a feature of Web Conferencing?
Info-Tech Tip: Is Audio Conferencing run by the same application as the Web Conferencing? Does it use the same equipment? If not, Audio Conferencing is probably its own service.
Web Conferencing has already been defined as a service. Is “Screen Sharing” its own service or a feature of Web Conferencing?
Info-Tech Tip: It depends on how the user interacts with Screen Sharing. Do they only screen share when engaged in a Web Conference? If so, Screen Sharing is a feature and not a service itself.
VoIP is a popular alternative to landline telephone nowadays, but should it be part of the telephony service or a separate service?
Info-Tech Tip: It depends on how the VoIP phone is set up.
If the user uses the VoIP phone the same way they would use a landline phone – because the catalog is user facing – consider the VoIP as part of the telephone service.
If the user uses their computer application to call and receive calls, consider this a separate service on its own.
While there are some best practices for coming up with service definitions, it is not an exact science and you cannot accommodate everyone. When in doubt, think how most users would perceive the service.
You need to be as comprehensive as possible and try to capture the entire breadth of services IT provides to the business.
To achieve this, a three-step process is recommended.
IT Focus Group:
Have your user hat on when documenting service features and descriptions. Try to imagine how the users interact with each service.
Similar to the services and their features, there is no right or wrong way to categorize. The best approach is to do what makes sense for your organization and understand what your users think.
Categories organize services into logical groups that the users can identify with. Services with similar functions are grouped together in a common category.
| Enterprise Service Categories |
|---|
| Accounts and Access |
| Collaboration |
| Communication |
| Connectivity |
| Consulting |
| Desktop, Equipment, & Software |
| Employee Services |
| Files and Documents |
| Help & Support |
| Training |
Sample categories
There is no right or wrong way to categorize services; it is subjective to how they are provided by IT and how they are used by the business. Use the aforementioned categories to group the following services. Sample solutions are provided on the following slide.
| Service Name |
|---|
| Telephone |
| Remote access |
| Internet |
| BYOD (wireless access) |
| Instant Messaging |
| Video Conferencing |
| Audio Conferencing |
| Guest Wi-Fi |
| Document Sharing |
| Example 1 | Example 2 | ||
|---|---|---|---|
|
Desktop, Equipment, & Software Services |
Connectivity |
Mobile Devices |
Communications |
|
Internet |
Telephone |
BYOD (wireless access) |
Telephone |
|
Guest Wi-Fi |
Internet |
|
|
|
Remote Access |
Instant Messaging |
||
|
Video Conferencing |
|||
|
Audio Conferencing |
|||
| Communications |
Collaboration |
Storage and Retrieval |
Accounts and Access |
|
Telephone |
|
Document Sharing |
Remote access |
|
Instant Messaging |
Connectivity |
||
|
Mobile Devices |
Video Conferencing |
Internet | |
|
BYOD (wireless access) |
Audio Conferencing |
Guest Wi-Fi |
|
|
Guest Wi-Fi |
Document Sharing |
||
Services can have multiple categories only if it means the users will be better off. Try to limit this as much as possible.
Neither of these two examples are the correct answer, and no such thing exists. The answers you came up with may well be better suited for the users in your business.
Before you start, you must have a modified list of all defined enterprise services and a modified list of categories.
Because of the breadth of services IT provides across several agencies, it was challenging to identify what was considered enterprise beyond just the basic ones (email, internet, etc.)
IT recognized that although the specific tasks of service could be different, there are many services that are offered universally across the organization and streamlining the service request and delivery process would reduce the burden on IT.
The client began with services that users interact with on a daily basis; this includes email, wireless, telephone, internet, printing, etc.
Then, they focused on common service requests from the users, such as software and hardware provisioning, as well as remote access.
Lastly, they began to think of other IT services that are provided across the organization, such as RFP/RFI support, project management analysis, employee onboarding/off-boarding, etc.
By going through the lists and enterprise categories, the government was able to come up with a comprehensive list of all services IT provides to the business.
Classifying services such as onboarding meant that IT could now standardize IT services for new recruits and employee termination.
By capturing all enterprise services offered to the organization, IT centralized its management of services instead of having scattered request processes.
For some services, the project team had difficulty deciding on what was a service and what was a feature. They found it hard to distinguish between a service with features or multiple services.
For example, the client struggled to define the Wi-Fi services because they had many different user groups and different processes to obtain the service. Patients, visitors, doctors, researchers, and corporate employees all use Wi-Fi, but the service features for each user group were different.
The Info-Tech analyst came on-site and engaged the project team in a discussion around how the users would view the services.
The analyst also provided tips and techniques on identifying services and their features.
Because patients and visitors do not access Wi-Fi or receive support for the service in the same way as clinical or corporate employees, Wi-Fi was separated into two services (one for each user group).
Using the tips and techniques that were provided during the onsite engagement, the project team was able to have a high degree of clarity on how to define the services by articulating who the authorized users are, and how to access the process.
This allowed the group to focus on the users’ perspective and create clear, unambiguous service features so that users could clearly understand eligibility requirements for the service and how to request them.
| The following are sample activities that will be conducted by Info-Tech analysts with your team: | ||
|---|---|---|
| 2.1 |
|
Understand what enterprise services are The project team must have a clear understanding of what qualifies as an enterprise service. The onsite analysts will also promote a user-oriented mindset so the catalog focuses on business needs. |
| 2.2 |
|
Identify enterprise services The Info-Tech analysts will provide a list of ready-to-use services and will work with the project team to change, add, and delete service definitions and to customize the service features. |
| 2.3 |
|
Identify categories for enterprise services The Info-Tech analyst will again emphasize the importance of being service-oriented rather than IT-oriented. This will allow the group to come up with categories that are intuitive to the users. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Guided Implementation 3: Define LOB Services Proposed Time to Completion: 4 weeks | |
|---|---|
Step 3.1: Identify LOB services | Step 3.2: Define LOB services |
Start with an analyst kick off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates: Service LOB Services – Functional Group | With these tools & templates: LOB Services – Functional Group |
Within a business unit, there are user groups that use unique applications and IT services to perform business activities. IT must understand which group is consuming each service to document to their needs and requirements. Only then is it logical to group services into lines of business.
Covering every LOB service is a difficult task. Info-Tech offers two approaches to identifying LOB services, though we recommend working alongside business user groups to have input on how each service is used directly from the users. Doing so makes the job of completing the service catalog easier, and the product more detailed and user friendly.
Some helpful questions to keep in mind when characterizing user groups:
With business user input, you can answer questions as specific as “What requirements are necessary for IT to deliver value to each line of business?” and “What does each LOB need in order to run their operation?”
Business View is the preferred method for IT departments with a better understanding of business operations. This is because they can begin with input from the user, enabling them to more successfully define every service for each user group and LOB.
In addition, IT will also have a chance to work together with the business and this will improve the level of collaboration and communication. However, in order to follow this methodology, IT needs to have a pre-established relationship with the business and can demonstrate their knowledge of business applications.
The IT view begins with considering each business application used within the organization’s lines of business. Start with a broad view, following with a process of narrowing down, and then iterate for each business application.
This process leads to each unique service performed by every application within the business’ LOBs.
The IT view does not necessarily require a substantial amount of information about the business procedures. IT staff are capable of deducing what business users often require to maintain their applications’ functionality.
If you do have knowledge of business operations, using the business view is the better option and the service definition will be more relatable to the users.
For organizations that don’t have established relationships with the business or detailed knowledge of business activities, IT can decompose the application into services. They have more familiarity and comfort with the business applications than with business activities.
It is important to continue after the service is identified because it helps confirm and solidify the names and features. Determining the business activity and the user groups can help you become more user-oriented.
We will illustrate the two methodologies with the same example.
If you have established an ongoing relationship with the business and you are familiar with their business operations, starting with the LOB and user groups will ensure you cover all the services IT provides to the business and create more relatable service names.
If you want to understand what services IT provides to the Sales functional group, and you don’t have comprehensive knowledge of the department, you need to start with the IT perspective.
If you are concerned about the fact that people always associate a service with an application, you can include the application in the service name or description so users can find the service through a search function.
Like categories for enterprise services in Phase Two, LOB services are grouped into functional groups. Functional groups are the components of an organizational chart (HR, Finance, etc.) that are found in a company’s structure.
Functional groups enable a clear view for business users of what services they need, while omitting services that do not apply to them. This does not overwhelm them, and provides them with only relevant information.
To be clear, industry services can be put into functional groups.
Info-Tech provides a few sample industry services (without their functional group) to give an idea of what LOB service is specific to these industries. Try to extrapolate from these examples to create LOB services for your business.
Use Info-Tech’s Sample LOB Services – Functional Group and Sample LOB Services – Industry Specific documents.
Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.
Only perform this activity if you have a relationship with the business that can enable you to generate business input on service identifications and definitions.
In a group of your project participants, repeat the sequence for each LOB.
Only perform this activity if you cannot generate business input through your relationships, and must begin service definitions with business applications.
In a group of your project participants, repeat the sequence for each application.
→ Optional
Coming up with LOB service definitions is challenging for IT because it requires comprehension of all lines of business within the organization as well as direct interaction with the business users.
After completing the LOB service definitions, IT must talk to the business to ensure all the user groups and business activities are covered and all the features are accurate.
Here are some tips to reviewing your LOB Service Catalog generated content:
Go through the service in batches. Present 5-10 related services to the business first. Start with the service name and then focus on the features.
In the meeting, discuss whether the service features accurately sum up the business activities, or if there are missing key activities. Also discuss whether certain services should be split up into multiple services or combined into one.
There were many users from different LOBs, and IT provided multiple services to all of them. Tracking them and who had access to what was difficult.
IT didn’t understand who provided the services (service owner) and who the customers were (business owner) for some of the services.
After identifying the different Lines of Business, they followed the first approach (Business View) for those that IT had sufficient knowledge of in terms of business operations:
For the LOBs they weren’t familiar with, they used the IT view method, beginning with the application:
Through these two methodologies, IT was able to define services according to how the users both perceive and utilize them.
IT was able to capture all the services it provides to each line of business effectively without too much help from the business representatives.
By capturing all enterprise services offered to the organization, IT centralized its management of services instead of having scattered request processes.
Challenge
The organization uses a major application containing several modules used by different users for various business activities.
The challenge was to break down the application into multiple services in a way that makes sense to the business users. Users should be able to find services specific to them easily.
Therefore, the project team must understand how to map the modules to different services and user groups.
Solution
The project team identified the major lines of business and took various user groups such as nurses and doctors, figured out their daily tasks that require IT services, and mapped each user-facing service to the functionality of the application.
The project team then went back to the application to ensure all the modules and functionalities within the application were accounted for. This helped to ensure that services for all user groups were covered and prepared to be released in the catalog.
Results
Once the project team had come up with a comprehensive list of services for each line of business, they were able to sit with the business and review the services.
IT was also able to use this opportunity to demonstrate all the services it provides. Having all the LOB services demonstrates IT has done its preparation and can show the value they help create for the business in a language the users can understand. The end result was a strengthened relationship between the business and the IT department.
| The following are sample activities that will be conducted by Info-Tech analysts with your team: | ||
|---|---|---|
| 3.1 |
|
Understand what Line of Business services are The onsite analysts will provide a clear distinction between enterprise services and LOB services. The analysts will also articulate the importance of validating LOB services with the business. |
| 3.2 |
|
Identify LOB services using the business’ view There are two methods for coming up with LOB services. If IT has comprehensive knowledge of the business, they can identify the services by outlining the user groups and their business activities. |
| 3.3 |
|
Identify LOB services using IT’s view If IT does not understand the business and cannot obtain business input, Info-Tech’s analysts will present the second method, which allows IT to identify services with more comfortability through business applications/systems. |
| 3.4 |
|
Categorize the LOB services into functional groups The analysts will help the project team categorize the LOB services based on user groups or functional departments. |
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Guided Implementation 4: Complete service definitions | |
|---|---|
Step 4.1: Design service record | Step 4.2: Complete service definitions |
Start with an analyst kick off call:
| Review findings with analyst:
|
Then complete these activities…
| Then complete these activities…
|
With these tools & templates: Service Services Definition Chart | With these tools & templates: Services Definition Chart |
Info-Tech has provided a sample Services Definition Chart with standard service definitions and pre-populated fields. It is up to you throughout this step to decide which fields are necessary to your business users, as well as how much detail you wish to include in each of them.
Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.
The majority of the fields in the service catalog are user facing, which means they must be written in business language that the users can understand.
If there is any confusion or disagreement in filling out the fields, a facilitator is required to lead the working groups in coming up with a definitive answer. If a decision is still not reached, it should be escalated to the decision maker (usually the service owner).
There are IT facing fields that should not be published to the business users – they are for the benefit of IT. For example, you may want to keep Performance Metrics internal to IT until you are ready to discuss it with the business.
If the organization is interested in creating a Technical Service Catalog following this initiative, these fields will provide a helpful starting place for IT to identify the people, process, and technology required to support user-facing services.
It is important for IT-facing fields to be kept internal. If business users are having trouble with a service and the service owner’s name is available to them, they will phone them for support even if they are not the support owner.
When completing the service record, adopt the principle that “Less is More.” Keep it simple and write the service description from the user’s perspective, without IT language. From the list below, pick which fields of information are important to your business users.
What do the users need to access the service quickly and with minimal assistance?
Description: Delivers electronic messages to and from employees.
Features:
Category: Communications
Who is responsible for the delivery of the service and what are their roles?
Service owner → the IT member who is responsible and accountable for the delivery of the service.
Business owner → the business partner of the service owner who ensures the provided service meets business needs.
Service Owner: Manager of Business Solutions
Business Owner: VP of Human Resources
For enterprise services that are used by almost everyone in the organization, the business owner is the CIO.
“Who is authorized to access this service? How do they access it?”
Authorized users → who can access the service.
Request process → how to request access to the service.
Approval requirement/process → what the user needs to have in place before accessing the service.
Authorized Users: All people on site not working for the company
Request Process: Self-Service through website for external visitors
Approval Requirement/Process: N/A
Clearly defining how to access a service saves time and money by decreasing calls to the service desk and getting users up and running faster. The result is higher user productivity.
“Who is authorized to access this service? How do they access it?”
Requirements & pre-requisites → details of what must happen before a service can be provided.
Turnaround time → how much time it will take to grant access to the service.
User responsibility → What the user is expected to do to acquire the service.
