Data security consultancy

Data security consultancy

Based on experience
Implementable advice
human-based and people-oriented

Data security consultancy makes up one of Tymans Group’s areas of expertise as a corporate consultancy firm. We are happy to offer our insights and solutions regarding data security and risk to businesses, both through online and offline channels. Read on and discover how our consultancy company can help you set up practical data security management solutions within your firm.

How our data security consultancy services can help your company

Data security management should be an important aspect of your business. As a data security consultancy firm, Tymans Group is happy to assist your small or medium-sized enterprise with setting up clear protocols to keep your data safe. As such, we can advise on various aspects comprising data security management. This ranges from choosing a fit-for-purpose data architecture to introducing IT incident management guidelines. Moreover, we can perform an external IT audit to discover which aspects of your company’s data security are vulnerable and which could be improved upon.

Security and risk management

Our security and risk services

Security strategy

Security Strategy

Embed security thinking through aligning your security strategy to business goals and values

Read more

Disaster Recovery Planning

Disaster Recovery Planning

Create a disaster recovey plan that is right for your company

Read more

Risk Management

Risk Management

Build your right-sized IT Risk Management Program

Read more

Check out all our services

Discover our practical data security management solutions

Data security is just one aspect with which our consultancy firm can assist your company. Tymans Group offers its extensive expertise in various corporate management domains, such as quality management and risk management. Our solutions all stem from our vast expertise and have proven their effectiveness. Moreover, when you choose to employ our consultancy firm for your data security management, you benefit from a holistic, people-oriented approach.

Set up an appointment with our experts

Do you wish to learn more about our data security management solutions and services for your company? We are happy to analyze any issues you may be facing and offer you a practical solution if you contact us for an appointment. You can book a one-hour online talk or elect for an on-site appointment with our experts. Contact us to set up your appointment now.

Register to read more …

Legacy Active Directory Environment

  • Buy Link or Shortcode: {j2store}471|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Cloud Strategy
  • Parent Category Link: /cloud-strategy

You are looking to lose your dependency on Active Directory (AD), and you need to tackle infrastructure technical debt, but there are challenges:

  • Legacy apps that are in maintenance mode cannot shed their AD dependency or have hardware upgrades made.
  • You are unaware of what processes depend on AD and how integrated they are.
  • Departments invest in apps that are integrated with AD without informing you until they ask for Domain details after purchasing.

Our Advice

Critical Insight

  • Remove your dependency on AD one application at a time. If you are a cloud-first organization, rethink your AD strategy to ask “why” when you add a new device to your Active Directory.
  • With the advent of hybrid work, AD is now a security risk. You need to shore up your security posture. Think of zero trust architecture.
  • Take inventory of your objects that depend on Kerberos and NTML and plan on removing that barrier through applications that don’t depend on AD.

Impact and Result

Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.

Legacy Active Directory Environment Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Legacy Active Directory Environment Deck – Legacy AD was never built for modern infrastructure. Understand the history and future of Active Directory and what alternatives are in the market.

Build all new systems with cloud integration in mind. Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code.

  • Legacy Active Directory Environment Storyboard
[infographic]

Further reading

Legacy Active Directory Environment

Kill the technical debt of your legacy Active Directory environment.

Analyst Perspective

Understand what Active Directory is and why Azure Active Directory does not replace it.

It’s about Kerberos and New Technology LAN Manager (NTLM).

The image contains a picture of John Donovan.

Many organizations that want to innovate and migrate from on-premises applications to software as a service (SaaS) and cloud services are held hostage by their legacy Active Directory (AD). Microsoft did a good job taking over from Novell back in the late 90s, but its hooks into businesses are so deep that many have become dependent on AD services to manage devices and users, when in fact AD falls far short of needed capabilities, restricting innovation and progress.

Despite Microsoft’s Azure becoming prominent in the world of cloud services, Azure AD is not a replacement for on-premises AD. While Azure AD is a secure authentication store that can contain users and groups, that is where the similarities end. In fact, Microsoft itself has an architecture to mitigate the shortcomings of Azure AD by recommending organizations migrate to a hybrid model, especially for businesses that have an in-house footprint of servers and applications.

If you are a greenfield business and intend to take advantage of software, infrastructure, and platform as a service (SaaS, IaaS, and PaaS), as well as Microsoft 365 in Azure, then Azure AD is for you and you don’t have to worry about the need for AD.

John Donovan
Principal Director, I&O Practice
Info-Tech Research Group

Insight Summary

Legacy AD was never built for modern infrastructure

When Microsoft built AD as a free component for the Windows Server environment to replace Windows NT before the demise of Novell Directory Services in 2001, it never meant Active Directory to work outside the corporate network with Microsoft apps and devices. While it began as a central managing system for users and PCs on Microsoft operating systems, with one user per PC, the IT ecosystem has changed dramatically over the last 20 years, with cloud adoption, SaaS, IaaS, PaaS, and everything as a service. To make matters worse, work-from-anywhere has become a serious security challenge.

Build all new systems with cloud integration in mind

Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code. Ensure you are engaged when the business is assessing new apps. Stop the practice of the business purchasing apps without IT’s involvement; for example, if your marketing department is asking you for your Domain credentials for a vendor when you were not informed of this purchase.

Hybrid AD is a solution but not a long-term goal

Economically, Microsoft has no interest in replacing AD anytime soon. Microsoft wants that revenue and has built components like Azure AD Connect to mitigate the AD dependency issue, which is basically holding your organization hostage. In fact, Microsoft has advised that a hybrid solution will remain because, as we will investigate, Azure AD is not legacy AD.

Executive Summary

Your Challenge

Common Obstacles

Info-Tech’s Approach

You are looking to lose your dependency on Active Directory, and you need to tackle infrastructure technical debt, but there are challenges.

  • Legacy apps that are in maintenance mode cannot shed their AD dependency or have hardware upgrades made.
  • You are unaware of what processes depend on AD and how integrated they are.
  • Departments invest in apps that are integrated with AD without informing you until they ask for Domain details after purchasing.
  • Legacy applications can prevent you from upgrading servers or may need to be isolated due to security concerns related to inadequate patching and upgrades.
  • You do not see any return on investment in AD maintenance.
  • Mergers and acquisitions can prevent you from migrating away from AD if one company is dependent on AD and the other is fully in the cloud. This increases technical debt.
  • Remove your dependency on AD one application at a time. If you are a cloud-first organization, rethink your AD strategy to ask “why” when you add a new device to your Active Directory.
  • With the advent of hybrid work, AD is now a security risk. You need to shore up your security posture. Think of zero trust architecture.
  • Take inventory of your objects that depend on Kerberos and NTML and plan on removing that barrier through applications that don’t depend on AD.

Info-Tech Insight

Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.

The history of Active Directory

The evolution of your infrastructure environment

From NT to the cloud

AD 2001 Exchange Server 2003 SharePoint 2007 Server 2008 R2 BYOD Security Risk All in Cloud 2015
  • Active Directory replaces NT and takes over from Novell as the enterprise access and control plane.
  • With slow WAN links, no cellphones, no tablets, and very few laptops, security was not a concern in AD.
  • In 2004, email becomes business critical.
  • This puts pressure on links, increases replication and domains, and creates a need for multiple identities.
  • Collaboration becomes pervasive.
  • Cross domain authentication becomes prevalent across the enterprise.
  • SharePoint sites need to be connected to multiple Domain AD accounts. More multiple identities are required.
  • Exchange resource forest rolls out, causing the new forest functional level to be a more complex environment.
  • Fine-grained password policies have impacted multiple forests, forcing them to adhere to the new password policies.
  • There are powerful Domain controllers, strong LAN and WAN connections, and an increase in smartphones and laptops.
  • Audits and compliance become a focus, and mergers and acquisitions add complexity. Security teams are working across the board.
  • Cloud technology doesn’t work well with complicated, messy AD environment. Cloud solutions need simple, flat AD architecture.
  • Technology changes after 15+ years. AD becomes the backbone of enterprise infrastructure. Managers demand to move to cloud, building complexity again.

Organizations depend on AD

AD is the backbone of many organizations’ IT infrastructure

73% of organizations say their infrastructure is built on AD.

82% say their applications depend on AD data.

89% say AD enables authenticated access to file servers.

90% say AD is the main source for authentication.

Source: Dimensions research: Active Directory Modernization :

Info-Tech Insight

Organizations fail to move away from AD for many reasons, including:

  • Lack of time, resources, budget, and tools.
  • Difficulty understanding what has changed.
  • Migrating from AD being a low priority.

Active Directory components

Physical and logical structure

Authentication, authorization, and auditing

The image contains a screenshot of the active directory components.

Active Directory has its hooks in!

AD creates infrastructure technical debt and is difficult to migrate away from.

The image contains a screenshot of an active directory diagram.

Info-Tech Insight

Due to the pervasive nature of Active Directory in the IT ecosystem, IT organizations are reluctant to migrate away from AD to modernize and innovate.

Migration to Microsoft 365 in Azure has forced IT departments’ hand, and now that they have dipped their toe in the proverbial cloud “lake,” they see a way out of the mounting technical debt.

AD security

Security is the biggest concern with Active Directory.

Neglecting Active Directory security

98% of data breaches came from external sources.

Source: Verizon, Data Breach Report 2022

85% of data breach took weeks or even longer to discover.

Source: Verizon Data Breach Report, 2012

The biggest challenge for recovery after an Active Directory security breach is identifying the source of the breach, determining the extent of the breach, and creating a safe and secure environment.

Info-Tech Insight

Neglecting legacy Active Directory security will lead to cyberattacks. Malicious users can steal credentials and hijack data or corrupt your systems.

What are the security risks to legacy AD architecture?

  • It's been 22 years since AD was released by Microsoft, and it has been a foundational technology for most businesses over the years. However, while there have been many innovations over those two decades, like Amazon, Facebook, iPhones, Androids, and more, Active Directory has remained mostly unchanged. There hasn’t been a security update since 2016.
  • This lack of security innovation has led to several cyberattacks over the years, causing businesses to bolt on additional security measures and added complexity. AD is not going away any time soon, but the security dilemma can be addressed with added security features.

AD event logs

84% of organizations that had a breach had evidence of that breach in their event logs.

Source: Verizon Data Breach Report, 2012

What is the business risk

How does AD impact innovation in your business?

It’s widely estimated that Active Directory remains at the backbone of 90% of Global Fortune 1000 companies’ business infrastructure (Lepide, 2021), and with that comes risk. The risks include:

  • Constraints of AD and growth of your digital footprint
  • Difficulty integrating modern technologies
  • Difficulty maintaining consistent security policies
  • Inflexible central domains preventing innovation and modernization
  • Inability to move to a self-service password portal
  • Vulnerability to being hacked
  • BYOD not being AD friendly

AD is dependent on Windows Server

  1. Even though AD is compliant with LDAP, software vendors often choose optional features of LDAP that are not supported by AD. It is possible to implement Kerberos in a Unix system and establish trust with AD, but this is a difficult process and mistakes are frequent.
  2. Restricting your software selection to Windows-based systems reduces innovation and may hamper your ability to purchase best-in-class applications.

Azure AD is not a replacement for AD

AD was designed for an on-premises enterprise

The image contains a screenshot of a Azure AD diagram.

  • Despite Microsoft’s Azure becoming prominent in the world of cloud services, Azure AD is not a replacement for on-premises AD.
  • In fact, Microsoft itself has an architecture to mitigate the shortcomings of Azure AD by recommending organizations migrate to a hybrid model, especially those businesses that have an in-house footprint of servers and applications.
  • If you are a greenfield business and intend to take advantage of SaaS, IaaS, and PaaS, as well as Microsoft 365 in Azure, then Azure AD is for you and you don’t have to worry about the need for AD.

"Azure Active Directory is not designed to be the cloud version of Active Directory. It is not a domain controller or a directory in the cloud that will provide the exact same capabilities with AD. It actually provides many more capabilities in a different way.

That’s why there is no actual ‘migration’ path from Active Directory to Azure Active Directory. You can synchronize your on-premises directories (Active Directory or other) to Azure Active Directory but not migrate your computer accounts, group policies, OU etc."

– Gregory Hall,
Brand Representative for Microsoft
(Source: Spiceworks)

The hybrid model for AD and Azure AD

How the model works

The image contains a screenshot of a hybrid model for AD and Azure AD.

Note: AD Federated Services (ADFS) is not a replacement for AD. It’s a bolt-on that requires maintenance, support, and it is not a liberating service.

Many companies are:

  • Moving to SaaS solutions for customer relationship management, HR, collaboration, voice communication, file storage, and more.
  • Managing non-Windows devices.
  • Moving to a hybrid model of work.
  • Enabling BYOD.

Given these trends, Active Directory is becoming obsolete in terms of identity management and permissions.

The difference between AD Domain Services and Azure AD DS

One of the core principles of Azure AD is that the user is the security boundary, not the network.

Kerberos is the default authentication and authorization protocol for AD. Kerberos is involved in nearly everything from the time you log on to accessing Sysvol, which is used to deliver policy and logon scripts to domain members from the Domain Controller.

Info-Tech Insight

If you are struggling to get away from AD, Kerberos and NTML are to blame. Working around them is difficult. Azure AD uses SAML2.0 OpenID Connect and OAuth2.0.

Feature Azure AD DS Self-managed AD DS
Managed service
Secure deployments Administrator secures the deployment
DNS server ✓ (managed service)
Domain or Enterprise administrator privileges
Domain join
Domain authentication using NTLM and Kerberos
Kerberos-constrained delegation Resource-based Resource-based and account-based
Custom OU structure
Group Policy
Schema extensions
AD domain/forest trusts ✓ (one-way outbound forest trusts only)
Secure LDAP (LDAPS)
LDAP read
LDAP write ✓ (within the managed domain)
Geo-distributed deployments

Source: “Compare self-managed Active Directory Domain Services...” Azure documentation, 2022

Impact of work-from-anywhere

How AD poses issues that impact the user experience

IT organizations are under pressure to enable work-from-home/work-from-anywhere.

  • IT teams regard legacy infrastructure, namely Active Directory, as inadequate to securely manage remote workloads.
  • While organizations previously used VPNs to access resources through Active Directory, they now have complex webs of applications that do not reside on premises, such as AWS, G-Suite, and SaaS customer relationship management and HR management systems, among others. These resources live outside the Windows ecosystem, complicating user provisioning, management, and security.
  • The work environment has changed since the start of COVID-19, with businesses scrambling to enable work-from-home. This had a huge impact on on-premises identity management tools such as AD, exposing their limitations and challenges. IT admins are all too aware that AD does not meet the needs of work-from-home.
  • As more IT organizations move infrastructure to the cloud, they have the opportunity to move their directory services to the cloud as well.
    • JumpCloud, OneLogin, Okta, Azure AD, G2, and others can be a solution for this new way of working and free up administrators from the overloaded AD environment.
    • Identity and access management (IAM) can be moved to the cloud where the modern infrastructure lives.
    • Alternatives for printers using AD include Google Cloud Print, PrinterOn, and PrinterLogic.

How AD can impact your migration to Microsoft 365

The beginning of your hybrid environment

  • Businesses that have a large on-premises footprint have very few choices for setting up a hybrid environment that includes their on-premises AD and Azure AD synchronization.
  • Microsoft 365 uses Azure AD in the background to manage identities.
  • Azure AD Connect will need to be installed, along with IdFix to identify errors such as duplicates and formatting problems in your AD.
  • Password hash should be implemented to synchronize passwords from on-premises AD so users can sign in to Azure without the need for additional single sign-on infrastructure.
  • Azure AD Connect synchronizes accounts every 30 minutes and passwords within two minutes.

Alternatives to AD

When considering retiring Active Directory from your environment, look at alternatives that can assist with those legacy application servers, handle Kerberos and NTML, and support LDAP.

  • JumpCloud: Cloud-based directory services. JumpCloud provides LDAP-as-a-Service and RADIUS-as-a-Service. It authenticates, authorizes, and manages employees, their devices, and IT applications. However, domain name changes are not supported.
  • Apache Directory Studio Pro: Written in Java, it supports LDAP v3–certified directory services. It is certified by Eclipse-based database utilities. It also supports Kerberos, which is critical for legacy Microsoft AD apps authentication.
  • Univention Corporate Server (UCS): Open-source Linux-based solution that has a friendly user interface and gets continuous security and feature updates. It supports Kerberos V5 and LDAP, works with AD, and is easy to sync. It also supports DNS server, DHCP, multifactor authentication and single sign-on, and APIs and REST APIs. However, it has a limited English knowledgebase as it is a German tool.

What to look for

If you are embedded in Windows systems but looking for an alternative to AD, you need a similar solution but one that is capable of working in the cloud and on premises.

Aside from protocols and supporting utilities, also consider additional features that can help you retire your Active Directory while maintaining highly secure access control and a strong security posture.

These are just a few examples of the many alternatives available.

Market drivers to modernize your infrastructure

The business is now driving your Active Directory migration

What IT must deal with in the modern world of work:

  • Leaner footprint for evolving tech trends
  • Disaster recovery readiness
  • Dynamic compliance requirements
  • Increased security needs
  • The need to future-proof
  • Mergers and acquisitions
  • Security extending the network beyond Windows

Organizations are making decisions that impact Active Directory, from enabling work-from-anywhere to dealing with malicious threats such as ransomware. Mergers and acquisitions also bring complexity with multiple AD domains.
The business is putting pressure on IT to become creative with security strategies, alternative authentication and authorization, and migration to SaaS and cloud services.

Activity

Build a checklist to migrate off Active Directory.

Discovery

Assessment

Proof of Concept

Migration

Cloud Operations

☐ Catalog your applications.

☐ Define your users, groups and usage.

☐ Identify network interdependencies and complexity.

☐ Know your security and compliance regulations.

☐ Document your disaster recovery plan and recovery point and time objectives (RPO/RTO).

☐ Build a methodology for migrating apps to IaaS.

☐ Develop a migration team using internal resources and/or outsourcing.

☐ Use Microsoft resources for specific skill sets.

☐ Map on-premises third-party solutions to determine how easily they will migrate.

☐ Create a plan to retire and archive legacy data.

☐ Test your workload: Start small and prove value with a phased approach.

☐ Estimate cloud costs.

☐ Determine the amount and size of your compute and storage requirements.

☐ Understand security requirements and the need for network and security controls.

☐ Assess network performance.

☐ Qualify and test the tools and solutions needed for the migration.

☐ Create a blueprint of your desired cloud environment.

☐ Establish a rollback plan.

☐ Identify tools for automating migration and syncing data.

☐ Understand the implications of the production-day data move.

☐ Keep up with the pace of innovation.

☐ Leverage 24/7 support via skilled Azure resources.

☐ Stay on top of system maintenance and upgrades.

☐ Consider service-level agreement requirements, governance, security, compliance, performance, and uptime.

Related Info-Tech Research

Manage the Active Directory in the Service Desk

  • Build and maintain your Active Directory with good data.
  • Actively maintaining the Active Directory is a difficult task that only gets more difficult with issues like stale accounts and privilege creep.

SoftwareReviews: Microsoft Azure Active Directory

  • The Azure Active Directory (Azure AD) enterprise identity service provides SSO and multifactor authentication to help protect your users from 99.9% of cybersecurity attacks

Define Your Cloud Vision

  • Don’t think about the cloud as an inevitable next step for all workloads. The cloud is merely another tool in the toolbox, ready to be used when appropriate and put away when it’s not needed. Cloud-first isn’t always the way to go.

Bibliography

“2012 Data Breach Investigations Report.” Verizon, 2012. Web.
“2022 Data Breach Investigations Report.” Verizon, 2012. Web.
“22 Best Alternatives to Microsoft Active Directory.” The Geek Page, 16 Feb 2022. Accessed 12 Sept. 2022.
Altieri, Matt. “Infrastructure Technical Debt.” Device 42, 20 May 2019. Accessed Sept 2022.
“Are You Ready to Make the Move from ADFS to Azure AD?’” Steeves and Associates, 29 April 2021. Accessed 28 Sept. 2022.
Blanton, Sean. “Can I Replace Active Directory with Azure AD? No, Here’s Why.” JumpCloud, 9 Mar 2021. Accessed Sept. 2022.
Chai, Wesley, and Alexander S. Gillis. “What is Active Directory and how does it work?” TechTarget, June 2021. Accessed 10 Sept. 2022.
Cogan, Sam. “Azure Active Directory is not Active Directory!” SamCogan.com, Oct 2020. Accessed Sept. 2022.
“Compare Active Directory to Azure Active Directory.” Azure documentation, Microsoft Learn, 18 Aug. 2022. Accessed 12 Sept. 2022.
"Compare self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services." Azure documentation, Microsoft Learn, 23 Aug. 2022. Accessed Sept. 2022.
“Dimensional Research, Active Directory Modernization: A Survey of IT Professionals.” Quest, 2017. Accessed Sept 2022.
Grillenmeier, Guido. “Now’s the Time to Rethink Active Directory Security.“ Semperis, 4 Aug 2021. Accessed Oct. 2013.
“How does your Active Directory align to today’s business?” Quest Software, 2017, accessed Sept 2022
Lewis, Jack “On-Premises Active Directory: Can I remove it and go full cloud?” Softcat, Dec.2020. Accessed 15 Sept 2022.
Loshin, Peter. “What is Kerberos?” TechTarget, Sept 2021. Accessed Sept 2022.
Mann, Terry. “Why Cybersecurity Must Include Active Directory.” Lepide, 20 Sept. 2021. Accessed Sept. 2022.
Roberts, Travis. “Azure AD without on-prem Windows Active Directory?” 4sysops, 25 Oct. 2021. Accessed Sept. 2022.
“Understanding Active Directory® & its architecture.” ActiveReach, Jan 2022. Accessed Sept. 2022.
“What is Active Directory Migration?” Quest Software Inc, 2022. Accessed Sept 2022.

Align Projects With the IT Change Lifecycle

  • Buy Link or Shortcode: {j2store}464|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Operations Management
  • Parent Category Link: /i-and-o-process-management
  • Coordinate IT change and project management to successfully push changes to production.
  • Manage representation of project management within the scope of the change lifecycle to gather requirements, properly approve and implement changes, and resolve incidents that arise from failed implementations.
  • Communicate effectively between change management, project management, and the business.

Our Advice

Critical Insight

Improvement can be incremental. You do not have to adopt every recommended improvement right away. Ensure every process change you make will create value and slowly add improvements to ease buy-in.

Impact and Result

  • Establish pre-set touchpoints between IT change management and project management at strategic points in the change and project lifecycles.
  • Include appropriate project representation at the change advisory board (CAB).
  • Leverage standard change resources such as the change calendar and request for change form (RFC).

Align Projects With the IT Change Lifecycle Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Align Projects With the IT Change Lifecycle Deck – A guide to walk through integrating project touchpoints in the IT change management lifecycle.

Use this storyboard as a guide to align projects with your IT change management lifecycle.

  • Align Projects With the IT Change Lifecycle Storyboard

2. The Change Management SOP – This template will ensure that organizations have a comprehensive document in place that can act as a point of reference for the program.

Use this SOP as a template to document and maintain your change management practice.

  • Change Management Standard Operating Procedure
[infographic]

Further reading

Align Projects With the IT Change Lifecycle

Increase the success of your changes by integrating project touchpoints in the change lifecycle.

Analyst Perspective

Focus on frequent and transparent communications between the project team and change management.

Benedict Chang

Misalignment between IT change management and project management leads to headaches for both practices. Project managers should aim to be represented in the change advisory board (CAB) to ensure their projects are prioritized and scheduled appropriately. Advanced notice on project progress allows for fewer last-minute accommodations at implementation. Widespread access of the change calendar can also lead project management to effectively schedule projects to give change management advanced notice.

Moreover, alignment between the two practices at intake allows for requests to be properly sorted, whether they enter change management directly or are governed as a project.

Lastly, standardizing implementation and post-implementation across everyone involved ensures more successful changes and socialized/documented lessons learned for when implementations do not go well.

Benedict Chang
Senior Research Analyst, Infrastructure and Operations
Info-Tech Research Group

Executive Summary

Your Challenge

Common Obstacles

Info-Tech’s Approach

To align projects with the change lifecycle, IT leaders must:

  • Coordinate IT change and project management to successfully push changes to production.
  • Manage representation of project management within the scope of the change lifecycle to gather requirements, properly approve and implement changes, and resolve incidents that arise from failed implementations.
  • Communicate effectively between change management, project management, and the business.

Loose definitions may work for clear-cut examples of changes and projects at intake, but grey-area requests end up falling through the cracks.

Changes to project scope, when not communicated, often leads to scheduling conflicts at go-live.

Too few checkpoints between change and project management can lead to conflicts. Too many checkpoints can lead to delays.

Set up touchpoints between IT change management and project management at strategic points in the change and project lifecycles.

Include appropriate project representation at the change advisory board (CAB).

Leverage standard change resources such as the change calendar and request for change form (RFC).

Info-Tech Insight

Improvement can be incremental. You do not have to adopt every recommended improvement right away. Ensure every process change you make will create value, and slowly add improvements to ease buy-in.

Info-Tech’s approach

Use the change lifecycle to identify touchpoints.

The image contains a screenshot of Info-Tech's approach.

The Info-Tech difference:

  1. Start with your change lifecycle to define how change control can align with project management.
  2. Make improvements to project-change alignment to benefit the relationship between the two practices and the practices individually.
  3. Scope the alignment to your organization. Take on the improvements to the left one by one instead of overhauling your current process.

Use this research to improve your current process

This deck is intended to align established processes. If you are just starting to build IT change processes, see the related research below.

Align Projects With the IT Change Lifecycle

02 Optimize IT Project Intake, Approval, and Prioritization

01 Optimize IT Change Management

Increase the success of your changes by integrating project touchpoints in your change lifecycle.

(You are here)

Decide which IT projects to approve and when to start them.

Right-size IT change management to protect the live environment.

Successful change management will provide benefits to both the business and IT

Respond to business requests faster while reducing the number of change-related disruptions.

IT Benefits

Business Benefits

  • Fewer incidents and outages at project go-live
  • Upfront identification of project and change requirements
  • Higher rate of change and project success
  • Less rework
  • Fewer service desk calls related to failed go-lives
  • Fewer service disruptions
  • Faster response to requests for new and enhanced functionalities
  • Higher rate of benefits realization when changes are implemented
  • Lower cost per change
  • Fewer “surprise” changes disrupting productivity

IT satisfaction with change management will drive business satisfaction with IT. Once the process is working efficiently, staff will be more motivated to adhere to the process, reducing the number of unauthorized changes. As fewer changes bypass proper evaluation and testing, service disruptions will decrease and business satisfaction will increase.

Change management improves core benefits to the business: the four Cs

Most organizations have at least some form of change control in place, but formalizing change management leads to the four Cs of business benefits:

Control

Collaboration

Consistency

Confidence

Change management brings daily control over the IT environment, allowing you to review every relatively new change, eliminate changes that would have likely failed, and review all changes to improve the IT environment.

Change management planning brings increased communication and collaboration across groups by coordinating changes with business activities. The CAB brings a more formalized and centralized communication method for IT.

Request-for-change templates and a structured process result in implementation, test, and backout plans being more consistent. Implementing processes for pre-approved changes also ensures these frequent changes are executed consistently and efficiently.

Change management processes will give your organization more confidence through more accurate planning, improved execution of changes, less failure, and more control over the IT environment. This also leads to greater protection against audits.

1. Alignment at intake

Define what is a change and what is a project.

Both changes and projects will end up in change control in the end. Here, we define the intake.

Changes and projects will both go to change control when ready to go live. However, defining the governance needed at intake is critical.

A change should be governed by change control from beginning to end. It would typically be less than a week’s worth of work for a SME to build and come in at a nominal cost (e.g. <$20k over operating costs).

Projects on the other hand, will be governed by project management in terms of scope, scheduling, resourcing, etc. Projects typically take over a week and/or cost more. However, the project, when ready to go live, should still be scheduled through change control to avoid any conflicts at implementation. At triage and intake, a project can be further scoped based on projected scale.

This initial touchpoint between change control and project management is crucial to ensure tasks and request are executed with the proper governance. To distinguish between changes and projects at intake, list examples of each and determine what resourcing separates changes from projects.

Need help scoping projects? Download the Project Intake Classification Matrix

Change

Project

  • Smaller scale task that typically takes a short time to build and test
  • Generates a single change request
  • Governed by IT Change Management for the entire lifecycle
  • Larger in scope
  • May generate multiple change requests
  • Governed by PMO
  • Longer to build and test

Info-Tech Insight

While effort and cost are good indicators of changes and projects, consider evaluating risk and complexity too.

1 Define what constitutes a change

  1. As a group, brainstorm examples of changes and projects. If you wish, you may choose to also separate out additional request types such as service requests (user), operational tasks (backend), and releases.
  2. Have each participant write the examples on sticky notes and populate the following chart on the whiteboard/flip chart.
  3. Use the examples to draw lines and determine what defines each category.
  • What makes a change distinct from a project?
  • What makes a change distinct from a service request?
  • What makes a change distinct from an operational task?
  • When do the category workflows cross over with other categories? (For example, when does a project interact with change management?
  • Record the definitions of requests and results in section 2.3 of the Change Management Standard Operating Procedure (SOP).
  • Change

    Project

    Service Request (Optional)

    Operational Task (Optional)

    Release (Optional)

    Changing Configuration

    New ERP

    Add new user

    Delete temp files

    Software release

    Download the Change Management Standard Operating Procedure (SOP).

    Input Output
    • List of examples of each category of the chart
    • Definitions for each category to be used at change intake
    Materials Participants
    • Whiteboard/flip charts (or shared screen if working remotely)
    • Service catalog (if applicable)
    • Sticky notes
    • Markers/pens
    • Change Management SOP
    • Change Manager
    • Project Managers
    • Members of the Change Advisory Board

    2. Alignment at build and test

    Keep communications open by pre-defining and communicating project milestones.

    CAB touchpoints

    Consistently communicate the plan and timeline for hitting these milestones so CAB can prioritize and plan changes around it. This will give change control advanced notice of altered timelines.

    RFCs

    Projects may have multiple associated RFCs. Keeping CAB appraised of the project RFC or RFCs gives them the ability to further plan changes.

    Change Calendar

    Query and fill the change calendar with project timelines and milestones to compliment the CAB touchpoints.

    Leverage the RFC to record and communicate project details

    The request for change (RFC) form does not have to be a burden to fill out. If designed with value in mind, it can be leveraged to set standards on all changes (from projects and otherwise).

    When looking at the RFC during the Build and Test phase of a project, prioritize the following fields to ensure the implementation will be successful from a technical and user-adoption point of view.

    Filling these fields of the RFC and communicating them to the CAB at go-live approval gives the approvers confidence that the project will be implemented successfully and measures are known for when that implementation is not successful.

    Download the Request for Change Form Template

    Communication Plan

    The project may be successful from a technical point of view, but if users do not know about go-live or how to interact with the project, it will ultimately fail.

    Training Plan

    If necessary, think of how to train different stakeholders on the project go-live. This includes training for end users interacting with the project and technicians supporting the project.

    Implementation Plan

    Write the implementation plan at a high enough level that gives the CAB confidence that the implementation team knows the steps well.

    Rollback Plan

    Having a well-formulated rollback plan gives the CAB the confidence that the impact of the project is well known and the impact to the business is limited even if the implementation does not go well.

    Provide clear definitions of what goes on the change calendar and who’s responsible

    Inputs

    • Freeze periods for individual business departments/applications (e.g. finance month-end periods, HR payroll cycle, etc. – all to be investigated)
    • Maintenance windows and planned outage periods
    • Project schedules, and upcoming major/medium changes
    • Holidays
    • Business hours (some departments work 9-5, others work different hours or in different time zones, and user acceptance testing may require business users to be available)

    Guidelines

    • Business-defined freeze periods are the top priority.
    • No major or medium normal changes should occur during the week between Christmas and New Year’s Day.
    • Vendor SLA support hours are the preferred time for implementing changes.
    • The vacation calendar for IT will be considered for major changes.
    • Change priority: High > Medium > Low.
    • Minor changes and preapproved changes have the same priority and will be decided on a case-by-case basis.

    Roles

    • The Change Manager will be responsible for creating and maintaining a change calendar.
    • Only the Change Manager can physically alter the calendar by adding a new change after the CAB has agreed upon a deployment date.
    • All other CAB members, IT support staff, and other impacted stakeholders should have access to the calendar on a read-only basis to prevent people from making unauthorized changes to deployment dates.

    Info-Tech Insight

    Make the calendar visible to as many parties as necessary. However, limit the number of personnel who can make active changes to the calendar to limit calendar conflicts.

    3. Alignment at approval

    How can project management effectively contribute to CAB?

    As optional CAB members

    Project SMEs may attend when projects are ready to go live and when invited by the change manager. Optional members provide details on change cross-dependencies, high-level testing, rollback, communication plans, etc. to inform prioritization and scheduling decisions.

    As project management representatives

    Project management should also attend CAB meetings to report in on changes to ongoing projects, implementation timelines, and project milestones. Projects are typically high-priority changes when going live due to their impact. Advanced notice of timeline and milestone changes allow the rest of the CAB to properly manage other changes going into production.

    As core CAB members

    The core responsibilities of CAB must still be fulfilled:

    1. Protect the live environment from poorly assessed, tested, and implemented changes.

    2. Prioritize changes in a way that fairly reflects change impact, urgency, and likelihood.

    3. Schedule deployments in a way the minimizes conflict and disruption.

    If you need to define the authority and responsibilities of the CAB, see Activity 2.1.3 of the Optimize IT Change Management blueprint.

    4. Alignment at implementation

    At this stage, the project or project phase is treated as any other change.

    Verification

    Once the change has been implemented, verify that all requirements are fulfilled.

    Review

    Ensure all affected systems and applications are operating as predicted.

    Update change ticket and change log

    Update RFC status and CMDB as well (if necessary).

    Transition

    Once the change implementation is complete, it’s imperative that the team involved inform and train the operational and support groups.

    If you need to define transitioning changes to production, download Transition Projects to the Service Desk

    5. Alignment at post-implementation

    Tackle the most neglected portion of change management to avoid making the same mistake twice.

    1. Define RFC statuses that need a PIR
    2. Conduct PIRs for failed changes. Successful changes can simply be noted and transitioned to operations.

    3. Conduct a PIR for every failed change
    4. It’s best to perform a PIR once a change-related incident is resolved.

    5. Avoid making the same mistake twice
    6. Include a root-cause analysis, mitigation actions/timeline, and lessons learned in the documentation.

    7. Report to CAB
    8. Socialize the findings of the PIR at the subsequent CAB meeting.

    9. Circle back on previous PIRs
    10. If a similar change is conducted, append the related PIR to avoid the same mistakes.

    Info-Tech Insight

    Include your PIR documentation right in the RFC for easy reference.

    Download the RFC template for more details on post-implementation reviews

    2 Implement your alignments stepwise

    1. As a group, decide on which implementations you need to make to align change management and project management.
    2. For each improvement, list a timeline for implementation.
    3. Update section 3.5 in the Change Management Standard Operating Procedure (SOP). to outline the responsibilities of project management within IT Change Management.

    The image contains a screenshot of the Change Management SOP

    Download the Change Management Standard Operating Procedure (SOP).

    Input Output
    • This deck
    • SOP update
    Materials Participants
    • Whiteboard/flip charts (or shared screen if working remotely)
    • Service catalog (if applicable)
    • Sticky notes
    • Markers/pens
    • Change Management SOP
    • Change Manager
    • Project Managers
    • Members of the Change Advisory Board

    Related Info-Tech Research

    Optimize IT Change Management

    Right-size IT change management to protect the live environment.

    Optimize IT Project Intake, Approval, and Prioritization

    Decide which IT projects to approve and when to start them.

    Maintain an Organized Portfolio

    Align portfolio management practices with COBIT (APO05: Manage Portfolio).

    Assess Your IT Financial Management Maturity Effectively

    • Buy Link or Shortcode: {j2store}315|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Cost & Budget Management
    • Parent Category Link: /cost-and-budget-management

    Organizations wishing to mature their IT financial management (ITFM) maturity often face the following obstacles:

    • Unfamiliarity: Lack of knowledge and understanding related to ITFM maturity.
    • Shortsightedness: Randomly reacting to changing circumstances.
    • Exchange: Inability to consistently drive dialogues.
    • Perception: IT is perceived as a cost center instead of a trustworthy strategic partner.

    Our Advice

    Critical Insight

    No matter where you currently stand in your ITFM practice, there is always room for improvement. Hence, a maturity assessment should be viewed as a self-improvement tool that is only valuable if you are willing to act on it.

    Impact and Result

    A mature ITFM practice leads to many benefits.

    • Foundation: Improved governance, skill sets, processes, and tools.
    • Data: An appropriate taxonomy/data model alongside accurate data for high-quality reporting and insights.
    • Language: A common vocabulary across the organization.
    • Organization Culture: Improved communication and collaboration between IT and business partners.

    Assess Your IT Financial Management Maturity Effectively Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess Your IT Financial Management Maturity Effectively Storyboard – A framework and step-by-step methodology to assess your ITFM maturity.

    This research seeks to support IT leaders and ITFM practitioners in evaluating and improving their current maturity. It will help document both current and target states as well as prioritize focus areas for improvement.

    • Assess Your IT Financial Management Maturity Effectively Storyboard

    2. IT Financial Management Maturity Assessment Tool – A structured tool to help you assess your ITFM maturity.

    This Excel workbook guides IT finance practitioners to effectively assess their IT financial management practice. Incorporate the visual outputs into your final executive presentation document. Key activities include context setting, completing the assessment, and prioritizing focus areas based on results.

    • IT Financial Management Maturity Assessment Tool

    3. IT Financial Management Maturity Assessment Report Template – A report summarizing your ITFM maturity assessment results to help you communicate with stakeholders.

    Use this template to document your final ITFM maturity outputs, including the current and target states and your identified priorities.

    • IT Financial Management Maturity Assessment Report Template
    [infographic]

    Further reading

    Assess Your IT Financial Management Maturity Effectively

    Influence your organization’s strategic direction.

    Analyst Perspective

    Make better informed data-driven business decisions.

    Technology has been evolving throughout the years, increasing complexity and investments, while putting more stress on operations and people involved. As an IT leader, you are now entrusted to run your outfit as a business, sit at the executive table as a true partner, and be involved in making decisions that best suit your organization. Therefore, you have an obligation to fulfill the needs of your end customers and live up to their expectations, which is not an easy task.

    IT financial management (ITFM) helps you generate value to your organization’s clientele by bringing necessary trade-offs to light, while driving effective dialogues with your business partners and leadership team.

    This research will focus on Info-Tech’s approach to ITFM maturity, aiming for a state of continuous improvement, where an organization can learn and grow as it adapts to change. As the ITFM practice matures, IT and business leaders will be able to better understand one another and together make better business decisions, driven by data.

    This client advisory presentation and accompanying tool seek to support IT leaders and ITFM practitioners in evaluating and improving their current maturity. It will help document both current and target states as well as prioritize focus areas for improvement.

    Photo of Bilal Alberto Saab, Research Director, IT Financial Management, Info-Tech Research Group. Bilal Alberto Saab
    Research Director, IT Financial Management
    Info-Tech Research Group

    Executive Summary

    The value of ITFM is undermined

    ITFM is often discarded and not given enough importance and relevance due to the operational nature of IT, and the specialized skillset of its people, leading to several problems and challenges, such as:

    • Unfamiliarity: Lack of knowledge and understanding related to ITFM maturity.
    • Shortsightedness: Randomly reacting to changing circumstances.
    • Exchange: Inability to consistently drive dialogues.
    • Perception: IT is perceived as a cost center instead of a trustworthy strategic partner.

    Constructive dialogues with business partners are not the norm

    Business-driven conversations around financials (spending, cost, revenue) are a rarity in IT due to several factors, including:

    • Foundation: Weak governance, inadequate skillset, and less than perfect processes and tools.
    • Data: Lack of adequate taxonomy/data model, alongside inaccurate data leading to poor reporting and insights.
    • Language: Lack of a common vocabulary across the organization.
    • Organization culture: No alignment, alongside minimal communication and collaboration between IT and business partners.

    Follow Info-Tech’s approach to move up the ITFM maturity ladder

    Mature your ITFM practice by activating the means to make informed business decisions.

    Info-Tech’s methodology helps you move the dial by focusing on three maturity focus areas:

    • Build an ITFM Foundation
    • Manage and Monitor IT Spending
    • Bridge the Language Barrier

    Info-Tech Insight

    Influence your organization’s strategic direction by maturing your ITFM practice.

    What is ITFM?

    ITFM is not just about finance.

    • ITFM has evolved from traditional budgeting, accounting, and cost optimization; however, it is much more than those activities alone.
    • It starts with understanding the financial implications of technology by adopting different perspectives to become adept in communicating with various stakeholders, including finance, business partners, IT managers, and your CEO.
    • Armed with this knowledge, ITFM helps you address a variety of questions, such as:
      • How are technology funds being spent?
      • Which projects is IT prioritizing and why?
      • What are the resources needed to speed IT delivery?
      • What’s the value of IT within the organization?
    • ITFM’s main objective is thus to improve decision-making capabilities by facilitating communication between IT leaders and stakeholders, while enabling a customer focus attitude throughout the organization.

    “ITFM embeds technology in financial management practices. Through cost, demand, and value, ITFM brings technology and business together, forging the necessary relationships and starting the right conversations to enable the best decisions for the organization.”
    – Monica Braun, Research Director, Info-Tech Research Group

    Your challenge

    IT leaders struggle to articulate and communicate business value.

    • IT spending is often questioned by different stakeholders, such as business partners and various IT business units. These questions, usually resulting from shifts in business needs, may revolve around investments, expenditures, services, and speed to market, among others. While IT may have an idea about its spending habits, aligning it to the business strategy may prove difficult.
    • IT staff often does not have access to, or knowledge of, the business model and its intricacies. In an operational environment, the focus tends to be on technical issues rather than overall value.
    • People tend to fear what they do not know. Some business managers may not be comfortable with technology. They do not recognize the implications and ramifications of certain implementations or understand the related terminology, which puts a strain on any conversation.

    “Value is not the numbers you visualize on a chart, it’s the dialogue this data generates with your business partners and leadership team.”
    – Dave Kish, Practice Lead, Info-Tech Research Group

    Technology is constantly evolving

    Increasing IT spending and decision-making complexity.

    Timeline of IT technology evolution, starting with 'Timesharing' in the 1980s to 'All Things Digital' in the 2020s. 'IT Spend Growth' grows from start to finish.

    Common obstacles

    IT leaders are not able to have constructive dialogues with their stakeholders.

    • The way IT funds are spent has changed significantly, moving from the purchase of discrete hardware and software tools to implementing data lakes, cloud solutions, the metaverse and blockchain. This implies larger investments and more critical decisions. Conversations around interoperability, integration, and service-based solutions that focus more on big-picture architecture than day-to-day operations have become the norm.
    • Speed to market is now a survival criterion for most organizations, requiring IT to shift rapidly based on changing priorities and customer expectations. This leads to the need for greater financial oversight, with the CFO as the gatekeeper. Today’s IT leaders need to possess both business and financial management savvy to justify their spending with various stakeholders.
    • Any IT budget increase is tied to expectations of greater value. Hence, the compelling demands for IT to prove its worth to the business. Promoting value comes in two ways: 1) objectively, based on data, KPIs, and return on investment; and 2) subjectively, based on stakeholder satisfaction, alongside relationships. Building trust, credibility, and confidence can go a long way.

    In a technology-driven world, advances come at a price. With greater spending required, more complex and difficult conversations arise.

    Constructive dialogues are key

    You don’t know what you don’t know.

    • IT, being historically focused on operations, has become a hub for technically savvy personnel. On the downside, technology departments are often alien to business, causing problems such as:
      • IT staff have no knowledge of the business model and lack customer focus.
      • Business is not comfortable with technology and related jargon.
    • The lack of two-way communication and business alignment is hence an important ramification. If the business does not understand technology, and IT does not speak in business terms, where does that lead us?
    • Poor data quality and governance practices, alongside overly manual processes can only exasperate the situation.

    IT Spending Survey

    79% of respondents believe that decisions taking too long to make is either a significant or somewhat of a challenge (Flexera 2022 Tech Spend Pulse; N=501).

    81% of respondents believe that ensuring spend efficiency (avoiding waste) is either a challenge or somewhat of a challenge (Flexera 2022 Tech Spend Pulse; N=501).

    ITFM is trailing behind

    IT leaders must learn to speak business.

    In today’s world, where organizations are driving customer experience through technology investments, having a seat at the table means IT leaders must be well versed in business language and practice, including solid financial management skills.

    However, IT staff across all industries aren’t very confident in how well IT is doing in managing its finances. This becomes evident after looking at three core processes:

    • Demonstrating IT’s value to the business.
    • Accounting of costs and budgets.
    • Optimizing costs to gain the best return on investment.

    Recent data from 4,137 respondents to Info-Tech’s IT Management & Governance Diagnostic shows that while most IT staff feel that these three financial management processes are important, notably fewer feel that IT management is effective at executing on them.

    IT leadership’s capabilities around fundamental cost data capture appear to be lagging, not to mention the essential value-added capabilities around optimizing costs and demonstrating IT’s contribution to business value.

    Bar charts comparing percentages of people who 'Agree process is important' and 'Agree process is effective' for three processes: Business Value, Cost & Budget Management, and Cost Optimization. In all instances, the importance outweighed the perceived effectiveness.
    Source: Info-Tech Research Group, IT Management & Governance Diagnostic, 2023.

    Info-Tech’s approach

    We take a holistic approach to ITFM and support you throughout your maturity journey.

    Visualization of the IT maturity levels with three goals at the bottom, 'Build am ITFM Foundation', 'Manage & Monitor IT Spending', and 'Bridge the Language Barrier'. The 5 levels, from bottom to top, are 'Nascent - Level 1, Inability to consistently deliver financial planning services', 'Cost Operator - Level 2, Rudimentary financial planning capabilities', 'Trusted Coordinator - Level 3, Enablement of business through cost-effective supply of technology', 'Value Optimizer - Level 4, Effective impact on business performance', and 'Strategic Partner - Level 5, Influence on the organization's strategic direction'.

    The Info-Tech difference:

    • Info-Tech has a methodology and set of tools that will help assess your ITFM maturity and take the first step in developing an improvement plan. We have identified three maturity focus areas:
      • Build an ITFM Foundation
      • Manage and Monitor IT Spending
      • Bridge the Language Barrier
    • No matter where you currently stand in your ITFM practice, there is always room for improvement. Hence, a maturity assessment should be viewed as a self-improvement tool, which is only valuable if you are willing to act on it.

    Note: See Appendix A for maturity level definitions and descriptions.

    Climb the maturity ladder

    By growing along three maturity focus areas.

    A diagram with '3 Maturity Focus Areas' and '9 Maturity Levers' within them. The first area is 'Build an ITFM Foundation' with levers 'Establish your Team', 'Set up your Governance Structure', and 'Adopt ITFM Processes & Tools'. The second area is 'Manage & Monitor IT Spending', with levers 'Standardize your Taxonomy & Data Model', 'Identify, Gather & Prepare your Data', and 'Analyze your Findings and Develop your Reports'. The third area is 'Bridge the Language Barrier' with levers 'Communicate your IT Spending', 'Educate the Masses', and 'Influence your Organization's Culture'.

    Info-Tech identified three maturity focus areas, each containing three levers.

    Identify where you stand across the nine maturity levers, detect the gaps, and determine your priorities as a first step to develop an improvement plan.

    Note: See Appendix B for maturity level definitions and descriptions per lever.

    Key project deliverables

    Each step of this activity is accompanied by supporting deliverables to help you accomplish your goals.

    IT Financial Management Maturity Assessment Report Template

    A template of an ITFM maturity assessment report that can be customized based on your own results.

    IT Financial Management Maturity Assessment Tool

    A workbook including an ITFM maturity survey, generating a summary of your current state, target state, and priorities.

    Measure the value of this activity

    Reach your 12-month maturity target.

    • Determine your 12-month maturity target, identify your gaps, and set your priorities.
    • Use the ITFM maturity assessment to kickstart your improvement plan by developing actionable initiatives.
    • Implement your initiatives and monitor your progress to reach your 12-month target.

    Sample of a result page from the ITFM maturity assessment.

    Build your improvement plan and implement your initiatives to move the dial and climb the maturity ladder.

    Sample of a result page from the ITFM maturity assessment with a graph.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Step 1

    Prepare for the ITFM maturity assessment

    Content Overview

    1. Identify your stakeholders
    2. Set the context
    3. Determine the methodology
    4. Identify assessment takers

    This step involves the following participants:

    • CIO/IT director
    • CFO/finance director
    • IT finance lead
    • IT audit lead
    • Other IT management

    1. Prepare to take the ITFM maturity assessment

    3 hours

    Input: Understanding your context, objectives, and methodology

    Output: ITFM maturity assessment stakeholders and their objectives, ITFM maturity assessment methodology, ITFM maturity assessment takers

    Materials: 1a. Prepare for Assessment tab in the ITFM Maturity Assessment Tool

    Participants: CIO/IT director, CFO/finance director, IT finance lead, IT audit lead, Other IT management

    1. Identify your stakeholders and document it in the ITFM Maturity Assessment Tool (see next slides). We recommend having representatives from different business units across the organization, most notably IT, IT finance, finance, and IT audit.
    2. Set the context with your stakeholders and document it in the ITFM Maturity Assessment Tool. Discuss the reason behind taking the ITFM maturity assessment among the various stakeholders. Why do each of your stakeholders want to take the assessment? What are their main objectives? What would they like to achieve?
    3. Determine the methodology and document it in the ITFM Maturity Assessment Tool. Discuss how you want to go about taking the assessment with your stakeholders. Do you want to have representatives from each business unit take the assessment individually, then share and discuss their findings? Do you prefer forming a working group with representatives from each business unit and go through the assessment together? Or does any of your stakeholders have a different suggestion? You will have to consider the effort, skillset, and knowledge required.
    4. Identify the assessment takers and document it in the ITFM Maturity Assessment Tool. Determine who will be taking the assessment (specific names of stakeholders). Consider their availability, knowledge, and skills.

    Download the IT Financial Management Maturity Assessment Tool

    TEMPLATE & EXAMPLE

    Document your stakeholders, objectives, and methodology

    Excel Workbook: ITFM Maturity Assessment Tool – Prepare for Assessment worksheet

    Refer to the example and guidelines below on how to document stakeholders, objectives, and methodology (table range: columns B to G and rows 8 to 15).

    Example table from the ITFM Maturity Assessment Tool re: 'Maturity Assessment Stakeholders'.

    Column ID Input Type Guidelines
    B Formula Automatic calculation, no entry required.
    C Text Enter the full name of each stakeholder on a separate row.
    D Text Enter the job title related to each stakeholder.
    E Text Enter the objective(s) related to each stakeholder.
    F Text Enter the agreed upon methodology.
    G Text Enter any notes or comments per stakeholder (optional).

    Review the following in the Excel workbook as per guidelines:

    1. Navigate to the 1a. Prepare for Assessment tab.
    2. Enter the full names and job titles of the ITFM maturity assessment stakeholders.
    3. Document the maturity assessment objective of each of your stakeholders.
    4. Document the agreed-upon methodology.

    Download the IT Financial Management Maturity Assessment Tool

    TEMPLATE & EXAMPLE

    Document your assessment takers

    Excel Workbook: ITFM Maturity Assessment Tool – Prepare for Assessment worksheet

    Refer to the example and guidelines below on how to document assessment takers (table range: columns B to E and rows 18 to 25).

    Example table from the ITFM Maturity Assessment Tool re: 'Maturity Assessment Takers'.

    Column ID Input Type Guidelines
    B Formula Automatic calculation, no entry required.
    C Text Enter the full name of each assessment taker on a separate row.
    D Text Enter the job title related to each stakeholder to identify which party is being represented per assessment taker.
    E Text Enter any notes or comments per stakeholder (optional).

    Review the following in the Excel workbook as per guidelines:

    1. Navigate to the 1a. Prepare for Assessment tab.
    2. Enter the full name of each assessment taker, along with the job title of the stakeholder they are representing.

    Download the IT Financial Management Maturity Assessment Tool

    Step 2

    Take the ITFM maturity assessment

    Content Overview

    1. Complete the survey
    2. Review your assessment results
    3. Determine your priorities

    This step involves the following participants:

    • CIO/IT director
    • CFO/finance director
    • IT finance lead
    • IT audit lead
    • Other IT management

    2. Take the ITFM maturity assessment

    3 hours

    Input: Understanding of your ITFM current state and 12-month target state, ITFM maturity assessment results

    Output: ITFM current- and target-state maturity levels, average scores, and variance, ITFM current- and target-state average scores, variance, and priority by maturity focus area and maturity lever

    Materials: 1b. Glossary, 2a. Assess ITFM Foundation, 2b. Assess Mngt. & Monitoring, 2c. Assess Language, and 3. Assessment Summary tabs in the ITFM Maturity Assessment Tool

    Participants: CIO/IT director, CFO/finance director, IT finance lead, IT audit lead, Other IT management

    1. Complete the survey: select the current and target state of each statement – refer to the glossary as needed for definitions of key terms – in the ITFM Maturity Assessment Tool (see next slides). There are three tabs (one per maturity focus area) with three tables each (nine maturity levers). Review and discuss statements with all assessment takers: consider variations, differing opinions, and reach an agreement on each statement inputs.
    2. Review assessment results: navigate to the Assessment Summary tab in the ITFM maturity assessment tool (see next slides) to view your results. Review and discuss with all assessment takers: consider any shocking output and adjust survey input if necessary.
    3. Determine your priorities: decide on the priority (Low/Medium/High) by maturity focus area and/or maturity lever. Rank your maturity focus area priorities from 1 to 3 and your maturity lever priorities from 1 to 9. Consider the feasibility in terms of timeframe, effort, and skillset required, positive and negative impacts on business and technology, likelihood of failure, and necessary approvals. Document your priorities in the ITFM maturity assessment tool (see next slides).
      Review and discuss priorities with all assessment takers: consider variations, differing opinions, and reach an agreement on each priority.

    Download the IT Financial Management Maturity Assessment Tool

    TEMPLATE & EXAMPLE

    Complete the survey

    Excel workbook: ITFM Maturity Assessment Tool – Survey worksheets

    Refer to the example and guidelines below on how to complete the survey.

    Example table from the ITFM Maturity Assessment Tool re: Survey worksheets.

    Column ID Input Type Guidelines
    B Formula Automatic calculation, no entry required.
    C Formula Automatic calculation, no entry required: ITFM maturity statement to assess.
    D, E Dropdown Select the maturity levels of your current and target states. One of five maturity levels for each statement, from “1. Nonexistent” (lowest maturity) to “5. Advanced” (highest maturity).
    F, G, H Formula Automatic calculation, no entry required: scores associated with your current and target state selection, along with related variance (column G – column F).
    I Text Enter any notes or comments per ITFM maturity statement (optional).

    Review the following in the Excel workbook as per guidelines:

    1. Navigate to the survey tabs: 2a. Assess ITFM Foundation, 2b. Assess Management and Monitoring, and 2c. Assess Language.
    2. Select the appropriate current and target maturity levels.
    3. Add any notes or comments per ITFM maturity statement where necessary or helpful.

    Download the IT Financial Management Maturity Assessment Tool

    TEMPLATE & EXAMPLE

    Review your overall result

    Excel Workbook: ITFM Maturity Assessment Tool – Assessment Summary worksheet

    Refer to the example and guidelines below on how to review your results.

    Example table from the ITFM Maturity Assessment Tool re: Assessment Summary worksheet.

    Column ID Input Type Guidelines
    K Formula Automatic calculation, no entry required.
    L Formula Automatic calculation, no entry required: Current State, Target State, and Variance entries. Please ignore the current state benchmark, it’s a placeholder for future reference.
    M Formula Automatic calculation, no entry required: average overall maturity score for your Current State and Target State entries, along with related Variance.
    N, O Formula Automatic calculation, no entry required: maturity level and related name based on the overall average score (column M), where level 1 corresponds to an average score less than or equal to 1.49, level 2 corresponds to an average score between 1.5 and 2.49 (inclusive), level 3 corresponds to an average score between 2.5 and 3.49 (inclusive), level 4 corresponds to an average score between 3.5 and 4.49 (inclusive), and level 5 corresponds to an average score between 4.5 and 5 (inclusive).
    P, Q Formula Automatic calculation, no entry required: maturity definition and related description based on the maturity level (column N).

    Review the following in the Excel workbook as per guidelines:

    1. Navigate to tab 3. Assessment Summary.
    2. Review your overall current state and target state result along with the corresponding variance.

    Download the IT Financial Management Maturity Assessment Tool

    TEMPLATE & EXAMPLE

    Set your priorities

    Excel Workbook: ITFM Maturity Assessment Tool – Assessment Summary worksheet

    Refer to the example and guidelines below on how to review your results per maturity focus area and maturity lever, then prioritize accordingly.

    Example table from the ITFM Maturity Assessment Tool re: Assessment Summary worksheet.

    Column ID Input Type Guidelines
    B Formula Automatic calculation, no entry required.
    C Formula Automatic calculation, no entry required: ITFM maturity focus area or lever, depending on the table.
    D Placeholder Ignore this column because it’s a placeholder for future reference.
    E, F, G Formula Automatic calculation, no entry required: average score related to the current state and target state, along with the corresponding variance per maturity focus area or lever (depending on the table).
    H Formula Automatic calculation, no entry required: preliminary priority based on the average variance (column G), where Low corresponds to an average variance between 0 and 0.5 (inclusive), Medium corresponds to an average variance between 0.51 and 0.99 (inclusive), and High corresponds to an average variance greater than or equal to 1.
    J Dropdown Select your final priority (Low, Medium, or High) per ITFM maturity focus area or lever, depending on the table.
    K Whole Number Enter the appropriate rank based on your priorities; do not use the same number more than once. A whole number between 1 and 3 to rank ITFM maturity focus areas, and between 1 and 9 to rank ITFM maturity levers, depending on the table.

    Review the following in the Excel workbook as per guidelines:

    1. Navigate to tab 3. Assessment Summary.
    2. Review your current-state and target-state result along with the corresponding variance per maturity focus area and maturity lever.
    3. Select the appropriate priority for each maturity focus area and maturity lever.
    4. Enter a unique rank for each maturity focus area (1 to 3).
    5. Enter a unique rank for each maturity lever (1 to 9).

    Download the IT Financial Management Maturity Assessment Tool

    Step 3

    Communicate your ITFM maturity results

    Content Overview

    1. Review your assessment charts
    2. Customize the assessment report
    3. Communicate your results

    This step involves the following participants:

    • CIO/IT director
    • CFO/finance director
    • IT finance lead
    • IT audit lead
    • Other IT management

    3. Communicate your ITFM maturity results

    3 hours

    Input: ITFM maturity assessment results

    Output: Customized ITFM maturity assessment report

    Materials: 3. Assessment Summary tab in the ITFM Maturity Assessment Tool, ITFM Maturity Assessment Report Template

    Participants: CIO/IT director, CFO/finance director, IT finance lead, IT audit lead, Other IT management

    1. Review assessment charts: navigate to the Assessment Summary tab in the ITFM Maturity Assessment Tool (see next slides) to view your results and related charts.
    2. Edit the report template: complete the template based on your results and priorities to develop your customized ITFM maturity assessment report (see next slide).
    3. Communicate results: communicate and deliberate the assessment results with assessment takers at a first stage, and with your stakeholders at a second stage. The objective is to agree on next steps, including developing an improvement plan.

    Download the IT Financial Management Maturity Assessment Tool

    TEMPLATE & EXAMPLE

    Review assessment charts

    Excel Workbook: ITFM Maturity Assessment Tool – Assessment Summary worksheet

    Refer to the example below on charts depicting different views of the maturity assessment results across the three focus areas and nine levers.

    Samples of different tabs from the ITFM Maturity Assessment Tool: 'Assessment Summary tab: From cell B49 to cell M100' and 'Assessment Summary tab: From cell K13 to cell Q34'.

    From the Excel workbook, after completing your potential initiatives and filling all related entries in the Outline Initiatives tab:

    1. Navigate to tab 3. Assessment Summary.
    2. Review each of the charts.
    3. Navigate back to the survey tabs to examine, drill down, and amend individual entries as you deem necessary.

    Download the IT Financial Management Maturity Assessment Tool

    TEMPLATE & EXAMPLE

    Customize your report

    PowerPoint presentation: ITFM Maturity Assessment Report Template

    Refer to the example below on slides depicting different views of the maturity assessment results across the three maturity focus areas and nine maturity levers.

    Samples of different slides from the ITFM Maturity Assessment Report Template, detailed below.

    Slide 6: Edit levels based on your assessment results. Copy and paste the appropriate maturity level definition and description from slide 4.

    Slide 7: Copy related charts from the assessment summary tab in the Excel workbook and remove the chart title. You can use the “Outer Offset: Bottom” shadow under shape effects on the chart.

    Slide 8: Copy related charts from the assessment summary tab in the Excel workbook and remove the chart title and legend. You can use the “Outer Offset: Center” shadow under shape effects on the chart.

    From the ITFM Maturity Assessment Report Template:

    1. Edit the report based on your results found in the assessment summary tab of the Excel workbook (see previous slide).
    2. Review slides 6 to 8 and bring necessary adjustments.

    Download the IT Financial Management Maturity Assessment Report Template

    Make informed business decisions

    Take a holistic approach to ITFM.

    • A thorough understanding of your technology spending in relation to business needs and drivers is essential to make informed decisions. As a trusted partner, you cannot have effective conversations around budgets and cost optimization without a solid foundation.
    • It is important to realize that ITFM is not a one-time exercise, but a continuous, sustainable process to educate (teach, mentor, and train), increase transparency, and assign responsibility.
    • Move up the ITFM maturity ladder by improving across three maturity focus areas:
      • Build an ITFM Foundation
      • Manage and Monitor IT Spending
      • Bridge the Language Barrier

    What’s Next?

    Communicate your maturity results with stakeholders and develop an actionable ITFM improvement plan.

    And remember, having informed discussions with your business partners and stakeholders, where technology helps propel your organization forward, is priceless!

    IT Financial Management Team

    Photo of Dave Kish, Practice Lead, ITFM Practice, Info-Tech Research Group. Dave Kish
    Practice Lead, ITFM Practice
    Info-Tech Research Group
    Photo of Jennifer Perrier, Principal Research Director, ITFM Practice, Info-Tech Research Group. Jennifer Perrier
    Principal Research Director, ITFM Practice
    Info-Tech Research Group
    Photo of Angie Reynolds, Principal Research Director, ITFM Practice, Info-Tech Research Group. Angie Reynolds
    Principal Research Director, ITFM Practice
    Info-Tech Research Group
    Photo of Monica Braun, Research Director, ITFM Practice, Info-Tech Research Group. Monica Braun
    Research Director, ITFM Practice
    Info-Tech Research Group
    Photo of Rex Ding, Research Specialist, ITFM Practice, Info-Tech Research Group. Rex Ding
    Research Specialist, ITFM Practice
    Info-Tech Research Group
    Photo of Aman Kumari, Research Specialist, ITFM Practice, Info-Tech Research Group. Aman Kumari
    Research Specialist, ITFM Practice
    Info-Tech Research Group

    Research Contributors and Experts

    Photo of Amy Byalick, Vice President, IT Finance, Info-Tech Research Group. Amy Byalick
    Vice President, IT Finance
    Info-Tech Research Group
    Amy Byalick is an IT Finance practitioner with 15 years of experience supporting CIOs and IT leaders elevating the IT financial storytelling and unlocking insights. Amy is currently working at Johnson Controls as the VP, IT Finance, previously working at PepsiCo, AmerisourceBergen, and Jacobs.
    Photo of Carol Carr, Technical Counselor, Executive Services, Info-Tech Research Group. Carol Carr
    Technical Counselor, Executive Services
    Info-Tech Research Group
    Photo of Scott Fairholm, Executive Counselor, Executive Services, Info-Tech Research Group. Scott Fairholm
    Executive Counselor, Executive Services
    Info-Tech Research Group
    Photo of Gokul Rajan, Executive Counselor, Executive Services, Info-Tech Research Group. Gokul Rajan
    Executive Counselor, Executive Services
    Info-Tech Research Group
    Photo of Allison Kinnaird, Practice Lead, Infrastructure & Operations, Info-Tech Research Group. Allison Kinnaird
    Practice Lead, Infrastructure & Operations
    Info-Tech Research Group
    Photo of Isabelle Hertanto, Practice Lead, Security & Privacy, Info-Tech Research Group. Isabelle Hertanto
    Practice Lead, Security & Privacy
    Info-Tech Research Group

    Related Info-Tech Research

    Sample of the IT spending transparency research. Achieve IT Spending Transparency

    Mature your ITFM practice by activating the means to make informed business decisions.

    Sample of the IT cost optimization roadmap research. Build Your IT Cost Optimization Roadmap

    Develop an IT cost optimization strategy based on your specific circumstances and timeline.

    Bibliography

    Eby, Kate. “The Complete Guide to Organizational Maturity: Models, Levels, and Assessments.” Smartsheet, 8 June 2022. Web.

    “Financial Management Maturity Model.” National Audit Office, n.d. Accessed 28 Apr. 2023.

    “ITFM/TBM Program Maturity Guide.” Nicus Software, n.d. Accessed 28 Apr. 2023.

    Jouravlev, Roman. "Service Financial Management: ITIL 4 Practice Guide." Axelos, 2020.

    McCarthy, Seamus. “Financial Management Maturity Model: A Good Practice Guide.” Office of the Comptroller & Auditor General, 26 June 2018. Web.

    “Principles for Effective Risk Data Aggregation and Risk Reporting.“ Bank for International Settlements, Jan. 2013. Web.

    “Role & Influence of the Technology Decision-Maker 2022.” Foundry, 2022. Web.

    Stackpole, Beth. “State of the CIO, 2022: Focus turns to IT fundamentals.” CIO, 21 March 2022. Web.

    “Tech Spend Pulse.” Flexera, 2022. Web.

    Appendix A

    Definition and Description
    Per Maturity Level

    ITFM maturity levels and definitions

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability to consistently deliver financial planning services ITFM practices are almost inexistent. Only the most basic financial tasks and activities are being performed on an ad hoc basis to fulfill the Finance department’s requests.
    Cost Operator
    Level 2
    Rudimentary financial planning capabilities. ITFM activities revolve around minimizing the IT budget as much as possible. ITFM practices are not well defined, and IT’s financial view is limited to day-to-day technical operations.
    IT is only involved in low complexity decision making, where financial conversations center on general ledger items and IT spending.
    Trusted Coordinator
    Level 3
    Enablement of business through cost-effective supply of technology. ITFM activities revolve around becoming a proficient and cost-effective technology supplier to business partners.
    ITFM practices are in place, with moderate coordination and adherence to execution. Various IT business units coordinate to produce a consolidated financial view focused on business services.
    IT is involved in moderate complexity decision making, as a technology subject matter expert, where financial conversations center on IT spending in relation to technology services or solutions provided to business partners.
    Value Optimizer
    Level 4
    Effective impact on business performance. ITFM activities revolve around optimizing existing technology investments to improve both IT and business performance.
    ITFM practices are well managed, established, documented, repeatable, and integrated as necessary across the organization. IT’s financial view tie technology investments to lines of business, business products, and business capabilities.
    Business partners are well informed on the technology mix and drive related discussion. IT is trusted to contribute to complex decision making around existing investments to cost-effectively plan initiatives, as well as enhance business performance.
    Strategic Partner
    Level 5
    Influence on the organization’s strategic direction. ITFM activities revolve around predicting the outcome of new or potential technology investments to continuously optimize business performance.
    ITFM practices are fully optimized, reviewed, and improved in a continuous and sustainable manner, and related execution is tracked by gathering qualitative and quantitative feedback. IT’s financial view is holistic and fully integrated with the business, with an outlook on innovation, growth, and strategic transformation.
    Business and IT leaders know the financial ramifications of every business and technology investment decision. IT is trusted to contribute to strategic decision making around potential and future investments to grow and transform the business.

    Appendix B

    Maturity Level Definitions and Descriptions
    Per Lever

    Establish your ITFM team

    Maturity focus area: Build an ITFM foundation.

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability to provide any type of financial insight.ITFM tasks, activities, and functions are not being met in any way, shape, or form.
    Cost Operator
    Level 2
    Ability to provide basic financial insights.There is no dedicated ITFM team.


    Basic ITFM tasks, activities, and functions are being performed on an ad hoc basis, such as high-level budget reporting.

    Trusted Coordinator
    Level 3
    Ability to provide basic business insights.A dedicated team is fulfilling essential ITFM tasks, activities, and functions.


    ITFM team can combine and analyze financial and technology data to produce necessary reports.

    Value Optimizer
    Level 4
    Ability to provide valuable business driven insights.A dedicated ITFM team with well-defined roles and responsibilities can provide effective advice to IT leaders, in a timely fashion, and positively influence IT decisions.
    Strategic Partner
    Level 5
    Ability to influence both technology and business decisions.A dedicated and highly specialized ITFM team is trusted and valued by both IT and Business leaders.


    Insights provided by the ITFM team can influence and shape the organization’s strategy.

    Set up your governance structure

    Maturity focus area: Build an ITFM foundation

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability to ensure any adherence to rules and regulations.ITFM frameworks, guidelines, policies, and procedures are not developed nor documented.
    Cost Operator
    Level 2
    Ability to ensure basic adherence to rules and regulations.Basic ITFM frameworks, guidelines, policies, and procedures are in place, developed on an ad hoc basis, with no apparent coherence or complete documentation.
    Trusted Coordinator
    Level 3
    Ability to ensure compliance to rules and regulations, as well as accountability across ITFM processes.Essential ITFM frameworks, guidelines, policies, and procedures are in place, coherent, and documented, aiming to (a) comply with rules and regulations, and (b) provide clear accountability.
    Value Optimizer
    Level 4
    Ability to ensure compliance to rules and regulations, as well as structure, transparency, and business alignment across ITFM processes.ITFM frameworks, guidelines, policies, and procedures are well defined, coherent, documented, and regularly reviewed, aiming to (a) comply with rules and regulations, (b) provide clear accountability, and (c) maintain business alignment.
    Strategic Partner
    Level 5
    Ability to:
    • Ensure compliance to rules and regulations, as well as ITFM processes are transparent, structured, focused on business objectives, and support decision making.
    • Reinforce and shape the organization culture.
    ITFM frameworks, guidelines, policies, and procedures are complete, well defined, coherent, documented, continuously reviewed, and improved, aiming to (a) comply with rules and regulations, (b) provide clear accountability, (c) maintain business alignment, and (d) facilitate the decision-making process.


    Enforcement of the ITFM governance structure can influence the organization culture.

    Adopt ITFM processes and tools

    Maturity focus area: Build an ITFM foundation.

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability to deliver IT financial planning and performance output.ITFM processes and tools are not developed nor documented.
    Cost Operator
    Level 2
    Ability to deliver basic IT financial planning output.Basic ITFM processes and tools are in place, developed on an ad hoc basis, with no apparent coherence or complete documentation.
    Trusted Coordinator
    Level 3
    Ability to deliver accurate IT financial output and basic IT performance output in a consistent cadence.Essential ITFM processes and tools are in place, coherent, and documented, aiming to (a) maintain integrity across activities, tasks, methodologies, data, and reports; (b) deliver IT financial planning and performance output needed by stakeholders; and (c) provide clear accountability. ITFM tools and processes are adopted by the ITFM team and some IT business units but are not fully integrated.
    Value Optimizer
    Level 4
    Ability to deliver accurate IT financial planning and performance output at the needed level of detail to stakeholders in a consistent cadence.ITFM processes and tools are complete, well defined, coherent, documented, continuously reviewed, and improved, aiming to (a) maintain integrity across activities, tasks, methodologies, data, and reports; (b) deliver IT financial planning and performance output needed by stakeholders; (c) provide clear accountability; and (d) facilitate decision-making. ITFM tools and processes are adopted by IT and business partners but are not fully integrated.
    Strategic Partner
    Level 5
    Ability to:
    • Deliver accurate IT financial planning and performance output at the needed level of detail to stakeholders.
    • Leverage IT financial planning and performance output in real time and when needed by stakeholders.
    ITFM processes and tools are complete, well defined, coherent, documented, continuously reviewed, and improved, aiming to (a) maintain integrity across activities, tasks, methodologies, data, and reports; (b) deliver IT financial planning and performance output needed by stakeholders; (c) provide clear accountability; and (d) facilitate decision making.


    ITFM processes and tools are automated to the full extent needed by the organization, utilized to their full potential, and integrated into a single enterprise platform, providing a holistic view of IT spending and IT performance.

    Standardize your taxonomy and data model

    Maturity focus area: Manage and monitor IT spending.