Requirements & Pre-requisites: Disclaimer of non-liability and acceptance
Turnaround time: Immediate
User Responsibility: Adhering to policies outlined in the disclaimer
Clearly defining how to access a service saves time and money by decreasing calls to the service desk and getting users up and running faster. The result is higher user productivity.
“When is this service available to users? What service levels can the user expect?”
Support hours → what days/times is this service available to users?
Hours of availability/planned downtime → is there scheduled downtime for maintenance?
Performance metrics → what level of performance can the user expect for this service?
Support Hours: Standard business hours
Hours of Availability/Planned Downtime: Standard business hours; can be agreed to work beyond operating hours either earlier or later
Performance Metrics: N/A
Manage user expectations by clearly documenting and communicating service levels.
“How do I obtain support for this service?”
Support process → what is the process for obtaining support for this service?
Support owner → who can users contact for escalations regarding this service?
Support documentation → where can users find support documentation for this service?
Support Process: Contact help desk or submit a ticket via portal
Support Owner: Manager, client support
Support Documentation: .pdf of how-to guide
Clearly documenting support procedures enables users to get the help they need faster and more efficiently.
“Is there a cost for this service? If so, how much and who is expensing it?”
Internal Cost → do we know the total cost of the service?
Customer Cost → a lot of services are provided without charge to the business; however, certain service requests will be charged to a department’s budget.
Internal Cost: For purposes of audit, new laptops will be expensed to IT.
Customer Cost: Cost to rush order 10 new laptops with retina displays for the graphics team. Charged for extra shipment cost, not for cost of laptop.
Set user expectations by clearly documenting costs associated with a service and how to obtain approval for these costs if required.
This is the final activity to completing the service record design. It has been a long journey to make it here; now, all that is left is completing the fields and transferring information from previous activities.
Don’t forget to delete or bring over the edited LOB and Enterprise services from the phase 2 and 3 deliverables.
Now that you have completed the first run of service definitions, you can go back and complete the rest of the identified services in batches. You should observe increased efficiency and effectiveness in filling out the service definitions.
This blueprint’s purpose is to help you design a service catalog. There are a number of different platforms to build the catalog offered by application vendors. The sophistication of the catalog depends on the size of your business. It may be as simple as an Excel book, or something as complex as a website integrated with your service desk.
There are various levels of maturity to consider when you are thinking about how to deploy your service catalog.
| 1. Website/User Portal | 2. Catalog Module Within ITSM Tool |
3. Homegrown Solution |
|
|---|---|---|---|
|
Prerequisite |
An internet website, or a user portal |
An existing ITSM tool with a built-in service catalog module |
Database development capabilities Website development capabilities |
|
Pros |
Low cost Low effort |
Easy to deploy |
Customized solution tailored for the organization High flexibility regarding how the service catalog is published |
| Cons |
Not aesthetically appealing Lacking sophistication |
Difficult to customize to organization’s needs Limitation on how the service catalog info is published |
High effort High cost |
| → |
→ Maturity Level → |
→ |
The client had collected a lot of good information, but they were not sure about what to include to ensure the users could understand the service clearly.
They were also not sure what to keep internal so the service catalog did not increase IT’s workload. They want to help the business, but not appear as if they are capable of solving everything for everyone immediately. There was a fear of over-commitment.
The government created a Customer Responsibility field for each service, so it was not just IT who was providing solutions. Business users needed to understand what they had to do to receive some services.
The Service Owner and Business Owner fields were also kept internal so users would go through the proper request channel instead of calling Service Owners directly.
Lastly, the Performance Metrics field was kept internal until IT was ready to present service metrics to the business.
The business was provided clarity on their responsibility and what was duly owed to them by IT staff. This established clear boundaries on what was to be expected of IT services projected into the future.
The business users knew what to do and how to obtain the services provided to them. In the meantime, they didn’t feel overwhelmed by the amount of information provided by the service catalog.
There is a lack of clarity and a lack of agreement between the client’s team members regarding the request/approval processes for certain services. This was an indication that there is a level of ambiguity around process. Members were not sure what was the proper way to access a service and could not come up with what to include in the catalog.
Different people from different teams had different ways of accessing services. This could be true for both enterprise and LOB services.
The Info-Tech analyst facilitated a discussion about workflows and business processes.
In particular, the discussion focused around the approval/authorization process, and IT’s workflows required to deliver the service. The Info-Tech analyst on site walked the client through their different processes to determine which one should be included in the catalog.
The discussion brought clarity to the project team around both IT and business process. Using this new information, IT was able to communicate to the business better, and create consistency for IT and the users of the catalog.
The catalog design was a shared space where IT and business users could confer what the due process and responsibilities were from both sides. This increased accountability for both parties.
| The following are sample activities that will be conducted by Info-Tech analysts with your team: | ||
|---|---|---|
| 4.1 |
|
Determine which fields should be included in the record design The analysts will present the sample service definitions record and facilitate a discussion to customize the service record so unique business needs are captured. |
| 4.2 |
|
Determine which fields should be kept internal The onsite analysts will explain why certain fields are used but not published. The analysts will help the team determine which fields should be kept internal. |
| 4.3 |
|
Complete the service definitions The Info-Tech analysts will help the group complete the full service definitions. This exercise will also provide the organization with a clear understanding of IT workflows and business processes. |
Client Project: Design and Build a User-Facing Service Catalog
This project has the ability to fit the following formats:
Establish a Service-Based Costing Model
Develop the right level of service-based costing capability by applying our methodology.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate what software maintenance you are spending money.
Establish your software M&S requirements and coverage.
Optimize your M&S spend, reduce or eliminate, where applicable.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Our systematic approach will ensure that all identified areas of security have an associated policy.
The Security Policy Prioritization Tool assesses the policy suite on policy importance, ease to implement, and ease to enforce. The output of this tool is your prioritized list of policies based on our policy framework.
The Security Policy Assessment Tool assesses the policy suite on policy coverage, communication, adherence, alignment, and overlap. The output of this tool is a checklist of remediation actions for each individual policy.
The Lifecycle Template includes sections on security vision, security mission, strategic security and policy objectives, policy design, roles and responsibilities for developing security policies, and organizational responsibilities.
Use Info-Tech's security policy templates, which incorporate multiple industry best-practice frameworks (NIST, ISO, SOC2SEC, CIS, PCI, HIPAA), to ensure that your policies are clear, concise, and consistent.
This template helps you consider the budget time for communications, identify all stakeholders, and avoid scheduling communications in competition with one another.
Use this tool to first identify the initiatives that can grow your program, then as a roadmap tool for tracking progress of completion for those initiatives.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define the security policy development program.
Formalize a governing security policy lifecycle.
Understanding the current state of policies within your organization.
Prioritizing list of security policies for your organization.
Being able to defend policies written based on business requirements and overarching security needs.
Leveraging an executive champion to help policy adoption across the organization.
Formalizing the roles, responsibilities, and overall mission of the program.
1.1 Understand the current state of policies.
1.2 Align your security policies to the Info-Tech framework for compliance.
1.3 Understand the relationship between policies and other documents.
1.4 Prioritize the development of security policies.
1.5 Discuss strategies to leverage stakeholder support.
1.6 Plan to communicate with all stakeholders.
1.7 Develop the security policy lifecycle.
Security Policy Prioritization Tool
Security Policy Prioritization Tool
Security Policy Lifecycle Template
Develop a comprehensive suite of security policies that are relevant to the needs of the organization.
Time, effort, and money saved by developing formally documented security policies with input from Info-Tech’s subject-matter experts.
2.1 Discuss the risks and drivers your organization faces that must be addressed by policies.
2.2 Develop and customize security policies.
2.3 Develop a plan to gather feedback from users.
2.4 Discuss a plan to submit policies for approval.
Understanding of the risks and drivers that will influence policy development.
Up to 14 customized security policies (dependent on need and time).
Ensure policies and requirements are communicated with end users, along with steps to comply with the new security policies.
Improve compliance and accountability with security policies.
Plan for regular review and maintenance of the security policy program.
Streamlined communication of the policies to users.
Improved end user compliance with policy guidelines and be better prepared for audits.
Incorporate security policies into daily schedule, eliminating disturbances to productivity and efficiency.
3.1 Plan the communication strategy of new policies.
3.2 Discuss myPolicies to automate management and implementation.
3.3 Incorporate policies and processes into your security awareness and training program.
3.4 Assess the effectiveness of security policies.
3.5 Understand the need for regular review and update.
Policy Communication Plan Template
Understanding of how myPolicies can help policy management and implementation.
Security Awareness and Training Program Development Tool
Security Policy Assessment Tool
Action plan to regularly review and update the policies.
A policy for policy’s sake is useless if it isn’t being used to ensure proper processes are followed. A policy should exist for more than just checking a requirement box. Policies need to be quantified, qualified, and enforced for them to be relevant.
Policies should be developed based on the use cases that enable the business to run securely and smoothly. Ensure they are aligned with the corporate culture. Rather than introducing hindrances to daily operations, policies should reflect security practices that support business goals and protection.
No published framework is going to be a perfect fit for any organization, so take the time to compare business operations and culture with security requirements to determine which ones apply to keep your organization secure.
![]() |
Danny Hammond
Research Analyst Security, Risk, Privacy & Compliance Practice Info-Tech Research Group |
Your Challenge
|
Common Obstacles
InfoSec leaders will struggle to craft the right set of policies without knowing what the organization actually needs, such as:
|
Info-Tech’s Approach
Info-Tech’s Develop and Deploy Security Policies takes a multi-faceted approach to the problem that incorporates foundational technical elements, compliance considerations, and supporting processes:
|
Creating good policies is only half the solution. Having a great policy management lifecycle will keep your policies current, effective, and compliant.
Your ChallengeThis research is designed to help organizations design a program to develop and deploy security policies
|
The problem with security policies29% Of IT workers say it's just too hard and time consuming to track and enforce. 25% Of IT workers say they don’t enforce security policies universally. 20% Of workers don’t follow company security policies all the time. (Source: Security Magazine, 2020) |
Common obstaclesThe problem with security policies isn’t development; rather, it’s the communication, enforcement, and maintenance of them.
|
(Source: IBM, 2022 Cost of a Data Breach; n=537) Reaching an all-time high, the cost of a data breach averaged US$4.35 million in 2022. This figure represents a 2.6% increase from last year, when the average cost of a breach was US$4.24 million. The average cost has climbed 12.7% since 2020. |
| The right policy for the right audience. Generate a roadmap to guide the order of policy development based on organizational policy requirements and the target audience.
Actions
|
I. Define Security Policy Program
a) Security policy program lifecycle template b) Policy prioritization tool |
![]() |
II. Develop & Implement Policy Suite
a) Policy template set |
Policies must be reasonable, auditable, enforceable, and measurable. Policy items that meet these requirements will have a higher level of adherence. Focus on efficiently creating policies using pre-developed templates that are mapped to multiple compliance frameworks.
Actions
|
| Gaining feedback on policy compliance is important for updates and adaptation, where necessary, as well as monitoring policy alignment to business objectives.
Actions
|
IV. Measure Policy Program
a) Security policy tracking tool |
III. Communicate Policy Program
a) Security policy awareness & training tool b) Policy communication plan template |
Awareness and training on security policies should be targeted and must be relevant to the employees’ jobs. Employees will be more attentive and willing to incorporate what they learn if they feel that awareness and training material was specifically designed to help them.
Actions
|
|
| Build trust in your policy program by involving stakeholder participation through the entire policy lifecycle. | ||||
IT/InfoSec Benefits
|
Business Benefits
|
Key deliverable:Security Policy TemplatesTemplates for policies that can be used to map policy statements to multiple compliance frameworks. ![]() |
|
||||||
|
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. Overall Impact9.5 /10Overall Average $ Saved$29,015Overall Average Days Saved25 |
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks used throughout all four options |
|||
A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is six to ten calls over the course of two to four months.
What does a typical GI on this topic look like?Phase 1 |
Phase 2 |
Phase 3 |
Phase 4 |
| Call #1: Scope security policy requirements, objectives, and any specific challenges.
Call #2: Review policy lifecycle; prioritize policy development. |
Call #3: Customize the policy templates.
Call #4: Gather feedback on policies and get approval. |
Call #5: Communicate the security policy program.
Call #6: Develop policy training and awareness programs. |
Call #7: Track policies and exceptions. |
Workshop Overview |
Contact your account representative for more information.
|
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
Define the security policy program |
Develop the security policy suite |
Develop the security policy suite |
Implement security policy program |
Finalize deliverables and next steps |
|
| Activities | 1.1 Understand the current state of policies. 1.2 Align your security policies to the Info-Tech framework for compliance. 1.3 Understand the relationship between policies and other documents. 1.4 Prioritize the development of security policies. 1.5 Discuss strategies to leverage stakeholder support. 1.6 Plan to communicate with all stakeholders. 1.7 Develop the security policy lifecycle. |
2.1 Discuss the risks and drivers your organization faces that must be addressed by policies. 2.2 Develop and customize security policies. |
2.1 Discuss the risks and drivers your organization faces that must be addressed by policies (continued). 2.2 Develop and customize security policies (continued). 2.3 Develop a plan to gather feedback from users. 2.4 Discuss a plan to submit policies for approval. |
3.1 Plan the communication strategy for new policies. 3.2 Discuss myPolicies to automate management and implementation. 3.3 Incorporate policies into your security awareness and training program. 3.4 Assess the effectiveness of policies. 3.5 Understand the need for regular review and update. |
4.1 Review customized lifecycle and policy templates. 4.2 Discuss the plan for policy roll out. 4.3 Schedule follow-up Guided Implementation calls. |
| Deliverables |
|
|
|
|
|
| Phase 1
1.1 Understand the current state 1.2 Align your security policies to the Info-Tech framework 1.3 Document your policy hierarchy 1.4 Prioritize development of security policies 1.5 Leverage stakeholders 1.6 Develop the policy lifecycle |
Phase 2
2.1 Customize policy templates 2.2 Gather feedback from users on policy feasibility 2.3 Submit policies to upper management for approval |
Phase 3
3.1 Understand the need for communicating policies 3.2 Use myPolicies to automate the management of your security policies 3.3 Design, build, and implement your communications plan 3.4 Incorporate policies and processes into your training and awareness programs |
Phase 4
4.1 Assess the state of security policies 4.2 Identify triggers for regular policy review and update 4.3 Develop an action plan to update policies |
Scenario 1: You have existing policies
|
Scenario 2: You are starting from scratch
|
Policies are living, evolving documents that require regular review and update, so even if you have policies already written, you’re not done with them.
| You have an opportunity to improve your employee alignment and satisfaction, improve organizational agility, and obtain high policy adherence. This is achieved by translating your corporate culture into a policy-based compliance culture.
Align your security policies to the Info-Tech Security Framework by using Info-Tech’s policy templates. Info-Tech’s security framework uses a best-of-breed approach to leverage and align with most major security standards, including:
|
Info-Tech Security Framework![]() |
![]() |
Defines the cycle for the security policy program and what must be done but not how to do it. Aligns the business, security program, and policies.
Defines high-level overarching concepts of security within the organization, including the scope, purpose, and objectives of policies.
Defines enterprise/technology – specific, detailed guidelines on how to adhere to policies.
|
Design separate policies for different areas of focus. Policies that are written as single, monolithic documents are resistant to change. A hierarchical top-level document supported by subordinate policies and/or procedures can be more rapidly revised as circumstances change.
Policy:
![]() |
||||
Standard:
|
![]() |
Procedure:
|
![]() |
Guideline:Recommended actions to consider in absence of an applicable standard, to support a policy. |
This model is adapted from a framework developed by CISA (Certified Information Systems Auditor).
Supporting Documentation |
||||
| Standards. These support policies by being much more specific and outlining key steps or processes that are necessary to meet certain requirements within a policy document. Ideally standards should be based on policy statements with a target of detailing the requirements that show how the organization will implement developed policies.
If policies describe what needs to happen, then standards explain how it will happen. A good example is an email policy that states that emails must be encrypted; this policy can be supported by a standard such as Transport Layer Security (TLS) encryption that specifically ensures that all email communication is encrypted for messages “in transit” from one secure email server that has TLS enabled to another. There are numerous security standards available that support security policies/programs based on the kind of systems and controls that an organization would like to put in place. A good selection of supporting standards can go a long way to further protect users, data, and other organizational assets |
|
The Info-Tech Security Policy Prioritization Tool will help you determine which security policies to work on first.
Align policies to recent security concerns. If your organization has recently experienced a breach, it may be crucial to highlight corresponding policies as immediately necessary. Info-Tech InsightIf you have an existing policy that aligns with one of the Info-Tech recommended templates weight Ease to Implement and Ease to Enforce as HIGH (4-5). This will decrease the priority of these policies. | ![]() Download the Security Policy Prioritization Tool |
While management support is essential to initiating a strong security posture, allow employees to provide input on the development of security policies. This cooperation will lead to easier incorporation of the policies into the daily routines of workers, with less resistance. The security team will be less of a police force and more of a partner.
| Executive champion
Identify an executive champion who will ensure that the security program and the security policies are supported. |
Focus on risk and protection
Security can be viewed as an interference, but the business is likely more responsive to the concepts of risk and protection because it can apply to overall business operations and a revenue-generating mandate. |
| Communicate policy initiatives
Inform stakeholders of the policy initiative as security policies are only effective if they support the business requirements and user input is crucial for developing a strong security culture. |
Current security landscape
Leveraging the current security landscape can be a useful mechanism to drive policy buy-in from stakeholders. |
| Management buy-in
This is key to policy acceptance; it indicates that policies are accurate, align with the business, and are to be upheld, that funds will be made available, and that all employees will be equally accountable. |
Oh, you thought you were alone in facing some embarrassing moments? I can reassure you; you are not. Most companies face a myriad of issues with their IT. The key is to manage them to support your business efficiently.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify your open data program's current state maturity, and gain buy-in from the business for the program.
Identify a target state maturity and reach it through building a policy and processes and the use of metrics.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Ensure that the open data program is being driven out from the business in order to gain business support.
Identify drivers for the open data program that are coming directly from the business.
1.1 Understand constraints for the open data program.
1.2 Conduct interviews with the business to gain input on business drivers and level-set expectations.
1.3 Develop list of business drivers for open data.
Defined list of business drivers for the open data program
Understand the gaps between where your program currently is and where you want it to be.
Identify top processes for improvement in order to bring the open data program to the desired target state maturity.
2.1 Perform current state maturity assessment.
2.2 Define desired target state with business input.
2.3 Highlight gaps between current and target state.
Defined current state maturity
Identified target state maturity
List of top processes to improve in order to reach target state maturity
Develop a draft open data policy that will give you a starting point when building your policy with the community.
A draft open data policy will be developed that is based on best-practice standards.
3.1 Define the purpose of the open data policy.
3.2 Establish principles for the open data program.
3.3 Develop a rough governance outline.
3.4 Create a draft open data policy document based on industry best-practice examples.
Initial draft of open data policy
Build open data processes and identify metrics for the program in order to track benefits realization.
Formalize processes to set in place to improve the maturity of the open data program.
Identify metrics that can track the success of the open data program.
4.1 Develop the roles that will make up the open data program.
4.2 Create processes for new dataset requests, updates of existing datasets, and the retiring of datasets.
4.3 Identify metrics that will be used for measuring the success of the open data program.
Initial draft of open data processes
Established metrics for the open data program
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess your current state, define your cost allocation model, and define roles and responsibilities.
Define dashboards and reports, and document account structure and tagging requirements.
Establish governance for tagging and cost control, define process for right-sizing, and define process for purchasing commitment discounts.
Document process interactions, establish program KPIs, and build implementation roadmap and communication plan.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish clear lines of accountability and document roles & responsibilities to effectively manage cloud costs.
Understanding of key areas to focus on to improve cloud cost management capabilities.
1.1 Assess current state
1.2 Determine cloud cost model
1.3 Define roles & responsibilities
Cloud cost management capability assessment
Cloud cost model
Roles & responsibilities
Establish visibility into cloud costs and drivers of those costs.
Better understanding of what is driving costs and how to keep them in check.
2.1 Develop architectural patterns
2.2 Define dashboards and reports
2.3 Define account structure
2.4 Document tagging requirements
Architectural patterns; service cost cheat sheet
Dashboards and reports
Account structure
Tagging scheme
Develop processes, procedures, and policies to control cloud costs.
Improved capability of reducing costs.
Documented processes & procedures for continuous improvement.
3.1 Establish governance for tagging
3.2 Establish governance for costs
3.3 Define right-sizing process
3.4 Define purchasing process
3.5 Define notification and alerts
Tagging policy
Cost control policy
Right-sizing process
Commitment purchasing process
Notifications and alerts
Document next steps to implement & improve cloud cost management program.
Concrete roadmap to stand up and/or improve the cloud cost management program.
4.1 Document process interaction changes
4.2 Define cloud cost program KPIs
4.3 Build implementation roadmap
4.4 Build communication plan
Changes to process interactions
Cloud cost program KPIs
Implementation roadmap
Communication plan
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Calculate the cost of the project backlog and assess the root causes of its unmanageability.
Increase the manageability of the backlog by updating stale requests and removing dead weight.
Develop and maintain a manageable backlog growth rate by establishing disciplined backlog management processes.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Gauge the manageability of your project backlog in its current state.
Calculate the total cost of your project backlog investments.
Determine the root causes that contribute to the unmanageability of your project backlog.
An understanding of the organizational need for more disciplined backlog management.
Visibility into the costs incurred by the project backlog.
An awareness of the sources that feed the growth of the project backlog and make it a challenge to maintain.
1.1 Calculate the sunk and marginal costs that have gone into your project backlog.
1.2 Estimate the throughput of backlog items.
1.3 Survey the root causes of your project backlog.
The total estimated cost of the project backlog.
A project backlog return-on-investment score.
A project backlog root cause analysis.
Identify the most organizationally appropriate goals for your backlog cleanse.
Pinpoint those items that warrant immediate removal from the backlog and establish a game plan for putting a bullet in them.
Communicate backlog decisions with stakeholders in a way that minimizes friction and resistance.
An effective, achievable, and organizationally right-sized approach to cleansing the backlog.
Criteria for cleanse outcomes and a protocol for carrying out the near-term cleanse.
A project sponsor outreach plan to help ensure that decisions made during your near-term cleanse stick.
2.1 Establish roles and responsibilities for the near-term cleanse.
2.2 Determine cleanse scope.
2.3 Develop backlog prioritization criteria.
2.4 Prepare a communication strategy.
Clear accountabilities to ensure the backlog is effectively minimized and outcomes are communicated effectively.
Clearly defined and achievable goals.
Effective criteria for cleansing the backlog of zombie projects and maintaining projects that are of strategic and operational value.
A communication strategy to minimize stakeholder friction and resistance.
Ensure ongoing backlog manageability.
Make sure the executive layer is aware of the ongoing status of the backlog when making project decisions.
Customize a best-practice toolkit to help keep the project backlog useful.
A list of pending projects that is minimal, maintainable, and of high value.
Executive engagement with the backlog to ensure intake and approval decisions are made with a view of the backlog in mind.
A backlog management tool and processes for ongoing manageability.
3.1 Develop a project backlog management operating model.
3.2 Configure a project backlog management solution.
3.3 Assign roles and responsibilities for your long-term project backlog management processes.
3.4 Customize a project backlog management operating plan.
An operating model to structure your long-term strategy around.
A right-sized management tool to help enable your processes and executive visibility into the backlog.
Defined accountabilities for executing project backlog management responsibilities.
Clearly established processes for how items get in and out of the backlog, as well as for ongoing backlog review.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Our concise executive brief explains to you the challenges associated with the organizational redesign. We'll show you our methodology and the ways we can help you in completing this.
The design principles will govern your organizational redesign; Align the principles with your business strategy.
Your operating model must account for the company's nuances and culture.
Go from an operating model to the structure fit for your company.
Change does not come easy. People will be anxious. Craft your communications to address critical concerns and obtain buy-in from the organization. If the reorganization will be painful, be up-front on that, and limit the time in which people are uncertain.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin your SAP digital access licensing journey by evaluating licensing changes and options, and then make contractual changes to ensure compliance.
To remain competitive enterprises must renew and refresh their business model strategies and design/develop digital platforms – this requires enterprises to:
Organizations that implement this project will gain benefits in five ways:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the platform business model and strategies and then set your platform business model goals.
Define design goals for your digital platform. Align your DX strategy with digital platform capabilities and understand key components of the digital platform.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand existing business model, value proposition, and key assets.
Understand platform business model and strategies.
Understanding the current assets helps with knowing what can be leveraged in the new business model/transformation.
Understanding the platform strategies can help the enterprise renew/refresh their business model.
1.1 Document the current business model along with value proposition and key assets (that provide competitive advantage).
1.2 Transformation narrative.
1.3 Platform model canvas.
1.4 Document the platform strategies in the context of the enterprise.
Documentation of current business model along with value proposition and key assets (that provide competitive advantage).
Documentation of the selected platform strategies.
Understand transformation approaches.
Understand various layers of platforms.
Ask fundamental and evolutionary questions about the platform.
Understanding of the transformational model so that the enterprise can realize the differences.
Understanding of the organization’s strengths and weaknesses for a DX.
Extraction of strategic themes to plan and develop a digital platform roadmap.
2.1 Discuss and document decision about DX approach and next steps.
2.2 Discuss and document high-level strategic themes for platform business model and associated roadmap.
Documented decision about DX approach and next steps.
Documented high-level strategic themes for platform business model and associated roadmap.
Understand the design goals for the digital platform.
Understand gaps between the platform’s capabilities and the DX strategy.
Design goals set for the digital platform that are visible to all stakeholders.
Gap analysis performed between enterprise’s digital strategy and platform capabilities; this helps understand the current situation and thus informs strategies and roadmaps.
3.1 Discuss and document design goals for digital platform.
3.2 Discuss DX themes and platform capabilities – document the gaps.
3.3 Discuss gaps and strategies along with timelines.
Documented design goals for digital platform.
Documented DX themes and platform capabilities.
DX themes and platform capabilities map.
Understanding of key components of a digital platform, including technology and teams.
Understanding of the key components of a digital platform and designing the platform.
Understanding of the team structure, culture, and practices needed for successful platform engineering teams.
4.1 Confirmation and discussion on existing UX/UI and API strategies.
4.2 Understanding of microservices architecture and filling of microservices canvas.
4.3 Real-time stream processing data pipeline and tool map.
4.4 High-level architectural view.
4.5 Discussion on platform engineering teams, including culture, structure, principles, and practices.
Filled microservices canvas.
Documented real-time stream processing data pipeline and tool map.
Documented high-level architectural view.
CIOs today face increasing pressures, disruptive emerging technologies, talent shortages, and a slew of other challenges. What are their top concerns, priorities, and technology bets that will define the future direction of IT?
CIO responses to our Future of IT 2024 survey reveal key insights on spending projects, the potential disruptions causing the most concern, plans for adopting emerging technology, and how firms are responding to generative AI.
Map your organization’s response to the external environment compared to CIOs across geographies and industries. Learn:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Take the pulse of the IT industry and see how CIOs are planning to approach 2024.
| Countries / Regions | Response % |
| United States | 47.18% |
| Canada | 11.86% |
| Australia | 9.60% |
| Africa | 6.50% |
| China | 0.28% |
| Germany | 1.13% |
| United Kingdom | 5.37% |
| India | 1.41% |
| Brazil | 1.98% |
| Mexico | 0.56% |
| Middle East | 4.80% |
| Asia | 0.28% |
| Other country in Europe | 4.52% |
n=354
Half of CIOs hold a C-level position, 10% are VP-level, and 20% are director level

38% of respondents are from an organization with above 1,000 employees

40% of CIOs report an annual budget of more than $10 million

A range of industries are represented, with 29% of respondents in the public sector or financial services


How likely is it that the following factors will disrupt your business in the next 12 months?

Looking ahead to 2024, how will your organization's IT spending change compared to spending in 2023?

Top five technologies for new spending planned in 2024:
Top five technologies for new spending planned after 2024:
n=301
Info-Tech Insight
Three in four CIOs say they have no plans to invest in quantum computing, more than any other technology with no spending plans.
Rate your business interest in adopting the following generative AI applications:

There is interest across all types of generative AI applications. CIOs are least interested in visual media generators, rating it just 2.4 out of 5 on average.
n=251
Info-Tech Insight
Examples of generative AI solutions specific to the legal industry include Litigate, CoCounsel, and Harvey.