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability to provide transparency across technology spending.ITFM taxonomy and data model are not developed nor documented.
    Cost Operator
    Level 2
    Ability to provide transparency and support IT financial planning data, analysis, and reporting needs of finance stakeholders.ITFM taxonomy and data model are in place, developed on an ad hoc basis, with no apparent coherence or complete documentation, to comply with, and meet the needs of finance stakeholders.
    Trusted Coordinator
    Level 3
    Ability to provide transparency and support IT financial planning and performance data, analysis, and reporting needs of IT and finance stakeholders.ITFM taxonomy and data model are in place, coherent, and documented to meet the needs of IT and finance stakeholders.
    Value Optimizer
    Level 4
    Ability to provide transparency and support IT financial planning and performance data, analysis, and reporting needs of IT, finance, business, and executive stakeholders.ITFM taxonomy and data model are complete, well defined, coherent, documented, continuously reviewed, and improved, aiming to provide (a) a holistic view of IT spending and IT performance, (b) visibility and transparency, (c) flexibility, and (d) valuable insights to facilitate data driven decision making.


    ITFM taxonomy and data model are standardized to meet the needs of IT, finance, business, and executive stakeholders, but not flexible enough to be adjusted in a timely fashion as needed.

    Strategic Partner
    Level 5
    Ability to:
    • Provide transparency and support IT financial planning and performance data, analysis, and reporting needs of IT, finance, business, and executive stakeholders.
    • Change to meet evolving needs.
    ITFM taxonomy and data model are complete, well defined, coherent, documented, continuously reviewed, and improved, aiming to provide (a) a holistic view of IT spending and IT performance, (b) visibility and transparency, (c) flexibility, and (d) valuable insights to facilitate data driven decision making.


    ITFM taxonomy and data model are standardized and meet the changing needs of IT, finance, business, and executive stakeholders.

    Identify, gather, and prepare your data

    Maturity focus area: Manage and monitor IT spending.

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability to provide accurate and complete across technology spending.ITFM data needs and requirements are not understood.
    Cost Operator
    Level 2
    Ability to provide accurate, but incomplete IT financial planning data to meet the needs of finance stakeholders.Technology spending data is extracted, transformed, and loaded on an ad hoc basis to meet the needs of finance stakeholders.
    Trusted Coordinator
    Level 3
    Ability to provide accurate and complete IT financial planning data to meet the needs of IT and finance stakeholders, but IT performance data remain incomplete.IT financial planning data is extracted, transformed, and loaded in a regular cadence to meet the needs of IT and finance stakeholders.


    IT financial planning data is (a) complete and accurate, as defined in related control documents (guideline, policies, procedures, etc.), (b) regularly validated for inconsistencies, and (c) sourced from the organization’s system of record.

    Value Optimizer
    Level 4
    Ability to provide accurate and complete IT financial planning and performance data to meet the needs of IT, finance, business, and executive stakeholders.ITFM data needs and requirements are understood.


    ITFM data is extracted, transformed, and loaded in a regular cadence to meet the needs of IT, finance, business, and executive stakeholders.


    IT financial planning and performance data are (a) complete and accurate, as defined in related control documents (guideline, policies, procedures, etc.), (b) regularly validated for inconsistencies, and (c) sourced from the organization’s system of record.

    Strategic Partner
    Level 5
    Ability to provide accurate and complete IT financial planning and performance data real time and when needed by IT, finance, business, and executive stakeholders.ITFM data needs and requirements are understood.


    IT financial planning and performance data are (a) complete and accurate, as defined in related control documents (guideline, policies, procedures, etc.), (b) regularly validated for inconsistencies, (c) available and refreshed as needed, and (d) sourced from the organization’s system of record.

    Analyze your findings and develop your reports

    Maturity focus area: Manage and monitor IT spending.

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability to provide any type of financial insight.ITFM analysis and reports are not developed nor documented.
    Cost Operator
    Level 2
    Ability to provide basic financial insights.IT financial planning analysis is conducted on an ad hoc basis to meet the needs of finance stakeholders.
    Trusted Coordinator
    Level 3
    Ability to provide basic financial planning and performance insights to meet the needs of IT and finance stakeholders.IT financial planning and performance analysis are methodical and rigorous, as defined in related control documents (guideline, policies, procedures, etc.).


    IT financial planning and performance reports are accurate, precise, and methodical, as defined in related control documents (guideline, policies, procedures, etc.).

    Value Optimizer
    Level 4
    Ability to provide practical insights and useful recommendations as needed by IT, finance, business, and executive stakeholders to facilitate business decision making around technology investments.ITFM analysis and reports support business decision making around technology investments.


    IT financial planning and performance analysis are methodical and rigorous, as defined in related control documents (guideline, policies, procedures, etc.).


    IT financial planning and performance reports are (a) accurate, precise, and methodical, as defined in related control documents (guideline, policies, procedures, etc.), (b) fit for purpose, and (c) regularly validated for inconsistencies.

    Strategic Partner
    Level 5
    Ability to provide practical insights and useful recommendations as needed by IT, finance, business, and executive stakeholders to facilitate strategic decision making.ITFM analysis and reports support strategic decision making.


    IT financial planning and performance analysis are methodical and rigorous, as defined in related control documents (guideline, policies, procedures, etc.), and consider multiple point of views (hypotheses, interpretations, opinions, etc.).


    IT financial planning and performance reports are (a) accurate, precise, and methodical, as defined in related control documents (guideline, policies, procedures, etc.), (b) fit for purpose, (c) comprehensive, and (d) regularly validated for inconsistencies.

    Communicate your IT spending

    Maturity focus area: Bridge the language barrier.

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability of organization stakeholders to communicate and understand each other.The organization stakeholders including IT, finance, business, and executives do not understand one another, and cannot speak the same language.
    Cost Operator
    Level 2
    Ability to understand business and finance requirements.IT understands and meets business and financial planning requirements but does not communicate in a similar language.


    IT cannot influence finance or business decision making.

    Trusted Coordinator
    Level 3
    Ability to understand the needs of different stakeholders including IT, finance, business, and executives and take part in decision making around technology spending.The organization stakeholders including IT, finance, business, and executives understand each other’s needs, but do not communicate in a common language.


    IT leaders provide insights as technology subject matter experts, where conversations center on IT spending in relation to technology services or solutions provided to business partners.


    IT can influence technology decisions around its own budget.

    Value Optimizer
    Level 4
    Ability to communicate in a common vocabulary across the organization and take part in business decision making around technology investments.The organization stakeholders including IT, finance, business, and executives communicate in a common vocabulary and understand one another.


    IT and business leaders, along with their respective teams, collaborate frequently across various initiatives.


    IT leaders provide valuable insight to support and influence business decision making around existing technology investments.

    Strategic Partner
    Level 5
    Ability to communicate in a common vocabulary across the organization and take part in strategic decision making.The organization stakeholders including IT, finance, business, and executives communicate in a common vocabulary and understand one another.


    IT and business leaders, along with their respective teams, collaborate frequently across various initiatives.


    IT leaders provide valuable insight to facilitate decision making around potential and future investments to grow and transform the business, thus influencing the organization’s overall strategic direction.

    Educate the masses

    Maturity focus area: Bridge the language barrier.

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability of organization stakeholders to acquire knowledge.Educational resources are inexistent.
    Cost Operator
    Level 2
    Ability to acquire financial knowledge and understand financial concepts.IT leaders have access to educational resources to gain the financial knowledge necessary to perform their duties.
    Trusted Coordinator
    Level 3
    Ability to acquire financial and business knowledge and understand related concepts.IT leaders and their respective teams have access to educational resources to gain the financial and business knowledge necessary to perform their duties.


    ITFM team has access to the necessary educational resources to keep up with changing financial regulations and technology developments.

    Value Optimizer
    Level 4
    Ability to acquire knowledge, across technology, business, and finance as needed by different organization stakeholders, and the leadership understand concepts across these various domains.Stakeholders including IT, finance, business, and executives have access to various educational resources to gain knowledge in different domains as needed.


    IT leaders have a good understanding of business and financial concepts.


    Business leaders have a good understanding of technology concepts.

    Strategic Partner
    Level 5
    Ability to acquire knowledge, and understand concepts across technology, business, and finance as needed by different organization stakeholders.The organization promotes continuous learning through well designed programs including training, mentorship, and academic courses. Thus, stakeholders including IT, finance, business, and executives have access to various educational resources to gain knowledge in different domains as needed.


    IT leaders and their respective teams have a good understanding of business and financial concepts.


    Business leaders and their respective teams have a good understanding of technology concepts.

    Influence your organization’s culture

    Maturity focus area: Bridge the language barrier.

    Maturity Level

    Definition

    Description

    Nascent
    Level 1
    Inability to provide and foster an environment of collaboration and continuous improvement.Stakeholders including IT, finance, business, and executives operate in silos, and collaboration between different teams is inexistent.
    Cost Operator
    Level 2
    Ability to provide an environment of cooperation to meet the needs of IT, finance, and business leaders.IT, finance, and business leaders cooperate to meet financial planning requirements as necessary to perform their duties.
    Trusted Coordinator
    Level 3
    Ability to provide and foster an environment of collaboration across the organization.IT, finance, and business collaborate on various initiatives.

    ITFM employees are trusted and supported by their stakeholders (IT, finance, and business).

    Value Optimizer
    Level 4
    Ability to provide and foster an environment of collaboration and continuous improvement, where employees across the organization feel trusted, supported, empowered, and valued.Stakeholders including IT, finance, business, and executives support and promote continuous improvement, transparency practices, and collaboration across the organization.


    Employees are trusted, supported, empowered, and valued.

    Strategic Partner
    Level 5
    Ability to provide and foster an environment of collaboration and continuous improvement, where leaders are willing to change, and employees across the organization feel trusted, supported, empowered, and valued.Stakeholders including IT, finance, business, and executives support and promote continuous improvement, transparency practices, and collaboration across the organization.


    The organization’s leadership is adaptable and open to change.


    Employees are trusted, supported, empowered, and valued.

    Train Managers to Strengthen Employee Relationships to Improve Engagement

    • Buy Link or Shortcode: {j2store}545|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • The responsibility of employee engagement has been on the shoulders of HR and the executive team for years, but managers, not HR or executives, should be primarily responsible for employee engagement.
    • Managers often fail to take steps to improve due to the following reasons:
      • They don’t understand the impact they can have on engagement.
      • They don’t understand the value of an engaged workforce.
      • They don’t feel that they are responsible for engagement.
      • They don’t know what steps they can personally take to improve engagement levels.

    Our Advice

    Critical Insight

    • Managers have a large impact on employee engagement and retention. According to McLean & Company’s engagement data, every 10% increase in the category “my manager inspires me to improve” resulted in a 3.6% increase in an employee’s intent to stay.
    • To improve the manager relationship driver, managers cannot abdicate the responsibility of strengthening relationships with employees to HR – they must take the ownership role.

    Impact and Result

    • When an organization focuses on strengthening manager relationships with employees, managers should be the owner and IT leadership should be the facilitator.
    • Info-Tech recommends starting with the three most important actions to improve employee trust and therefore engagement: inform employees of the why behind decisions, interact with them on a personal level, and involve them in decisions that affect them (also known as the “3 I’s”).
    • Use this blueprint to prepare to train managers on how to apply the 3 I principles and improve the score on this engagement driver.

    Train Managers to Strengthen Employee Relationships to Improve Engagement Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Make the case

    Educate managers on the impact they have on engagement.

    • Train Managers to Strengthen Employee Relationships to Improve Engagement Storyboard

    2. Prepare for the training session by understanding key concepts

    Learn the 3 I’s of engagement and understand IT leaders as role models for engagement.

    • Training Deck: Train Managers to Build Trusting Relationships to Improve Engagement

    3. Plan the training session and customize the materials

    Determine the logistics of the training session: the who, what, and where.

    • Participant Notebook: Take Ownership of Manager Relationships

    4. Track training success metrics and follow up

    Determine ways to track the impact the training has on employee engagement.

    • Training Evaluation: Manager Relationships
    [infographic]

    Workshop: Train Managers to Strengthen Employee Relationships to Improve Engagement

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Make the Case for Strengthening Manager Relationships

    The Purpose

    Educate managers on the impact they have on engagement and the relationship between employee trust and engagement.

    Identify reasons why managers fail to positively impact employee engagement.

    Inform managers of their responsibility for employee engagement.

    Key Benefits Achieved

    Increased awareness of managers regarding their impact on employee engagement.

    Improved understanding of manager role.

    Creation of plan to increase employee trust and engagement.

    Activities

    1.1 Describe relationship between trust and engagement.

    1.2 Review data on manager’s impact on engagement.

    Outputs

    Gain an understanding of the 3 I’s of building trust.

    Address key objections managers might have.

    2 Prepare for the Training Session by Understanding Key Concepts and Your Role as HR

    The Purpose

    Understand key concepts for engagement, such as inform, interact, and involve.

    Use McLean & Company’s advice to get past pain points with managers.

    Key Benefits Achieved

    Understand the key principles and activities in the manager training deck.

    Gain advice for dealing with pushback from managers.

    Learn about actions that you can take to adopt the 3 I’s principle and act as a role model.

    Activities

    2.1 Practice manager training exercises on informing, interacting with, and involving employees.

    Outputs

    Become familiar with and prepared to take managers through key training exercises.

    3 Plan the Training Session and Customize the Materials

    The Purpose

    Determine who will participate in the manager training session.

    Become familiar with the content in the training deck and ensure the provided examples are appropriate.

    Key Benefits Achieved

    Logistics planned for your own training session.

    Your own case made more powerful by adding your engagement data to the training deck slides.

    Improved delivery of training, making it more effective and engaging for participants.

    Activities

    3.1 Consider your audience for delivering the training.

    3.2 Plan out logistics for the training session—the who, where, and when.

    Outputs

    Ensure that your training sessions include the appropriate participants.

    Deliver a smooth and successful training session.

    4 Track Training Success Metrics and Follow Up

    The Purpose

    Determine ways to track the impact the training has on employee engagement.

    Understand how to apply the 3 I’s principle across HR functions. 

    Key Benefits Achieved

    Measure the value of engagement training.

    Gain immediate feedback on employee engagement with the McLean Leadership Index.

    Determine how HR can support managers in building stronger relationships with employees.

    Activities

    4.1 Determine how HR can support management in strengthening employee relationships.

    Outputs

    Create a culture of trust throughout the organization.

    IT Organizational Design

    • Buy Link or Shortcode: {j2store}32|cart{/j2store}
    • Related Products: {j2store}32|crosssells{/j2store}
    • member rating overall impact: 9.1/10
    • member rating average dollars saved: $83,392
    • member rating average days saved: 21
    • Parent Category Name: People and Resources
    • Parent Category Link: /people-and-resources

    The challenge

    • IT can ensure full business alignment through an organizational redesign.
    • Finding the best approach for your company is difficult due to many frameworks and competing priorities.
    • External competitive influences and technological trends exacerbate this.

    Our advice

    Insight

    • Your structure is the critical enabler of your strategic direction. Structure dictates how people work together and how they can fill in their roles to create the desired business value. 
    • Constant change is killing for an organization. You need to adapt, but you need a stable baseline and make sure the change is in line with the overall strategy and company context.
    • A redesign is only successful if it really happens. Shifting people into new positions is not enough to implement a redesign. 

    Impact and results 

    • Define your redesign principles. They will act as a manifesto to your change. It also provides for a checklist, ensuring that the structure does not deviate from the business strategy.
    • Visualize the new design with a customized operating model for your company. It must demonstrate how IT creates value and supports the business value creation chains.
    • Define the future-state roles, functions, and responsibilities to enable your IT department to support the business effectively.

    The roadmap

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    Get started

    Our concise executive brief explains to you the challenges associated with the organizational redesign. We'll show you our methodology and the ways we can help you in completing this.

    Define your organizational design principles and select your operating model

    The design principles will govern your organizational redesign; Align the principles with your business strategy.

    • Redesign Your IT Organizational Structure – Phase 1: Craft Organizational Design Principles and Select an IT Operating Model (ppt)
    • Organizational Design Communications Deck (ppt)

    Customize the selected IT operating model to your company

    Your operating model must account for the company's nuances and culture.

    • Redesign Your IT Organizational Structure – Phase 2: Customize the IT Operating Model (ppt)
    • Operating Models and Capability Definition List (ppt)

    Design the target-state of your IT organizational structure

    Go from an operating model to the structure fit for your company.

    • Redesign Your IT Organizational Structure – Phase 3: Architect the Target-State IT Organizational Structure (ppt)
    • Organizational Design Capability RACI Chart (xls)
    • Work Unit Reference Structures (Visio)
    • Work Unit Reference Structures (pdf)

    Communicate the benefits of the new structure

    Change does not come easy. People will be anxious. Craft your communications to address critical concerns and obtain buy-in from the organization. If the reorganization will be painful, be up-front on that, and limit the time in which people are uncertain.

    • Redesign Your IT Organizational Structure – Phase 4: Communicate the Benefits of the New Organizational Structure (ppt)

     

    Demystify Oracle Licensing and Optimize Spend

    • Buy Link or Shortcode: {j2store}136|cart{/j2store}
    • member rating overall impact: 9.9/10 Overall Impact
    • member rating average dollars saved: $85,754 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Licensing
    • Parent Category Link: /licensing
    • License keys are not needed with optional features accessible upon install. Conducting quarterly checks of the Oracle environment is critical because if products or features are installed, even if they are not actively in use, it constitutes use by Oracle and requires a license.
    • Ambiguous license models and definitions abound: terminology and licensing rules can be vague, making it difficult to purchase licensing even with the best of intentions to keep compliant.
    • Oracle has aggressively started to force new Oracle License and Service Agreements (OLSA) on customers that slightly modify language and remove pre-existing allowances to tilt the contract terms in Oracle's favor.

    Our Advice

    Critical Insight

    • Focus on needs first. Conduct a thorough requirements assessment and document the results. Well-documented license needs will be your core asset in navigating Oracle licensing and negotiating your agreement.
    • Communicate effectively. Be aware that Oracle will reach out to employees at your organization at various levels. Having your executives on the same page will help send a strong message.
    • Manage the relationship. If Oracle is managing you, there is a high probability you are over paying or providing information that may result in an audit.

    Impact and Result

    • Conducting business with Oracle is not typical compared to other vendors. To emerge successfully from a commercial transaction with Oracle, customers must learn the "Oracle way" of conducting business, which includes a best-in-class sales structure, highly unique contracts and license use policies, and a hyper-aggressive compliance function.
    • Map out the process of how to negotiate from a position of strength, examining terms and conditions, discount percentages, and agreement pitfalls.
    • Develop a strategy that leverages and utilizes an experienced Oracle DBA to gather accurate information, and then optimizes it to mitigate and meet the top challenges.

    Demystify Oracle Licensing and Optimize Spend Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you need to understand and document your Oracle licensing strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Establish licensing requirements

    Begin your proactive Oracle licensing journey by understanding which information to gather and assessing the current state and gaps.

    • Demystify Oracle Licensing and Optimize Spend – Phase 1: Establish Licensing Requirements
    • Oracle Licensing Purchase Reference Guide
    • Oracle Database Inventory Tool
    • Effective Licensing Position Tool
    • RASCI Chart

    2. Evaluate licensing options

    Review current licensing models and determine which licensing models will most appropriately fit your environment.

    • Demystify Oracle Licensing and Optimize Spend – Phase 2: Evaluate Licensing Options

    3. Evaluate agreement options

    Review Oracle’s contract types and assess which best fit the organization’s licensing needs.

    • Demystify Oracle Licensing and Optimize Spend – Phase 3: Evaluate Agreement Options
    • Oracle TCO Calculator

    4. Purchase and manage licenses

    Conduct negotiations, purchase licensing, and finalize a licensing management strategy.

    • Demystify Oracle Licensing and Optimize Spend – Phase 4: Purchase and Manage Licenses
    • Oracle Terms & Conditions Evaluation Tool
    • Controlled Vendor Communications Letter
    • Vendor Communication Management Plan
    [infographic]

    Workshop: Demystify Oracle Licensing and Optimize Spend

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish Licensing Requirements

    The Purpose

    Assess current state and align goals; review business feedback

    Interview key stakeholders to define business objectives and drivers

    Key Benefits Achieved

    Have a baseline for requirements

    Assess the current state

    Determine licensing position

    Examine cloud options

    Activities

    1.1 Gather software licensing data

    1.2 Conduct a software inventory

    1.3 Perform manual checks

    1.4 Reconcile licenses

    1.5 Create your Oracle licensing team

    1.6 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Copy of your Oracle License Statement

    Software inventory report from software asset management (SAM) tool

    Oracle Database Inventory Tool

    RASCI Chart

    Oracle Licensing Effective License Position (ELP) Template

    Oracle Licensing Purchase Reference Guide

    2 Evaluate Licensing Options

    The Purpose

    Review licensing options

    Review licensing rules

    Key Benefits Achieved

    Understand how licensing works

    Determine if you need software assurance

    Discuss licensing rules, application to current environment.

    Examine cloud licensing

    Understand the importance of documenting changes

    Meet with desktop product owners to determine product strategies

    Activities

    2.1 Review full, limited, restricted, and AST use licenses

    2.2 Calculate license costs

    2.3 Determine which database platform to use

    2.4 Evaluate moving to the cloud

    2.5 Examine disaster recovery strategies

    2.6 Understand purchasing support

    2.7 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Oracle TCO Calculator

    Oracle Licensing Purchase Reference Guide

    3 Evaluate Agreement Options

    The Purpose

    Review contract option types

    Review vendors

    Key Benefits Achieved

    Understand why a type of contract is best for you

    Determine if ULA or term agreement is best

    The benefits of other types and when you should change

    Activities

    3.1 Prepare to sign or renew your ULA

    3.2 Decide on an agreement type that nets the maximum benefit

    Outputs

    Type of contract to be used

    Oracle TCO Calculator

    Oracle Licensing Purchase Reference Guide

    4 Purchase and Manage Licenses

    The Purpose

    Finalize the contract

    Prepare negotiation points

    Discuss license management

    Evaluate and develop a roadmap for future licensing

    Key Benefits Achieved

    Negotiation strategies

    Licensing management

    Introduction of SAM

    Leverage the work done on Oracle licensing to get started on SAM

    Activities

    4.1 Control the flow of communication terms and conditions

    4.2 Use Info-Tech’s readiness assessment in preparation for the audit

    4.3 Assign the right people to manage the environment

    4.4 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Controlled Vendor Communications Letter

    Vendor Communication Management Plan

    Oracle Terms & Conditions Evaluation Tool

    RASCI Chart

    Oracle Licensing Purchase Reference Guide

    Build Your Enterprise Innovation Program

    • Buy Link or Shortcode: {j2store}104|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $100,000 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Innovation
    • Parent Category Link: /innovation
    • You don’t know where to start when it comes to building an innovation program for your organization.
    • You need to create a culture of innovation in your business, department, or team.
    • Past innovation efforts have been met with resistance and cynicism.
    • You don’t know what processes you need to support business-led innovation.

    Our Advice

    Critical Insight

    Innovation is about people, not ideas or processes. Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and taking smart risks are most likely to see the benefits of innovation.

    Impact and Result

    • Outperform your peers by 30% by adopting an innovative approach to your business.
    • Move quickly to launch your innovation practice and beat the competition.
    • Develop the skills and capabilities you need to sustain innovation over the long term.

    Build Your Enterprise Innovation Program Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build Your Enterprise Innovation Program Storyboard – A step-by-step process to create the innovation culture, processes, and tools you need for business-led innovation.

    This storyboard includes three phases and nine activities that will help you define your purpose, align your people, and build your practice.

    • Build Your Enterprise Innovation Program – Phases 1-3

    2. Innovation Program Template – An executive communication deck summarizing the outputs from this research.

    Use this template in conjunction with the activities in the main storyboard to create and communicate your innovation program. This template uses sample data from a fictional retailer, Acme Corp, to illustrate an ideal innovation program summary.

    • Innovation Program Template

    3. Job Description – Chief Innovation Officer

    This job description can be used to hire your Chief Innovation Officer. There are many other job descriptions available on the Info-Tech website and referenced within the storyboard.

    • Chief Innovation Officer

    4. Innovation Ideation Session Template – Use this template to facilitate innovation sessions with the business.

    Use this framework to facilitate an ideation session with members of the business. Instructions for how to customize the information and facilitate each section is included within the deck.

    • Innovation Ideation Session Template

    5. Initiative Prioritization Workbook – Use this spreadsheet template to easily and transparently prioritize initiatives for pilot.

    This spreadsheet provides an analytical and transparent method to prioritize initiatives based on weighted criteria relevant to your business.

    • Initiative Prioritization Workbook

    Infographic

    Workshop: Build Your Enterprise Innovation Program

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define Your Ambitions

    The Purpose

    Define your innovation ambitions.

    Key Benefits Achieved

    Gain a better understanding of why you are innovating and what your organization will gain from an innovation program.

    Activities

    1.1 Understand your innovation mandate.

    1.2 Define your innovation ambitions.

    1.3 Determine value proposition & metrics.

    Outputs

    Complete the "Our purpose" section of the Innovation Program Template

    Complete "Vision and guiding principles" section

    Complete "Scope and value proposition" section

    Success metrics

    2 Align Your People

    The Purpose

    Build a culture, operating model, and team that support innovation.

    Key Benefits Achieved

    Develop a plan to address culture gaps and identify and implement your operating model.

    Activities

    2.1 Foster a culture of innovation.

    2.2 Define your operating model.

    Outputs

    Complete "Building an innovative culture" section

    Complete "Operating model" section

    3 Develop Your Capabilities

    The Purpose

    Create the capability to facilitate innovation.

    Key Benefits Achieved

    Create a resourcing plan and prioritization templates to make your innovation program successful.

    Activities

    3.1 Build core innovation capabilities.

    3.2 Develop prioritization criteria.

    Outputs

    Team structure and resourcing requirements

    Prioritization spreadsheet template

    4 Build Your Program

    The Purpose

    Finalize your program and complete the final deliverable.

    Key Benefits Achieved

    Walk away with a complete plan for your innovation program.

    Activities

    4.1 Define your methodology to pilot projects.

    4.2 Conduct a program retrospective.

    Outputs

    Complete "Operating model" section in the template

    Notable wins and goals

    Further reading

    Build Your Enterprise Innovation Program

    Transform your business by adopting the culture and practices that drive innovation.

    Analyst Perspective

    Innovation is not about ideas, it's about people.

    Many organizations stumble when implementing innovation programs. Innovation is challenging to get right, and even more challenging to sustain over the long term.

    One of the common stumbling blocks we see comes from organizations focusing more on the ideas and the process than on the culture and the people needed to make innovation a way of life. However, the most successful innovators are the ones which have adopted a culture of innovation and reinforce innovative behaviors across their organization. Organizational cultures which promote growth mindset, trust, collaboration, learning, and a willingness to fail are much more likely to produce successful innovators.

    This research is not just about culture, but culture is the starting point for innovation. My hope is that organizations will go beyond the processes and methodologies laid out here and use this research to dramatically improve their organization's performance.

    Kim Rodriguez

    Kim Osborne Rodriguez
    Research Director, CIO Advisory
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    As a leader in your organization, you need to:

    • Understand your organization's innovation goals.
    • Create an innovation program or structure.
    • Develop a culture of innovation across your team or organization.
    • Demonstrate an ability to innovate and grow the business.

    Common Obstacles

    In the past, you might have experienced one or more of the following:

    • Innovation initiatives lose momentum.
    • Cynicism and distrust hamper innovation.
    • Innovation efforts are unfocused or don't provide the anticipated value.
    • Bureaucracy has created a bottleneck that stifles innovation.

    Info-Tech's Approach

    This blueprint will help you:

    • Understand the different types of innovation.
    • Develop a clear vision, scope, and focus.
    • Create organizational culture and behaviors aligned with your innovation ambitions.
    • Adopt an operational model and methodologies best suited for your culture, goals, and budget.
    • Successfully run a pilot program.

    Info-Tech Insight

    There is no single right way to approach innovation. Begin with an understanding of your innovation ambitions, your existing culture, and the resources available to you, then adopt the innovation operating model that is best suited to your situation.

    Note: This research is written for the individual who is leading the development of the innovation. This role is referred to as the Chief Innovation Officer (CINO) throughout this research but could be the CIO, CTO, IT director, or another business leader.

    Why is innovation so challenging?

    Most organizations want to be innovative, but very few succeed.

    • Bureaucracy slows innovation: Innovation requires speed – it is important to fail fast and early so you can iterate to improve the final solution. Small, agile organizations like startups tend to be more risk tolerant and can move more quickly to iterate on new ideas compared to larger organizations.
    • Change is uncomfortable: Most people are profoundly uncomfortable with failure, risk, and unknowns – three critical components of innovation. Humans are wired to think efficiently rather than innovatively, which leads to confirmation bias and lack of ingenuity.
    • You will likely fail: Innovation initiatives rarely succeed on the first try – Harvard Business Review estimates between 70% and 90% of innovation efforts fail. Organizations which are more tolerant of failure tend to be significantly more innovative than those which are not (Review of Financial Studies, 2014).

    Based on a survey of global innovation trends and practices:

    75%

    Three-quarters of companies say innovation is a top-three priority.
    Source: BCG, 2021

    30%

    But only 30% of executives say their organizations are doing it well.
    Source: BCG, 2019

    The biggest obstacles to innovation are cultural

    The biggest obstacles to innovation in large companies

    Based on a survey of 270 business leaders.
    Source: Harvard Business Review, 2018

    A bar graph from the Harvard Business Review

    The most common challenges business leaders experience relate to people and culture. Success is based on people, not ideas.

    Politics, turf wars, and a lack of alignment: territorial departments, competition for resources, and unclear roles are holding back the innovation efforts of 55% of respondents.

    FIX IT
    Senior leadership needs to be clear on the innovation goals and how business units are expected to contribute to them.

    Cultural issues: many large companies have a culture that rewards operational excellence and disincentivizes risk. A history of failed innovation attempts may result in significant resistance to new change efforts.

    FIX IT
    Cultural change takes time. Ensure you are rewarding collaboration and risk-taking, and hire people with fresh new perspectives.

    Inability to act on signals crucial to the future of the business: only 18% of respondents indicated their organization was unaware of disruptions, but 42% said they struggled with acting on leading indicators of change.

    FIX IT
    Build the ability to quickly run pilots or partner with startups and incubators to test out new ideas without lengthy review and approval processes.
    Source: Harvard Business Review, 2018

    Build Your Enterprise Innovation Program

    Define your purpose, assess your culture, and build a practice that delivers true innovation.

    An image summarizing how to define your purpose, align your people, and Build your Practice.
    1 Source: Boston Consulting Group, 2021
    2 Source: Boston Consulting Group, 2019
    3 Source: Harvard Business Review, 2018

    Use this research to outperform your peers

    A seven-year review showed that the most innovative companies outperformed the market by upwards of 30%.

    A line graph showing the Normalized Market Capitalization for 2020.

    Innovators are defined as companies that were listed on Fast Company World's 50 Most Innovative Companies for 2+ years.

    Innovation is critical to business success.

    A 25-year study by Business Development Canada and Statistics Canada showed that innovation was more important to business success than management, human resources, marketing, or finance.

    Executive brief case study

    INDUSTRY: Healthcare
    SOURCE: Interview

    Culture is critical

    This Info-Tech member is a nonprofit, community-based mental health organization located in the US. It serves about 25,000 patients per year in community, school, and clinic settings.

    This organization takes its innovation culture very seriously and has developed methodologies to assess individual and team innovation readiness as well as innovation types, which it uses to determine everyone's role in the innovation process. These assessments look at knowledge of and trust in the organization, its innovation profile, and its openness to change. Innovation enthusiasts are involved early in the process when it's important to dream big, while more pragmatic perspectives are incorporated later to improve the final solution.

    Results

    The organization has developed many innovative approaches to delivering healthcare. Notably, they have reimagined patient scheduling and reduced wait times to the extent that some patients can be seen the same day. They are also working to improve access to mental health care despite a shortage of professionals.

    Developing an Innovative Culture

    • Innovation Readiness Assessment
    • Coaching Specific to Innovation Profile
    • Innovation Enthusiasts Involved Early
    • Innovation Pragmatists Involved Later
    • High Success Rate of Innovation

    Define innovation roles and responsibilities

    A table showing key innovation roles and responsibilities.

    Info-Tech's methodology for building your enterprise innovation program

    1. Define Your Purpose

    2. Align Your People

    3. Build Your Practice

    Phase Steps

    1. Understand your mandate
    2. Define your innovation ambitions
    3. Determine value proposition and metrics
    1. Foster a culture of innovation
    2. Define your operating model
    3. Build core innovation capabilities
    1. Build your ideation and prioritization methodologies
    2. Define your pilot project methodology
    3. Conduct a program retrospective

    Phase Outcomes

    Understand where the mandate for innovation comes from, and what the drivers are for pursuing innovation. Define what innovation means to your organization, and set the vision, mission, and guiding principles. Articulate the value proposition and key metrics for measuring success.

    Understand what it takes to build an innovative culture, and what types of innovation structure are most suited to your innovation goals. Define an innovation methodology and build your core innovation capabilities and team.

    Gather ideas and understand how to assess and prioritize initiatives based on standardized metrics. Develop criteria for tracking and measuring the success of pilot projects and conduct a program retrospective.

    Innovation program taxonomy

    This research uses the following common terms:

    Innovation Operating Model
    The operating model describes how the innovation program delivers value to the organization, including how the program is structured, the steps from idea generation to enterprise launch, and the methodologies used.
    Examples: Innovation Hub, Grassroots Innovation.

    Innovation Methodology
    Methodologies describe the ways the operating model is carried out, and the approaches used in the innovation practice.
    Examples: Design Thinking, Weighted Criteria Scoring

    Chief Innovation Officer
    This research is written for the person or team leading the innovation program – this might be a CINO, CIO, or other leader in the organization.

    Innovation Team
    The innovation team may vary depending on the operating model, but generally consists of the individuals involved in facilitating innovation across the organization. This may be, but does not have to be, a dedicated innovation department.

    Innovation Program
    The program for generating ideas, running pilot projects, and building a business case to implement across the enterprise.

    Pilot Project
    A way of testing and validating a specific concept in the real world through a minimum viable product or small-scale implementation. The pilot projects are part of the overall pilot program.

    Insight summary

    Innovation is about people, not ideas or processes
    Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and the ability to take smart risk are most likely to see the benefits of innovation.

    Very few are doing innovation well
    Only 30% of companies consider themselves innovative, and there's a good reason: innovation involves unknowns, risk, and failure – three situations that people and organizations typically do their best to avoid. Counter this by removing the barriers to innovation.

    Culture is the greatest barrier to innovation
    In a survey of 270 business leaders, the top three most common obstacles were politics, turf wars, and alignment; culture issues; and inability to act on signals crucial to the business (Harvard Business Review, 2018). If you don't have a supportive culture, your ability to innovate will be significantly reduced.

    Innovation is a means to an end
    It is not the end itself. Don't get caught up in innovation for the sake of innovation – make sure you are getting the benefits from your investments. Measurable success factors are critical for maintaining the long-term success of your innovation engine.

    Tackle wicked problems
    Innovative approaches are better at solving complex problems than traditional practices. Organizations that prioritize innovation during a crisis tend to outperform their peers by over 30% and improve their market position (McKinsey, 2020).

    Innovate or die
    Innovation is critical to business growth. A 25-year study showed that innovation was more important to business success than management, human resources, marketing, or finance (Statistics Canada, 2006).

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    Sample Job Descriptions and Organization Charts

    Determine the skills, knowledge, and structure you need to make innovation happen.

    Sample Job Descriptions and Organization Charts

    Ideation Session Template

    Facilitate an ideation session with your staff to identify areas for innovation.

    Ideation Session Template

    Initiative Prioritization Workbook

    Evaluate ideas to identify those which are most likely to provide value.

    Prioritization Workbook

    Key deliverable:

    Enterprise Innovation Program Summary

    Communicate how you plan to innovate with a report summarizing the outputs from this research.

    Enterprise Innovation Program Summary

    Measure the value of this research

    US businesses spend over half a trillion dollars on innovation annually. What are they getting for it?

    • The top innovators(1) typically spend 5-15% of their budgets on innovation (including R&D).
    • This research helps organizations develop a successful innovation program, which delivers value to the organization in the form of new products, services, and methods.
    • Leverage this research to:
      • Get your innovation program off the ground quickly.
      • Increase internal knowledge and expertise.
      • Generate buy-in and excitement about innovation.
      • Develop the skills and capabilities you need to drive innovation over the long term.
      • Validate your innovation concept.
      • Streamline and integrate innovation across the organization.

    (1) based on BCG's 50 Most Innovative Companies 2022

    30%

    The most innovative companies outperform the market by 30%.
    Source: McKinsey & Company, 2020

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Guided implementation

    What does a typical guided implementation (GI) on this topic look like?

    Phase 0 Phase 1 Phase 2 Phase 3 Finish

    Call #1: Scope requirements, objectives, and your specific challenges.

    Call #2: Understand your mandate.
    (Activity 1.1)

    Call #3: Innovation vision, guiding principles, value proposition, and scope.
    (Activities 1.2 and 1.3)

    Call #4: Foster a culture of innovation. (Activity 2.1)

    Call #5: Define your methodology. (Activity 2.2)

    Call #6: Build core innovation capabilities. (Activity 2.3)

    Call #7: Build your ideation and pilot programs. (Activities 3.1 and 3.2)

    Call #8: Identify success metrics and notable wins. (Activity 3.3)

    Call #9: Summarize results and plan next steps.

    A GI is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 8 to 12 calls over the course of three to six months.

    Workshop overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Session 1 Session 2 Session 3 Session 4

    Wrap Up

    Activities

    Define Your Ambitions

    Align Your People

    Develop Your Capabilities

    Build Your Program

    Next Steps and
    Wrap Up (offsite)

    1. Understand your innovation mandate (complete activity prior to workshop)
    2. Define your innovation ambitions
    3. Determine value proposition and metrics
    1. Foster a culture of innovation
    2. Define your operating model
    1. Build core innovation capabilities
    2. Develop prioritization criteria
    1. Define your methodology to pilot projects
    2. Conduct a program retrospective
    1. Complete in-progress deliverables from previous four days
    2. Set up review time for workshop deliverables and to discuss next steps

    Deliverables

    1. Our purpose
    2. Message from the CEO
    3. Vision and guiding principles
    4. Scope and value proposition
    5. Success metrics
    1. Building an innovative culture
    2. Operating model
    1. Core capabilities and structure
    2. Idea evaluation prioritization criteria
    1. Program retrospective
    2. Notable wins
    3. Executive summary
    4. Next steps
    1. Completed enterprise innovation program
    2. An engaged and inspired team

    Phase 1: Define Your Purpose

    Develop a better understanding of the drivers for innovation and what success looks like.

    Purpose

    People

    Practice

    1. Understand your mandate
    2. Define your innovation ambitions
    3. Determine value proposition and metrics
    1. Foster a culture of innovation
    2. Define your operating model
    3. Build core innovation capabilities
    1. Build your ideation and prioritization methodologies
    2. Define your pilot project methodology
    3. Conduct a program retrospective

    This phase will walk you through the following activities:

    • Understand your innovation mandate, including its drivers, scope, and focus.
    • Define what innovation means to your organization.
    • Develop an innovation vision and guiding principles.
    • Articulate the value proposition and proposed metrics for evaluating program success.

    This phase involves the following participants:

    • CINO
    • Business executives

    Case study

    INDUSTRY: Transportation
    SOURCE: Interview

    ArcBest
    ArcBest is a multibillion-dollar shipping and logistics company which leverages innovative technologies to provide reliable and integrated services to its customers.

    An Innovative Culture Starts at the Top
    ArcBest's innovative culture has buy-in and support from the highest level of the company. Michael Newcity, ArcBest's CEO, is dedicated to finding better ways of serving their customers and supports innovation across the company by dedicating funding and resources toward piloting and scaling new initiatives.
    Having a clear purpose and mandate for innovation at all levels of the organization has resulted in extensive grassroots innovation and the development of a formalized innovation program.

    Results
    ArcBest has a legacy of innovation, going back to its early days when it developed a business intelligence solution before anything else existed on the market. It continues to innovate today and is now partnering with start-ups to further expand its innovation capabilities.

    "We don't micromanage or process-manage incremental innovation. We hire really smart people who are inspired to create new things and we let them run – let them create – and we celebrate it.
    Our dedication to innovation comes from the top – I am both the President and the Chief Innovation Officer, and innovation is one of my top priorities."

    Michael Newcity

    Michael Newcity
    President and Chief Innovation Officer ArcBest

    1.1 Understand your innovation mandate

    Before you can act, you need to understand the following:

    • Where is the drive for innovation coming from?
      The source of your mandate dictates the scope of your innovation practice – in general, innovating outside the scope of your mandate (i.e. trying to innovate on products when you don't have buy-in from the product team) will not be successful.
    • What is meant by "innovation"?
      There are many different definitions for innovation. Before pursuing innovation at your organization, you need to understand how it is defined. Use the definition in this section as a starting point, and craft your own definition of innovation.
    • What kind of innovation are you targeting?
      Innovation can be internal or external, emergent or deliberate, and incremental or radically transformative. Understanding what kind of innovation you want is the starting point for your innovation practice.

    The source of your mandate dictates the scope of your influence

    You can only influence what you can control.

    Unless your mandate comes from the CEO or Board of Directors, driving enterprise-wide innovation is very difficult. If you do not have buy-in from senior business leaders, use lighthouse projects and a smaller innovation practice to prove the value of innovation before taking on enterprise innovation.

    In order to execute on a mandate to build innovation, you don't just need buy-in. You need support in the form of resources and funding, as well as strong leadership who can influence culture and the authority to change policies and practices that inhibit innovation.

    For more resources on building relationships in your organization, refer to Info-Tech's Become a Transformational CIO blueprint.

    What is "innovation"?

    Innovation is often easier to recognize than define.

    Align on a useful definition of innovation for your organization before you embark on a journey of becoming more innovative.

    Innovation is the practice of developing new methods, products or services which provide value to an organization.

    Practice
    This does not have to be a formal process – innovation is a means to an end, not the end itself.

    New
    What does "new" mean to you?

    • New application of an existing method
    • Developing a completely original product
    • Adopting a service from another industry

    Value
    What does value mean to you? Look to your business strategy to understand what goals the organization is trying to achieve, then determine how "value" will be measured.

    Info-Tech Insight

    Some innovations are incremental, while some are radically transformative. Decide what kind of innovation you want to cultivate before developing your strategy.

    We can categorize innovation in three ways

    Evaluate your goals with respect to innovation: focus, strategy, and potential to transform.

    Focus: Where will you innovate?

    Focus

    Strategy: To what extent will you guide innovation efforts?

    Strategy

    Potential: How radical will your innovations be?

    Potential

    What are your ambitions?

    1. Develop a better understanding of what type of innovation you are trying to achieve by plotting out your goals on the categories on the left.
    2. All categories are independent of one another, so your goals may fall anywhere on the scales for each category.
    3. Understanding your innovation ambitions helps establish the operating model best suited for your innovation practice.
    4. In general, innovation which is more external, deliberate, and radical tends to be more centralized.

    Activity 1.1 Understand your innovation mandate

    1 hour

    1. Schedule a 30-minute discussion with the person (i.e. CEO) or group (i.e. Board of Directors) ultimately requesting the shift toward innovation. If there is no external party, then conduct this assessment yourself.
    2. Facilitate a discussion that addresses the following questions:
    • What is meant by "innovation"?
    • What are they hoping to achieve through innovation?
    • What is the innovation scope? Are any areas off-limits (i.e. org structure, new products, certain markets)?
    • What is the budget (i.e. people, money) they are willing to commit to innovation?
    • What type of innovation are they pursuing?
    1. Record this information and complete the "Our Purpose" section of the Innovation Program Template.

    Download the Innovation Program Template.

    Input

    • Knowledge of the key decision maker/sponsor for innovation

    Output

    • Understanding of the mandate for innovation, including definition, value, scope, budget, and type of innovation

    Materials

    • Innovation Program Template

    Participants

    • CINO
    • CEO, CTO, or Board of Directors (whoever is requesting/sponsoring the pursuit of innovation)

    1.2 Define your innovation ambitions

    Articulate your future state through a vision and guiding principles.

    • Vision and purpose make up the foundation on which all other design aspects will be based. These aspects should not be taken lightly, but rather they should be the force that aligns everyone to work toward a common outcome. It is incumbent on leaders to make them part of the DNA of the organization – to drive organization, structure, culture, and talent strategy.
    • Your vision statement is a future-focused statement that summarizes what you hope to achieve. It should be inspirational, ambitious, and concise.
    • Your guiding principles outline the guardrails for your innovation practice. What will your focus be? How will you approach innovation? What is off-limits?
    • Define the scope and focus for your innovation efforts. This includes what you can innovate on and what is off limits.

    Your vision statement is your North Star

    Articulate an ambitious, inspirational, and concise vision statement for your innovation efforts.

    A strong vision statement:

    • Is future-focused and outlines what you want to become and what you want to achieve.
    • Provides focus and direction.
    • Is ambitious, focused, and concise.
    • Answers: What problems are we solving? Who and what are we changing?

    Examples:

    • "We create radical new technologies to solve some of the world's hardest problems." – Google X, the Moonshot Factory
    • "To be the most innovative enterprise in the world." – 3M
    • "To use our imagination to bring happiness to millions of people." – Disney

    "Good business leaders create a vision, articulate the vision, passionately own the vision, and relentlessly drive it to completion." – Jack Welch, Former Chairman and CEO of GE

    Your guiding principles are the guardrails for creativity

    Strong guiding principles give your team the freedom and direction to innovate.

    Strong guiding principles:

    • Focus on the approach, i.e. how things are done, as opposed to what needs to be done.
    • Are specific to the organization.
    • Inform and direct decision making with actionable statements. Avoid truisms, general statements, and observations.
    • Are long-lasting and based on values, not solutions.
    • Are succinct and easily digestible.
    • Can be measured and verified.
    • Answers: How do we approach innovation? What are our core values

    Craft your guiding principles using these examples

    Encourage experimentation and risk-taking
    Innovation often requires trying new things, even if they might fail. We encourage experimentation and learn from failure, so that new ideas can be tested and refined.

    Foster collaboration and cross-functional teams
    Innovation often comes from the intersection of different perspectives and skill sets.

    Customer-centric
    Focus on creating value for the end user. This means understanding their needs and pain points, and using that knowledge to develop new methods, products, or services.

    Embrace diversity and inclusivity
    Innovation comes from a variety of perspectives, backgrounds, and experiences. We actively seek out and encourage diversity and inclusivity among our team members.

    Foster a culture of learning and continuous improvement
    Innovation requires continuous learning, development, and growth. We facilitate a culture that encourages learning and development, and that seeks feedback and uses it to improve.

    Flexible and adaptable
    We adapt to changes in the market, customer needs, and new technologies, so that it can continue to innovate and create value over time.

    Data-driven
    We use performance metrics and data to guide our innovation efforts.

    Transparency
    We are open and transparent in our processes and let the business needs guide our innovation efforts. We do not lead innovation, we facilitate it.

    Activity 1.2 Craft your vision statement and guiding principles

    1-2 hours

    1. Gather your innovation team and key program sponsors. Review the guidelines for creating vision statements and guiding principles, as well as your mandate and focus for innovation.
    2. As a group, discuss what you hope to achieve through your innovation efforts.
    3. Separately, have each person write down their ideas for a vision statement. Bring the group back together and share ideas. Group the concepts together and construct a single statement which outlines your aspirational vision.
    4. As a group, review the example guiding principles.
    5. Separately, have each person write down three to five guiding principles. Bring the group back together and share ideas. Group similar concepts together and consolidate duplicate ideas. From this list, construct six to eight guiding principles.
    6. Document your vision and guiding principles in the appropriate sections of the Innovation Program Template.

    Input

    • Understanding of your innovation mandate
    • Business vision, mission, and values
    • Sample vision statements and guiding principles

    Output

    • Vision statement
    • Guiding principles

    Materials

    • In person: Whiteboard/flip charts, sticky notes, pens, and notepads
    • Virtual: Consider using a shared document, virtual whiteboard, or online facilitation tool like MURAL
    • Innovation Program Template

    Participants

    • CINO
    • Innovation sponsors
    • Business leaders
    • Innovation team

    1.3 Determine your value proposition and metrics

    Justify the existence of the innovation program with a strong value proposition.

    • The value proposition for developing an innovation program will be different for each organization, depending on what the organization hopes to achieve. Consider your mandate for innovation as well as the type of innovation you are pursuing when crafting the value proposition.
    • Some of the reasons organizations may pursue innovation:
      • Business growth: Respond to market disruption; create new customers; take advantage of opportunities.
      • Branding: Create market differentiation; increase customer satisfaction and retention; adapt to customer needs.
      • Profitability: Improve products, services, or operations to increase competitiveness and profitability; develop more efficient processes.
      • Culture: Foster a culture of creativity and experimentation within the organization, encouraging employees to think outside the box.
      • Positive impact: Address social challenges such as poverty and climate change.

    Develop a strong value proposition for your innovation program

    Demonstrate the value to the business.

    A strong value proposition not only articulates the value that the business will derive from the innovation program but also provides a clear focus, helps to communicate the innovation goals, and ultimately drives the success of the program.

    Focus
    Prioritize and focus innovation efforts to create solutions that provide real value to the organization

    Communicate
    Communicate the mandate and benefits of innovation in a clear and compelling way and inspire people to think differently

    Measure Success
    Measure the success of your program by evaluating outcomes based on the value proposition

    Track appropriate success metrics for your innovation program

    Your success metrics should link back to your organizational goals and your innovation program's value proposition.

    Revenue Growth: Increase in revenue generated by new products or services.

    Market Share: Percentage of total market that the business captures as a result of innovation.

    Customer Satisfaction: Reviews, customer surveys, or willingness to recommend the company.

    Employee Engagement: Engagement surveys, performance, employee retention, or turnover.

    Innovation Output: The number of new products, services, or processes that have been developed.

    Return on Investment: Financial return on the resources invested in the innovation process.

    Social Impact: Number of people positively impacted, net reduction in emissions, etc.

    Time to Launch: The time it takes for a new product or service to go from idea to launch.

    Info-Tech Insight

    The total impact of innovation is often intangible and extremely difficult to capture in performance metrics. Focus on developing a few key metrics rather than trying to capture the full value of innovation.

    How much does innovation cost?

    Company Industry Revenue(2)
    (USD billions)
    R&D Spend
    (USD billions)
    R&D Spend
    (% of revenue)
    Apple Technology $394.30 $26.25 6.70%
    Microsoft Technology $203.10 $25.54 12.50%
    Amazon.com Retail $502.20 $67.71 13.40%
    Alphabet Technology $282.10 $37.94 13.40%
    Tesla Manufacturing $74.90 $3.01 4.00%
    Samsung Technology $244.39 (2021)(3) $19.0 (2021) 7.90%
    Moderna Pharmaceuticals $23.39 $2.73 11.70%
    Huawei Technology $99.9 (2021)4 Not reported -
    Sony Technology $83.80 Not reported -
    IBM Technology $60.50 $1.61 2.70%
    Meta Software $118.10 $32.61 27.60%
    Nike Commercial goods $49.10 Not reported -
    Walmart Retail $600.10 Not reported -
    Dell Technology $105.30 $2.60 2.50%
    Nvidia Technology $28.60 $6.85 23.90%


    The top innovators(1) in the world spend 5% to 15% of their revenue on innovation.

    Innovation requires a dedicated investment of time, money, and resources in order to be successful. The most innovative companies, based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, spend significant portions of their revenue on research and development.

    Note: This data uses research and development as a proxy for innovation spending, which may overestimate the total spend on what this research considers true innovation.

    (1) Based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, 2022
    (2) Macrotrends, based on the 12 months ending Sept 30, 2022
    (3) Statista
    (4) CNBC, 2022

    Activity 1.3 Develop your value proposition and performance metrics

    1 hour

    1. Review your mandate and vision statement. Write down your innovation goals and desired outcomes from pursuing innovation, prioritize the desired outcomes, and select the top five.
    2. For each desired outcome, develop one to two metrics which could be used to track its success. Some outcomes are difficult to track, so get creative when it comes to developing metrics. If you get stuck, think about what would differentiate a great outcome from an unsuccessful one.
    3. Once you have developed a list of three to five key metrics, read over the list and ensure that the metrics you have developed don't negatively influence your innovation. For example, a metric of the number of successful launches may drive people toward launching before a product is ready.
    4. For each metric, develop a goal. For example, you may target 1% revenue growth over the next fiscal year or 20% energy use reduction.
    5. Document your value proposition and key performance metrics in the appropriate sections of the Innovation Program Template.

    Input

    • Understanding of your innovation mandate
    • Vision statement

    Output

    • Value proposition
    • Performance metrics

    Materials

    • Innovation Program Template

    Participants

    • CINO

    Phase 2: Align Your People

    Create a culture that fosters innovative behaviors and puts processes in place to support them.

    Purpose

    People

    Practice

    1. Understand your mandate
    2. Define your innovation ambitions
    3. Determine value proposition and metrics
    1. Foster a culture of innovation
    2. Define your operating model
    3. Build core innovation capabilities
    1. Build your ideation and prioritization methodologies
    2. Define your pilot project methodology
    3. Conduct a program retrospective

    This phase will walk you through the following activities:

    • Understand the key aspects of innovative cultures, and the behaviors associated with innovation.
    • Assess your culture and identify gaps.
    • Define your innovation operating model based on your organizational culture and the focus for innovation.
    • Build your core innovation capabilities, including an innovation core team (if required based on your operating model).

    This phase involves the following participants:

    • CINO
    • Innovation team

    2.1 Foster a culture of innovation

    Culture is the most important driver of innovation – and the most challenging to get right.

    • Fostering a culture of innovation requires a broad approach which considers the perspectives of individuals, teams, leadership, and the overall organization.
    • If you do not have support from leadership, it is very difficult to change organizational culture. It may be more effective to start with an innovation pilot or lighthouse project in order to gain support before addressing your culture.
    • Rather than looking to change outcomes, focus on the behaviors which lead to innovation – such as growth mindset and willingness to fail. If these aren't in place, your ability to innovate will be limited.
    • This section focuses on the specific behaviors associated with increased innovation. For additional resources on implementing these changes, refer to Info-Tech's other research:

    Info-Tech's Fix Your IT Culture can help you promote innovative behaviors

    Refer to Improve IT Team Effectiveness to address team challenges

    Build a culture of innovation

    Focus on behaviors, not outcomes.

    The following behaviors and key indicators either stifle or foster innovation.

    Stifles Innovation Key Indicators Fosters Innovation Key Indicators
    Fixed mindset "It is what it is" Growth mindset "I wonder if there's a better way"
    Performance focused "It's working fine" Learning focused "What can we learn from this?"
    Fear of reprisal "I'll get in trouble" Psychological safety "I can disagree"
    Apathy "We've always done it this way" Curiosity "I wonder what would happen if…"
    Cynicism "It will never work" Trust "You have good judgement"
    Punishing failure "Who did this?" Willingness to fail "It's okay to make mistakes"
    Individualism "How does this benefit me?" Collaboration "How does this benefit us?"
    Homogeneity "We never disagree" Diversity and inclusion "We appreciate different views"
    Excessive bureaucracy "We need approval" Autonomy "I can do this"
    Risk avoidance "We can't try that" Appropriate risk-taking "How can we do this safely?"

    Ensure you are not inadvertently stifling innovation.
    Review the following to ensure that the desired behaviors are promoted:

    • Hiring practices
    • Performance evaluation metrics
    • Rewards and incentives
    • Corporate policies
    • Governance structures
    • Leadership behavior

    Case study

    INDUSTRY: Commercial Real Estate and Retail
    SOURCE: Interview

    How not to approach innovation.

    This anonymous national organization owned commercial properties across the country and had the goal of becoming the most innovative real estate and retail company in the market.

    The organization pursued innovation in the digital solutions space across its commercial and retail properties. Within this space, there were significant differences in risk tolerance across teams, which resulted in the more risk-tolerant teams excluding the risk-averse members from discussions in order to circumvent corporate policies on risk tolerance. This resulted in an adversarial and siloed culture where each group believed they knew better than the other, and the more risk-averse teams felt like they were policing the actions of the risk-tolerant group.

    Results

    Morale plummeted, and many of the organization's top people left. Unfortunately, one of the solutions did not meet regulatory requirements, and the company faced negative media coverage and legal action. There was significant reputational damage as a result.

    Lessons Learned

    Considering differences in risk tolerance and risk appetite is critical when pursuing innovation. While everyone doesn't have to agree, leadership needs to understand the different perspectives and ensure that no one party is dominating the conversation over the others. An understanding of corporate risk tolerance and risk appetite is necessary to drive innovation.

    All perspectives have a place in innovation. More risk tolerant perspectives should be involved early in the ideas-generation phase, and risk-averse perspectives should be considered later when ideas are being refined.

    Speed should not override safety or circumvent corporate policies.

    Understand your risk tolerance and risk appetite

    Evaluate and align the appetite for risk.

    • It is important to understand the organization's risk tolerance as well as the desire for risk. Consider the following risk categories when investigating the organization's views on risk:
      • Financial risk: the potential for financial or property loss.
      • Operational risk: the potential for disruptions to operations.
      • Reputational risk: the potential for negative impact to brand or reputation.
      • Compliance risk: the potential for loss due to non-compliance with laws and regulations.
    • Greater risk tolerance typically enables greater innovation. Understand the varying levels of risk tolerance across your organization, and how these differences might impact innovation efforts.

    An arrow showing the directions of risk tolerance.

    It is more important to match the level of risk tolerance to the degree of innovation required. Not all innovation needs to be (or can feasibly be) disruptive.
    Many factors impact risk tolerance including:

    • Regulation
    • Organization size
    • Country
    • Industry
    • Personal experience
    • Type of risk

    Use Info-Tech's Security Risk Management research to better understand risk tolerance

    Activity 2.1 Assess your innovation culture

    1-3 hours

    1. Review the behaviors which support and stifle innovation and give each behavior a score from 1 (stifling innovation) to 5 (fostering innovation). Any behaviors which fall below a 4 on this scale should be prioritized in your efforts to create an innovative culture.
    2. Review the following policies and practices to determine how they may be contributing to the behaviors you see in your organization:
      1. Hiring practices
      2. Performance evaluation metrics
      3. Rewards, recognition, and incentives
      4. Corporate policies
      5. Governance structures
      6. Leadership behavior
    3. Identify three concrete actions you can take to correct any behaviors which are stifling innovation. Examples might be revising a policy which punishes failure or changing performance incentives to reward appropriate risk taking.
    4. Summarize your findings in the appropriate section of the Innovation Program Template.

    Input

    • Innovation behaviors

    Output

    • Understanding of your organization's culture
    • Concrete actions you can take to promote innovation

    Materials

    • List of innovative behaviors
    • Relevant policies and documents to review
    • Innovation Program Template

    Participants

    • CINO

    2.2 Define your innovation model

    Set up your innovation practice for success using proven models and methodologies.

    • There are many ways to approach innovation, from highly distributed forms where it's just part of everyone's job to very centralized and arm's-length innovation hubs or even outsourced innovation via startups. You can combine different approaches to create your own approach.
    • You may or may not have a formal innovation team, but if you do, their role is to facilitate innovation – not lead it. Innovation is most effective when it is led by the business.
    • There are many tools and methodologies you can use to facilitate innovation. Choose the one (or combination) that best suits your needs.

    Select the right model

    There is no one right way to pursue innovation, but some methods are better than others for specific situations and goals. Consider your existing culture, your innovation goals, and your budget when selecting the right methodology for your innovation.

    Model Description Advantages Disadvantages Good when…
    Grassroots Innovation Innovation is the responsibility of everyone, and there is no centralized innovation team. Ideas are piloted and scaled by the person/team which produces it.
    • Can be used in any organization or team
    • Can support low or high degree of structure
    • Low funding requirement
    • Requires a strong innovation culture
    • Often does not produce results since people don't have time to focus on innovation
    • Innovation culture is strong
    • Funding is limited
    • Goal is internal, incremental innovation
    Community of Practice Innovation is led by a cross-divisional Community of Practice (CoP) which includes representation from across the business. Champions consult with their practice areas and bring ideas forward.
    • Bringing people together can help stimulate and share ideas
    • Low funding requirement
    • Able to support many types of innovation
    • Some people may feel left out if they can't be involved
    • May not produce results if people are too busy to dedicate time to innovate
    • Innovation culture is present
    • Funding is limited
    • Goal is incremental or disruptive innovation
    Innovation Enablement
    *Most often recommended*
    A dedicated innovation team with funding set aside to support pilots with a high degree of autonomy, with the role of facilitating business-led innovation.
    • Most flexible of all options
    • Supports business-led innovation
    • Can deliver results quickly
    • Can enable a higher degree of innovation
    • Requires dedicated staff and funding
    • Innovation culture is present
    • Funding is available
    • Goal is internal or external, incremental or radical innovation
    Center of Excellence Dedicated team responsible for leading innovation on behalf of the organization. Generally, has business relationship managers who gather ideas and liaise with the business.
    • Can deliver results quickly
    • Can offer a fresh perspective
    • Can enable a higher degree of innovation
    • Requires dedicated staff and funding
    • Is typically separate from the business
    • Results may not align with the business needs or have adequate input
    • Innovation culture is weak
    • Funding is significant
    • Goal is external, disruptive innovation
    Innovation Hub An arm's length innovation team is responsible for all or much of the innovation and may not interact much with the core business.
    • Can deliver results quickly
    • Can be extremely innovative
    • Expensive
    • Results may not align with the business needs or have adequate/any input
    • Innovation culture is weak
    • Funding is very significant
    • Goal is external, radical innovation
    Outsourced Innovation Innovation is outsourced to an external organization which is not linked to the primary organization. This can take the form of working with or investing in startups.
    • Can lead to more innovative ideas than internal innovation
    • Investments can become a diverse revenue stream if startups are successful
    • Innovation does not rely on culture
    • Higher risk of failure
    • Less control over goals or focus
    • Results may not align with the business needs or have any input from users
    • Innovation does not rely on culture
    • Funding is significant
    • Goal is external or internal, radical innovation

    Use the right methodologies to support different stages of your innovation process

    A chart showing methodologies to support different stages of the integration process.

    Adapted from Niklaus Gerber via Medium, 2022

    Methodologies are most useful when they are aligned with the goals of the innovation organization.

    For example, design thinking tends to be excellent for earlier innovation planning, while Agile can allow for faster implementation and launch of initiatives later in the process.

    Consider combining two or more methodologies to create a custom approach that best suits your organization's capabilities and goals.

    Sample methodologies

    A robust innovation methodology ensures that the process for developing, prioritizing, selecting, implementing, and measuring initiatives is aligned with the results you are hoping to achieve.

    Different types of problems (drivers for innovation) may necessitate different methodologies, or a combination of methodologies.

    Hackathon: An event which brings people together to solve a well-defined problem.

    Design Thinking: Creative approach that focuses on understanding the needs of users.

    Lean Startup: Emphasizes rapid experimentation in order to validate business hypotheses.

    Design Sprint: Five-day process for answering business questions via design, prototyping, and testing.

    Agile: Iterative design process that emphasizes project management and retrospectives.

    Three Horizons: Framework that looks at opportunities on three different time horizons.

    Innovation Ambition Matrix: Helps organizations categorize projects as part of the core offering, an adjacent offering, or completely new.

    Global Innovation Management: A process of identifying, developing and implementing new ideas, products, services, or processes using alternative thinking.

    Blue Ocean Strategy: A methodology that helps organizations identify untapped market space and create new markets via unique value propositions.

    Activity 2.2 Design your innovation model

    1-2 hours

    1. Think about the following factors which influence the design of your innovation practice:
      1. Existing organizational culture
      2. Available funding to support innovation
      3. Type of innovation you are targeting
    2. Review the innovation approaches, and identify which approach is most suitable for your situation. Note why this approach was selected.
    3. Review the innovation methodologies and research those of interest. Select two to five methodologies to use for your innovation practice.
    4. Document your decisions in the Innovation Program Template.

    Input

    • Understanding of your mandate and existing culture

    Output

    • Innovation approach
    • Selected methodologies

    Materials

    • Innovation Program Template

    Participants

    • CINO
    • Innovation team

    2.3 Build your core innovation capabilities

    Develop the skills, knowledge, and experience to facilitate successful innovation.

    • Depending on the approach you selected in step 2.2, you may or may not require a dedicated innovation team. If you do, use the job descriptions and sample organization charts to build it. If not, focus on developing key capabilities which are needed to facilitate innovation.
    • Diversity is key for successful innovation – ensure your team (formal or otherwise) includes diverse perspectives and backgrounds.
    • Use your guiding principles when hiring and training your team.
    • Focus on three core roles: evangelists, enablers, and experts.

    Focus on three key roles when building your innovation team

    Types of roles will depend on the purpose and size of the innovation team.

    You don't need to grow them all internally. Consider partnering with vendors and other organizations to build capabilities.

    Evangelists

    Visionaries who inspire, support, and facilitate innovation across the business. Their responsibilities are to drive the culture of innovation.

    Key skills and knowledge:

    • Strong communication skills
    • Relationship-building
    • Consensus-building
    • Collaboration
    • Growth mindset

    Sample titles:

    • CINO
    • Chief Transformation Officer
    • Chief Digital Officer
    • Innovation Lead
    • Business Relationship Manager

    Enablers

    Translate ideas into tangible business initiatives, including assisting with business cases and developing performance metrics.

    Key skills and knowledge:

    • Critical thinking skills
    • Business knowledge
    • Facilitation skills
    • Consensus-building
    • Relationship-building

    Sample titles:

    • Product Owner
    • Design Thinking Lead
    • Data Scientist
    • Business Analyst
    • Human Factors Engineer
    • Digital Marketing Specialist

    Experts

    Provide expertise in product design, delivery and management, and responsible for supporting and executing on pilot projects.

    Key skills and knowledge:

    • Project management skills
    • Technical expertise
    • Familiarity with emerging technologies
    • Analytical skills
    • Problem-solving skills

    Sample titles:

    • Product Manager
    • Scrum Master/Agile Coach
    • Product Engineer/DevOps
    • Product Designer
    • Emerging tech experts

    Sample innovation team structure (large enterprise)

    Visualize the whole value delivery process end-to-end to help identify the types of roles, resources, and capabilities required. These capabilities can be sourced internally (i.e. grow and hire internally) or through collaboration with centers of excellence, commercial partners, etc.

    A flow chart of a sample innovation team structure.

    Streamline your process by downloading Info-Tech's job description templates:

    Activity 2.3 Build your innovation team

    2-3 hours

    1. Review your work from the previous activities as well as the organizational structure and the job description templates.
    2. Start a list with two columns: currently have and needed. Start listing some of the key roles and capabilities from earlier in this step, categorizing them appropriately.
    3. If you are using an organizational structure for your innovation process, start to frame out the structure and roles for your team.
    4. Develop a list of roles you need to hire, and the key capabilities you need from candidates. Using the job descriptions, write job postings for each role.
    5. Record your work in the appropriate section of the Innovation Program Template.

    Input

    • Previous work
    • Info-Tech job description templates

    Output

    • List of capabilities required
    • Org chart
    • Job postings for required roles

    Materials

    • Note-taking capability
    • Innovation Program Template

    Participants

    • CINO

    Related Info-Tech Research

    Fix Your IT Culture

    • Promote psychological safety and growth mindset within your organization.
    • Develop the organizational behaviors that lead to innovation.

    Improve IT Team Effectiveness

    • Address behaviors, processes, and cultural factors which impact team effectiveness.
    • Grow the team's ability to address challenges and navigate volatile, uncertain, complex and ambiguous environments.

    Master Organizational Change Management Practices

    • Transformation and change are increasingly becoming the new normal. While this normality may help make people more open to change in general, specific changes still need to be planned, communicated, and managed. Agility and continuous improvement are good but can degenerate into volatility if change isn't managed properly.

    Phase 3: Build Your Practice

    Define your innovation process, streamline pilot projects, and scale for success.

    Purpose

    People

    Practice

    1. Understand your mandate
    2. Define your innovation ambitions
    3. Determine value proposition and metrics
    1. Foster a culture of innovation
    2. Define your operating model
    3. Build core innovation capabilities
    1. Build your ideation and prioritization methodologies
    2. Define your pilot project methodology
    3. Conduct a program retrospective

    This phase will walk you through the following activities:

    • Build the methodologies needed to elicit ideas from the business.
    • Develop criteria to evaluate and prioritize ideas for piloting.
    • Define your pilot program methodologies and processes, including criteria to assess and compare the success of pilot projects.
    • Conduct an end-of-year program retrospective to evaluate the success of your innovation program.

    This phase involves the following participants:

    • CINO
    • Innovation team

    Case study

    INDUSTRY: Government
    SOURCE: Interview

    Confidential US government agency

    The business applications group at this government agency strongly believes that innovation is key to progress and has instituted a formal innovation program as part of their agile operations. The group uses a Scaled Agile Framework (SAFe) with 2-week sprints and a 12-week program cycle.

    To support innovation across the business unit, the last sprint of each cycle is dedicated toward innovation and teams do not commit to any other during these two weeks. At the end of each innovation sprint, ideas are presented to leadership and the valuable ones were either implemented initially or were given time in the next cycle of sprints for further development. This has resulted in a more innovative culture across the practice.

    Results

    There have been several successful innovations since this process began. Notably, the agency had previously purchased a robotic process automation platform which was only being used for a few specific applications. One team used their innovation sprint to expand the use cases for this solution and save nearly 10,000 hours of effort.

    Standard 12-week Program Cycle
    An image of a standard 12-week program

    Design your innovation operating model to maximize value and learning opportunities

    Pilots are an iterative process which brings together innovators and business teams to test and evaluate ideas.

    Your operating model should include several steps including ideation, validation, evaluation and prioritization, piloting, and a retrospective which follows the pilot. Use the example on this slide when designing your own innovation operating model.

    An image of the design process for innovation operation model.

    3.1 Build your ideation and prioritization methodologies

    Engage the business to generate ideas, then prioritize based on value to the business.

    • There are many ways of generating ideas, from informal discussion to formal ideation sessions or submission forms. Whatever you decide to use, make sure that you're getting the right information to evaluate ideas for prioritization.
    • Use quantitative and qualitative metrics to evaluate ideas generated during the ideation process.
      • Quantitative metrics might include potential return on investment (ROI) or effort and resources required to implement.
      • Qualitative metrics might include alignment with the organizational strategy or the level of risk associated with the idea.

    Engage the business to generate ideas

    There are many ways of generating innovative ideas. Pick the methods that best suit your organization and goals.

    Design Thinking
    A structured approach that encourages participants to think creatively about the needs of the end user.

    An image including the following words: Empathize, Define; Ideate; Test.

    Ideation Workshop
    A formal session that is used to understand a problem then generate potential solutions. Workshops can incorporate the other methodologies (such as brainstorming, design thinking, or mind mapping) to generate ideas.

    • Define the problem
    • Generate ideas
    • Capture ideas
    • Evaluate and prioritize
    • Assign next steps

    Crowdsourcing
    An informal method of gathering ideas from a large group of people. This can be a great way to generate many ideas but may lack focus.

    Value Proposition Canvas
    A visual tool which helps to identify customer (or user) needs and design products and services that meet those needs.

    an image of the Value Proposition Canvas

    Evaluate ideas and focus on those with the greatest value

    Evaluation should be transparent and use both quantitative and qualitative metrics. The exact metrics used will depend on your organization and goals.

    It is important to include qualitative metrics as these dimensions are better suited to evaluating highly innovative ideas and can capture important criteria like alignment with overall strategy and feasibility.

    Develop 5 to 10 criteria that you can use to evaluate and prioritize ideas. Some criteria may be a pass/fail (for example, minimum ROI) and some may be comparative.

    Evaluate
    The first step is to evaluate ideas to determine if they meet the minimum criteria. This might include quantitative criteria like ROI as well as qualitative criteria like strategic alignment and feasibility.

    Prioritize
    Ideas that pass the initial evaluation should be prioritized based on additional criteria which might include quantitative criteria such as potential market size and cost to implement, and qualitative criteria such as risk, impact, and creativity.

    Quantitative Metrics

    Quantitative metrics are objective and easily comparable between initiatives, providing a transparent and data-driven process for evaluation and prioritization.
    Examples:

    • Potential market size
    • ROI
    • Net present value
    • Payback period
    • Number of users impacted
    • Customer acquisition cost
    • Customer lifetime value
    • Breakeven analysis
    • Effort required to implement
    • Cost to implement

    Qualitative Metrics

    Qualitative metrics are less easily comparable but are equally important when it comes to evaluating ideas. These should be developed based on your organization strategy and innovation goals.
    Examples:

    • Strategy alignment
    • Impact on users
    • Uncertainty and risk
    • Innovation potential
    • Culture impact
    • Feasibility
    • Creativity and originality
    • Type of innovation

    Activity 3.1 Develop prioritization metrics

    1-3 hours

    1. Review your mandate, purpose, innovation goals and the sample prioritization and evaluation metrics.
    2. Write down a list of your goals and their associated metrics, then prioritize which are the most important.
    3. Determine which metrics will be used to evaluate ideas before they move on to the prioritization stage, and which metrics will be used to compare initiatives in order to determine which will receive further investment.
    4. For each evaluation metric, determine the minimum threshold required for an idea to move forward. For each prioritization metric identify the definition and how it will be evaluated. Qualitative metrics may require more precise definitions than quantitative metrics.
    5. Enter your metrics into the Initiative Prioritization Template.