Most popular use cases for AI by end of 2024:
Fastest growing uses cases for AI in 2024:
n=218
Info-Tech Insight
The least popular use case for AI is to help define business strategy, with 45% saying they have no plans for it.

Info-Tech Insight
Almost half of CIOs say ChatGPT has been a catalyst for their business to adopt new AI initiatives.

Which of the following best describes your organization's approach to third-party generative AI tools (such as ChatGPT or Midjourney)?

Info-Tech Insight
Business concerns over intellectual property and sensitive data exposure led OpenAI to announce ChatGPT won't use data submitted via its API for model training unless customers opt in to do so. ChatGPT users can also disable chat history to avoid having their data used for model training (OpenAI).


Among organizations that plan to invest in AI in 2024, 30% still say there are no steps in place for AI governance. The most popular steps to take are to publish clear explanations about how AI is used, and to conduct impact assessments (n=170).

Among all CIOs, including those that do not plan to invest in AI next year, 37% say no steps are being taken toward AI governance today (n=243).
If you haven't already contributed to our Future of IT online survey, we are keeping the survey open to continue to collect insights and inform our research reports and agenda planning process. You can take the survey today. Those that complete the survey will be sent a complimentary Tech Trends 2024 report.
If you are receiving this for completing the Future of IT online survey, thank you for your contribution. If you are interested in further participation and would like to provide a complementary interview, please get in touch at brian.Jackson@infotech.com. All interview subjects must also complete the online survey.
If you've already completed an interview, thank you very much, and you can look forward to seeing more impacts of your contribution in the near future.
A CIO focus for the Future of IT
Data in this report represents respondents to the Future of IT online survey conducted by Info-Tech Research Group between May 11 and July 7, 2023.
Only CIO respondents were selected for this report, defined as those who indicated they are the most senior member of their organization's IT department.
This data segment reflects 355 total responses with 239 completing every question on the survey.
Further data from the Future of IT online survey and the accompanying interview process will be featured in Info-Tech's Tech Trends 2024 report this fall and in forthcoming Priorities reports including Applications, Data & EA, CIO, Infrastructure, and Security.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate the infrastructure requirements and the ability to undergo modernization from legacy technology.
Build and document a formal set of business requirements using Info-Tech's pre-populated template after identifying stakeholders, aligning business and user needs, and evaluating deployment options.
Draft an RFP for a UC solution and gain project approval using Info-Tech’s executive presentation deck.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify pain points.
Build a skills inventory.
Define and rationalize template configuration needs.
Define standard service requests and map workflow.
Discuss/examine site type(s) and existing technology.
Determine network state and readiness.
IT skills & process understanding.
Documentation reflecting communications infrastructure.
Reviewed network readiness.
Completed current state analysis.
1.1 Build a skills inventory.
1.2 Document move, add, change, delete (MACD) processes.
1.3 List relevant communications and collaboration technologies.
1.4 Review network readiness checklist.
Clearly documented understanding of available skills
Documented process maps
Complete list of relevant communications and collaboration technologies
Completed readiness checklist
Hold focus group meeting.
Define business needs and goals.
Define solution options.
Evaluate options.
Discuss business value and readiness for each option.
Completed value and readiness assessment.
Current targets for service and deployment models.
2.1 Conduct internal focus group.
2.2 Align business needs and goals.
2.3 Evaluate deployment options.
Understanding of user needs, wants, and satisfaction with current solution
Assessment of business needs and goals
Understanding of potential future-state solution options
Identify gaps.
Examine and evaluate ways to remedy gaps.
Determine specific business requirements and introduce draft of business requirements document.
Completed description of future state.
Identification of gaps.
Identification of key business requirements.
3.1 Identify gaps and brainstorm gap remedies.
3.2 Complete business requirements document.
Well-defined gaps and remedies
List of specific business requirements
Introduce Unified Communications Solution RFP Template.
Develop statement of work (SOW).
Document technical requirements.
Complete cost-benefit analysis.
Unified Communications RFP.
Documented technical requirements.
4.1 Draft RFP (SOW, tech requirements, etc.).
4.2 Conduct cost-benefit analysis.
Ready to release RFP
Completed cost-benefit analysis
Without the control over the areas in which employees are working, businesses are opening themselves up to a greater degree of risk during the pandemic. How does a business raise awareness for employees who are going to be working remotely?
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use Info-Tech’s training materials to get you started on remote training and awareness.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Align on GTM vision and plan; craft initial strategy.
Confidence that market opportunity is sufficient.
Deeper buyer understanding to drive product design and messaging and launch campaign asset design.
Steering committee approval for next phase.
1.1 Outline a vision for GTM, roles required, identify Steering Committee lead, workstream leads, and teams.
1.2 Capture GTM strategy hypothesis by working through initial draft of the Go-to-Market Strategy Presentation and business case.
1.3 Capture team knowledge on buyer persona and journey and competitive SWOT.
1.4 Identify info./data gaps, sources, and plan for capturing/gathering including buyer interviews.
Documented Steering Committee and Working team.
Aligned on GTM vision and process.
Documented buyer persona and journey. Competitive SWOT analysis.
Document team knowledge on initial GTM strategy, buyer personas, and business case.
Identify Initial Business Case, Sales Forecast, and Launch Plan.
Confidence in size of market opportunity.
Alignment of Sales and Product on product forecast.
Assessment of marketing tech stack.
Initial business case.
2.1 Size Product Market Opportunity and initial revenue forecast.
2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, channel/route to market.
2.3 Craft initial launch campaign, product release and sales and CX readiness plans.
2.4 Identify launch budgets across each investment area.
2.5 Discuss initial product launch business case and key activities.
Product Serviceable Obtainable Market (SOM), Serviceable Available Market (SAM) and Total Available Market (TAM).
Definition of product-market fit, uniqueness, and competitive differentiation.
Preliminary campaign, targets, and readiness plans.
Incremental budgets for each key stakeholder area.
Preliminary product launch business case.
Develop final Launch plans and budgets in product and marketing.
Align Product release/launch plans with the marketing campaign for launch.
Understand incremental budgets from product and marketing for launch.
3.1 Apply product interviews to scope, MVP, roadmap, competitive differentiation, pricing, feature prioritization, routes to market, and sales forecast.
3.2 Develop a more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics.
Minimally Viable Product defined with feature prioritization. Product competitive differentiation documented Routes to market identified Sales forecast aligned with product team expectations.
Marketing campaign launch plan Content marketing asset-creation/acquisition plan Campaign targets and metrics.
Develop final Launch Plans and budgets for remaining areas.
Align Product release/launch plans with the marketing campaign for launch.
Understand incremental budgets from Product and Marketing for launch.
4.1 Develop detailed launch/readiness plans with final budgets for: Sales enablement , Sales training, Tech stack, Customer onboarding & success, Product marketing, AR, PR, Corp Comms/Internal Comms, Customer Events, Employee Events, etc.
Detailed launch plans, budgets for Product Marketing, Sales, Customer Success, and AR/PR/Corp. Comms.
To gain approval to move to Build and Launch phases.
Align business case with Steering Committee expectations
Approvals to Build and Launch targeted offering
5.1 Review final launch/readiness plans with final budgets for all key areas.
5.2 Move all key findings into Steering Committee presentation slides.
5.3 Present to Steering Committee; receive feedback.
5.4 Incorporate Steering Committee feedback; update finial business case.
Combined budgets across all areas. Final launch/readiness plans.
Final Steering Committee-facing slides.
Final approvals for Build and Launch.
| Section | Title |
| 1 | Executive Brief
|
| 2 | Build baseline market, buyer, and competitive insights
|
| 3 | Design initial product and business case
|
| 4 | Align stakeholder plans to prep for build
|
A successful go-to-market (GTM) strategy aligns marketing, product, sales and customer success, sees decision making based on deep buyer understanding, and tests many basic assumptions often overlooked in today’s agile-driven product development/management environment.
The disciplines you build using our methodology will not only support your team’s effort building and launching more successful products, but also can be modified for use in other strategic initiatives such as branding, M&A integration, expanding into new markets, and other initiatives that require a cross-functional and multidisciplined process.
|
Jeff Golterman
|
An ineffective go-to-market strategy is often a root cause of:
|
Hurdles to go-to-market success include:
|
Apply SoftwareReviews approach for greater GTM success.
Our blueprint is designed to help you:
|
Creating a compelling go-to-market strategy, and keeping it current, is a critical software company function – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.
A GTM Strategy is not all art and not all science but requires both. Software leaders will establish a set of core capabilities upon which they will plan, build, launch and manage product success. Executives, when resourcing their GTM strategies, will begin with:
|
|
|
SoftwareReviews Advisory Insight:
Marketers who get GTM Strategy “right” give themselves a 50% greater chance of Build and Launch success.
“Figuring out a Go-to-Market approach is no trivial exercise – it separates the companies that will be successful and sustainable from those that won’t.” (Harvard Business Review)
Marketers – Large and Small – will further test their GTM Strategy strength by asking “Are we missing any of the following?”
SoftwareReviews Advisory Insight:
Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed. Future releases to existing products don’t need to be re-thought but instead check-listed against prior foundational decisions.
Is Your GTM Strategy Led and Staffed Properly?
Our research shows a more effective GTM Strategy delivers key benefits, including:
SoftwareReviews Advisory Insight:
|
“Go-to-Market Strategies aren’t just for new products or services, they can also be used for:
And while each GTM strategy is unique, there are a series of steps that every product marketer should follow.” (Product Marketing Alliance) |
Marketers, in order to optimize a go-to-market strategy, will:
This research is designed for:
|
This research will help you:
|
This research will also assist:
|
This research will help them:
|
1 |
Build baseline market, buyer, and competitive insights
Sizing your opportunity, building deep buyer understanding, competitive differentiation, and routes to market are fundamental first steps. |
|
2 |
Design initial product and business case
Validate positioning and messaging against brand, develop packaging and pricing, and develop digital approach, launch campaign approach and supporting budgets across all areas. |
|
3 |
Align stakeholder plans to prep for build
Rationalize product release and concept to sales/financial plan and further develop customer success, PR/AR, MarTech, and analytics/metrics plans. |
| 1.Build baseline market, buyer, and competitive insights | 2. Design initial product and business case | 3. Align stakeholder plans to prep for build | |
| Phase Steps |
|
|
|
| Phase Outcomes |
|
|
|
Having an updated and compelling go-to-market strategy is a critical capability – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.
Many marketers experiencing the value of the GTM Steering Committee extend its use into a “Product and Pricing Council” (PPC) in order to move product-related decision making from ad-hoc to structured, and to reinforce GTM Strategy guardrails and best practices across the company.
Marketers that collaborate closely with Marketing Ops., Sales Ops., and IT early in the process of a go-to-market strategy will be best able to assess whether current website/digital, marketing applications, CRM/sales automation apps, and tools can support the complete Go-to-Market process effectively.
Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed.
Future releases to existing products don’t need be re-thought but instead check-listed against prior foundational decisions.
Marketers who get GTM Strategy “right” give themselves a 50% greater chance of build and launch success.
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Key deliverable:
Go-to-Market Strategy Presentation TemplateCapture key findings for your GTM Strategy within the Go-to-Market Strategy Presentation Template.
|
Go-to-Market Strategy RACI and Launch Checklist WorkbookIncludes a RACI model and launch checklist that helps scope your working team’s roles and responsibilities. |
|
Go-to-Market Strategy Cost Budget and Revenue Forecast WorkbookCapture launch incremental costs that, when weighed against the forecasted revenue, illustrate gross margins as a crucial part of the business case. |
|
Product Market Opportunity SizingWhile not a deliverable of this blueprint per se, the Product Market Opportunity blueprint is required. |
|
This blueprint calls for downloading the following additional blueprint: | ||
Buyer Persona and Journey blueprintWhile not a deliverable of this blueprint per se, the Buyer Persona and Journey blueprint is required |
|
|||
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| Included within advisory membership | Optional add-ons | ||
A Guided Implementation (GI) is a series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.
For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.
Your engagement managers will work with you to schedule analyst calls.
What does our GI on Build a More Effective Go-to-Market Strategy look like?
Build baseline market, buyer, and competitive insights |
Design initial product and business case |
Align stakeholder plans to prep for build |
| Call #1: Share GTM vision and outline team activities for the GTM Strategy process. Plan next call – 1 week.
Call #2: Outline product market opportunity approach and steps to complete. Plan next call – 1 week. Call #3: Hold a series of inquiries to do a modernization check on tech stack. Plan next call – 2 weeks. Call #4: Discuss buyer interview process, persona, and journey steps. Plan next call – 2 weeks. Call #5: Outline competitive differentiation analysis, routes to market, and review of to-date business case. Plan next call – 1 week. |
Call #6: Discuss brand strength/weakness, pricing, and packaging approach. Plan next call – 3 weeks.
Call #7: Outline needs to craft assets with right messaging across campaign launch plan and budget. Outline needs to create plans and budgets across rest of marketing, sales, CX, and product. Plan next call – 1 week. Call #8: Review template and approach for initial business case and sales and product alignment. Plan next call – 1 week. Call #9: Review initial business case and launch plans across marketing, sales, CX, and product. Plan next call – 1 week. |
Call #10: Discuss plans/needs/budgets for tech stack modernization. Plan next call – 3 days.
Call #11: Discuss plans/needs/budgets for CX readiness for launch. Plan next call – 3 days. Call #12: Discuss plans/needs/budgets for digital readiness for launch. Plan next call – 3 days. Call #13: Discuss plans/needs/budgets for marketing and sales readiness for launch. Plan next call – 3 days. Call #14: Review final business case and coach on Steering Committee Presentation. Plan next call – 1 week. |
A Go-to-Market Workshop Overview |
Contact your engagement manager for more information. |
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
Align on GTM Vision & Plan, Craft Initial Strategy |
Identify Initial Business Case, Sales Forecast and Launch Plan |
Develop Launch Plans (i of ii) |
Develop Launch Plans (ii of ii) |
Present Final Business Case to Steering Committee |
|
| Activities |
1.1 Outline a vision for GTM and roles required, identify Steering Committee lead, workstream leads, and teams. 1.2 Capture GTM strategy hypothesis by working through initial draft of GTM Strategy Presentation and business case. 1.3 Capture team knowledge on buyer persona and journey and competitive SWOT. 1.4 Identify information/data gaps and sources and plan for capturing/gathering including buyer interviews. Plan next day 2-3 weeks after buyer persona/journey interviews. |
2.1 Size product market opportunity and initial revenue forecast. 2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, and channel/route to market. 2.3 Craft initial launch campaign, product release, sales, and CX readiness plans. 2.4 Identify launch budgets across each investment area. 2.5 Discuss initial product launch business case and key activities. Plan next day 2-3 weeks after product hypothesis-validation interviews with customers and prospects. |
3.1 Apply product interviews to scope, MVP, and roadmap competitive differentiation, pricing, feature prioritization, routes to market and sales forecast. 3.2 Develop more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics. |
4.1 Develop detailed launch/readiness plans with final budgets for:
|
5.1 Review final launch/readiness plans with final budgets for all key areas. 5.2 Move all key findings up into Steering Committee presentation slides. 5.3 Present to Steering Committee, receive feedback. 5.4 incorporate Steering Committee feedback; update finial business case. |
| Deliverables |
|
|
|
|
|
| Phase 1
1.1 Select Steering Cmte/team, build aligned vision for GTM 1.2 Buyer personas, journey, initial messaging 1.3 Build initial product hypothesis 1.4 Size market opportunity 1.5 Outline digital/tech requirements 1.6 Competitive SWOT 1.7 Select routes to market 1.8 Craft GTM Strategy deck |
Phase 2
2.1 Brand consistency check 2.2 Formulate packaging and pricing 2.3 Craft buyer-valid product concept 2.4 Build campaign plan and targets 2.5 Develop cost budgets across all areas 2.6 Draft product business case 2.7 Update GTM Strategy deck |
Phase 3
3.1 Assess tech/tools support for all GTM phases 3.2 Outline sales enablement and Customer Success plan 3.3 Build awareness plan 3.4 Finalize business case 3.5 Final GTM Plan deck |
| Go-to-Market Strategy Presentation Template | Go-to-Market Strategy RACI and Launch Checklist Workbook | Buyer Persona and Journey blueprint | Product Market Opportunity Sizing Workbook |
|
|
|
|
Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
|
Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
|
Use the Buyer Persona and Journey blueprint to:
|
Use the Product Market Opportunity Sizing blueprint to:
|
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Input: Steering Committee interviews, Recognition of Steering Committee interest
Output: List of GTM Strategy stakeholders as Steering Committee members
Materials: Following slide outlining the key responsibilities required of the Steering Committee members, A high-Level timeline of GTM Strategy phases and key milestone meetings
Participants: CMO, sponsoring executive, Functional leads - Marketing, Product Marketing, Product Management, Sales, Customer Success
SoftwareReviews Advisory Insight:
Go To Market Steering Committee’s can become an important ongoing body to steer overall product, pricing and other GTM decisions. Some companies have done so by adding the CEO and CFO to this committee and designated it as a permanent body that meets monthly to give go/no decisions to “all things product related” across all products and business units. Leaders that use this tool well, stay aligned, demonstrate consistency across business units and leverage outcomes across business units to drive greater scale.
Understand that aligning key stakeholders around the way your company goes to market is an essential company function.
| Title | Key Roles Supporting an Effective Go-to-Market Strategy |
| Go-to-Market Strategy Sponsor |
|
| Go-to-Market Strategy Program Manager |
|
| Functional Workstream Leads |
|
| Digital, Marketing/Sales Ops/IT Team |
|
| Steering Committee |
|
Download the Go-to-Market Strategy Presentation Template
Download the Go-to-Market Strategy RACI and Launch Checklist Workbook |
Success improves when you align & assign
|
Consider the skills and knowledge required for GTM Strategy as well as build and launch functions when choosing teams.
Work with functional leaders to select workstream leads
Workstream leads should be strong in collaboration, coordination of effort among others, knowledgeable about their respective function, and highly organized as they may be managing a team of colleagues within their function to deliver their responsible portion of GTM.
Required Skills/Knowledge
|
Suggested Functions
|
| Roles Required in Successful GTM Strategy | |
| For SMB companies, as employees wear many different hats, assign people that have the requisite skills and knowledge vs. the role title. |
|
Download the Go-to-Market Strategy RACI and Launch Checklist Workbook
Input: Stakeholders and leaders across the various functions outlined to the left
Output: List of go-to-market strategy team members
Materials: Go-to-Market Strategy Workbook
Participants: Initiative Manager, CMO, Sponsoring executive, Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others), Marketing Applications Director, Senior Digital Business Analyst
Download the Go-To-Market Strategy RACI and Launch Checklist Workbook
1 hour
GTM Program Managers:
Download the Go-to-Market Strategy Presentation Template
Input: N/A
Output: Team understanding of an effective go-to-market strategy, team roles and responsibilities and initial product and launch concept.
Materials: The Build a More Effective Go-to-Market Strategy Executive Brief
Participants: GTM Program Manager, CMO, Sponsoring executive, Workstream leads
Go to the Build a More Effective Go-to-Market Strategy Executive Brief
Program managers will:
Program managers & workstream leads will:
![]() Download the Go-to-Market Strategy RACI and Launch Checklist Workbook | Continuous improvement is enabled with a repeatable process
|
Work with your workstream leads to see them develop a detailed project plan that spans all their deliverables for a GTM Strategy
|
Using the Go-to-Market Strategy Presentation:
3-4 hours Initial, 1-2 hours weekly
|
Download the Go-to-Market Strategy Presentation Template
Download the Go-To-Market Strategy RACI and Launch Checklist Workbook
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Documenting buyer personas has several essential benefits to marketing, sales, and product teams:
|
“It’s easier buying gifts for your best friend or partner than it is for a stranger, right? You know their likes and dislikes, you know the kind of gifts they’ll have use for, or the kinds of gifts they’ll get a kick out of. Customer personas work the same way. By knowing what your customer wants and needs, you can present them with content targeted specifically to those wants and needs.” (Emma Bilardi, Product Marketing Alliance, July 8, 2020) |
A well defined buyer persona enables us to:
| Functional – “to find them” | ||||
| Job Role | Titles | Org Chart Dynamics | Buying Center | Firmographics |
| Emotive – “what they do and jobs to be done” | |||
| Initiatives – What programs/projects the persona is tasked with and what are their feelings and aspirations about these initiatives? Motivations? Build credibility? Get promoted? | Challenges – Identify the business issues, problems, and pain points, that impede attainment of objectives. What are their fears, uncertainties, and doubts about these challenges? | Buyer need – They may have multiple needs; which need is most likely met with the offering? | Terminology – What are the keywords/phrases they organically use to discuss the buyer need or business issue? |
| Decision Criteria – “how they decide” | |
| Buyer role – List decision-making criteria and power level. The five common buyer roles are champion, influencer, decision maker, user, and ratifier (purchaser/negotiator). | Evaluation and decision criteria – The lens, either strategic, financial, or operational, through which the persona evaluates the impact of purchase. |
| Solution Attributes – “what the ideal solution looks like” | ||||||
| Steps in “Jobs to be Done” | Elements of the “Ideal Solution” | Business outcomes from ideal solution | Opportunity scope – other potential users | Acceptable price for value delivered | Alternatives that see consideration | Solution sourcing – channel, where to buy |
| Behavioral Attributes – “how to approach them successfully” | ||
| Content preferences – List the persona’s content preferences, could be blog, infographic, demo, video, or other, vs. long-form assets (e.g. white paper, presentation, analyst report). | Interaction preferences – Which among in-person meetings, phone calls, emails, video conferencing, conducting research via web, mobile, and social. | Watering holes – Which physical or virtual places do they go to network or exchange info with peers e.g. LinkedIn, etc. |
If you haven’t re-mapped buyer journeys recently, you may be losing to competitors that have. Leaders re-map buyer journeys frequently.
SoftwareReviews Advisory Insight:
|
“Two out of three B2B buyers today prefer remote human interactions or digital self service.
And during August 2020-February 2021, use of digital self service leapt by 10%” (McKinsey & Company, 2021.) |
A lack of buyer persona and journey understanding is frequently the root cause of the following symptoms:
These challenges are often attributed to messaging and talk tracks that fail to resonate with prospects and products that fail to meet the needs of targeted buyers. SoftwareReviews Advisory Insight:
|
“Forty-four percent of B2B marketers have already discovered the power of personas.” (Boardview, 2016.) |
12 - 15 Hours, over course of 2-3 weeks
Input: Insights from Sellers, Insights from customers and prospects
Output: Completed slides outlining buyer persona, buyer journey, overall product concept, and detailed features and capabilities needed
Materials: Create a Buyer Persona and Journey blueprint, Go-to-Market Strategy Presentation
Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews
Download the Go-to-Market Strategy Presentation Template
Download the Create a Buyer Journey and Persona Journey blueprint
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
2 Hours
Input: Insights from Sellers, Insights from customers and prospects
Output: Completed slides outlining product concept and detailed features and capabilities needed
Materials: Go-to-Market Strategy Presentation
Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews
Download the Go-to-Market Strategy Presentation Template
At this early stage, summarize findings from concept interviews to guide further discovery, as well as go-to-market concepts and initial campaign concepts in upcoming steps.
Job Function AttributesTarget Persona(s):
Firmographics:
|
Emotive AttributesInitiative descriptions: Buyer description of project/program/initiative. What terms used? Business issues: What are the business issues related to this initiative? How is this linked to a CEO-level mission-critical priority? Key challenges: What business/process hurdles need to be overcome? Pain points: What are the pain points to the business/personally in their role related to the challenges that drove them to seek a solution? Success motivations: What motivates our persona to be successful in this area? |
Solution and OpportunitySteps to do the job: What are the needed steps to do this job today? Key features and capabilities: What are the key solution elements the buyer sees in the ideal solution? (See additional detail slide with prioritized features.) Key business outcomes: In business terms, what value (e.g. cost/time/FTE savings, deals won, smarter, etc.) is expected by implementing this solution? Other users/opportunities: Are there other users in the role team/company that would benefit from this solution? |
Pricing/PackagingWhat is an acceptable price to pay for this solution? Based on financial benefits and ROI hurdles, what’s a good price to pay? A high price? What are packaging options? Any competitive pricing to compare? |
Alternatives/CompetitionWhat are alternatives to this solution: How else would you solve this problem? Are there other solutions you’ve investigated? |
Channel PreferencesWhere would it be most convenient to buy?: Direct from provider? Channel partner/reseller? Download from the web? |
Decision Criteria AttributesDecision maker – Role, criteria/decision lens:
|
Behavioral AttributesInteraction preferences: Best way for us to reach this role? Email? At events? Texting? Video calls? Content types: Which content types (specifics; videos, short blog/article, longer whitepapers, etc.) help us stay educated about this initiative area? Content sources: What news, data, and insight sources (e.g. specifics) do you use to stay abreast of what’s important for this initiative area? |
Update the Go-to-Market Strategy Presentation with findings from Sales and customer/prospect interviews.
Ask buyers during interviews, as outlined in the Buyer Persona and Journey blueprint, to describe and rate key features by need. You will also review with buyers during the GTM Build phase, so it’s important to establish high priority features now.
|
|
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Your goal is to assess whether or not the opportunity is significantly sized and if you are well positioned to capture it
Download the Product Market Opportunity Sizing Workbook
SoftwareReviews Advisory Insight:
Product marketers that size the product market opportunity and account for the limitations posed by competitors, current sales coverage, brand permission, and awareness, provide their organizations with valuable insights into which inhibitors to growth should be addressed.
Your goal is two-fold: Determine the target market size, and develop a realistic 12–24 month forecast to support your business case
Download the Product Market Opportunity Sizing Workbook Download the Go-to-Market Strategy Presentation Template |
“Segmentation, targeting and positioning are the three pillars of modern marketing. Great segmentation is the bedrock for GTM success but is overlooked by so many.” (Product Marketing Alliance) |
Designing your go-to-market strategy does not require a robust customer experience management (CXM) platform, but implementing your strategy during the next steps of Go-to-Market – Build then Launch – certainly does.
Review info-Tech’s CXM blueprint to build a more complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components.
The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis called for during your GTM Strategy design.
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Taking buyer needs ratings from step 1.3, assess your current and key competitive capabilities against buyer needs for both feature and non-feature capabilities. Incorporate into your initial product hypothesis.
Request from your SoftwareReviews Engagement Manager the “Importance vs. Satisfaction” analysis for your product(s) feature and non-feature capabilities under consideration for your GTM Strategy
| Satisfaction | ||
| Fix | Promote | |
| Importance |
Low Satisfaction
These features are important to their market and will highlight any differentiators to avoid market comparison.
|
High Satisfaction
These are real strengths for the organization and should be promoted as broadly as possible.
|
Low Satisfaction
These features are not important for the market and are unlikely to drive sales if marketing material focuses on them. Rationalize investment in these areas.
|
High Satisfaction
Features are relatively strong, so highlight that these features can meet customer needs
|
|
| Review | Maintain | |
Overall Category Product Feature Satisfaction Importance
(Optional for clients with buyer reviews and key competitive reviews within target product category.)
Example: ERP “Vendor A” ratings and recommended key actions. Incorporate this analysis into your product concept if updating an existing solution. Have versions of the below run for specific competitors.
Features in the “Fix” quadrant should be addressed in this GTM Strategy cycle.
Features in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”
Features in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.
Features in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.
(Optional for clients with buyer reviews and key competitive reviews within target product category.)
Example: ERP “Vendor A” capabilities ratings and recommended key actions. Incorporate this analysis into your product concept for non-feature areas if updating an existing solution. Have versions of the below run for specific competitors.
Capabilities in the “Fix” quadrant should be addressed in this GTM Strategy cycle.
Capabilities in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”
Capabilities in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.
Capabilities in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.
(Optional for clients with buyer reviews and key competitive reviews within target product category.)
Combining internal competitive knowledge with insights from buyer interviews and buyer reviews; establish which key features that will competitively differentiate your product when delivered
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Capture buyer channel preferences in Step 1.3, and research alternatives using the following framework
Inside vs. Field Sales – Selling software during COVID has taught us that you can successfully sell software using virtual conferencing tools, social media, the telephone, and even texting and webchat – so is the traditional model of field/territory-based sellers being replaced with inside/virtual sellers who can either work at home, or is there a benefit to being in the office with colleagues?
Solutions vs. Individual Products – Do your buyers prefer to buy a complete solution from a channel partner or a solutions integrator that puts all the pieces together, and can handle training and servicing, for a more complete buyer solution?