    Input

    • Innovation mandate
    • Innovation goals
    • Sample metrics

    Output

    • Evaluation and prioritization metrics for ideas

    Materials

    • Whiteboard/Flip charts
    • Innovation Program Template

    Participants

    • Innovation leader

    Download the Initiative Prioritization Template

    3.2 Build your program to pilot initiatives

    Test and refine ideas through real-world pilot projects.

    • The purpose of your pilot is to test and refine ideas in the real world. In order to compare pilot projects, it's important to track key performance indicators throughout the pilot. Measurements should be useful and comparable.
    • Innovation facilitators are responsible for supporting pilot projects, including designing the pilot, setting up metrics, tracking outcomes, and facilitating retrospectives.
    • Pilots generally follow an Agile methodology where ideas may be refined as the pilot proceeds, and the process iterates until either the idea is discarded or it has been refined into an initiative which can be scaled.
    • Expect that most pilots will fail the first time, and many will fail completely. This is not a loss; lessons learned from the retrospective can be used to improve the process and later pilots.

    Use pilot projects to test and refine initiatives before scaling to the rest of the organization

    "Learning is as powerful as the outcome." – Brett Trelfa, CIO, Arkansas Blue Cross

    1. Clearly define the goals and objectives of the pilot project. Goals and objectives ensure that the pilot stays on track and can be measured.
    2. Your pilot group should include a variety of participants with diverse perspectives and skill sets, in order to gather unique insights.
    3. Continuously track the progress of the pilot project. Regularly identify areas of improvement and implement changes as necessary to refine ideas.
    4. Regularly elicit feedback from participants and iterate in order to improve the final innovation. Not all pilots will be successful, but every failure can help refine future solutions.
    5. Consider scalability. If the pilot project is successful, it should be scalable and the lessons learned should be implemented in the larger organization.

    Sample pilot metrics

    Metrics are used to validate and test pilot projects to ensure they deliver value. This is an important step before scaling to the rest of the organization.

    Adoption: How many end users have adopted the pilot solution?

    Utilization: Is the solution getting utilized?

    Support Requests: How many support requests have there been since the pilot was initiated?

    Value: Is the pilot delivering on the value that it proposed? For example, time savings.

    Feasibility: Has the feasibility of the solution changed since it was first proposed?

    Satisfaction: Focus groups or surveys can provide feedback on user/customer satisfaction.

    A/B Testing: Compare different methods, products or services.

    Info-Tech Insight

    Ensure standard core metrics are used across all pilot projects so that outcomes can be compared. Additional metrics may be used to refine and test hypotheses through the pilot process.

    Activity 3.2 Build your program to pilot initiatives

    1-2 hours

    1. Gather the innovation team and review your mandate, purpose, goals, and the sample innovation operating model and metrics.
    2. As a group, brainstorm the steps needed from idea generation to business case. Use sticky notes if in person, or a collaboration tool if remote.
    3. Determine the metrics that will be used to evaluate ideas at each decision step (for example, prior to piloting). Outline what the different decisions might be (for example, proceed, refine or discard) and what happens as a result of each decision.
    4. Document your final steps and metrics in the Innovation Program Template.

    Input

    • Innovation mandate
    • Innovation goals
    • Sample metrics

    Output

    • Pilot project methodology
    • Pilot project metrics

    Materials

    • Innovation Program Template
    • Sticky notes (in person) or digital collaboration tool (if remote)

    Participants

    • Innovation leader
    • Innovation team

    3.3 Conduct a program retrospective

    Generate value from your successful pilots by scaling ideas across the organization.

    • The final step in the innovation process is to scale ideas to the enterprise in order to realize the full potential.
    • Keeping track of notable wins is important for showing the value of the innovation program. Track performance of initiatives that come out of the innovation program, including their financial, cultural, market, and brand impacts.
    • Track the success of the innovation program itself by evaluating the number of ideas generated, the number of pilots run and the success of the pilots. Keep in mind that many failed pilots is not a failure of the program if the lessons learned were valuable.
    • Complete an innovation program retrospective every 6 to 12 months in order to adjust and make any changes if necessary to improve your process.

    Retrospectives should be objective, constructive, and action-oriented

    A retrospective is a review of your innovation program with the aim of identifying lessons learned, areas for improvement, and opportunities for growth.

    During a retrospective, the team will reflect on past experiences and use that information to inform future decision making and improve outcomes.

    The goal of a retrospective is to learn from the past and use that knowledge to improve in the future.

    Objective

    Ensure that the retrospective is based on facts and objective data, rather than personal opinions or biases.

    Constructive

    Ensure that the retrospective is a positive and constructive experience, with a focus on finding solutions rather than dwelling on problems.

    Action-Oriented

    The retrospective should result in a clear action plan with specific steps to improve future initiatives.

    Activity 3.3 Conduct a program retrospective

    1-2 hours

    1. Post a large piece of paper on the wall with a timeline from the last year. Include dates and a few key events, but not much more. Have participants place sticky notes in the spots to describe notable wins or milestones that they were proud of. This can be done as part of a formal meeting or asynchronously outside of meetings.
    2. Bring the innovation team together and review the poster with notable wins. Do any themes emerge? How does the team feel the program is doing? Are there any changes needed?
    3. Consider the metrics you use to track your innovation program success. Did the scaled projects meet their targets? Is there anything that could be refined about the innovation process?
    4. Evaluate the outcomes of your innovation program. Did it meet the targets set for it? Did the goals and innovation ambitions come to fruition?
    5. Complete this step every 6 to 12 months to assess the success of your program.
    6. Complete the "Notable Wins" section of the Innovation Program Template.

    Input

    • Innovation mandate
    • Innovation goals
    • Sample metrics

    Output

    • Notable wins
    • Action items for refining the innovation process

    Materials

    • Innovation Program Template
    • Sticky notes (in person) or digital collaboration tool (if remote)

    Participants

    • CIO
    • Innovation team
    • Others who have participated in the innovation process

    Related Info-Tech Research

    Adopt Design Thinking in Your Organization

    • A user's perspective while interacting with the products and services is very different from the organization's internal perspective while implementing and provisioning those. A design-based organization balances the two perspectives to drive user-satisfaction over end-to-end journeys.

    Prototype With an Innovation Design Sprint

    • Build and test a prototype in four days using Info-Tech's Innovation Design Sprint Methodology.
    • Create an environment for co-creation between IT and the business.

    Fund Innovation With a Minimum Viable Business Case

    • Our approach guides you through effectively designing a solution, de-risking a project through impact reduction techniques, building and pitching the case for your project, and applying the business case as a mechanism to ensure that benefits are realized.

    Summary of Accomplishment

    Congratulations on launching your innovation program!

    You have now completed your innovation strategy, covering the following topics:

    • Executive Summary
    • Our Purpose
    • Scope and Value Proposition
    • Guiding Principles
    • Building an Innovative Culture
    • Program Structure
    • Success Metrics
    • Notable Wins

    If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Related Info-Tech Research

    Accelerate Digital Transformation With a Digital Factory

    • Understand the foundations of good design: purpose, organizational support, and leadership.
    • Understand the design of the operating model: structure and organization, management practices, culture, environment, teams, technology platforms, and meaningful metrics and KPIs.

    Sustain and Grow the Maturity of Innovation in Your Enterprise

    • Unlock your innovation potential by looking at your innovation projects on both a macro and micro level.
    • Innovation capacity is directly linked with creativity; allow your employees' creativity to flourish using Info-Tech's positive innovation techniques.

    Define Your Digital Business Strategy

    • Design a strategy that applies innovation to your business model, streamline and transform processes, and make use of technologies to enhance interactions with customers and employees.
    • Create a balanced roadmap that improves digital maturity and prepares you for long-term success in a digital economy.

    Research Contributors and Experts

    Kim Osborne Rodriguez

    Kim Osborne Rodriguez
    Research Director, CIO Advisory
    Info-Tech Research Group

    Kim is a professional engineer and Registered Communications Distribution Designer with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach, with a track record of supporting successful projects.
    Kim holds a Bachelor's degree in Mechatronics Engineering from University of Waterloo.

    Joanne Lee

    Joanne Lee
    Principal Research Director, CIO Advisory
    Info-Tech Research Group

    Joanne is an executive with over 25 years of experience in digital technology and management consulting across both public and private entities from solution delivery to organizational redesign across Canada and globally.
    Prior to joining Info-Tech Research Group, Joanne was a management consultant within KPMG's CIO management consulting services and the Western Canadas Digital Health Practice lead. She has held several executive roles in the industry with the most recent position as Chief Program Officer for a large $450M EHR implementation. Her expertise spans cloud strategy, organizational design, data and analytics, governance, process redesign, transformation, and PPM. She is passionate about connecting people, concepts, and capital.
    Joanne holds a Master's in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.

    Jack Hakimian

    Jack Hakimian
    Senior Vice President
    Info-Tech Research Group

    Jack has more than 25 years of technology and management consulting experience. He has served multi-billion-dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served a number of large public sector institutions.
    He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master's degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.

    Michael Tweedie

    Michael Tweedie
    Practice Lead, CIO Strategy
    Info-Tech Research Group

    Mike Tweedie brings over 25 years as a technology executive. He's led several large transformation projects across core infrastructure, application, and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management.
    Mike holds a Bachelor's degree in Architecture from Ryerson University.

    Mike Schembri

    Mike Schembri
    Senior Executive Advisor
    Info-Tech Research Group

    Mike is the former CIO of Fuji Xerox Australia and has 20+ years' experience serving IT and wider business leadership roles. Mike has led technical and broader business service operations teams to value and growth successfully in organizations ranging from small tech startups through global IT vendors, professional service firms, and manufacturers.
    Mike has passion for strategy and leadership and loves working with individuals/teams and seeing them grow.

    John Leidl

    John Leidl
    Senior Director, Member Services
    Info-Tech Research Group

    With over 35 years of IT experience, including senior-level VP Technology and CTO leadership positions, John has a breadth of knowledge in technology innovation, business alignment, IT operations, and business transformation. John's experience extends from start-ups to corporate enterprise and spans higher education, financial services, digital marketing, and arts/entertainment.

    Joe Riley

    Joe Riley
    Senior Workshop Director
    Info-Tech Research Group

    Joe ensures our members get the most value out of their Info-Tech memberships by scoping client needs, current state and desired business outcomes, and then drawing upon his extensive experience, certifications, and degrees (MBA, MS Ops/Org Mgt, BS Eng/Sci, ITIL, PMP, Security+, etc.) to facilitate our client's achievement of desired and aspirational business outcomes. A true advocate of ITSM, Joe approaches technology and technology practices as a tool and enabler of people, core business, and competitive advantage activities.

    Denis Goulet

    Denis Goulet
    Senior Workshop Director
    Info-Tech Research Group

    Denis is a transformational leader and experienced strategist who has worked with 100+ organizations to develop their digital, technology, and governance strategies.
    He has held positions as CIO, Chief Administrative Office (City Manager), General Manager, Vice President of Engineering, and Management Consultant, specializing in enterprise and technology strategy.

    Cole Cioran

    Cole Cioran
    Managing Partner
    Info-Tech Research Group

    I knew I wanted to build great applications that would delight their users. I did that over and over. Along the way I also discovered that it takes great teams to deliver great applications. Technology only solves problems when people, processes, and organizations change as well. This helped me go from writing software to advising some of the largest organizations in the world on how to how to build a digital delivery umbrella of Product, Agile, and DevOps and create exceptional products and services powered by technology.

    Carlene McCubbin

    Carlene McCubbin
    Research Lead, CIO Practice
    Info-Tech Research Group

    During her tenure at Info-Tech, Carlene has led the development of Info-Tech's Organization and Leadership practice and worked with multiple clients to leverage the methodologies by creating custom programs to fit each organization's needs.
    Before joining Info-Tech, Carlene received her Master of Communications Management from McGill University, where she studied development of internal and external communications, government relations, and change management.

    Isabelle Hertanto

    Isabelle Hertanto
    Principal Research Director
    Info-Tech Research Group

    Isabelle Hertanto has over 15 years of experience delivering specialized IT services to the security and intelligence community. As a former federal officer for Public Safety Canada, Isabelle trained and led teams on data exploitation and digital surveillance operations in support of Canadian national security investigations. Since transitioning into the private sector, Isabelle has held senior management and consulting roles across a variety of industry sectors, including retail, construction, energy, healthcare, and the broader Canadian public sector.

    Hans Eckman

    Hans Eckman
    Principal Research Director
    Info-Tech Research Group

    Hans Eckman is a business transformation leader helping organizations connect business strategy and innovation to operational excellence. He supports Info-Tech members in SDLC optimization, Agile and DevOps implementation, CoE/CoP creation, innovation program development, application delivery, and leadership development. Hans is based out of Atlanta, Georgia.

    Valence Howden

    Valence Howden
    Principal Research Director
    Info-Tech Research Group

    With 30 years of IT experience in the public and private sector, Valence has developed experience in many Information Management and Technology domains, with a particular focus in the areas of Service Management, Enterprise and IT Governance, Development and Execution of Strategy, Risk Management, Metrics Design and Process Design, and Implementation and Improvement. Prior to joining Info-Tech, he served in technical and client-facing roles at Bell Canada and CGI Group Inc., as well as managing the design, integration, and implementation of services and processes in the Ontario Public Sector.

    Clayton Gillett

    Clayton Gillett
    Managing Partner
    Info-Tech Research Group

    Clayton Gillett is a Managing Partner for Info-Tech, providing technology management advisory services to healthcare clients. Clayton joined Info-Tech with more than 28 years of experience in health care information technology. He has held senior IT leadership roles at Group Health Cooperative of Puget Sound and OCHIN, as well as advisory or consulting roles at ECG Management Consultants and Gartner.

    Donna Bales

    Donna Bales
    Principal Research Director
    Info-Tech Research Group

    Donna Bales is a Principal Research Director in the CIO Practice at Info-Tech Research Group specializing in research and advisory services in IT risk, governance, and compliance. She brings over 25 years of experience in strategic consulting and product development and has a history of success in leading complex, multi-stakeholder industry initiatives.

    Igor Ikonnikov

    Igor Ikonnikov
    Research Director
    Info-Tech Research Group

    Igor Ikonnikov is a Research and Advisory Director in the Data and Analytics practice. Igor has extensive experience in strategy formation and execution in the information management domain, including master data management, data governance, knowledge management, enterprise content management, big data, and analytics.
    Igor has an MBA from the Ted Rogers School of Management (Toronto, Canada) with a specialization in Management of Technology and Innovation.

    Research Contributors and Experts

    Michael Newcity

    Michael Newcity
    Chief Innovation Officer
    ArcBest

    Kevin Yoder

    Kevin Yoder
    Vice President, Innovation
    ArcBest

    Gary Boyd

    Gary Boyd
    Vice President, Information Systems & Digital Transformation
    Arkansas Blue Cross and Blue Shield

    Brett Trelfa

    Brett Trelfa
    Chief Information Officer
    Arkansas Blue Cross and Blue Shield

    Kristen Wilson-Jones

    Kristen Wilson-Jones
    Chief Technology & Product Officer
    Medcurio

    Note: additional contributors did not wish to be identified

    Bibliography

    Altringer, Beth. "A New Model for Innovation in Big Companies" Harvard Business Review. 19 Nov. 2013. Accessed 30 Jan. 2023. https://hbr.org/2013/11/a-new-model-for-innovation-in-big-companies
    Arpajian, Scott. "Five Reasons Why Innovation Fails" Forbes Magazine. 4 June 2019. Accessed 31 Jan. 2023. https://www.forbes.com/sites/forbestechcouncil/2019/06/04/five-reasons-why-innovation-fails/?sh=234e618914c6
    Baldwin, John & Gellatly, Guy. "Innovation Capabilities: The Knowledge Capital Behind the Survival and Growth of Firms" Statistics Canada. Sept. 2006. Accessed 30 Jan. 2023. https://www.bdc.ca/fr/documents/other/innovation_capabilities_en.pdf
    Bar Am, Jordan et al. "Innovation in a Crisis: Why it is More Critical Than Ever" McKinsey & Company, 17 June 2020. Accessed 12 Jan. 2023. <https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/innovation-in-a-crisis-why-it-is-more-critical-than-ever >
    Boston Consulting Group, "Most Innovative Companies 2021" BCG, April 2021. Accessed 30 Jan. 2023. https://web-assets.bcg.com/d5/ef/ea7099b64b89860fd1aa3ec4ff34/bcg-most-innovative-companies-2021-apr-2021-r.pdf
    Boston Consulting Group, "Most Innovative Companies 2022" BGC, 15 Sept. 2022. Accessed 6 Feb. 2023. https://www.bcg.com/en-ca/publications/2022/innovation-in-climate-and-sustainability-will-lead-to-green-growth
    Christensen, Clayton M. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business Review Press, 2016.
    Gerber, Niklaus. "What is innovation? A beginner's guide into different models, terminologies and methodologies" Medium. 20 Sept 2022. Accessed 7 Feb. 2023. https://world.hey.com/niklaus/what-is-innovation-a-beginner-s-guide-into-different-models-terminologies-and-methodologies-dd4a3147
    Google X, Homepage. Accessed 6 Feb. 2023. https://x.company/
    Harnoss, Johann D. & Baeza, Ramón. "Overcoming the Four Big Barriers to Innovation Success" Boston Consulting Group, 24 Sept. 2019. Accessed 30 Jan 2023. https://www.bcg.com/en-ca/publications/2019/overcoming-four-big-barriers-to-innovation-success
    Jaruzelski, Barry et al. "Global Innovation 1000 Study" Pricewaterhouse Cooper, 30 Oct. 2018. Accessed 13 Jan. 2023. <https://www.strategyand.pwc.com/gx/en/insights/innovation1000.html>
    Kharpal, Arjun. "Huawei posts first-ever yearly revenue decline as U.S. sanctions continue to bite, but profit surges" CNBC. 28 March 2022. Accessed 7 Feb. 2023. https://www.cnbc.com/2022/03/28/huawei-annual-results-2021-revenue-declines-but-profit-surges.html
    Kirsner, Scott. "The Biggest Obstacles to Innovation in Large Companies" Harvard Business Review, 30 July 2018. Accessed 12 Jan. 2023. <https://hbr.org/2018/07/the-biggest-obstacles-to-innovation-in-large-companies>
    Macrotrends. "Apple Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AAPL/apple/revenue
    Macrotrends. "Microsoft Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MSFT/microsoft/revenue
    Macrotrends. "Amazon Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
    Macrotrends. "Alphabet Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/GOOG/alphabet/revenue
    Macrotrends. "Tesla Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/TSLA/tesla/revenue
    Macrotrends. "Moderna Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MRNA/moderna/revenue
    Macrotrends. "Sony Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/SONY/sony/revenue
    Macrotrends. "IBM Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/IBM/ibm/revenue
    Macrotrends. "Meta Platforms Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/META/meta-platforms/revenue
    Macrotrends. "NIKE Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NKE/nike/revenue
    Macrotrends. "Walmart Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/WMT/walmart/revenue
    Macrotrends. "Dell Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/DELL/dell/revenue
    Macrotrends. "NVIDIA Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NVDA/nvidia/revenue
    Sloan, Paul. "How to Develop a Vision for Innovation" Innovation Management, 10 Aug. 2009. Accessed 7 Feb. 2023. https://innovationmanagement.se/2009/08/10/how-to-develop-a-vision-for-innovation/
    Statista. "Samsung Electronics' global revenue from 2005 to 2021" Statista. Accessed 7 Feb. 2023. https://www.statista.com/statistics/236607/global-revenue-of-samsung-electronics-since-2005/
    Tichy, Noel & Ram Charan. "Speed, Simplicity, Self-Confidence: An Interview with Jack Welch" Harvard Business Review, 2 March 2020. Accessed 7 Feb. 2023. https://hbr.org/1989/09/speed-simplicity-self-confidence-an-interview-with-jack-welch
    Weick, Karl and Kathleen Sutcliffe. Managing the Unexpected: Sustained Performance in a Complex World, Third Edition. John Wiley & Sons, 2015.
    Xuan Tian, Tracy Yue Wang, Tolerance for Failure and Corporate Innovation, The Review of Financial Studies, Volume 27, Issue 1, 2014, Pages 211–255, Accessed https://doi.org/10.1093/rfs/hhr130

    Establish an Effective IT Steering Committee

    • Buy Link or Shortcode: {j2store}191|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $44,821 Average $ Saved
    • member rating average days saved: 11 Average Days Saved
    • Parent Category Name: IT Governance, Risk & Compliance
    • Parent Category Link: /it-governance-risk-and-compliance
    • Unfortunately, when CIOs implement IT steering committees, they often lack the appropriate structure and processes to be effective.
    • Due to the high profile of the IT steering committee membership, CIOs need to get this right – or their reputation is at risk.

    Our Advice

    Critical Insight

    • 88% of IT steering committees fail. The organizations that succeed have clearly defined responsibilities that are based on business needs.
    • Without a documented process your committee can’t execute on its responsibilities. Clearly define the flow of information to make your committee actionable.
    • Limit your headaches by holding your IT steering committee accountable for defining project prioritization criteria.

    Impact and Result

    Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee:

    • IT Steering Committee Charter: Use this template in combination with this blueprint to form a highly tailored committee.
    • IT Steering Committee Stakeholder Presentation: Build understanding around the goals and purpose of the IT steering committee, and generate support from your leadership team.
    • IT Steering Committee Project Prioritization Tool: Engage your IT steering committee participants in defining project prioritization criteria. Track project prioritization and assess your portfolio.

    Establish an Effective IT Steering Committee Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should establish an IT steering committee, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build the steering committee charter

    Build your IT steering committee charter using results from the stakeholder survey.

    • Establish an Effective IT Steering Committee – Phase 1: Build the Steering Committee Charter
    • IT Steering Committee Stakeholder Survey
    • IT Steering Committee Charter

    2. Define IT steering commitee processes

    Define your high level steering committee processes using SIPOC, and select your steering committee metrics.

    • Establish an Effective IT Steering Committee – Phase 2: Define ITSC Processes

    3. Build the stakeholder presentation

    Customize Info-Tech’s stakeholder presentation template to gain buy-in from your key IT steering committee stakeholders.

    • Establish an Effective IT Steering Committee – Phase 3: Build the Stakeholder Presentation
    • IT Steering Committee Stakeholder Presentation

    4. Define the prioritization criteria

    Build the new project intake and prioritization process for your new IT steering committee.

    • Establish an Effective IT Steering Committee – Phase 4: Define the Prioritization Criteria
    • IT Steering Committee Project Prioritization Tool
    • IT Project Intake Form
    [infographic]

    Workshop: Establish an Effective IT Steering Committee

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Build the IT Steering Committee

    The Purpose

    Lay the foundation for your IT steering committee (ITSC) by surveying your stakeholders and identifying the opportunities and threats to implementing your ITSC.

    Key Benefits Achieved

     An understanding of the business environment affecting your future ITSC and identification of strategies for engaging with stakeholders

    Activities

    1.1 Launch stakeholder survey for business leaders.

    1.2 Analyze results with an Info-Tech advisor.

    1.3 Identify opportunities and threats to successful IT steering committee implementation.

    1.4 Develop the fit-for-purpose approach.

    Outputs

    Report on business leader governance priorities and awareness

    Refined workshop agenda

    2 Define the ITSC Goals

    The Purpose

    Define the goals and roles of your IT steering committee.

    Plan the responsibilities of your future committee members.

    Key Benefits Achieved

     Groundwork for completing the steering committee charter

    Activities

    2.1 Review the role of the IT steering committee.

    2.2 Identify IT steering committee goals and objectives.

    2.3 Conduct a SWOT analysis on the five governance areas

    2.4 Define the key responsibilities of the ITSC.

    2.5 Define ITSC participation.

    Outputs

    IT steering committee key responsibilities and participants identified

    IT steering committee priorities identified

    3 Define the ITSC Charter

    The Purpose

    Document the information required to create an effective ITSC Charter.

    Create the procedures required for your IT steering committee.

    Key Benefits Achieved

    Clearly defined roles and responsibilities for your steering committee

    Completed IT Steering Committee Charter document

    Activities

    3.1 Build IT steering committee participant RACI.

    3.2 Define your responsibility cadence and agendas.

    3.3 Develop IT steering committee procedures.

    3.4 Define your IT steering committee purpose statement and goals.

    Outputs

    IT steering committee charter: procedures, agenda, and RACI

    Defined purpose statement and goals

    4 Define the ITSC Process

    The Purpose

    Define and test your IT steering committee processes.

    Get buy-in from your key stakeholders through your stakeholder presentation.

    Key Benefits Achieved

    Stakeholder understanding of the purpose and procedures of IT steering committee membership

    Activities

    4.1 Define your high-level IT steering committee processes.

    4.2 Conduct scenario testing on key processes, establish ITSC metrics.

    4.3 Build your ITSC stakeholder presentation.

    4.4 Manage potential objections.

    Outputs

    IT steering committee SIPOC maps

    Refined stakeholder presentation

    5 Define Project Prioritization Criteria

    The Purpose

    Key Benefits Achieved

    Activities

    5.1 Create prioritization criteria

    5.2 Customize the project prioritization tool

    5.3 Pilot test the tool

    5.4 Define action plan and next steps

    Outputs

    IT Steering Committee Project Prioritization Tool

    Action plan

    Further reading

    Establish an Effective IT Steering Committee

    Have the right people making the right decisions to drive IT success.

    Our understanding of the problem

    This Research Is Designed For:

    • CIOs
    • IT Leaders

    This Research Will Also Assist:

    • Business Partners

    This Research Will Help You:

    • Structure an IT steering committee with the appropriate membership and responsibilities
    • Define appropriate cadence around business involvement in IT decision making
    • Define your IT steering committee processes, metrics, and timelines
    • Obtain buy-in for IT steering committee participations
    • Define the project prioritization criteria

    This Research Will Help Them:

    • Understand the importance of IT governance and their role
    • Identify and build the investment prioritization criteria

    Executive Summary

    Situation

    • An effective IT steering committee (ITSC) is one of the top predictors of value generated by IT, yet only 11% of CIOs believe their committees are effective.
    • An effective steering committee ensures that the right people are involved in critical decision making to drive organizational value.

    Complication

    • Unfortunately, when CIOs do implement IT steering committees, they often lack the appropriate structure and processes to be effective.
    • Due to the high profile of the IT steering committee membership, CIOs need to get this right – or their reputation is at risk.

    Resolution

    Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee. These include:

    1. IT Steering Committee Charter: Customizable charter complete with example purpose, goals, responsibilities, procedures, RACI, and processes. Use this template in combination with this blueprint to get a highly tailored committee.
    2. IT Stakeholder Presentation: Use our customizable presentation guide to build understanding around the goals and purpose of the IT steering committee and generate support from your leadership team.
    3. IT Steering Committee Project Prioritization Tool: Engage your IT steering committee participants in defining the project prioritization criteria. Use our template to track project prioritization and assess your portfolio.

    Info-Tech Insight

    1. 88% of IT steering committees fail. The organizations that succeed have clearly defined responsibilities that are based on business needs.
    2. Without a documented process your committee can’t execute on its responsibilities. Clearly define the flow of information to make your committee actionable.
    3. Limit your headaches by holding your IT steering committee accountable for defining project prioritization criteria.

    IT Steering Committee

    Effective IT governance critical in driving business satisfaction with IT. Yet 88% of CIOs believe that their governance structure and processes are not effective. The IT steering committee (ITSC) is the heart of the governance body and brings together critical organizational stakeholders to enable effective decision making (Info-Tech Research Group Webinar Survey).

    IT STEERING COMMITTEES HAVE 3 PRIMARY OBJECTIVES – TO IMPROVE:

    1. Alignment: IT steering committees drive IT and business strategy alignment by having business partners jointly accountable for the prioritization and selection of projects and investments within the context of IT capacity.
    2. Accountability: The ITSC facilitates the involvement and commitment of executive management through clearly defined roles and accountabilities for IT decisions in five critical areas: investments, projects, risk, services, and data.
    3. Value Generation: The ITSC is responsible for the ongoing evaluation of IT value and performance of IT services. The committee should define these standards and approve remediation plans when there is non-achievement.

    "Everyone needs good IT, but no one wants to talk about it. Most CFOs would rather spend time with their in-laws than in an IT steering-committee meeting. But companies with good governance consistently outperform companies with bad. Which group do you want to be in?"

    – Martha Heller, President, Heller Search Associates

    An effective IT steering committee improves IT and business alignment and increases support for IT across the organization

    CEOs’ PERCEPTION OF IT AND BUSINESS ALIGNMENT

    67% of CIOs/CEOs are misaligned on the target role for IT.

    47% of CEOs believe that business goals are going unsupported by IT.

    64% of CEOs believe that improvement is required around IT’s understanding of business goals.

    28% of business leaders are supporters of their IT departments.

    A well devised IT steering committee ensures that core business partners are involved in critical decision making and that decisions are based on business goals – not who shouts the loudest. Leading to faster decision-making time, and better-quality decisions and outcomes.

    Source: Info-Tech CIO/CEO Alignment data

    Despite the benefits, 9 out of 10 steering committees are unsuccessful

    WHY DO IT STEERING COMMITTEES FAIL?

    1. A lack of appetite for an IT steering committee from business partners
    2. An effective ITSC requires participation from core members of the organization’s leadership team. The challenge is that most business partners don’t understand the benefits of an ITSC and the responsibilities aren’t tailored to participants’ needs or interests. It’s the CIOs responsibility to make this case to stakeholders and right-size the committee responsibilities and membership.
    3. IT steering committees are given inappropriate responsibilities
    4. The IT steering committee is fundamentally about decision making; it’s not a working committee. CIOs struggle with clarifying these responsibilities on two fronts: either the responsibilities are too vague and there is no clear way to execute on them within a meeting, or responsibilities are too tactical and require knowledge that participants do not have. Responsibilities should determine who is on the ITSC, not the other way around.
    5. Lack of process around execution
    6. An ITSC is only valuable if members are able to successfully execute on the responsibilities. Without well defined processes it becomes nearly impossible for the ITSC to be actionable. As a result, participants lack the information they need to make critical decisions, agendas are unmet, and meetings are seen as a waste of time.

    GOVERNANCE and ITSC and IT Management

    Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.

    The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.

    Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.

    These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.

    IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.

    RELATIONSHIP BETWEEN STRATEGIC, TACTICAL, AND OPERATIONAL GROUPS

    Strategic IT Steering Committee
    Tactical

    Project Governance Service Governance

    Risk Governance Information Governance

    IT Management
    Operational Risk Task Force

    This blueprint focuses exclusively on building the IT steering committee. For more information on IT governance see Info-Tech’s blueprint Tailor an IT Governance Plan to Fit Organizational Needs.

    1. Governance of the IT Portfolio & Investments: ensures that funding and resources are systematically allocated to the priority projects that deliver value
    2. Governance of Projects: ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.
    3. Governance of Risks: ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.
    4. Governance of Services: ensures that IT delivers the required services at the acceptable performance levels.
    5. Governance of Information and Data: ensures the appropriate classification and retention of data based on business need.

    If these symptoms resonate with you, it might be time to invest in building an IT steering committee

    SIGNS YOU MAY NEED TO BUILD AN IT STEERING COMMITTEE

    As CIO I find that there is a lack of alignment between business and IT strategies.
    I’ve noticed that projects are thrown over the fence by stakeholders and IT is expected to comply.
    I’ve noticed that IT projects are not meeting target project metrics.
    I’ve struggled with a lack of accountability for decision making, especially by the business.
    I’ve noticed that the business does not understand the full cost of initiatives and projects.
    I don’t have the authority to say “no” when business requests come our way.
    We lack a standardized approach for prioritizing projects.
    IT has a bad reputation within the organization, and I need a way to improve relationships.
    Business partners are unaware of how decisions are made around IT risks.
    Business partners don’t understand the full scope of IT responsibilities.
    There are no SLAs in place and no way to measure stakeholder satisfaction with IT.

    Info-Tech’s approach to implementing an IT steering committee

    Info-Tech’s IT steering committee development blueprint will provide you with the required tools, templates, and deliverables to implement a right-sized committee that’s effective the first time.

    • Measure your business partner level of awareness and interest in the five IT governance areas, and target specific responsibilities for your steering committee based on need.
    • Customize Info-Tech’s IT Steering Committee Charter Template to define and document the steering committee purpose, responsibilities, participation, and cadence.
    • Build critical steering committee processes to enable information to flow into and out of the committee to ensure that the committee is able to execute on responsibilities.
    • Customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to make your first meeting a breeze, providing stakeholders with the information they need, with less than two hours of preparation time.
    • Leverage our workshop guide and prioritization tools to facilitate a meeting with IT steering committee members to define the prioritization criteria for projects and investments and roll out a streamlined process.

    Info-Tech’s Four-Phase Process

    Key Deliverables:
    1 2 3 4
    Build the Steering Committee Charter Define ITSC Processes Build the Stakeholder Presentation Define the Prioritization Criteria
    • IT Steering Committee Stakeholder Survey
    • IT Steering Committee Charter
      • Purpose
      • Responsibilities
      • RACI
      • Procedures
    • IT Steering Committee SIPOC (Suppliers, Inputs, Process, Outputs, Customers)
    • Defined process frequency
    • Defined governance metrics
    • IT Steering Committee Stakeholder Presentation template
      • Introduction
      • Survey outcomes
      • Responsibilities
      • Next steps
      • ITSC goals
    • IT project prioritization facilitation guide
    • IT Steering Committee Project Prioritization Tool
    • Project Intake Form

    Leverage both COBIT and Info-Tech-defined metrics to evaluate the success of your program or project

    COBIT METRICS Alignment
    • Percent of enterprise strategic goals and requirements supported by strategic goals.
    • Level of stakeholder satisfaction with scope of the planned portfolio of programs and services.
    Accountability
    • Percent of executive management roles with clearly defined accountabilities for IT decisions.
    • Rate of execution of executive IT-related decisions.
    Value Generation
    • Level of stakeholder satisfaction and perceived value.
    • Number of business disruptions due to IT service incidents.
    INFO-TECH METRICS Survey Metrics:
    • Percent of business leaders who believe they understand how decisions are made in the five governance areas.
    • Percentage of business leaders who believe decision making involved the right people.
    Value of Customizable Deliverables:
    • Estimated time to build IT steering committee charter independently X cost of employee
    • Estimated time to build and generate customer stakeholder survey and generate reports X cost of employee
    • # of project interruptions due to new or unplanned projects

    CASE STUDY

    Industry: Consumer Goods

    Source: Interview

    Situation

    A newly hired CIO at a large consumer goods company inherited an IT department with low maturity from her predecessor. Satisfaction with IT was very low across all business units, and IT faced a lot of capacity constraints. The business saw IT as a bottleneck or red tape in terms of getting their projects approved and completed.

    The previous CIO had established a steering committee for a short time, but it had a poorly established charter that did not involve all of the business units. Also the role and responsibilities of the steering committee were not clearly defined. This led the committee to be bogged down in politics.

    Due to the previous issues, the business was wary of being involved in a new steering committee. In order to establish a new steering committee, the new CIO needed to navigate the bad reputation of the previous CIO.

    Solution

    The CIO established a new steering committee engaging senior members of each business unit. The roles of the committee members were clearly established in the new steering committee charter and business stakeholders were informed of the changes through presentations.

    The importance of the committee was demonstrated through the new intake and prioritization process for projects. Business stakeholders were impressed with the new process and its transparency and IT was no longer seen as a bottleneck.

    Results

    • Satisfaction with IT increased by 12% after establishing the committee and IT was no longer seen as red tape for completing projects
    • IT received approval to hire two more staff members to increase capacity
    • IT was able to augment service levels, allowing them to reinvest in innovative projects
    • Project prioritization process was streamlined

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Establish an Effective IT Steering Committee

    Build the Steering Committee Charter Define ITSC Processes Build the Stakeholder Presentation Define the Prioritization Criteria
    Best-Practice Toolkit

    1.1 Survey Your Steering Committee Stakeholders

    1.2 Build Your ITSC Charter

    2.1 Build a SIPOC

    2.2 Define Your ITSC Process

    3.1 Customize the Stakeholder Presentation

    4.1 Establish your Prioritization Criteria

    4.2 Customize the Project Prioritization Tool

    4.3 Pilot Test Your New Prioritization Criteria

    Guided Implementations
    • Launch your stakeholder survey
    • Analyze the results of the survey
    • Build your new ITSC charter
    • Review your completed charter
    • Build and review your SIPOC
    • Review your high-level steering committee processes
    • Customize the presentation
    • Build a script for the presentation
    • Practice the presentation
    • Review and select prioritization criteria
    • Review the Project Prioritization Tool
    • Review the results of the tool pilot test
    Onsite Workshop

    Module 1:

    Build a New ITSC Charter

    Module 2:

    Design Steering Committee Processes

    Module 3:

    Present the New Steering Committee to Stakeholders

    Module 4:

    Establish Project Prioritization Criteria

    Phase 1 Results:
    • Customized ITSC charter

    Phase 2 Results:

    • Completed SIPOC and steering committee processes
    Phase 3 Results:
    • Customized presentation deck and script
    Phase 4 Results:
    • Customized project prioritization tool

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
    Activities

    Build the IT Steering Committee

    1.1 Launch stakeholder survey for business leaders

    1.2 Analyze results with an Info-Tech Advisor

    1.3 Identify opportunities and threats to successful IT steering committee implementation.

    1.4 Develop the fit-for-purpose approach

    Define the ITSC Goals

    2.1 Review the role of the IT steering committee

    2.2 Identify IT steering committee goals and objectives

    2.3 Conduct a SWOT analysis on the five governance areas

    2.4 Define the key responsibilities of the ITSC 2.5 Define ITSC participation

    Define the ITSC Charter

    3.1 Build IT steering committee participant RACI

    3.2 Define your responsibility cadence and agendas

    3.3 Develop IT steering committee procedures

    3.4 Define your IT steering committee purpose statement and goals

    Define the ITSC Process

    4.1 Define your high-level IT steering committee processes

    4.2 Conduct scenario testing on key processes, establish ITSC metrics

    4.3 Build your ITSC stakeholder presentation

    4.4 Manage potential objections

    Define Project Prioritization Criteria

    5.1 Create prioritization criteria

    5.2 Customize the Project Prioritization Tool

    5.3 Pilot test the tool

    5.4 Define action plan and next steps

    Deliverables
    1. Report on business leader governance priorities and awareness
    2. Refined workshop agenda
    1. IT steering committee priorities identified
    2. IT steering committee key responsibilities and participants identified
    1. IT steering committee charter: procedures, agenda, and RACI
    2. Defined purpose statement and goals
    1. IT steering committee SIPOC maps
    2. Refined stakeholder presentation
    1. Project Prioritization Tool
    2. Action plan

    Phase 1

    Build the IT Steering Committee Charter

    Phase 1 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Formalize the Security Policy Program

    Proposed Time to Completion: 1-2 weeks

    Select Your ITSC Members

    Start with an analyst kick-off call:

    • Launch your stakeholder survey

    Then complete these activities…

    • Tailor the survey questions
    • Identify participants and tailor email templates

    With these tools & templates:

    • ITSC Stakeholder Survey
    • ITSC Charter Template

    Review Stakeholder Survey Results

    Review findings with analyst:

    • Review the results of the Stakeholder Survey

    Then complete these activities…

    • Customize the ITSC Charter Template

    With these tools & templates:

    • ITSC Charter Template

    Finalize the ITSC Charter

    Finalize phase deliverable:

    • Review the finalized ITSC charter with an Info-Tech analyst

    Then complete these activities…

    • Finalize any changes to the ITSC Charter
    • Present it to ITSC Members

    With these tools & templates:

    • ITSC Charter Template

    Build the IT Steering Committee Charter

    This step will walk you through the following activities:

    • Launch and analyze the stakeholder survey
    • Define your ITSC goals and purpose statement
    • Determine ITSC responsibilities and participants
    • Determine ITSC procedures

    This step involves the following participants:

    • CIO
    • IT Steering Committee
    • IT Leadership Team
    • PMO

    Key Insight:

    Be exclusive with your IT steering committee membership. Determine committee participation based on committee responsibilities. Select only those who are key decision makers for the activities the committee is responsible for and, wherever possible, keep membership to 5-8 people.

    Tailor Info-Tech’s IT Steering Committee Charter Template to define terms of reference for the ITSC

    1.1

    A charter is the organizational mandate that outlines the purpose, scope, and authority of the ITSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.

    Start by reviewing Info-Tech’s template. Throughout this section we will help you to tailor its contents.

    Committee Purpose: The rationale, benefits of, and overall function of the committee.

    Responsibilities: What tasks/decisions the accountable committee is making.

    Participation: Who is on the committee

    RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.

    Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with business units.

    A screenshot of Info-Tech's <em data-verified=IT Steering Committee Charter Template.">

    IT Steering Committee Charter

    Take a data-driven approach to build your IT steering committee based on business priorities

    1.2

    Leverage Info-Tech’s IT Steering Committee Stakeholder Surveyand reports to quickly identify business priorities and level of understanding of how decisions are made around the five governance areas.

    Use these insights to drive the IT steering committee responsibilities, participation, and communication strategy.

    The Stakeholder Survey consists of 17 questions on:

    • Priority governance areas
    • Desired level of involvement in decision making in the five governance areas
    • Knowledge of how decisions are made
    • Five open-ended questions on improvement opportunities

    To simplify your data collection and reporting, Info-Tech can launch a web-based survey, compile the report data and assist in the data interpretation through one of our guided implementations.

    Also included is a Word document with recommended questions, if you prefer to manage the survey logistics internally.

    A screenshot of Info-Tech's first page of the <em data-verified=IT Steering Committee Stakeholder Survey "> A screenshot of Info-Tech's survey.

    Leverage governance reports to define responsibilities and participants, and in your presentation to stakeholders

    1.3

    A screenshot is displayed. It advises that 72% of stakeholders do <strong data-verified= understand how decisions around IT services are made (quality, availability, etc.). Two graphs are included in the screenshot. One of the bar graphs shows the satisfaction with the quality of decisions and transparency around IT services. The other bar graph displays IT decisions around service delivery and quality that involve the right people.">

    OVERALL PRIORITIES

    You get:

    • A clear breakdown of stakeholders’ level of understanding on how IT decisions are made in the five governance areas
    • Stakeholder perceptions on the level of IT and business involvement in decision making
    • Identification of priority areas

    So you can:

    • Get an overall pulse check for understanding
    • Make the case for changes in decision-making accountability
    • Identify which areas the IT steering committee should focus on
    A screenshot is displayed. It advises that 80% of stakeholders do <strong data-verified=not understand how decisions around IT investments or project and service resourcing are made. Two bar graphs are displayed. One of the bar graphs shows the satisfaction with the quality of decisions made around IT investments. The other graph display IT decisions around spending priorities involving the right people.">

    GOVERNANCE AREA REPORTS

    You get:

    • Satisfaction score for decision quality in each governance area
    • Breakdown of decision-making accountability effectiveness
    • Identified level of understanding around decision making
    • Open-ended comments

    So you can:

    • Identify the highest priority areas to change.
    • To validate changes in decision-making accountability
    • To understand business perspectives on decision making.

    Conduct a SWOT analysis of the five governance areas

    1.4

    1. Hold a meeting with your IT leadership team to conduct a SWOT analysis on each of the five governance areas. Start by printing off the following five slides to provide participants with examples of the role of governance and the symptoms of poor governance in each area.
    2. In groups of 1-2 people, have each group complete a SWOT analysis for one of the governance areas. For each consider:
    • Strengths: What is currently working well in this area?
    • Weaknesses: What could you improve? What are some of the challenges you’re experiencing?
    • Opportunities: What are some organizational trends that you can leverage? Consider whether your strengths or weaknesses that could create opportunities?
    • Threats: What are some key obstacles across people, process, and technology?
  • Have each team or individual rotate until each person has contributed to each SWOT. Add comments from the stakeholder survey to the SWOT.
  • As a group rank each of the five areas in terms of importance for a phase one IT steering committee implementation, and highlight the top 10 challenges, and the top 10 opportunities you see for improvement.
  • Document the top 10 lists for use in the stakeholder presentation.
  • INPUT

    • Survey outcomes
    • Governance overview handouts

    OUTPUT

    • SWOT analysis
    • Ranked 5 areas
    • Top 10 challenges and opportunities identified.

    Materials

    • Governance handouts
    • Flip chart paper, pens

    Participants

    • IT leadership team

    Governance of RISK

    Governance of risk establishes the risk framework, establishes policies and standards, and monitors risks.

    Governance of risk ensures that IT is mitigating all relevant risks associated with IT investments, projects, and services.

    GOVERNANCE ROLES:

    1. Defines responsibility and accountability for IT risk identification and mitigation.
    2. Ensures the consideration of all elements of IT risk, including value, change, availability, security, project, and recovery
    3. Enables senior management to make better IT decisions based on the evaluation of the risks involved
    4. Facilitates the identification and analysis of IT risk and ensures the organization’s informed response to that risk.

    Symptoms of poor governance of risk

    • Opportunities for value creation are missed by not considering or assessing IT risk, or by completely avoiding all risk.
    • No formal risk management process or accountabilities exist.
    • There is no business continuity strategy.
    • Frequent security breaches occur.
    • System downtime occurs due to failed IT changes.

    Governance of PPM

    Governance of the IT portfolio achieves optimum ROI through prioritization, funding, and resourcing.

    PPM practices create value if they maximize the throughput of high-value IT projects at the lowest possible cost. They destroy value when they foster needlessly sophisticated and costly processes.

    GOVERNANCE ROLES:

    1. Ensures that the projects that deliver greater business value get a higher priority.
    2. Provides adequate funding for the priority projects and ensures adequate resourcing and funding balanced across the entire portfolio of projects.
    3. Makes the business and IT jointly accountable for setting project priorities.
    4. Evaluate, direct, and monitor IT value metrics and endorse the IT strategy and monitor progress.

    Symptoms of poor governance of PPM/investments

    • The IT investment mix is determined solely by Finance and IT.
    • It is difficult to get important projects approved.
    • Projects are started then halted, and resources are moved to other projects.
    • Senior management has no idea what projects are in the backlog.
    • Projects are approved without a valid business case.

    Governance of PROJECTS

    Governance of projects improves the quality and speed of decision making for project issues.

    Don’t confuse project governance and management. Governance makes the decisions regarding allocation of funding and resources and reviews the overall project portfolio metrics and process methodology.

    Management ensures the project deliverables are completed within the constraints of time, budget, scope, and quality.

    GOVERNANCE ROLES:

    1. Monitors and evaluates the project management process and critical project methodology metrics.
    2. Ensures review and mitigation of project issue and that management is aware of projects in crisis.
    3. Ensures that projects beginning to show characteristics of failure cannot proceed until issues are resolved.
    4. Endorses the project risk criteria, and monitors major risks to project completion.
    5. Approves the launch and execution of projects.

    Symptoms of poor governance of projects

    • Projects frequently fail or get cancelled.
    • Project risks and issues are not identified or addressed.
    • There is no formal project management process.
    • There is no senior stakeholder responsible for making project decisions.
    • There is no formal project reporting.

    Governance of SERVICES

    Governance of services ensures delivery of a highly reliable set of IT services.

    Effective governance of services enables the business to achieve the organization’s goals and strategies through the provision of reliable and cost-effective services.

    GOVERNANCE ROLES:

    1. Ensures the satisfactory performance of those services critical to achieving business objectives.
    2. Monitors and directs changes in service levels.
    3. Ensures operational and performance objectives for IT services are met.
    4. Approves policy and standards on the service portfolio.

    Symptoms of poor governance of service

    • There is a misalignment of business needs and expectations with IT capability.
    • No metrics are reported for IT services.
    • The business is unaware of the IT services available to them.
    • There is no accountability for service level performance.
    • There is no continuous improvement plan for IT services.
    • IT services or systems are frequently unavailable.
    • Business satisfaction with IT scores are low.

    Governance of INFORMATION

    Governance of information ensures the proper handling of data and information.

    Effective governance of information ensures the appropriate classification, retention, confidentiality, integrity, and availability of data in line with the needs of the business.

    GOVERNANCE ROLES:

    1. Ensures the information lifecycle owner and process are defined and endorse by business leadership.
    2. Ensures the controlled access to a comprehensive information management system.
    3. Ensures knowledge, information, and data are gathered, analyzed, stored, shared, used, and maintained.
    4. Ensures that external regulations are identified and met.

    Symptoms of poor governance of information

    • There is a lack of clarity around data ownership, and data quality standards.
    • There is insufficient understanding of what knowledge, information, and data are needed by the organization.
    • There is too much effort spent on knowledge capture as opposed to knowledge transfer and re-use.
    • There is too much focus on storing and sharing knowledge and information that is not up to date or relevant.
    • Personnel see information management as interfering with their work.

    Identify the responsibilities of the IT steering committee

    1.5

    1. With your IT leadership team, review the typical responsibilities of the IT steering committee on the following slide.
    2. Print off the following slide, and in your teams of 1-2 have each group identify which responsibilities they believe the IT steering committee should have, brainstorm any additional responsibilities, and document their reasoning.
    3. Note: The bolded responsibilities are the ones that are most common to IT steering committees, and greyed out responsibilities are typical of a larger governance structure. Depending on their level of importance to your organization, you may choose to include the responsibility.

    4. Have each team present to the larger group, track the similarities and differences between each of the groups, and come to consensus on the list of responsibilities.
    5. Complete a sanity check – review your swot analysis and survey results. Do the responsibilities you’ve identified resolve the critical challenges or weaknesses?
    6. As a group, consider the responsibilities and consider whether you can reasonably implement those in one year, or if there are any that will need to wait until year two of the IT steering committee.
    7. Modify the list of responsibilities in Info-Tech’s IT Steering Committee Charter by deleting the responsibilities you do not need and adding any that you identified in the process.

    INPUT

    • SWOT analysis
    • Survey reports

    OUTPUT

    • Defined ITSC responsibilities documented in the ITSC Charter

    Materials

    • Responsibilities handout
    • Voting dots

    Participants

    • IT leadership team

    Typical IT steering committee and governance responsibilities

    The bolded responsibilities are those that are most common to IT steering committees, and responsibilities listed in grey are typical of a larger governance structure.

    INVESTMENTS / PPM

    • Establish the target investment mix
    • Evaluate and select programs/projects to fund
    • Monitor IT value metrics
    • Endorse the IT budget
    • Monitor and report on program/project outcomes
    • Direct the governance optimization
    • Endorse the IT strategy

    PROJECTS

    • Monitor project management metrics
    • Approve launch of projects
    • Review major obstacles to project completion
    • Monitor a standard approach to project management
    • Monitor and direct project risk
    • Monitor requirements gathering process effectiveness
    • Review feasibility studies and formulate alternative solutions for high risk/high investment projects

    SERVICE

    • Monitor stakeholder satisfaction with services
    • Monitor service metrics
    • Approve plans for new or changed service requirements
    • Monitor and direct changes in service levels
    • Endorse the enterprise architecture
    • Approve policy and standards on the service portfolio
    • Monitor performance and capacity

    RISK

    • Monitor risk management metrics
    • Review the prioritized list of risks
    • Monitor changes in external regulations
    • Maintain risk profiles
    • Approve the risk management emergency action process
    • Maintain a mitigation plan to minimize risk impact and likelihood
    • Evaluate risk management
    • Direct risk management

    INFORMATION / DATA

    • Define information lifecycle process ownership
    • Monitor information lifecycle metrics
    • Define and monitor information risk
    • Approve classification categories of information
    • Approve information lifecycle process
    • Set policies on retirement of information

    Determine committee membership based on the committee’s responsibilities

    • One of the biggest benefits to an IT steering committee is it involves key leadership from the various lines of business across the organization.
    • However, in most cases, more people get involved than is required, and all the committee ends up accomplishing is a lot of theorizing. Participants should be selected based on the identified responsibilities of the IT steering committee.
    • If the responsibilities don’t match the participants, this will negatively impact committee effectiveness as leaders become disengaged in the process and don’t feel like it applies to them or accomplishes the desired goals. Once participants begin dissenting, it’s significantly more difficult to get results.
    • Be careful! When you have more than one individual in a specific role, select only the people whose attendance is absolutely critical. Don’t let your governance collapse under committee overload!

    LIKELY PARTICIPANT EXAMPLES:

    MUNICIPALITY

    • City Manager
    • CIO/IT Leader
    • CCO
    • CFO
    • Division Heads

    EDUCATION

    • Provost
    • Vice Provost
    • VP Academic
    • VP Research
    • VP Public Affairs
    • VP Operations
    • VP Development
    • Etc.

    HEALTHCARE

    • President/CEO
    • CAO
    • EVP/ EDOs
    • VPs
    • CIO
    • CMO

    PRIVATE ORGANIZATIONS

    • CEO
    • CFO
    • COO
    • VP Marketing
    • VP Sales
    • VP HR
    • VP Product Development
    • VP Engineering
    • Etc.

    Identify committee participants and responsibility cadence

    1.6

    1. In a meeting with your IT leadership team, review the list of committee responsibilities and document them on a whiteboard.
    2. For each responsibility, identify the individuals whom you would want to be either responsible or accountable for that decision.
    3. Repeat this until you’ve completed the exercise for each responsibility.
    4. Group the responsibilities with the same participants and highlight groupings with less than four participants. Consider the responsibility and determine whether you need to change the wording to make it more applicable or if you should remove the responsibility.
    5. Review the grouping, the responsibilities within them, and their participants, and assess how frequently you would like to meet about them – annually, quarterly, or monthly. (Note: suggested frequency can be found in the IT Steering Committee Charter.)
    6. Subdivide the responsibilities for the groupings to determine your annual, quarterly, and monthly meeting schedule.
    7. Validate that one steering committee is all that is needed, or divide the responsibilities into multiple committees.
    8. Document the committee participants in the IT Steering Committee Charter and remove any unneeded responsibilities identified in the previous exercise.

    INPUT

    • List of responsibilities

    OUTPUT

    • ITSC participants list
    • Meeting schedule

    Materials

    • Whiteboard
    • Markers

    Participants

    • IT leadership team

    Committees can only be effective if they have clear and documented authority

    It is not enough to participate in committee meetings; there needs to be a clear understanding of who is accountable, responsible, consulted, and informed about matters brought to the attention of the committee.

    Each committee responsibility should have one person who is accountable, and at least one person who is responsible. This is the best way to ensure that committee work gets done.

    An authority matrix is often used within organizations to indicate roles and responsibilities in relation to processes and activities. Using the RACI model as an example, there is only one person accountable for an activity, although several people may be responsible for executing parts of the activity. In this model, accountable means end-to-end accountability for the process.

    RESPONSIBLE: The one responsible for getting the job done.

    ACCOUNTABLE: Only one person can be accountable for each task.

    CONSULTED: Involvement through input of knowledge and information.

    INFORMED: Receiving information about process execution and quality.

    A chart is depicted to show an example of the authority matrix using the RACI model.

    Define IT steering committee participant RACI for each of the responsibilities

    1.7

    1. Use the table provided in the IT Steering Committee Charter and edit he list of responsibilities to reflect the chosen responsibilities of your ITSC.
    2. Along the top of the chart list the participant names, and in the right hand column of the table document the agreed upon timing from the previous exercise.
    3. For each of the responsibilities identify whether participants are Responsible, Accountable, Consulted, or Informed by denoting an R, A, C, I, or N/A in the table. Use N/A if this is a responsibility that the participant has no involvement in.
    4. Review your finalized RACI chart. If there are participants who are only consulted or informed about the majority of responsibilities, consider removing them from the IT steering committee. You only want the decision makers on the committee.

    INPUT

    • Responsibilities
    • Participants

    OUTPUT

    • RACI documented in the ITSC Charter

    Materials

    • ITSC RACI template
    • Projector

    Participants

    • IT leadership

    Building the agenda may seem trivial, but it is key for running effective meetings

    49% of people consider unfocused meetings as the biggest workplace time waster.*

    63% of the time meetings do not have prepared agendas.*

    80% Reduction of time spent in meetings by following a detailed agenda and starting on time.*

    *(Source: http://visual.ly/fail-plan-plan-fail).

    EFFECTIVE MEETING AGENDAS:

    1. Have clearly defined meeting objectives.
    2. Effectively time-boxed based on priority items.
    3. Defined at least two weeks prior to the meetings.
    4. Evaluated regularly – are not static.
    5. Leave time at the end for new business, thus minimizing interruptions.

    BUILDING A CONSENT AGENDA

    A consent agenda is a tool to free up time at meetings by combining previously discussed or simple items into a single item. Items that can be added to the consent agenda are those that are routine, noncontroversial, or provided for information’s sake only. It is expected that participants read this information and, if it is not pulled out, that they are in agreement with the details.

    Members have the option to pull items out of the consent agenda for discussion if they have questions. Otherwise these are given no time on the agenda.

    Define the IT steering committee meeting agendas and procedures

    1.8

    Agendas

    1. Review the listed responsibilities, participants, and timing as identified in a previous exercise.
    2. Annual meeting: Identify if all of the responsibilities will be included in the annual meeting agenda (likely all governance responsibilities).
    3. Quarterly Meeting Agenda: Remove the meeting responsibilities from the annual meeting agenda that are not required and create a list of responsibilities for the quarterly meetings.
    4. Monthly Meeting Agenda: Remove all responsibilities from the list that are only annual or quarterly and compile a list of monthly meeting responsibilities.
    5. Review each responsibility, and estimate the amount of time each task will take within the meeting. We recommend giving yourself at least an extra 10-20% more time for each agenda item for your first meeting. It’s better to have more time than to run out.
    6. Complete the Agenda Template in the IT Steering Committee Charter.

    Procedures:

    1. Review the list of IT steering committee procedures, and replace the grey text with the information appropriate for your organization.

    INPUT

    • Responsibility cadence

    OUTPUT

    • ITSC annual, quarterly, monthly meeting agendas & procedures

    Materials

    • ITSC Charter

    Participants

    • IT leadership team

    Draft your IT steering committee purpose statement and goals

    1.9

    1. In a meeting with your IT leadership team – and considering the defined responsibilities, participants, and opportunities and threats identified – review the example goal statement in the IT Steering Committee Charter, and first identify whether any of these statements apply to your organization. Select the statements that apply and collaboratively make any changes needed.
    2. Define unique goal statements by considering the following questions:
      1. What three things would you realistically list for the ITSC to achieve.
      2. If you were to accomplish three things in the next year, what would those be?
    3. Document those goals in the IT Steering Committee Charter.
    4. With those goal statements in mind, consider the overall purpose of the committee. The purpose statement should be a reflection of what the committee does, why it does it, and the goals.
    5. Have each individual review the example purpose statement, and draft what they think a good purpose statement would be.
    6. Present each statement, and work together to determine a best of breed statement.
    7. Document this in the IT Steering Committee Charter.

    INPUT

    • Responsibilities, participants, top 10 lists of challenges and opportunities.

    OUTPUT

    • ITSC goals and purpose statement

    Materials

    • ITSC Charter

    Participants

    • IT leadership team

    CASE STUDY

    "Clearly defined Committee Charter allows CIO to escape the bad reputation of previous committee."

    Industry: Consumer Goods

    Source: Interview

    CHALLENGE

    The new CIO at a large consumer goods company had difficulty generating interest in creating a new IT steering committee. The previous CIO had created a steering committee that was poorly organized and did not involve all of the pertinent members. This led to a committee focused on politics that would often devolve into gossip. Also, many members were dissatisfied with the irregular meetings that would often go over their allotted time.

    In order to create a new committee, the new CIO needed to dispel the misgivings of the business leadership.

    SOLUTION

    The new CIO decided to build the new steering committee from the ground up in a systematic way.

    She collected information from relevant stakeholders about what they know/how they feel about IT and used this information to build a detailed charter.

    Using this info she outlined the new steering committee charter and included in it the:

    1. Purpose
    2. Responsibilities
    3. RACI Chart
    4. Procedures

    OUTCOME

    The new steering committee included all the key members of business units, and each member was clear on their roles in the meetings. Meetings were streamlined and effective. The adjustments in the charter and the improvement in meeting quality played a role in improving the satisfaction scores of business leaders with IT by 21%.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.1

    A screenshot of activity 1.1 is displayed. 1.1 is about surveying your ITSC stakeholders.

    Survey your ITSC stakeholders

    Prior to the workshop, Info-Tech’s advisors will work with you to launch the IT Steering Committee Stakeholder Survey to understand business priorities and level of understanding of how decisions are made. Using this data, we will create the IT steering committee responsibilities, participation, and communication strategy.

    1.7

    A screenshot of activity 1.7 is displayed. 1.7 is about defining a participant RACI for each of the responsibilities.

    Define a participant RACI for each of the responsibilities

    The analyst will facilitate several exercises to help you and your stakeholders create an authority matrix. The output will be defined responsibilities and authorities for members.

    Phase 2

    Build the IT Steering Committee Process

    Phase 2 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Define your ITSC Processes
    Proposed Time to Completion: 2 weeks

    Review SIPOCs and Process Creation

    Start with an analyst kick-off call:

    • Review the purpose of the SIPOC and how to build one

    Then complete these activities…

    • Build a draft SIPOC for your organization

    With these tools & templates:

    Phase 2 of the Establish an Effective IT Steering Committee blueprint

    Finalize the SIPOC

    Review Draft SIPOC:

    • Review and make changes to the SIPOC
    • Discuss potential metrics

    Then complete these activities…

    • Test survey link
    • Info-Tech launches survey

    With these tools & templates:

    Phase 2 of the Establish an Effective IT Steering Committee blueprint

    Finalize Metrics

    Finalize phase deliverable:

    • Finalize metrics

    Then complete these activities…

    • Establish ITSC metric triggers

    With these tools & templates:

    Phase 2 of the Establish an Effective IT Steering Committee blueprint

    Build the IT Steering Committee Process

    This step will walk you through the following activities:

    • Define high-level steering committee processes using SIPOC
    • Select steering committee metrics

    This step involves the following participants:

    • CIO
    • IT Steering Committee
    • IT Leadership Team
    • PMO

    Key Insight:

    Building high-level IT steering committee processes brings your committee to life. Having a clear process will ensure that you have the right information from the right sources so that committees can operate and deliver the appropriate output to the customers who need it.

    Build your high-level IT steering committee processes to enable committee functionality

    The IT steering committee is only valuable if members are able to successfully execute on responsibilities.

    One of the most common mistakes organizations make is that they build their committee charters and launch into their first meeting. Without defined inputs and outputs, a committee does not have the needed information to be able to effectively execute on responsibilities and is unable to meet its stated goals.

    The arrows in this picture represent the flow of information between the IT steering committee, other committees, and IT management.

    Building high-level processes will define how that information flows within and between committees and will enable more rapid decision making. Participants will have the information they need to be confident in their decisions.

    Strategic IT Steering Committee
    Tactical

    Project Governance Service Governance

    Risk Governance Information Governance

    IT Management
    Operational Risk Task Force

    Define the high-level process for each of the IT steering committee responsibilities

    Info-Tech recommends using SIPOC as a way of defining how the IT steering committee will operate.

    Derived from the core methodologies of Six Sigma process management, SIPOC – a model of Suppliers, Inputs, Processes, Outputs, Customers – is one of several tools that organizations can use to build high level processes. SIPOC is especially effective when determining process scope and boundaries and to gain consensus on a process.

    By doing so you’ll ensure that:

    1. Information and documentation required to complete each responsibility is identified.
    2. That the results of committee meetings are distributed to those customers who need the information.
    3. Inputs and outputs are identified and that there is defined accountability for providing these.

    Remember: Your IT steering committee is not a working committee. Enable effective decision making by ensuring participants have the necessary information and appropriate recommendations from key stakeholders to make decisions.

    Supplier Input
    Who provides the inputs to the governance responsibility. The documented information, data, or policy required to effectively respond to the responsibility.
    Process
    In this case this represents the IT steering committee responsibility defined in terms of the activity the ITSC is performing.
    Output Customer
    The outcome of the meeting: can be approval, rejection, recommendation, request for additional information, endorsement, etc. Receiver of the outputs from the committee responsibility.

    Define your SIPOC model for each of the IT steering committee responsibilities

    2.1

    1. In a meeting with your IT leadership, draw the SIPOC model on a whiteboard or flip-chart paper. Either review the examples on the following slides or start from scratch.
    2. If you are adjusting the following slides, consider the templates you already have which would be appropriate inputs and make adjustments as needed.

    For atypical responsibilities:

    1. Start with the governance responsibility and identify what specifically it is that the IT steering committee is doing with regards to that responsibility. Write that in the center of the model.
    2. As a group, consider what information or documentation would be required by the participants to effectively execute on the responsibility.
    3. Identify which individual will supply each piece of documentation. This person will be accountable for this moving forward.
    4. Outputs: Once the committee has met about the responsibility, what information or documentation will be produced. List all of those documents.
    5. Identify the individuals who need to receive the outputs of the information.
    6. Repeat this for all of the responsibilities.
    7. Once complete, document the SIPOC models in the IT Steering Committee Charter.

    INPUT

    • List of responsibilities
    • Example SIPOCs

    OUTPUT

    • SIPOC model for all responsibilities.

    Materials

    • Whiteboard
    • Markers
    • ITSC Charter

    Participants

    • IT leadership team

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Establish the target investment mix
    Supplier Input
    CIO
    • Target investment mix and rationale
    Process
    Responsibility: The IT steering committee shall review and approve the target investment mix.
    Output Customer
    • Approval of target investment mix
    • Rejection of target investment mix
    • Request for additional information
    • CFO
    • CIO
    • IT leadership
    SIPOC: Endorse the IT budget
    Supplier Input
    CIO
    • Recommendations

    See Info-Tech’s blueprint IT Budget Presentation

    Process

    Responsibility: Review the proposed IT budget as defined by the CIO and CFO.

    Output Customer
    • Signed endorsement of the IT budget
    • Request for additional information
    • Recommendation for changes to the IT budget.
    • CFO
    • CIO
    • IT leadership

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Monitor IT value metrics
    Supplier Input
    CIO
    • IT value dashboard
    • Key metric takeaways
    • Recommendations
    CIO Business Vision
    Process

    Responsibility: Review recommendations and either accept or reject recommendations. Refine go-forward metrics.

    Output Customer
    • Launch corrective task force
    • Accept recommendations
    • Define target metrics
    • CEO
    • CFO
    • Business executives
    • CIO
    • IT leadership
    SIPOC: Evaluate and select programs/projects to fund
    Supplier Input
    PMO
    • Recommended project list
    • Project intake documents
    • Prioritization criteria
    • Capacity metrics
    • IT budget

    See Info-Tech’s blueprint

    Grow Your Own PPM Solution
    Process

    Responsibility: The ITSC will approve the list of projects to fund based on defined prioritization criteria – in line with capacity and IT budget.

    It is also responsible for identifying the prioritization criteria in line with organizational priorities.

    Output Customer
    • Approved project list
    • Request for additional information
    • Recommendation for increased resources
    • PMO
    • CIO
    • Project sponsors

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Endorse the IT strategy
    Supplier Input
    CIO
    • IT strategy presentation

    See Info-Tech’s blueprint

    IT Strategy and Roadmap
    Process

    Responsibility: Review, understand, and endorse the IT strategy.

    Output Customer
    • Signed endorsement of the IT strategy
    • Recommendations for adjustments
    • CEO
    • CFO
    • Business executives
    • IT leadership
    SIPOC: Monitor project management metrics
    Supplier Input
    PMO
    • Project metrics report with recommendations
    Process

    Responsibility: Review recommendations around PM metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

    Output Customer
    • Accept project metrics performance
    • Accept recommendations
    • Launch corrective task force
    • Define target metrics
    • PMO
    • Business executives
    • IT leadership

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Approve launch of planned and unplanned project
    Supplier Input
    CIO
    • Project list and recommendations
    • Resourcing report
    • Project intake document

    See Info-Tech’s Blueprint:

    Grow Your Own PPM Solution
    Process

    Responsibility: Review the list of projects and approve the launch or reprioritization of projects.

    Output Customer
    • Approved launch of projects
    • Recommendations for changes to project list
    • CFO
    • CIO
    • IT leadership
    SIPOC: Monitor stakeholder satisfaction with services and other service metrics
    Supplier Input
    Service Manager
    • Service metrics report with recommendations
    Info-Tech End User Satisfaction Report
    Process

    Responsibility: Review recommendations around service metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

    Output Customer
    • Accept service level performance
    • Accept recommendations
    • Launch corrective task force
    • Define target metrics
    • Service manager
    • Business executives
    • IT leadership

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Approve plans for new or changed service requirements
    Supplier Input
    Service Manager
    • Service change request
    • Project request and change plan
    Process

    Responsibility: Review IT recommendations, approve changes, and communicate those to staff.

    Output Customer
    • Approved service changes
    • Rejected service changes
    • Service manager
    • Organizational staff
    SIPOC: Monitor risk management metrics
    Supplier Input
    CIO
    • Risk metrics report with recommendations
    Process

    Responsibility: Review recommendations around risk metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

    Output Customer
    • Accept risk register and mitigation strategy
    • Launch corrective task force to address risks
    • Risk manager
    • Business executives
    • IT leadership

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Review the prioritized list of risks
    Supplier Input
    Risk Manager
    • Risk register
    • Mitigation strategies
    See Info-Tech’s risk management research to build a holistic risk strategy.
    Process

    Responsibility: Accept the risk registrar and define any additional action required.

    Output Customer
    • Accept risk register and mitigation strategy
    • Launch corrective task force to address risks
    • Risk manager
    • IT leadership
    • CRO
    SIPOC: Define information lifecycle process ownership
    Supplier Input
    CIO
    • List of risk owner options with recommendations
    See Info-Tech’s related blueprint: Information Lifecycle Management
    Process

    Responsibility: Define responsibility and accountability for information lifecycle ownership.

    Output Customer
    • Defined information lifecycle owner
    • Organization wide.

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Monitor information lifecycle metrics
    Supplier Input
    Information lifecycle owner
    • Information metrics report with recommendations
    Process

    Responsibility: Review recommendations around information management metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

    Output Customer
    • Accept information management performance
    • Accept recommendations
    • Launch corrective task force to address challenges
    • Define target metrics
    • IT leadership

    Define which metrics you will report to the IT steering committee

    2.2

    1. Consider your IT steering committee goals and the five IT governance areas.
    2. For each governance area, identify which metrics you are currently tracking and determine whether these metrics are valuable to IT, to the business, or both. For metrics that are valuable to business stakeholders determine whether you have an identified target metric.

    New Metrics:

    1. For each of the five IT governance areas review your SWOT analysis and document your key opportunities and weaknesses.
    2. For each, brainstorm hypotheses around why the opportunity was weak or was a success. For each hypothesis identify if there are any clear ways to measure and test the hypothesis.
    3. Review the list of metrics and select 5-7 metrics to track for each prioritized governance area.

    INPUT

    • List of responsibilities
    • Example SIPOCs

    OUTPUT

    • SIPOC model for all responsibilities

    Materials

    • Whiteboard
    • Markers

    Participants

    • IT leadership team

    IT steering committee metric triggers to consider

    RISK

    • Risk profile % increase
    • # of actionable risks outstanding
    • # of issues arising not identified prior
    • # of security breaches

    SERVICE

    • Number of business disruptions due to IT service incidents
    • Number of service requests by department
    • Number of service requests that are actually projects
    • Causes of tickets overall and by department
    • Percentage of duration attributed to waiting for client response

    PROJECTS

    • Projects completed within budget
    • Percentage of projects delivered on time
    • Project completion rate
    • IT completed assigned portion to scope
    • Project status and trend dashboard

    INFORMATION / DATA

    • % of data properly classified
    • # of incidents locating data
    • # of report requests by complexity
    • # of open data sets

    PPM /INVESTMENTS

    • CIO Business Vision (an Info-Tech diagnostic survey that helps align IT strategy with business goals)
    • Level of stakeholder satisfaction and perceived value
    • Percentage of ON vs. OFF cycle projects by area/silo
    • Realized benefit to business units based on investment mix
    • Percent of enterprise strategic goals and requirements supported by strategic goals
    • Target vs. actual budget
    • Reasons for off-cycle projects causing delays to planned projects

    CASE STUDY

    Industry: Consumer Goods

    Source: Interview

    "IT steering committee’s reputation greatly improved by clearly defining its process."

    CHALLENGE

    One of the major failings of the previous steering committee was its poorly drafted procedures. Members of the committee were unclear on the overall process and the meeting schedule was not well established.