Channel Partner vs. Build Sales Force – Are there channel partners that, given your product is targeting a new buyer with whom you have no relationship, can leverage their existing relationships, quicken adoption of your products, and lower your cost of sales?
Fully Digital – Is your application one where users can get started for free then upgrade with more advanced features without the use of a field or inside sales person? Do you possess the e-commerce platform to support this?
While there are other considerations beyond the above to consider, decide which channel approach will work best for this GTM Strategy.
“One estimate is that for every dollar a firm spends on its SaaS platform, it spends four times that amount with systems integrators and other channel partners.
And as technologies are embedded inside other products, services, and solutions, effective selling requires more partners.
Salesforce, for example, is recruiting thousands of new partners, while Microsoft is reportedly adding over 7,000 partners each month.” (HBR, 2021)
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Download the Go-to-Market Strategy Presentation Template
| Phase 1 1.1 Select Steering Cmte/team, build aligned vision for GTM 1.2 Buyer personas, journey, initial messaging 1.3 Build initial product hypothesis 1.4 Size market opportunity 1.5 Outline digital/tech requirements 1.6 Competitive SWOT 1.7 Select routes to market 1.8 Craft GTM Strategy deck | Phase 2 2.1 Brand consistency check 2.2 Formulate packaging and pricing 2.3 Craft buyer-valid product concept 2.4 Build campaign plan and targets 2.5 Develop cost budgets across all areas 2.6 Draft product business case 2.7 Update GTM Strategy deck | Phase 3 3.1 Assess tech/tools support for all GTM phases 3.2 Outline sales enablement and Customer Success plan 3.3 Build awareness plan 3.4 Finalize business case 3.5 Final GTM Plan deck |
| Go-to-Market Strategy Presentation Template | Go-to-Market Strategy RACI and Launch Checklist Workbook | Buyer Persona and Journey blueprint | Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook |
![]() | ![]() | ![]() | ![]() |
Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
| Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
| Use the Buyer Persona and Journey blueprint to:
| Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
|
Share messaging documented with the buyer journey with branding/creative and/or Marketing VP/CMO to ensure consistency with overall corporate messaging. Use the “Brand Diagnostic” on the following slide as a quick check.
For those marketers that see the need for a re-brand, please:
Download the Go-to-Market Strategy Presentation Template
Later during the Build phase of GTM, marketing assets, digital platforms, sales enablement, and sales training will be created where actual messaging can be written with brand guidelines aligned.
This step is to assess whether you we need to budget extra funds for any rebranding.
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
| Re-think tossing a new product into the same old marketing engine. Ask if your branding today and on this new offering needs help.
If you answer “no” to any of the following questions, you may need to re-think your brand. Does your brand:
|
“Nailing an impactful brand identity is a critical part of Growth Marketing. Without a well-crafted and maintained brand identity, your marketing will always feel flat and one-dimensional.” (Lean Labs, 2021) |
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Download the Go-to-Market Strategy Presentation Template | Refer to the findings from buyer persona interviews
|
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Download the Go-to-Market Strategy Presentation Template | “Innovation opportunities almost always come from understanding a company’s worst customers or customers it doesn’t serve” (Harvard Business School Press, 1997) |
Download the Go-to-Market Strategy Presentation Template | Refer to the findings from buyer persona interviews |
Your buyer interviews – whether during earlier steps or here during product concept validation – will give specific answers to all areas in green text below. Understanding channels, asset-types, and crafting your key messaging are essential for next steps.
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
2 hours
On the following Awareness and Lead Gen Engine slide:
On the Product and Launch Concept slides:
Download the Go-to-Market Strategy Presentation Template | “Only 32% of marketers – and 29% of B2B marketers – said the process of planning campaigns went very well. Just over half were sure they had selected the right business goal for a given marketing project and only 42% were confident they identified the right audience – which is, of course, a critical determinant for achieving success.” (MIT Sloan Management Review) |
Promote release in line with company story
Receive analyst feedback pre-launch and brief with final releases messaging/positioning
Download the Go-to-Market Strategy Presentation Template
We advise setting a target for the launch campaign. Here is a suggested approach:
Download the Go-to-Market Strategy Presentation Template | “Marketing should quantify its contribution to the business. One metric many clients have found valuable is Marketing Influenced Wins (MIW). Measured by what % of sales wins had a last-touch marketing attribution, marketers in the 30% – 40% MIW range are performing well.” (SoftwareReviews Advisory Research) |
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Note that in the Align Step – Step 3, you will see your workstream leads each develop their individual contributions to both the launch plan as well a budget.
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Your goal: Earn more than you spend! This projection of estimated gross margins should be part of your product launch business case. The GTM initiative lead and workstream leads are charged with estimating incremental costs, and product and sales must work together on the revenue forecast.
Net ReturnWe estimate our 12 month gross profit to be …. Quarterly RevenuesBased on sales forecast, our quarterly/monthly revenues are …. Estimated ExpensesIncremental up-front costs are expected to be …. |
|
|
Product Business Case Checklist:
|
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Download the Go-to-Market Strategy Presentation Template
| Phase 1 1.1 Select Steering Cmte/team, build aligned vision for GTM 1.2 Buyer personas, journey, initial messaging 1.3 Build initial product hypothesis 1.4 Size market opportunity 1.5 Outline digital/tech requirements 1.6 Competitive SWOT 1.7 Select routes to market 1.8 Craft GTM Strategy deck | Phase 2 2.1 Brand consistency check 2.2 Formulate packaging and pricing 2.3 Craft buyer-valid product concept 2.4 Build campaign plan and targets 2.5 Develop cost budgets across all areas 2.6 Draft product business case 2.7 Update GTM Strategy deck | Phase 3 3.1 Assess tech/tools support for all GTM phases 3.2 Outline sales enablement and Customer Success plan 3.3 Build awareness plan 3.4 Finalize business case 3.5 Final GTM Plan deck |
| Go-to-Market Strategy Presentation Template | Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook |
|
|
Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
|
Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
|
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Go to the Go-to-Market Budget Workbook as outlined in prior steps and document final incremental costs and projected revenues and summarize within the Go-to-Market Strategy Presentation. Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook Download the Go-to-Market Strategy Presentation Template | Product Build and Launch Business Case Checklist:
|
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Download the Go-to-Market Strategy Presentation Template
By guiding your team through the Go-to-Market planning process applied to an actual GTM Strategy, you have built an important set of capabilities that underpins today’s well-managed software companies. By following the step-by-step process outlined in this blueprint, you have delivered a host of benefits that include the following:
Therefore, developing the capabilities to manage a complex go-to-market strategy is akin to building company scalability and is sought after as a professional development opportunity that each executive should have on his/her résumé.
Contact your account representative for more information.
Acosta, Danette. “Average Customer Retention Rate by Industry.” Profitwell.com. Accessed Jan. 2022.
Ashkenas, Ron, and Patrick Finn. “The Go-To-Market Approach Startups Need to Adopt.” Harvard Business Review, June 2016. Accessed Jun. 2021.
Bilardi, Emma. “ How to Create Buyer Personas.” Product Marketing Alliance, July 2020. Accessed Dec. 2021.
Cespedes, Frank V. “Defining a Post-Pandemic Channel Strategy.” Harvard Business Review, Apr. 2021. Accessed Jul. 2021.
Chapman, Lawrence. “A Visual Guide to Product Launches.” Product Marketing Alliance. Accessed Jul. 2021.
Chapman, Lawrence. “Everything You Need To Know About Go-To-Market Strategies.” Product Marketing Alliance. Accessed Jul. 2021.
Christiansen, Clayton. “The Innovators Dilemma.” Harvard Business School Press, 1997.
Drzewicki, Matt. “Digital Marketing Maturity: The Path to Success.” MIT Sloan Management Review. Accessed Dec. 2021.
“Go-To-Market Refresher,” Product Marketing Alliance. Accessed Jul. 2021
Harrison, Liz; Dennis Spillecke, Jennifer Stanley, and Jenny Tsai. “Omnichannel in B2B sales: The new normal in a year that has been anything but.” McKinsey & Company, 15 March, 2021. Accessed Dec. 2021.
Jansen, Hasse. “Buyer Personas – 33 Mind Blowing Stats.” Boardview, 19 Feb. 2016. Accessed Jan. 2022.
Scott, Ryan. “Creating a Brand Identity: 20 Questions to Consider.” Lean Labs, Jun 2021. Accessed Jul. 2021.
Smith, Michael L., and James Erwin. “Role and Responsibility Charting (RACI).” DOCSearch. Accessed Jan. 2022. Web.
“What is the Total Addressable Market (TAM).” Corporate Finance Institute (CFI), n.d. Accessed Jan. 2022.
|
Create a Buyer Persona and Journey
|
|
Optimize Lead Generation With Lead Scoring
|
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Determine how managers can identify poor performance remotely and help them navigate the performance improvement process while working from home.
Clarify roles and responsibilities in the performance improvement process and tailor relevant resources.
Poor performance must be managed, despite the pandemic. Evaluating root causes of performance issues is more important than ever now that personal factors such as lack of childcare and eldercare for those working from home are complicating the issue.
COVID-19 has led to a sudden shift to working from home (WFH), resulting in a 72% decline in in-office work (Ranosa, 2020). While these uncertain times have disrupted traditional work routines, employee performance remains critical, as it plays a role in determining how organizations recover. Managers must not turn a blind eye to performance issues but rather must act quickly to support employees who may be struggling.
For many, emergency WFH comes with several new challenges such as additional childcare responsibilities, sudden changes in role expectations, and negative impacts on wellbeing. These new challenges, coupled with previously existing ones, can result in poor performance. Owing to the lack of physical presence and cues, managers may struggle to identify that an employee’s performance is suffering. Even after identifying poor performance, it can be difficult to address remotely when such conversations would ideally be held in person.
Organizations need to have a clear process for improving performance for employees working remotely during the COVID-19 pandemic. Provide managers with resources to help them identify performance issues and uncover their root causes as part of addressing overall performance. This will allow managers to connect employees with the required support while working with them to improve performance.
1Identify2Initiate3Deploy4a) Follow Upb) Decide |
Storyboard
This storyboard is organized by the four steps of the performance improvement process: identify, initiate, deploy, and follow up/decide. These will appear on the left-hand side of the slides as a roadmap. The focus is on how HR can design the process for managing poor performance remotely and support managers through it while emergency WFH measures are in place. Key responsibilities, email templates, and relevant resources are included at the end. Adapt the process as necessary for your organization. |
Manager Guide
The manager guide contains detailed advice for managers on navigating the process and focuses on the content of remote performance discussions. It consists of the following sections:
|
Manager Infographic
The manager infographic illustrates the high-level steps of the performance improvement process for managers in a visually appealing and easily digestible manner. This can be used to easily outline the process, providing managers with a resource to quickly reference as they navigate the process with their direct reports. |
In this blueprint, “WFH” and “remote working” are used interchangeably.
This blueprint will not cover the performance management framework; it is solely focused on managing performance issues.
For information on adjusting the regular performance management process during the pandemic, see Performance Management for Emergency Work-From-Home.
A process for performance improvement is not akin to outlining the steps of a performance improvement plan (PIP). The PIP is a development tool used within a larger process for performance improvement. Guidance on how to structure and use a PIP will be provided later in this blueprint.
Evaluate how low performance is usually brought to the attention of HR in a non-remote situation:
|
Poor performance does not signal the immediate need to terminate an employee. Instead, managers should focus on helping the struggling employee to develop so that they may succeed. |
Evaluate how poor performance is determined:
|
Keep in mind that “poor performance” now might look different than it did before the pandemic. Employees must be aware of the current expectations placed on them before they can be labeled as underperforming – and the performance expectations must be assessed to ensure they are realistic. |
For information on adjusting performance expectations during the pandemic, see Performance Management for Emergency Work-From-Home.
The process for non-union and union employees will likely differ. Make sure your process for unionized employees aligns with collective agreements.
1Identify2Initiate3Deploy4a) Follow Upb) Decide | Identify: Determine how managers can identify poor performance. |
| In person, it can be easy to see when an employee is struggling by glancing over at their desk and observing body language. In a remote situation, this can be more difficult, as it is easy to put on a brave face for the half-hour to one-hour check-in. Advise managers on how important frequent one-one-ones and open communication are in helping identify issues when they arise rather than when it’s too late. Managers must clearly document and communicate instances where employees aren’t meeting role expectations or are showing other key signs that they are not performing at the level expected of them. | What to look for:
|
It’s crucial to acknowledge an employee might have an “off week” or need time to adjust to working from home, which can be addressed with performance management techniques. Managers should move into the process for performance improvement when:
|
While it’s important for managers to keep an eye out for decreased performance, discourage them from over-monitoring employees, as this can lead to a damaging environment of distrust.