    This led to low attendance at the meetings and ineffective meetings overall. Since the meeting procedures weren’t well understood, some members of the leadership team took advantage of this to get their projects pushed through.

    SOLUTION

    The first step the new CIO took was to clearly outline the meeting procedures in her new steering committee charter. The meeting agenda, meeting goals, length of time, and outcomes were outlined, and the stakeholders signed off on their participation.

    She also gave the participants a SIPOC, which helped members who were unfamiliar with the process a high-level overview. It also reacquainted previous members with the process and outlined changes to the previous, out-of-date processes.

    OUTCOME

    The participation rate in the committee meetings improved from the previous rate of approximately 40% to 90%. The committee members were much more satisfied with the new process and felt like their contributions were appreciated more than before.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    An image of an Info-Tech analyst is depicted.

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.1

    A screenshot of activity 2.1 is depicted. Activity 2.1 is about defining a SIPOC for each of the ITSC responsibilities.

    Define a SIPOC for each of the ITSC responsibilities

    Create SIPOCs for each of the governance responsibilities with the help of an Info-Tech advisor.

    2.2

    A screenshot of activity 2.2 is depicted. Activity 2.2 is about establishing the reporting metrics for the ITSC.

    Establish the reporting metrics for the ITSC

    The analyst will facilitate several exercises to help you and your stakeholders define the reporting metrics for the ITSC.

    Phase 3

    Build the Stakeholder Presentation

    Phase 3 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Build the Stakeholder Presentation
    Proposed Time to Completion: 1 week

    Customize the Presentation

    Start with an analyst kick-off call:

    • Review the IT Steering Committee Stakeholder Presentation with an analyst

    Then complete these activities…

    • Schedule the first meeting and invite the ITSC members
    • Customize the presentation template

    With these tools & templates:

    IT Steering Committee Stakeholder Presentation


    Review and Practice the Presentation

    Review findings with analyst:

    • Review the changes made to the template
    • Practice the presentation and create a script

    Then complete these activities…

    • Hold the ITSC meeting

    With these tools & templates:

    • IT Steering Committee Stakeholder Presentation
    Review the First ITSC Meeting

    Finalize phase deliverable:

    • Review the outcomes of the first ITSC meeting and plan out the next steps

    Then complete these activities…

    • Review the discussion and plan next steps

    With these tools & templates:

    Establish an Effective IT Steering Committee blueprint

    Build the Stakeholder Presentation

    This step will walk you through the following activities:

    • Organizing the first ITSC meeting
    • Customizing an ITSC stakeholder presentation
    • Determine ITSC responsibilities and participants
    • Determine ITSC procedures

    This step involves the following participants:

    • CIO
    • IT Steering Committee
    • IT Leadership Team
    • PMO

    Key Insight:

    Stakeholder engagement will be critical to your ITSC success, don't just focus on what is changing. Ensure stakeholders know why you are engaging them and how it will help them in their role.

    Hold a kick-off meeting with your IT steering committee members to explain the process, responsibilities, and goals

    3.1

    Don’t take on too much in your first IT steering committee meeting. Many participants may not have participated in an IT steering committee before, or some may have had poor experiences in the past.

    Use this meeting to explain the role of the IT steering committee and why you are implementing one, and help participants to understand their role in the process.

    Quickly customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to explain the goals and benefits of the IT steering committee, and use your own data to make the case for governance.

    At the end of the meeting, ask committee members to sign the committee charter to signify their agreement to participate in the IT steering committee.

    A screenshot of IT Steering Committee: Meeting 1 is depicted. A screenshot of the IT Steering Committee Challenges and Opportunities for the organization.

    Tailor the IT Steering Committee Stakeholder Presentation template: slides 1-5

    3.2 Estimated Time: 10 minutes

    Review the IT Steering Committee Stakeholder Presentation template. This document should be presented at the first IT steering committee meeting by the assigned Committee Chair.

    Customization Options

    Overall: Decide if you would like to change the presentation template. You can change the color scheme easily by copying the slides in the presentation deck and pasting them into your company’s standard template. Once you’ve pasted them in, scan through the slides and make any additional changes needed to formatting.

    Slide 2-3: Review the text on each of the slides and see if any wording should be changed to better suite your organization.

    Slide 4: Review your list of the top 10 challenges and opportunities as defined in section 2 of this blueprint. Document those in the appropriate sections. (Note: be careful that the language is business-facing; challenges and opportunities should be professionally worded.)

    Slide 5: Review the language on slide 5 to make any necessary changes to suite your organization. Changes here should be minimal.

    INPUT

    • Top 10 list
    • Survey report
    • ITSC Charter

    OUTPUT

    • Ready-to-present presentation for defined stakeholders

    Materials

    • IT Steering Committee Stakeholder Presentation

    Participants

    • IT Steering Committee Chair/CIO

    Tailor the IT Steering Committee Stakeholder Presentation template: slides 6-10

    3.2 Estimated Time: 10 minutes

    Customization Options

    Slide 6: The goal of this slide is to document and share the names of the participants on the IT steering committee. Document the names in the right-hand side based on your IT Steering Committee Charter.

    Slides 7-9:

    • Review the agenda items as listed in your IT Steering Committee Charter. Document the annual, quarterly, and monthly meeting responsibilities on the left-hand side of slides 7-9.
    • Meeting Participants: For each slide, list the members who are required for that meeting.
    • Document the key required reading materials as identified in the SIPOC charts under “inputs.”
    • Document the key meeting outcomes as identified in the SIPOC chart under “outputs.”

    Slide 10: Review and understand the rollout timeline. Make any changes needed to the timeline.

    INPUT

    • Top 10 list
    • Survey report
    • ITSC Charter

    OUTPUT

    • Ready-to-present presentation for defined stakeholders

    Materials

    • IT Steering Committee Stakeholder Presentation

    Participants

    • IT Steering Committee Chair/CIO

    Present the information to the IT leadership team to increase your comfort with the material

    3.3 Estimated Time: 1-2 hours

    1. Once you have finished customizing the IT Steering Committee Stakeholder Presentation, practice presenting the material by meeting with your IT leadership team. This will help you become more comfortable with the dialog and anticipate any questions that might arise.
    2. The ITSC chair will present the meeting deck, and all parties should discuss what they think went well and opportunities for improvement.
    3. Each business relationship manager should document the needed changes in preparation for their first meeting.

    INPUT

    • IT Steering Committee Stakeholder Presentation - Meeting 1

    Participants

    • IT leadership team

    Schedule your first meeting of the IT steering committee

    3.4

    By this point, you should have customized the meeting presentation deck and be ready to meet with your IT steering committee participants.

    The meeting should be one hour in duration and completed in person.

    Before holding the meeting, identify who you think is going to be most supportive and who will be least. Consider meeting with those individuals independently prior to the group meeting to elicit support or minimize negative impacts on the meeting.

    Customize this calendar invite script to invite business partners to participate in the meeting.

    Hello [Name],

    As you may have heard, we recently went through an exercise to develop an IT steering committee. I’d like to take some time to discuss the results of this work with you, and discuss ways in which we can work together in the future to better enable corporate goals.

    The goals of the meeting are:

    1. Discuss the benefits of an IT steering committee
    2. Review the results of the organizational survey
    3. Introduce you to our new IT steering committee

    I look forward to starting this discussion with you and working with you more closely in the future.

    Warm regards,

    CASE STUDY

    Industry:Consumer Goods

    Source: Interview

    "CIO gains buy-in from the company by presenting the new committee to its stakeholders."

    CHALLENGE

    Communication was one of the biggest steering committee challenges that the new CIO inherited.

    Members were resistant to joining/rejoining the committee because of its previous failures. When the new CIO was building the steering committee, she surveyed the members on their knowledge of IT as well as what they felt their role in the committee entailed.

    She found that member understanding was lacking and that their knowledge surrounding their roles was very inconsistent.

    SOLUTION

    The CIO dedicated their first steering committee meeting to presenting the results of that survey to align member knowledge.

    She outlined the new charter and discussed the roles of each member, the goals of the committee, and the overarching process.

    OUTCOME

    Members of the new committee were now aligned in terms of the steering committee’s goals. Taking time to thoroughly outline the procedures during the first meeting led to much higher member engagement. It also built accountability within the committee since all members were present and all members had the same level of knowledge surrounding the roles of the ITSC.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1

    A screenshot of Activity 3.1 is depicted. Activity 3.1 is about creating a presentation for ITSC stakeholders to be presented at the first ITSC meeting.

    Create a presentation for ITSC stakeholders to be presented at the first ITSC meeting

    Work with an Info-Tech advisor to customize our IT Steering Committee Stakeholder Presentation template. Use this presentation to gain stakeholder buy-in by making the case for an ITSC.

    Phase 4

    Define the Prioritization Criteria

    Phase 4 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation : Define the Prioritization Criteria
    Proposed Time to Completion: 4 weeks

    Discuss Prioritization Criteria

    Start with an analyst kick-off call:

    • Review sample project prioritization criteria and discuss criteria unique to your organization

    Then complete these activities...

    • Select the criteria that would be most effective for your organization
    • Input these into the tool

    With these tools & templates:

    IT Steering Committee Project Prioritization Tool

    Customize the IT Steering Committee Project Prioritization Tool

    Review findings with analyst:

    • Review changes made to the tool
    • Finalize criteria weighting

    Then complete these activities…

    • Pilot test the tool using projects from the previous year

    With these tools & templates:

    IT Steering Committee Project Prioritization Tool

    Review Results of the Pilot Test

    Finalize phase deliverable:

    • Review the results of the pilot test
    • Make changes to the tool

    Then complete these activities…

    • Input your current project portfolio into the prioritization tool

    With these tools & templates:

    IT Steering Committee Project Prioritization Tool

    Define the Project Prioritization Criteria

    This step will walk you through the following activities:

    • Selecting the appropriate project prioritization criteria for your organization
    • Developing weightings for the prioritization criteria
    • Filling in Info-Tech’s IT Steering Committee Project Prioritization Tool

    This step involves the following participants:

    • CIO
    • IT Steering Committee
    • IT Leadership Team
    • PMO

    Key Insight:

    The steering committee sets and agrees to principles that guide prioritization decisions. The agreed upon principles will affect business unit expectations and justify the deferral of requests that are low priority. In some cases, we have seen the number of requests drop substantially because business units are reluctant to propose initiatives that do not fit high prioritization criteria.

    Understand the role of the IT steering committee in project prioritization

    One of the key roles of the IT steering committee is to review and prioritize the portfolio of IT projects.

    What is the prioritization based on? Info-Tech recommends selecting four broad criteria with two dimensions under each to evaluate the value of the projects. The criteria are aligned with how the project generates value for the organization and the execution of the project.

    What is the role of the steering committee in prioritizing projects? The steering committee is responsible for reviewing project criteria scores and making decisions about where projects rank on the priority list. Planning, resourcing, and project management are the responsibility of the PMO or the project owner.

    Info-Tech’s Sample Criteria

    Value

    Strategic Alignment: How much a project supports the strategic goals of the organization.

    Customer Satisfaction: The impact of the project on customers and how visible a project will be with customers.

    Operational Alignment: Whether the project will address operational issues or compliance.

    Execution

    Financial: Predicted ROI and cost containment strategies.

    Risk: Involved with not completing projects and strategies to mitigate it.

    Feasibility: How easy the project is to complete and whether staffing resources exist.

    Use Info-Tech’s IT Steering Committee Project Prioritization Tool to catalog and prioritize your project portfolio

    4.1

    • Use Info-Tech’s IT Steering Committee Project Prioritization Tool in conjunction with the following activities to catalog and prioritize all of the current IT projects in your portfolio.
    • Assign weightings to your selected criteria to prioritize projects based on objective scores assigned during the intake process and adjust these weightings on an annual basis to align with changing organizational priorities and goals.
    • Use this tool at steering committee meetings to streamline the prioritization process and create alignment with the PMO and project managers.
    • Monitor ongoing project status and build a communication channel between the PMO and project managers and the IT steering committee.
    • Adjusting the titles in the Settings tab will automatically adjust the titles in the Project Data tab.
    • Note: To customize titles in the document you must unprotect the content under the View tab. Be sure to change the content back to protected after making the changes.
    A screenshot of Info-Tech's IT Steering Committee Project Prioritization Tool is depicted. The first page of the tool is shown. A screenshot of Info-Tech's IT Steering Committee Project Prioritization Tool is depicted. The page depicted is on the Intake and Prioritization Tool Settings.

    Establish project prioritization criteria and build the matrix

    4.2 Estimated Time: 1 hour

    1. During the second steering committee meeting, discuss the criteria you will be basing your project prioritization scoring on.
    2. Review Info-Tech’s prioritization criteria matrix, located in the Prioritization Criteria List tab of the IT Steering Committee Project Prioritization Tool, to gain ideas for what criteria would best suit your organization.
    3. Write these main criteria on the whiteboard and brainstorm criteria that are more specific for your organization; include these on the list as well.
    4. Discuss the criteria. Eliminate criteria that won’t contribute strongly to the prioritization process and vote on the remaining. Select four main criteria from the list.
    5. After selecting the four main criteria, write these on the whiteboard and brainstorm the dimensions that fall under the criteria. These should be more specific/measurable aspects of the criteria. These will be the statements that values are assigned to for prioritizing projects so they should be clear. Use the Prioritization Criteria List in the tool to help generate ideas.
    6. After creating the dimensions, determine what the scoring statements will be. These are the statements that will be used to determine the score out of 10 that the different dimensions will receive.
    7. Adjust the Settings and Project Data tabs in the IT Steering Committee Project Prioritization Tool to reflect your selections.
    8. Edit Info-Tech’s IT Project Intake Form or the intake form that you currently use to contain these criteria and scoring parameters.

    INPUT

    • Group input
    • IT Steering Committee Project Prioritization Tool

    OUTPUT

    • Project prioritization criteria to be used for current and future projects

    Materials

    • Whiteboard and markers

    Participants

    • IT steering committee
    • CIO
    • IT leadership

    Adjust prioritization criteria weightings to reflect organizational needs

    4.3 Estimated Time: 1 hour

    1. In the second steering committee meeting, after deciding what the project prioritization criteria will be, you need to determine how much weight (the importance) each criteria will receive.
    2. Use the four agreed upon criteria with two dimensions each, determined in the previous activity.
    3. Perform a $100 test to assign proportions to each of the criteria dimensions.
      1. Divide the committee into pairs.
      2. Tell each pair that they have $100 divide among the 4 major criteria based on how important they feel the criteria is.
      3. After dividing the initial $100, ask them to divide the amount they allocated to each criteria into the two sub-dimensions.
      4. Next, ask them to present their reasoning for the allocations to the rest of the committee.
      5. Discuss the weighting allotments and vote on the best one (or combination).
      6. Input the weightings in the Settings tab of the IT Steering Committee Project Prioritization Tool and document the discussion.
    4. After customizing the chart establish the owner of the document. This person should be a member of the PMO or the most suitable IT leader if a PMO doesn’t exist.
    5. Only perform this adjustment annually or if a major strategic change happens within the organization.

    INPUT

    • Group discussion

    OUTPUT

    • Agreed upon criteria weighting
    • Complete prioritization tool

    Materials

    • IT Steering Committee Project Prioritization Tool
    • Whiteboard and sticky notes

    Participants

    • IT steering committee
    • IT leadership

    Document the prioritization criteria weightings in Info-Tech’s IT Steering Committee Project Prioritization Tool.

    Configure the prioritization tool to align your portfolio with business strategy

    4.4 Estimated Time: 60 minutes

    Download Info-Tech’s Project Intake and Prioritization Tool.

    A screenshot of Info-Tech's Project Intake and Prioritization Tool.

    Rank: Project ranking will dynamically update relative to your portfolio capacity (established in Settings tab) and the Size, Scoring Progress, Remove from Ranking, and Overall Score columns. The projects in green represent top priorities based on these inputs, while yellow projects warrant additional consideration should capacity permit.

    Scoring Progress: You will be able to determine some items on the scorecard earlier in the scoring progress (such as strategic and operational alignment). As you fill in scoring columns on the Project Data tab, the Scoring Progress column will dynamically update to track progress.

    The Overall Score will update automatically as you complete the scoring columns (refer to Activity 4.2).

    Days in Backlog: This column will help with backlog management, automatically tracking the number of days since an item was added to the list based on day added and current date.

    Validate your new prioritization criteria using previous projects

    4.5 Estimated Time: 2 hours

    1. After deciding on the prioritization criteria, you need to test their validity.
    2. Look at the portfolio of projects that were completed in the previous year.
    3. Go through each project and score it according to the criteria that were determined in the previous exercise.
    4. Enter the scores and appropriate weighting (according to goals/strategy of the previous year) into the IT Steering Committee Project Prioritization Tool.
    5. Look at the prioritization given to the projects in reference to how they were previously prioritized.
    6. Adjust the criteria and weighting to either align the new prioritization criteria with previous criteria or to align with desired outcomes.
    7. After scoring the old projects, pilot test the tool with upcoming projects.

    INPUT

    • Information on previous year’s projects
    • Group discussion

    OUTPUT

    • Pilot tested project prioritization criteria

    Materials

    • IT Steering Committee Project Prioritization Tool

    Participants

    • IT steering committee
    • IT leadership
    • PMO

    Pilot the scorecard to validate criteria and weightings

    4.6 Estimated Time: 60 minutes

    1. Pilot your criteria and weightings in the IT Steering Committee Project Prioritization Tool using project data from one or two projects currently going through approval process.
    2. For most projects, you will be able to determine strategic and operational alignment early in the scoring process, while the feasibility and financial requirements will come later during business case development. Score each column as you can. The tool will automatically track your progress in the Scoring Progress column on the Project Data tab.

    Projects that are scored but not prioritized will populate the portfolio backlog. Items in the backlog will need to be rescored periodically, as circumstances can change, impacting scores. Factors necessitating rescoring can include:

    • Assumptions in business case have changed.
    • Organizational change – e.g. a new CEO or a change in strategic objectives.
    • Major emergencies or disruptions – e.g. a security breach.

    Score projects using the Project Data tab in Info-Tech’s IT Steering Committee Project Prioritization Tool

    A screenshot of Info-Tech's <em data-verified=IT Steering Committee Project Prioritization Tool is depicted. The Data Tab is shown.">

    Use Info-Tech’s IT Project Intake Form to streamline the project prioritization and approval process

    4.7

    • Use Info-Tech’s IT Project Intake Form template to streamline the project intake and prioritization process.
    • Customize the chart on page 2 to include the prioritization criteria that were selected during this phase of the blueprint.
    • Including the prioritization criteria at the project intake phase will free up a lot of time for the steering committee. It will be their job to verify that the criteria scores are accurate.
    A screenshot of Info-Tech's IT Project Intake Form is depicted.

    After prioritizing and selecting your projects, determine how they will be resourced

    Consult these Info-Tech blueprints on project portfolio management to create effective portfolio project management resourcing processes.

    A Screenshot of Info-Tech's Create Project Management Success Blueprint is depicted. Create Project Management Success A Screenshot of Info-Tech's Develop a Project Portfolio Management Strategy Blueprint is depicted. Develop a Project Portfolio Management Strategy

    CASE STUDY

    Industry: Consumer Goods

    Source: Interview

    "Clear project intake and prioritization criteria allow for the new committee to make objective priority decisions."

    CHALLENGE

    One of the biggest problems that the previous steering committee at the company had was that their project intake and prioritization process was not consistent. Projects were being prioritized based on politics and managers taking advantage of the system.

    The procedure was not formalized so there were no objective criteria on which to weigh the value of proposed projects. In addition to poor meeting attendance, this led to the overall process being very inconsistent.

    SOLUTION

    The new CIO, with consultation from the newly formed committee, drafted a set of criteria that focused on the value and execution of their project portfolio. These criteria were included on their intake forms to streamline the rating process.

    All of the project scores are now reviewed by the steering committee, and they are able to facilitate the prioritization process more easily.

    The objective criteria process also helped to prevent managers from taking advantage of the prioritization process to push self-serving projects through.

    OUTCOME

    This was seen as a contributor to the increase in satisfaction scores for IT, which improved by 12% overall.

    The new streamlined process helped to reduce capacity constraints on IT, and it alerted the company to the need for more IT employees to help reduce these constraints further. The IT department was given permission to hire two new additional staff members.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    4.1

    A screenshot of activity 4.1 is depicted. Activity 4.1 was about defining your prioritization criteria and customize our <em data-verified=IT Steering Committee Project Prioritization Tool.">

    Define your prioritization criteria and customize our IT Steering Committee Project Prioritization Tool

    With the help of Info-Tech advisors, create criteria for determining a project’s priority. Customize the tool to reflect the criteria and their weighting. Run pilot tests of the tool to verify the criteria and enter your current project portfolio.

    Research contributors and experts

    • Andy Lomasky, Manager, Technology & Management Consulting, McGladrey LLP
    • Angie Embree, CIO, Best Friends Animal Society
    • Corinne Bell, CTO and Director of IT Services, Landmark College
    • John Hanskenecht, Director of Technology, University of Detroit Jesuit High School and Academy
    • Lori Baker, CIO, Village of Northbrook
    • Lynne Allard, IT Supervisor, Nipissing Parry Sound Catholic School Board
    • Norman Allen, Senior IT Manager, Baker Tilly
    • Paul Martinello, VP, IT Services, Cambridge and North Dumfries Hydro Inc.
    • Renee Martinez, IT Director/CIO, City of Santa Fe
    • Sam Wong, Director, IT, Seneca College
    • Suzanne Barnes, Director, Information Systems, Pathfinder International
    • Walt Joyce, CTO, Peoples Bank

    Appendices

    GOVERNANCE & ITSC & IT Management

    Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.

    The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.

    Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.

    These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.

    IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.

    Strategic IT Steering Committee
    Tactical

    Project Governance Service Governance

    Risk Governance Information Governance

    IT Management
    Operational Risk Task Force

    This blueprint focuses exclusively on building the IT Steering committee. For more information on IT governance see Info-Tech’s related blueprint: Tailor an IT Governance Plan to Fit Organizational Needs.

    IT steering committees play an important role in IT governance

    By bucketing responsibilities into these areas, you’ll be able to account for most key IT decisions and help the business to understand their role in governance, fostering ownership and joint accountability.

    The five governance areas are:

    Governance of the IT Portfolio and Investments: Ensures that funding and resources are systematically allocated to the priority projects that deliver value.

    Governance of Projects: Ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.

    Governance of Risks: Ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.

    Governance of Services: Ensures that IT delivers the required services at the acceptable performance levels.

    Governance of Information and Data: Ensures the appropriate classification and retention of data based on business need.

    A survey of stakeholders identified a need for increased stakeholder involvement and transparency in decision making

    A bar graph is depicted. The title is: I understand how decisions are made in the following areas. The areas include risk, services, projects, portfolio, and information. A circle graph is depicted. The title is: Do IT decisions involve the right people?

    Overall, survey respondents indicated a lack of understanding about how decisions are made around risk, services, projects, and investments, and that business involvement in decision making was too minimal.

    Satisfaction with decision quality around investments and PPM are uneven and largely not well understood

    72% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. Title of the graph: IT decisions around service delivery and quality involve the right people?

    Overall, services were ranked #1 in importance of the 5 areas

    62% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. Title of the graph: IT decisions around service delivery and quality involve the right people?

    Projects ranked as one of the areas with which participants are most satisfied with the quality of decisions

    70% of stakeholders do not understand how decisions around projects selection, success, and changes are made.

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. The title is: IT decisions around project changes, delays, and metrics involve the right people?

    Stakeholders are largely unaware of how decisions around risk are made and believe business participation needs to increase

    78% of stakeholders do not understand how decisions around risk are made

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions made around risk? A bar graph is depicted. The title is: IT decisions around acceptable risk involve the right people?

    The majority of stakeholders believe that they are aware of how decisions around information are made

    67% of stakeholders believe they do understand how decisions around information (data) retention and classification are made.

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions around information governance? A bar graph is depicted. The title is: IT decisions around information retention and classification involve the right people?

    Don’t Allow Software Licensing to Derail Your M&A

    • Buy Link or Shortcode: {j2store}135|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • Assuming that all parties are compliant in their licensing is a risky proposition. Most organizations are deficient in some manner of licensing. Know where those gaps are before finalizing M&A activity and have a plan in place to mitigate them right away.
    • Vendors will target companies that have undergone recent M&A activity with an audit. Vendors know that the many moving parts of M&A activity often result in license shortfall, and they may look to capitalize during the transition with audit revenue.
    • New organizational structure can offer new licensing opportunities. Take advantage of the increased volume discounting, negotiation leverage, and consolidation opportunities afforded by a merger or acquisition.

    Our Advice

    Critical Insight

    • To mitigate risks and create accurate cost estimates, create a contingency fund to compensate for unavailability of information.
    • Gathering and analyzing information is an iterative process that is ongoing throughout due diligence. Update your assumptions, risks, and budget as you obtain new information.
    • Communication with the M&A team and business process owners should be constant throughout due diligence. IT integration does not exist in isolation.

    Impact and Result

    • CIOs must be part of the conversation during the exploration/due diligence phase before the deal is closed to examine licensing compliance and software costs that could have a direct result on the valuation of the new organization.
    • Both organizations must conduct thorough due diligence (such as internal SAM audits), analyze the information, and define critical assumptions to create a strategy for the resultant IT enterprise.
    • The IT team is involved in integration, synergy realization, and cost considerations that the business often does not consider or take into account with respect to IT. License transfer, assignability, use, and geographic rights all come into play and can be overlooked.

    Don’t Allow Software Licensing to Derail Your M&A Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you shouldn’t allow software licensing to derail your M&A deal, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Understand the M&A process with respect to software licensing

    Grasp the key pain points of software licensing and the effects it has on an M&A. Review the benefits of early IT involvement and identify IT’s capabilities.

    • Don’t Allow Software Licensing to Derail Your M&A – Phase 1: M&A Overview
    • M&A Software Asset Maturity Assessment

    2. Perform due diligence

    Understand the various steps and process when conducting due diligence. Request information and assess risks, make assumptions, and budget costs.

    • Don’t Allow Software Licensing to Derail Your M&A – Phase 2: Due Diligence
    • License Inventory
    • IT Due Diligence Report
    • M&A Software Asset RACI Template

    3. Prepare for integration

    Take a deeper dive into the application portfolios and vendor contracts of both organizations. Review integration strategies and design the end-state of the resultant organization.

    • Don’t Allow Software Licensing to Derail Your M&A – Phase 3: Pre-Integration Planning
    • Effective Licensing Position Tool
    • IT Integration Roadmap Tool

    4. Execute on the integration plan

    Review initiatives being undertaken to ensure successful integration execution. Discuss long-term goals and how to communicate with vendors to avoid licensing audits.

    • Don’t Allow Software Licensing to Derail Your M&A – Phase 4: Integration Execution
    [infographic]

    Workshop: Don’t Allow Software Licensing to Derail Your M&A

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 M&A Overview

    The Purpose

    Identify the goals and objectives the business has for the M&A.

    Understand cultural and organizational structure challenges and red flags.

    Identify SAM/licensing challenges and red flags.

    Conduct maturity assessment.

    Clarify stakeholder responsibilities.

    Build and structure the M&A team.

    Key Benefits Achieved

    The capabilities required to successfully examine software assets and licensing during the M&A transaction.

    M&A business goals and objectives identified.

    IT M&A team selected.

    Severity of SAM challenges and red flags examined.

    Activities

    1.1 Document pain points from previous experience.

    1.2 Identify IT opportunities during M&A.

    Outputs

    M&A Software Asset Maturity Assessment

    2 Due Diligence

    The Purpose

    Take a structured due diligence approach that properly evaluates the current state of the organization.

    Review M&A license inventory and use top five vendors as example sets.

    Identify data capture and reporting methods/tools.

    Scheduling challenges.

    Scope level of effort and priority list.

    Common M&A pressures (internal/external).

    Key Benefits Achieved

    A clear understanding of the steps that are involved in the due diligence process.

    Recognition of the various areas from which information will need to be collected.

    Licensing pitfalls and compliance risks to be examined.

    Knowledge of terms and conditions that will limit ability in pre-integration planning.

    Activities

    2.1 Identify IT capabilities for an M&A.

    2.2 Create your due diligence team and assign accountability.

    2.3 Use Info-Tech’s IT Due Diligence Report Template to track key elements.

    2.4 Document assumptions to back up cost estimates and risk.

    Outputs

    M&A Software Asset RACI Template

    IT Due Diligence Report

    3 Pre-Integration Planning

    The Purpose

    Review and map legal operating entity structure for the resultant organization.

    Examine impact on licensing scenarios for top five vendors.

    Identify alternative paths and solutions.

    Complete license impact for top five vendors.

    Brainstorm action plan to mitigate negative impacts.

    Discuss and explore the scalable process for second level agreements.

    Key Benefits Achieved

    Identification of the ideal post-M&A application portfolio and licensing structures.

    Recognition of the key considerations when determining the appropriate combination of IT integration strategies.

    Design of vendor contracts for the resultant enterprise.

    Recognition of how to create an IT integration budget.

    Activities

    3.1 Work with the senior management team to review how the new organization will operate.

    3.2 Document the strategic goals and objectives of IT’s integration program.

    3.3 Interview business leaders to understand how they envision their business units.

    3.4 Perform internal SAM audit.

    3.5 Create a library of all IT processes in the target organization as well as your own.

    3.6 Examine staff using two dimensions: competency and capacity.

    3.7 Design the end-state.

    3.8 Communicate your detailed pre-integration roadmap with senior leadership and obtain sign-off.

    Outputs

    IT Integration Roadmap Tool

    Effective License Position

    4 Manage Post-M&A Activities

    The Purpose

    Finalize path forward for top five vendors based on M&A license impact.

    Disclose findings and financial impact estimate to management.

    Determine methods for second level agreements to be managed.

    Provide listing of specific recommendations for top five list.

    Key Benefits Achieved

    Initiatives generated and executed upon to achieve the technology end-state of each IT domain.

    Vendor audits avoided.

    Contracts amended and vendors spoken to.

    Communication with management on achievable synergies and quick wins.

    Activities

    4.1 Identify initiatives necessary to realize the application end-state.

    4.2 Identify initiatives necessary to realize the end-state of IT processes.

    4.3 Identify initiatives necessary to realize the end-state of IT staffing.

    4.4 Prioritize initiatives based on ease of implementation and overall business impact.

    4.5 Manage vendor relations.

    Outputs

    IT Integration Roadmap Tool

    Initiate Your Service Management Program

    • Buy Link or Shortcode: {j2store}398|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Service Management
    • Parent Category Link: /service-management
    • IT organizations continue attempting to implement service management, often based on ITIL, with limited success and without visible value.
    • More than half of service management implementations have failed beyond simply implementing the service desk and the incident, change, and request management processes.
    • Organizational structure, goals, and cultural factors are not considered during service management implementation and improvement.
    • The business lacks engagement and understanding of service management.

    Our Advice

    Critical Insight

    • Service management is an organizational approach. Focus on producing successful and valuable services and service outcomes for the customers.
    • All areas of the organization are accountable for governing and executing service management. Ensure that you create a service management strategy that improves business outcomes and provides the value and quality expected.

    Impact and Result

    • Identified structure for how your service management model should be run and governed.
    • Identified forces that impact your ability to oversee and drive service management success.
    • Mitigation approach to restraining forces.

    Initiate Your Service Management Program Research & Tools

    Start here – read the Executive Brief

    Read this Executive Brief to understand why service management implementations often fail and why you should establish governance for service management.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify the level of oversight you need

    Use Info-Tech’s methodology to establish an effective service management program with proper oversight.

    • Service Management Program Initiation Plan
    [infographic]

    Integrate Physical Security and Information Security

    • Buy Link or Shortcode: {j2store}383|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Security Processes & Operations
    • Parent Category Link: /security-processes-and-operations

    Physical security is often managed by facilities, not by IT security, resulting in segmented security systems. Integrating physical and information security introduces challenges in:

    • Understanding the value proposition of investment in governing and managing integrated systems, including migration costs, compared to separated security systems.
    • Addressing complex risks and vulnerabilities of an integrated security system.
    • Operationalizing enhanced capabilities created by adoption of emerging and disruptive technologies.

    Our Advice

    Critical Insight

    • Integrate security in people, process, and technology to improve your overall security posture. Having siloed systems running security is not beneficial. Many organizations are realizing the benefits of consolidating into a single platform across physical security, cybersecurity, HR, legal, and compliance.
    • Plan and engage stakeholders. Assemble the right team to ensure the success of your integrated security ecosystem, decide the governance model, and clearly define the roles and responsibilities.
    • Enhance strategy and risk management. Strategically, we want a physical security system that is interoperable with most technologies, flexible with minimal customization, functional, and integrated, despite the challenges of proprietary configurations, complex customization, and silos.

    Impact and Result

    Info-Tech's approach is a modular, incremental, and repeatable process to integrate physical and information security to:

    • Ensure the integration will meet the business' needs and determine effort and technical requirements.
    • Establish GRC processes that include integrated risk management and compliance.
    • Design and deploy an integrated security architecture.
    • Establish security metrics of effectiveness and efficiency for senior management and leadership.

    Integrate Physical Security and Information Security Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Integrate Physical Security and Information Security Storyboard – A step-by-step document that walks you through how to integrate physical security and information security.

    Info-Tech provides a three-phased framework for integrating physical security and information security: Plan, Enhance, and Monitor & Optimize.

    • Integrate Physical Security and Information Security Storyboard

    2. Integrate Physical Security and Information Security Requirements Gathering Tool – A tool to map organizational goals to IT goals, facilities goals, OT goals (if applicable), and integrated security goals.

    This tool serves as a repository for information about security integration elements, compliance, and other factors that will influence your integration of physical security and information security.

    • Integrate Physical Security and Information Security Requirements Gathering Tool

    3. Integrate Physical Security and Information Security RACI Chart Tool – A tool to identify and understand the owners of various security integration stakeholders across the organization.

    Populating a RACI chart (Responsible, Accountable, Consulted, and Informed) is a critical step that will assist you in organizing roles for carrying out integration steps. Complete this tool to assign tasks to suitable roles.

    • Integrate Physical Security and Information Security RACI Chart Tool

    4. Integrate Physical Security and Information Security Communication Deck – A tool to present your findings in a prepopulated document that summarizes the work you have completed.

    Complete this template to effectively communicate your integrated security plan to stakeholders.

    • Integrate Physical Security and Information Security Communication Deck
    [infographic]

    Further reading

    Integrate Physical Security and Information Security

    Securing information security, physical security, or personnel security in silos may not secure much

    Analyst Perspective

    Ensure integrated security success with close and continual collaboration

    From physical access control systems (PACS) such as electronic locks and fingerprint biometrics to video surveillance systems (VSS) such as IP cameras to perimeter intrusion detection and prevention to fire and life safety and beyond: physical security systems pose unique challenges to overall security. Additionally, digital transformation of physical security to the cloud and the convergence of operational technology (OT), internet of things (IoT), and industrial IoT (IIoT) increase both the volume and frequency of security threats.

    These threats can be safety, such as the health impact when a gunfire attack downed wastewater pumps at Duke Energy Substation, North Carolina, US, in 2022. The threats can also be economic, such as theft of copper wire, or they can be reliability, such as when a sniper attack on Pacific Gas & Electric’s Metcalf Substation in California, US, damaged 17 out of 21 power transformers in 2013.

    Considering the security risks organizations face, many are unifying physical, cyber, and information security systems to gain the long-term overall benefits a consolidated security strategy provides.

    Ida Siahaan
    Ida Siahaan

    Research Director, Security and Privacy Practice
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    Physical security is often managed by facilities, not by IT security, resulting in segmented security systems. Meanwhile, integrating physical and information security introduces challenges in:

    • Value proposition of investment in governing and managing integrated systems including the migration costs compared to separated security systems.
    • Addressing complex risks and vulnerabilities of an integrated security system.
    • Operationalizing on enhanced capabilities created by adoption of emerging and disruptive technologies.

    Common Obstacles

    Physical security systems integration is complex due to various components such as proprietary devices and protocols and hybrid systems of analog and digital technology. Thus, open architecture with comprehensive planning and design is important.

    However, territorial protection by existing IT and physical security managers may limit security visibility and hinder security integration.

    Additionally, integration poses challenges in staffing, training and awareness programs, and dependency on third-party technologies and their migration plans.

    Info-Tech's Approach

    Info-Tech’s approach is a modular, incremental, and repeatable process to integrate physical and information security that enables organizations to:

    • Determine effort and technical requirements to ensure the integration will meet the business needs.
    • Establish GRC processes including integrated risk management and compliance.
    • Design and deploy integrated security architecture.
    • Establish metrics to monitor the effectiveness and efficiency of the security program.

    Info-Tech Insight

    An integrated security architecture, including people, process, and technology, will improve your overall security posture. These benefits are leading many organizations to consolidate their siloed systems into a single platform across physical security, cybersecurity, HR, legal, and compliance.

    Existing information security models are not comprehensive

    Current security models do not cover all areas of security, especially if physical systems and personnel are involved and safety is also an important property required.

    • The CIA triad (confidentiality, integrity, availability) is a well-known information security model that focuses on technical policies related to technology for protecting information assets.
    • The US Government’s Five Pillars of Information Assurance includes CIA, authentication, and non-repudiation, but it does not cover people and processes comprehensively.
    • The AAA model, created by the American Accounting Association, has properties of authentication, authorization, and accounting but focuses only on access control.
    • Donn Parker expanded the CIA model with three more properties: possession, authenticity, and utility. This model, which includes people and processes, is known as the Parkerian hexad. However, it does not cover physical and personnel security.

    CIA Triad

    The CIA Triad for Information Security: Confidentiality, Integrity, Availability


    Parkerian Hexad

    The Parkerian Hexad for Security: Confidentiality, Possession, Utility, Availability, Authenticity and Integrity

    Sources: Parker, 1998; Pender-Bey, 2012; Cherdantseva and Hilton, 2015

    Adopt an integrated security model

    Adopt an integrated security model which consists of information security, physical security, personnel security, and organizational security.

    The security ecosystem is shifting from segregation to integration

    Security ecosystem is shifting from the past proprietary model to open interfaces and future open architecture

    Sources: Cisco, n.d.; Preparing for Technology Convergence in Manufacturing, Info-Tech Research Group, 2018

    Physical security includes:

    • Securing physical access,
      e.g. facility access control, alarms, surveillance cameras
    • Securing physical operations
      (operational technology – OT), e.g. programmable logic controllers (PLCs), SCADA

    Info-Tech Insight

    Why is integrating physical and information security gaining more and more traction? Because the supporting technologies are becoming more matured. This includes, for example, migration of physical security devices to IP-based network and open architecture.

    Reactive responses to physical security incidents

    April 1995

    Target: Alfred P. Murrah Federal Building, Oklahoma, US. Method: Bombing. Impact: Destroyed structure of 17 federal agencies, 168 casualties, over 800 injuries. Result: Creation of Interagency Security Committee (ISC) in Executive Order 12977 and “Vulnerability Assessment of Federal Facilities” standard.
    (Source: Office of Research Services, 2017)

    April 2013

    Target: Pacific Gas & Electric’s Metcalf Substation, California, US. Method: Sniper attack. Impact: Out of 21 power transformers, 17 were damaged. Result: Creation of Senate Bill No. 699 and NERC- CIP-014 standard.
    (Source: T&D World, 2023)

    Sep. 2022

    Target: Nord Stream gas pipelines connecting Russia to Germany, Baltic sea. Method: Detonations. Impact: Methane leaks (~300,000 tons) at four exclusive economic zones (two in Denmark and two in Sweden). Result: Sweden’s Security Service investigation.
    (Source: CNBC News, 2022)

    Dec. 2022

    Target: Duke Energy Substation, North Carolina, US. Method: Gunfire. Impact: Power outages of ~40,000 customers and wastewater pumps in sewer lift stations down. Result: State of emergency was declared.
    (Source: CBS News, 2022)

    Info-Tech Insight

    When it comes to physical security, we have been mostly reactive. Typically the pattern starts with physical attacks. Next, the impacted organization mitigates the incidents. Finally, new government regulatory measures or private sector or professional association standards are put in place. We must strive to change our pattern to become more proactive.

    Physical security market forecast and top physical security challenges

    Physical security market forecast
    (in billions USD)

    A forecast by MarketsandMarkets projected growth in the physical security market, using historical data from 2015 until 2019, with a CAGR of 6.4% globally and 5.2% in North America.

    A forecast by MarketsandMarkets projected growth in the physical security market, using historical data from 2015 until 2019, with a CAGR of 6.4% globally and 5.2% in North America.

    Source: MarketsandMarkets, 2022

    Top physical security challenges

    An Ontic survey (N=359) found that threat data management (40%) was the top physical security challenge in 2022, up from 33% in 2021, followed by physical security threats to the C-suite and company leadership (35%), which was a slight increase from 2021. An interesting decrease is data protection and privacy (32%), which dropped from 36% in 2021.

    An Ontic survey (N=359) found that threat data management (40%) was the top physical security challenge in 2022, up from 33% in 2021, followed by physical security threats to the C-suite and company leadership (35%), which was a slight increase from 2021. An interesting decrease is data protection and privacy (32%), which dropped from 36% in 2021.

    Source: Ontic Center for Protective Intelligence, 2022

    Info-Tech Insight

    The physical security market is growing in systems and services, especially the integration of threat data management with cybersecurity.

    Top physical security initiatives and operations integration investments

    We know the physical security challenges and how the physical security market is growing, but what initiatives are driving this growth? These are the top physical security initiatives and top investments for physical security operations integration:

    Top physical security initiatives

    The number one physical security initiative is integrating physical security systems. Other initiatives with similar concerns included data and cross-functional integration

    A survey by Brivo asked 700 security professionals about their top physical security initiatives. The number one initiative is integrating physical security systems. Other initiatives with similar concerns included data and cross-functional integration.

    Source: Brivo, 2022

    Top investments for physical security operations integration

    The number one investment is on access control systems with software to identify physical threat actors. Another area with similar concern is integration of digital physical security with cybersecurity.

    An Ontic survey (N=359) on areas of investment for physical security operations integration shows the number one investment is on access control systems with software to identify physical threat actors. Another area with similar concern is integration of digital physical security with cybersecurity.

    Source: Ontic Center for Protective Intelligence, 2022

    Evaluate security integration opportunities with these guiding principles

    Opportunity focus

    • Identify the security integration problems to solve with visible improvement possibilities
    • Don’t choose technology for technology’s sake
    • Keep an eye to the future
    • Use strategic foresight

    Piece by piece

    • Avoid taking a big bang approach
    • Test technologies in multiple conditions
    • Run inexpensive pilots
    • Increase flexibility
    • Build a technology ecosystem

    Buy-in

    • Collaborate with stakeholders
    • Gain and sustain support
    • Maintain transparency
    • Increase uptake of open architecture

    Key Recommendations:

    Focus on your master plan

    Build a technology ecosystem

    Engage stakeholders

    Info-Tech Insight

    When looking for a quick win, consider learning the best internal or external practice. For example, in 1994 IBM reorganized its security operation by bringing security professionals and non-security professionals in one single structure, which reduced costs by approximately 30% in two years.

    Sources: Create and Implement an IoT Strategy, Info-Tech Research Group, 2022; Baker and Benny, 2013; Erich Krueger, Omaha Public Power District (contributor); Doery Abdou, March Networks Corporate (contributor)

    Case Study

    4Wall Entertainment – Asset Owner

    Industry: Architecture & Engineering
    Source: Interview

    4Wall Entertainment is quite mature in integrating its physical and information security; physical security has always been under IT as a core competency.

    4Wall Entertainment is a provider of entertainment lighting and equipment to event venues, production companies, lighting designers, and others, with a presence in 18 US and UK locations.

    After many acquisitions, 4Wall Entertainment needed to standardize its various acquired systems, including physical security systems such as access control. In its integrated security approach, IT owns the integrated security, but they interface with related entities such as HR, finance, and facilities management in every location. This allows them to obtain information such as holidays, office hours, and what doors need to be accessed as inputs to the security system and to get sponsorship in budgeting.

    In the past, 4Wall Entertainment tried delegating specific physical security to other divisions, such as facilities management and HR. This approach was unsuccessful, so IT took back the responsibility and accountability.

    Currently, 4Wall Entertainment works with local vendors, and its biggest challenge is finding third-party vendors that can provide nationwide support.

    In the future, 4Wall Entertainment envisions physical security modernization such as camera systems that allow more network accessibility, with one central system to manage and IoT device integration with SIEM and MDR.

    Results

    Lessons learned in integrating security from 4Wall Entertainment include:

    • Start with forming relationships with related divisions such as HR, finance, and facilities management to build trust and encourage sponsorship across management.
    • Create policies, procedures, and standards to deploy in various systems, especially when acquiring companies with low maturity in security.
    • Select third-party providers that offer the required functionalities, good customer support, and standard systems interoperability.
    • Close skill gaps by developing training and awareness programs for users, especially for newly acquired systems and legacy systems, or by acquiring expertise from consulting services.
    • Complete cost-benefit analysis for solutions on legacy systems to determine whether to keep them and create interfacing with other systems, upgrade them, or replace them entirely with newer systems.
    • Delegate maintenance of specific highly regulated systems, such as fire alarms and water sprinklers, to facilities management.
    Integration of Physical and Information Security Framework. Inputs: Integrated Items, Stakeholders, and Security Components. Phases, Outcomes and Benefits: Plan, Enhance and Monitor & Optimize.

    Tracking progress of physical and information security integration

    Physical security is often part of facilities management. As a result, there are interdependencies with both internal departments (such as IT, information security, and facilities) and external parties (such as third-party vendors). IT leaders, security leaders, and operational leaders should keep the big picture in mind when designing and implementing integration of physical and information security. Use this checklist as a tool to track your security integration journey.

    Plan

    • Engage stakeholders and justify value for the business.
    • Define roles and responsibilities.
    • Establish/update governance for integrated security.
    • Identify integrated elements and compliance obligations.

    Enhance

    • Determine the level of security maturity and update security strategy for integrated security.
    • Assess and treat risks of integrated security.
    • Establish/update integrated physical and information security policies and procedures.
    • Update incident response, disaster recovery, and business continuity plan.

    Monitor & Optimize

    • Identify skill requirements and close skill gaps for integrating physical and information security.
    • Design and deploy integrated security architecture and controls.
    • Establish, monitor, and report integrated security metrics on effectiveness and efficiency.

    Benefits of the security integration framework

    Today’s matured technology makes security integration possible. However, the governance and management of single integrated security presents challenges. These can be overcome using a multi-phased framework that enables a modular, incremental, and repeatable integration process, starting with planning to justify the value of investment, then enhancing the integrated security based on risks and open architecture. This is followed by using metrics for monitoring and optimization.

    1. Modular

      • Implementing a consolidated security strategy is complex and involves the integration of process, software, data, hardware, and network and infrastructure.
      • A modular framework will help to drive value while putting in appropriate guardrails.
    2. Incremental

      • Integration of physical security and information security involves many components such as security strategy, risk management, and security policies.
      • An incremental framework will help track, manage, and maintain each step while providing appropriate structure.
    3. Repeatable

      • Integration of physical security and information security is a journey that can be approached with a pilot program to evaluate effectiveness.
      • A repeatable framework will help to ensure quick time to value and enable immediate implementation of controls to meet operational and security requirements.

    Potential risks of the security integration framework

    Just as medicine often comes with side effects, our Integration of Physical and Information Security Framework may introduce risks too. However, as John F. Kennedy, thirty-fifth president of the United States, once said, "There are risks and costs to a program of action — but they are far less than the long-range cost of comfortable inaction."

    Plan Phase

    • Lack of transparency in the integration process can lead to lack of trust among stakeholders.
    • Lack of support from leadership results in unclear governance or lack of budget or human resources.
    • Key stakeholders leave the organization during the engagement and their replacements do not understand the organization’s operation yet.

    Enhance Phase

    • The risk assessment conducted focuses too much on IT risk, which may not always be applicable to physical security systems nor OT systems.
    • The integrated security does not comply with policies and regulations.

    Monitor and Optimize Phase

    • Lack of knowledge, training, and awareness.
    • Different testing versus production environments.
    • Lack of collected or shared security metrics.

    Data

    • Data quality issues and inadequate data from physical security, information security, and other systems, e.g. OT, IoT.
    • Too much data from too many tools are complex and time consuming to process.

    Develop an integration of information security, physical security, and personnel security that meets your organization’s needs

    Integrate security in people, process, and technology to improve your overall security posture

    Having siloed systems running security is not beneficial. Many organizations are realizing the benefits of consolidating into a single platform across physical security, cybersecurity, HR, legal, and compliance.

    Plan and engage stakeholders

    Assemble the right team to ensure the success of your integrated security ecosystem, decide the governance model, and clearly define the roles and responsibilities.

    Enhance strategy and risk management

    Strategically, we want a physical security system that is interoperable with most technologies, flexible with minimal customization, functional, and integrated, despite the challenges of proprietary configurations, complex customization, and silos.

    Monitor and optimize

    Find the most optimized architecture that is strategic, realistic, and based on risk. Next, perform an evaluation of the security systems and program by understanding what, where, when, and how to measure and to report the relevant metrics.

    Focus on master plan

    Identify the security integration problems to solve with visible improvement possibilities, and don’t choose technology for technology’s sake. Design first, then conduct market research by comparing products or services from vendors or manufacturers.

    Build a technology ecosystem

    Avoid a big bang approach and test technologies in multiple conditions. Run inexpensive pilots and increase flexibility to build a technology ecosystem.

    Deliverables

    Each step of this framework is accompanied by supporting deliverables to help you accomplish your goals:

    Integrate Physical Security and Information Security Requirements Gathering Tool

    Map organizational goals to IT goals, facilities goals, OT goals (if applicable), and integrated security goals. Identify your security integration elements and compliance.

    Integrate Physical Security and Information Security RACI Chart Tool

    Identify various security integration stakeholders across the organization and assign tasks to suitable roles.

    Key deliverable:

    Integrate Physical Security and Information Security Communication Deck

    Present your findings in a prepopulated document that summarizes the work you have completed.

    Plan

    Planning is foundational to engage stakeholders. Start with justifying the value of investment, then define roles and responsibilities, update governance, and finally identify integrated elements and compliance obligations.

    Plan

    Engage stakeholders

    • To initiate communication between the physical and information security teams and other related divisions, it is important to identify the entities that would be affected by the security integration and involve them in the process to gain support from planning to delivery and maintenance.
    • Possible stakeholders:
      • Executive leadership, Facilities Management leader and team, IT leader, Security & Privacy leader, compliance officer, Legal, Risk Management, HR, Finance, OT leader (if applicable)
    • A successful security integration depends on aligning your security integration initiatives and migration plan to the organization’s objectives by engaging the right people to communicate and collaborate.

    Info-Tech Insight

    It is important to speak the same language. Physical security concerns safety and availability, while information security concerns confidentiality and integrity. Thus, the two systems have different goals and require alignment.

    Similarly, taxonomy of terminologies needs to be managed,1 e.g. facility management with an emergency management background may have a different understanding from a CISO with an information security background when discussing the same term. For example:

    In emergency management prevention means “actions taken to eliminate the impact of disasters in order to protect lives, property and the environment, and to avoid economic disruption.”2

    In information security prevention is “preventing the threats by understanding the threat environment and the attack surfaces, the risks, the assets, and by maintaining a secure system.”3

    Sources: 1 Owen Yardley, Omaha Public Power District (contributor); 2 Translation Bureau, Government of Canada, n.d.; 3 Security Intelligence, 2020


    Map organizational goals to integrated security goals

    Input

    • Corporate, IT, and Facilities strategies

    Output

    • Your goals for the integrated security strategy

    Materials

    • Integrate Physical Security and Information Security Requirements Gathering Tool

    Participants

    • Executive leadership
    • Facilities Management leader and team
    • IT leader
    • Security & Privacy leader
    • Compliance officer
    • Legal
    • Risk Management
    • HR & Finance
    • OT leader (if applicable)
    1. As a group, brainstorm organization goals.
      • Review relevant corporate, IT, and facilities strategies.
    2. Record the most important business goals in the “Goals Cascade” tab of the Integrate Physical Security and Information Security Requirements Gathering Tool. Try to limit the number of business goals to no more than ten goals. This limitation will be critical to helping focus on your integrated security goals.
    3. For each goal, identify one to two security alignment goals. These should be objectives for the security strategy that will support the identified organization goals.

    Download the Integrate Physical Security and Information Security Requirements Gathering Tool.

    Record organizational goals

    A table to identify Organization, IT, OT(if applicable), Facilities, and Security Goals Definitions.

    Refer to the Integration of Physical and Information Security Framework when filling in the table.

    1. Record your identified organizational goals in the “Goals Cascade” tab of the Integrate Physical Security and Information Security Requirements Gathering Tool.
    2. For each organizational goal, identify IT alignment goals.
    3. For each organizational goal, identify OT alignment goals (if applicable).
    4. For each organizational goal, identify Facilities alignment goals.
    5. For each organizational goal, select an integrated security goal from the drop-down menu.

    Justify value for the business

    Facilities in most cases have a team that is responsible for physical security installations such as access key controllers. Whenever there is an issue, they contact the provider to fix the error. However, with smart buildings and smart devices, the threat surface grows to include information security threats, and Facilities may not possess the knowledge and skills required to deal with them. At the same time, delegating physical security to IT may add more tasks to their already-too-long list of responsibilities. Consolidating security to a focused security team that covers both physical and information security can help.1 We need to develop the security integration business case beyond physical security "gates, guns, and guards" mentality.2

    An example of a cost-benefit analysis for security integration:

    Benefits

    Metrics

    Operational Efficiency and Cost Savings

    • Reduction in deployment, maintenance, and staff time in manual operations of physical security devices such as logs collection from analog cameras to be automated into digital.
    • Reduction in staffing costs by bringing physical security SOC and information security SOC in one single structure.

    Reliability Improvements

    • Reduction in field crew time by identifying hardware that can be virtualized to have a centralized remote control.
    • Improvement of operating reliability through continuous and real-time monitoring of equipment such as door access control systems and camera surveillance systems.

    Customers & Users Benefits

    • Improvement of customer safety for essential services such as access to critical locations only by authorized personnel.
    • Improvement of reliability of services and address human factor in adoption of change by introducing change as a friendly activity.

    Cost

    Metrics

    Equipment and Infrastructure

    • Upgrade of existing physical security equipment, e.g. replacement of separated access control, video management system (VMS), and physical access control system (PACS) with a unified security platform.
    • Implementation of communication network equipment and labor to install, configure, and maintain the new network component.

    Software and Commission

    • The software and maintenance fee as well as upgrade implementation project cost.
    • Labor cost of field commissioning and troubleshooting.
    • Integration with security systems, e.g. event and log management, continuous monitoring, and investigation.

    Support and Resources

    • Cost to hire/outsource security FTEs for ongoing management and operation of security devices, e.g. SOC, MSSP.
    • Cost to hire/outsource FTEs to analyze, design, and deploy the integrated security architecture, e.g. consulting fee.

    Sources: 1 Andrew Amaro, KLAVAN Security Services (contributor); 2 Baker and Benny, 2013;
    Industrial Control System Modernization, Info-Tech Research Group, 2023; Lawrence Berkeley National Laboratory, 2021

    Plan

    Define roles and responsibilities

    Input

    • List of relevant stakeholders

    Output

    • Roles and responsibilities for the integration of physical and information security program

    Materials

    • Integrate Physical Security and Information Security RACI Chart Tool

    Participants

    • Executive leadership
    • Facilities Management leader and team
    • HR & Finance
    • IT leader and team
    • OT leader and team
    • Security & Privacy leader and team

    Many factors impact an organization’s level of effectiveness as it relates to integration of physical and information security. How the team interacts, what skill sets exist, the level of clarity around roles and responsibilities, and the degree of executive support and alignment are only a few. Thus, we need to identify stakeholders that are:

    • Responsible: The person(s) who does the work to accomplish the activity; they have been tasked with completing the activity and/or getting a decision made.
    • Accountable: The person(s) who is accountable for the completion of the activity. Ideally, this is a single person and is often an executive or program sponsor.
    • Consulted: The person(s) who provides information. This is usually several people, typically called subject matter experts (SMEs).
    • Informed: The person(s) who is updated on progress. These are resources that are affected by the outcome of the activities and need to be kept up to date.

    Download the Integrate Physical Security and Information Security RACI Chart Tool

    Define RACI chart

    Define Responsible, Accountable, Consulted, Informed (RACI) stakeholders.

    1. Customize the Work Units to best reflect your operation with applicable stakeholders.
    2. Customize the Action rows as required.

    Integrate Physical Security and Information Security RACI Chart

    Sources: ISC, 2015; ISC, 2021

    Info-Tech Insight

    The roles and responsibilities should be clearly defined. For example, IT Security should be responsible for the installation and configuration of all physical access controllers and devices, and facility managers should be responsible for the physical maintenance including malfunctioning such as access device jammed or physically broken.

    Plan

    Establish/update governance for integrated security

    HR & Finance

    HR provides information such as new hires and office hours as input to the security system. Finance assists in budgeting.

    Security & Privacy

    The security and privacy team will need to evaluate solutions and enforce standards on various physical and information security systems and to protect data privacy.

    Business Leaders

    Business stakeholders will provide clarity for their strategy and provide input into how they envision security furthering those goals.

    IT Executives

    IT stakeholders will be a driving force, ensuring all necessary resources are available and funded.

    Facilities/ Operations

    Operational plans will include asset management, monitoring, and support to meet functional goals and manage throughout the asset lifecycle.

    Infrastructure & Enterprise Architects

    Each solution added to the environment will need to be chosen and architected to meet business goals and security functions.

    Info-Tech Insight

    Assemble the right team to ensure the success of your integrated security ecosystem and decide the governance model, e.g. security steering committee (SSC) or a centralized single structure.

    Adapted from Create and Implement an IoT Strategy, Info-Tech Research Group, 2022

    What does the SSC do?

    Ensuring proper governance over your security program is a complex task that requires ongoing care and feeding from executive management to succeed.

    Your SSC should aim to provide the following core governance functions for your security program:

    1. Define Clarity of Intent and Direction

      How does the organization’s security strategy support the attainment of the business, IT, facilities management, and physical and information security strategies? The SSC should clearly define and communicate strategic linkage and provide direction for aligning security initiatives with desired outcomes.
    2. Establish Clear Lines of Authority

      Security programs contain many important elements that need to be coordinated. There must be clear and unambiguous authority, accountability, and responsibility defined for each element so lines of reporting/escalation are clear and conflicting objectives can be mediated.
    3. Provide Unbiased Oversight

      The SSC should vet the organization’s systematic monitoring processes to ensure there is adherence to defined risk tolerance levels and that monitoring is appropriately independent from the personnel responsible for implementing and managing the security program.
    4. Optimize Security Value Delivery

      Optimized value delivery occurs when strategic objectives for security are achieved and the organization’s acceptable risk posture is attained at the lowest possible cost. This requires constant attention to ensure controls are commensurate with any changes in risk level or appetite.

    Adapted from Improve Security Governance With a Security Steering Committee , Info-Tech Research Group, 2018

    Plan

    Identify integrated elements and compliance obligations

    To determine what elements need to be integrated, it’s important to scope the security integration program and to identify the consequences of integration for compliance obligations.

    INTEGRATED ELEMENTS

    What are my concerns?

    Process integrations

    Determine which processes need to be integrated and how

    • Examples: Security prevention, detection, and response; risk assessment

    Software and data integration

    Determine which software and data need to be integrated and how

    • Examples: Threat management tools, SIEM, IDPS, security event logs

    Hardware integration

    Determine which hardware needs to be integrated and how

    • Examples: Sensors, alarms, cameras, keys, locks, combinations, and card readers

    Network and infrastructure

    Determine which network and infrastructure components need to be integrated and how

    • Example: Network segmentation for physical access controllers.

    COMPLIANCE

    How can I address my concerns?

    Regulations

    Adhere to mandatory laws, directives, industry standards, specific contractual obligations, etc.

    • Examples: NERC CIP (North American Utilities), Network and Information Security (NIS) Directive (EU), Health and Safety at Work etc Act 1974 (UK), Occupational Safety and Health Act, 1970 (US), Emergency Management Act, 2007 (Canada)

    Standards

    Adhere to voluntary standards and obligations

    • Examples: NIST Cybersecurity Framework (CSF), The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard (US), Cybersecurity Maturity Model Certification (CMMC), Service Organization Control (SOC 1 and 2)

    Guidelines

    Adopt guidelines that can improve the integrated security program

    • Examples: Best Practices for Planning and Managing Physical Security Resources (US Interagency Security Committee), Information Security Manual - Guidelines for Physical Security (Australian Cyber Security Centre), 1402-2021-Guide for Physical Security of Electric Power Substations (IEEE)

    Record integrated elements

    Scope and Boundaries from the Integrate Physical Security and Information Security Requirements Gathering Tool.

    Refer to the “Scope” tab of the Integrate Physical Security and Information Security Requirements Gathering Tool when filling in the following elements.

    1. Record your integrated elements, i.e. process integration, software and data integration, hardware integration, network and infrastructure, and physical scope of your security integration, in the “Scope” tab of the Integrate Physical Security and Information Security Requirements Gathering Tool.
    2. For each of your scoping give the rationale for including them in the Comments column. Careful attention should be paid to any elements that are not in scope.

    Record your compliance obligations

    Refer to the “Compliance Obligations” tab of the Integrate Physical Security and Information Security Requirements Gathering Tool.

    1. Identify your compliance obligations. These can include both mandatory and voluntary obligations. Mandatory obligations include:
      • Laws
      • Government regulations
      • Industry standards
      • Contractual agreements
      Voluntary obligations include standards that the organization has chosen to follow for best practices and any obligations that are required to maintain certifications. Organizations will have many different compliance obligations. For the purposes of your integrated security, include those that include physical security requirements.
    2. Record your compliance obligations, along with any notes, in your copy of the Integrate Physical Security and Information Security Requirements Gathering Tool.
    3. Refer to the “Compliance DB” tab for lists of standards/regulations/ guidelines.
    The “Compliance Obligations” tab of the Integrate Physical Security and Information Security Requirements Gathering Tool.

    Remediate third-party compliance gaps

    If you have third-party compliance gaps, there are four primary ways to eliminate them:

    1. Find a New, Compliant Partner

      Terminate existing contract and find another organization to partner with.
    2. Bring the Capability In-House

      Expense permitting, this may be the best way to protect yourself.
    3. Demand Compliance

      Tell the third party they must become compliant. Make sure you set a deadline.
    4. Accept Noncompliance and Assume the Risk

      Sometimes remediation just isn’t cost effective and you have no choice.

    Follow Contracting Best Practices to Mitigate the Risk of Future Third-Party Compliance Gaps

    1. Perform Initial Due Diligence: Request proof of third-party compliance prior to entering into a contract.
    2. Perform Ongoing Due Diligence: Request proof of third-party contractor compliance annually.
    3. Contract Negotiation: Insert clauses requesting periodic assertions of compliance.

    View a sample contract provided by the US Department of Health and Human Services.

    Source: Take Control of Compliance Improvement to Conquer Every Audit, Info-Tech Research Group, 2015

    Pitfalls to avoid when planning security integration

    • No Resources Lineups

      Integration of security needs support from leadership, proper planning, and clear and consistent communication across the organization.
    • Not Addressing Holistic Security

      Create policies and procedures and follow standards that are holistic and based on threats and risks, e.g. consolidated access control policies.
    • Lack of Governance

      While the IT department is a critical partner in cybersecurity, the ownership of such a role sits squarely in the organizational C-suite, with regular reporting to the board of directors (if applicable).
    • Overlooking Business Continuity Effort

      IT and physical security are integral to business continuity and disaster recovery strategies.
    • Not Having Relevant Training and Awareness

      Provide a training and awareness program based on relevant attack vectors. Trained employees are key assets to the development of a safe and secure environment. They must form the base of your security culture.
    • Overbuilding or Underbuilding

      Select third-party providers that offer systems interoperability with other security tools. The intent is to promote a unified approach to security to avoid a cumbersome tooling zoo.

    Sources: Real Time Networks, 2022; Andrew Amaro, KLAVAN Security Services (contributor)

    Enhance

    Enhancing is the development of an integrated security strategy, policies, procedures, BCP, DR, and IR based on the organization’s risks.

    Enhance

    Determine the level of security maturity and update the security strategy

    • Before updating your security strategies, you need to understand the organization’s business strategies, IT strategies, facilities strategies, and physical and information security strategies. The goal is to align your integrated security strategies to contribute to your organization’s success.
    • The integrated security leaders need to understand the direction of the organization. For example:
      • Growth expectation
      • Expansions or mergers anticipation
      • Product or service changes
      • Regulatory requirements
    • Wise security investments depend on aligning your security initiatives to the organization’s objectives by supporting operational performance and ensuring brand protection and shareholder values.
    Integrated security strategies. Consists of an organization’s business strategies, IT strategies, facilities strategies, and physical and information security strategies.

    Sources: Amy L. Meger, Platte River Power Authority (contributor); Baker and Benny, 2013; IFSEC Global, 2023; Security Priorities 2023, Info-Tech Research Group, 2023; Build an Information Security Strategy, Info-Tech Research Group, 2020; ISC, n.d.

    Understanding security maturity

    Maturity models are very effective for determining security states. This table provides examples of general descriptions for physical and information security maturity levels.

    Determine which framework is suitable and select the description that most accurately reflects the ideal state for security in your organization.

    Level 1

    Level 2

    Level 3

    Level 4

    Level 5

    Minimum security with simple physical barriers. Low-level security to prevent and detect some unauthorized external activity. Medium security to prevent, detect, and assess most unauthorized external activity and some unauthorized internal activity. High-level security to prevent, detect, and assess most unauthorized external and internal activity. Maximum security to prevent, detect, assess, and neutralize all unauthorized external and internal activity.

    Physical security maturity level1

    Initial/Ad hoc security programs are reactive. Developing security programs can be effective at what they do but are not holistic. A defined security program is holistic, documented, and proactive. Managed security programs have robust governance and metrics processes. An optimized security program is based on strong risk management practices, including the production of key risk indicators (KRIs).

    Information security maturity level2

    Sources: 1 Fennelly, 2013; 2 Build an Information Security Strategy, Info-Tech Research Group, 2020

    Enhance

    Assess and treat integrated security risks

    The risk assessment conducted consists of analyzing existing inherent risks, existing pressure to the risks such as health and safety laws and codes of practice, new risks from the integration process, risk tolerance, and countermeasures.

    • Some organizations already integrate security into corporate security that consists of risk management, compliance, governance, information security, personnel security, and physical security. However, some organizations are still separating security components, especially physical security and information security, which limits security visibility and the organization’s ability to complete a comprehensive risks assessment.
    • Many vendors are also segregating physical security and information security solutions because their tools do well only on certain aspects. This forces organizations to combine multiple tools, creating a complex environment.
    • Additionally, risks related to people such as mental health issues must be addressed properly. The prevalence of hybrid work post-pandemic makes this aspect especially important.
    • Assess and treat risks based on the organization’s requirements, including its environments. For example, the US federal facility security organization is required to conduct risk assessments at least every five years for Level I (lowest risk) and Level II facilities and at least every three years for Level III, IV, and V (highest risk) facilities.

    Sources: EPA, n.d.; America's Water Infrastructure Act (AWIA), 2018; ISC, 2021

    “In 2022, 95% of US companies are consolidating into a single platform across physical security, cybersecurity, HR, legal and compliance.”

    Source: Ontic Center for Protective Intelligence, 2022; N=359

    Example risk levels

    The risk assessment conducted is based on a combination of physical and information security factors such as certain facilities factors. The risk level can be used to determine the baseline level of protection (LOP). Next, the baseline LOP is customized to the achievable LOP. The following is an example for federal facilities determined by Interagency Security Committee (ISC).

    Risk factor, points and score. Facility security level (FSL), level of risk, and baseline level of protection.

    Source: ISC, 2021

    Example assets

    It is important to identify the organization’s requirements, including its environments (IT, IoT, OT, facilities, etc.), and to measure and evaluate its risks and threats using an appropriate risk framework and tools with the critical step of identifying assets prior to acquiring solutions.

    Organizational requirements including its environments(IT, loT, OT, facilities, etc.)

    Info-Tech Insight

    Certain exceptions must be identified in risk assessment. Usually physical barriers such as gates and intrusion detection sensors are considered as countermeasures,1 however, under certain assessment, e.g. America's Water Infrastructure Act (AWIA),2 physical barriers are also considered assets and as such must also be assessed.

    Compromising a fingerprint scanner

    An anecdotal example of why physical security alone is not sufficient.

    Biometrics: secure access and data security.

    Image by Rawpixel.com on Freepik

    Lessons learned from using fingerprints for authentication:

    • Fingerprint scanners can be physically circumvented by making a copy an authorized user’s fingerprint with 3D printing or even by forcefully amputating an authorized user’s finger.
    • Authorized users may not be given access when the fingerprint cannot be recognized, e.g. if the finger is covered by bandage due to injury.
    • Integration with information security may help detect unauthorized access, e.g. a fingerprint being scanned in a Canadian office when the same user was scanned at a close time interval from an IP in Europe will trigger an alert of a possible incident.

    Info-Tech Insight

    In an ideal world, we want a physical security system that is interoperable with all technologies, flexible with minimal customization, functional, and integrated. In the real world, we may have physical systems with proprietary configurations that are not easily customized and siloed.

    Source: Robert Dang, Info-Tech Research Group

    Use case: Microchip implant

    Microchip implants can be used instead of physical devices such as key cards for digital identity and access management. Risks can be assessed using quantitative or qualitative approaches. In this use case a qualitative approach is applied to impact and likelihood, and a quantitative approach is applied to revenue and cost.

    Asset: Microchip implant

    Benefits

    Impact

    • Improve user satisfaction by removing the need to carry key cards, IDs, etc.
    • Improve operating reliability by reducing the likelihood of losing physical devices such as key cards.
    • Improve reliability of services through continuous and real-time connection with other systems such as payment system.

    Likelihood

    • Improve user satisfaction: High
    • Improve operating reliability: High
    • Improve reliability of services: High

    Revenue

    • Acquire new customers or retain existing customers by making daily lives easier with no need to carry key cards, IDs, etc.
    • Cost reduction in staffing of security personnel, e.g. reducing the staffing of building guards or receptionist.

    Risks

    Impact

    • Security: issues such as biohacking of wearable technology and interconnected devices.
    • Safety: issues such as infections or reactions in the body's immune system.
    • Privacy: issues such as unauthorized surveillance and tracking of activities.

    Likelihood

    • Biohacking: Medium
    • Infections: Low
    • Surveillance: High

    Cost

    • Installation costs and hardware costs.
    • Overall lifecycle cost including estimated software and maintenance costs.
    • Estimated cost of training and estimated increase in productivity.

    Sources: Business Insider, 2018; BBC News, 2022; ISC, 2015

    Enhance

    Update integrated security policies and procedures

    Global policies with local implementation

    This model works for corporate groups with a parent company. In this model, global security policies are developed by a parent company and local policies are applied to the unique business that is not supported by the parent company.

    Update of existing security policies

    This model works for organizations with sufficient resources. In this model, integrated security policies are derived from various policies. For example, physical security in smart buildings/devices (sensors, automated meters, HVAC, etc.) and OT systems (SCADA, PLCs, RTUs, etc.) introduce unique risk exposures, necessitating updates to security policies.

    Customization of information security policies

    This model works for smaller organizations with limited resources. In this model, integrated security policies are derived from information security policies. The issue is when these policies are not applicable to physical security systems or other environments, e.g. OT systems.

    Sources: Kris Krishan, Waymo (contributor); Isabelle Hertanto, Info-Tech Research Group (contributor); Physical and Environmental Security Policy Template, Info-Tech Research Group, 2022.

    Enhance

    Update BCP, DR, IR

    • Physical threats such as theft of material, vandalism, loitering, and the like are also part of business continuity threats.
    • These threats can be carried out by various means such as vehicles breaching perimeter security, bolt cutters used for cutting wire and cable, and ballistic attack.
    • Issues may occur when security operations are owned separately by physical security or information security, thus lacking consistent application of best practices.
    • To overcome this issue, organizations need to update BCP, DR, and IR holistically based on a cost-benefit analysis and the level of security maturity, which can be defined based on the suitable framework.

    Sources: IEEE, 2021; ISC, 2021

    “The best way to get management excited about a disaster plan is to burn down the building across the street.”

    Source: Dan Erwin, Security Officer, Dow Chemical Co., in Computerworld, 2022

    Optimize

    Optimizing means working to make the most effective and efficient use of resources, starting with identifying skill requirements and closing skill gaps, followed by designing and deploying integrated security architecture and controls, and finally monitoring and reporting integrated security metrics.