1Identify2Initiate3Deploy4a) Follow Upb) Decide | Initiate: Require that managers have several conversations about low performance with the employee. | ||||
| Before using more formal measures, ensure managers take responsibility for connecting with the employee to have an initial performance conversation where they will make the performance issue known and try to diagnose the root cause of the issue. Coach managers to recognize behaviors associated with the following performance inhibitors: | |||||
| Personal Factors Personal factors, usually outside the workplace, can affect an employee’s performance. | Lack of clarity Employees must be clear on performance expectations before they can be labeled as a poor performer. | Low motivation Lack of motivation to complete work can impact the quality of output and/or amount of work an employee is completing. | Inability Resourcing, technology, organizational change, or lack of skills to do the job can all result in the inability of an employee to perform at their best. | Poor people skills Problematic people skills, externally with clients or internally with colleagues, can affect an employee’s performance or the team’s engagement. | |
| Personal factors are a common performance inhibitor due to emergency WFH measures. The decreased divide between work and home life and the additional stresses of the pandemic can bring up new cases of poor performance or exacerbate existing ones. Remind managers that all potential root causes should still be investigated rather than assuming personal factors are the problem and emphasize that there can be more than one cause. | |||||
1Identify2Initiate3Deploy4a) Follow Upb) Decide | Explain to managers the purpose of these discussions is to:
| Given these conversations will be remote, require managers to:
|
| What is HR’s role? HR should ensure that the manager has had multiple conversations with the employee before moving to the next step. Furthermore, HR is responsible for ensuring manages are equipped to have the conversations through coaching, role-playing, etc. For more information on the content of these conversations or for material to leverage for training purposes, see Manage Poor Performance While Working From Home: Manager Guide. McLean & Company InsightManagers are there to be coaches, not therapists. Uncovering the root cause of poor performance will allow managers to pinpoint supports needed, either within their expertise (e.g. coaching, training, providing flexible hours) or by directing the employee to proper external resources such as an EAP. | ||
1Identify2Initiate3Deploy4a) Follow Upb) Decide | Deploy: Use performance improvement tools. | |
If initial performance conversations were unsuccessful and performance does not improve, refer managers to performance improvement tools:
| ||
| Using a PIP solely to avoid legal trouble and terminate employees isn’t true to its intended purpose. This is what progressive discipline is for. | In the case of significant behavior problems, like breaking company rules or safety violations, the manager will likely need to move to progressive discipline. HR should advise managers on the appropriate process. When does the issue warrant progressive discipline? If the action needs to stop immediately, (e.g. threatening or inappropriate behavior) and/or as outlined in the collective agreement. | |
1Identify2Initiate3Deploy4a) Follow Upb) Decide | Sample Stages:1. Written PIP
2. Possible Extension3. Final Notice
| Who is involved?The manager runs the meeting with the employee. HR should act as a support by:
Determine the length of the PIP
Timing of deliveryHelp the manager determine when the PIP meeting will occur (what day, time of day). Take into account the schedule of the employee they will be meeting with (e.g. avoid scheduling right before an important client call). |
1Identify2Initiate3Deploy4a) Follow Upb) Decide | Follow up: If the process escalated to step 3 and is successful.What does success look like? Performance improvement must be sustained after the PIP is completed. It’s not enough to simply meet performance improvement goals and expectations; the employee must continue to perform. Have the manager schedule a final PIP review with the employee. Use video, as this enables the employee and manager to read body language and minimize miscommunication/misinterpretation.
The manager should also continue check-ins with the employee to ensure sustainment and as part of continued performance management.
ORDecide: Determine action steps if the process is unsuccessful.If at the end of step 3 performance has not sufficiently improved, the organization (HR and the manager) should either determine if the employee could/should be temporarily redeployed while the emergency WFH is still in place, if a permanent transfer to a role that is a better fit is an option, or if the employee should be let go. See the Complete Manual for COVID-19 Layoffs blueprint for information on layoffs in remote environments. |
HR should conduct checkpoints with both managers and employees in cases where a formal PIP was initiated to ensure the process for performance improvement is being followed and to support both parties in improving performance.
Use the templates found on the next slides to draft communications to employees who are underperforming while working from home.
Customize all templates with relevant information and use them as a guide to further tailor your communication to a specific employee.
Review all slides and adjust the language or content as needed to suit the needs of the employee, the complexity of their role, and the performance issue.
This template is not a substitute for legal advice. Ensure you consult with your legal counsel, labor relations representative, and union representative to align with collective agreements and relevant legislation.
Hello [name],
Thank you for the commitment and eagerness in our meeting yesterday.
I wanted to recap the conversation and expectations for the month of [insert month].
As discussed, you have been advised about your recent [behavior, performance, attendance, policy, etc.] where you have demonstrated [state specific issue with detail of behavior/performance of concern]. As per our conversation, we’ll be working on improvement in this area in order to meet expectations set out for our employees.
It is expected that employees [state expectations]. Please do not hesitate to reach out to me if there is further clarification needed or you if you have any questions or concerns. The management team and I are committed to helping you achieve these goals.
We will do a formal check-in on your progress every [insert day] from [insert time] to review your progress. I will also be available for daily check-ins to support you on the right track. Additionally, you can book me in for desk-side coaching outside of my regular desk-side check-ins. If there is anything else I can do to help support you in hitting these goals, please let me know. Other resources we discussed that may be helpful in meeting these objectives are [summarize available support and resources]. By working together through this process, I have no doubt that you can be successful. I am here to provide support and assist you through this.
If you’re unable to show improvements set out in our discussion by [date], we will proceed to a formal performance measure that will include a performance improvement plan. Please let me know if you have any questions or concerns; I am here to help.
Please acknowledge this email and let me know if you have any questions.
Thank you,
Hello [name] ,
This is to confirm our meeting on [date] in which we discussed your performance to date and areas that need improvement. Please find the attached performance improvement plan, which contains a detailed action plan that we have agreed upon to help you meet role expectations over the next [XX days]. The aim of this plan is to provide you with a detailed outline of our performance expectations and provide you the opportunity to improve your performance, with our support.
We will check in every [XX days] to review your progress. At the end of the [XX]-day period, we will review your performance against the role expectations set out in this performance improvement plan. If you don’t meet the performance requirements in the time allotted, further action and consequences will follow.
Should you have any questions about the performance improvement plan or the process outlined in this document, please do not hesitate to discuss them with me.
[Employee name], it is my personal objective to help you be a fully productive member of our team. By working together through this performance improvement plan, I have no doubt that you can be successful. I am here to provide support and assist you through the process. At this time, I would also like to remind you about the [additional resources available at your organization, for example, employee assistance program or HR].
Please acknowledge this email and let me know if you have any questions.
Thank you,
![]() |
Manage Poor Performance While Working From Home: Manager Guide
This tool for managers provides advice on navigating the process and focuses on the content of remote performance discussions. |
![]() |
Set Meaningful Employee Performance Measures
See this blueprint for information on setting holistic measures to inspire employee performance. |
![]() |
Manage Poor Performance While Working From Home: Infographic
This tool illustrates the high-level steps of the performance improvement process. |
![]() |
Wellness and Working From Home: Infographic
This tool highlights tips to manage physical and mental health while working from home. |
![]() |
Build a Better Manager: Team Essentials
See this solution set for more information on kick-starting the effectiveness of first-time IT managers with essential management skills. |
![]() |
Leverage Agile Goal Setting for Improved Employee Engagement & Performance
See this blueprint for information on dodging the micromanaging foul and scoring with agile short-term goal setting. |
Arringdale, Chris. “6 Tips For Managers Trying to Overcome Performance Appraisal Anxiety.” TLNT. 18 September 2015. Accessed 2018.
Borysenko, Karlyn. “What Was Management Thinking? The High Cost of Employee Turnover.” Talent Management and HR. 22 April 2015. Accessed 2018.
Cook, Ian. “Curbing Employee Turnover Contagion in the Workplace.” Visier. 20 February 2018. Accessed 2018.
Cornerstone OnDemand. Toxic Employees in the Workplace. Santa Monica, California: Cornerstone OnDemand, 2015. Web.
Dewar, Carolyn and Reed Doucette. “6 elements to create a high-performing culture.” McKinsey & Company. 9 April 2018. Accessed 2018.
Eagle Hill. Eagle Hill National Attrition Survey. Washington, D.C.: Eagle Hill, 2015. Web.
ERC. “Performance Improvement Plan Checklist.” ERC. 21 June 2017. Accessed 2018.
Foster, James. “The Impact of Managers on Workplace Engagement and Productivity.” Interact. 16 March 2017. Accessed 2018.
Godwins Solicitors LLP. “Employment Tribunal Statistics for 2015/2016.” Godwins Solicitors LLP. 8 February 2017. Accessed 2018.
Mankins, Michael. “How to Manage a Team of All-Stars.” Harvard Business Review. 6 June 2017. Accessed 2018.
Maxfield, David, et al. The Value of Stress-Free Productivity. Provo, Utah: VitalSmarts, 2017. Web.
Murphy, Mark. “Skip Your Low Performers When Starting Performance Appraisals.” Forbes. 21 January 2015. Accessed 2018.
Quint. “Transforming into a High Performance Organization.” Quint Wellington Redwood. 16 November 2017. Accessed 2018.
Ranosa, Rachel. "COVID -19: Canadian Productivity Booms Despite Social Distancing." Human Resources Director, 14 April 2020. Accessed 2020.
Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and ensuring that you have met your goal.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this as a guideline to assist you in presenting security to executive stakeholders.
The security presentation templates are a set of customizable templates for various types of security presentation including:
![]() |
As a security leader, you’re tasked with various responsibilities to ensure your organization can achieve its goals while its most important assets are being protected. However, when communicating security to executive stakeholders, challenges can arise in determining what topics are pertinent to present. Changes in the security threat landscape coupled with different business goals make identifying how to present security more challenging. Having a communication framework for presenting security to executive stakeholders will enable you to effectively identify, develop, and deliver your communication goals while obtaining the support you need to achieve your objectives. Ahmad Jowhar Info-Tech Research Group |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
|
|
|
Info-Tech Insight
Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.
76% of security leaders struggle in conveying the effectiveness of a cybersecurity program.
62% find it difficult to balance the risk of too much detail and need-to-know information.
41% find it challenging to communicate effectively with a mixed technical and non-technical audience.
9% of boards are extremely confident in their organization’s cybersecurity risk mitigation measures.
77% of organizations have seen an increase in the number of attacks in 2021.
56% of security leaders claimed their team is not involved when leadership makes urgent security decisions.
1. Identify communication goals |
2. Collect information to support goals |
3. Develop communication |
4. Deliver communication |
|
|---|---|---|---|---|
Phase steps |
|
|
|
|
Phase outcomes |
A defined list of drivers and goals to help you develop your security presentations |
A list of data sources to include in your communication |
A completed communication template |
A solidified understanding of how to effectively communicate security to your stakeholders |
Security presentations are not a one-way street
The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.
Identifying your goals is the foundation of an effective presentation
Defining your drivers and goals for communicating security will enable you to better prepare and deliver your presentation, which will help you obtain your desired outcome.
Harness the power of data
Leveraging data and analytics will help you provide quantitative-based communication, which will result in a more meaningful and effective presentation.
Take your audience on a journey
Developing a storytelling approach will help engage with your audience.
Win your audience by building a rapport
Establishing credibility and trust with executive stakeholders will enable you to obtain their support for security objectives.
Tactical insight
Conduct background research on audience members (i.e. professional background) to help understand how best to communicate with them and overcome potential objections.
Tactical insight
Verifying your objectives at the end of the communication is important, as it ensures you have successfully communicated to executive stakeholders.
Report on Security Initiatives |
![]() |
Security Metrics |
![]() |
Security Incident Response & Recovery |
![]() |
Security Funding Request |
![]() |

Template showing how to inform executive stakeholders of proactive security and risk initiatives.
IT/InfoSec benefits |
Business benefits |
|---|---|
|
|
Phase |
Measured Value (Yearly) |
|---|---|
Phase 1: Identify communication goals |
Cost to define drivers and goals for communicating security to executives: 16 FTE hours @ $233K* =$1,940 |
Phase 2: Collect information to support goals |
Cost to collect and synthesize necessary data to support communication goals: 16 FTE hours @ $233K = $1,940 |
Phase 3: Develop communication |
Cost to develop communication material that will contextualize information being shown: 16 FTE hours @ $233K = $1,940 |
Phase 4: Deliver communication |
|
Potential Savings: |
Total estimated effort = $5,820 Our blueprint will help you save $5,820 and over 40 FTE hours |
* The financial figure depicts the annual salary of a CISO in 2022
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Identify drivers for communicating to executives 1.2 Define your goals for communicating to executives |
2.1 Identify data to collect 2.2 Plan how to retrieve data |
3.1 Plan communication 3.2 Build a compelling communication document |
4.1 Deliver a captivating presentation 4.2 Obtain/verify support for security goals |
This phase will walk you through the following activities:
This phase involves the following participants:
As a security leader, you meet with executives and stakeholders with diverse backgrounds, and you aim to showcase your organization’s security posture along with its alignment with the business’ goals.
However, with the constant changes in the security threat landscape, demands and drivers for security could change. Thus, understanding potential drivers that will influence your communication will assist you in developing and delivering an effective security presentation.
39% of organizations had cybersecurity on the agenda of their board’s quarterly meeting.
Info-Tech Insight
Not all security presentations are the same. Keep your communication strategy and processes agile.
By understanding the influences for your security presentations, you will be able to better plan what to present to executive stakeholders.
Understanding drivers will also help you understand how to present security to executive stakeholders.
Identify your communication drivers, which can stem from various initiatives and programs, including:
When it comes to identifying your communication drivers, you can collaborate with subject matter experts, like your corporate secretary or steering committees, to ensure the material being communicated will align with some of the organizational goals.
Audit
Upcoming internal or external audits might require updates on the organization’s compliance
Organizational restructuring
Restructuring within an organization could require security updates
Merger & Acquisition
An M&A would trigger presentations on organization’s current and future security posture
Cyber incident
A cyberattack would require an immediate presentation on its impact and the incident response plan
Ad hoc
Provide security information requested by stakeholders
After identifying drivers for your communication, it’s important to determine what your goals are for the presentation.
Identifying your communication goals could require the participation of the security team, IT leadership, and other business stakeholders.
Info-Tech Insight
There can be different reasons to communicate security to executive stakeholders. You need to understand what you want to get out of your presentation.
Educate
Educate the board on security trends and/or latest risks in the industry
Update
Provide updates on security initiatives, relevant security metrics, and compliance posture
Inform
Provide an incident response plan due to a security incident or deliver updates on current threats and risks
Investment
Request funding for security investments or financial updates on past security initiatives
Ad hoc
Provide security information requested by stakeholders
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Identify drivers for communicating to executives 1.2 Define your goals for communicating to executives | 2.1 Identify data to collect 2.2 Plan how to retrieve data | 3.1 Plan communication 3.2 Build a compelling communication document | 4.1 Deliver a captivating presentation 4.2 Obtain/verify support for security goals |
This phase will walk you through the following activities:
This phase involves the following participants:
After identifying drivers and goals for your communication, it’s important to include the necessary data to justify the information being communicated.
Identifying data to collect doesn’t need to be a rigorous task; you can follow these steps to help you get started:
Info-Tech Insight
Understand how to present your information in a way that will be meaningful to your audience, for instance by quantifying security risks in financial terms.
Educate
Number of organizations in industry impacted by data breaches during past year; top threats and risks affecting the industries
Update
Degree of compliance with standards (e.g. ISO-27001); metrics on improvement of security posture due to security initiatives
Inform
Percentage of impacted clients and disrupted business functions; downtime; security risk likelihood and financial impact
Investment
Capital and operating expenditure for investment; ROI on past and future security initiatives
Ad hoc
Number of security initiatives that went over budget; phishing test campaign results
Once the data that is going to be used for the presentation has been identified, it is important to plan how the data can be retrieved, processed, and shared.