    Optimize

    Identify skill requirements and close skill gaps

    • The pandemic changed how people work and where they choose to work, and most people still want a hybrid work model. Our survey in July 2022 (N=516) found that 55.8% of employees have the option to work offsite 2-3 days per week, 21.0% can work offsite 1 day per week, and 17.8% can work offsite 4 days per week.
    • The investment (e.g. on infrastructure and networks) to initiate remote work was huge, and the costs didn’t end there; organizations needed to maintain the secure remote work infrastructure to facilitate the hybrid work model.
    • Moreover, roles are evolving due to convergence and modernization. These new roles require an integrative skill set. For example, the grid security and ops team might consist of an IT security specialist, a SCADA technician/engineer, and an OT/IIOT security specialist, where OT/IIOT security specialist is a new role.
    Identify skill gaps that hinder the successful execution of the hybrid work security strategy. Use the identified skill gaps to define the technical skill requirements for current and future work roles. Conduct a skills assessment on your current workforce to identify employee skill gaps. Decide whether to train (including certification), hire, contract, or outsource to close each skill gap.

    Strategic investment in internal security team

    Internal security governance and management using in-house developed tools or off-the-shelf solutions, e.g. security information and event management (SIEM).

    Security management using third parties

    Internal security management using third-party security services, e.g. managed security service providers (MSSPs).

    Outsourcing security management

    Outsourcing the entire security functions, e.g. using managed detection and response (MDR).

    Sources: Info-Tech Research Group’s Security Priorities 2023, Close the InfoSec Skills Gap, Build an IT Employee Engagement Program, and Grid Modernization

    Select the right certifications

    What are the options?

    • One issue in security certification is the complexity of relevancy in topics with respect to roles and levels.
    • The European Union Agency for Cybersecurity (ENISA) takes the approach of analyzing existing certifications of ICS/SCADA professionals' cybersecurity skills by orientation, scope, and supporting bodies that are grouped into specific certifications, relevant certifications, and safety certifications (ENISA, 2015).
    • This approach can also be applied to integrated security certifications.

    Physical security certification

    • Examples: Industrial Security Professional Certification (NCMS-ISP); Physical Security Professional (ASIS-PSP); Physical Security Certification (CDSE-PSC); ISC I-100, I-200, I-300, and I-400

    Cyber physical system security certification

    • Examples: Certified SCADA Security Architect (CSSA), EC-Council ICS/SCADA Cybersecurity Training Course

    Information security certification

    • Examples: Network and Information Security (NIS) Driving License, ISA/IEC 62443 Cybersecurity Certificate Program, GIAC Global Industrial Cyber Security Professional (GICSP)

    Safety Certifications

    • Examples: Board of Certified Safety Professionals (BCSP), European Network of Safety and Health Professional Organizations (ENSHPO)
    Table showing options for Certification orientation, scope and supporting bodies.

    Optimize

    Design and deploy integrated security architecture and controls

    • A survey by Brivo found that 38% of respondents have partly centralized security platforms, 25% have decentralized platforms, and 36% have centralized platforms (Brivo, 2022; N=700).
    • If your organization’s security program is still decentralized or partly centralized and your organization is planning to establish an integrated security program, then the recommendation is to perform a holistic risk assessment based on probability and impact assessments on threats and vulnerabilities.
    • The impacted factors, for example, are customers served, criticality of services, equipment present inside the building, personnel response time for operational recovery and the mitigation of hazards, and costs.
    • Frameworks such as Sherwood Applied Business Security Architecture (SABSA), Control Objectives for Information and Related Technologies (COBIT), and The Open Group Architecture Framework (TOGAF) can be used to build security architecture that aligns security goals with business goals.
    • Finally, analyze the security design against the design criteria.

    Sources: ISA and Honeywell Integrated Security Technology Lab, n.d.; IEEE, 2021

    “As long as organizations treat their physical and cyber domains as separate, there is little hope of securing either one.”

    Source: FedTech magazine, 2009

    Analyze architecture design

    Cloud, on-premises, or hybrid? During the pandemic, many enterprises were under tight deadlines to migrate to the cloud. Many did not refactor data and applications correctly for cloud platforms during migration, with the consequence of high cloud bills. This happened because the migrated applications cannot take advantage of on-premises capabilities such as autoscaling. Thus, in 2023, it is plausible that enterprises will bring applications and data back on-premises.

    Below is an example of a security design analysis of platform architecture. Design can be assessed using quantitative or qualitative approaches. In this example, a qualitative approach is applied using high-level advantages and disadvantages.

    Design criteria

    Cloud

    Hybrid

    On-premises

    Effort

    Consumer effort is within a range, e.g. < 60%

    Consumer effort is within a range e.g. < 80%

    100% organization

    Reliability

    High reliability

    High reliability

    Medium reliability that depends on data centers

    Cost

    High cost when data and applications are not correctly designed for cloud

    Optimized cost when data and applications are correctly designed either for cloud or native

    Medium cost when data and applications take advantage of on-prem capabilities

    Info-Tech Insight

    It is important for organizations to find the most optimized architecture to support them, for example, a hybrid architecture of cloud and on-premises based on operations and cost-effectiveness. To help design a security architecture that is strategic, realistic, and based on risk, see Info-Tech’s Identify the Components of Your Cloud Security Architecture research.

    Sources: InfoWorld, 2023; Identify the Components of Your Cloud Security Architecture , Info-Tech Research Group, 2021

    Analyze equipment design

    Below is an example case of a security design analysis of electronic security systems. Design can be assessed using quantitative or qualitative approaches. In this example a qualitative approach is applied using advantages and disadvantages.

    Surveillance design criteria

    Video camera

    Motion detector

    Theft of security system equipment

    Higher economic loss Lower economic loss

    Reliability

    Positive detection of intrusion Spurious indication and lower reliability

    Energy savings and bandwidth

    Only record when motion is detected Detect and process all movement

    Info-Tech Insight

    Once the design has been analyzed, the next step is to conduct market research to analyze the solutions landscape, e.g. to compare products or services from vendors or manufacturers.

    Sources: IEEE, 202; IEC, n.d.; IEC, 2013

    Analyze off-the-shelf solutions

    Criteria to consider when comparing solutions:

    Criteria to consider when comparing solutions: 1 - Visibility and asset management. 2 - Threat detection, mitigation and response. 3 - Risk assessment and vulnerability management. 4 - Usability, architecture, Cost.

    Visibility and Asset Management

    Passively monitoring data using various protocol layers, actively sending queries to devices, or parsing configuration files of physical security devices, OT, IoT, and IT environments on assets, processes, and connectivity paths.

    Threat Detection, Mitigation, and Response (+ Hunting)

    Automation of threat analysis (signature-based, specification-based, anomaly-based, flow-based, content-based, sandboxing) not only in IT but also in relevant environments, e.g. physical, IoT, IIoT, and OT on assets, data, network, and orchestration with threat intelligence sharing and analytics.

    Risk Assessment and Vulnerability Management

    Risk scoring approach (qualitative, quantitative) based on variables such as behavioral patterns and geolocation. Patching and vulnerability management.

    Usability, Architecture, Cost

    The user and administrative experience, multiple deployment options, extensive integration capabilities, and affordability.

    Source: Secure IT/OT Convergence, Info-Tech Research Group, 2022

    Optimize

    Establish, monitor, and report integrated security metrics

    Security metrics serve various functions in a security program.1 For example:

    • As audit requirements. For integrated security, the requirements are derived from mandatory or voluntary compliance, e.g. NERC CIP.
    • As an indicator of maturity level. For integrated security, maturity level is used to measure the state of security, e.g. C2M2, CMMC.
    • As a measurement of effectiveness and efficiency. Security metrics consist of operational metrics, financial metrics, etc.

    Safety

    Physical security interfaces with the physical world. Thus, metrics based on risks related to safety are crucial. These metrics motivate personnel by making clear why they should care about security.
    Source: EPRI, 2017

    Business Performance

    The impact of security on the business can be measured with various metrics such as operational metrics, service level agreements (SLAs), and financial metrics.
    Source: BMC, 2022

    Technology Performance

    Early detection leads to faster remediation and less damage. Metrics such as maximum tolerable downtime (MTD) and mean time to recovery (MTR) indicate system reliability.
    Source: Dark Reading, 2022

    Security Culture

    Measure the overall quality of security culture with indicators such as compliance and audit, vulnerability management, and training and awareness.

    Info-Tech Insight

    Security failure can be avoided by evaluating the security systems and program. Security evaluation requires understanding what, where, when, and how to measure and to report the relevant metrics.

    Related Info-Tech Research

    Secure IT/OT Convergence

    The previously entirely separate OT ecosystem is migrating into the IT ecosystem, primarily to improve access via connectivity and to leverage other standard IT capabilities for economic benefit.

    Hence, IT and OT need to collaborate, starting with communication to build trust and to overcome their differences and followed by negotiation on components such as governance and management, security controls on OT environments, compliance with regulations and standards, and establishing metrics for OT security.

    Preparing for Technology Convergence in Manufacturing

    Information technology (IT) and operational technology (OT) teams have a long history of misalignment and poor communication.

    Stakeholder expectations and technology convergence create the need to leave the past behind and build a culture of collaboration.

    Build an Information Security Strategy

    Info-Tech has developed a highly effective approach to building an information security strategy – an approach that has been successfully tested and refined for over seven years with hundreds of organizations.

    This unique approach includes tools for ensuring alignment with business objectives, assessing organizational risk and stakeholder expectations, enabling a comprehensive current-state assessment, prioritizing initiatives, and building a security roadmap.

    Bibliography

    "1402-2021 - IEEE Guide for Physical Security of Electric Power Substations." IEEE, 2021. Accessed 25 Jan. 2023.

    "2022 State of Protective Intelligence Report." Ontic Center for Protective Intelligence, 2022. Accessed 16 Jan. 2023.

    "8 Staggering Statistics: Physical Security Technology Adoption." Brivo, 2022. Accessed 5 Jan. 2023.

    "America's Water Infrastructure Act of 2018." The United States' Congress, 2018. Accessed 19 Jan. 2023.

    Baker, Paul and Daniel Benny. The Complete Guide to Physical Security. Auerbach Publications. 2013

    Bennett, Steve. "Physical Security Statistics 2022 - Everything You Need to Know." WebinarCare, 4 Dec. 2022. Accessed 30 Dec. 2022.

    "Best Practices for Planning and Managing Physical Security Resources: An Interagency Security Committee Guide." Interagency Security Committee (ISC), Dec. 2015. Accessed 23 Jan. 2023.

    Black, Daniel. "Improve Security Governance With a Security Steering Committee." Info-Tech Research Group, 23 Nov. 2018. Accessed 30 Jan. 2023.

    Borg, Scott. "Don't Put Up Walls Between Your Security People." FedTech Magazine, 17 Feb. 2009. Accessed 15 Dec. 2022.

    Burwash, John. “Preparing for Technology Convergence in Manufacturing.” Info-Tech Research Group, 12 Dec. 2018. Accessed 7 Dec. 2022.

    Carney, John. "Why Integrate Physical and Logical Security?" Cisco. Accessed 19 Jan. 2023.

    "Certification of Cyber Security Skills of ICS/SCADA Professionals." European Union Agency for Cybersecurity (ENISA), 2015. Accessed 27 Sep. 2022.

    Cherdantseva, Yulia and Jeremy Hilton. "Information Security and Information Assurance. The Discussion about the Meaning, Scope and Goals." Organizational, Legal, and Technological Dimensions of IS Administrator, Almeida F., Portela, I. (eds.), pp. 1204-1235. IGI Global Publishing, 2013.

    Cobb, Michael. "Physical security." TechTarget. Accessed 8 Dec. 2022.

    “Conduct a Drinking Water or Wastewater Utility Risk Assessment.” United States Environmental Protection Agency (EPA), n.d. Web.

    Conrad, Sandi. "Create and Implement an IoT Strategy." Info-Tech Research Group, 28 July 2022. Accessed 7 Dec. 2022.

    Cooksley, Mark. "The IEC 62443 Series of Standards: A Product Manufacturer's Perspective." YouTube, uploaded by Plainly Explained, 27 Apr. 2021. Accessed 26 Aug. 2022.

    "Cyber and physical security must validate their value in 2023." IFSEC Global, 12 Jan. 2023. Accessed 20 Jan. 2023.

    "Cybersecurity Evaluation Tool (CSET®)." Cybersecurity and Infrastructure Security Agency (CISA). Accessed 23 Jan. 2023.

    "Cybersecurity Maturity Model Certification (CMMC) 2.0." The United States' Department of Defense (DOD), 2021. Accessed 29 Dec. 2022.

    “Cyber Security Metrics for the Electric Sector: Volume 3.” Electric Power Research Institute (EPRI), 2017.

    Czachor, Emily. "Mass power outage in North Carolina caused by gunfire, repairs could take days." CBS News, 5 Dec. 2022. Accessed 20 Jan. 2023.

    Dang, Robert, et al. “Secure IT/OT Convergence.” Info-Tech Research Group, 9 Dec. 2022. Web.

    "Emergency Management Act (S.C. 2007, c. 15)." The Government of Canada, 2007. Accessed 19 Jan. 2023.

    "Emergency management vocabulary." Translation Bureau, Government of Canada. Accessed 19 Jan. 2023.

    Fennelly, Lawrence. Effective physical security. Butterworth-Heinemann, 2013.

    Ghaznavi-Zadeh, Rassoul. "Enterprise Security Architecture - A Top-down Approach." The Information Systems Audit and Control Association (ISACA). Accessed 25 Jan. 2023.

    "Good Practices for Security of Internet of Things." European Union Agency for Cybersecurity (ENISA), 2018. Accessed 27 Sep. 2022.

    "Health and Safety at Work etc Act 1974." The United Kingdom Parliament. Accessed 23 Jan. 2023.

    Hébert, Michel, et al. “Security Priorities 2023.” Info-Tech Research Group, 1 Feb. 2023. Web.

    "History and Initial Formation of Physical Security and the Origin of Authority." Office of Research Services (ORS), National Institutes of Health (NIH). March 3, 2017. Accessed 19 Jan. 2023.

    "IEC 62676-1-1:2013 Video surveillance systems for use in security applications - Part 1-1: System requirements - General." International Electrotechnical Commission (IEC), 2013. Accessed 9 Dec. 2022.

    "Incident Command System (ICS)." ICS Canada. Accessed 17 Jan. 2023.

    "Information Security Manual - Guidelines for Physical Security." The Australian Cyber Security Centre (ACSC), Dec. 2022. Accessed 13 Jan. 2023.

    "Integrated Physical Security Framework." Anixter. Accessed 8 Dec. 2022.

    "Integrating Risk and Security within a TOGAF® Enterprise Architecture." TOGAF 10, The Open Group. Accessed 11 Jan. 2023.

    Latham, Katherine. "The microchip implants that let you pay with your hand." BBC News, 11 Apr. 2022. Accessed 12 Jan. 2023.

    Linthicum, David. "2023 could be the year of public cloud repatriation." InfoWorld, 3 Jan. 2023. Accessed 10 Jan. 2023.

    Ma, Alexandra. "Thousands of people in Sweden are embedding microchips under their skin to replace ID cards." Business Insider, 14 May 2018. Accessed 12 Jan. 2023.

    Mendelssohn, Josh and Dana Tessler. "Take Control of Compliance Improvement to Conquer Every Audit." Info-Tech Research Group, 25 March 2015. Accessed 27 Jan. 2023.

    Meredith, Sam. "All you need to know about the Nord Stream gas leaks - and why Europe suspects 'gross sabotage'." CNBC, 11 Oct. 2022. Accessed 20 Jan. 2023.

    Nicaise, Vincent. "EU NIS2 Directive: what’s changing?" Stormshield, 20 Oct. 2022. Accessed 17 Nov. 2022.

    "NIST SP 800-53 Rev. 5 Security and Privacy Controls for Information Systems and Organizations." The National Institute of Standards and Technology (NIST), 13 Jul. 2022. Accessed 27 Jan. 2023.

    "North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) Series." NERC. Accessed 23 Jan. 2023.

    "North America Physical Security Market - Global Forecast to 2026." MarketsandMarkets, June 2021. Accessed 30 Dec. 2022.

    "NSTISSI No. 4011 National Training Standard For Information Systems Security (InfoSec) Professionals." The United States Committee on National Security Systems (CNSS), 20 Jun. 1994. Accessed 23 Jan. 2023.

    "Occupational Safety and Health Administration (OSH) Act of 1970." The United States Department of Labor. Accessed 23 Jan. 2023.

    Palter, Jay. "10 Mistakes Made in Designing a Physical Security Program." Real Time Networks, 7 Sep. 2022. Accessed 6 Jan. 2023.

    Parker, Donn. Fighting Computer Crime. John Wiley & Sons, 1998.

    Pathak, Parag. "What Is Threat Management? Common Challenges and Best Practices." Security Intelligence, 2020. Accessed 5 Jan. 2023.

    Pender-Bey, Georgie. "The Parkerian Hexad." Lewis University, 2012. Accessed 24 Jan. 2023.

    Philippou, Oliver. "2023 Trends to Watch: Physical Security Technologies." Omdia. Accessed 20 Jan. 2023.

    Phinney, Tom. "IEC 62443: Industrial Network and System Security." ISA and Honeywell Integrated Security Technology Lab. Accessed 30 Jan. 2023.

    "Physical Security Market, with COVID-19 Impact Analysis - Global Forecast to 2026." MarketsandMarkets, Jan. 2022. Accessed 30 Dec. 2022.

    "Physical Security Professional (PSP)" ASIS International. Accessed 17 Jan. 2023.

    "Physical Security Systems (PSS) Assessment Guide" The United States' Department of Energy (DOE), Dec. 2016. Accessed 23 Jan. 2023.

    "Policies, Standards, Best Practices, Guidance, and White Papers." Interagency Security Committee (ISC). Accessed 23 Jan. 2023.

    "Profiles, Add-ons and Specifications." ONVIF. Accessed 9 Dec. 2022.

    "Protective Security Policy Framework (PSPF)." The Australian Attorney-General's Department (AGD). Accessed 13 Jan. 2023.

    "Satellites detect methane plume in Nord Stream leak." The European Space Agency (ESA), 6 oct. 2022. Accessed 23 Jan. 2023.

    ""Satellites detect methane plume in Nord Stream leak." The European Space Agency (ESA), 6 oct. 2022. Accessed 23 Jan. 2023.

    Satgunananthan, Niru. "Challenges in Security Convergence?" LinkedIn, 8 Jan. 2022. Accessed 20 Dec. 2022.

    Sooknanan, Shastri and Isaac Kinsella. "Identify the Components of Your Cloud Security Architecture." Info-Tech Research Group, 12 March 2021. Accessed 26 Jan. 2023.

    "TC 79 Alarm and electronic security systems." International Electrotechnical Commission (IEC), n.d. Accessed 9 Dec. 2022.

    "The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard." Interagency Security Committee (ISC), 2021. Accessed 26 Jan. 2023.

    "The Short Guide to Why Security Programs Can Fail." CyberTalk, 23 Sep. 2021. Accessed 30 Dec. 2022.

    Verton, Dan. "Companies Aim to Build Security Awareness." Computerworld, 27 Nov. 2022. Accessed 26 Jan. 2023.

    "Vulnerability Assessment of Federal Facilities." The United States' Department of Justice, 28 Jun. 1995. Accessed 19 Jan. 2023.

    "What is IEC 61508?" 61508 Association. Accessed 23 Jan. 2023.

    Wolf, Gene. "Better Include Physical Security With Cybersecurity." T&D World 5 Jan. 2023. Accessed 19 Jan. 2023.

    Wood, Kate, and Isaac Kinsella. “Build an Information Security Strategy.” Info-Tech Research Group, 9 Sept. 2020. Web.

    Woolf, Tim, et al. "Benefit-Cost Analysis for Utility-Facing Grid Modernization Investments: Trends, Challenges, and Considerations." Lawrence Berkeley National Laboratory, Feb. 2021. Accessed 15 Nov. 2022.

    "Work Health and Safety Act 2011." The Australian Government. Accessed 13 Jan. 2023.

    Wu, Jing. “Industrial Control System Modernization: Unlock the Value of Automation in Utilities.” Info-Tech Research Group, 6 April 2023. Web.

    Research Contributors and Experts

    Amy L. Meger, IGP

    Information and Cyber Governance Manager
    Platte River Power Authority

    Andrew Amaro

    Chief Security Officer (CSO) & Founder
    KLAVAN Security

    Bilson Perez

    IT Security Manager
    4Wall Entertainment

    Dan Adams

    VP of Information Technology
    4Wall Entertainment

    Doery Abdou

    Senior Manager
    March Networks Corporate

    Erich Krueger

    Manager of Security Engineering
    Omaha Public Power District

    Kris Krishan

    Head of IT
    Waymo

    Owen Yardley

    Director, Facilities Security Preparedness
    Omaha Public Power District

    Optimize Applications Release Management

    • Buy Link or Shortcode: {j2store}406|cart{/j2store}
    • member rating overall impact: 9.3/10 Overall Impact
    • member rating average dollars saved: $44,874 Average $ Saved
    • member rating average days saved: 21 Average Days Saved
    • Parent Category Name: Testing, Deployment & QA
    • Parent Category Link: /testing-deployment-and-qa
    • The business demands high service and IT needs to respond. Rapid customer response through efficient release and deployment is critical to maintain high business satisfaction.
    • The lack of process ownership leads to chaotic and uncoordinated releases, resulting in costly rework and poor hand-offs.
    • IT emphasizes tools but release tools and technologies alone will not fix the problem. Tools are integrated into the processes they support – if the process challenges aren’t addressed first, then the tool won’t help.
    • Releases are traditionally executed in silos with limited communication across the entire release pipeline. Culturally, there is little motivation for cross-functional collaboration and holistic process optimization.

    Our Advice

    Critical Insight

    • Release management is not solely driven by tools. It is about delivering high quality releases on time through accountability and governance aided by the support of tools.
    • Release management is independent of your software development lifecycle (SDLC). Release management practices sit as an agnostic umbrella over your chosen development methodology.
    • Ownership of the entire process is vital. Release managers ensure standards are upheld and the pipeline operates efficiently.

    Impact and Result

    • Acquire release management ownership. Ensure there is appropriate accountability for speed and quality of the releases passing through the entire pipeline. A release manager has oversight over the entire release process and facilitates the necessary communication between business stakeholders and various IT roles.
    • Instill holistic thinking. Release management includes all steps required to push release and change requests to production along with the hand-off to Operations and Support. Increase the transparency and visibility of the entire pipeline to ensure local optimizations do not generate bottlenecks in other areas.
    • Standardize and lay a strong release management foundation. Optimize the key areas where you are experiencing the most pain and continually improve.

    Optimize Applications Release Management Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should optimize release management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Review your release management objectives

    Assess the current state and define the drivers behind your release management optimizations.

    • Optimize Applications Release Management – Phase 1: Review Your Release Management Objectives
    • Release Management Process Standard Template
    • Release Management Maturity Assessment

    2. Standardize release management

    Design your release processes, program framework, and release change management standards, and define your release management team.

    • Optimize Applications Release Management – Phase 2: Standardize Release Management
    • Release Manager

    3. Roll out release management enhancements

    Create an optimization roadmap that fits your context.

    • Optimize Applications Release Management – Phase 3: Roll Out Release Management Enhancements
    [infographic]

    Workshop: Optimize Applications Release Management

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Review Your Release Management Objectives

    The Purpose

    Reveal the motivators behind the optimization of release management.

    Identify the root causes of current release issues and challenges.

    Key Benefits Achieved

    Ensure business alignment of optimization efforts.

    Firm grasp of why teams are facing release issues and the impacts they have on the organization.

    Activities

    1.1 Identify the objectives for application release.

    1.2 Conduct a current state assessment of release practices.

    Outputs

    Release management business objectives and technical drivers

    Current state assessment of release processes, communication flows, and tools and technologies

    2 Standardize Release Management

    The Purpose

    Alleviate current release issues and challenges with best practices.

    Standardize a core set of processes, tools, and roles & responsibilities to achieve consistency, cadence, and transparency.

    Key Benefits Achieved

    Repeatable execution of the same set of processes to increase the predictability of release delivery.

    Defined ownership of release management.

    Adaptable and flexible release management practices to changing business and technical environments.

    Activities

    2.1 Strengthen your release process.

    2.2 Coordinate releases with a program framework.

    2.3 Manage release issues with change management practices.

    2.4 Define your release management team.

    Outputs

    Processes accommodating each release type and approach the team is required to complete

    Release calendars and program framework

    Release change management process

    Defined responsibilities and accountabilities of release manager and release management team

    3 Roll Out Release Management Enhancements

    The Purpose

    Define metrics to validate release management improvements.

    Identify the degree of oversight and involvement of the release management team.

    Prioritize optimization roadmap against business needs and effort.

    Key Benefits Achieved

    Easy-to-gather metrics to measure success that can be communicated to stakeholders.

    Understanding of how involved release management teams are in enforcing release management standards.

    Practical and achievable optimization roadmap.

    Activities

    3.1 Define your release management metrics.

    3.2 Ensure adherence to standards.

    3.3 Create your optimization roadmap.

    Outputs

    List of metrics to gauge success

    Oversight and reporting structure of release management team

    Release management optimization roadmap

    Scale Business Process Automation

    • Buy Link or Shortcode: {j2store}241|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Optimization
    • Parent Category Link: /optimization
    • Business process automation (BPA) adoption gained significant momentum as your business leaders saw the positive outcomes in your pilots, such as improvements in customer experience, operational efficiencies, and cost optimizations.
    • Your stakeholders are ready to increase their investments in more process automation solutions. They want to scale initial successes to other business and IT functions.
    • However, it is unclear how BPA can be successfully scaled and what benefits can be achieved from it.

    Our Advice

    Critical Insight

    The shift from isolated, task-based automations in your pilot to value-oriented, scaled automations brings new challenges and barriers to your organization such as:

    • Little motivation or tolerance to change existing business operations to see the full value of BPA.
    • Overinvesting in current BPA technologies to maximize the return despite available alternatives that can do the same tasks better.
    • BPA teams are ill-equipped to meet the demands and complexities of scaled BPA implementations.

    Impact and Result

    • Ground your scaling expectations. Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
    • Define your scaling journey. Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
    • Prepare to scale BPA. Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

    Scale Business Process Automation Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Scale Business Process Automation Deck – A guide to learn the opportunities and values of scaling business process automation.

    This research walks you through the level setting of your scaled business process automation (BPA) expectations, factors to consider in defining your scaled BPA journey, and assessing your readiness to scale BPA.

    • Scale Business Process Automation Storyboard

    2. Scale Business Process Automation Readiness Assessment – A tool to help you evaluate your readiness to scale business process automation.

    Use this tool to identify key gaps in the people, processes, and technologies you need to support the scaling of business process automation (BPA). It also contains a canvas to facilitate your discussions around business process automation with your stakeholders and BPA teams.

    • Scale Business Process Automation Readiness Assessment
    [infographic]

    Further reading

    Scale Business Process Automation

    Take a value-first approach to automate the processes that matter

    Analyst Perspective

    Scaling business process automation (BPA) is an organization-wide commitment

    Business and IT must work together to ensure the right automations are implemented and BPA is grown and matured in a sustainable way. However, many organizations are not ready to make this commitment. Managing the automation demand backlog, coordinating cross-functional effort and organizational change, and measuring BPA value are some of the leading factors challenging scaling BPA.

    Pilot BPA with the intent to scale it. Pilots are safe starting points to establish your foundational governance and management practices and build the necessary relationships and collaborations for you to be successful. These factors will then allow you to explore more sophisticated, complicated, and innovative opportunities to drive new value to your team, department, and organization.

    A picture of Andrew Kum-Seun

    Andrew Kum-Seun
    Research Director,
    Application Delivery and Management
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Business process automation (BPA) adoption gained significant momentum as your business leaders see the positive outcomes in your pilots, such as improvements in customer experience, operational efficiencies, and cost optimizations.
    • Your stakeholders are ready to increase their investments in more process automation solutions. They want to scale initial successes to other business and IT functions.
    • However, it is unclear how BPA can be successfully scaled and what benefits can be achieved from it.

    Common Obstacles

    The shift from isolated, task-based automations in your pilot to value-oriented and scaled automations brings new challenges and barriers to your organization:

    • Little motivation or tolerance to change existing business operations to see the full value of BPA.
    • Overinvesting in current BPA technologies to maximize return despite available alternatives that can do the same tasks better.
    • BPA teams are ill-equipped to meet the demands and complexities of scaled BPA implementations.

    Info-Tech's Approach

    • Ground your scaling expectations. Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
    • Define your scaling journey. Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
    • Prepare to scale BPA. Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

    Info-Tech Insight

    Take a value-first approach in your scaling business process automation (BPA) journey. Low-risk, task-oriented automations are good starting points to introduce BPA but constrain the broader returns your organization wants. Business value can only scale when everything and everyone in your processes are working together to streamline the entire value stream rather than the small gains from optimizing small, isolated automations.

    Scale Business Process Automation

    Take a value-first approach to automate the processes that matter

    Pilot Your BPA Capabilities

    • Learn the foundation practices to design, deliver, and support BPA.
    • Understand the fit and value of BPA.
    • Gauge the tolerance for business operational change and system risk.

    See Info-Tech's Build a Winning Business Process Automation Playbook blueprint for more information.

    Build Your Scaling BPA Vision

    Apply Lessons Learned to Scale

    1. Ground Your Scaling Expectations
      Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
    2. Define Your Scaling Journey
      Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
    3. Prepare to Scale BPA
      Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

    Research deliverable

    Design and communicate your approach to scale business process automation with Info-Tech's Scale Business Process Automation Readiness Assessment:

    • Level set your scaled BPA goals and objectives.
    • Discuss and design your scaled BPA journey.
    • Identify the gaps and improvements needed to scale your BPA practices and implementation.

    A screenshot from Info-Tech's Scale Business Process Automation Readiness Assessment

    Step 1.1

    Ground Your Scaling Expectations

    Activities

    1.1.1 Define Your Scaling Objectives

    This step involves the following participants:

    • Business Process Owners
    • Product Owners
    • Application Directors
    • Business Architects
    • BPA Delivery & Support Teams

    Outcomes of this step

    Scaling BPA objectives

    Organizations want to scale their initial BPA success

    Notable Initial Benefits

    1. Time Saved: "In the first day of live operations, the robots were saving 51 hours each day or the equivalent of six people working an eight-hour shift." – Brendan MacDonald, Director of Customer Compliance Operations, Ladbrokes (UiPath)
    2. Documentation & Knowledge Sharing: "If certain people left, knowledge of some processes would be lost and we realized that we needed a reliable process management system in place." – Peta Kinnane, Acting Audit and Risk Coordinator, Liverpool City Council (Nintex)
    3. Improved Service Delivery: "Thanks to this automation, our percentage of triaged and assigned tickets is now 100%. Nothing falls through the cracks. It has also improved the time to assignment. We assign tickets 2x faster than before." – Sebastian Goodwin, Head of Cybersecurity, Nutanix (Workato)

    Can We Gain More From Automation?

    The Solution

    As industries evolve and adopt more tools and technology, their products, services, and business operating models become more complex. Task- and desktop-based automations are often not enough. More sophisticated and scaled automations are needed to simplify and streamline the process from end-to-end of complex operations and align them with organizational goals.

    Stakeholders see automation as an opportunity to scale the business

    The value of scaling BPA is dependent on the organization's ability to scale with it. In other words, stakeholders should see an increase in business value without a substantial increase in resources and operational costs (e.g., there should be little difference if sending out 10 emails versus 1000).

    Examples of how business can be scaled with automation

    • Processes triggered by incoming documents or email: in these processes, an incoming document or email (that has semi-structured or unstructured data) is collected by a script or an RPA bot. This document is then processed with a machine learning model that validates it either by rules or ML models. The validated and enriched machine-readable data is then passed on to the next system of record.
    • The accounts payable process: this process includes receiving, processing, and paying out invoices from suppliers that provided goods or services to the company. While manual processing can be expensive, take too much time, and lead to errors, businesses can automate this process with machine learning and document extraction technologies like optical characters recognition (OCR), which converts texts containing images into characters that can be readable by computers to edit, compute, and analyze.
    • Order management: these processes include retrieving email and relevant attachments, extracting information that tells the business what its customers want, updating internal systems with newly placed orders or modifications, or taking necessary actions related to customer queries.
    • Enhance customer experience: [BPA tools] can help teams develop and distribute customer loyalty offers faster while also optimizing these offers with customer insights. Now, enterprises can more easily guarantee they are delivering the relevant solutions their clients are demanding.

    Source: Stefanini Group

    Scaling BPA has its challenges

    Perceived Lack of Opportunities

    Pilot BPA implementations often involve the processes that are straightforward to automate or are already shortlisted to optimize. However, these low-hanging fruits will run out. Discovering new BPA opportunities can be challenged for a variety of reasons, such as:

    • Lack of documentation and knowledge
    • Low user participation or drive to change
    • BPA technology limitations and constraints

    Perceived Lack of Opportunities

    BPA is not a cheap investment. A single RPA bot, for example, can cost between $5,000 to $15,000. This cost does not include the added cost for training, renewal fees, infrastructure set up and other variable and reoccurring costs that often come with RPA delivery and support (Blueprint). This reality can motivate BPA owners to favor existing technologies over other cheaper and more effective alternatives in an attempt boost their return on investment.

    Ill-Equipped Support Teams

    Good technical skills and tools, and the right mindset are critical to ensure BPA capabilities are deployed effectively. Low-code no-code (LCNC) can help but success isn't guaranteed. Lack of experience with low-code platforms is the biggest obstacle in low-code adoption according to 60% of respondents (Creatio). The learning curve has led some organizations to hire contractors to onboard BPA teams, hire new employees, or dedicate significant funding and resources to upskill internal resources.

    Shift your objectives from task-based efficiencies to value-driven capabilities

    How can I improve myself?

    How can we improve my team?

    How can we improve my organization?

    Objectives

    • Improve worker productivity
    • Improve the repeatability and predictability of the process
    • Deliver outputs of consistent quality and cadence
    • Increase process, tool, and technology confidence
    • Increase the team's throughput, commitment, and load
    • Apply more focus on cognitive and complex tasks
    • Reduce the time to complete error-prone, manual, and routine collaborations
    • Deliver insightful, personalized, and valuable outputs
    • Drive more value in existing pipelines and introduce new value streams
    • Deliver consistent digital experiences involving different technologies
    • Automatically tailor a customer's experience to individual preferences
    • Forecast and rapidly respond to customer issues and market trends

    Goals

    • Learn the fit of BPA & set the foundations
    • Improve the practices & tools and optimize the performance
    • Scale BPA capabilities throughout the organization

    Gauge the success of your scaled BPA

    BPA Practice Effectiveness

    Key Question: Are stakeholders satisfied with how the BPA practice is meeting their automation needs?

    Examples of Metrics:

    • User satisfaction
    • Automation request turnaround time
    • Throughput of BPA team

    Automation Solution Quality

    Key Question: How do your automation solutions perform and meet your quality standards?

    Examples of Metrics:

    • Licensing and operational costs
    • Service level agreement and uptime/downtime
    • Number of defects

    Business Value Delivery

    Key Question: How has automation improved the value your employees, teams, and the organization delivers?

    Examples of Metrics:
    Increase in revenue generation
    Reduction in operational costs
    Expansion of business capabilities with minimal increases in costs and risks

    1.1.1 Define your scaling objectives

    5 minutes

    1. Complete the following fields to build your scaled business process automation canvas:
      1. Problem that scaling BPA is intending to solve
      2. Your vision for scaling BPA
      3. Stakeholders
      4. Scaled BPA business and IT objectives and metrics
      5. Business capabilities, processes, and application systems involved
      6. Notable constraints, roadblocks, and challenges to your scaled BPA success
    2. Document your findings and discussions in Info-Tech's Scale Business Process Automation Readiness Assessment.

    Output

    Scaled BPA value canvas

    Participants

    • Business Process Owners
    • Product Owners
    • Application Directors
    • Business Architects
    • BPA Delivery & Support Teams

    Record the results in the 2. Value Canvas Tab in the Scale Business Process Automation Readiness Assessment.

    1.1.1 cont'd

    Scaled BPA Value Canvas Template:

    A screenshot of Scaled BPA Value Canvas Template

    Align your objectives to your application portfolio strategy

    Why is an application portfolio strategy important for BPA?

    • All business process optimizations are designed, delivered, and managed to support a consistent interpretation of the business and IT vision and goals.
    • Clear understanding of the sprawl, criticality, and risks of automation solutions and applications to business capabilities.
    • BPA initiatives are planned, prioritized, and coordinated alongside modernization, upgrades, and other changes to the application portfolio.
    • Resources, skills, and capacities are strategically allocated to meet BPA demand considering other commitments in the backlog and roadmap.
    • BPA expectations and practices uphold the persona, values, and principles of the application team.

    What is an application portfolio strategy?

    An application portfolio strategy details the direction, activities, and tactics to deliver on the promise of your application portfolio. It often includes:

    • Portfolio vision and goals
    • Application, automation, and process portfolio
    • Values and principles
    • Portfolio health
    • Risks and constraints
    • Strategic roadmap

    See our Application Portfolio Management Foundations blueprint for more information.

    Leverage your BPA champions to drive change and support scaling initiatives

    An arrow showing the steps to Leverage your BPA champions to drive change and support scaling initiatives

    Expected Outcome From Your Pilot: Your pilot would have recognized the roles that know how to effectively apply good BPA practices (e.g., process analysis and optimization) and are familiar with the BPA toolset. These individuals are prime candidates who can standardize your Build a Winning Business Process Automation Playbook, upskill interested teams, and build relationships among those involved in the delivery and use of BPA.

    Step 1.2

    Define Your Scaling Journey

    Activities

    1.2.1 Discuss Your BPA Opportunities
    1.2.2 Lay Out Your Scaling BPA Journey

    Scale Business Process Automation

    This step involves the following participants:

    • Business Process Owners
    • Product Owners
    • Application Directors
    • Business Architects
    • BPA Delivery & Support Teams

    Outcomes of this step

    • List of scaling BPA opportunities
    • Tailored scaling journey

    Maintain a healthy demand pipeline

    A successful scaled BPA practice requires a continuous demand for BPA capabilities and the delivery of minimum viable automations (MVA) held together by a broader strategic roadmap.

    An image of a healthy demand pipeline.  it flows from opportunities to trends, with inputs from internal and external sources.

    An MVA focuses on a single and small process use case, involves minimal possible effort to improve, and is designed to satisfy a specific user group. Its purpose is to maximize learning and value and inform the further scaling of the BPA technology, approach, or practice.

    See our Build a Winning Business Process Automation Playbook blueprint for more information.

    Investigate how BPA trends can drive more value for the organization

    • Event-Driven Automation
      Process is triggered by a schedule, system output, scenario, or user (e.g., voice-activated, time-sensitive, system condition)
    • Low- & No-Code Automation build and management are completed through an easy-to-learn scripting language and/or a GUI.
    • Intelligent Document Processing
      Transform documents for better analysis, processing and handling (e.g., optical character recognition) by a tool or system.
    • End-to-End Process Automation & Transparency
      Linking cross-functional processes to enable automation of the entire value stream with seamless handoffs or triggers.
    • Orchestration of Different BPA Technologies
      Integrating and sequencing the execution of multiple automation solutions through a single console.
    • Cognitive Automation
      AI and other intelligent technologies automate information-intensive processes, including semi and unstructured data and human thinking simulation.
    • Intelligent Internet-of-Things
      Connecting process automation technologies to physical environments with sensors and other interaction devices (e.g., computer vision).
    • Ethical Design
      Optimizing processes that align to the moral value, principles, and beliefs of the organization (e.g., respects data privacy, resists manipulative patterns).
    • User Profiling & Tailored Experiences
      Customizing process outputs and user experience with user-defined configurations or system and user activity monitoring.
    • Process Mining & Discovery
      Gleaning optimization opportunities by analyzing system activities (mining) or monitoring user interactions with applications (discovery).

    1.2.1 Discuss your BPA opportunities

    5 minutes

    1. Review the goals and objectives of your initiative and the expectations you want to gain from scaling BPA.
    2. Discuss how BPA trends can be leveraged in your organization.
    3. List high priority scaling BPA opportunities.

    Output

    • Scaled BPA opportunities

    Participants

    • Business Process Owners
    • Product Owners
    • Application Directors
    • Business Architects
    • BPA Delivery & Support Teams

    Create your recipe for success

    Your scaling BPA recipe (approach) can involve multiple different flavors of various quantities to fit the needs and constraints of your organization and workers.

    What and how many ingredients you need is dependent on three key questions:

    1. How can we ease BPA implementation?
    2. How can we broaden the BPA scope?
    3. How can we loosen constraints?

    Personalize Scaling BPA To Your Taste

    • Extend BPA Across Business Units (Horizontal)
    • Integrate BPA Across Your Application Architecture (Vertical)
    • Embed AI/ML Into Your Automation Technologies
    • Empower Users With Business-Managed Automations
    • Combine Multiple Technologies for End-to-End Automation
    • Increase the Volume and Velocity of Automation
    • Automate Cognitive Processes and Making Variable Decisions

    Answer these questions in the definition of your scaling BPA journey

    Seeing the full value of your scaling approach is dependent on your ability to support BPA adoption across the organization

    How can we ease BPA implementation?

    • Good governance practices (e.g., role definitions, delivery and management processes, technology standards).
    • Support for innovation and experimentation.
    • Interoperable and plug-and-play architecture.
    • Dedicated technology management and support, including resources, documents, templates and shells.
    • Accessible and easy-to-understand knowledge and document repository.

    How can we broaden BPA scope?

    • Provide a unified experience across processes, fragmented technologies, and siloed business functions.
    • Improve intellectually intensive activities, challenging decision making and complex processes with more valuable insights and information using BPA.
    • Proactively react to business and technology environments and operational changes and interact with customers with unattended automation.
    • Infuse BPA technologies into your product and service to expand their functions, output quality, and reliability.

    How can we loosen constraints?

    • Processes are automated without the need for structured data and optimized processes, and there is no need to work around or avoid legacy applications.
    • Workers are empowered to develop and maintain their own automations.
    • Coaching, mentoring, training, and onboarding capabilities.
    • Accessibility and adoption of underutilized applications are improved with BPA.
    • BPA is used to overcome the limitations or the inefficiencies of other BPA technologies.

    1.2.2 Lay out your scaling BPA journey

    5 minutes

    1. Review the goals and objectives of your initiative, the expectations you want to gain from scaling BPA, and the various scaling BPA opportunities.
    2. Discuss the different scaling BPA flavors (patterns) and how each flavor is applicable to your situation. Ask yourself these key questions:
      1. How can we ease BPA implementation?
      2. How can we broaden the BPA scope?
      3. How can we loosen constraints?
    3. Design the broad steps of your scaling BPA journey. See the following slide for an example.
    4. Document your findings and discussions in Info-Tech's Scale Business Process Automation Readiness Assessment.

    Record the results in the 3. Scaled BPA Journey Tab in the Scale Business Process Automation Readiness Assessment.

    Output

    • Scaled BPA journey

    Participants

    • Business Process Owners
    • Product Owners
    • Application Directors
    • Business Architects
    • BPA Delivery & Support Teams

    1.2.2 cont'd

    An image of the marker used to identify Continuous business process optimization and automation Continuous business process optimization and automation
    An image of the marker used to identify Scope of Info-Tech's Build Your Business Process Automation Playbook blueprintScope of Info-Tech's Build Your Business Process Automation Playbook blueprint

    Example:

    An example of the BPA journey.  Below are the links included in the journey.

    Continuously review and realign expectations

    Optimizing your scaled BPA practices and applying continuous improvements starts with monitoring the process after implementation.

    Purpose of Monitoring

    1. Diligent monitoring confirms your scaled BPA implementation is performing as desired and meeting initial expectations.
    2. Holding reviews of your BPA practice and implementations helps assess the impact of marketplace and business operations changes and allows the organization to stay on top of trends and risks.

    Metrics

    Metrics are an important aspect of monitoring and sustaining the scaled practice. The metrics will help determine success and find areas where adjustments may be needed.

    Hold retrospectives to identify any practice issues to be resolved or opportunities to undertake

    The retrospective gives your organization the opportunity to review themselves and brainstorm solutions and a plan for improvements to be actioned. This session is reoccurring, typically, after key milestones. While it is important to allow all participants the opportunity to voice their opinions, feelings, and experiences, retrospectives must be positive, productive, and time boxed.

    Step 1.3

    Prepare to Scale BPA

    Activities

    1.3.1 Assess Your Readiness to Scale BPA

    This step involves the following participants:

    • Business Process Owners
    • Product Owners
    • Application Directors
    • Business Architects
    • BPA Delivery & Support Teams

    Outcomes of this step

    • Scale BPA readiness assessment

    Prepare to scale by learning from your pilot implementations

    "While most organizations are advised to start with automating the 'low hanging fruit' first, the truth is that it can create traps that will impede your ability to achieve RPA at scale. In fact, scaling RPA into the organizational structure is fundamentally different from implementing a conventional software product or other process automation."
    – Blueprint

    What should be the takeaways from your pilot?

    Degree of Required BPA Support

    • Practices needed to address the organization's tolerance to business process changes and automation adoption.
    • Resources, budget and skills needed to configure and orchestrate automation technologies to existing business applications and systems.

    Technology Integration & Compatibility

    • The BPA technology and application system's flexibility to be enhanced, modified, and removed.
    • Adherence to data and system quality standards (e.g., security, availability) across all tools and technologies.

    Good Practices Toolkit

    • A list of tactics, techniques, templates, and examples to assist teams assessing and optimizing business processes and applying BPA solutions in your organization's context.
    • Strategies to navigate common blockers, challenges, and risks.

    Controls & Measures

    • Defined guardrails aligned to your organization's policies and risk tolerance
    • Key metrics are gathered to gauge the value and performance of your processes and automations for enhancements and further scaling.

    Decide how to architect and govern your BPA solutions

    Centralized

    A single body and platform to coordinate, execute, and manage all automation solutions.

    An image of the Centralized approach to governing BPA solutions.

    Distributed

    Automation solutions are locally delivered and managed whether that is per business unit, type of technology, or vendor. Some collaboration and integration can occur among solutions but might be done without a holistic strategy or approach.

    An image of the Distributed approach to governing BPA solutions.

    Hybrid

    Automation solutions are locally delivered and managed and executed for isolated use cases. Broader and complex automations are centrally orchestrated and administered.

    An image of the Hybrid approach to governing BPA solutions.

    Be prepared to address the risks with scaling BPA

    "Companies tend to underestimate the complexity of their business processes – and bots will frequently malfunction without an RPA design team that knows how to anticipate and prepare for most process exceptions. Unresolved process exceptions rank among the biggest RPA challenges, prompting frustrated users to revert to manual work."
    – Eduardo Diquez, Auxis, 2020

    Scenarios

    • Handling Failures of Dependent Systems
    • Handling Data Corruption & Quality Issues
    • Alignment to Regulatory & Industry Standards
    • Addressing Changes & Regressions to Business Processes
    • "Run Away" & Hijacked Automations
    • Unauthorized Access to Sensitive Information

    Recognize the costs to support your scaled BPA environment

    Cost Factors

    Automation Operations
    How will chaining multiple BPA technologies together impact your operating budget? Is there a limit on the number of active automations you can have at a single time?

    User Licenses
    How many users require access to the designer, orchestrator, and other functions of the BPA solution? Do they also require access to dependent applications, services, and databases?

    System Enhancements
    Are application and system upgrades and modernizations needed to support BPA? Is your infrastructure, data, and security controls capable of handling BPA demand?

    Supporting Resources
    Are dedicated resources needed to support, govern, and manage BPA across business and IT functions? Are internal resources or third-party providers preferred?

    Training & Onboarding
    Are end users and supporting resources trained to deliver, support, and/or use BPA? How will training and onboarding be facilitated: internally or via third party providers?

    Create a cross-functional and supportive body to lead the scaling of BPA

    Your supportive body is a cross-functional group of individuals promoting collaboration and good BPA practices. It enables an organization to extract the full benefits from critical systems, guides the growth and evolution of strategic BPA implementations, and provides critical expertise to those that need it. A supportive body distinctly caters to optimizing and strengthening BPA governance, management, and operational practices for a single technology or business function or broadly across the entire organization encompassing all BPA capabilities.

    What a support body is not:

    • A Temporary Measure
    • Exclusive to Large Organizations
    • A Project Management Office
    • A Physical Office
    • A Quick Fix

    See our Maximize the Benefits from Enterprise Applications With a Center of Excellence blueprint for more information.

    What are my options?

    Center of Excellence (CoE)
    AND
    Community of Practice (CoP)

    CoEs and CoPs provide critical functions

    An image of the critical functions provided by CoE and CoP.

    Shift your principles as you scale BPA

    As BPA scales, users and teams must not only think of how a BPA solution operates at a personal and technical level or what goals it is trying to achieve, but why it is worth doing and how the outcomes of the automated process will impact the organization's reputation, morality, and public perception.

    An image of the journey from Siloed BPA to Scaled BPA.

    "I think you're going to see a lot of corporations thinking about the corporate responsibility of [organizational change from automation], because studies show that consumers want and will only do business with socially responsible companies."

    – Todd Lohr

    Source: Appian, 2018.

    Assess your readiness to scale BPA

    Vision & Objectives
    Clear direction and goals of the business process automation practice.

    Governance
    Defined BPA roles and responsibilities, processes, and technology controls.

    Skills & Competencies
    The capabilities users and support roles must have to be successful with BPA.

    Business Process Management & Optimization
    The tactics to document, analyze, optimize, and monitor business processes.

    Business Process Automation Delivery
    The tactics to review the fit of automation solutions and deliver and support according to end user needs and preferences.

    Business Process Automation Platform
    The capabilities to manage BPA platforms and ensure it supports the growing needs of the business.

    1.3.1 Assess your readiness to scale BPA

    5 minutes

    1. Review your scaling BPA journey and selected patterns.
    2. Conduct a readiness assessment using the 4. Readiness Assessment tab in Info-Tech's Scale Business Process Automation Readiness Assessment.
    3. Brainstorm solutions to improve the capability or address the gaps found in this assessment.

    Output

    • Scaled BPA readiness assessment

    Participants

    • Business Process Owners
    • Product Owners
    • Application Directors
    • Business Architects
    • BPA Delivery & Support Teams

    Record the results in the 4. Readiness Assessment tab in Info-Tech's Scale Business Process Automation Readiness Assessment.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Related Info-Tech Research

    Bibliography

    Alston, Roland. "With the Rise of Intelligent Automation, Ethics Matter Now More than Ever." Appian, 4 Sept. 2018. Web.
    "Challenges of Achieving RPA at Scale." Blueprint, N.d. Web.
    Dilmegani, Cem. "RPA Benefits: 20 Ways Bots Improve Businesses in 2023," AI Multiple, 9 Jan 2023. Web.
    Diquez, Eduardo. "Struggling To Scale RPA? Discover The Secret to Success." Auxis, 30 Sept. 2020. Web.
    "How much does Robotic Process Automation (RPA) Really Cost?" Blueprint, 14 Sept. 2021. Web.
    "Liverpool City Council improves document process with Nintex." Nintex, n.d. Web.
    "The State of Low-Code/No-Code." Creatio, 2021. Web.
    "Using automation to enhance security and increase IT NPS to 90+ at Nutanix." Workato, n.d. Web.
    "What Is Hyperautomation? A Complete Guide To One Of Gartner's Top Tech Trends." Stefanini Group, 26 Mar. 2021. Web.

    2024 Tech Trends

    • Buy Link or Shortcode: {j2store}289|cart{/j2store}
    • member rating overall impact: 10
    • Parent Category Name: Innovation
    • Parent Category Link: /improve-your-core-processes/strategy-and-governance/innovation

    AI has revolutionized the landscape, placing the spotlight firmly on the generative enterprise.

    The far-reaching impact of generative AI across various sectors presents fresh prospects for organizations to capitalize on and novel challenges to address as they chart their path for the future. AI is more than just a fancy auto-complete. At this point it may look like that, but do not underestimate the evolutive power.

    In this year's Tech Trends report, we explore three key developments to capitalize on these opportunities and three strategies to minimize potential risks.

    Generative AI will take the lead.

    As AI transforms industries and business processes, IT and business leaders must adopt a deliberate and strategic approach across six key domains to ensure their success.

    Seize Opportunities:

    • Business models driven by AI
    • Automation of back-office functions
    • Advancements in spatial computing

    Mitigate Risks:

    • Ethical and responsible AI practices
    • Incorporating security from the outset
    • Ensuring digital sovereignty

    Build a Strategy for Big Data Platforms

    • Buy Link or Shortcode: {j2store}203|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Big Data
    • Parent Category Link: /big-data
    • The immaturity of the big data market means that organizations lack examples and best practices to follow, and they are often left trailblazing their own paths.
    • Experienced and knowledgeable big data professionals are limited and without creative resourcing; IT might struggle to fill big data positions.
    • The term NoSQL has become a catch-all phrase for big data technologies; however, the technologies falling under the umbrella of NoSQL are disparate and often misunderstood. Organizations are at risk of adopting incorrect technologies if they don’t take the time to learn the jargon.

    Our Advice

    Critical Insight

    • NoSQL plays a key role in the emergence of the big data market, but it has not made relational databases outdated. Successful big data strategies can be conducted using SQL, NoSQL, or a combination of the two.
    • Assign a Data Architect to oversee your initiative. Hire or dedicate someone who has the ability to develop both a short-term and long-term vision and that has hands-on experience with data management, mining and modeling. You will still need someone (like a database administrator) who understands the database, the schemas, and the structure.
    • Understand your data before you attempt to use it. Take a master data management approach to ensure there are rules and standards for managing your enterprise’s data, and take extra caution when integrating external sources.

    Impact and Result

    • Assess whether SQL, NoSQL, or a combination of both technologies will provide you with the appropriate capabilities to achieve your business objectives and gain value from your data.
    • Form a Big Data Team to bring together IT and the business in order to leave a successful initiative.
    • Conduct ongoing training with your personnel to ensure up-to-date skills and end-user understanding.
    • Frequently scan the big data market space to identify new technologies and opportunities to help optimize your big data strategy.

    Build a Strategy for Big Data Platforms Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Develop a big data strategy

    Know where to start and where to focus attention in the implementation of a big data strategy.

    • Storyboard: Build a Strategy for Big Data Platforms

    2. Assess the appropriateness of big data technologies

    Decide the most correct tools to use in order to solve enterprise data management problems.

    • Big Data Diagnostic Tool

    3. Determine the TCO of a scale out implementation

    Compare the TCO of a SQL (scale up) with a NoSQL (scale out) deployment to determine whether NoSQL will save costs.

    • Scale Up vs. Scale Out TCO Tool
    [infographic]

    Identify and Manage Security Risk Impacts on Your Organization

    • Buy Link or Shortcode: {j2store}221|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • More than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.
    • A new global change will impact your organization at any given time. Ensure that you monitor threats appropriately and that your plans are flexible enough to manage the inevitable consequences.

    Our Advice

    Critical Insight

    • Identifying and managing a vendor’s potential security risk impacts on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes could introduce new risks.
    • Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals and surprise incidents.

    Impact and Result

    • Vendor management practices educate organizations on the potential risks from vendors in your market and suggest creative and alternative ways to avoid and manage them.
    • Prioritize and classify your vendors with quantifiable, standardized rankings.
    • Prioritize focus on your high-risk vendors.
    • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts with our Security Risk Impact Tool.

    Identify and Manage Security Risk Impacts on Your Organization Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify and Manage Security Risk Impacts on Your Organization Deck – Use the research to better understand the negative impacts of vendor actions on your security.

    Use this research to identify and quantify the potential security impacts caused by vendors. Use Info-Tech’s approach to look at the security impacts from various perspectives to better prepare for issues that may arise.

    • Identify and Manage Security Risk Impacts on Your Organization Storyboard

    2. Security Risk Impact Tool – Use this tool to help identify and quantify the security impacts of negative vendor actions.

    By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

    • Security Risk Impact Tool
    [infographic]

    Further reading

    Identify and Manage Security Risk Impacts on Your Organization

    Know where the attacks are coming from so you know where to protect.

    Analyst perspective

    It is time to start looking at risk realistically and move away from “trust but verify” toward zero trust.

    Frank Sewell, Research Director, Vendor Management

    Frank Sewell,
    Research Director, Vendor Management
    Info-Tech Research Group

    We are inundated with a barrage of news about security incidents on what seems like a daily basis. In such an environment, it is easy to forget that there are ways to help prevent such things from happening and that they have actual costs if we relax our diligence.

    Most people are aware of defense strategies that help keep their organization safe from direct attack and inside threats. Likewise, they expect their trusted partners to perform the same diligence. Unfortunately, as more organizations use cloud service vendors, the risks with n-party vendors are increasing.

    Over the last few years, we have learned the harsh lesson that downstream attacks affect more businesses than we ever expected as suppliers, manufacturers of base goods and materials, and rising transportation costs affect the global economy.

    “Trust but verify” – while a good concept – should give way to the more effective zero-trust model in favor of knowing it’s not a matter of if an incident happens but when.

    Executive Summary

    Your Challenge

    More than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

    A new global change will impact your organization at any given time. Ensure that you monitor threats appropriately and that your plans are flexible enough to manage the inevitable consequences.

    Common Obstacles

    Identifying and managing a vendor’s potential security risk impacts on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes could introduce new risks.

    Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals and surprise incidents.

    Info-Tech’s Approach

    Vendor management practices educate organizations on the potential risks from vendors in your market and suggest creative and alternative ways to avoid and manage them.

    Prioritize and classify your vendors with quantifiable, standardized rankings.

    Prioritize focus on your high-risk vendors.

    Standardize your processes for identifying and monitoring vendor risks to manage potential impacts with our Security Risk Impact Tool.

    Info-Tech Insight
    Organizations must evolve their security risk assessments to be more adaptive to respond to global changes in the market. Ongoing monitoring of third-party vendor risks and holding those vendors accountable throughout the vendor lifecycle are critical to preventing disastrous impacts.

    Info-Tech’s multi-blueprint series on vendor risk assessment

    There are many individual components of vendor risk beyond cybersecurity.

    Multi-blueprint series on vendor risk assessment

    This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

    Out of Scope:
    This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

    Security risk impacts

    Potential losses to the organization due to security incidents

    • In this blueprint we’ll explore security risks, particularly from third-party vendors, and their impacts.
    • Identify potentially disruptive events to assess the overall impact on organizations and implement adaptive measures to correct security plans.

    The world is constantly changing

    The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

    When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

    Below are some things no one expected to happen in the last few years:

    62% 83% 84%
    Ransomware attacks spiked 62% globally (and 158% in North America alone). 83% of companies increased organizational focus on third-party risk management in 2020. In a 2020 survey, 84% of organizations reported having experienced a third-party incident in the last three years.
    One Trust, 2022 Help Net Security, 2021 Deloitte, 2020

    Identify and manage security risk impacts on your organization

    Identify and manage security risk impacts on your organization

    Due diligence will enable successful outcomes.

    What is third-party risk?

    Third-Party Vendor: Anyone who provides goods or services to a company or individual in exchange for payment transacted with electronic instructions (Law Insider).

    Third-Party Risk: The potential threat presented to organizations’ employee and customer data, financial information, and operations from the organization’s supply chain and other outside parties that provide products and/or services and have access to privileged systems (Awake Security).

    It is essential to know not only who your vendors are but also who their vendors are (n-party vendors). Organizations often overlook that their vendors rely on others to support their business, and those layers can add risk to your organization.

    Identify and manage security risks

    Global Pandemic

    Very few people could have predicted that a global pandemic would interrupt business on the scale experienced today. Organizations should look at their lessons learned and incorporate adaptable preparations into their security planning and ongoing monitoring moving forward.

    Vendor Breaches

    The IT market is an ever-shifting environment; more organizations are relying on cloud service vendors, staff augmentation, and other outside resources. Organizations should hold these vendors (and their downstream vendors) to the same levels of security and standards of conduct that they hold their internal resources.

    Resource Shortages

    A lack of resources is often overlooked, but it’s easily recognized as a reason for a security incident. All too often, companies are unwilling to dedicate resources to their vendors’ security risk assessment and ongoing monitoring needs. Only once an incident occurs do companies decide it is time to reprioritize.

    Minimize the Damage of IT Cost Cuts

    • Buy Link or Shortcode: {j2store}53|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Cost & Budget Management
    • Parent Category Link: /cost-and-budget-management
    • Average growth rates for Opex and Capex budgets are expected to continue to decline over the next fiscal year.
    • Common “quick-win” cost-cutting initiatives are not enough to satisfy the organization’s mandate.
    • Cost-cutting initiatives often take longer than expected, failing to provide cost savings before the organization’s deadline.
    • Cost-optimization projects often have unanticipated consequences that offset potential cost savings and result in business dissatisfaction.

    Our Advice

    Critical Insight

    • IT costs affect the entire business, not just IT. For this reason, IT must work with the business collaboratively to convey the full implications of IT cost cuts.
    • Avoid making all your cuts at once; phase your cuts by taking into account the magnitude and urgency of your cuts and avoid unintended consequences.
    • Don’t be afraid to completely cut a service if it should not be delivered in the first place.

    Impact and Result

    • Take a value-based approach to cost optimization.
    • Reduce IT spend while continuing to deliver the most important services.
    • Involve the business in the cost-cutting process.
    • Develop a plan for cost cutting that avoids unintended interruptions to the business.

    Minimize the Damage of IT Cost Cuts Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should take a value-based approach to cutting IT costs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Understand the mandate and take immediate action

    Determine your approach for cutting costs.

    • Minimize the Damage of IT Cost Cuts – Phase 1: Understand the Mandate and Take Immediate Action
    • Cost-Cutting Plan
    • Cost-Cutting Planning Tool

    2. Select cost-cutting initiatives

    Identify the cost-cutting initiatives and design your roadmap.

    • Minimize the Damage of IT Cost Cuts – Phase 2: Select Cost-Cutting Initiatives

    3. Get approval for your cost-cutting plan and adopt change management best practices

    Communicate your roadmap to the business and attain approval.

    • Minimize the Damage of IT Cost Cuts – Phase 3: Get Approval for Your Cost-Cutting Plan and Adopt Change Management Best Practices
    • IT Personnel Engagement Plan
    • Stakeholder Communication Planning Tool
    [infographic]

    Workshop: Minimize the Damage of IT Cost Cuts

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Understand the Mandate and Take Immediate Action

    The Purpose

    Determine your cost-optimization stance.

    Build momentum with quick wins.

    Key Benefits Achieved

    Understand the internal and external drivers behind your cost-cutting mandate and the types of initiatives that align with it.

    Activities

    1.1 Develop SMART project metrics.

    1.2 Dissect the mandate.

    1.3 Identify your cost-cutting stance.

    1.4 Select and implement quick wins.

    1.5 Plan to report progress to Finance.

    Outputs

    Project metrics and mandate documentation

    List of quick-win initiatives

    2 Select Cost-Cutting Initiatives

    The Purpose

    Create the plan for your cost-cutting initiatives.

    Key Benefits Achieved

    Choose the correct initiatives for your roadmap.

    Create a sensible and intelligent roadmap for the cost-cutting initiatives.

    Activities

    2.1 Identify cost-cutting initiatives.

    2.2 Select initiatives.

    2.3 Build a roadmap.

    Outputs

    High-level cost-cutting initiatives

    Cost-cutting roadmap

    3 Get Approval for Your Cost-Cutting Plan and Adopt Change Management Best Practices

    The Purpose

    Finalize the cost-cutting plan and present it to the business.

    Key Benefits Achieved

    Attain engagement with key stakeholders.

    Activities

    3.1 Customize your cost-cutting plan.

    3.2 Create stakeholder engagement plans.

    3.3 Monitor cost savings.

    Outputs

    Cost-cutting plan

    Stakeholder engagement plan

    Cost-monitoring plan

    Modernize Communications and Collaboration Infrastructure

    • Buy Link or Shortcode: {j2store}306|cart{/j2store}
    • member rating overall impact: 9.4/10 Overall Impact
    • member rating average dollars saved: $68,332 Average $ Saved
    • member rating average days saved: 22 Average Days Saved
    • Parent Category Name: Voice & Video Management
    • Parent Category Link: /voice-video-management
    • Organizations are losing productivity from managing the limitations of yesterday’s technology. The business is changing and the current communications solution no longer adequately connects end users.
    • Old communications technology, including legacy telephony systems, disjointed messaging and communication or collaboration mediums, and unintuitive video conferencing, deteriorates the ability of users to work together in a productive manner.
    • You need a solution that meets budgetary requirements and improves internal and external communication, productivity, and the ability to work together.

    Our Advice

    Critical Insight

    • Project scope and assessment will take more time than you initially anticipate. Poorly defined technical requirements can result in failure to meet the needs of the business. Defining project scope and assessing the existing solution is 60% of project time. Being thorough here will make the difference moving forward.
    • Even when the project is about modernizing technology, it’s not really about the technology. The requirements of your people and the processes you want to maintain or reform should be the influential factors in your decisions on technology.
    • Gaining business buy-in can be difficult for projects that the business doesn’t equate with directly driving revenue. Ensure your IT team communicates with the business throughout the process and establishes business requirements. Framing conversations in a “business first, IT second” way is crucial to speaking in a language the business will understand.

    Impact and Result

    • Define a comprehensive set of requirements (across people, process, and technology) at the start of the project. Communication solutions are long-term commitments and mistakes in planning will be amplified during implementation.
    • Analyze the pros and cons of each deployment option and identify a communications solution that balances your budget and communications objectives and requirements.
    • Create an effective RFP by outlining your specific business and technical needs and goals.
    • Make the case for your communications infrastructure modernization project and be prepared to support it.

    Modernize Communications and Collaboration Infrastructure Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should modernize your communications and collaboration infrastructure, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess communications infrastructure

    Evaluate the infrastructure requirements and the ability to undergo modernization from legacy technology.

    • Modernize Communications and Collaboration Infrastructure – Phase 1: Assess Communications Infrastructure
    • Communications Infrastructure Roadmap Tool
    • Team Skills Inventory Tool
    • MACD Workflow Mapping Template - Visio
    • MACD Workflow Mapping Template - PDF

    2. Define the target state

    Build and document a formal set of business requirements using Info-Tech's pre-populated template after identifying stakeholders, aligning business and user needs, and evaluating deployment options.

    • Modernize Communications and Collaboration Infrastructure – Phase 2: Define the Target State
    • Stakeholder Engagement Workbook
    • Communications Infrastructure Stakeholder Focus Group Guide
    • IP Telephony and UC End-User Survey Questions
    • Enterprise Communication and Collaboration System Business Requirements Document
    • Communications TCO-ROI Comparison Calculator

    3. Advance the project

    Draft an RFP for a UC solution and gain project approval using Info-Tech’s executive presentation deck.

    • Modernize Communications and Collaboration Infrastructure – Phase 3: Advance the Project
    • Unified Communications Solution RFP Template
    • Modernize Communications Infrastructure Executive Presentation
    [infographic]

    Workshop: Modernize Communications and Collaboration Infrastructure

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess the Communications Infrastructure

    The Purpose

    Identify pain points.

    Build a skills inventory.

    Define and rationalize template configuration needs.

    Define standard service requests and map workflow.

    Discuss/examine site type(s) and existing technology.

    Determine network state and readiness.

    Key Benefits Achieved

    IT skills & process understanding.

    Documentation reflecting communications infrastructure.

    Reviewed network readiness.

    Completed current state analysis.

    Activities

    1.1 Build a skills inventory.

    1.2 Document move, add, change, delete (MACD) processes.

    1.3 List relevant communications and collaboration technologies.

    1.4 Review network readiness checklist.

    Outputs

    Clearly documented understanding of available skills

    Documented process maps

    Complete list of relevant communications and collaboration technologies

    Completed readiness checklist

    2 Learn and Evaluate Options to Define the Future

    The Purpose

    Hold focus group meeting.

    Define business needs and goals.

    Define solution options.

    Evaluate options.

    Discuss business value and readiness for each option.

    Key Benefits Achieved

    Completed value and readiness assessment.

    Current targets for service and deployment models.

    Activities

    2.1 Conduct internal focus group.

    2.2 Align business needs and goals.

    2.3 Evaluate deployment options.

    Outputs

    Understanding of user needs, wants, and satisfaction with current solution

    Assessment of business needs and goals

    Understanding of potential future-state solution options

    3 Identify and Close the Gaps

    The Purpose

    Identify gaps.

    Examine and evaluate ways to remedy gaps.

    Determine specific business requirements and introduce draft of business requirements document.

    Key Benefits Achieved

    Completed description of future state.

    Identification of gaps.

    Identification of key business requirements.

    Activities

    3.1 Identify gaps and brainstorm gap remedies.

    3.2 Complete business requirements document.

    Outputs

    Well-defined gaps and remedies

    List of specific business requirements

    4 Build the Roadmap

    The Purpose

    Introduce Unified Communications Solution RFP Template.

    Develop statement of work (SOW).

    Document technical requirements.

    Complete cost-benefit analysis.

    Key Benefits Achieved

    Unified Communications RFP.

    Documented technical requirements.

    Activities

    4.1 Draft RFP (SOW, tech requirements, etc.).

    4.2 Conduct cost-benefit analysis.

    Outputs

    Ready to release RFP

    Completed cost-benefit analysis

    Define a Sourcing Strategy for Your Development Team

    • Buy Link or Shortcode: {j2store}161|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Development
    • Parent Category Link: /development
    • Hiring quality development team resources is becoming increasingly difficult and costly in most domestic markets.
    • Firms are seeking to do more with less and increase their development team throughput.
    • Globalization and increased competition are driving a need for more innovation in your applications.
    • Firms want more cost certainty and tighter control of their development investment.

    Our Advice

    Critical Insight

    • Choosing the right sourcing strategy is not just a question of technical skills! Successful sourcing is based on matching your organization’s culture, knowledge, and experiences to the right choice of internal or external partnership.

    Impact and Result

    • We will help you build a sourcing strategy document for your application portfolio.
    • We will examine your portfolio and organization from three different perspectives to enable you to determine the right approach:
      • From a business perspective, reliance on the business, strategic value of the product, and maturity of product ownership are critical.
      • From an organizational perspective, you must examine your culture for communication processes, conflict resolution methods, vendor management skills, and geographic coverage.
      • From a technical perspective, consider integration complexity, environmental complexity, and testing processes.

    Define a Sourcing Strategy for Your Development Team Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Define a Sourcing Strategy for Your Development Team Storyboard – A guide to help you choose the right resourcing strategy to keep pace with your rapidly changing application and development needs.

    This project will help you define a sourcing strategy for your application development team by assessing key factors about your products and your organization, including critical business, technical, and organizational factors. Use this analysis to select the optimal sourcing strategy for each situation.

    • Define a Sourcing Strategy for Your Development Team Storyboard

    2. Define a Sourcing Strategy Workbook – A tool to capture the results of activities to build your sourcing strategy.

    This workbook is designed to capture the results of the activities in the storyboard. Each worksheet corresponds with an activity from the deck. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

    • Define a Sourcing Strategy Workbook
    [infographic]

    Further reading

    Define a Sourcing Strategy for Your Development Team

    Choose the right resourcing strategy to keep pace with your rapidly changing application and development needs.

    Analyst Perspective

    Choosing the right sourcing strategy for your development team is about assessing your technical situation, your business needs, your organizational culture, and your ability to manage partners!

    Photo of Dr. Suneel Ghei, Principal Research Director, Application Development, Info-Tech Research Group

    Firms today are under continuous pressure to innovate and deliver new features to market faster while at the same time controlling costs. This has increased the need for higher throughput in their development teams along with a broadening of skills and knowledge. In the face of these challenges, there is a new focus on how firms source their development function. Should they continue to hire internally, offshore, or outsource? How do they decide which strategy is the right fit?

    Info-Tech’s research shows that the sourcing strategy considerations have evolved beyond technical skills and costs. Identifying the right strategy has become a function of the characteristics of the organization, its culture, its reliance on the business for knowledge, its strategic value of the application, its vendor management skills, and its ability to internalize external knowledge. By assessing these factors firms can identify the best sourcing mix for their development portfolios.

    Dr. Suneel Ghei
    Principal Research Director, Application Development
    Info-Tech Research Group

    Executive Summary

    Your Challenge
    • Hiring quality development team resources is becoming increasingly difficult and costly in most domestic markets.
    • Firms are seeking to do more with less and increase their development team throughput.
    • Globalization and increased competition is driving a need for more innovation in your applications.
    • Firms want more cost certainty and tighter control of their development investment.
    Common Obstacles
    • Development leaders are encouraged to manage contract terms and SLAs rather than build long-term relationships.
    • People believe that outsourcing means you will permanently lose the knowledge around solutions.
    • Moving work outside of the current team creates motivational and retention challenges that can be difficult to overcome.
    Info-Tech’s Approach
    • Looking at this from these three perspectives will enable you to determine the right approach:
      1. From a business perspective, reliance on the business, strategic value of the product, and maturity of product ownership are critical.
      2. From an organizational perspective, you must examine your culture for communication processes, conflict resolution methods, vendor management skills, and geographic coverage
      3. From a technical perspective, consider integration complexity, environment complexity, and testing processes.