Once the data source and owner has been identified, you need to plan how the data would be processed and leveraged for your presentation
Info-Tech Insight
Using a data-driven approach to help support your objectives is key to engaging with your audience.
Identifying the relevant data sources to retrieve your data and the appropriate data owner enables efficient collaboration between departments collecting, processing, and communicating the data and graphics to the audience.
Examples of where to retrieve your data
Data Source |
Data |
Data Owner |
Communication Goal |
|---|---|---|---|
Audit & Compliance Reports |
Percentage of controls completed to be certified with ISO 27001; Number of security threats & risks identified. |
Audit Manager; Compliance Manager; Security Leader |
Ad hoc, Educate, Inform |
Identity & Access Management (IAM) Applications |
Number of privileged accounts/department; Percentage of user accounts with MFA applied |
Network/Security Analyst |
Ad hoc, Inform, Update |
Security Information & Event Management (SIEM) |
Number of attacks detected and blocked before & after implementing endpoint security; Percentage of firewall rules that triggered a false positive |
Network/Security Analyst |
Ad hoc, Inform, Update |
Vulnerability Management Applications |
Percentage of critical vulnerabilities patched; Number of endpoints encrypted |
Network/Security Analyst |
Ad hoc, Inform, Update |
Financial & Accounting Software |
Capital & operating expenditure for future security investments; Return on investment (ROI) on past and current security investments |
Financial and/or Accounting Manager |
Ad hoc, Educate, Investments |
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Identify drivers for communicating to executives 1.2 Define your goals for communicating to executives | 2.1 Identify data to collect 2.2 Plan how to retrieve data | 3.1 Plan communication 3.2 Build a compelling communication document | 4.1 Deliver a captivating presentation 4.2 Obtain/verify support for security goals |
This phase will walk you through the following activities:
This phase involves the following participants:
Examples of two profiles in a boardroom
Formal board of directors |
The executive team |
|---|---|
|
|
A board’s purpose can include the following:
Examples of potential values and risks
Info-Tech Insight
Conduct background research on audience members (e.g. professional background on LinkedIn) to help understand how best to communicate to them and overcome potential objections.
Examples of potential concerns for each profile of executive stakeholders
Formal board of directors | The executive team |
|---|---|
|
|
Your presentation should be well-rounded and compelling when it addresses the board’s main concerns about security.
Checklist:
Info-Tech Insight
The executive stakeholder’s main concerns will always boil down to one important outcome: providing a level of confidence to do business through IT products, services, and systems – including security.
Info-Tech Insight
Developing a storytelling approach will help keep your audience engaged and allow the information to resonate with them, which will add further value to the communication.
You should be clear about your bottom line and the intent behind your presentation. However, regardless of your bottom line, your presentation must focus on what business problems you are solving and why security can assist in solving the problem.
Examples of communication goals
To inform or educate |
To reach a decision |
|---|---|
|
|
Info-Tech Insight
Nobody likes surprises. Communicate early and often. The board should be pre-briefed, especially if it is a difficult subject. This also ensures you have support when you deliver a difficult message.
Once you understand your target audience, it’s important to tailor your presentation material to what they will care about.
Typical IT boardroom presentations include:
Info-Tech Insight
You must always have a clear goal or objective for delivering a presentation in front of your board of directors. What is the purpose of your board presentation? Identify your objective and outcome up front and tailor your presentation’s story and contents to fit this purpose.
Info-Tech Insight
Telling a good story is not about the message you want to deliver but the one the executive stakeholders want to hear. Articulate what you want them to think and what you want them to take away, and be explicit about it in your presentation. Make your story logically flow by identifying the business problem, complication, the solution, and how to close the gap. Most importantly, communicate the business impacts the board will care about.
To build a strong story for your presentation, ensure you answer these three questions:
WHY |
Why is this a business issue, or why should the executive stakeholders care? |
|---|---|
WHAT |
What is the impact of solving the problem and driving value for the company? |
HOW |
How will we leverage our resources (technology, finances) to solve the problem? |
Scenario 1: The company has experienced a security incident.
Intent: To inform/educate the board about the security incident.
WHY | The data breach has resulted in a loss of customer confidence, negative brand impact, and a reduction in revenue of 30%. |
|---|---|
WHAT | Financial, legal, and reputational risks identified, and mitigation strategies implemented. IT is working with the PR team on communications. Incident management playbook executed. |
HOW | An analysis of vulnerabilities was conducted and steps to address are in effect. Recovery steps are 90% completed. Incident management program reviewed for future incidents. |
Scenario 2: Security is recommending investments based on strategic priorities.
Intent: To reach a decision with the board – approve investment proposal.
WHY | The new security strategy outlines two key initiatives to improve an organization’s security culture and overall risk posture. |
|---|---|
WHAT | Security proposed an investment to implement a security training & phishing test campaign, which will assist in reducing data breach risks. |
HOW | Use 5% of security’s budget to implement security training and phishing test campaigns. |
What you include in your story will often depend on how much time you have available to deliver the message.
Consider the following:
Use the Q&A portion to build credibility with the board.
Info-Tech Insight
The average board presentation is 15 minutes long. Build no more than three or four slides of content to identify the business problem, the business impacts, and the solution. Leave five minutes for questions at the end, and be prepared with back-up slides to support your answers.
Checklist:
Once you’ve identified your communication goals, data, and plan to present to your stakeholders, it’s important to build the compelling communication document that will attract all audiences.
A good slide design increases the likelihood that the audience will read the content carefully.
Leverage these slide design best practices to assist you in developing eye-catching presentations.
Horizontal logic |
Vertical logic |
|---|---|
|
|
![]() |
![]() |
The audience is unsure where to look and in what order. |
The audience knows to read the heading first. Then look within the pie chart. Then look within the white boxes to the right. |
Horizontal logic | Vertical logic |
|---|---|
|
|
![]() |
![]() |
|
Increase skim-ability:
Make it easier on the eyes:
|
Passive voice |
Active voice |
|---|---|
“There are three things to look out for” (8 words) “Network security was compromised by hackers” (6 words) |
“Look for these three things” (5 words) “Hackers compromised network security” (4 words) |
![]() |
![]() |
Easy to read, but hard to remember the stats. |
The visuals make it easier to see the size of the problem and make it much more memorable. Remember to:
|
![]() |
![]() |
This draft slide is just content from the outline document on a slide with no design applied yet. |
|
Cognitively
Emotionally
Visual clues
Persuasion
Often stakeholders prefer to receive content in a specific format. Make sure you know what you require so that you are not scrambling at the last minute.
Leverage this checklist to ensure you are creating the perfect visuals and graphs for your presentation.
Checklist:
Once you have identified your communication goals and plans for building your communication document, you can start building your presentation deck. These presentation templates highlight different security topics depending on your communication drivers, goals, and available data. Info-Tech has created five security templates to assist you in building a compelling presentation. These templates provide support for presentations on the following five topics:
Each template provides instructions on how to use it and tips on ensuring the right information is being presented. All the templates are customizable, which enables you to leverage the sections you need while also editing any sections to your liking. |
![]() |
Download the Security Presentation Templates
It’s important to know that not all security presentations for an organization are alike. However, these templates would provide a guideline on what the best practices are when communicating security to executive stakeholders.
Below is an example of instructions to complete the “Security Risk & Update” template. Please note that the security template will have instructions to complete each of its sections.
![]() |
![]() |
The first slide following the title slide includes a brief executive summary on what would be discussed in the presentation. This includes the main security threats that would be addressed and the associated risk mitigation strategies. |
This slide depicts a holistic overview of the organization’s security posture in different areas along with the main business goals that security is aligning with. Ensure visualizations you include align with the goals highlighted. |
![]() |
![]() |
This slide displays any top threats and risks an organization is facing. Each threat consists of 2-3 risks and is prioritized based on the negative impact it could have on the organization (i.e. red bar = high priority; green bar = low priority). Include risks that have been addressed in the past quarter, and showcase any prioritization changes to those risks. |
This slide follows the “Top Threats & Risks” slide and focuses on the risks that had medium or high priority. You will need to work with subject matter experts to identify risk figures (likelihood, financial impact) that will enable you to quantify the risks (Likelihood x Financial Impact). Develop a threshold for each of the three columns to identify which risks require further prioritization, and apply color coding to group the risks. |
![]() |
![]() |
This slide showcases further details on the top risks along with their business impact. Be sure to include recommendations for the risks and indicate whether further action is required from the executive stakeholders. |
The last slide of the “Security Risk & Update” template presents a timeline of when the different initiatives to mitigate security risks would begin. It depicts what initiatives will be completed within each fiscal year and the total number of months required. As there could be many factors to a project’s timeline, ensure you communicate to your executive stakeholders any changes to the project. |
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Identify drivers for communicating to executives 1.2 Define your goals for communicating to executives | 2.1 Identify data to collect 2.2 Plan how to retrieve data | 3.1 Plan communication 3.2 Build a compelling communication document | 4.1 Deliver a captivating presentation 4.2 Obtain/verify support for security goals |
This phase will walk you through the following activities:
This phase involves the following participants:
You’ve gathered all your data, you understand what your audience is expecting, and you are clear on the outcomes you require. Now, it’s time to deliver a presentation that both engages and builds confidence.
Follow these tips to assist you in developing an engaging presentation:
Info-Tech Insight
Establishing credibility and trust with executive stakeholders is important to obtaining their support for security objectives.
Know your environment |
Be professional but not boring |
Connect with your audience |
|---|---|---|
|
|
|
Optimize the timing of your presentation:
Script your presentation:
Other considerations:
Leverage this checklist to ensure you are prepared to develop and deliver an engaging presentation.
Checklist:
Once you’ve delivered your captivating presentation, it’s imperative to communicate with your executive stakeholders.
Info-Tech Insight
Verifying your objectives at the end of the presentation is important, as it ensures you have successfully communicated to executive stakeholders.
Follow this checklist to assist you in obtaining and verifying your communication goals.
Checklist:
Problem Solved
A better understanding of security communication drivers and goals
A developed a plan for how and where to retrieve data for communication
A solidified communication plan with security templates to assist in better presenting to your audience
A defined guideline on how to deliver a captivating presentation to achieve your desired objectives
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
1-888-670-8889
Build an Information Security Strategy
This blueprint will walk you through the steps of tailoring best practices to effectively manage information security.
Build a Security Metrics Program to Drive Maturity
This blueprint will assist you in identifying security metrics that can tie to your organizational goals and build those metrics to achieve your desired maturity level.
Bhadauriya, Amit S. “Communicating Cybersecurity Effectively to the Board.” Metricstream. Web.
Booth, Steven, et al. “The Biggest Mistakes Made When Presenting Cyber Security to Senior Leadership or the Board, and How to Fix Them.” Mandiant, May 2019. Web.
Bradford, Nate. “6 Slides Every CISO Should Use in Their Board Presentation.” Security Boulevard, 9 July 2020. Web.
Buckalew, Lauren, et al. “Get the Board on Board: Leading Cybersecurity from the Top Down.” Newsroom, 2 Dec. 2019. Web.
Burg, Dave, et al. “Cybersecurity: How Do You Rise above the Waves of a Perfect Storm?” EY US - Home, EY, 22 July 2021. Web.
Carnegie Endowment for International Peace. Web.
“Chief Information Security Officer Salary.” Salary.com, 2022. Web.
“CISO's Guide to Reporting to the Board - Apex Assembly.” CISO's Guide To Reporting to the Board. Web.
“Cyber Security Oversight in the Boardroom” KPMG, Jan. 2016. Web.
“Cybersecurity CEO: My 3 Tips for Presenting in the Boardroom.” Cybercrime Magazine, 31 Mar. 2020. Web.
Dacri , Bryana. Do's & Don'ts for Security Professionals Presenting to Executives. Feb. 2018. Web.
Froehlich, Andrew. “7 Cybersecurity Metrics for the Board and How to Present Them: TechTarget.” Security, TechTarget, 19 Aug. 2022. Web.
“Global Board Risk Survey.” EY. Web.
“Guidance for CISOs Presenting to the C-Suite.” IANS, June 2021. Web.
“How to Communicate Cybersecurity to the Board of Directors.” Cybersecurity Conferences & News, Seguro Group, 12 Mar. 2020. Web.
Ide, R. William, and Amanda Leech. “A Cybersecurity Guide for Directors” Dentons. Web.
Lindberg, Randy. “3 Tips for Communicating Cybersecurity to the Board.” Cybersecurity Software, Rivial Data Security, 8 Mar. 2022. Web.
McLeod, Scott, et al. “How to Present Cybersecurity to Your Board of Directors.” Cybersecurity & Compliance Simplified, Apptega Inc, 9 Aug. 2021. Web.
Mickle, Jirah. “A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations.” Tenable®, 28 Nov. 2022. Web.
Middlesworth, Jeff. “Top-down: Mitigating Cybersecurity Risks Starts with the Board.” Spiceworks, 13 Sept. 2022. Web.
Mishra, Ruchika. “4 Things Every CISO Must Include in Their Board Presentation.” Security Boulevard, 17 Nov. 2020. Web.
O’Donnell-Welch, Lindsey. “CISOs, Board Members and the Search for Cybersecurity Common Ground.” Decipher, 20 Oct. 2022. Web.
“Overseeing Cyber Risk: The Board's Role.” PwC, Jan. 2022. Web.
Pearlson, Keri, and Nelson Novaes Neto. “7 Pressing Cybersecurity Questions Boards Need to Ask.” Harvard Business Review, 7 Mar. 2022. Web.
“Reporting Cybersecurity Risk to the Board of Directors.” Web.
“Reporting Cybersecurity to Your Board - Steps to Prepare.” Pondurance ,12 July 2022. Web.
Staynings, Richard. “Presenting Cybersecurity to the Board.” Resource Library. Web.
“The Future of Cyber Survey.” Deloitte, 29 Aug. 2022. Web.
“Top Cybersecurity Metrics to Share with Your Board.” Packetlabs, 10 May 2022. Web.
Unni, Ajay. “Reporting Cyber Security to the Board? How to Get It Right.” Cybersecurity Services Company in Australia & NZ, 10 Nov. 2022. Web.
Vogel, Douglas, et al. “Persuasion and the Role of Visual Presentation Support.” Management Information Systems Research Center, 1986.
“Welcome to the Cyber Security Toolkit for Boards.” NCSC. Web.