    Info-Tech Insight

    Choosing the right sourcing strategy is not just a question of technical skills! Successful sourcing is based on matching your organization’s culture, knowledge, and experiences to the right choice of internal or external partnership.

    Define a sourcing strategy for your development team

    Business
    • Business knowledge/ expertise required
    • Product owner maturity
    Technical
    • Complexity and maturity of technical environment
    • Required level of integration
    Organizational
    • Company culture
    • Desired geographic proximity
    • Required vendor management skills
    1. Assess your current delivery posture for challenges and impediments.
    2. Decide whether to build or buy a solution.
    3. Select your desired sourcing strategy based on your current state and needs.
    Example sourcing strategy with initiatives like 'Client-Facing Apps' and 'ERP Software' assigned to 'Onshore Dev', 'Outsource Team', 'Offshore Dev', 'Outsource App (Buy)', 'Outsource Dev', or 'Outsource Roles'.

    Three Perspectives +

    Three Steps =

    Your Sourcing Strategy

    Diverse sourcing is used by many firms

    Many firms across all industries are making use of different sourcing strategies to drive innovation and solve business issues.

    According to a report by ReportLinker the global IT services outsourcing market reached US$413.8 billion in 2021.

    In a recent study of Canadian software firms, it was found that almost all firms take advantage of outside knowledge in their application development process. In most cases these firms also use outside resources to do development work, and about half the time they use externally built software packages in their products (Ghei, 2020)!

    Info-Tech Insight

    In today’s diverse global markets, firms that wish to stay competitive must have a defined ability to take advantage of external knowledge and to optimize their IT services spend.

    Modeling Absorptive Capacity for Open Innovation in the Canadian Software Industry (Source: Ghei, 2020; n=54.)

    56% of software development firms are sourcing applications instead of resources.

    68% of firms are sourcing external resources to develop software products.

    91% of firms are leveraging knowledge from external sources.

    Internal sourcing models

    Insourcing comes in three distinct flavors

    Geospatial map giving example locations for the three internal sourcing models. In this example, 'Head Office' is located in North America, 'Onshore' is 'Located in the same area or even office as your core business resources. Relative Cost: $$$', 'Near Shore' is 'Typically, within 1-3 time zones for ease of collaboration where more favorable resource costs exist. Relative Cost: $$', and 'Offshore' is 'Located in remote markets where significant labor cost savings can be realized. Relative Cost: $'.

    Info-Tech Insight

    Insourcing allows you to stay close to more strategic applications. But choosing the right model requires a strong look inside your organization and your ability to provide business knowledge support to developers who may have different skills and cultures and are in different geographies.

    Outsourcing models

    External sourcing can be done to different degrees

    Outsource Roles
    • Enables resource augmentation
    • Typically based on skills needs
    • Short-term outsourcing with eventual integration or dissolution
    Outsource Teams (or Projects)
    • Use of a full team or multiple teams of vendor resources
    • Meant to be temporary, with knowledge transfer at the end of the project
    Outsource Products
    • Use of a vendor to build, maintain, and support the full product
    • Requires a high degree of contract management skill

    Info-Tech Insight

    Outsourcing represents one of the most popular ways for organizations to source external knowledge and skills. The choice of model is a function of the organization’s ability to support the external resources and to absorb the knowledge back into the organization.

    Defining your sourcing strategy

    Follow the steps below to identify the best match for your organization

    Review Your Current Situation

    Review the issues and opportunities related to application development and categorize them based on the key factors.

    Arrow pointing right. Assess Build Versus Buy

    Before choosing a sourcing model you must assess whether a particular product or function should be bought as a package or developed.

    Arrow pointing right. Choose the Right Sourcing Strategy

    Based on the research, use the modeling tool to match the situation to the appropriate sourcing solution.

    Step 1.1

    Review Your Current Situation

    Activities
    • 1.1.1 Identify and categorize your challenges

    This step involves the following participants:

    • Product management team
    • Software development leadership team
    • Key stakeholders
    Outcomes of this step

    Review your current delivery posture for challenges and impediments.

    Define a Sourcing Strategy for Your Development Team
    Step 1.1 Step 1.2 Step 1.3

    Review your situation

    There are three key areas to examine in your current situation:

    Business Challenges
    • Do you need to gain new knowledge to drive innovation?
    • Does your business need to enhance its software to improve its ability to compete in the market?
    • Do you need to increase your speed of innovation?

    Technology Challenges

    • Are you being asked to take tighter control of your development budgets?
    • Does your team need to expand their skills and knowledge?
    • Do you need to increase your development speed and capacity?

    Market Challenges

    • Is your competition seen as more innovative?
    • Do you need new features to attract new clients?
    • Are you struggling to find highly skilled and knowledgeable development resources?
    Stock image of multi-colored arrows travelling in a line together before diverging.

    Info-Tech Insight

    Sourcing is a key tool to solve business and technical challenges and enhance market competitiveness when coupled with a robust definition of objectives and a way to measure success.

    1.1.1 Identify and categorize your challenges

    60 minutes

    Output: List of the key challenges in your software lifecycle. Breakdown of the list into categories to identify opportunities for sourcing

    Participants: Product management team, Software development leadership team, Key stakeholders

    1. What challenge is your firm is facing with respect to your software that you think sourcing can address? (20 minutes)
    2. Is the challenge related to a business outcome, development methodology, or technology challenge? (10 minutes)
    3. Is the challenge due to a skills gap, budget or resource challenge, throughput issue, or a broader organizational knowledge or process issue? (10 minutes)
    4. What is the specific objective for the team/leader in addressing this challenge? (15 minutes)
    5. How will you measure progress and achievement of this objective? (5 minutes)

    Document results in the Define a Sourcing Strategy Workbook

    Identify and categorize your challenges

    Sample table for identifying and categorizing challenges, with column groups 'Challenge' and 'Success Measures' containing headers 'Issue, 'Category', 'Breadth', and 'Stakeholder' in the former, and 'Objective' and 'Measurement' in the latter.

    Step 1.2

    Assess Build Versus Buy

    Activities
    • 1.2.1 Understand the benefits and drawbacks of build versus buy in your organizational context

    This step involves the following participants:

    • Product management team
    • Software development leadership team
    • Key stakeholders

    Outcomes of this step

    Understand in your context the benefits and drawbacks of build versus buy, leveraging Info-Tech’s recommended definitions as a starting point.

    Define a Sourcing Strategy for Your Development Team

    Step 1.1 Step 1.2 Step 1.3

    Look vertically across the IT hierarchy to assess the impact of your decision at every level

    IT Hierarchy with 'Enterprise' at the top, branching out to 'Portfolio', then to 'Solution' at the bottom. The top is 'Strategic', the bottom 'Operational'.

    Regardless of the industry, a common and challenging dilemma facing technology teams is to determine when they should build software or systems in-house versus when they should rely wholly on an outside vendor for delivering on their technology needs.

    The answer is not as cut and dried as one would expect. Any build versus buy decision may have an impact on strategic and operational plans. It touches every part of the organization, starting with individual projects and rolling up to the enterprise strategy.

    Info-Tech Insight

    Do not ignore the impact of a build or buy decision on the various management levels in an IT organization.

    Deciding whether to build or buy

    It is as much about what you gain as it is about what problem you choose to have

    BUILD BUY

    Multi-Source Best of Breed

    Integrate various technologies that provide subset(s) of the features needed for supporting the business functions.

    Vendor Add-Ons & Integrations

    Enhance an existing vendor’s offerings by using their system add-ons either as upgrades, new add-ons, or integrations.
    Pros
    • Flexibility in choice of tools
    • In some cases, cost may be lower
    • Easier to enhance with in-house teams
    Cons
    • Introduces tool sprawl
    • Requires resources to understand tools and how they integrate
    • Some of the tools necessary may not be compatible with one another
    Pros
    • Reduces tool sprawl
    • Supports consistent tool stack
    • Vendor support can make enhancement easier
    • Total cost of ownership may be lower
    Cons
    • Vendor lock-in
    • The processes to enhance may require tweaking to fit tool capability

    Multi-Source Custom

    Integrate systems built in-house with technologies developed by external organizations.

    Single Source

    Buy an application/system from one vendor only.
    Pros
    • Flexibility in choice of tools
    • In some cases, cost may be lower
    • Easier to enhance with in-house teams
    Cons
    • May introduce tool sprawl
    • Requires resources to have strong technical skills
    • Some of the tools necessary may not be compatible with one another
    Pros
    • Reduces tool sprawl
    • Supports consistent tool stack
    • Vendor support can make enhancement easier
    • Total cost of ownership may be lower
    Cons
    • Vendor lock-in
    • The processes to enhance may require tweaking to fit tool capability

    1.2.1 Understand the benefits and drawbacks of build versus buy in your organizational context

    30 minutes

    Output: A common understanding of the different approaches to build versus buy applied to your organizational context

    Participants: Product management team, Software development leadership team, Key stakeholders

    1. Look at the previous slide, Deciding whether to build or buy.
    2. Discuss the pros and cons listed for each approach.
      1. Do they apply in your context? Why or why not?
      2. Are there some approaches not applicable in terms of how you wish to work?
    3. Record the curated list of pros and cons for the different build/buy approaches.
    4. For each approach, arrange the pros and cons in order of importance.

    Document results in the Define a Sourcing Strategy Workbook

    Step 1.3

    Choose the Right Sourcing Strategy

    Activities
    • 1.3.1 Determine the right sourcing strategy for your needs

    This step involves the following participants:

    • Product management team
    • Software development leadership team
    • Key stakeholders

    Outcomes of this step

    Choose your desired sourcing strategy based on your current state and needs.

    Define a Sourcing Strategy for Your Development Team

    Step 1.1 Step 1.2 Step 1.3

    Choose the right sourcing strategy

    • Based on our research, finding the right sourcing strategy for a particular situation is a function of three key areas:
      • Business drivers
      • Organizational drivers
      • Technical drivers
    • Each area has key characteristics that must be assessed to confirm which strategy is best suited for the situation.
    • Once you have assessed the factors and ranked them from low to high, we can then match your results with the best-fit strategy.
    Business
    • Business knowledge/ expertise required
    • Product owner maturity

    Technical

    • Complexity and maturity of technical environment
    • Required level of integration

    Organizational

    • Your culture
    • Desired geographic proximity
    • Required vendor management skills

    Business drivers

    To choose the right sourcing strategy, you need to assess your key drivers of delivery

    Product Knowledge
    • The level of business involvement required to support the development team is a critical factor in determining the sourcing model.
    • Both the breadth and depth of involvement are critical factors.
    Strategic Value
    • The strategic value of the application to the company is also a critical component.
    • The more strategic the application is to the company, the closer the sourcing should be maintained.
    • Value can be assessed based on the revenue derived from the application and the depth of use of the application by the organization.
    Product Ownership Maturity
    • To support sourcing models that move further from organizational boundaries a strong product ownership function is required.
    • Product owners should ideally be fully allocated to the role and engaged with the development teams.
    • Product owners should be empowered to make decisions related to the product, its vision, and its roadmap.
    • The higher their allocation and empowerment, the higher the chances of success in external sourcing engagements.
    Stock image of a person running up a line with a positive trend.

    Case Study: The GoodLabs Studio Experience Logo for GoodLabs Studio.

    INDUSTRY: Software Development | SOURCE: Interview with Thomas Lo, Co-Founder, GoodLabs Studio
    Built to Outsource Development Teams
    • GoodLabs is an advanced software innovation studio that provides bespoke team extensions or turnkey digital product development with high-caliber software engineers.
    • Unlike other consulting firms, GoodLabs works very closely with its customers as a unified team to deliver the most significant impact on clients’ projects.
    • With this approach, it optimizes the delivery of strong software engineering skills with integrated product ownership from the client, enabling long-term and continued success for its clients.
    Results
    • GoodLabs is able to attract top engineering talent by focusing on a variety of complex projects that materially benefit from technical solutions, such as cybersecurity, fraud detection, and AI syndrome surveillance.
    • Taking a partnership approach with the clients has led to the successful delivery of many highly innovative and challenging projects for the customers.

    Organizational drivers

    To choose the right sourcing strategy for a particular problem you need to assess the organization’s key capabilities

    Stock photo of someone placing blocks with illustrated professionals one on top of the other. Vendor Management
    • Vendor management is a critical skill for effective external sourcing.
    • This can be assessed based on the organization’s ability to cultivate and grow long-term relationships of mutual value.
    • The longevity and growth of existing vendor relationships can be a good benchmark for future success.
    Absorptive Capacity
    • To effectively make use of external sourcing models, the organization must have a well-developed track record of absorbing outside knowledge.
    • This can be assessed by looking at past cases where external knowledge was sourced and internalized, such as past vendor development engagements or use of open-source code.
    Organizational Culture
    • Another factor in success of vendor engagements and long-term relationships is the matching of organizational cultures.
    • It is key to measure the organization’s current position on items like communication strategy, geographical dispersal, conflict resolution strategy, and hierarchical vs flat management.
    • These factors should be documented and matched with partners to determine the best fit.

    Case Study: WCIRB California Logo for WCIRB California.

    INDUSTRY: Workers Compensation Insurance | SOURCE: Interview with Roger Cottman, Senior VP and CIO, WCIRB California
    Trying to Find the Right Match
    • WCIRB is finding it difficult to hire local resources in California.
    • Its application is a niche product. Since no off-the-shelf alternatives exist, the organization will require a custom application.
    • WCIRB is in the early stages of a digital platform project and is looking to bring in a partner to provide a full development team, with the goal of ideally bringing the application back in-house once it is built.
    • The organization is looking for a local player that will be able to integrate well with the business.
    • It has engaged with two mid-sized players but both have been slow to respond, so it is now considering alternative approaches.
    Info-Tech’s Recommended Approach
    • WCIRB is finding that mid-sized players don’t fit its needs and is now looking for a larger player
    • Based on our research we have advised that WCIRB should ensure the partner is geographically close to its location and can be a strategic partner, not simply work on an individual project.

    Technical drivers

    To choose the right sourcing strategy for a particular problem you need to assess your technical situation and capabilities

    Environment Complexity
    • The complexity of your technical environment is a hurdle that must be overcome for external sourcing models.
    • The number of environments used in the development lifecycle and the location of environments (physical, virtual, on-premises, or cloud) are key indicators.
    Integration Requirements
    • The complexity of integration is another key technical driver.
    • The number of integrations required for the application is a good measuring stick. Will it require fewer than 5, 5-10, or more than 10?
    Testing Capabilities
    • Testing of the application is a key technical driver of success for external models.
    • Having well-defined test cases, processes, and shared execution with the business are all steps that help drive success of external sourcing models.
    • Test automation can also help facilitate success of external models.
    • Measure the percentage of test cases that are standardized, the level of business involvement, and the percentage of test cases that are automated.
    Stock image of pixelated light.

    Case Study: Management Control Systems (MC Systems) Logo for MC Systems.

    INDUSTRY: Technology Services | SOURCE: Interview with Kathryn Chin See, Business Development and Research Analyst, MC Systems
    Seeking to Outsource Innovation
    • MC Systems is seeking to outsource its innovation function to get budget certainty on innovation and reduce costs. It is looking for a player that has knowledge of the application areas it is looking to enhance and that would augment its own business knowledge.
    • In previous outsourcing experiences with skills augmentation and application development the organization had issues related to the business depth and product ownership it could provide. The collaborations did not lead to success as MC Systems lacked product ownership and the ability to reintegrate the outside knowledge.
    • The organization is concerned about testing of a vendor-built application and how the application will be supported.
    Info-Tech’s Recommended Approach
    • To date MC Systems has had success with its outsourcing approach when outsourcing specific work items.
    • It is now looking to expand to outsourcing an entire application.
    • Info-Tech’s recommendation is to seek partners who can take on development of the application.
    • MC Systems will still need resources to bring knowledge back in-house for testing and to provide operational support.

    Choosing the right model


    Legend for the table below using circles with quarters to represent Low (0 quarters) to High (4 quarters).
    Determinant Key Questions to Ask Onshore Nearshore Offshore Outsource Role(s) Outsource Team Outsource Product(s)
    Business Dependence How much do you rely on business resources during the development cycle? Circle with 4 quarters. Circle with 3 quarters. Circle with 1 quarter. Circle with 2 quarters. Circle with 1 quarter. Circle with 0 quarters.
    Absorptive Capacity How successful has the organization been at bringing outside knowledge back into the firm? Circle with 0 quarters. Circle with 1 quarter. Circle with 1 quarter. Circle with 2 quarters. Circle with 1 quarter. Circle with 4 quarters.
    Integration Complexity How many integrations are required for the product to function – fewer than 5, 5-10, or more than 10? Circle with 4 quarters. Circle with 3 quarters. Circle with 3 quarters. Circle with 2 quarters. Circle with 1 quarter. Circle with 0 quarters.
    Product Ownership Do you have full-time product owners in place for the products? Do product owners have control of their roadmaps? Circle with 1 quarter. Circle with 2 quarters. Circle with 3 quarters. Circle with 2 quarters. Circle with 4 quarters. Circle with 4 quarters.
    Organization Culture Fit What are your organization’s communication and conflict resolution strategies? Is your organization geographically dispersed? Circle with 1 quarter. Circle with 1 quarter. Circle with 3 quarters. Circle with 1 quarter. Circle with 3 quarters. Circle with 4 quarters.
    Vendor Mgmt Skills What is your skill level in vendor management? How long are your longest-standing vendor relationships? Circle with 0 quarters. Circle with 1 quarter. Circle with 1 quarter. Circle with 2 quarters. Circle with 3 quarters. Circle with 4 quarters.

    1.3.1 Determine the right sourcing strategy for your needs

    60 minutes

    Output: A scored matrix of the key drivers of the sourcing strategy

    Participants: Development leaders, Product management team, Key stakeholders

    Choose one of your products or product families and assess the factors below on a scale of None, Low, Medium, High, and Full.

    • 3.1 Assess the business factors that drive selection using these key criteria (20 minutes):
      • 3.1.1 Product knowledge
      • 3.1.2 Strategic value
      • 3.1.3 Product ownership
    • 3.2 Assess the organizational factors that drive selection using these key criteria (20 minutes):
      • 3.2.1 Vendor management
      • 3.2.2 Absorptive capacity
      • 3.2.3 Organization culture
    • 3.3 Assess the technical factors that drive selection using these key criteria (20 minutes):
      • 3.3.1 Environments
      • 3.3.2 Integration
      • 3.3.3 Testing

    Document results in the Define a Sourcing Strategy Workbook

    Things to Consider When Implementing

    Once you have built your strategy there are some additional things to consider

    Things to Consider Before Acting on Your Strategy

    By now you understand what goes into an effective sourcing strategy. Before implementing one, there are a few key items you need to consider:

    Example 'Sourcing Strategy for Your Portfolio' with initiatives like 'Client-Facing Apps' and 'ERP Software' assigned to 'Onshore Dev', 'Outsource Team', 'Offshore Dev', 'Outsource App (Buy)', 'Outsource Dev', or 'Outsource Roles'. Start with a pilot
    • Changing sourcing needs to start with one team.
    • Grow as skills develop to limit risk.
    Build an IT workforce plan Enhance your vendor management skills Involve the business early and often
    • The business should feel they are part of the discussion.
    • See our Agile/DevOps Research Center for more information on how the business and IT can better work together.
    Limit sourcing complexity
    • Having too many different partners and models creates confusion and will strain your ability to manage vendors effectively.

    Bibliography

    Apfel, Isabella, et al. “IT Project Member Turnover and Outsourcing Relationship Success: An Inverted-U Effect.” Developments, Opportunities and Challenges of Digitization, 2020. Web.

    Benamati, John, and Rajkumar, T.M. “The Application Development Outsourcing Decision: An Application of the Technology Acceptance Model.” Journal of Computer Information Systems, vol. 42, no. 4, 2008, pp. 35-43. Web.

    Benamati, John, and Rajkumar, T.M. “An Outsourcing Acceptance Model: An Application of TAM to Application Development Outsourcing Decisions.” Information Resources Management Journal, vol. 21, no. 2, pp. 80-102, 2008. Web.

    Broekhuizen, T. L. J., et al. “Digital Platform Openness: Drivers, Dimensions and Outcomes.” Journal of Business Research, vol. 122, July 2019, pp. 902-914. Web.

    Brook, Jacques W., and Albert Plugge. “Strategic Sourcing of R&D: The Determinants of Success.” Business Information Processing, vol. 55, Aug. 2010, pp. 26-42. Web.

    Delen, G. P A.J., et al. “Foundations for Measuring IT-Outsourcing Success and Failure.” Journal of Systems and Software, vol. 156, Oct. 2019, pp. 113-125. Web.

    Elnakeep, Eman, et al. “Models and Frameworks for IS Outsourcing Structure and Dimensions: A Holistic Study.” Lecture notes in Networks and Systems, 2019. Web.

    Ghei, Suneel. Modeling Absorptive Capacity for Open Innovation in the Software Industry. 2020. Faculty of Graduate Studies, Athabasca University, 2020. DBA Dissertation.

    “IT Outsourcing Market Research Report by Service Model, Organization Sizes, Deployment, Industry, Region – Global Forecast to 2027 – Cumulative Impact of COVID-19.” ReportLinker, April 2022. Web.

    Jeong, Jongkil Jay, et al. “Enhancing the Application and Measurement of Relationship Quality in Future IT Outsourcing Studies.” 26th European Conference on Information Systems: Beyond Digitization – Facets of Socio-Tehcnical Change: Proceedings of ECIS 2018, Portsmouth, UK, June 23-28, 2018. Edited by Peter Bednar, et al., 2018. Web.

    Könning, Michael. “Conceptualizing the Effect of Cultural Distance on IT Outsourcing Success.” Proceedings of Australasian Conference on Information Systems 2018, Sydney, Australia, Dec. 3-5, 2018. Edited by Matthew Noble, UTS ePress, 2018. Web.

    Lee, Jae-Nam, et al. “Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach.” MIS Quarterly, vol. 43, no. 4, Dec. 2019, pp. 1201-1225. Web.

    Loukis, Euripidis, et al. “Determinants of Software-as-a-Service Benefits and Impact on Firm Performance.” Decision Support Systems, vol. 117, Feb. 2019, pp. 38-47. Web.

    Martensson, Anders. “Patterns in Application Development Sourcing in the Financial Industry.” Proceedings of the 13th European Conference of Information Systems, 2004. Web.

    Martínez-Sánchez, Angel, et al. “The Relationship Between R&D, the Absorptive Capacity of Knowledge, Human Resource Flexibility and Innovation: Mediator Effects on Industrial Firms.” Journal of Business Research, vol. 118, Sept. 2020, pp. 431-440. Web.

    Moreno, Valter, et al. “Outsourcing of IT and Absorptive Capacity: A Multiple Case Study in the Brazilian Insurance Sector.” Brazilian Business Review, vol. 17, no. 1, Jan.-Feb. 2020, pp. 97-113. Web.

    Ozturk, Ebru. “The Impact of R&D Sourcing Strategies on Basic and Developmental R&D in Emerging Economies.” European Journal of Innovation Management, vol. 21, no. 7, May 2018, pp. 522-542. Web.

    Ribas, Imma, et al. “Multi-Step Process for Selecting Strategic Sourcing Options When Designing Supply Chains.” Journal of Industrial Engineering and Management, vol. 14, no. 3, 2021, pp. 477-495. Web.

    Striteska, Michaela Kotkova, and Viktor Prokop. “Dynamic Innovation Strategy Model in Practice of Innovation Leaders and Followers in CEE Countries – A Prerequisite for Building Innovative Ecosystems.” Sustainability, vol. 12, no. 9, May 2020. Web.

    Thakur-Wernz, Pooja, et al. “Antecedents and Relative Performance of Sourcing Choices for New Product Development Projects.” Technovation, 2020. Web.

    Business Value

    • Buy Link or Shortcode: {j2store}7|cart{/j2store}
    • Related Products: {j2store}7|crosssells{/j2store}
    • Up-Sell: {j2store}7|upsells{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Financial Management
    • Parent Category Link: /financial-management
    Maximize your ROI on IT through benefits realization

    IT Management and Policies

    • Buy Link or Shortcode: {j2store}23|cart{/j2store}
    • Related Products: {j2store}23|crosssells{/j2store}
    • InfoTech Academy Title: IT management and policies videos
    • InfoTech Academy Excerpt: More videos are available once you join. Contact us for more information.
    • Teaser Video: Visit Website
    • Teaser Video Title: Policies Academy Overview
    • member rating overall impact: 9.5/10
    • member rating average dollars saved: $23101
    • member rating average days saved: 11
    • Parent Category Name: Strategy and Governance
    • InfotechAcademy-Executivebrief: Visit Website
    • Parent Category Link: /strategy-and-governance
    Create policies that matter most to your organization.

    Management, policy, policies

    Implement Lean Management Practices That Work

    • Buy Link or Shortcode: {j2store}116|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Performance Measurement
    • Parent Category Link: /performance-measurement
    • Service delivery teams do not measure, or have difficulty demonstrating, the value they provide.
    • There is a lack of continuous improvement.
    • There is low morale within the IT teams leading to low productivity.

    Our Advice

    Critical Insight

    • Create a problem-solving culture. Frequent problem solving is the differentiator between sustaining Lean or falling back to old management methods.
    • Commit to employee growth. Empower teams to problem solve and multiply your organizational effectiveness.

    Impact and Result

    • Apply Lean management principles to IT to create alignment and transparency and drive continuous improvement and customer value.
    • Implement huddles and visual management.
    • Build team capabilities.
    • Focus on customer value.
    • Use metrics and data to make better decisions.
    • Systematically solve problems and improve performance.
    • Develop an operating rhythm to promote adherence to Lean.

    Implement Lean Management Practices That Work Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how a Lean management system can help you increase transparency, demonstrate value, engage your teams and customers, continuously improve, and create alignment.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Understand Lean concepts

    Understand what a Lean management system is, review Lean philosophies, and examine simple Lean tools and activities.

    • Implement Lean Management Practices That Work – Phase 1: Understand Lean Concepts
    • Lean Management Education Deck

    2. Determine the scope of your implementation

    Understand the implications of the scope of your Lean management program.

    • Implement Lean Management Practices That Work – Phase 2: Determine the Scope of Your Implementation
    • Lean Management Scoping Tool

    3. Design huddle board

    Examine the sections and content to include in your huddle board design.

    • Implement Lean Management Practices That Work – Phase 3: Design Huddle Board
    • Lean Management Huddle Board Template

    4. Design Leader Standard Work and operating rhythm

    Determine the actions required by leaders and the operating rhythm.

    • Implement Lean Management Practices That Work – Phase 4: Design Leader Standard Work and Operating Rhythm
    • Leader Standard Work Tracking Template
    [infographic]

    Workshop: Implement Lean Management Practices That Work

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Understand Lean Concepts

    The Purpose

    Understand Lean management.

    Key Benefits Achieved

    Gain a common understanding of Lean management, the Lean management thought model, Lean philosophies, huddles, visual management, team growth, and voice of customer.

    Activities

    1.1 Define Lean management in your organization.

    1.2 Create training materials.

    Outputs

    Lean management definition

    Customized training materials

    2 Understand Lean Concepts (Continued) and Determine Scope

    The Purpose

    Understand Lean management.

    Determine the scope of your program.

    Key Benefits Achieved

    Understand metrics and performance review.

    Understand problem identification and continuous improvement.

    Understand Kanban.

    Understand Leader Standard Work.

    Define the scope of the Lean management program.

    Activities

    2.1 Develop example operational metrics

    2.2 Simulate problem section.

    2.3 Simulate Kanban.

    2.4 Build scoping tool.

    Outputs

    Understand how to use operational metrics

    Understand problem identification

    Understand Kanban/daily tasks section

    Defined scope for your program

    3 Huddle Board Design and Huddle Facilitation Coaching

    The Purpose

    Design the sections and content for your huddle board.

    Key Benefits Achieved

    Initial huddle board design.

    Activities

    3.1 Design and build each section in your huddle board.

    3.2 Simulate coaching conversations.

    Outputs

    Initial huddle board design

    Understanding of how to conduct a huddle

    4 Design and Build Leader Standard Work

    The Purpose

    Design your Leader Standard Work activities.

    Develop a schedule for executing Leader Standard Work.

    Key Benefits Achieved

    Standard activities identified and documented.

    Sample schedule developed.

    Activities

    4.1 Identify standard activities for leaders.

    4.2 Develop a schedule for executing Leader Standard Work.

    Outputs

    Leader Standard Work activities documented

    Initial schedule for Leader Standard Work activities

    Customer Relationship Management Platform Selection Guide

    • Buy Link or Shortcode: {j2store}529|cart{/j2store}
    • member rating overall impact: 9.2/10 Overall Impact
    • member rating average dollars saved: $14,719 Average $ Saved
    • member rating average days saved: 32 Average Days Saved
    • Parent Category Name: Customer Relationship Management
    • Parent Category Link: /customer-relationship-management
    • Customer relationship management (CRM) suites are an indispensable part of a holistic strategy for managing end-to-end customer interactions.
    • After defining an approach to CRM, selection and implementation of the right CRM suite is a critical step in delivering concrete business value for marketing, sales, and customer service.
    • Despite the importance of CRM selection and implementation, many organizations struggle to define an approach to picking the right vendor and rolling out the solution in an effective and cost-efficient manner.
    • IT often finds itself in the unenviable position of taking the fall for CRM platforms that don't deliver on the promise of the CRM strategy.

    Our Advice

    Critical Insight

    • IT needs to be a trusted partner in CRM selection and implementation, but the business also needs to own the requirements and be involved from the beginning.
    • CRM requirements dictate the components of the target CRM architecture, such as deployment model, feature focus, and customization level. Savvy application directors recognize the points in the project where the CRM architecture model necessitates deviations from a "canned" roll-out plan.
    • CRM selection is a multi-step process that involves mapping target capabilities for marketing, sales, and customer service, assigning requirements across functional categories, determining the architecture model to prioritize criteria, and developing a comprehensive RFP that can be scored in a weighted fashion.
    • Companies that succeed with CRM implementation create a detailed roadmap that outlines milestones for configuration, security, points of implementation, data migration, training, and ongoing application maintenance.

    Impact and Result

    • A CRM platform that effectively meets the needs of marketing, sales, and customer service and delivers value.
    • Reduced costs during CRM selection.
    • Reduced implementation costs and time frame.
    • Faster time to results after implementation.

    Customer Relationship Management Platform Selection Guide Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Customer Relationship Management Platform Selection Guide – Speed up the process to build your business case and select your CRM solution.

    This blueprint will help you build a business case for selecting the right CRM platform, defining key requirements, and conducting a thorough analysis and scan of the ever-evolving CRM market space.

    • Customer Relationship Management Platform Selection Guide — Phases 1-3

    2. CRM Business Case Template – Document the key drivers for selecting a new CRM platform.

    Having a sound business case is essential for succeeding with a CRM. This template will allow you to document key drivers and impact, in line with the CRM Platform Selection Guide blueprint.

    • CRM Business Case Template

    3. CRM Request for Proposal Template

    Create your own request for proposal (RFP) for your customer relationship management (CRM) solution procurement process by customizing the RFP template created by Info-Tech.

    • CRM Request for Proposal Template

    4. CRM Suite Evaluation and RFP Scoring Tool

    The CRM market has many strong contenders and differentiation may be difficult. Instead of relying solely on reputation, organizations can use this RFP tool to record and objectively compare vendors according to their specific requirements.

    • CRM Suite Evaluation and RFP Scoring Tool

    5. CRM Vendor Demo Script

    Use this template to support your business's evaluation of vendors and their solutions. Provide vendors with scenarios that prompt them to display not only their solution's capabilities, but also how the tool will support your organization's particular needs.

    • CRM Vendor Demo Script

    6. CRM Use Case Fit Assessment Tool

    Use this tool to help build a CRM strategy for the organization based on the specific use case that matches your organizational needs.

    • CRM Use-Case Fit Assessment Tool
    [infographic]

    Further reading

    Customer Relationship Management Platform Selection Guide

    Speed up the process to build your business case and select your CRM solution.

    Table of Contents

    1. Analyst Perspective
    2. Executive Summary
    3. Blueprint Overview
    4. Executive Brief
    5. Phase 1: Understand CRM Functionality
    6. Phase 2: Build the Business Case and Elicit CRM requirements
    7. Phase 3: Discover the CRM Marketspace and Prepare for Implementation
    8. Conclusion

    Analyst Perspective

    A strong CRM platform is paramount to succeeding with customer engagement.

    Modern CRM platforms are the workhorses that provide functional capabilities and data curation for customer experience management. The market for CRM platforms has seen an explosion of growth over the last five years, as organizations look to mature their ability to deliver strong capabilities across marketing, sales, and customer service.

    IT needs to be a trusted partner in CRM selection and implementation, but the business also needs to own the requirements and be involved from the get-go.

    CRM selection must be a multistep process that involves defining target capabilities for marketing, sales, and customer service, prioritizing requirements across functional categories, determining the architecture model for the CRM environment, and developing a comprehensive RFP that can be scored in a weighted fashion.

    To succeed with CRM implementation, create a detailed roadmap that outlines milestones for configuration, security, points of implementation, data migration, training, and ongoing application maintenance.

    Photo of Ben Dickie, Research Lead, Customer Experience Strategy, Info-Tech Research Group. Ben Dickie
    Research Lead, Customer Experience Strategy
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    Customer Relationship Management (CRM) suites are an indispensable part of a holistic strategy for managing end-to-end customer interactions. Selecting the right platform that aligns with your requirements is a significant undertaking.

    After defining an approach to CRM, selection and implementation of the right CRM suite is a critical step in delivering concrete business value for marketing, sales, and customer service.
    Common Obstacles

    Despite the importance of CRM selection and implementation, many organizations struggle to define an approach to picking the right vendor and rolling out the solution in an effective and cost-efficient manner.

    The CRM market is rapidly evolving and changing, making it tricky to stay on top of the space.

    IT often finds itself in the unenviable position of taking the fall for CRM platforms that don’t deliver on the promise of the CRM strategy.
    Info-Tech’s Approach

    CRM platform selection must be driven by your overall customer experience management strategy: link your CRM selection to your organization’s CXM framework.

    Determine if you need a CRM platform that skews toward marketing, sales, or customer service; leverage use cases to help guide selection.

    Ensure strong points of integration between CRM and other software such as MMS. A CRM should not live in isolation; it must provide a 360-degree view.

    Info-Tech Insight

    IT must work in lockstep with its counterparts in marketing, sales, and customer service to define a unified vision for the CRM platform.

    Info-Tech’s methodology for selecting the right CRM platform

    1. Understand CRM Features 2. Build the Business Case & Elicit CRM Requirements 3. Discover the CRM Market Space & Prepare for Implementation
    Phase Steps
    1. Define CRM platforms
    2. Classify table stakes & differentiating capabilities
    3. Explore CRM trends
    1. Build the business case
    2. Streamline requirements elicitation for CRM
    3. Construct the RFP
    1. Discover key players in the CRM landscape
    2. Engage the shortlist & select finalist
    3. Prepare for implementation
    Phase Outcomes
    • Consensus on scope of CRM and key CRM capabilities
    • CRM selection business case
    • Top-level use cases and requirements
    • Completed CRM RFP
    • CRM market analysis
    • Shortlisted vendor
    • Implementation considerations

    Guided Implementation

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    The CRM purchase process should be broken into segments:

    1. CRM vendor shortlisting with this buyer’s guide
    2. Structured approach to selection
    3. Contract review

    What does a typical GI on this topic look like?

    Phase 1

    Phase 2

    Phase 3

    Call #1: Understand what a CRM platform is and the “art of the possible” for sales, marketing, and customer service. Call #2: Build the business case to select a CRM.

    Call #3: Define your key CRM requirements.

    Call #4: Build procurement items such as an RFP.
    Call #5: Evaluate the CRM solution landscape and shortlist viable options.

    Call #6: Review implementation considerations.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    INFO~TECH RESEARCH GROUP

    Customer Relationship Management Platform Selection Guide

    Speed up the process to build your business case and select your CRM solution.

    EXECUTIVE BRIEF

    Info-Tech Research Group Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.
    © 1997-2022 Info-Tech Research Group Inc.

    What exactly is a CRM platform?

    Our Definition: A customer relationship management (CRM) platform (or suite) is a core enterprise application that provides a broad feature set for supporting customer interaction processes, typically across marketing, sales and customer service. These suites supplant more basic applications for customer interaction management (such as the contact management module of an enterprise resource planning (ERP) platform or office productivity suite).

    A customer relationship management suite provides many key capabilities, including but not limited to:

    • Account management
    • Order history tracking
    • Pipeline management
    • Case management
    • Campaign management
    • Reports and analytics
    • Customer journey execution

    A CRM suite provides a host of native capabilities, but many organizations elect to tightly integrate their CRM solution with other parts of their customer experience ecosystem to provide a 360-degree view of their customers.

    Stock image of a finger touching a screen showing a stock chart.

    Info-Tech Insight

    CRM feature sets are rapidly evolving. Focus on the social component of sales, marketing, and service management features, as well as collaboration, to get the best fit for your requirements. Moreover, consider investing in best-of-breed social media management platforms (SMMPs) and internal collaboration tools to ensure sufficient functionality.

    Build a cohesive CRM selection approach that aligns business goals with CRM capabilities.

    Info-Tech Insight

    Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.

    Customer expectations are on the rise: meet them!

    A CRM platform is a crucial system for enabling good customer experiences.

    CUSTOMER EXPERIENCE IS EVOLVING

    1. Thoughtfulness is in
        Connect with customers on a personal level
    2. Service over products
        The experience is more important than the product
    3. Culture is now number one
        Culture is the most overlooked piece of customer experience strategy
    4. Engineering and service finally join forces
        Companies are combining their technology and service efforts to create strong feedback loops
    5. The B2B world is inefficiently served
        B2B needs to step up with more tools and a greater emphasis placed on customer experience

    (Source: Forbes, 2019)

    Identifying organizational objectives of high priority will assist in breaking down business needs and CRM objectives. This exercise will better align the CRM systems with the overall corporate strategy and achieve buy-in from key stakeholders.

    A strong CRM platform supports a range of organizational objectives for customer engagement.

    Increase Revenue Enable lead scoring Deploy sales collateral management tools Improve average cost per lead via a marketing automation tool
    Enhance Market Share Enhance targeting effectiveness with a CRM Increase social media presence via an SMMP Architect customer intelligence analysis
    Improve Customer Satisfaction Reduce time-to-resolution via better routing Increase accessibility to customer service with live chat Improve first contact resolution with customer KB
    Increase Customer Retention Use a loyalty management application Improve channel options for existing customers Use customer analytics to drive targeted offers
    Create Customer-Centric Culture Ensure strong training and user adoption programs Use CRM to provide 360-degree view of all customer interactions Incorporate the voice of the customer into product development

    Succeeding with CRM selection and implementation has a positive effect on driving revenues and decreasing costs

    There are three buckets of metrics and KPIs where CRM will drive improvements

    The metrics of a smooth CRM selection and implementation process include:

    • Better alignment of CRM functionality to business needs.
    • Better functionality coverage of the selected platform.
    • Decreased licensing costs via better vendor negotiation.
    • Improved end-user satisfaction with the deployed solution.
    • Fewer errors and rework during implementation.
    • Reduced total implementation costs.
    • Reduced total implementation time.

    A successful CRM deployment drives revenue

    • Increased customer acquisition due to enhanced accuracy of segmentation and targeting, superior lead qualification, and pipeline management.
    • Increased customer satisfaction and retention due to targeted campaigns (e.g. customer-specific deals), quicker service incident resolution, and longitudinal relationship management.
    • Increased revenue per customer due to comprehensive lifecycle management tools, social engagement, and targeted upselling of related products and services (enabled by better reporting/analytics).

    A successful CRM deployment decreases cost

    • Deduplication of effort across business domains as marketing, sales, and service now have a common repository of customer information and interaction tools.
    • Increased sales and service agent efficiency due to their focus on selling and resolution, rather than administrative tasks and overhead.
    • Reduced cost-to-sell and cost-to-serve due to automation of activities that were manually intensive.
    • Reduced cost of accurate data due to embedded reporting and analytics functionality.

    CRM platforms sit at the core of a well-rounded customer engagement ecosystem

    At the center is 'Customer Relationship Management Platform' surrounded by 'Web Experience Management Platform', 'E-Commerce & Point-of-Sale Solutions', 'Social Media Management Platform', 'Customer Intelligence Platform', 'Customer Service Management Tools', and 'Marketing Management Suite'.

    Customer Experience Management (CXM) Portfolio

    Customer relationship management platforms are increasingly expansive in functional scope and foundational to an organization’s customer engagement strategy. Indeed, CRMs form the centerpiece for a comprehensive CXM system, alongside tools such as customer intelligence platforms and adjacent point solutions for sales, marketing, and customer service.

    Review Info-Tech’s CXM blueprint below to build a complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components. The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis.

    Build a Strong Technology Foundation for Customer Experience Management

    Sample of the 'Build a Strong Technology Foundation for Customer Experience Management' blueprint. Design an end-to-end technology strategy to drive sales revenue, enhance marketing effectiveness, and create compelling experiences for your customers.

    View the blueprint

    Considering a CRM switch? Switching software vendors drives high satisfaction

    Eighty percent of organizations are more satisfied after changing their software vendor.

    • Most organizations see not only a positive change in satisfaction with their new vendor, but also a substantial change in satisfaction.
    • What matters is making sure your organization is well-positioned to make a switch.
    • When it comes to switching software vendors, the grass really can be greener on the other side.

    Over half of organizations are 60%+ more satisfied after changing their vendor.

    (Source: Info-Tech Research Group, "Switching Software Vendors Overwhelmingly Drives Increased Satisfaction", 2020.)

    IT is critical to the success of your CRM selection and rollout

    Today’s shared digital landscape of the CIO and CMO

    Info-Tech Insight

    Technology is the key enabler of building strong customer experiences: IT must stand shoulder to shoulder with the business to develop a technology framework for customer relationship management.

    CIO

    IT Operations

    Service Delivery and Management

    IT Support

    IT Systems and Application

    IT Strategy and Governance

    Cybersecurity
    Collaboration and Partnership

    Digital Strategy = Transformation
    Business Goals | Innovation | Leadership | Rationalization

    Customer Experience
    Architecture | Design | Omnichannel Delivery | Management

    Insight (Market Facing)
    Analytics | Business Intelligence | Machine Learning | AI

    Marketing Integration + Operating Model
    Apps | Channels | Experiences | Data | Command Center

    Master Data
    Customer | Audience | Industry | Digital Marketing Assets
    CMO

    PEO Media

    Brand Management

    Campaign Management

    Marketing Tech

    Marketing Ops

    Privacy, Trust, and Regulatory Requirements

    (Source: ZDNet, 2020)

    CRM by the numbers

    1/3

    Statistical analysis of CRM projects indicates failures vary from 18% to 69%. Taking an average of those analyst reports, about one-third of CRM projects are considered a failure. (Source: CIO Magazine, 2017)

    92%

    92% of organizations report that CRM use is important for accomplishing revenue objectives. (Source: Hall, 2020)

    40%

    In 2019, 40% of executives name customer experience the top priority for their digital transformation. (Source: CRM Magazine, 2019)

    Case Study

    Align strategy and technology to meet consumer demand.
    INDUSTRY
    Entertainment
    SOURCE
    Forbes, 2017
    Challenge

    Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.

    Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience.

    Solution

    In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.

    Results

    Netflix’s disruptive innovation is built on the foundation of great customer experience management. Netflix is now a $28-billion company, which is tenfold what Blockbuster was worth.

    Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time video rental industry leader, Blockbuster.

    CRM Buyer’s Guide

    Phase 1

    Understand CRM Features

    Phase 1

    1.1 Define CRM platforms

    1.2 Classify table stakes & differentiating capabilities

    1.3 Explore CRM trends

    Phase 2

    2.1 Build the business case

    2.2 Streamline requirements elicitation for CRM

    2.3 Construct the RFP

    Phase 3

    3.1 Discover key players in the CRM landscape

    3.2 Engage the shortlist & select finalist

    3.3 Prepare for implementation

    This phase will walk you through the following activities:

    • Set a level of understanding of CRM technology.
    • Define which CRM features are table stakes (standard) and which are differentiating.
    • Identify the “Art of the Possible” in a modern CRM from a sales, marketing, and service lens.

    This phase involves the following participants:

    • CIO
    • Applications manager
    • Project manager
    • Sales executive
    • Marketing executive
    • Customer service executive

    Understand CRM table stakes features

    Organizations can expect nearly all CRM vendors to provide the following functionality.

    Lead Management Pipeline Management Contact Management Campaign Management Customer Service Management
    • Tracks and captures a lead’s information, automatically building a profile. Leads are then qualified through contact scoring models. Assigning leads to sales is typically automated.
    • Enables oversight over future sales. Includes revenue forecasting based on past/present trends, tracking sales velocity, and identifying ineffective sales processes.
    • Tracks and stores customer data, including demography, account and billing history, social media, and contact information. Typically, records and fields can be customized.
    • Provides integrated omnichannel campaign functionality and data analysis of customer intelligence. Data insights can be used to drive new and effective marketing campaigns.
    • Provides integrated omnichannel customer experiences to provide convenient service. Includes case and ticket management, automated escalation rules, and third-party integrations.

    Identify differentiating CRM features

    While not always “must-have” functionality, these features may be the final dealbreaker when deciding between two CRM vendors.

    Image of clustered screens with various network and business icons surounding them.
    • Workflow Automation
      Automate repetitive tasks by creating workflows that trigger actions or send follow-up reminders for next steps.
    • Advanced Analytics and Reporting
      Provides customized dashboard visualizations, detailed reporting, AI-driven virtual assistants, data extraction & analysis, and ML forecasting.
    • Customizations and Open APIs
      Broad range of available customizations (e.g. for dashboards and fields), alongside ease of integration (e.g. via plugins or APIs).
    • Document Management
      Out-of-the-box centralized content repository for storing, uploading, and sharing documents.
    • Mobile Support
      Ability to support mobile devices, OSes, and platforms with a native application or HTML-based web-access.
    • Project and Task Management
      Native project and task management functionality, enhancing cross-team organization and communication.
    • Configure, Price, Quote (CPQ)
      Create and send quotes or proposals to prospective and current customers.

    Features aren’t everything – be wary of common CRM selection pitfalls

    You can have all the right features, but systemic problems will lead to poor CRM implementation. Dig out these root causes first to ensure a successful CRM selection.

    50% of organizations believe the quality of their CRM data is “very poor” or “neutral.”

    Without addressing data governance issues, CRMs will only be as good as your data.

    Source: (Validity 2020)
    27% of organizations report that bad data costs them 10% or more in lost revenue annually.
    42% rate the trust that users have in their data as “high” or “very high.”
    54% believe that sales forecasts are accurate or very accurate.
    69% attribute poor CRM governance to missing or incomplete data, followed by duplicate data, incorrect data, and expired data. Other data issues include siloed data or disparate systems.
    73% believe that they do not have a 360-degree view of their customers.

    Ensure you understand the “art of the possible” in the CRM landscape

    Knowing what is possible will help funnel which features are most suitable for your organization – having all the bells and whistles does not always equal strong ROI.

    Holistically examine the potential of any CRM solution through three main lenses: Stock image of a person working with dashboards.

    Sales

    Identify sales opportunities through recording customers’ interactions, generating leads, nurturing contacts, and forecasting revenues.
    Stock image of people experiencing digital ideas.

    Marketing

    Analyze customer interactions to identify upsell and cross-sell opportunities, drive customer loyalty, and use customer data for targeted campaigns.
    Stock image of a customer service representative.

    Customer Service

    Improve and optimize customer engagement and retention, leveraging customer data to provide round-the-clock omnichannel experiences.

    Art of the possible: Sales

    Stock image of a person working with dashboards.

    TRACK PROSPECT INTERACTIONS

    Want to engage with a prospect but don’t know what to lead with? CRM solutions can track and analyze many of the interactions a prospect has with your organization, including with fellow staff, their clickthrough rate on marketing material, and what services they are downloading on your website. This information can then auto-generate tasks to begin lead generation.

    COORDINATE LEAD SCORING

    Information captured from a prospect is generated into contact cards; missing data (such as name and company) can be auto-captured by the CRM via crawling sites such as LinkedIn. The CRM then centralizes and scores (according to inputted business rules) a lead’s potential, ensuring sales teams coordinate and keep a track of the lead’s journey without wrongful interference.

    AI-DRIVEN REVENUE FORECASTING

    Generate accurate forecasting reports using AI-driven “virtual assistants” within the CRM platform. These assistants are personal data scientists, quickly noting discrepancies, opportunities, and what-if scenarios – tasks that might take weeks to do manually. This pulled data is then auto-forecasted, with the ability to flexibly adjust to real-time data.

    Art of the possible: Marketing

    Stock image of people experiencing digital ideas.

    DRIVE LOYALTY

    Data captured and analyzed in the CRM from customer interactions builds profiles and a deeper understanding of customers’ interests. With this data, marketing teams can deliver personalized promotions and customer service to enhance loyalty – from sending a discount on a product the customer was browsing on the website, to providing notifications about delivery statuses.

    AUTOMATE WORKFLOWS

    Building customer profiles, learning spending habits, and charting a customer’s journey for upselling or cross-selling can be automated through workflows, saving hours of manual work. These workflows can immediately respond to customer enquiries or deliver offers to the customer’s preferred channel based on their prior usage.

    TARGETED CAMPAIGNING

    Information attained through a CRM platform directly informs any marketing strategy: identifying customer segments, spending habits, building a better product based on customer feedback, and identifying high-spending customers. With any new product or offering, it is straightforward for marketing teams to understand where to target their next campaign for highest impact.

    Art of the possible: Customer service

    Stock image of a customer service representative.

    OMNICHANNEL SUPPORT

    Rapidly changing demographics and modes of communications require an evolution toward omnichannel engagement. Many customers now expect to communicate with contact centers not just by voice, but via social media. Agents need customer information synced across each channel they use, meeting the customer’s needs where they are.

    INTELLIGENT SELF-SERVICE PORTALS

    Customers want their issues resolved as quickly as possible. Machine-learning self-service options deliver personalized customer experiences, which also reduce both agent call volume and support costs for the organization.

    LEVERAGING ANALYTICS

    The future of customer service is tied up with analytics. This not only entails AI-driven capabilities that fetch the agent relevant information, skills-based routing, and using biometric data (e.g. speech) for security. It also feeds operations leaders’ need for easy access to real insights about how their customers and agents are doing.

    Best-of-Breed Point Solutions

    Full CRM Suite

    Blue smiley face. Benefits
    • Features may be more advanced for specific functional areas and a higher degree of customization may be possible.
    • If a potential delay in real-time customer data transfer is acceptable, best-of-breeds provide a similar level of functionality to suites for a lower price.
    • Best-of-breeds allow value to be realized faster than suites, as they are easier and faster to implement and configure.
    • Rip and replace is easier, and vendor updates are relatively quick to market.
    Benefits
    • Everyone in the organization works from the same set of customer data.
    • There is a “lowest common denominator” for agent learning as consistent user interfaces lower learning curves and increase efficiency in usage.
    • There is a broader range of functionality using modules.
    • Integration between functional areas will be strong and the organization will be in a better position to enable version upgrades without risking invalidation of an integration point between separate systems.
    Green smiley face.
    Purple frowny face. Challenges
    • Best-of-breeds typically cover less breadth of functionality than suites.
    • There is a lack of uniformity in user experience across best-of-breeds.
    • Data integrity risks are higher.
    • Variable infrastructure may be implemented due to multiple disparate systems, which adds to architecture complexity and increased maintenance.
    • There is potential for redundant functionality across multiple best-of-breeds.
    Challenges
    • Suites exhibit significantly higher costs compared to point solutions.
    • Suite module functionality may not have the same depth as point solutions.
    • Due to high configuration availability and larger-scale implementation requirements, the time to deploy is longer than point solutions.
    Orange frowny face.
    Info-Tech Insight

    Even if a suite is missing a potential module, the proliferation of app extensions, integrations, and services could provide a solution. Salesforce’s AppExchange, for instance, offers a plethora of options to extend its CRM solution – from telephony integration, to gamification.

    CRM Buyer’s Guide

    Phase 2

    Build the Business Case & Elicit CRM Requirements

    Phase 1

    1.1 Define CRM platforms

    1.2 Classify table stakes & differentiating capabilities

    1.3 Explore CRM trends

    Phase 2

    2.1 Build the business case

    2.2 Streamline requirements elicitation for CRM

    2.3 Construct the RFP

    Phase 3

    3.1 Discover key players in the CRM landscape

    3.2 Engage the shortlist & select finalist

    3.3 Prepare for implementation

    This phase will walk you through the following activities:

    • Identify goals, objectives, challenges, and costs to inform the business case for a new CRM platform.
    • Elicit and prioritize key requirements for your platform.
    • Port the requirements into Info-Tech’s CRM RFP Template.

    This phase involves the following participants:

    • CIO
    • Applications manager
    • Project manager
    • Sales executive
    • Marketing executive
    • Customer service executive

    Right-size the CRM selection team to ensure you get the right information but are still able to move ahead quickly

    Full-Time Resourcing: At least one of these five team members must be allocated to the selection initiative as a full-time resource.

    A silhouetted figure.

    IT Leader

    A silhouetted figure.

    Technical Lead

    A silhouetted figure.

    Business Analyst/
    Project Manager

    A silhouetted figure.

    Business Lead

    A silhouetted figure.

    Process Expert(s)

    This team member is an IT director or CIO who will provide sponsorship and oversight from the IT perspective. This team member will focus on application security, integration, and enterprise architecture. This team member elicits business needs and translates them into technology requirements. This team member will provide sponsorship from the business needs perspective. Typically, a CMO or SVP of sales. These team members are the sales, marketing, and service process owners who will help steer the CRM requirements and direction.

    Info-Tech Insight

    It is critical for the selection team to determine who has decision rights. Organizational culture will play the largest role in dictating which team member holds the final say for selection decisions. For more information on stakeholder management and involvement, see this guide.

    Be prepared to define what issues you are trying to address and why a new CRM is the right approach

    Identify the current state and review the background of what you’ve done leading up to this point, goals you’ve been asked to meet, and challenges in solving known problems to help to set the stage for why your proposed solution is needed. If your process improvements have taken you as far as you can go without improved workflows or data, specify where the gaps are.
    Arrows with icons related to the text on the right merging into one arrow. Alignment

    Alignment to strategic goals is always important, but that is especially true with CRM because customer relationship management platforms are at the intersection of your organization and your customers. What are the strategic marketing, sales and customer service goals that you want to realize (in whole or in part) by improving your CRM ecosystem?

    Impact to your business

    Identify areas where your customers may be impacted by poor experiences due to inadequate or aging technology. What’s the impact on customer retention? On revenue?

    Impact to your organization

    Define how internal stakeholders within the organization are impacted by a sub-optimal CRM experience – what are their frustrations and pain points? How do issues with your current CRM environment prevent teams in sales, marketing, or service from doing their jobs?

    Impact to your department

    Describe the challenges within IT of using disparate systems, workarounds, poor data and reporting, lack of automation, etc., and the effect these challenges have on IT’s goals.

    Align the CRM strategy with the corporate strategy

    Corporate Strategy Unified Strategy CRM Strategy
    Spectrum spanning all columns.
    Your corporate strategy:
    • Conveys the current state of the organization and the path it wants to take.
    • Identifies future goals and business aspirations.
    • Communicates the initiatives that are critical for getting the organization from its current state to the future state.
    • The CRM strategy and the rationale for deploying a new CRM can be and should be linked, with metrics, to the corporate strategy and ultimate business objectives (such as improving customer acquisition, entering new segments, or improving customer lifetime value).
    Your CRM strategy:
    • Communicates the organization’s budget and spending on CRM.
    • Identifies IT initiatives that will support the business and key CRM objectives.
    • Outlines staffing and resourcing for CRM initiatives.
    CRM projects are more successful when the management team understands the strategic importance and the criticality of alignment. Time needs to be spent upfront aligning business strategies with CRM capabilities. Effective alignment between sales, marketing, customer service, operations, IT, and the business should happen daily. Alignment doesn’t just need to occur at the executive level, but also at each level of the organization.

    2.1 Create your list of goals and milestones for CRM

    1-3 hours

    Input: Corporate strategy, Target key performance indicators, End-user satisfaction results (if applicable)

    Output: Prioritized list of goals with milestones that can be met with a new or improved CRM solution

    Materials: Whiteboard/flip charts, CRM Business Case Template

    Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales or service SMEs

    1. Review strategic goals to identify alignment to your CRM selection project. For example, digital transformation may be enhanced or enabled with a CRM solution that supports better outreach to key customer segments through improved campaign management.
    2. Next, brainstorm tactical goals with your colleagues.
    3. Identify specific goals the organization has set for the business that may be supported by improved customer prospecting, customer service, or analytics functionality through a better CRM solution.
    4. Identify specific goals your organization will be able to make possible with a new or improved CRM solution.
    5. Prioritize this list and lead with the most important goal that can be reached at the one-year, six-month, and three-month milestones.
    6. Document in the goals section of your business case.

    Download the CRM Business Case Template and record the outputs of this exercise in the strategic business goals, business drivers, and technical drivers slides.

    Identify what challenges exist with the current environment

    Ensure you are identifying issues at a high level, so as not to drown in detail, but still paint the right picture. Identify technical issues that are impacting customer experience or business goals. Typical complaints for CRM solutions that are old or have been outgrown include:

    1.

    Lack of a flexible, configurable customer data model that supports complex relationships between accounts and contacts.

    2.

    Lack of a flexible, configurable customer data model that supports complex relationships between accounts and contacts.

    3.

    Lack of meaningful reports and useable dashboards, or difficulty in surfacing them.

    4.

    Poor change enablement resulting in business interruptions.

    5.

    Inability to effectively automate routine sales, marketing, or service tasks at scale via a workflow tool.

    6.

    Lack of proper service management features, such as service knowledge management.

    7.

    Inability to ingest customer data at scale (for example, no ability to automatically log e-mails or calls).

    8.

    Major technical deficiencies and outages – the incumbent CRM platform goes down, causing business disruption.

    9.

    The platform itself doesn’t exist in the current state – everything is done in Microsoft Excel!

    Separate business issues from technical issues, but highlight where they’re connected and where technical issues are causing business issues or preventing business goals from being reached.

    Before switching vendors, evaluate your existing CRM to see if it’s being underutilized or could use an upgrade

    The cost of switching vendors can be challenging, but it will depend entirely on the quality of data and whether it makes sense to keep it.
    • Achieving success when switching vendors first requires reflection. We need to ask why we are dissatisfied with our incumbent software.
    • If the product is old and inflexible, the answer may be obvious, but don’t be afraid to include your incumbent in your evaluation if your issues might be solved with an upgrade.
    • Look at your use-case requirements to see where you want to take the CRM solution and compare them to your incumbent’s roadmap. If they don’t match, switching vendors may be the only solution. If your roadmaps align, see if you’re fully leveraging the solution or will be able to start working through process improvements.
    Pie graph with a 20% slice. Pie graph with a 25% slice.

    20%

    Small/Medium Enterprises

    25%

    Large Enterprises
    only occasionally or rarely/never use their software (Source: Software Reviews, 2020; N = 45,027)
    Fully leveraging your current software now will have two benefits:
    1. It may turn out that poor leveraging of your incumbent software was the problem all along; switching vendors won’t solve the problem by itself. As the data to the right shows, a fifth of small/medium enterprises and a quarter of large enterprises do not fully leverage their incumbent software.
    2. If you still decide to switch, you’ll be in a good negotiating position. If vendors can see you are engaged and fully leveraging your software, they will be less complacent during negotiations to win you over.
    Info-Tech Insight

    Switching vendors won’t improve poor internal processes. To be fully successful and meet the goals of the business case, new software implementations must be accompanied by process review and improvement.

    2.2 Create your list of challenges as they relate to your goals and their impacts

    1-2 hours

    Input: Goals lists, Target key performance indicators, End-user satisfaction results (if applicable)

    Output: Prioritized list of challenges preventing or hindering customer experiences

    Materials: Whiteboard/flip charts, CRM Business Case Template

    Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

    1. Brainstorm with your colleagues to discuss your challenges with CRM today from an application and process lens.
    2. Identify how these challenges are impacting your ability to meet the goals and identify any that are creating customer-facing issues.
    3. Group together like areas and arrange in order of most impactful. Identify which of these issues will be most relevant to the business case for a new CRM platform.
    4. Document in the current-state section of your business case.
    5. Discuss and determine if the incumbent solution can meet your needs or if you’ll need to replace it with a different product.

    Download the CRM Business Case Template and document the outputs of this exercise in the current-state section of your business case.

    Determine costs of the solution

    Ensure the business case includes both internal and external costs related to the new CRM platform, allocating costs of project managers to improve accuracy of overall costs and level of success.

    CRM solutions include application costs and costs to design processes, install, and configure. These start-up costs can be a significant factor in whether the initial purchase is feasible.

    CRM Vendor Costs

    • Application licensing
    • Implementation and configuration
    • Professional services
    • Maintenance and support
    • Training
    • 3rd Party add-ons
    • Data transformation
    • Integration
    When thinking about vendor costs, also consider the matching internal cost associated with the vendor activity (e.g. data cleansing, internal support).

    Internal Costs

    • Project management
    • Business readiness
    • Change management
    • Resourcing (user groups, design/consulting, testing)
    • Training
    • Auditors (if regulatory requirements need vetting)
    Project management is a critical success factor at all stages of an enterprise application initiative from planning to post-implementation. Ensuring that costs for such critical areas are accurately represented will contribute to success.

    Download the blueprint Improve Your Statements of Work to Hold Your Vendors Accountable to define requirements for installation and configuration.

    Bring in the right resources to guarantee success. Work with the PMO or project manager to get help with creating the SOW.

    60% of IT projects are NOT finished “mostly or always” on time (Wellingtone, 2018).

    55% of IT personnel feel that the business objectives of their software projects are clear to them (Geneca, 2017).

    Document costs and expected benefits of the new CRM

    The business case should account for the timing of both expenditures and benefits. It is naïve to expect straight-line benefit realization or a big-bang cash outflow related to the solution implementation. Proper recognition and articulation of ramp-up time will make your business case more convincing.

    Make sure your timelines are realistic for benefits realization, as these will be your project milestones and your metrics for success.

    Example:
    Q1-Q2 Q3-Q6 Q6 Onwards

    Benefits at 25%

    At the early stages of an implementation, users are still learning the new system and go-live issues are being addressed. Most of the projected process improvements are likely to be low, zero, or even negative.

    Benefits at 75%

    Gradually, as processes become more familiar, an organization can expect to move closer to realizing the forecasted benefits or at least be in a position to recognize a positive trend toward their realization.

    Benefits at 100%

    In an ideal world, all projected benefits are realized at 100% or higher. This can be considered the stage where processes have been mastered, the system is operating smoothly, and change has been broadly adopted. In reality, benefits are often overestimated.

    Costs at 50%

    As with benefits, some costs may not kick in until later in the process or when the application is fully operational. In the early phases of implementation, factor in the cost of overlapping technology where you’ll need to run redundant systems and transition any data.

    Costs at 100%

    Costs are realized quicker than benefits as implementation activities are actioned, licensing and maintenance costs are introduced, and resourcing is deployed to support vendor activities internally. Costs that were not live in the early stages are an operational reality at this stage.

    Costs at 100%+

    Costs can be expected to remain relatively static past a certain point, if estimates accurately represented all costs. In many instances, costs can exceed original estimates in the business case, where costs were either underestimated, understated, or missed.

    2.3 Document your costs and expected benefits

    1-2 hours

    Input: Quotes with payment schedule, Budget

    Output: Estimated payment schedule and cost breakdown

    Materials: Spreadsheet or whiteboard, CRM Business Case Template

    Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

    1. Estimate costs for the CRM solution. If you’re working with a vendor, provide the initial requirements to quote; otherwise, estimate as closely as you’re able.
    2. Calculate the five-year total cost for the solution to ensure the long-term budget is calculated.
    3. Break down costs for licenses, implementation, training, internal support, and hardware or hosting fees.
    4. Determine a reasonable breakdown of costs for the first year.
    5. Identify where residual costs of the old system may factor in if there are remaining contract obligations during the technology transition.
    6. Create a list of benefits expected to be realized within the same timeline.

    Sample of the table on the previous slide.

    Download the CRM Business Case Template and document the outputs of this exercise in the current-state section of your business case.

    Identify risks and dependencies to mitigate barriers to success as you look to roll out a CRM suite

    A risk assessment will be helpful to better understand what risks need to be mitigated to make the project a success and what risks are pending should the solution not be approved or be delayed.

    Risk Criteria Relevant Questions
    Timeline Uncertainty
    • How much risk is associated with the timeline of the CRM project?
    • Is this timeline realistic and can you reach some value in the first year?
    Success of Similar Projects
    • Have we undertaken previous projects that are similar?
    • Were those successful?
    • Did we note any future steps for improvement?
    Certainty of Forecasts
    • Where have the numbers originated?
    • How comfortable are the sponsors with the revenue and cost forecasts?
    Chance of Cost Overruns
    • How likely is the project to have cost overruns?
    • How much process and design work needs to be done prior to implementation?
    Resource Availability
    • Is this a priority project?
    • How likely are resourcing issues from a technical and business perspective?
    • Do we have the right resources?
    Change During Delivery
    • How volatile is the area in which the project is being implemented?
    • Are changes in the environment likely?
    • How complex are planned integrations?

    2.4 Identify risks to the success of the solution rollout and mitigation plan

    1-2 hours

    Input: List of goals and challenges, Target key performance indicators

    Output: Prioritized list of challenges preventing or hindering improvements for the IT teams

    Materials: Whiteboard/flip charts, CRM Business Case Template

    Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

    1. Brainstorm with your colleagues to discuss potential roadblocks and risks that could impact the success of the CRM project.
    2. Identify how these risks could impact your project.
    3. Document the ones that are most likely to occur and derail the project.
    4. Discuss potential solutions to mitigate risks.

    Download the CRM Business Case Template and document the outputs of this exercise in the risk and dependency section of your business case. If the risk assessment needs to be more complex, complete the Risk Indicator Analysis in Info-Tech’s Business Case Workbook.

    Start requirements gathering by identifying your most important use cases across sales, marketing, and service

    Add to your business case by identifying which top-level use cases will meet your goals.

    Examples of target use cases for a CRM project include:

    • Enhance sales acquisition capabilities (i.e. via pipeline management)
    • Enhance customer upsell and cross-sell capabilities
    • Improve customer segmentation and targeting capabilities for multi-channel marketing campaigns
    • Strengthen customer care capabilities to improve customer satisfaction and retention (i.e. via improved case management and service knowledge management)
    • Create actionable insights via enhanced reporting and analytics

    Info-Tech Insight

    Lead with the most important benefit and consider the timeline. Can you reach that goal and report success to your stakeholders within the first year? As you look toward that one-year goal, you can consider secondary benefits, some of which may be opportunities to bring early value in the solution.

    Benefits of a successful deployment of use cases will include:
    • Improved customer satisfaction
    • Improved operational efficiencies
    • Reduced customer turnover
    • Increased platform uptime
    • License or regulatory compliance
    • Positioned for growth

    Typically, we see business benefits in this order of importance. Lead with the outcome that is most important to your stakeholders.

    • Net income increases
    • Revenue generators
    • Cost reductions
    • Improved customer service

    Consider perspectives of each stakeholder to ensure functionality needs are met and high satisfaction results

    Best of breed vs. “good enough” is an important discussion and will feed your success.

    Costs can be high when customizing an ill-fitting module or creating workarounds to solve business problems, including loss of functionality, productivity, and credibility.

    • Start with use cases to drive the initial discussion, then determine which features are mandatory and which are nice-to-haves. Mandatory features will help determine high success for critical functionality and identify where “good enough” is an acceptable state.
    • Consider the implications to implementation and all use cases of buying an all-in-one solution, integration of multiple best-of-breed solutions, or customizing features that were not built into a solution.
    • Be prepared to shelve a use case for this solution and look to alternatives for integration where mandatory features cannot meet highly specialized needs that are outside of traditional CRM solutions.

    Pros and Cons

    Build vs. Buy

    Multi-Source Best of Breed

    Flexibility
    vs.
    architectural complexity

    Vendor Add-Ons & Integrations

    Lower support costs
    vs.
    configuration

    Multi-source Custom

    Flexibility
    vs.
    high skills requirements

    Single Source

    Lower support costs
    vs.
    configuration

    2.5 Define use cases and high-level features for meeting business and technical goals

    1-2 hours

    Input: List of goals and challenges

    Output: Use cases to be used for determining requirements

    Materials: Whiteboard/flip charts, CRM Business Case Template

    Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

    1. Identify the key customer engagement use cases that will support your overall goals as defined in the previous section.
    2. The following slide has examples of use case domains that will be enhanced from a CRM platform.
    3. Define high-level goals you wish to achieve in the first year and longer term. If you have more specific KPIs to add, and it is a requirement for your organization’s documentation, add them to this section.
    4. Take note of where processes will need to be improved to benefit from these use-case solutions – the tools are only as good as the process behind them.

    Download the CRM Business Case Template and document the outputs from this exercise in the current-state section of your business case.

    Understand the dominant use-case scenarios across organizations to narrow the list of potential CRM solutions

    Sales
    Enablement

    • Generate leads through multiple channels.
    • Rapidly sort, score, and prioritize leads based on multiple criteria.
    • Create in-depth sales forecasts segmented by multiple criteria (territory, representative, etc.).

    Marketing
    Management

    • Manage marketing campaigns across multiple channels (web, social, email, etc.).
    • Aggregate and analyze customer data to generate market intelligence.
    • Build and deploy customer-facing portals.

    Customer Service
    Management

    • Generate tickets, and triage customer service requests through multiple channels.
    • Track customer service interactions with cases.
    • There is a need to integrate customer records with contact center infrastructure.
    Info-Tech Insight

    Use your understanding of the CRM use case to accelerate the vendor shortlisting process. Since the CRM use case has a direct impact on the prioritization of a platform’s features and capabilities, you can rapidly eliminate vendors from contention or designate superfluous modules as out-of-scope.

    2.5.1 Use Info-Tech’s CRM Use-Case Fit Assessment Tool to align your CRM requirements to the vendor use cases

    30 min

    Input: Understanding of business objectives for CRM project, Use-Case Fit Assessment Tool

    Output: Use-case suitability

    Materials: Use-Case Fit Assessment Tool

    Participants: Core project team, Project managers

    1. Use the Use-Case Fit Assessment Tool to understand how your unique business requirements map into which CRM use case.
    2. This tool will assess your answers and determine your relative fit against the use-case scenarios.
    3. Fit will be assessed as “Weak,” “Moderate,” or “Strong.”
      1. Consider the common pitfalls, which were mentioned earlier, that can cause IT projects to fail. Plan and take clear steps to avoid or mitigate these concerns.
      2. Note: These use-case scenarios are not mutually exclusive, meaning your organization can align with one or more scenarios based on your answers. If your organization shows close alignment to multiple scenarios, consider focusing on finding a more robust solution and concentrate your review on vendors that performed strongly in those scenarios or meet the critical requirements for each.

    Download the CRM Use-Case Fit Assessment Tool

    Once you’ve identified the top-level use cases a CRM must support, elicit, and prioritize granular platform requirements.

    Understanding business needs through requirements gathering is the key to defining everything about what is being purchased, yet it is an area where people often make critical mistakes.

    Info-Tech Insight

    To avoid creating makeshift solutions, an organization needs to gather requirements with the desired future state in mind.

    Risks of poorly scoped requirements

    • Fail to be comprehensive and miss certain areas of scope
    • Focus on how the solution should work instead of what it must accomplish
    • Have multiple levels of detail within the requirements, which are inconsistent and confusing
    • Drill all the way down into system-level detail
    • Add unnecessary constraints based on what is done today rather than focusing on what is needed for tomorrow
    • Omit constraints or preferences that buyers think are “obvious”

    Best practices

    • Get a clear understanding of what the system needs to do and what it is expected to produce
    • Test against the principle of MECE – requirements should be “mutually exclusive and collectively exhaustive”
    • Explicitly state the obvious and assume nothing
    • Investigate what is sold on the market and how it is sold. Use language that is consistent with that of the market and focus on key differentiators – not table stakes
    • Contain the appropriate level of detail – the level should be suitable for procurement and sufficient for differentiating vendors

    Prioritize requirements to assist with vendor selection: focus on priority requirements linked to differentiated capabilities

    Prioritization is the process of ranking each requirement based on its importance to project success. Hold a meeting for the domain SMEs, implementation SMEs, project managers, and project sponsors to prioritize the requirements list. At the conclusion of the meeting, each requirement should be assigned a priority level. The implementation SMEs will use these priority levels to ensure efforts are targeted toward the proper requirements and to plan features available on each release. Use the MoSCoW Model of Prioritization to effectively order requirements.


    Pyramid of the MoSCoW Model.
    The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994.

    The MoSCoW Model of Prioritization

    Requirements must be implemented for the solution to be considered successful.

    Requirements that are high priority should be included in the solution if possible.

    Requirements are desirable but not necessary and could be included if resources are available.

    Requirements won’t be in the next release, but will be considered for the future releases.

    Base your prioritization on the right set of criteria

    Effective Prioritization Criteria

    Criteria

    Description

    Regulatory & Legal Compliance These requirements will be considered mandatory.
    Policy Compliance Unless an internal policy can be altered or an exception can be made, these requirements will be considered mandatory.
    Business Value Significance Give a higher priority to high-value requirements.
    Business Risk Any requirement with the potential to jeopardize the entire project should be given a high priority and implemented early.
    Likelihood of Success Especially in “proof of concept” projects, it is recommended that requirements have good odds.
    Implementation Complexity Give a higher priority to low implementation difficulty requirements.
    Alignment With Strategy Give a higher priority to requirements that enable the corporate strategy.
    Urgency Prioritize requirements based on time sensitivity.
    Dependencies A requirement on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.

    2.6 Identify requirements to support your use cases

    1-2 hours

    Input: List of goals and challenges

    Output: Use cases to be used for determining requirements

    Materials: Whiteboard/flip charts, Vendor Evaluation Workbook

    Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

    1. Work with the team to identify which features will be most important to support your use cases. Keep in mind there will be some features that will require more effort to implement fully. Add that into your project plan.
    2. Use the features lists on the following slides as a guide to get started on requirements.
    3. Prioritize your requirements list into mandatory features and nice-to-have features (or use the MoSCoW model from the previous slides). This will help you to eliminate vendors who don’t meet bare minimums and to score remaining vendors.
    4. Use this same list to guide your vendor demos.

    Our Improve Requirements Gathering blueprint provides a deep dive into the process of eliciting, analyzing, and validating requirements if you need to go deeper into effective techniques.

    CRM features

    Table stakes vs. differentiating

    What is a table stakes/standard feature?

    • Certain features are standard for all CRM tools, but that doesn’t mean they are all equal.
    • The existence of features doesn’t guarantee their quality or functionality to the standards you need. Never assume that “Yes” in a features list means you don’t need to ask for a demo.
    • If Table Stakes are all you need from your CRM solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs.

    What is a differentiating/additional feature?

    • Differentiating features take two forms:
      • Some CRM platforms offer differentiating features that are vertical specific.
      • Other CRM platforms offer differentiating features that are considered cutting edge. These cutting-edge features may become table stakes over time.

    Table stakes features for CRM

    Account Management Flexible account database that stores customer information, account history, and billing information. Additional functionality includes: contact deduplication, advanced field management, document linking, and embedded maps.
    Interaction Logging and Order History Ability to view all interactions that have occurred between sales teams and the customer, including purchase order history.
    Basic Pipeline Management View of all opportunities organized by their current stage in the sales process.
    Basic Case Management The ability to create and manage cases (for customer service or order fulfilment) and associate them with designated accounts or contacts.
    Basic Campaign Management Basic multi-channel campaign management (i.e. ability to execute outbound email campaigns). Budget tracking and campaign dashboards.
    Reports and Analytics In-depth reports on CRM data with dashboards and analytics for a variety of audiences.
    Mobile Support Mobile access across multiple devices (tablets, smartphones and/or wearables) with access to CRM data and dashboards.

    Additional features for CRM

    Customer Information Management Customizable records with detailed demographic information and the ability to created nested accounts (accounts with associated sub-accounts or contact records).
    Advanced Case Management Ability to track detailed interactions with members or constituents through a case view.
    Employee Collaboration Capabilities for employee-to-employee collaboration, team selling, and activity streams.
    Customer Collaboration Capabilities for outbound customer collaboration (i.e. the ability to create customer portals).
    Lead Generation Capabilities for generating qualified leads from multiple channels.
    Lead Nurturing/Lead Scoring The ability to evaluate lead warmth using multiple customer-defined criteria.
    Pipeline and Deal Management Managing deals through cases, providing quotes, and tracking client deliverables.

    Additional features for CRM (Continued)

    Marketing Campaign Management Managing outbound marketing campaigns via multiple channels (email, phone, social, mobile).
    Customer Intelligence Tools for in-depth customer insight generation and segmentation, predictive analytics, and contextual analytics.
    Multi-Channel Support Capabilities for supporting customer interactions across multiple channels (email, phone, social, mobile, IoT, etc.).
    Customer Service Workflow Management Capabilities for customer service resolution, including ticketing and service management.
    Knowledge Management Tools for capturing and sharing CRM-related knowledge, especially for customer service.
    Customer Journey Mapping Visual workflow builder with automated trigger points and business rules engine.
    Document Management The ability to curate assets and attachments and add them to account or contact records.
    Configure, Price, Quote The ability to create sales quotes/proposals from predefined price lists and rules.

    2.7 Put it all together – port your requirements into a robust RFP template that you can take to market!

    1-2 hours
    1. Once you’ve captured and prioritized your requirements – and received sign-off on them from key stakeholders – it’s time to bake them into a procurement vehicle of your choice.
    2. For complex enterprise systems like a CRM platform, Info-Tech recommends that this should take the form of a structured RFP document.
    3. Use our CRM RFP Template and associated CRM RFP Scoring Tool to jump-start the process.
    4. The next step will be conducting a market scan to identify contenders, and issuing the RFP to a shortlist of viable vendors for further evaluation.

    Need additional guidance on running an effective RFP process? Our Drive Successful Sourcing Outcomes with a Robust RFP Process has everything you need to ace the creation, administration and assessment of RFPs!

    Samples of the CRM Request for Proposal Template and CRM Suite Evaluation and RFP Scoring Tool.

    Download the CRM Request for Proposal Template

    Download the CRM Suite Evaluation and RFP Scoring Tool

    Identify whether vertical-specific CRM platforms are a best fit

    In mature vendor landscapes (like CRM) vendors begin to differentiate themselves by offering vertical-specific platforms, modules, or feature sets. These feature sets accelerate the implantation, decrease the platform’s learning curve, and drive user adoption. The three use cases below cover the most common industry-specific offerings:

    Public Sector

    • Constituent management and communication.
    • Constituent portal deployment for self-service.
    • Segment constituents based on geography, needs and preferences.

    Education

    • Top-level view into the student journey from prospect to enrolment.
    • Track student interactions with services across the institution.
    • Unify communications across different departments.

    Financial Services

    • Determine customer proclivity for new services.
    • Develop self-service banking portals.
    • Track longitudinal customer relationships from first account to retirement management.
    Info-Tech Insight

    Vertical-specific solutions require less legwork to do upfront but could cost you more in the long run. Interoperability and vendor viability must be carefully examined. Smaller players targeting niche industries often have limited integration ecosystems and less funding to keep pace with feature innovation.

    Rein-in ballooning scope for CRM selection projects

    Stretching the CRM beyond its core capabilities is a short-term solution to a long-term problem. Educate stakeholders about the limits of CRM technology.

    Common pitfalls for CRM selection

    • Tangential capabilities may require separate solutions. It is common for stakeholders to list features such as “content management” as part of the new CRM platform. While content management goes hand in hand with the CRM’s ability to manage customer interactions, document management is best handled by a standalone platform.

    Keeping stakeholders engaged and in line

    • Ballooning scope leads to stakeholder dissatisfaction. Appeasing stakeholders by over-customizing the platform will lead to integration and headaches down the road.
    • Make sure stakeholders feel heard. Do not turn down ideas in the midst of an elicitation session. Once the requirements-gathering sessions are completed, the project team has the opportunity to mark requirements as “out of scope” and communicate the reasoning behind the decision.
    • Educate stakeholders on the core functionality of CRM. Many stakeholders do not know the best-fit use cases for CRM platforms. Help end users understand what CRM is good at and where additional technologies will be needed.
    Stock image of a man leaping with a balloon.

    CRM Buyer’s Guide

    Phase 3

    Discover the CRM Market Space & Prepare for Implementation

    Phase 1

    1.1 Define CRM platforms

    1.2 Classify table stakes & differentiating capabilities

    1.3 Explore CRM trends

    Phase 2

    2.1 Build the business case

    2.2 Streamline requirements elicitation for CRM

    2.3 Construct the RFP

    Phase 3

    3.1 Discover key players in the CRM landscape

    3.2 Engage the shortlist & select finalist

    3.3 Prepare for implementation

    This phase will walk you through the following activities:

    • Dive into the key players of the CRM vendor landscape.
    • Understand best practices for building a vendor shortlist.
    • Understand key implementation considerations for CRM.

    This phase involves the following participants:

    • CIO
    • Applications manager
    • Project manager
    • Sales executive
    • Marketing executive
    • Customer service executive

    Consolidating the Vendor Shortlist Up-Front Reduces Downstream Effort

    Put the “short” back in shortlist!

    • Radically reduce effort by narrowing the field of potential vendors earlier in the selection process. Too many organizations don’t funnel their vendor shortlist until nearing the end of the selection process. The result is wasted time and effort evaluating options that are patently not a good fit.
    • Leverage external data (such as SoftwareReviews) and expert opinion to consolidate your shortlist into a smaller number of viable vendors before the investigative interview stage and eliminate time spent evaluating dozens of RFP responses.
    • Having fewer RFP responses to evaluate means you will have more time to do greater due diligence.
    Stock image of river rapids.

    Review your use cases to start your shortlist

    Your Info-Tech analysts can help you narrow down the list of vendors that will meet your requirements.

    Next steps will include:
    1. Reviewing your requirements
    2. Checking out SoftwareReviews
    3. Shortlisting your vendors
    4. Conducting demos and detailed proposal reviews
    5. Selecting and contracting with a finalist!
    Image of a person presenting a dashboard of the steps on the left.

    Get to know the key players in the CRM landscape

    The proceeding slides provide a top-level overview of the popular players you will encounter in the CRM shortlisting process.

    Logos of the key players in the CRM landscape (Salesforce, Microsoft, Oracle, HubSpot, etc).

    Evaluate software category leaders through vendor rankings and awards

    SoftwareReviews

    Sample of SoftwareReviews' Data Quadrant Report. Title page of SoftwareReviews' Data Quadrant Report. The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

    Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

    Sample of SoftwareReviews' Emotional Footprint. Title page of SoftwareReviews' Emotional Footprint. The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

    Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

    Speak with category experts to dive deeper into the vendor landscape

    SoftwareReviews

    Icon of a person.


    Fact-based reviews of business software from IT professionals.

    Icon of a magnifying glass over a chart.


    Top-tier data quality backed by a rigorous quality assurance process.

    CLICK HERE to ACCESS

    Comprehensive software reviews to make better IT decisions

    We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

    Icon of a tablet.


    Product and category reports with state-of-the-art data visualization.

    Icon of a phone.


    User-experience insight that reveals the intangibles of working with a vendor.

    SoftwareReviews is powered by Info-Tech

    Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insights of our expert analysts, our members receive unparalleled support in their buying journey.

    Logo for Salesforce.
    Est. 1999 | CA, USA | NYSE: CRM

    bio

    Link for their Twitter account. Link for their LinkedIn profile. Link for their website.
    Sales Cloud Enterprise allows you to be more efficient, more productive, more everything than ever before as it allows you to close more deals, accelerate productivity, get more leads, and make more insightful decisions.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:
    • Breadth of features
    • Quality of features
    • Sales management functionality
    Areas to Improve:
    • Cost of service
    • Ease of implementation
    • Telephony and contact center management
    Logo gif for SoftwareReviews.
    8.0
    COMPOSITE SCORE
    8.3
    CX SCORE
    +77
    EMOTIONAL FOOTPRINT
    83%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 600
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of a Salesforce screen. Vendor Pulse rating. How often do we hear about Salesforce from our members for CRM? 'Very Frequently'.
    History of Salesforce in a vertical timeline.
    *Pricing correct as of August 2021. Listed in USD and absent discounts.
    See pricing on vendor’s website for latest information.
    Logo for Salesforce.

    “Salesforce is the pre-eminent vendor in the CRM marketplace and is a force to be reckoned with in terms of the breadth and depth of its capabilities. The company was an early disruptor in the category, placing a strong emphasis from the get-go on a SaaS delivery model and strong end-user experience. This allowed them to rapidly gain market share at the expense of more complacent enterprise application vendors. A series of savvy acquisitions over the years has allowed Salesforce to augment their core Sales and Service Clouds with a wide variety of other solutions, from e-commerce to marketing automation to CPQ. Salesforce is a great fit for any organization looking to partner with a market leader with excellent functional breadth, strong interoperability, and a compelling technology and partner ecosystem. All of this comes at a price, however – Salesforce prices at a premium, and our members routinely opine that Salesforce’s commercial teams are overly aggressive – sometimes pushing solutions without a clear link to underpinning business requirements.”

    Ben Dickie
    Research Practice Lead, Info-Tech Research Group

    Sales Cloud Essentials Sales Cloud Professional Sales Cloud Enterprise Sales Cloud Ultimate
    • Starts at $25*
    • Per user/mo
    • Small businesses after basic functionality
    • Starts at $75*
    • Per user/mo
    • Mid-market target
    • Starts at $150*
    • Per user/mo
    • Enterprise target
    • Starts at $300*
    • Per user/mo
    • Strong upmarket feature additions
    Logo for Microsoft.


    Est. 1975 | WA, USA | NYSE: MSFT

    bio

    Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
    Dynamics 365 Sales is an adaptive selling solution that helps your sales team navigate the realities of modern selling. At the center of the solution is an adaptive, intelligent system – prebuilt and ready to go – that actively monitors myriad signals and distills them into actionable insights.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:

    • Business value created
    • Analytics and reporting
    • Lead management

    Areas to Improve:

    • Quote, contract, and proposals
    • Vendor support
    Logo gif for SoftwareReviews.
    8.1
    COMPOSITE SCORE
    8.3
    CX SCORE
    +84
    EMOTIONAL FOOTPRINT
    82%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 198
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of a Microsoft screen.Vendor Pulse rating. How often do we hear about Microsoft Dynamics from our Members? 'Very Frequently'.

    History of Microsoft in a vertical timeline.

    *Pricing correct as of June 2022. Listed in USD and absent discounts.
    See pricing on vendor’s website for latest information.
    Logo for Microsoft.
    “”

    “Microsoft Dynamics 365 is a strong and compelling player in the CRM arena. While Microsoft is no stranger to the CRM space, their offerings here have seen steady and marked improvement over the last five years. Good functional breadth paired with a modern user interface and best-in-class Microsoft stack compatibility ensures that we consistently see them on our members’ shortlists, particularly when our members are looking to roll out CRM capabilities alongside other components of the Dynamics ecosystem (such as Finance, Operations, and HR). Today, Microsoft segments the offering into discrete modules for sales, service, marketing, commerce, and CDP. While Microsoft Dynamics 365 is a strong option, it’s occasionally mired by concerns that the pace of innovation and investment lags Salesforce (its nearest competitor). Additionally, the marketing module of the product is softer than some of its competitors, and Microsoft themselves points organizations with complex marketing requirements to a strategic partnership that they have with Adobe.”

    Ben Dickie
    Research Practice Lead, Info-Tech Research Group

    D365 Sales Professional D365 Sales Enterprise D365 Sales Premium
    • Starts at $65*
    • Per user/mo
    • Midmarket focus
    • Starts at $95*
    • Per user/mo
    • Enterprise focus
    • Starts at $135*
    • Per user/mo
    • Enterprise focus with customer intelligence
    Logo for Oracle.


    Est. 1977 | CA, USA | NYSE: ORCL

    bio

    Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
    Oracle Engagement Cloud (CX Sales) provides a set of capabilities to help sales leaders transition smoothly from sales planning and execution through customer onboarding, account management, and support services.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:

    • Quality of features
    • Activity and workflow management
    • Analytics and reporting

    Areas to Improve:

    • Marketing management
    • Product strategy & rate of improvement
    Logo gif for SoftwareReviews.
    7.8
    COMPOSITE SCORE
    7.9
    CX SCORE
    +77
    EMOTIONAL FOOTPRINT
    78%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 140
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of an Oracle screen.Vendor Pulse rating. How often do we hear about Oracle from our members for CRM? 'Frequently'.

    History of Oracle in a vertical timeline.

    Logo for Oracle.

    “Oracle is long-term juggernaut of the enterprise applications space. Their CRM portfolio is diverse – rather than a single stack, there are multiple Oracle solutions (many made by acquisition) that support CRM capabilities – everything from Siebel to JD Edwards to NetSuite to Oracle CX applications. The latter constitute Oracle’s most modern stab at CRM and are where the bulk of feature innovation and product development is occurring within their portfolio. While historically seen as lagging behind other competitors like Salesforce and Microsoft, Oracle has made excellent strides in improving their user experience (via their Redwoods design paradigm) and building new functional capabilities within their CRM products. Indeed, SoftwareReviews shows Oracle performing well in our most recent peer-driven reports. Nonetheless, we most commonly see Oracle as a pricier ecosystem play that’s often subordinate to a heavy Oracle footprint for ERP. Many of our members also express displeasure with Oracle as a vendor and highlight their heavy-handed “threat of audit” approach. ”

    Ben Dickie
    Research Practice Lead, Info-Tech Research Group

    Oracle CX Sales - Pricing Opaque:

    “Request a Demo”

    Logo for SAP.


    Est. 1972 | Germany | NYSE: SAP

    bio

    Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
    SAP is the third-largest independent software manufacturer in the world, with a presence in over 120 countries. Having been in the industry for over 40 years, SAP is perhaps best known for its ERP application, SAP ERP.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:

    • Ease of data integration

    Areas to Improve:

    • Lead management
    • Marketing management
    • Collaboration
    • Usability & intuitiveness
    • Analytics & reporting
    Logo gif for SoftwareReviews.
    7.4
    COMPOSITE SCORE
    7.8
    CX SCORE
    +74
    EMOTIONAL FOOTPRINT
    75%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 108
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of a SAP screen.Vendor Pulse rating. How often do we hear about SAP from our members for CRM? 'Occasionally'.

    History of SAP in a vertical timeline.

    *Pricing correct as of August 2021. Listed in USD and absent discounts.
    See pricing on vendor’s website for latest information.
    Logo for SAP.

    “SAP is another mainstay of the enterprise applications market. While they have a sound breadth of capabilities in the CRM and customer experience space, SAP consistently underperforms in many of our relevant peer-driven SoftwareReviews reports for CRM and adjacent areas. CRM seems decidedly a secondary focus for SAP, behind their more compelling play in the enterprise resource planning (ERP) space. Indeed, most instances where we see SAP in our clients’ shortlists, it’s as an ecosystem play within a broader SAP strategy. If you’re blue on the ERP side, looking to SAP’s capabilities on the CRM front makes logical sense and can help contain costs. If you’re approaching a CRM selection from a greenfield lens and with no legacy vendor baggage for SAP elsewhere, experience suggests you’ll be better served by a vendor that places a higher degree of primacy on the CRM aspect of their portfolio.”

    Ben Dickie
    Research Practice Lead, Info-Tech Research Group

    SAP CRM - Pricing Opaque:

    “Request a Demo”

    Logo for pipedrive.


    Est. 2010 | NY, USA | Private

    bio

    Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
    Pipedrive brings together the tools and data, the platform focuses sales professionals on fundamentals to advance deals through their pipelines. Pipedrive's goal is to make sales success inevitable - for salespeople and teams.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:

    • Sales Management
    • Account & Contact Management
    • Lead Management
    • Usability & Intuitiveness
    • Ease of Implementation

    Areas to Improve:

    • Customer Service Management
    • Marketing Management
    • Product Strategy & Rate of Improvement
    Logo gif for SoftwareReviews.
    8.3
    COMPOSITE SCORE
    8.4
    CX SCORE
    +85
    EMOTIONAL FOOTPRINT
    85%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 262
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of a Pipedrive screen.Vendor Pulse rating. How often do we hear about Pipedrive from our members for CRM? 'Occasionally'.

    History of Pipedrive in a vertical timeline.

    *Pricing correct as of June 2022. Listed in USD and absent discounts.
    See pricing on vendor’s website for latest information.
    Logo for Pipedrive.

    “A relatively new offering, Pipedrive has seen explosive growth over the last five years. They’re a vendor that has gone from near-obscurity to popping up frequently on our members’ shortlists. Pipedrive’s secret sauce has been a relentless focus on high-velocity sales enablement. Their focus on pipeline management, lead assessment and routing, and a good single pane of glass for sales reps has driven significant traction for the vendor when sales enablement is the driving rationale behind rolling out a new CRM platform. Bang for your buck is also strong with Pipedrive, with the vendor having a value-driven licensing and implementation model.

    Pipedrive is not without some shortcomings. It’s laser-focus on sales enablement is at the expense of deep capabilities for marketing and service management, and its profile lends itself better to SMBs and lower midmarket than it does large organizations looking for enterprise-grade CRM.”

    Ben Dickie
    Research Practice Lead, Info-Tech Research Group

    Essential Advanced Professional Enterprise
    • Starts at $12.50*
    • Per user/mo
    • Small businesses after basic functionality
    • Starts at $24.90*
    • Per user/mo
    • Small/mid-sized businesses
    • Starts at $49.90*
    • Per user/mo
    • Lower mid-market focus
    • Starts at $99*
    • Per user/mo
    • Enterprise focus
    Logo for SugarCRM.


    Est. 2004 | CA, USA | Private

    bio

    Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
    Produces Sugar, a SaaS-based customer relationship management application. SugarCRM is backed by Accel-KKR.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:

    • Ease of customization
    • Product strategy and rate of improvement
    • Ease of IT administration

    Areas to Improve:

    • Marketing management
    • Analytics and reporting
    Logo gif for SoftwareReviews.
    8.4
    COMPOSITE SCORE
    8.8
    CX SCORE
    +92
    EMOTIONAL FOOTPRINT
    84%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 97
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of a SugarCRM screen.Vendor Pulse rating. How often do we hear about SugarCRM from our members for CRM? 'Frequently'.
    History of SugarCRM in a vertical timeline.
    *Pricing correct as of August 2021. Listed in USD and absent discounts.
    See pricing on vendor’s website for latest information.
    Logo for SugarCRM.

    “SugarCRM offers reliable baseline capabilities at a lower price point than other large CRM vendors. While SugarCRM does not offer all the bells and whistles that an Enterprise Salesforce plan might, SugarCRM is known for providing excellent vendor support. If your organization is only after standard features, SugarCRM will be a good vendor to shortlist.

    However, ensure you have the time and labor power to effectively implement and train on SugarCRM’s solutions. SugarCRM does not score highly for user-friendly experiences, with complaints centering on outdated and unintuitive interfaces. Setting up customized modules takes time to navigate, and SugarCRM does not provide a wide range of native integrations with other applications. To effectively determine whether SugarCRM does offer a feasible solution, it is recommended that organizations know exactly what kinds of integrations and modules they need.”

    Thomas Randall
    Research Director, Info-Tech Research Group

    Sugar Professional Sugar Serve Sugar Sell Sugar Enterprise Sugar Market
    • Starts at $52*
    • Per user/mo
    • Min. 3 users
    • Small businesses
    • Starts at $80*
    • Per user/mo
    • Min. 3 users
    • Focused on customer service
    • Starts at $80*
    • Per user/mo
    • Min. 3 users
    • Focused on sales automation
    • Starts at $80*
    • Per user/mo
    • Min. 3 users
    • On-premises, mid-sized businesses
    • Starts at $1000*
    • Priced per month
    • Min. 10k contacts
    • Large enterprise
    Logo for .


    Est. 2006 | MA, USA | HUBS (NYSE)

    bio

    Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
    Develops software for inbound customer service, marketing, and sales. Software includes CRM, SMM, lead gen, SEO, and web analytics.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:

    • Breadth of features
    • Product strategy and rate of improvement
    • Ease of customization

    Areas to Improve:

    • Ease of data integration
    • Customer service management
    • Telephony and call center management
    Logo gif for SoftwareReviews.
    8.3
    COMPOSITE SCORE
    8.4
    CX SCORE
    +84
    EMOTIONAL FOOTPRINT
    86%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 97
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of a HubSpot screen.Vendor Pulse rating. How often do we hear about HubSpot from our members for CRM? 'Frequently'.

    History of HubSpot in a vertical timeline.

    *Pricing correct as of August 2021. Listed in USD and absent discounts
    See pricing on vendor’s website for latest information.
    Logo for HubSpot.

    “ HubSpot is best suited for small to mid-sized organizations that need a range of CRM tools to enable growth across sales, marketing campaigns, and customer service. Indeed, HubSpot offers a content management solution that offers a central storage location for all customer and marketing data. Moreover, HubSpot offers plenty of freemium tools for users to familiarize themselves with the software before buying. However, though HubSpot is geared toward growing businesses, smaller organizations may not see high ROI until they begin to scale. The “Starter” and “Professional” plans’ pricing is often cited by small organizations as a barrier to commitment, and the freemium tools are not a sustainable solution. If organizations can take advantage of discount behaviors from HubSpot (e.g. a startup discount), HubSpot will be a viable long-term solution. ”

    Thomas Randall
    Research Director, Info-Tech Research Group

    Starter Professional Enterprise
    • Starts at $50*
    • Per month
    • Min. 2 users
    • Small businesses
    • Starts at $500*
    • Per month
    • Min. 5 users
    • Small/mid-sized businesses
    • Starts at $1200*
    • Billed yearly
    • Min. 10 users
    • Mid-sized/small enterprise
    Logo for Zoho.


    Est. 1996 | India | Private

    bio

    Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
    Zoho Corporation offers a cloud software suite, providing a full operating system for CRM, alongside apps for finance, productivity, HR, legal, and more.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:

    • Business value created
    • Breadth of features
    • Collaboration capabilities

    Areas to Improve:

    • Usability and intuitiveness
    Logo gif for SoftwareReviews.
    8.7
    COMPOSITE SCORE
    8.9
    CX SCORE
    +92
    EMOTIONAL FOOTPRINT
    85%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 152
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of a Zoho screen.Vendor Pulse rating. How often do we hear about Zoho from our members for CRM? 'Occasionally'.

    History of Zoho in a vertical timeline.

    *
    See pricing on vendor’s website for latest information.
    Logo for Zoho.

    “Zoho has a long list of software solutions for businesses to run end to end. As one of Zoho’s earliest software releases, though, ZohoCRM remains a flagship product. ZohoCRM’s pricing is incredibly competitive for mid/large enterprises, offering high business value for its robust feature sets. For those organizations that already utilize Zoho solutions (such as its productivity suite), ZohoCRM will be a natural extension.

    However, small/mid-sized businesses may wonder how much ROI they can get from ZohoCRM, when much of the functionality expected from a CRM (such as workflow automation) cannot be found until one jumps to the “Enterprise” plan. Given the “Enterprise” plan’s pricing is on par with other CRM vendors, there may not be much in a smaller organization’s eyes that truly distinguishes ZohoCRM unless they are already invested Zoho users.”

    Thomas Randall
    Research Director, Info-Tech Research Group

    Standard Professional Enterprise Ultimate
    • Starts at $20*
    • Per user/mo
    • Small businesses after basic functionality
    • Starts at $35*
    • Per user/mo
    • Small/mid-sized businesses
    • Adds inventory management
    • Starts at $50*
    • Per user/mo
    • Mid-sized/small enterprise
    • Adds Zia AI
    • Starts at $65*
    • Per user/mo
    • Enterprise
    • Bundles Zoho Analytics
    Logo for Zendesk.


    Est. 2009 | CA, USA | ZEN (NYSE)

    bio

    Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
    Software developer for customer service. Founded in Copenhagen but moved to San Francisco after $6 million Series B funding from Charles River Ventures and Benchmark Capital.

    SoftwareReviews’ Enterprise CRM Rankings

    Strengths:

    • Quality of features
    • Breadth of features
    • Vendor support

    Areas to Improve:

    • Business value created
    • Ease of customization
    • Usability and intuitiveness
    Logo gif for SoftwareReviews.
    7.8
    COMPOSITE SCORE
    7.9
    CX SCORE
    +80
    EMOTIONAL FOOTPRINT
    72%
    LIKELINESS TO RECOMMEND
    DOWNLOAD REPORT 50
    REVIEWS
    Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
    Sample of a Zendesk screen.Vendor Pulse rating. How often do we hear about Zendesk from our members for CRM? 'Rarely'.

    History of Zendesk in a vertical timeline.

    *Pricing correct as of August 2021. Listed in USD and absent discounts
    See pricing on vendor’s website for latest information.
    Logo for Zendesk.

    “Zendesk’s initial growth was grounded in word-of-mouth advertising, owing to the popularity of its help desk solution’s design and functionality. Zendesk Sell has followed suit, receiving strong feedback for the breadth and quality of its features. Organizations that have already reaped the benefits of Zendesk’s customer service suite will find Zendesk Sell a straightforward fit for their sales teams.

    However, it is important to note that Zendesk Sell is predominantly focused on sales. Other key components of a CRM, such as marketing, are less fleshed out. Organizations should ensure they verify what requirements they have for a CRM before choosing Zendesk Sell – if sales process requirements (such as forecasting, call analytics, and so on) are but one part of what the organization needs, Zendesk Sell may not offer the highest ROI for the pricing offered.”

    Thomas Randall
    Research Director, Info-Tech Research Group

    Sell Team Sell Professional Sell Enterprise
    • Starts at $19*
    • Per user/mo
    • Max. 3 users
    • Small businesses
    • Basic functionality
    • Starts at $49*
    • Per user/mo
    • Small/mid-sized businesses
    • Advanced analytics
    • Starts at $99*
    • Per user/mo
    • Mid-sized/small enterprise
    • Task automation

    Speak with category experts to dive deeper into the vendor landscape

    Icon of a person.
    Fact-based reviews of business software from IT professionals.
    Icon of a magnifying glass over a chart.
    Top-tier data quality backed by a rigorous quality assurance process.
    CLICK HERE to ACCESS

    Comprehensive software reviews to make better IT decisions

    We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

    Icon of a tablet.
    Product and category reports with state-of-the-art data visualization.
    Icon of a phone.
    User-experience insight that reveals the intangibles of working with a vendor.

    SoftwareReviews is powered by Info-Tech

    Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insights of our expert analysts, our members receive unparalleled support in their buying journey.

    Conduct a day of rapid-fire vendor demos

    Zoom in on high-value use cases and answers to targeted questions

    Make sure the solution will work for your business

    Give each vendor 90 to 120 minutes to give a rapid-fire presentation. We suggest the following structure:

    • 30 minutes: company introduction and vision
    • 60 minutes: walk-through of two or three high-value demo scenarios
    • 30 minutes: targeted Q&A from the business stakeholders and procurement team
    To ensure a consistent evaluation, vendors should be asked analogous questions, and a tabulation of answers should be conducted.
    How to challenge the vendors in the investigative interview
    • Change the visualization/presentation.
    • Change the underlying data.
    • Add additional data sets to the artifacts.
    • Collaboration capabilities.
    • Perform an investigation in terms of finding BI objects and identifying previous changes, and examine the audit trail.
    Rapid-fire vendor investigative interview

    Invite vendors to come onsite (or join you via video conference) to demonstrate the product and to answer questions. Use a highly targeted demo script to help identify how a vendor’s solution will fit your organization’s particular business capability needs.

    Graphic of an alarm clock.
    To kick-start scripting your demo scenarios, leverage our CRM Demo Script Template.

    A vendor scoring model provides a clear anchor point for your evaluation of CRM vendors based on a variety of inputs

    A vendor scoring model is a systematic method for effectively assessing competing vendors. A weighted-average scoring model is an approach that strikes a strong balance between rigor and evaluation speed.

    Info-Tech Insight

    Even the best scoring model will still involve some “art” rather than science – scoring categories such as vendor viability always entails a degree of subjective interpretation.

    How do I build a scoring model?

    • Start by shortlisting the key criteria you will use to evaluate your vendors. Functional capabilities should always be a critical category, but you’ll also want to look at criteria such as affordability, architectural fit, and vendor viability.
    • Depending on the complexity of the project, you may break down some criteria into sub-categories to assist with evaluation (for example, breaking down functional capabilities into constituent use cases so you can score each one).
    • Once you’ve developed the key criteria for your project, the next step is weighting each criterion. Your weightings should reflect the priorities for the project at hand. For example, some projects may put more emphasis on affordability, others on vendor partnership.
    • Using the information collected in the subsequent phases of this blueprint, score each criterion from 1-100, then multiply by the weighting factor. Add up the weighted scores to arrive at the aggregate evaluation score for each vendor on your shortlist.

    What are some of the best practices?

    • While the criteria for each project may vary, it’s helpful to have an inventory of repeatable criteria that can be used across application selection projects. The next slide contains an example that you can add or subtract from.
    • Don’t go overboard on the number of criteria: five to 10 weighted criteria should be the norm for most projects. The more criteria (and sub-criteria) you must score against, the longer it will take to conduct your evaluation. Always remember, link the level of rigor to the size and complexity of your project! It’s possible to create a convoluted scoring model that takes significant time to fill out but yields little additional value.
    • Creation of the scoring model should be a consensus-driven activity among IT, procurement, and the key business stakeholders – it should not be built in isolation. Everyone should agree on the fundamental criteria and weights that are employed.
    • Consider using not just the outputs of investigative interviews and RFP responses to score vendors, but also third-party review services like SoftwareReviews.

    Define how you’ll score CRM proposals and demos

    Define key CRM selection criteria for your organization – this should be informed by the following goals, use cases, and requirements covered in the blueprint.

    Criteria

    Description

    Functional CapabilitiesHow well does the vendor align with the top-priority functional requirements identified in your accelerated needs assessment? What is the vendor’s functional breadth and depth?
    AffordabilityHow affordable is this vendor? Consider a three-to-five-year total cost of ownership (TCO) that encompasses not just licensing costs, but also implementation, integration, training, and ongoing support costs.
    Architectural FitHow well does this vendor align with our direction from an enterprise architecture perspective? How interoperable is the solution with existing applications in our technology stack? Does the solution meet our deployment model preferences?
    ExtensibilityHow easy is it to augment the base solution with native or third-party add-ons as our business needs may evolve?
    ScalabilityHow easy is it to expand the solution to support increased user, data, and/or customer volumes? Are there any capacity constraints of the solution?
    Vendor ViabilityHow viable is this vendor? Are they an established player with a proven track record, or a new and untested entrant to the market? What is the financial health of the vendor? How committed are they to the particular solution category?
    Vendor VisionDoes the vendor have a cogent and realistic product roadmap? Are they making sensible investments that align with your organization’s internal direction?
    Emotional FootprintHow well does the vendor’s organizational culture and team dynamics align to yours?
    Third-Party Assessments and/or ReferencesHow well-received is the vendor by unbiased, third-party sources like SoftwareReviews? For larger projects, how well does the vendor perform in reference checks (and how closely do those references mirror your own situation)?

    Decision Point: Select the Finalist

    After reviewing all vendor responses to your RFP, conducting vendor demos, and running a pilot project (if applicable), the time has arrived to select your finalist.

    All core selection team members should hold a session to score each shortlisted vendor against the criteria enumerated on the previous slide – based on an in-depth review of proposals, the demo sessions, and any pilots or technical assessments.

    The vendor that scores the highest in aggregate is your finalist.

    Congratulations – you are now ready to proceed to final negotiation and inking a contract. This blueprint provides a detailed approach on the mechanics of a major vendor negotiation.

    Leverage Info-Tech’s research to plan and execute your CRM implementation

    Use Info-Tech Research Group’s three phase implementation process to guide your own planning.
    The three phases of software implementation: 'Assess', 'Prepare', 'Govern & Course Correct'. Sample of the 'Governance and Management of Enterprise Software Implementation' blueprint.

    Establish and execute an end-to-end, agile framework to succeed with the implementation of a major enterprise application.

    Visit this link

    Prepare for implementation: establish a clear resourcing plan

    Organizations rarely have sufficient internal staffing to resource a CRM project on their own. Consider the options for closing the gap in internal resource availability.

    The most common project resourcing structures for enterprise projects are:
    Your own staff +
    1. Management consultant
    2. Vendor consultant
    3. System integrator
    Info-Tech Insight

    When contemplating a resourcing structure, consider:

    • Availability of in-house implementation competencies and resources.
    • Timeline and constraints.
    • Integration environment complexity.

    Consider the following:

    Internal vs. External Roles and Responsibilities

    Clearly delineate between internal and external team responsibilities and accountabilities, and communicate this to your technology partner up front.

    Internal vs. External Accountabilities

    Accountability is different than responsibility. Your vendor or SI partner may be responsible for completing certain tasks, but be careful not to outsource accountability for the implementation – ultimately, the internal team will be accountable.

    Partner Implementation Methodologies

    Often vendors and/or SIs will have their own preferred implementation methodology. Consider the use of your partner's implementation methodology; however, you know what will work for your organization.

    Establish team composition

    1 – 2 hours

    Input: Skills assessment, Stakeholder analysis, Vendor partner selection

    Output: Team composition

    Materials: Sticky notes, Whiteboard, Markers

    Participants: Project team

    Use Info-Tech’s Governance and Management of Enterprise Software Implementation to establish your team composition. Within that blueprint:

    1. Assess the skills necessary for an implementation. Inventory the competencies required for the implementation project team. Map your internal resources to each competency as applicable.
    2. Select your internal implementation team. Determine who needs to be involved closely with the implementation. Key stakeholders should also be considered as members of your implementation team.
    3. Identify the number of external consultants/support required for implementation. Consider your in-house skills, timeline considerations, integration environment complexity, and cost constraints as you make your team composition plan. Be sure to dedicate an internal resource to managing the vendor and partner relationships.
    4. Document the roles and responsibilities, accountabilities, and other expectations of your team as they relate to each step of the implementation.

    Governance and Management of Enterprise Software Implementation

    Sample of the 'Governance and Management of Enterprise Software Implementation' blueprint.Follow our iterative methodology with a task list focused on the business must-have functionality to achieve rapid execution and to allow staff to return to their daily work sooner.

    Visit this link

    Ensure your implementation team has a high degree of trust and communication

    If external partners are needed, dedicate an internal resource to managing the vendor and partner relationships.

    Communication

    Teams must have some type of communication strategy. This can be broken into:
    • Regularity: Having a set time each day to communicate progress and a set day to conduct retrospectives.
    • Ceremonies: Injecting awards and continually emphasizing delivery of value can encourage relationship-building and constructive motivation.
    • Escalation: Voicing any concerns and having someone responsible for addressing those concerns.

    Proximity

    Distributed teams create complexity as communication can break down. This can be mitigated by:
    • Location: Placing teams in proximity can close the barrier of geographical distance and time zone differences.
    • Inclusion: Making a deliberate attempt to pull remote team members into discussions and ceremonies.
    • Communication tools: Having the right technology (e.g. video conference) can help bring teams closer together virtually.

    Trust

    Members should trust other members are contributing to the project and completing their required tasks on time. Trust can be developed and maintained by:
    • Accountability: Having frequent quality reviews and feedback sessions. As work becomes more transparent, people become more accountable.
    • Role clarity: Having a clear definition of what everyone’s role is.

    Plan for your implementation of CRM based on deployment model

    Place your CRM application into your IT landscape by configuring and adjusting the tool based on your specific deployment method.

    Icon of a housing development.
    On-Premises

    1. Identify custom features and configuration items
    2. Train developers and IT staff on new software investment
    3. Install software
    4. Configure software
    5. Test installation and configuration
    6. Test functionality

    Icon of a cloud upload.
    SaaS-based

    1. Train developers and IT staff on new software investment
    2. Set up connectivity
    3. Identify VPN or internal solution
    4. Check firewalls
    5. Validate bandwidth regulations

    Integration is a top IT challenge and critical to the success of the CRM suite

    CRM suites are most effective when they are integrated with ERP and MarTech solutions.

    Data interchange between the CRM solution and other data sources is necessary

    Formulate a comprehensive map of the systems, hardware, and software with which the CRM solution must be able to integrate. Customer data needs to constantly be synchronized: without this, you lose out on one of the primary benefits of CRM. These connections must be bidirectional for maximum value (i.e. marketing data to the CRM, customer data to MMS).
    Specialized projects that include an intricate prospect or customer list and complex rules may need to be built by IT The more custom fields you have in your CRM suite and point solutions, the more schema mapping you will have to do. Include this information in the RFP to receive guidance from vendors on the ease with which integration can be achieved.

    Pay attention to legacy apps and databases

    If you have legacy CRM, POS, or customer contact software, more custom code will be required. Many vendors claim that custom integration can be performed for most systems, but custom comes at a cost. Don’t just ask if they can integrate; ask how long it will take and for references from organizations which have been successful in this.
    When assessing the current application portfolio that supports CRM, the tendency will be to focus on the applications under the CRM umbrella, relating mostly to marketing, sales, and customer service. Be sure to include systems that act as inputs to, or benefit due to outputs from, the CRM or similar applications.

    CRM data flow

    Example of a CRM data flow.

    Be sure to include enterprise applications that are not included in the CRM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

    Sample CRM integration map

    Sample of a CRM integration map.

    Scenario: Failure to address CRM data integration will cost you in the long run

    A company spent $15 million implementing a new CRM system in the cloud and decided NOT to spend an additional $1.5 million to do a proper cloud DI tool procurement. The mounting costs followed.

    Cost Element – Custom Data Integration

    $

    2 FTEs for double entry of sales order data $ 100,000/year
    One-time migration of product data to CRM $ 240,000 otc
    Product data maintenance $ 60,000/year
    Customer data synchronization interface build $ 60,000 otc
    Customer data interface maintenance $ 10,000/year
    Data quality issues $ 100,000/year
    New SaaS integration built in year 3 $ 300,000 otc
    New SaaS integration maintenance $ 150,000/year

    Cost Element – Data Integration Tool

    $

    DI strategy and platform implementation $1,500,000 otc
    DI tool maintenance $ 15,000/year
    New SaaS integration point in year 3 $ 300,000 otc
    Thumbs down color coded red to the adjacent chart. Custom integration is costing this organization $300,000/year for one SaaS solution.
    Thumbs up color coded blue to the adjacent chart.

    The proposed integration solution would have paid for itself in 3-4 years and saved exponential costs in the long run.

    Proactively address data quality in the CRM during implementation

    Data quality is a make-or-break issue in a CRM platform; garbage in is garbage out.
    • CRM suites are one of the leading offenders for generating poor-quality data. As such, it’s important to have a plan in place for structuring your data architecture in such a way the poor data quality is minimized from the get-go.
    • Having a plan for data quality should precede data migration efforts; some types of poor data quality can be mitigated prior to migration.
    • There are five main types of poor-quality data found in CRM platforms.
      • Duplicate data: Duplicate records can be a major issue. Leverage dedicated deduplication tools to eliminate them.
      • Stale data: Out-of-date customer information can reduce the usefulness of the platform. Use automated social listening tools to help keep data fresh.
      • Incomplete data: Records with missing info limit platform value. Specify data validation parameters to mandate that all fields are filled in.
      • Invalid and conflicting data: These can create cascading errors. Establishing conflict resolution rules in ETL tools for data integration can lessen issues.
    Info-Tech Insight

    If you have a complex POI environment, appoint data stewards for each major domain and procure a deduplication tool. As the complexity of CRM system-to-system integrations increases, so will the chance that data quality errors will crop up – for example, bidirectional POI with other sources of customer information dramatically increase the chances of conflicting/duplicate data.

    Profile data, eliminate dead weight, and enforce standards to protect data

    Identify and eliminate dead weight

    Poor data can originate in the firm’s CRM system. Custom queries, stored procedures, or profiling tools can be used to assess the key problem areas.

    Loose rules in the CRM system may lead to records of no significant value in the database. Those rules need to be fixed, but if changes are made before the data is fixed, users could encounter database or application errors, which will reduce user confidence in the system.

    • Conduct a data flow analysis: map the path that data takes through the organization.
    • Use a mass cleanup to identify and destroy dead weight data. Merge duplicates either manually or with the aid of software tools. Delete incomplete data, taking care to reassign related data.
    • COTS packages typically allow power users to merge records without creating orphaned records in related tables, but custom-built applications typically require IT expertise.

    Create and enforce standards and policies

    Now that the data has been cleaned, it’s important to protect the system from relapsing.

    Work with business users to find out what types of data require validation and which fields should have changes audited. Whenever possible, implement drop-down lists to standardize values and make programming changes to ensure that truncation ceases.

    • Truncated data is usually caused by mismatches in data structures during either one-time data loads or ongoing data integrations.
    • Don’t go overboard on assigning required fields; users will just put key data in note fields.
    • Discourage the use of unstructured note fields: the data is effectively lost except if it gets subpoenaed.
    Info-Tech Insight

    Data quality concerns proliferate with the customization level of your platform. The more extensive the custom integration points and module/database extensions that you have made, the more you will need to have a plan in place for managing data quality from a reactive and proactive standpoint.

    Create a formal communication process throughout the CRM implementation

    Establish a comprehensive communication process around the CRM enterprise roll-out to ensure that end users stay informed.

    The CRM kick-off meeting(s) should encompass: 'The high-level application overview', 'Target business-user requirements', 'Target quality of service (QoS) metrics', 'Other IT department needs', 'Tangible business benefits of application', 'Special consideration needs'. The overall objective for interdepartmental CRM kick-off meetings is to confirm that all parties agree on certain key points and understand platform rationale and functionality.

    The kick-off process will significantly improve internal communications by inviting all affected internal IT groups, including business units, to work together to address significant issues before the application process is formally activated.

    Department groups or designated trainers should take the lead and implement a process for:

    • Scheduling CRM platform roll-out/kick-off meetings.
    • Soliciting preliminary input from the attending groups to develop further training plans.
    • Establishing communication paths and the key communication agents from each department who are responsible for keeping lines open moving forward.

    Ensure requirements are met with robust user acceptance testing

    User acceptance testing (UAT) is a test procedure that helps to ensure end-user requirements are met. Test cases can reveal bugs before the suite is implemented.

    Five Secrets of UAT Success

    Bracket with colors corresponding the adjacent list items.

    1

    Create the plan With the information collected from requirements gathering, create the plan. Make sure this information is added to the main project plan documentation.

    2

    Set the agenda The time allotted will vary depending on the functionality being tested. Ensure that the test schedule allows for the resolution of issues and discussion.

    3

    Determine who will participate Work with the relevant stakeholders to identify the people who can best contribute to system testing. Look for experienced power users who have been involved in earlier decision making about the system.

    4

    Highlight acceptance criteria Together with the UAT group, pinpoint the criteria to determine system acceptability. Refer back to requirements specified in use cases in the initial requirements-gathering stages of the project.

    5

    Collect end user feedback Weaknesses in resolution workflow design, technical architecture, and existing customer service processes can be highlighted and improved on with ongoing surveys and targeted interviews.

    Calculate post-deployment metrics to assess measurable value of the project

    Track the post-deployment results from the project and compare the metrics to the current state and target state.

    CRM Selection and Implementation Metrics
    Description Formula Current or Estimated Target Post-Deployment
    End-User Satisfaction # of Satisfied Users
    # of End Users
    70% 90% 85%
    Percentage Over/Under Estimated Budget Amount Spent - 100%
    Budget
    5% 0% 2%
    Percentage Over/Under Estimated Timeline Project Length - 100%
    Estimated Timeline
    10% -5% -10%

    CRM Strategy Metrics
    Description Formula Current or Estimated Target Post-Deployment
    Number of Leads Generated (per month) # of Leads Generated 150 200 250
    Average Time to Resolution (in minutes) Time Spent on Resolution
    # of Resolutions
    30 minutes 10 minutes 15 minutes
    Cost per Interaction by Campaign Total Campaign Spending
    # of Customer Interactions
    $17.00 $12.00 $12.00

    Select the Right CRM Platform

    CRM technology is critical to facilitate an organization’s relationships with customers, service users, employees, and suppliers. Having a structured approach to building a business case, defining key requirements, and engaging with the right shortlist of vendors to pick the best finalist is crucial.

    This selection guide allows organizations to execute a structured methodology for picking a CRM that aligns with their needs. This includes:
    • Alignment and prioritization of key business and technology drivers for a CRM selection business case.
    • Identification of key use cases and requirements for CRM.
    • Construction of a robust CRM RFP.
    • A strong market scan of key players.
    • A survey of crucial implementation considerations.
    This formal CRM selection initiative will drive business-IT alignment, identify sales and marketing automation priorities, and allow for the rollout of a platform that’s highly likely to satisfy all stakeholder needs.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Contact your account representative for more information.
    workshops@infotech.com
    1-888-670-8889

    Insight summary

    Stakeholder satisfaction is critical to your success

    Choosing a solution for a single use case and then expanding it to cover other purposes can be a way to quickly gain approvals and then make effective use of dollars spent. However, this can also be a nightmare if the product is not fit for purpose and requires significant customization effort for future use cases. Identify use cases early, engage stakeholders to define success, and recognize where you need to find balance between a single off-the-shelf CRM platform and adjacent MarTech or sales enablement systems.

    Build a business case

    An effective business case isn’t a single-purpose document for obtaining funding. It can also be used to drive your approach to product selection, requirements gathering, and ultimately evaluating stakeholder and user satisfaction.

    Use your business case to define use cases and milestones as well as success.

    Balance process with technology

    A new solution with old processes will result in incremental increased value. Evaluate existing processes and identify opportunities to improve and remove workarounds. Then define requirements.

    You may find that the tools you have would be adequate with an upgrade and tool optimization. If not, this exercise will prepare you to select the right solution for your current and future needs.

    Drive toward early value

    Lead with the most important benefit and consider the timeline. Most stakeholders will lose interest if they don’t realize benefits within the fist year. Can you reach your goal and report success within that timeline?

    Identify secondary, incremental customer engagement improvements that can be made as you work toward the overall goal to be achieved at the one-year milestone.

    Related Info-Tech Research

    Stock image of an office worker. Build a Strong Technology Foundation for Customer Experience Management
    • Any CRM project needs to be guided by the broader strategy around customer engagement. This blueprint explores how to create a strong technology enablement approach for CXM using voice of the customer analysis.
    Stock image of a target with arrows. Improve Requirements Gathering
    • 70% of projects that fail do so because of poor requirements. If you need to double-click on best practices for eliciting, analyzing, and validating requirements as you build up your CRM picklist and RFP, this blueprint will equip you with the knowledge and tools you need to hit the ground running.
    Stock image of a pen on paper. Drive Successful Sourcing Outcomes with a Robust RFP Process
    • Managing a complex RFP process for an enterprise application like a CRM platform can be a challenging undertaking. This blueprint zooms into how to build, run, administer, and evaluate RFP responses effectively.

    Bibliography

    “Doomed From the Start? Why a Majority of Business and IT Teams Anticipate Their Software Development Projects Will Fail.” Geneca, 25 Jan. 2017. Web.

    Hall, Kerrie. “The State of CRM Data Management 2020.” Validity. 27 April 2020. Web.

    Hinchcliffe, Dion. “The Evolving Role of the CIO and CMO in Customer Experience.” ZDNet, 22 Jan. 2020. Web.

    Klie, L. “CRM Still Faces Challenges, Most Speakers Agree: CRM Systems Have Been Around for Decades, but Interoperability and Data Siloes Still Have to Be Overcome.” CRM Magazine, vol. 23, no. 5, 2019, pp. 13-14.

    Markman, Jon. "Netflix Knows What You Want... Before You Do." Forbes. 9 Jun. 2017. Web.

    Morgan, Blake. “50 Stats That Prove The Value Of Customer Experience.” Forbes, 24 Sept. 2019. Web.

    Taber, David. “What to Do When Your CRM Project Fails.” CIO Magazine, 18 Sept. 2017. Web.

    “The State of Project Management Annual Survey 2018.” Wellingtone, 2018. Web.

    “The History of Microsoft Dynamics.” Eswelt. 2021. Accessed 8 June 2022.

    “Unlock the Mysteries of Your Customer Relationships.” Harvard Business Review. 1 July 2014. Accessed 30 Mar. 2016.

    Evaluate Your Vendor Account Team to Optimize Vendor Relations

    • Buy Link or Shortcode: {j2store}222|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • Understand how important your account is to the vendor and how it is classified.
    • Understand how informed the account team is about your company and your industry.
    • Understand how long the team has been with the vendor. Have they been around long enough to have developed a “brand” or trust within their organization?
    • Understand and manage the relationships and influence the account team has within your organization to maintain control of the relationship.

    Our Advice

    Critical Insight

    Conducting the appropriate due diligence on your vendor’s account team is as important as the due diligence you put into the vendor. Ongoing management of the account team should follow the lifecycle of the vendor relationship.

    Impact and Result

    Understanding your vendor team’s background, experience, and strategic approach to your account is key to the management of the relationship, the success of the vendor agreement, and, depending on the vendor, the success of your business.

    Evaluate Your Vendor Account Team to Optimize Vendor Relations Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Evaluate Your Vendor Account Team to Optimize Vendor Relations Deck – Understand the value of knowing your account team’s influence in their organization, and yours, to drive results.

    Learn how to best qualify that you have the right team for your business needs, using the accompanying tools to measure and monitor success throughout the relationship.

    • Evaluate Your Vendor Account Team to Optimize Vendor Relations Storyboard

    2. Vendor Rules of Engagement Template – Use this template to create a vendor rules of engagement document for inclusion in your company website, RFPs, and contracts.

    The Vendor Rules of Engagement template will help you develop your written expectations for the vendor for how they will interact with your business and stakeholders.

    • Vendor Rules of Engagement

    3. Evalu-Rate Your Account Team – Use this tool to develop criteria to evaluate your account team and gain feedback from your stakeholders.

    Evaluate your vendor account teams using this template to gather stakeholder feedback on vendor performance.

    • Evalu-Rate Your Account Team
    [infographic]

    Further reading

    Evaluate Your Vendor Account Team to Optimize Vendor Relations

    Understand the value of knowing your account team’s influence in their organization, and yours, to drive results.

    Analyst Perspective

    Having the wrong account team has consequences for your business.

    IT professionals interact with vendor account teams on a regular basis. You may not give it much thought, but do you have a good understanding of your rep’s ability to support/service your account, in the manner you expect, for the best possible outcome? The consequences to your business of an inappropriately assigned and poorly trained account team can have a disastrous impact on your relationship with the vendor, your business, and your budget. Doing the appropriate due diligence with your account team is as important as the due diligence you should put into the vendor. And, of course, ongoing management of the account team relationship is vital. Here we will share how best to qualify that you have the right team for your business needs as well as how to measure and monitor success throughout the relationship.

    Photo of Donna Glidden, Research Director, Vendor Management, Info-Tech Research Group.

    Donna Glidden
    Research Director, Vendor Management
    Info-Tech Research Group

    Executive Summary

    Your Challenge
    • Understand how important your account is to the vendor and how it is classified.
    • Understand how informed the account team is about your company and your industry.
    • Understand how long the team has been with the vendor. Have they been around long enough to have developed a “brand” or trust within their organization?
    • Understand and manage the relationships and influence the account team has within your organization to maintain control of the relationship.
    Common Obstacles
    • The vendor account team “came with the deal.”
    • The vendor account team has limited training and experience.
    • The vendor account team has close relationships within your organization outside of Procurement.
    • Managing your organization’s vendors is ad hoc and there is no formalized process for vendors to follow.
    • Your market position with the vendor is not optimal.
    Info-Tech’s Approach
    • Establish a repeatable, consistent vendor management process that focuses on the account team to maintain control of the relationship and drive the results you need.
    • Create a questionnaire for gaining stakeholder feedback to evaluate the account team on a regular basis.
    • Consider adding a vendor rules of engagement exhibit to your contracts and RFXs.

    Info-Tech Insight

    Understanding your vendor team’s background, their experience, and their strategic approach to your account is key to the management of the relationship, the success of the vendor agreement, and, depending on the vendor, the success of your business.

    Blueprint benefits

    IT Benefits

    • Clear lines of communication
    • Correct focus on the specific needs of IT
    • More accurate project scoping
    • Less time wasted

    Mutual IT and
    Business Benefits

    • Reduced time to implement
    • Improved alignment between IT & business
    • Improved vendor performance
    • Improved vendor relations

    Business Benefits

    • Clear relationship guidelines based on mutual understanding
    • Improved communications between the parties
    • Mutual understanding of roles/goals
    • Measurable relationship criteria

    Insight Summary

    Overarching insight

    Conducting the appropriate due diligence on your vendor’s account team is as important as the due diligence you put into the vendor. Ongoing management of the account team should follow the lifecycle of the vendor relationship.

    Introductory/RFP phase
    • Track vendor contacts with your organization.
    • Qualify the account team as you would the vendor:
      • Background
      • Client experience
    • Consider including vendor rules of engagement as part of your RFP process.
    • How does the vendor team classify your potential account?
    Contract phase
    • Set expectations with the account team for the ongoing relationship.
    • Include a vendor rules of engagement exhibit in the contract.
    • Depending on your classification of the vendor, establish appropriate account team deliverables, meetings, etc.
    Vendor management phase
    • “Evalu-rate” your account team by using a stakeholder questionnaire to gain measurable feedback.
    • Identify the desired improvements in communications and service delivery.
    • Use positive reinforcements that result in positive behavior.
    Tactical insight

    Don’t forget to look at your organization’s role in how well the account team is able to perform to your expectations.

    Tactical insight

    Measure to manage – what are the predetermined criteria that you will measure the account team’s success against?

    Lack of adequate sales training and experience can have a negative impact on the reps’ ability to support your needs adequately

    • According to Forbes (2012), 55% of salespeople lack basic sales skills.
    • 58% of buyers report that sales reps are unable to answer their questions effectively.
    • According to a recent survey, 84% of all sales training is lost after 90 days. This is due to the lack of information retention among sales personnel.
    • 82% of B2B decision-makers think sales reps are unprepared.
    • At least 50% of prospects are not a good fit for the product or service that vendors are selling (Sales Insights Lab).
    • It takes ten months or more for a new sales rep to be fully productive.

    (Source: Spotio)

    Info-Tech Insight

    Remember to examine the inadequacies of vendor training as part of the root cause of why the account team may lack substance.

    Why it matters

    1.8 years

    is the average tenure for top ten tech companies

    2.6 years is the average experience required to hire.

    2.4 years is the average account executive tenure.

    44% of reps plan to leave their job within two years.

    The higher the average contract value, the longer the tenure.

    More-experienced account reps tend to stay longer.

    (Source: Xactly, 2021)
    Image of two lightbulbs labeled 'skill training' with multiple other buzzwords on the glass.

    Info-Tech Insight

    You are always going to be engaged in training your rep, so be prepared.

    Before you get started…

    • Take an inward look at how your company engages with vendors overall:
      • Do you have a standard protocol for how initial vendor inquiries are handled (emails, phone calls, meeting invitations)?
      • Do you have a standard protocol for introductory vendor meetings?
      • Are vendors provided the appropriate level of access to stakeholders/management?
      • Are you prompt in your communications with vendors?
      • What is the quality of the data provided to vendors? Do they need to reach out repeatedly for more/better data?
      • How well are you able to forecast your needs?
      • Is your Accounts Payable team responsive to vendor inquiries?
      • Are Procurement and stakeholders on the same page regarding the handling of vendors?
    • While you may not have a formal vendor management initiative in place, try to understand how important each of your vendors are to your organization, especially before you issue an RFP, so you can set the right expectations with potential vendor teams.
    • Classify vendors as strategic, operational, tactical, or commodity.
      • This will help you focus your time appropriately and establish the right meeting cadence according to the vendor’s place in your business.
      • See Info-Tech’s research on vendor classification.
    When you formalize your expectations regarding vendor contact with your organization and create structure around it, vendors will take notice.

    Consider a standard intake process for fielding vendor inquiries and responding to requests for meetings to save yourself the headaches that come with trying to keep up with them.

    Stakeholder teams, IT, and Procurement need to be on the same page in this regard to avoid missteps in the important introductory phase of dealing with vendors and the resulting confusion on the part of vendor account teams when they get mixed messages and feel “passed around.”

    1. Introductory Phase

    If vendors know you have no process to track their activities, they’ll call who they want when they want, and the likelihood of them having more information about your business than you about theirs is significant.

    Vendor contacts are made in several ways:

    • Cold calls
    • Emails
    • Website
    • Conferences
    • Social introductions

    Things to consider:

    • Consider having a link on your company website to your Sourcing & Procurement team, including:
      • An email address for vendor inquiries.
      • Instructions to vendors on how to engage with you and what information they should provide.
      • A link to your Vendor Rules of Engagement.
    • Track vendor inquiries so you have a list of potential respondents to future RFPs.
    • Work with stakeholders and gain their buy-in on how vendor inquiries are to be routed and handled internally.
    Not every vendor contact will result in an “engagement” such as invitation to an RFP or a contract for business. As such, we recommend that you set up an intake process to track/manage supplier inquiries so that when you are ready to engage, the vendor teams will be set up to work according to your expectations.

    2. RFP/Contract Phase

    What are your ongoing expectations for the account team?
    • Understand how your business will be qualified by the vendor. Where you fit in the market space regarding spend, industry, size of your business, etc., determines what account team(s) you will have access to.
    • Add account team–specific questions to your RFP(s) to gain an understanding of their capabilities and experience up front.
    • How have you classified the vendor/solution? Strategic, tactical, operational, or commodity?
      • Depending on the classification/criticality (See Info-Tech’s Vendor Classification Tool) of the vendor, set the appropriate expectation for vendor review meetings, e.g. weekly, monthly, quarterly, annually.
      • Set the expectation that their support of your account will be regularly measured/monitored by your organization.
      • Consider including a set of vendor rules of engagement in your RFPs and contracts so vendors will know up front what your expectations are for how to engage with Procurement and stakeholders.
    Stock image of smiling coworkers.

    3. Ongoing Vendor Management

    Even if you don’t have a vendor management initiative in place, consider these steps to manage both new and legacy vendor relationships:
    • Don’t wait until there is an issue to engage the account team. Develop an open, honest relationship with vendors and get to know their key players.
    • Seek regular feedback from stakeholders on both parties’ performance against the agreement, based on agreed-upon criteria.
    • Measure vendor performance using the Evalu-Rate Your Account Team tool included with this research.
    • Based on vendor criticality, set a regular cadence of vendor meetings to discuss stakeholder feedback, both positive feedback as well as areas needing improvement and next steps, if applicable.
    Stock image of smiling coworkers.

    Info-Tech Insight

    What your account team doesn’t say is equally important as what they do say. For example, an account rep with high influence says, “I can get that for you” vs. “I'll get back to you.” Pay attention to the level of detail in their responses to you – it references how well they are networked within their own organization.

    How effective is your rep?

    The Poser
    • Talks so much they forget to listen
    • Needs to rely on the “experts”
    • Considers everyone a prospect
    Icons relating to the surrounding rep categories. Ideal Team Player
    • Practices active listening
    • Understands the product they are selling
    • Asks great questions
    • Is truthful
    • Approaches sales as a service to others
    The Bulldozer
    • Unable to ask the right questions
    • If push comes to shove, they keep pushing until you push back
    • Has a sense of entitlement
    • Lacks genuine social empathy
    Skillful Politician
    • Focuses on the product instead of people
    • Goes by gut feel
    • Fears rejection and can’t roll with the punches

    Characteristics of account reps

    Effective
    • Is truthful
    • Asks great questions
    • Practices active listening
    • Is likeable and trustworthy
    • Exhibits emotional intelligence
    • Is relatable and knowledgeable
    • Has excellent interpersonal skills
    • Has a commitment to personal growth
    • Approaches sales as a service to others
    • Understands the product they are selling
    • Builds authentic connections with clients
    • Is optimistic and has energy, drive, and confidence
    • Makes an emotional connection to whatever they are selling
    • Has the ability to put themselves in the position of the client
    • Builds trust by asking the right questions; listens and provides appropriate solutions without overpromising and underdelivering
    Ineffective
    • Goes by gut feel
    • Has a sense of entitlement
    • Lacks genuine social empathy.
    • Considers everyone a prospect
    • Is unable to ask the right questions.
    • Is not really into sales – it’s “just a job”
    • Focuses on the product instead of people
    • Loves to talk so much they forget to listen
    • Fears rejection and can’t roll with the punches
    • If push comes to shove, they keep pushing until you push back
    • Is clueless about their product and needs to rely on the “experts”

    How to support an effective rep

    • Consider being a reference account.
    • Say thank you as a simple way to boost morale and encourage continued positive behavior.
    • If you can, provide opportunities to increase business with the vendor – that is the ultimate thanks.
    • Continue to support open, honest communication between the vendor and your team.
    • Letters or emails of recognition to the vendor team’s management have the potential to boost the rep’s image within their own organization and shine a spotlight on your organization as a good customer.
    • Supplier awards for exemplary service and support may be awarded as part of a more formal vendor management initiative.
    • Refer to the characteristics of an effective rep – which ones best represent your account team?
    A little recognition goes a long way in reinforcing a positive vendor relationship.

    Info-Tech Insight

    Don’t forget to put the relationship in vendor relationship management – give a simple “Thank you for your support” to the account team from executive management.

    How to support an ineffective rep

    An ineffective rep can take your time and attention away from more important activities.
    • Understand what role, if any, you and/or your stakeholders may play in the rep’s lack of performance by determining the root cause:
      • Unrealistic expectations
      • Unclear and incomplete instructions
      • Lack of follow through by your stakeholders to provide necessary information
      • Disconnects between Sourcing/Procurement/IT that lead to poor communication with the vendor team (lack of vendor management)
    • Schedule more frequent meetings with the team to address the issues and measure progress.
    • Be open to listening to your rep(s) and ask them what they need from you in order to be effective in supporting your account.
    • Be sure to document in writing each instance where the rep has underperformed and include the vendor team’s leadership on all communications and meetings.
    • Refer to the characteristics of an ineffective rep – which ones best describe your ineffective vendor rep?
    “Addressing poor performance is an important aspect of supplier management, but prevention is even more so.” (Logistics Bureau)

    Introductory questions to ask vendor reps

    • What is the vendor team’s background, particularly in the industry they are representing? How did they get to where they are?
      • Have they been around long enough to have developed credibility throughout their organization?
      • Do they have client references they are willing to share?
    • How long have they been in this position with the vendor?
      • Remember, the average rep has less than 24 months of experience.
      • If they lack depth of experience, are they trainable?
    • How long have they been in the industry?
      • Longevity and experience matters.
    • What is their best customer experience?
      • What are they most proud of from an account rep perspective?
    • What is their most challenging customer experience?
      • What is their biggest weakness?
    • How are their relationships with their delivery and support teams?
      • Can they get the job done for you by effectively working their internal relationships?
    • What are their goals with this account?
      • Besides selling a lot.
    • What relationships do they have within your organization?
      • Are they better situated within your organization than you are?
    Qualify the account team as you would the vendor – get to know their background and history.

    Vendor rules of engagement

    Articulate your vendor expectations in writing

    Clearly document your expectations via formal rules of engagement for vendor teams in order to outline how they are expected to interact with your business and stakeholders. This can have a positive impact on your vendor and stakeholder relationships and enable you to gain control of:

    • Onsite visits and meetings.
    • Submission of proposals, quotes, contracts.
    • Communication between vendors, stakeholders and Procurement.
    • Expectations for ongoing relationship management.

    Include the rules in your RFXs and contracts to formalize your expectations.

    See the Vendor Rules of Engagement template included with this research.

    Download the Vendor Rules of Engagement template

    Sample of the Vendor Rules of Engagement template.

    Evalu-rate your vendor account team

    Measure stakeholder feedback to ensure your account team is on target to meet your needs. Sample of the Evalu-Rate Your Account Team tool.

    Download the Evalu-Rate Your Account Team tool

    • Use a measurable, repeatable process for evaluations.
    • Include feedback from key stakeholders engaged in the relationship.
    • Keep the feedback fact based and have backup.

    Final thoughts: Do’s and don’ts

    DO

    • Be friendly, approachable.
    • Manage the process by which vendors contact your organization – take control!
    • Understand your market position when sourcing goods/services to establish how much leverage you have with vendors.
    • Set vendor meetings according to their criticality to your business.
    • Evaluate your account teams to understand their strengths/weaknesses.
    • Gain stakeholder buy-in to your vendor processes.

    DON'T

    • Don’t be “friends.”
    • Don’t criticize in public.
    • Don’t needlessly escalate.
    • Don’t let the process of vendors communicating with your stakeholders “just happen.”
    • Don’t accept poor performance or attitude.

    Summary of Accomplishment

    Problem Solved

    Upon completion of this blueprint, Guided Implementation, or workshop, your team should have a comprehensive, well-defined, end-to-end approach to evaluating and managing your account team. Leveraging Info-Tech’s industry-proven tools and templates provides your organization with an effective approach to establishing, maintaining, and evaluating your vendor account team; improving your vendor and stakeholder communications; and maintaining control of the client/vendor relationship.

    Additionally, your team will have a foundation to execute your vendor management principles. These principles will assist your organization in ensuring you receive the perceived value from the vendor as a result of your vendor account team evaluation process.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Contact your account representative for more information.

    workshops@infotech.com 1-888-670-8889

    Bibliography

    “14 Essential Qualities of a Good Salesperson.” Forbes, 5 Oct. 2021. Accessed 11 March 2022.

    “149 Eye-Opening Sales Stats to Consider.” Spotio, 30 Oct. 2018. Accessed 11 March 2022.

    “35 Sales Representative Interview Questions and Answers.” Indeed, 29 Oct. 2021. Accessed 8 March 2022.

    “8 Intelligent Questions for Evaluating Your Sales Reps Performance” Inc., 16 Aug. 2016. Accessed 9 March 2022.

    Altschuler, Max. “Reality Check: You’re Probably A Bad Salesperson If You Possess Any Of These 11 Qualities.” Sales Hacker, 9 Jan. 2018. Accessed 4 May 2022.

    Bertuzzi, Matt. “Account Executive Data Points in the SaaS Marketplace.” Treeline, April 12, 2017. Accessed 9 March 2022. “Appreciation Letter to Vendor – Example, Sample & Writing Tips.” Letters.org, 10 Jan. 2020. Web.

    D’Entremont, Lauren. “Are Your Sales Reps Sabotaging Your Customer Success Without Realizing It?” Proposify, 4 Dec. 2018. Accessed 7 March 2022.

    Freedman, Max. “14 Important Traits of Successful Salespeople.” Business News Daily, 14 April 2022. Accessed 10 April 2022.

    Hansen, Drew. “6 Tips For Hiring Your Next Sales All-Star.” Forbes, 16 Oct. 2012. Web.

    Hulland, Ryan. “Getting Along with Your Vendors.” MonMan, 12 March 2014. Accessed 9 March 2022.

    Lawrence, Jess. “Talking to Vendors: 10 quick tips for getting it right.” Turbine, 30 Oct. 2018. Accessed 11 March 2022.

    Lucero, Karrie. “Sales Turnover Statistics You Need To Know.” Xactly, 24 Aug. 2021. Accessed 9 March 2022.

    Noyes, Jesse. “4 Qualities to Look For in Your Supplier Sales Representative.” QSR, Nov. 2017. Accessed 9 March 2022.

    O’Byrne, Rob. “How To Address Chronic Poor Supplier Performance.” Logistics Bureau, 26 July 2016. Accessed 4 May 2022.

    O'Brien, Jonathan. Supplier Relationship Management: Unlocking the Hidden Value in Your Supply Base. Kogan Page, 2014.

    Short, Alex. “Three Things You Should Consider to Become A Customer of Choice.” Vizibl, 29 Oct. 2021. Web.

    Wayshak, Marc. “18 New Sales Statistics for 2022 from Our Groundbreaking Study!” Sales Insights Lab, 28 March 2022. Web.

    “What Does a Good Customer Experience Look Like In Technology?” Virtual Systems, 23 June 2021. Accessed 10 March 2022.

    IT Project Management Lite

    • Buy Link or Shortcode: {j2store}187|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Project Management Office
    • Parent Category Link: /project-management-office
    • Organizations want reliable project reporting and clear, consistent project management standards, but many are unwilling or unable to allocate time for it.
    • Many IT project managers are given project management responsibilities in addition to other full-time roles – without any formal allocation of time, authority, or training.
    • Most IT project managers and stakeholders actually want clear and consistent standards but resist tools and procedures they believe are too time consuming and inflexible.
    • Standard project management procedures must be “light” enough for project managers to adapt to a wide range of projects without increasing the total time required to manage projects successfully.

    Our Advice

    Critical Insight

    • Most IT project management advice is focused on the largest 10-20% of projects – projects with large enough budgets to allocate time to project management. This leaves most IT projects (and most people who manage IT projects) in limbo between high-risk ad hoc management and high-cost project management best practices.
    • Project management success doesn’t equate to project success. While formal methodologies are a key ingredient in the success of large, complex projects, most IT projects do not require the same degree of rigorous record-keeping and planning.
    • Consistent, timely, and accurate reporting is the “linchpin” in any sustainable project and portfolio management practice.

    Impact and Result

    • Maintain timely and accurate project portfolio reporting with right-sized tools and processes.
    • Establish clear and consistent project management standards that make better use of time already spent managing projects.
    • Enable project managers to manage their projects more successfully with a set of flexible and lightweight tools and templates.

    IT Project Management Lite Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess the value of a minimum-viable PMO strategy

    Perform a measured value assessment for building and managing a minimum-viable PMO.

    • IT Project Management Lite Storyboard

    2. Perform a project and portfolio needs assessment

    Focus on the minimum required to maintain accuracy of portfolio reporting and effectiveness in managing projects.

    • Minimum-Viable PMO Needs Assessment

    3. Establish standards for realistic, accurate, and consistent portfolio reporting

    Emphasize reporting high-level project status as a way to identify and address issues to achieve the best results with the least effort.

    • Minimum-Viable Project and Portfolio Management SOP

    4. Create a standard, right-sized project management toolkit

    Free PMs to focus on actually managing the project while still delivering accurate portfolio metrics.

    • Zero-Allocation Project Management Workbook

    5. Train PMs for zero allocation

    Ensure project manager compliance with the portfolio reporting process by incorporating activities that create value.

    • Zero-Allocation Project Manager Development Plan
    • Zero-Allocation Project Management Survival Guide

    6. Perform a post-implementation assessment

    Evaluate success and identify opportunities for further improvement.

    Infographic

    Workshop: IT Project Management Lite

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Preparation

    The Purpose

    Define goals and success criteria.

    Finalize agenda.

    Gather information: update project and resource lists (Info-Tech recommends using the Project Portfolio Workbook).

    Key Benefits Achieved

    More efficiently organized and executed workshop.

    Able to better customize and tailor content to your specific needs.

    Activities

    1.1 Discuss specific pain points with regards to project manager allocations

    1.2 Review project lists, tools and templates, and other documents

    1.3 Map existing strategies to Info-Tech’s framework

    Outputs

    Understanding of where efforts must be focused in workshop

    Assessment of what existing tools and templates may need to be included in zero-allocation workbook

    Revisions that need to be made based on existing strategies

    2 Make the Case and Assess Needs

    The Purpose

    Assess current state (including review of project and resource lists).

    Discuss and analyze SWOT around project and portfolio management.

    Define target state.

    Define standards / SOP / processes for project and portfolio management.

    Key Benefits Achieved

    Gain perspective on how well your processes match up with the amount of time your project managers have for their PM duties.

    Determine the value of the time and effort that your project teams are investing in project management activities.

    Begin to define resource optimized processes for zero-allocation project managers.

    Ensure consistent implementation of processes across your portfolio.

    Establish project discipline and best practices that are grounded in actual project capacity.

    Activities

    2.1 Perform and/or analyze Minimum-Viable PMO Needs Assessment

    2.2 SWOT analysis

    2.3 Identify target allocations for project management activities

    2.4 Begin to define resource optimized processes for zero-allocation project managers

    Outputs

    Current state analysis based on Minimum-Viable PMO Needs Assessment

    Overview of current strengths, weaknesses, opportunities and threats

    Target state analysis based on Minimum-Viable PMO Needs Assessment

    A refined Minimum-Viable Project and Portfolio Management SOP

    3 Establish Strategy

    The Purpose

    Select and customize project and portfolio management toolkit.

    Implement (test/pilot) toolkit and processes.

    Customize project manager training plan.

    Evaluate and refine toolkit and processes as needed.

    Key Benefits Achieved

    Ensure consistent implementation of processes across your portfolio.

    Establish project discipline and best practices that are grounded in actual project capacity.

    A customized training session that will suit the needs of your project managers.

    Activities

    3.1 Customize the Zero-Allocation Toolkit to accommodate the needs of your projects

    3.2 Test toolkit on projects currently underway

    3.3 Tweak project manager training to suit the needs of your team

    Outputs

    Customized Zero-Allocation Project Management Workbook

    A tested and standardized copy of the workbook

    A customized training session for your project managers (to take place on Day 4 of Info-Tech’s workshop)

    4 Train Your Zero-Allocation Project Managers

    The Purpose

    Communicate project and portfolio management SOP to Project Managers.

    Deliver project manager training: standards for portfolio reporting and toolkit.

    Key Benefits Achieved

    Equip project managers to improve their level of discipline and documentation without spending more time in record keeping and task management.

    Execute a successful training session that clearly and succinctly communicates your minimal and resource-optimized processes.

    Activities

    4.1 Project Manager Training, including communication of the processes and standard templates and reports that will be adopted by all project managers

    Outputs

    Educated and disciplined project managers, aware of the required processes for portfolio reporting

    5 Assess Strategy and Next Steps

    The Purpose

    Debrief from the training session.

    Plan for ongoing evaluation and improvement.

    Evaluate and refine toolkit and processes if needed.

    Answer any remaining questions.

    Key Benefits Achieved

    Assess portfolio and project manager performance in light of the strategy implemented.

    Understanding of how to keep living documents like the workbook and SOP up to date.

    Clearly defined next steps.

    Activities

    5.1 Review the customized tools and templates

    5.2 Send relevant documentation to relevant stakeholders

    5.3 Schedule review call

    5.4 Schedule follow-up call with analysts to discuss progress in six months

    Outputs

    Finalized workbook and processes

    Satisfied and informed stakeholders

    Scheduled review call

    Scheduled follow-up call

    Prepare for Negotiations More Effectively

    • Buy Link or Shortcode: {j2store}224|cart{/j2store}
    • member rating overall impact: 8.0/10 Overall Impact
    • member rating average dollars saved: $6,000 Average $ Saved
    • member rating average days saved: 4 Average Days Saved
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • IT budgets are increasing, but many CIOs feel their budgets are inadequate to accomplish what is being asked of them.
    • Eighty percent of organizations don’t have a mature, repeatable, scalable negotiation process.
    • Training dollars on negotiations are often wasted or ineffective.

    Our Advice

    Critical Insight

    • Negotiations are about allocating risk and money – how much risk is a party willing to accept at what price point?
    • Using a cross-functional/cross-insight team structure for negotiation preparation yields better results.
    • Soft skills aren’t enough and theatrical negotiation tactics aren’t effective.

    Impact and Result

    A good negotiation process can help:

    • Maximize budget dollars.
    • Improve vendor performance.
    • Enhance relationships internally and externally.

    Prepare for Negotiations More Effectively Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should create and follow a scalable process for preparing to negotiate with vendors, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Before

    Throughout this phase, the 12 steps for negotiation preparation are identified and reviewed.

    • Prepare for Negotiations More Effectively – Phase 1: Before
    • Before Negotiating Tool
    [infographic]

    Workshop: Prepare for Negotiations More Effectively

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 12 Steps to Better Negotiation Preparation

    The Purpose

    Improve negotiation preparation.

    Understand how to use the Info-Tech Before Negotiating Tool.

    Key Benefits Achieved

    A scalable framework for negotiation preparation will be created.

    The Before Negotiating Tool will be configured for the customer’s environment.

    Activities

    1.1 Establish specific negotiation goals and ranges.

    1.2 Identify and assess alternatives to a negotiated agreement.

    1.3 Identify and evaluate assumptions made by the parties.

    1.4 Conduct research.

    1.5 Identify and evaluate relationship issues.

    1.6 Identify and leverage the team structure.

    1.7 Identify and address leverage issues.

    1.8 Evaluate timeline considerations.

    1.9 Create a strategy.

    1.10 Draft a negotiation agenda.

    1.11 Draft and answer questions.

    1.12 Rehearse (informal and formal).

    Outputs

    Sample negotiation goals and ranges will be generated via a case study to demonstrate the concepts and how to use the Before Negotiating Tool (this will apply to each Planned Activity)

    Sample alternatives will be generated

    Sample assumptions will be generated

    Sample research will be generated

    Sample relationship issues will be generated

    Sample teams will be generated

    Sample leverage items will be generated

    Sample timeline issues will be generated

    A sample strategy will be generated

    A sample negotiation agenda will be generated

    Sample questions and answers will be generated

    Sample rehearsals will be conducted

    Take Control of Infrastructure and Operations Metrics

    • Buy Link or Shortcode: {j2store}460|cart{/j2store}
    • member rating overall impact: 8.5/10 Overall Impact
    • member rating average dollars saved: $7,199 Average $ Saved
    • member rating average days saved: 11 Average Days Saved
    • Parent Category Name: Operations Management
    • Parent Category Link: /i-and-o-process-management
    • Measuring the business value provided by IT is very challenging.
    • You have a number of metrics, but they may not be truly meaningful, contextual, or actionable.
    • You know you need more than a single metric to tell the whole story. You also suspect that metrics from different systems combined will tell an even fuller story.
    • You are being asked to provide information from different levels of management, for different audiences, conveying different information.

    Our Advice

    Critical Insight

    • Many organizations collect metrics to validate they are keeping the lights on. But the Infrastructure and Operations managers who are benefitting the most are taking steps to ensure they are getting the right metrics to help them make decisions, manage costs, and plan for change.
    • Complaints about metrics are often rooted in managers wading through too many individual metrics, wrong metrics, or data that they simply can’t trust.
    • Info-Tech surveyed and interviewed a number of Infrastructure managers, CIOs, and IT leaders to understand how they are leveraging metrics. Successful organizations are using metrics for everything from capacity planning to solving customer service issues to troubleshooting system failures.

    Impact and Result

    • Manage metrics so they don’t become time wasters and instead provide real value.
    • Identify the types of metrics you need to focus on.
    • Build a metrics process to ensure you are collecting the right metrics and getting data you can use to save time and make better decisions.

    Take Control of Infrastructure and Operations Metrics Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement a metrics program in your Infrastructure and Operations practice, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Gap analysis

    This phase will help you identify challenges that you want to avoid by implementing a metrics program, discover the main IT goals, and determine your core metrics.

    • Take Control of Infrastructure and Operations Metrics – Phase 1: Gap Analysis
    • Infra & Ops Metrics Executive Presentation

    2. Build strategy

    This phase will help you make an actionable plan to implement your metrics program, define roles and responsibilities, and communicate your metrics project across your organization and with the business division.

    • Take Control of Infrastructure and Operations Metrics – Phase 2: Build Strategy
    • Infra & Ops Metrics Definition Template
    • Infra & Ops Metrics Tracking and Reporting Tool
    • Infra & Ops Metrics Program Roles & Responsibilities Guide
    • Weekly Metrics Review With Your Staff
    • Quarterly Metrics Review With the CIO
    [infographic]

    Set a Strategic Course of Action for the PMO in 100 Days

    • Buy Link or Shortcode: {j2store}356|cart{/j2store}
    • member rating overall impact: 9.3/10 Overall Impact
    • member rating average dollars saved: $13,744 Average $ Saved
    • member rating average days saved: 19 Average Days Saved
    • Parent Category Name: Project Management Office
    • Parent Category Link: /project-management-office
    • As a new PMO director, you’ve been thrown into the middle of an unfamiliar organizational structure and a chaotic project environment.
    • The expectations are that the PMO will help improve project outcomes, but beyond that your mandate as PMO director is opaque.
    • You know that the statistics around PMO longevity aren’t good, with 50% of new PMOs closing within the first three years. As early in your tenure as possible, you need to make sure that your stakeholders understand the value that your role could provide to the organization with the right level of buy-in and support.
    • Whether you’re implementing a new PMO or taking over an already existing one, you need to quickly overcome these challenges by rapidly assessing your unfamiliar tactical environment, while at the same time demonstrating confidence and effective leadership to project staff, business stakeholders, and the executive layer.

    Our Advice

    Critical Insight

    • The first 100 days are critical. You have a window of influence where people are open to sharing insights and opinions because you were wise enough to seek them out. If you don’t reach out soon, people notice and assume you’re not wise enough to seek them out, or that you don’t think they are important enough to involve.
    • PMOs most commonly stumble when they shortsightedly provide project management solutions to what are, in fact, more complex, systemic challenges requiring a mix of project management, portfolio management, and organizational change management capabilities. If you fail to accurately diagnose pain points and needs in your first days, you could waste your tenure as PMO leader providing well-intentioned solutions to the wrong project problems.
    • You have diminishing value on your time before skepticism and doubt start to erode your influence. Use your first 100 days to define an appropriate mandate for your PMO, get the right people behind you, and establish buy-in for long-term PMO success.

    Impact and Result

    • Develop an action plan to help leverage your first 100 days on the job. Hit the ground running in your new role with an action plan to achieve realistic goals and milestones in your first 100 days. A results-driven first three months will help establish roots throughout the organization that will continue to feed and grow the PMO beyond your first year.
    • Get to know what you don’t know quickly. Use Info-Tech’s advice and tools to perform a triage of every aspect of PMO accountability as well as harvest stakeholder input to ensure that your PMO meets or exceeds expectations and establishes the right solutions to the organization’s project challenges.
    • Solidify the PMO’s long-term mission. Adopt our stakeholder engagement best practices to ensure that you knock on the right doors early in your tenure. Not only do you need to clarify expectations, but you will ultimately need buy-in from key stakeholders as you move to align the mandate, authority, and resourcing needed for long-term PMO success.

    Set a Strategic Course of Action for the PMO in 100 Days Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how capitalizing on your first 100 days as PMO leader can help ensure the long-term success of your PMO.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Survey the project landscape

    Get up-to-speed quickly on key PMO considerations by engaging PMO sponsors, assessing stakeholders, and taking stock of your PMO inventory.

    • Set a Strategic Course of Action for the PMO in 100 Days – Phase 1: Survey the Project Landscape
    • Mission Identification and Inventory Tool
    • PMO Director First 100 Days Timeline - MS Project
    • PMO Director First 100 Days Timeline - MS Excel

    2. Gather PMO requirements

    Make your first major initiative as PMO director be engaging the wider pool of PMO stakeholders throughout the organization to determine their expectations for your office.

    • Set a Strategic Course of Action for the PMO in 100 Days – Phase 2: Gather PMO Requirements
    • PMO Requirements Gathering Tool
    • PMO Course of Action Stakeholder Interview Guide

    3. Solidify your PPM goals

    Review the organization’s current PPM capabilities in order to identify your ability to meet stakeholder expectations and define a sustainable mandate.

    • Set a Strategic Course of Action for the PMO in 100 Days – Phase 3: Solidify Your PPM Goals
    • Project Portfolio Management Maturity Assessment Workbook
    • Project Management Maturity Assessment Workbook
    • Organizational Change Management Maturity Assessment Workbook
    • PMO Strategic Expectations Glossary

    4. Formalize the PMO’s mandate

    Communicate your strategic vision for the PMO and garner stakeholder buy-in.

    • Set a Strategic Course of Action for the PMO in 100 Days – Phase 4: Formalize the PMO's Mandate
    • PMO Mandate and Strategy Roadmap Template
    • PMO Director Peer Feedback Evaluation Template
    • PMO Director First 100 Days Self-Assessment Tool
    [infographic]

    Workshop: Set a Strategic Course of Action for the PMO in 100 Days

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess the Current Project Ecosystem

    The Purpose

    Quickly develop an on-the-ground view of the organization’s project ecosystem and the PMO’s abilities to effectively serve.

    Key Benefits Achieved

    A comprehensive and actionable understanding of the PMO’s tactical environment

    Activities

    1.1 Perform a PMO SWOT analysis.

    1.2 Assess the organization’s portfolio management, project management, and organizational change management capability levels.

    1.3 Take inventory of the PMO’s resourcing levels, project demand levels, and tools and artifacts.

    Outputs

    Overview of current strengths, weaknesses, opportunities, and threats

    Documentation of your current process maturity to execute key portfolio management, project management, and organizational change management functions

    Stock of the PMO’s current access to PPM personnel relative to total project demand

    2 Analyze PMO Stakeholders

    The Purpose

    Determine stakeholder expectations for the PMO.

    Key Benefits Achieved

    An accurate understanding of others’ expectations to help ensure the PMO’s course of action is responsive to organizational culture and strategy

    Activities

    2.1 Conduct a PMO Mission Identification Survey with key stakeholders.

    2.2 Map the PMO’s stakeholder network.

    2.3 Analyze key stakeholders for influence, interest, and support.

    Outputs

    An understanding of expected PMO outcomes

    A stakeholder map and list of key stakeholders

    A prioritized PMO requirements gathering elicitation plan

    3 Determine Strategic Expectations and Define the Tactical Plan

    The Purpose

    Develop a process and method to turn stakeholder requirements into a strategic vision for the PMO.

    Key Benefits Achieved

    A strategic course of action for the PMO that is responsive to stakeholders’ expectations.

    Activities

    3.1 Assess the PMO’s ability to support stakeholder expectations.

    3.2 Use Info-Tech’s PMO Strategic Expectations glossary to turn raw process and service requirements into specific strategic expectations.

    3.3 Define an actionable tactical plan for each of the strategic expectations in your mandate.

    Outputs

    An understanding of PMO capacity and limits

    A preliminary PMO mandate

    High-level statements of strategy to help support your mandate

    4 Formalize the PMO’s Mandate and Roadmap

    The Purpose

    Establish a final PMO mandate and a process to help garner stakeholder buy-in to the PMO’s long-term vision.

    Key Benefits Achieved

    A viable PMO course of action complete with stakeholder buy-i

    Activities

    4.1 Finalize the PMO implementation timeline.

    4.2 Finalize Info-Tech’s PMO Mandate and Strategy Roadmap Template.

    4.3 Present the PMO’s strategy to key stakeholders.

    Outputs

    A 3-to-5-year implementation timeline for key PMO process and staffing initiatives

    A ready-to-present strategy document

    Stakeholder buy-in to the PMO’s mandate

    Lay the Strategic Foundations of Your Applications Team

    • Buy Link or Shortcode: {j2store}171|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Architecture & Strategy
    • Parent Category Link: /architecture-and-strategy
    • As an application leader, you are expected to quickly familiarize yourself with the current state of your applications environment.
    • You need to continuously demonstrate effective leadership to your applications team while defining and delivering a strategy for your applications department that will be accepted by stakeholders.

    Our Advice

    Critical Insight

    • The applications department can be viewed as the face of IT. The business often portrays the value of IT through the applications and services they provide and support. IT success can be dominantly driven by the application team’s performance.
    • Conflicting perceptions lead to missed opportunities. Being transparent on how well applications are supporting stakeholders from both business and technical perspectives is critical. This attribute helps validate that technical initiatives are addressing the right business problems or exploiting new value opportunities.

    Impact and Result

    • Get to know what needs to be changed quickly. Use Info-Tech’s advice and tools to perform an assessment of your department’s accountabilities and harvest stakeholder input to ensure that your applications operating model and portfolio meets or exceeds expectations and establishes the right solutions to the right problems.
    • Solidify the applications long-term strategy. Adopt best practices to ensure that you are striving towards the right goals and objectives. Not only do you need to clarify both team and stakeholder expectations, but you will ultimately need buy-in from them as you improve the operating model, applications portfolio, governance, and tactical plans. These items will be needed to develop your strategic model and long-term success.
    • Develop an action plan to show movement for improvements. Hit the ground running with an action plan to achieve realistic goals and milestones within an acceptable timeframe. An expectations-driven roadmap will help establish the critical structures that will continue to feed and grow your applications department.

    Lay the Strategic Foundations of Your Applications Team Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop an applications strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Get to know your team

    Understand your applications team.

    • Lay the Strategic Foundations of Your Applications Team – Phase 1: Get to Know Your Team
    • Applications Strategy Template
    • Applications Diagnostic Tool

    2. Get to know your stakeholders

    Understand your stakeholders.

    • Lay the Strategic Foundations of Your Applications Team – Phase 2: Get to Know Your Stakeholders

    3. Develop your applications strategy

    Design and plan your applications strategy.

    • Lay the Strategic Foundations of Your Applications Team – Phase 3: Develop Your Applications Strategy
    [infographic]

    Workshop: Lay the Strategic Foundations of Your Applications Team

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Get to Know Your Team

    The Purpose

    Understand the expectations, structure, and dynamics of your applications team.

    Review your team’s current capacity.

    Gauge the team’s effectiveness to execute their operating model.

    Key Benefits Achieved

    Clear understanding of the current responsibilities and accountabilities of your teams.

    Identification of improvement opportunities based on your team’s performance.

    Activities

    1.1 Define your team’s role and responsibilities.

    1.2 Understand your team’s application and project portfolios.

    1.3 Understand your team’s values and expectations.

    1.4 Gauge your team’s ability to execute your operating model.

    Outputs

    Current team structure, RACI chart, and operating model

    Application portfolios currently managed by applications team and projects currently committed to

    List of current guiding principles and team expectations

    Team effectiveness of current operating model

    2 Get to Know Your Stakeholders

    The Purpose

    Understand the expectations of stakeholders.

    Review the services stakeholders consume to support their applications.

    Gauge stakeholder satisfaction of the services and applications your team provides and supports.

    Key Benefits Achieved

    Grounded understanding of the drivers and motivators of stakeholders that teams should accommodate.

    Identification of improvement opportunities that will increase the value your team delivers to stakeholders.

    Activities

    2.1 Understand your stakeholders and applications services.

    2.2 Define stakeholder expectations.

    2.3 Gauge stakeholder satisfaction of applications services and portfolio.

    Outputs

    Expectations stakeholders have on the applications team and the applications services they use

    List of applications expectations

    Stakeholder satisfaction of current operating model

    3 Develop Your Applications Strategy

    The Purpose

    Align and consolidate a single set of applications expectations.

    Develop key initiatives to alleviate current pain points and exploit existing opportunities to deliver new value.

    Create an achievable roadmap that is aligned to organizational priorities and accommodate existing constraints.

    Key Benefits Achieved

    Applications team and stakeholders are aligned on the core focus of the applications department.

    Initiatives to address the high priority issues and opportunities.

    Activities

    3.1 Define your applications expectations.

    3.2 Investigate your diagnostic results.

    3.3 Envision your future state.

    3.4 Create a tactical plan to achieve your future state.

    3.5 Finalize your applications strategy.

    Outputs

    List of applications expectations that accommodates the team and stakeholder needs

    Root causes to issues and opportunities revealed in team and stakeholder assessments

    Future-state applications portfolio, operating model, supporting people, process, and technologies, and applications strategic model

    Roadmap that lays out initiatives to achieve the future state

    Completed applications strategy

    Explore the Secrets of IBM Software Contracts to Optimize Spend and Reduce Compliance Risk

    • Buy Link or Shortcode: {j2store}141|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Licensing
    • Parent Category Link: /licensing
    • IBM customers want to make effective use of their paid-up licenses to avoid overspending and stay compliant with agreements.
    • Each IBM software product is subject to different rules.
    • Clients control and have responsibility for aligning usage and payments. Over time, the usage of the software may be out of sync with what the client has paid for, resulting in either overspending or violation of the licensing agreement.
    • IBM audits software usage in order to generate revenue from non-compliant customers.

    Our Advice

    Critical Insight

    • You have a lot of work to do if you haven’t been paying attention to your IBM software.
    • Focus on needs first. Conduct and document a thorough requirements assessment. Well-documented needs will be your core asset in negotiation.
    • Know what’s in IBM’s terms and conditions. Failure to understand these can lead to major penalties after an audit.
    • Review your agreements and entitlements quarterly. IBM may have changed the rules, and you have almost certainly changed your usage.

    Impact and Result

    • Establish clear licensing requirements.
    • Maintain an effective process for managing your IBM license usage and compliance.
    • Identify any cost-reduction opportunities.
    • Prepare for penalty-free IBM audits.

    Explore the Secrets of IBM Software Contracts to Optimize Spend and Reduce Compliance Risk Research & Tools

    Start here – read the Executive Brief

    Read this Executive Brief to understand why you need to invest effort in managing usage and licensing of your IBM software.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Review terms and conditions for your IT contract

    Use Info-Tech’s licensing best practices to avoid the common mistakes of overspending on IBM licensing or failing an IBM audit.

    • IBM Passport Advantage Software RFQ Template
    • IBM 3-Year Bundled Price Analysis Tool
    [infographic]

    The Rush Trap: Why "Move Fast and Break Things" Breaks Your Business

    • Large vertical image:

    Most business leaders think that the best way to beat the competition is to push their development teams harder and demand faster delivery. I've seen the opposite happen many times.

    When you prioritize "shipping fast" and "getting to market first," you often end up taking the longest time to succeed, because your team must spend months, sometimes years, addressing the problems caused by your haste. On the surface, things appear to be improving, but internally, they can feel overwhelming. You will notice this impact on your staff.

    This is the harsh truth about rushing IT development:

    Every Shortcut Creates Two New Problems

    Here's what really happens in the codebase when you tell your team to "just get it done fast": you don't do proper input validation and sanitization because you say, "We'll add that later." And then you have to deal with SQL injection attacks and data breaches for months. This wasted time could have been avoided by using simple parameterized queries and validation frameworks.

    In 2024, the average cost of a data breach was $4.88 million. 73% of these breaches require more than 200 days to resolve. You only code for the happy flow, but real users submit incorrect data, experience network timeouts, and encounter failures with third-party APIs. 

    Your app crashes more than it should because you didn't set up proper error handling, or circuit breakers, or graceful degradation patterns. I know these take time to implement, but what would you rather have? Customers abandoning it?

    Businesses lose an average of $5,600 per minute when their systems go down, and e-commerce sites can lose up to $300,000 per hour during busy times. Instead of fixing the root causes of problems, you just patch them up with quick fixes. Instead of proper garbage collection, that memory leak gets a band-aid restart script. Instead of being optimized, the slow database query is cached.

    Soon, you will find yourself struggling to keep your building intact.

    To keep up with technical debt, companies usually have to spend 23–42% of their total IT budget each year.

    You don't do full testing because "writing unit tests takes longer than manual testing." This approach does not include load testing, test-driven development, or integration testing. Your first real test is when you have paying customers in production. Companies that don't test their software properly have 60% more bugs in their products and spend 40% more time fixing them than companies that do.

    You start without being able to properly monitor and see what's going on. There are no logging frameworks, no application performance monitoring, and no health checks in place. When things go wrong—and they will—it's difficult to figure out what's amiss. Without proper monitoring, it takes an average of 4.5 hours to find and fix IT problems. With full observability tools, it only takes 45 minutes.

    It's easy to see that every shortcut you take today will cause two new problems tomorrow. Each of those problems makes two more. You're going to be in a lot of trouble with technical debt, security holes, and unstable systems soon. All because you were in a hurry to meet some random deadline.

    The true cost of rushing in those "move fast and break things" success stories is often overlooked. You don't guarantee a quick time to market when you rush code to market. You're just making sure that failure to market happens quickly. Remember that most Silicon Valley break-movers lose millions, but you never read about those; you only read about the 1 in 350 VC-backed companies that make it. That is a staggering 0.29%. I would not bet on that strategy just yet.

    Because code that is rushed doesn't just break once. It breaks all the time. In production. This issue arises when dealing with real customers. At the worst times. Your developers are putting out fires instead of adding new features. Instead of adding the features that the customer asked for, they're fixing race conditions at 2 AM. They're patching vulnerabilities in dependencies rather than creating the next version.

    According to research, developers in environments with a lot of technical debt spend 42% of their time on maintenance and bug fixes, while those in well-architected systems spend only 23% of their time on these tasks. Bad code drives up your infrastructure costs by requiring more servers to handle the same load. Your database runs slower because no one took the time to make the right indexes or make the queries run faster. Unoptimized applications typically require 3 to 5 times more infrastructure resources, directly impacting your cloud computing and operational costs.

    The costs of getting new customers go up because products that are rushed have higher churn rates. People stop using apps that crash a lot or don't work well. For example, 53% of mobile users will stop using an app if it takes longer than 3 seconds to load. It costs 5 to 25 times more to get a new customer than to keep an old one.

    In the meantime, what about your competitor who took an extra month to set up proper error handling, security controls, and performance optimization? They're growing smoothly while you're still working on the base.

    The Slow Way Is the Quick Way

    Let me tell you a myth that is costing you millions: The race isn't about speed unless you're in a real winner-take-all market with huge network effects. It's about lasting.

    There is usually room for more than one winner in most markets. Your real job isn't to be the first to market; it's to still be there when the "fast movers" fail because they owe too much money. The businesses that are the biggest in their markets aren't usually the first ones there. They are the ones who took the time to use excellent software engineering practices from the start. They used well-known security frameworks like the OWASP guidelines to make their systems safe, set up the right authentication and authorization patterns, and made sure their APIs were designed with security and resilience in mind from the start.

    Companies that have good security practices have 76% fewer security incidents and save an average of $1.76 million for every breach they avoid. They wrote code for failure scenarios using patterns like retry logic with exponential backoff, circuit breakers to stop failures from spreading, and bulkhead isolation to keep problems from spreading.

    They set up full logging and monitoring so they could find problems before customers did. Systems that are built well and have the right resilience patterns are up 99.9% of the time, while systems that are built quickly are up 95% to 98% of the time. While you may believe that 95% to 98% uptime is an acceptable figure to agree to, take a moment to consider what that actually translates to in terms of downtime for your availability metrics. Remember that you should only calculate the times you really want to be available. This is due to the fact that any unavailability during your downtime is not taken into account. But failures do not take your opening hours into consideration. 

    Successful companies used domain-driven design to get the business requirements right, made complete API documentation, and built automated testing suites that found regressions before deployment. Companies that do a lot of testing deliver features 2.5 times faster and with 50% fewer bugs after deployment.

    They made sure that their environments were always the same by using infrastructure as code, setting up the right CI/CD pipelines with automated security scanning and regression testing, and planning for horizontal scaling from the start.

    Companies that have mature DevOps practices deploy 208 times more often and have lead times that are 106 times faster, all while being more reliable.

    What This Means for Your Process of Development

    The truth is that your development schedule isn't about meeting deadlines. The purpose is to create systems that function effectively when real people use them in real-life situations with actual data and at a large scale. If your code crashes under load because you didn't use the right caching strategies or database connection pooling, it doesn't matter how fast it is to market.

    If you neglect to conduct security code reviews and utilize static analysis tools, the likelihood of hacking increases significantly.

    Think about the return on investment: putting in an extra 20–30% up front for the right architecture, security, and testing usually cuts the total cost of ownership by 60–80% over the life of the application.

    The first "delay" of 2 to 4 weeks for proper engineering practices saves 6 to 12 months of fixing technical debt later on.

    You have a simple choice: either take the time to follow excellent software engineering practices now, or spend the next two years telling customers why your system is down again while your competitors take your market share. The companies that last and eventually take over choose quality engineering over random speed. I leave it up to your imagination as to what multi-trillion-dollar company immediately comes to mind.

    I am always up for a conversation.

    How to build a Service Desk Chatbot POC

    • Buy Link or Shortcode: {j2store}16|cart{/j2store}
    • Related Products: {j2store}16|crosssells{/j2store}
    • member rating overall impact: 9.7/10
    • member rating average dollars saved: 11,197
    • member rating average days saved: 8
    • Parent Category Name: Service Desk
    • Parent Category Link: /service-desk

    The challenge

    Build a chatbot that creates value for your business

     

    • Ensure your chatbot meets your business needs.
    • Bring scalability to your customer service delivery in a cost-effective manner.
    • Measure your chatbot objectives with clear metrics.
    • Pre-determine your ticket categories to use during the proof of concept.

    Our advice

    Insight

    • Build your chatbot to create business value. Whether increasing service or resource efficiency, keep value creation in mind when making decisions with your proof of concept.

    Impact and results 

    • When implemented effectively, chatbots can help save costs, generate new revenue, and ultimately increase customer satisfaction for external and internal-facing customers.

    The roadmap

    Read our concise Executive Brief to find out why you building a chatbot proof of concept is a good idea, review our methodology, and understand the four ways we can support you to successfully complete this project. Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    Start here

    Form your chatbot strategy.

    Build the right metrics to measure the success of your chatbot POC

    • Chatbot ROI Calculator (xls)
    • Chatbot POC Metrics Tool (xls)

    Build the foundation for your chatbot.

    Architect the chatbot to maximize business value

    • Chatbot Conversation Tree Library

    Continue to improve your chatbot.

    Now take your chatbot proof of concept to production

    • Chatbot POC RACI (doc)
    • Chatbot POC Implementation Roadmap (xls)
    • Chatbot POC Communication Plan (doc)Chatbot ROI Calculator (xls)

    Take Control of Cloud Costs on AWS

    • Buy Link or Shortcode: {j2store}425|cart{/j2store}
    • member rating overall impact: 9.3/10 Overall Impact
    • member rating average dollars saved: $62,500 Average $ Saved
    • member rating average days saved: 26 Average Days Saved
    • Parent Category Name: Cloud Strategy
    • Parent Category Link: /cloud-strategy
    • Traditional IT budgeting and procurement processes don't work for public cloud services.
    • The self-service nature of the cloud means that often the people provisioning cloud resources aren't accountable for the cost of those resources.
    • Without centralized control or oversight, organizations can quickly end up with massive AWS bills that exceed their IT salary cost.

    Our Advice

    Critical Insight

    • Most engineers care more about speed of feature delivery and reliability of the system than they do about cost.
    • Often there are no consequences for over architecting or overspending on AWS.
    • Many organizations lack sufficient visibility into their AWS spend, making it impossible to establish accountability and controls.

    Impact and Result

    • Define roles and responsibilities.
    • Establish visibility.
    • Develop processes, procedures, and policies.

    Take Control of Cloud Costs on AWS Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should take control of cloud costs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build cost accountability framework

    Assess your current state, define your cost allocation model, and define roles and responsibilities.

    • Cloud Cost Management Worksheet
    • Cloud Cost Management Capability Assessment
    • Cloud Cost Management Policy
    • Cloud Cost Glossary of Terms

    2. Establish visibility

    Define dashboards and reports, and document account structure and tagging requirements.

    • Service Cost Cheat Sheet

    3. Define processes and procedures

    Establish governance for tagging and cost control, define processes for right-sizing, and define processes for purchasing commitment discounts.

    • Right-Sizing Workflow (Visio)
    • Right-Sizing Workflow (PDF)
    • Commitment Purchasing Workflow (Visio)
    • Commitment Purchasing Workflow (PDF)

    4. Build implementation plan

    Document process interactions, establish program KPIs, and build implementation roadmap and communication plan.

    • Cloud Cost Management Task List

    Infographic

    Workshop: Take Control of Cloud Costs on AWS

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Build Cost Accountability Framework

    The Purpose

    Establish clear lines of accountability and document roles and responsibilities to effectively manage cloud costs.

    Key Benefits Achieved

    Chargeback/showback model to provide clear accountability for costs.

    Understanding of key areas to focus on to improve cloud cost management capabilities.

    Activities

    1.1 Assess current state

    1.2 Determine cloud cost model

    1.3 Define roles and responsibilities

    Outputs

    Cloud cost management capability assessment

    Cloud cost model

    Roles and responsibilities

    2 Establish Visibility

    The Purpose

    Establish visibility into cloud costs and drivers of those costs.

    Key Benefits Achieved

    Better understanding of what is driving costs and how to keep them in check.

    Activities

    2.1 Develop architectural patterns

    2.2 Define dashboards and reports

    2.3 Define account structure

    2.4 Document tagging requirements

    Outputs

    Architectural patterns; service cost cheat sheet

    Dashboards and reports

    Account structure

    Tagging scheme

    3 Define Processes and Procedures

    The Purpose

    Develop processes, procedures, and policies to control cloud costs.

    Key Benefits Achieved

    Improved capability of reducing costs.

    Documented processes and procedures for continuous improvement.

    Activities

    3.1 Establish governance for tagging

    3.2 Establish governance for costs

    3.3 Define right-sizing process

    3.4 Define purchasing process

    3.5 Define notification and alerts

    Outputs

    Tagging policy

    Cost control policy

    Right-sizing process

    Commitment purchasing process

    Notifications and Alerts

    4 Build Implementation Plan

    The Purpose

    Document next steps to implement and improve cloud cost management program.

    Key Benefits Achieved

    Concrete roadmap to stand up and/or improve the cloud cost management program.

    Activities

    4.1 Document process interaction changes

    4.2 Define cloud cost program KPIs

    4.3 Build implementation roadmap

    4.4 Build communication plan

    Outputs

    Changes to process interactions

    Cloud cost program KPIs

    Implementation roadmap

    Communication plan

    Strengthen the SSDLC for Enterprise Mobile Applications

    • Buy Link or Shortcode: {j2store}283|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Mobile Development
    • Parent Category Link: /mobile-development
    • CEOs see mobile for employees as their top mandate for upcoming technology innovation initiatives, making security a key competency for development.
    • Unsecure mobile applications can cause your employees to question the mobile applications’ integrity for handling sensitive data, limiting uptake.
    • Secure mobile development tends to be an afterthought, where vulnerabilities are tested for post-production rather than during the build process.
    • Developers lack the expertise, processes, and proper tools to effectively enhance applications for mobile security.

    Our Advice

    Critical Insight

    • Organizations currently react to security issues. Info-Tech recommends a proactive approach to ensure a secure software development life cycle (SSDLC) end-to-end.
    • Organizations currently lack the secure development practices to provide highly secure mobile applications that end users can trust.
    • Enable your developers with five key secure development techniques from Info-Tech’s development toolkit.

    Impact and Result

    • Embed secure development techniques into your SDLC.
    • Create a repeatable process for your developers to continually evaluate and optimize mobile application security for new threats and corresponding mitigation steps.
    • Build capabilities within your team based on Info-Tech’s framework by supporting ongoing security improvements through monitoring and metric analysis.

    Strengthen the SSDLC for Enterprise Mobile Applications Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should adopt secure development techniques for mobile application development, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess secure mobile development processes

    Determine the current security landscape of mobile application development.

    • Strengthen the SSDLC for Enterprise Mobile Applications – Phase 1: Assess Secure Mobile Development Practices
    • Systems Architecture Template
    • Mobile Application High-Level Design Requirements Template

    2. Implement and test secure mobile techniques

    Incorporate the various secure development techniques into current development practices.

    • Strengthen the SSDLC for Enterprise Mobile Applications – Phase 2: Implement and Test Secure Mobile Techniques

    3. Monitor and support secure mobile applications

    Create a roadmap for mobile optimization initiatives.

    • Strengthen the SSDLC for Enterprise Mobile Applications – Phase 3: Monitor and Support Secure Mobile Applications
    • Mobile Optimization Roadmap
    [infographic]

    Workshop: Strengthen the SSDLC for Enterprise Mobile Applications

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess Your Secure Mobile Development Practices

    The Purpose

    Identification of the triggers of your secure mobile development initiatives.

    Assessment of the security vulnerabilities in your mobile applications from an end-user perspective.

    Identification of the execution of your mobile environment.

    Assessment of the mobile threats and vulnerabilities to your systems architecture.

    Prioritization of your mobile threats.

    Creation of your risk register.

    Key Benefits Achieved

    Key opportunity areas where a secure development optimization initiative can provide tangible benefits.

    Identification of security requirements.

    Prioritized list of security threats.

    Initial mobile security risk register created. 

    Activities

    1.1 Establish the triggers of your secure mobile development initiatives.

    1.2 Assess the security vulnerabilities in your mobile applications from an end-user perspective.

    1.3 Understand the execution of your mobile environment with a systems architecture.

    1.4 Assess the mobile threats and vulnerabilities to your systems architecture.

    1.5 Prioritize your mobile threats.

    1.6 Begin building your risk register.

    Outputs

    Mobile Application High-Level Design Requirements Document

    Systems Architecture Diagram

    2 Implement and Test Your Secure Mobile Techniques

    The Purpose

    Discovery of secure development techniques to apply to current development practices.

    Discovery of new user stories from applying secure development techniques.

    Discovery of new test cases from applying secure development techniques.

    Key Benefits Achieved

    Areas within your code that can be optimized for improving mobile application security.

    New user stories created in relation to mitigation steps.

    New test cases created in relation to mitigation steps.

    Activities

    2.1 Gauge the state of your secure mobile development practices.

    2.2 Identify the appropriate techniques to fill gaps.

    2.3 Develop user stories from security development gaps identified.

    2.4 Develop test cases from user story gaps identified.

    Outputs

    Mobile Application High-Level Design Requirements Document

    3 Monitor and Support Your Secure Mobile Applications

    The Purpose

    Identification of key metrics used to measure mobile application security issues.

    Identification of secure mobile application and development process optimization initiatives.

    Identification of enablers and blockers of your mobile security optimization.

    Key Benefits Achieved

    Metrics for measuring application security.

    Modified triaging process for addressing security issues.

    Initiatives for development optimization.

    Enablers and blockers identified for mobile security optimization initiatives.

    Process for developing your mobile optimization roadmap.

    Activities

    3.1 List the metrics that would be gathered to assess the success of your mobile security optimization.

    3.2 Adjust and modify your triaging process to enhance handling of security issues.

    3.3 Brainstorm secure mobile application and development process optimization initiatives.

    3.4 Identify the enablers and blockers of your mobile security optimization.

    3.5 Define your mobile security optimization roadmap.

    Outputs

    Mobile Optimization Roadmap

    The Rapid Application Selection Framework

    • Buy Link or Shortcode: {j2store}608|cart{/j2store}
    • member rating overall impact: 9.2/10 Overall Impact
    • member rating average dollars saved: $37,512 Average $ Saved
    • member rating average days saved: 22 Average Days Saved
    • Parent Category Name: Selection & Implementation
    • Parent Category Link: /selection-and-implementation
    • Selection takes forever. Traditional software selection drags on for years, sometimes in perpetuity.
    • IT is viewed as a bottleneck and the business has taken control of software selection.
    • “Gut feel” decisions rule the day. Intuition, not hard data, guides selection, leading to poor outcomes.
    • Negotiations are a losing battle. Money is left on the table by inexperienced negotiators.
    • Overall: Poor selection processes lead to wasted time, wasted effort, and applications that continually disappoint.

    Our Advice

    Critical Insight

    • Adopt a formal methodology to accelerate and improve software selection results.
    • Improve business satisfaction by including the right stakeholders and delivering new applications on a truly timely basis.
    • Kill the “sacred cow” requirements that only exist because “it’s how we’ve always done it.”
    • Forget about “RFP” overload and hone in on the features that matter to your organization.
    • Skip the guesswork and validate decisions with real data.
    • Take control of vendor “dog and pony shows” with single-day, high-value, low-effort, rapid-fire investigative interviews.
    • Master vendor negotiations and never leave money on the table.

    Impact and Result

    Improving software selection is a critical project that will deliver huge value.

    • Hit a home run with your business stakeholders: use a data-driven approach to select the right application vendor for their needs – fast.
    • Shatter stakeholder expectations with truly rapid application selections.
    • Boost collaboration and crush the broken telephone with concise and effective stakeholder meetings.
    • Lock in hard savings and do not pay list price by using data-driven tactics.

    The Rapid Application Selection Framework Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. The Rapid Application Selection Framework

    • The Rapid Application Selection Framework Deck

    2. The Guide to Software Selection: A Business Stakeholder Manual

    • The Guide to Software Selection: A Business Stakeholder Manual

    3. The Software Selection Workbook

    • The Software Selection Workbook

    4. The Vendor Evaluation Workbook

    • The Vendor Evaluation Workbook
    [infographic]

    Improve Incident and Problem Management

    • Buy Link or Shortcode: {j2store}290|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $43,761 Average $ Saved
    • member rating average days saved: 23 Average Days Saved
    • Parent Category Name: Incident and problem management
    • Parent Category Link: /improve-your-core-processes/infra-and-operations/i-and-o-process-management/incident-and-problem-management
    • IT infrastructure managers have conflicting accountabilities. It can be difficult to fight fires as they appear while engaging in systematic fire prevention.
    • Repetitive interruptions erode faith in IT. If incidents recur consistently, why should the business trust IT to resolve them?

    Continue reading

    Implement a Social Media Program

    • Buy Link or Shortcode: {j2store}560|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions
    • IT is being caught in the middle of various business units, all separately attempting to create, staff, implement, and instrument a social media program.
    • Requests for procuring social media tools and integrating with CRM systems are coming from all directions, with no central authority governing a social media program or coordinating business goals.
    • Public Relations and Corporate Communications groups have been acting as the first level of response to social media channels since the company’s first Twitter account went live, but the volume of inquiries received through social channels has become too great for these groups to continue in a first responder role.

    Our Advice

    Critical Insight

    • Social media immaturity is an opportunity for IT leadership. As with so many of the “next new things,” IT has an opportunity to help the business understand social media technologies, trends, and risks, and coordinate efforts to approach social media as a united company.
    • Social media maturity must reach the Social Media Steering Committee stage before major investments in technology can proceed. As with all business initiatives, technology automation decisions cannot be made without respect to organizational and process maturity. Social media strategy stakeholders must join together and form a steering committee to create policies and procedures, govern strategy, develop workflows, and facilitate technology selection processes. IT not only belongs on such a steering committee, but it can also be instrumental in the formation of it.
    • Info-Tech’s research repeatedly indicates that the greatest return from social media investments is in the customer service domain, by reacting to incoming social inquiries and proactively listening to social conversations for product and service inquiry opportunities. This means CRM integration is essential to long-term social media program success.

    Impact and Result

    • Assess your organization’s social maturity to know where to begin and where to go in implementation of a social media program.
    • Form a social media steering committee to bring order to chaos among different business units.
    • Develop comprehensive workflows to categorize and prioritize inquiries, and then route them to the appropriate part of the business for resolution.
    • Consider creating one or more physical social media command centers to process large volumes of social inquiries more efficiently and monitor real-time social media metrics to improve critical response times.

    Implement a Social Media Program Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess your organization's social maturity

    Know where to begin and where to go in implementation of a social media program.

    • Storyboard: Implement a Social Media Program
    • Social Media Maturity Assessment Tool

    2. Form a social media steering committee

    Bring order to chaos among different business units.

    • Social Media Steering Committee Charter Template
    • Social Media Acceptable Use Policy
    • Blogging and Microblogging Guidelines Template

    3. Consider creating one or more physical social media command centers

    Process large volumes of social inquiries more efficiently, and monitor real-time social media metrics to improve critical response times.

    • Social Media Representative
    • Social Media Manager
    [infographic]

    IT Metrics and Dashboards During a Pandemic

    • Buy Link or Shortcode: {j2store}118|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Performance Measurement
    • Parent Category Link: /performance-measurement

    The ways you measure success as a business are based on the typical business environment, but during a crisis like a pandemic, the business environment is rapidly changing or significantly different.

    • How do you assess the scope of the risk?
    • How do you quickly align your team to manage new risks?
    • How do you remain flexible enough to adapt to a rapidly changing situation?

    Our Advice

    Critical Insight

    Measure what you have the data for and focus on managing the impacts to your employees, customers, and suppliers. Be willing to make decisions based on imperfect data. Don’t forget to keep an eye on the long-term objectives and remember that how you act now can reflect on your business for years to come.

    Impact and Result

    Use Info-Tech’s approach to:

    • Quickly assess the risk and identify critical items to manage.
    • Communicate what your decisions are based on so teams can either quickly align or challenge conclusions made from the data.
    • Quickly adjust your measures based on new information or changing circumstances.
    • Use the tools you already have and keep it simple.

    IT Metrics and Dashboards During a Pandemic Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how to develop your temporary crisis dashboard.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Consider your organizational goals

    Identify the short-term goals for your organization and reconsider your long-term objectives.

    • Crisis Temporary Measures Dashboard Tool

    2. Build a temporary data collection and dashboard method

    Determine your tool for data collection and your data requirements and collect initial data.

    3. Implement a cadence for review and action

    Determine the appropriate cadence for reviewing the dashboard and action planning.

    [infographic]

    Create an Effective SEO Keyword Strategy

    • Buy Link or Shortcode: {j2store}568|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions

    Digital Marketers working with an outdated or bad SEO strategy often see:

    • Declining keyword ranking and traffic
    • Poor keyword strategy
    • On-page errors

    Our Advice

    Critical Insight

    Most marketers fail in their SEO efforts because they focus on creating content for computers, not people.

    Impact and Result

    Using the SoftwareReviews methodology, digital marketers are able to break up their SEO project and data into bite-sized, actionable steps that focus on long-term improvement. Our methodology includes:

    • Competitive keyword research and identification of opportunities
    • On-page keyword strategy

    Create an Effective SEO Keyword Strategy Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Create an Effective SEO Keyword Strategy

    Update your on-page SEO strategy with competitively relevant keywords.

    • Create an Effective SEO Keyword Strategy Storyboard
    [infographic]

    Further reading

    Create an Effective SEO Keyword Strategy
    Update your on-page SEO strategy with competitively relevant keywords.

    Analyst Perspective

    Most marketers fail in their SEO efforts because they focus on creating content for computers, not people.

    Leading search engine optimization methods focus on creating and posting relevant keyword-rich content, not just increasing page rank. Content and keywords should move a buyer along their journey, close a sale, and develop long-term relationships. Unfortunately, many SEO specialists focus on computers, not the buyer. What's even more concerning is that up to 70% of SaaS businesses have already been impacted by outdated and inefficient SEO techniques. Poor strategies often focus on ballooning SEO metrics in the short-term instead of building the company's long-term PageRank.

    Best-in-class digital marketers stop chasing the short-term highs and focus on long-term growth. This starts with developing a competitive keyword strategy and updating website content with the new keywords.

    SEO is a large topic, so we have broken the strategy into small, easy-to-implement steps, taking the guesswork out of how to use the data from SEO tools and giving CMOs a solid path to increase their SEO results.

    This is a picture of Terra Higginson

    Terra Higginson
    Marketing Research Director
    SoftwareReviews

    Executive Summary

    Your Challenge

    Digital marketers working with an outdated or bad SEO strategy often see:

    • Declining keyword ranking and traffic
    • Poor keyword strategy
    • On-page errors

    Search algorithms change all the time, which means that the strategy is often sitting on the sifting sands of technology, making SEO strategies quickly outdated.

    Common Obstacles

    Digital marketers are responsible for developing and implementing a competitive SEO strategy but increasingly encounter the following obstacles:

    • SEO practitioners that focus on gaming the system
    • Ever-changing SEO technology
    • Lack of understanding of the best SEO techniques
    • SEO techniques focus on the needs of computers, not people
    • Lack of continued investment

    SoftwareReviews' Approach

    Using the SoftwareReviews methodology, digital marketers are able to break up their SEO project and data into bite-sized, actionable steps that focus on long-term improvement. Our methodology includes:

    • Competitive keyword research and identification of opportunities
    • On-page keyword strategy

    Our methodology will take a focused step-by-step strategy in a series of phases that will increase PageRank and competitive positioning.

    SoftwareReviews' SEO Methodology

    In this blueprint, we will cover:

    Good SEO vs. Poor SEO Techniques

    The difference between good and bad SEO techniques.

    Common Good
    SEO Techniques

    Common Poor
    SEO Techniques

    • Writing content for people, not machines.
    • Using SEO tools to regularly adjust and update SEO content, keywords, and backlinks.
    • Pillar and content cluster strategy in addition to a basic on- and off-page strategy.
    • Keyword stuffing and content duplication.
    • A strategy that focuses on computers first and people second.
    • Low-quality or purchased backlinks.

    Companies With Great SEO…

    Keyword Strategy

    • Have identified a keyword strategy that carves out targets within the white space available between themselves and the competition.

    Error-Free Site

    • Have error-free sites without duplicate content. Their URLs and redirects are all updated. Their site is responsive, and every page loads in under two seconds.

    Pillar & Content Clusters

    • Employ a pillar and content cluster strategy to help move the buyer through their journey.

    Authentic Off-Page Strategy

    • Build an authentic backlink strategy that incorporates the right information on the right sites to move the buyer through their journey.

    SEO Terms Defined

    A glossary to define common Phase 1 SEO terms.

    Search Volume: this measures the number of times a keyword is searched for in a certain time period. Target keywords with a volume of between 100-100,000. A search volume greater than 100,000 will be increasingly difficult to rank (A Beginner's Guide to Keyword Search Volume, 2022, Semrush).

    Keyword Difficulty: the metric that quantifies how difficult it will be to rank for a certain keyword. The keyword difficulty percentage includes the number of competitors attempting to rank for the same keyword, the quality of their content, the search intent, backlinks, and domain authority (Keyword Difficulty: What Is It and Why Is It Important? 2022, Semrush).

    Intent: this metric focuses on the intent of the user's search. All search intent is categorized into Informational, Commercial, Navigational, and Transactional (What Is Search Intent? A Complete Guide, 2022, Semrush).

    On-Page SEO: refers to the practice of search engine optimizing elements of your site such as title tags, internal links, HTML code, URL optimization, on-page content, images, and user experience.

    Off-Page SEO: refers to the practice of optimizing brand awareness (What Is Off-Page SEO? A Comprehensive Guide, 2022, Semrush).

    H1: HTML code that tells a search engine the title of the page (neilpatel.com).

    SEO Tool: A subscription-based all-in-one search engine optimization MarTech tool.

    Google's mission is to organize the world's information and make it universally accessible and useful… We believe Search should deliver the most relevant and reliable information available.
    – An excerpt from Google's mission statement

    Your Challenge

    Google makes over 4.5k algorithm changes per year1, directly impacting digital marketing search engine optimization efforts.

    Digital marketers with SEO problems will often see the following issues:

    • Keyword ranking – A decline in keyword ranking is alarming and results in decreased PageRank.
    • Bounce rate – Attracting the wrong audience to your site will increase the bounce rate because the H1 doesn't resonate with your audience.
    • Outdated keywords – Many companies are operating on a poor keyword strategy, or even worse, no keyword strategy. In addition, many marketers haven't updated their strategy to include pillar and cluster content.
    • Errors – Neglected sites often have a large number of errors.
    • Bad backlinks – Neglected sites often have a large number of toxic backlinks.

    The best place to hide a dead body is on page two of the search results.
    – Huffington Post

    Common Obstacles

    Digital marketers are responsible for developing and executing a competitive SEO strategy but increasingly encounter the following obstacles:

    • Inefficient and ineffective SEO practitioners.
    • Changing SEO technology and search engine algorithms.
    • Lack of understanding of the best-in-class SEO techniques.
    • Lack of a sustainable plan to manage the strategy and invest in SEO.

    SEO is a helpful activity when it's applied to people-first content. However, content created primarily for search engine traffic is strongly correlated with content that searchers find unsatisfying.
    – Google Search Central Blog

    Benefits of Proper SEO

    A good SEO keyword strategy will create long-term, sustainable SEO growth:

    • Write content for people, not algorithms – Good SEO prioritizes the needs of humans over the needs of computers, being ever thoughtful of the meaning of content and keywords.
    • Content that aligns with intent – Content and keyword intent will align with the buyer journey to help move prospects through the funnel.
    • Competitive keyword strategy – Find keyword white space for your brand. Keywords will be selected to optimize your ranking among competition with reasonable and sustainable targets.
    • Actionable and impactful fixes – By following the SoftwareReviews phases of SEO, you will be able to take a very large task and divide it into conquerable actions. Small improvements everyday lead to very large improvements over time.

    Digital Marketing SEO Stats

    61%
    61% of marketers believe that SEO is the key to online success.
    Source: Safari Digital

    437%
    Updating an existing title tag with an SEO optimised one can increase page clicks by more than 437%.
    Source: Safari Digital

    Good SEO Aligns With Search Intent

    What type of content is the user searching for? Align your keyword to the logical search objective.

    Informational

    This term categorizes search intent for when a user wants to inform or educate themselves on a specific topic.

    Commercial

    This term categorizes search intent for when a user wants to do research before making a purchase.

    Transactional

    This term categorizes search intent for when a user wants to purchase something.

    Navigational

    This term categorizes search intent for when a user wants to find a specific page.

    SoftwareReviews' Methodology toCreate an Effective SEO Strategy

    1. Competitive Analysis & Keyword Discovery 2. On-Page Keyword Optimization
    Phase Steps
    1. Make a list of keywords in your current SEO strategy – including search volume, keyword difficulty percentage, intent.
    2. Research the keywords of top competitors.
    3. Make a list of target keywords you would like to own – including the search volume, keyword difficulty percentage, and intent. Make sure that these keywords align with your buyer persona.
    1. List product and service pages, along with the URL and current ranking(s) for the keyword(s) for that URL.
    2. Create a new individual page strategy for each URL. Record the current keyword, rank, title tag, H1 tag, and meta description. Then, with keyword optimization in mind, develop the new title tag, new H1 tag, and new meta description. Build the target keywords into the pages and tags.
    3. Record the current ranking for the pages' keywords then reassess after three to six months.
    Phase Outcomes
    • Understanding of competitive landscape for SEO
    • A list of target new keywords
    • Keyword optimized product and service pages

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 Phase 2

    Call #1: Identify your current SEO keyword strategy.

    Call #2: Discuss how to start a competitive keyword analysis.

    Call #4: Discuss how to build the list of target keywords.

    Call #6: Discuss keyword optimization of the product & services pages.

    Call #8: (optional)

    Schedule a call to update every three to six months.

    Call #3: Discuss the results of the competitive keyword analysis.

    Call #5: Discuss which pages to update with new target keywords.

    Call #7: Review final page content and tags.

    Call #9: Schedule a call for SEO Phase 2: On-Page Technical Refinement.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between 8 to 12 calls over the course of 1 to 2 months.

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 Phase 2

    Call #1: Identify your current SEO keyword strategy.

    Call #2: Discuss how to start a competitive keyword analysis.

    Call #4: Discuss how to build the list of target keywords.

    Call #6: Discuss keyword optimization of the product & services pages.

    Call #8: (optional)

    Schedule a call to update every three to six months.

    Call #3: Discuss the results of the competitive keyword analysis.

    Call #5: Discuss which pages to update with new target keywords.

    Call #7: Review final page content and tags.

    Call #9: Schedule a call for SEO Phase 2: On-Page Technical Refinement.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between 8 to 12 calls over the course of 1 to 2 months.

    SoftwareReviews offers various levels of support to best suit your needs

    Included Within an Advisory Membership Optional Add-Ons
    DIY Toolkit Guided Implementation Workshop Consulting
    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Insight Summary

    People-First Content

    Best-in-class SEO practitioners focus on people-first content, not computer-first content. Search engine algorithms continue to focus on how to rank better content first, and a strategy that moves your buyers through the funnel in a logical and cohesive way will beat any SEO trick over the long run.

    Find White Space

    A good SEO strategy uses competitive research to carve out white space and give them a competitive edge in an increasingly difficult ranking algorithm. An understanding of the ideal client profile and the needs of their buyer persona(s) sit as a pre-step to any good SEO strategy.

    Optimize On-Page Keywords

    By optimizing the on-page strategy with competitively relevant keywords that target your ideal client profile, marketers are able to take an easy first step at improving the SEO content strategy.

    Understand the Strategy

    If you don't understand the strategy of your SEO practitioner, you are in trouble. Marketers need to work hand in hand with their SEO specialists to quickly uncover gaps, create a strategy that aligns with the buyer persona(s), and execute the changes.

    Quality Trumps Quantity

    The quality of the prospect that your SEO efforts bring to your site is more important than the number of people brought to your site.

    Stop Here and Ask Yourself:

    • Do I have an updated (completed within the last two years) buyer persona and journey?
    • Do I know who the ICP (ideal client profile) is for my product or company?

    If not, stop here, and we can help you define your buyer persona and journey, as well as your ideal client profile before moving forward with SEO Phase 1.

    The Steps to SEO Phase 1

    The Keyword Strategy

    1. Current Keywords
      • Identify the keywords your SEO strategy is currently targeting.
    2. Competitive Analysis
      • Research the keywords of competitor(s). Identify keyword whitespace.
    3. New Target Keywords
      • Identify and rank keywords that will result in more quality leads and less competition.
    4. Product & Service Pages
      • Identify your current product and service pages. These pages represent the easiest content to update on your site.
    5. Individual Page Update
      • Develop an SEO strategy for each of your product and service pages, include primary target keyword, H1, and title tags, as well as keyword-rich description.

    Resources Needed for Search Engine Optimization

    Consider the working skills required for search engine optimization.

    Required Skills/Knowledge

    • SEO
    • Web development
    • Competitive analysis
    • Content creation
    • Understanding of buyer persona and journey
    • Digital marketing

    Suggested Titles

    • SEO Analyst
    • Competitive Intelligence Analyst
    • Content Marketing Manager
    • Website Developer
    • Digital Marketing Manager

    Digital Marketing Software

    • CMS that allows you to easily access and update your content

    SEO Software

    • SEO tool

    Step 1: Current Keywords

    Use this sheet to record your current keyword research.

    Use your SEO tool to research keywords and find the following:
    Use a quality tool like SEMRush to obtain SEO data.

    1. Keyword difficulty
    2. Search volume
    3. Search intent

    This is a screenshot of the SEO tool SEMRush, which can be used to identify current keywords.

    Step 2: Competitive Analysis

    Use this sheet to guide the research on your competitors' keywords.

    Use your SEO tool to find the following:

    1. Top organic keywords
    2. Ranking of keywords
    3. Domain authority and trust
    4. Position changes

    This is a screenshot of the SEO tool SEMRush, which can be used to perform an competitive analysis

    Step 3: New Target Keywords

    Use this sheet to record target keywords that have a good volume but are less competitive. The new target keywords should align with your buyer persona and their journey.

    Use your SEO tool to research keywords and find the following:
    Use a quality tool like SEMRush to obtain SEO data.

    1. Keyword difficulty
    2. Search volume
    3. Search intent

    This is a screenshot of the SEO tool SEMRush, which can be used to identify new target keywords.

    Step 4: Product & Service Pages

    Duplicate this page so that you have a separate page for each URL from Step 4

    Use this sheet to identify your current product and service pages.

    Use your SEO tool to find the following:

    1. Current rank
    2. Current keywords

    This is a screenshot of the SEO tool SEMRush, showing where you can display product and service pages.

    Step 5: Individual Page Strategy

    Develop a keyword strategy for each of your product and service pages. Use a fresh page for each URL.

    Date last optimized:
    mm/dd/yyyy

    This is a screenshot of the SEO tool SEMRush, with an example of how you can use an individual page strategy to develop a keyword strategy.

    Bibliography

    Council, Y. "Council Post: The Rundown On Black Hat SEO Techniques And Why You Should Avoid Them." Forbes, 2022. Accessed September 2022.

    "Our approach – How Google Search works." Google Search. Accessed September 2022.

    "The Best Place to Hide a Dead Body is Page Two of Google." HuffPost, 2022. Accessed September 2022.

    Patel, Neil. "How to Create the Perfect H1 Tag for SEO." neilpatel.com. Accessed September 2022.

    Schwartz, B. "Google algorithm updates 2021 in review: Core updates, product reviews, page experience and beyond." Search Engine Land, 2022. Accessed September 2022.

    Schwartz, B. "Google algorithm updates 2021 in review: Core updates, product reviews, page experience and beyond." Search Engine Land, 2022. Accessed September 2022.

    Effectively Acquire Infrastructure Services

    • Buy Link or Shortcode: {j2store}467|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $26,627 Average $ Saved
    • member rating average days saved: 12 Average Days Saved
    • Parent Category Name: Data Center & Facilities Optimization
    • Parent Category Link: /data-center-and-facilities-optimization
    • Most organizations are good at procuring IT products, but few are truly good at acquiring infrastructure services.
    • The lack of expertise in acquiring services is problematic – not only is the acquisition process for services more complex, but it also often has high stakes with large deal sizes, long-term contracts, and high switching costs.

    Our Advice

    Critical Insight

    • Don’t treat infrastructure service acquisitions lightly. Not only are failure rates high, but the stakes are high as well.
    • Make sure your RFP strategy aligns with your deal value. Large deals, characterized by high monthly spend, high criticality to the organization, and high switching costs, warrant a more thorough and lengthy planning period and RFP process.
    • Word your RFP carefully and do your due diligence when reviewing SLAs. Make sure your RFP will help you understand what the vendor’s standard offerings are and don’t treat your service level agreements like an open negotiation. The vendor’s standard offerings will be your most reliable options.

    Impact and Result

    • Follow this blueprint to avoid common pitfalls and navigate the tricky business of acquiring infrastructure services.
    • This blueprint will provide step-by-step guidance from assessing your acquisition goals to transitioning your service. Make sure you do the due diligence required to acquire the best service for your needs.

    Effectively Acquire Infrastructure Services Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should follow the blueprint to effectively acquire infrastructure services, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Develop the procurement strategy and process

    Kick off an acquisition by establishing acquisition goals, validating the decision to acquire a service, and structuring an acquisition approach. There are several RFP approaches and strategies – evaluate the options and develop one that aligns with the nature of the acquisition.

    • Effectively Acquire Infrastructure Services – Phase 1: Develop the Procurement Strategy and Process

    2. Assess requirements and build the RFP

    A solid RFP is critical to the success of this project. Assess the current and future requirements, examine the characteristics of an effective RFP, and develop an RFP.

    • Effectively Acquire Infrastructure Services – Phase 2: Assess Requirements and Build the RFP
    • Infrastructure Service RFP Template

    3. Manage vendor questions and select the vendor

    Manage the activities surrounding vendor questions and score the RFP responses to select the best-fit solution.

    • Effectively Acquire Infrastructure Services – Phase 3: Manage Vendor Questions and Select the Vendor
    • Vendor Question Organizer Template
    • Infrastructure Outsourcing RFP Scoring Tool

    4. Manage the contract, transition, and vendor

    Perform due diligence in reviewing the SLAs and contract before signing. Plan to transition the service into the environment and manage the vendor on an ongoing basis for a successful partnership.

    • Effectively Acquire Infrastructure Services – Phase 4: Manage the Contract, Transition, and Vendor
    • Service Acquisition Planning and Tracking Tool
    • Vendor Management Template
    [infographic]

    Workshop: Effectively Acquire Infrastructure Services

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Develop the Procurement Strategy and Process

    The Purpose

    Establish procurement goals and success metrics.

    Develop a projected acquisition timeline.

    Establish the RFP approach and strategy.

    Key Benefits Achieved

    Defined acquisition approach and timeline.

    Activities

    1.1 Establish your acquisition goals.

    1.2 Establish your success metrics.

    1.3 Develop a projected acquisition timeline.

    1.4 Establish your RFP process and refine your RFP timeline.

    Outputs

    Acquisition goals

    Success metrics

    Acquisition timeline

    RFP strategy and approach

    2 Gather Service Requirements

    The Purpose

    Gather requirements for services to build into the RFP.

    Key Benefits Achieved

    Gathered requirements.

    Activities

    2.1 Assess the current state.

    2.2 Evaluate service requirements and targets.

    2.3 Assess the gap and validate the service acquisition.

    2.4 Define requirements to input into the RFP.

    Outputs

    Current State Assessment

    Service requirements

    Validation of services being acquired and key processes that may need to change

    Requirements to input into the RFP

    3 Develop the RFP

    The Purpose

    Build the RFP.

    Key Benefits Achieved

    RFP development.

    Activities

    3.1 Build the RFP requirement section.

    3.2 Develop the rest of the RFP.

    Outputs

    Service requirements input into the RFP

    Completed RFP

    4 Review RFP Responses and Select a Vendor (Off-Site)

    The Purpose

    Review RFP responses to select the best solution for the acquisition.

    Key Benefits Achieved

    Vendor selected.

    Activities

    4.1 Manage vendor questions regarding the RFP.

    4.2 Review RFP responses and shortlist the vendors.

    4.3 Conduct additional due diligence on the vendors.

    4.4 Select a vendor.

    Outputs

    Managed RFP activities

    Imperceptive scoring of RFP responses and ranking of vendors

    Additional due diligence and further questions for the vendor

    Selected vendor

    Hire or Develop a World-Class CISO

    • Buy Link or Shortcode: {j2store}243|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Security Strategy & Budgeting
    • Parent Category Link: /security-strategy-and-budgeting
    • It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
    • The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
    • Current CISOs need to scope out areas of future development.

    Our Advice

    Critical Insight

    The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

    Impact and Result

    • Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
    • If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
    • Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.

    Hire or Develop a World-Class CISO Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Hire of Develop a World-Class CISO Deck – A step-by-step guide on finding or developing the CISO that best fits your organization.

    Use this blueprint to hire or develop a world-class Chief Information Security Officer (CISO) with the competencies that suit your specific organizational needs. Once you have identified the right candidate, create a plan to develop your CISO.

    • Hire or Develop a World-Class CISO – Phases 1-4

    2. CISO Core Competency Evaluation Tool – Determine which competencies your organization needs and which competencies your CISO needs to work on.

    This tool will help you determine which competencies are a priority for your organizational needs and which competencies your CISO needs to develop.

    • CISO Core Competency Evaluation Tool

    3. CISO Stakeholder Power Map Template – Visualize stakeholder and CISO relationships.

    Use this template to identify stakeholders who are key to your security initiatives and to understand your relationships with them.

    • CISO Stakeholder Power Map Template

    4. CISO Stakeholder Management Strategy Template – Develop a strategy to improve stakeholder and CISO relationships.

    Create a strategy to cultivate your stakeholder relationships and manage each relationship in the most effective way.

    • CISO Stakeholder Management Strategy Template

    5. CISO Development Plan Template – Develop a plan to support a world-class CISO.

    This tool will help you create and implement a plan to remediate competency gaps.

    • CISO Development Plan Template

    Infographic

    Further reading

    Hire or Develop a World-Class CISO

    Find a strategic and security-focused champion for your business.

    Analyst Perspective

    Create a plan to become the security leader of tomorrow

    The days are gone when the security leader can stay at a desk and watch the perimeter. The rapidly increasing sophistication of technology, and of attackers, has changed the landscape so that a successful information security program must be elastic, nimble, and tailored to the organization’s specific needs.

    The Chief Information Security Officer (CISO) is tasked with leading this modern security program, and this individual must truly be a Chief Officer, with a finger on the pulses of the business and security processes at the same time. The modern, strategic CISO must be a master of all trades.

    A world-class CISO is a business enabler who finds creative ways for the business to take on innovative processes that provide a competitive advantage and, most importantly, to do so securely.

    Cameron Smith, Research Lead, Security and Privacy

    Cameron Smith
    Research Lead, Security & Privacy
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • CEOs/CXOs are looking to hire or develop a senior security leader and aren’t sure where to start.
    • Conversely, security practitioners are looking to upgrade their skill set and are equally stuck in terms of what an appropriate starting point is.
    • Organizations are looking to optimize their security plans and move from a tactical position to a more strategic one.

    Common Obstacles

    • It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
    • The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
    • You are a current CISO and need to scope out your areas of future development.

    Info-Tech’s Approach

    • Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
    • If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
    • Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.

    Info-Tech Insight
    The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

    Your challenge

    This Info-Tech blueprint will help you hire and develop a strategic CISO

    • Security without strategy is a hacker’s paradise.
    • The outdated model of information security is tactical, where security acts as a watchdog and responds.
    • The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

    Around one in five organizations don’t have an individual with the sole responsibility for security1

    1 Navisite

    Info-Tech Insight
    Assigning security responsibilities to departments other than security can lead to conflicts of interest.

    Common obstacles

    It can be difficult to find the right CISO for your organization

    • The smaller the organization, the less likely it will have a CISO or equivalent position.
    • Because there is a shortage of qualified candidates, qualified CISOs can demand high salaries and many CISO positions will go unfilled.
    • It is easier for larger companies to attract top CISO talent, as they generally have more resources available.

    Source: Navisite

    Only 36% of small businesses have a CISO (or equivalent position).

    48% of mid-sized businesses have a CISO.

    90% of large organizations have a CISO.

    Source: Navisite

    Strategic versus tactical

    CISOs should provide leadership based on a strategic vision 1

    Strategic CISO Tactical CISO

    Proactive

    Focus is on protecting hyperdistributed business processes and data

    Elastic, flexible, and nimble

    Engaged in business design decisions

    Speaks the language of the audience (e.g. business, financial, technical)

    Reactive

    Focus is on protecting current state

    Perimeter and IT-centric approach

    Communicates with technical jargon

    1 Journal of Computer Science and Information Technology

    Info-Tech has identified three key behaviors of the world-class CISO

    To determine what is required from tomorrow’s security leader, Info-Tech examined the core behaviors that make a world-class CISO. These are the three areas that a CISO engages with and excels in.

    Later in this blueprint, we will review the competencies and skills that are required for your CISO to perform these behaviors at a high level.

    Align

    Aligning security enablement with business requirements

    Enable

    Enabling a culture of risk management

    Manage

    Managing talent and change

    Info-Tech Insight
    Through these three overarching behaviors, you can enable a security culture that is aligned to the business and make security elastic, flexible, and nimble to maintain the business processes.

    Info-Tech’s approach

    Understand what your organization needs in a CISO: Consider the core competencies of a CISO. Assess: Assess candidates' core competencies and the CISO's stakeholder relationships. Plan improvements: Identify resources to close competency gaps and an approach to improve stakeholder relationships. Executive development: Decide next steps to support your CISO moving forward and regularly reassess to measure progress.

    Info-Tech’s methodology to Develop or Hire a World-Class CISO

    1. Launch 2. Assess 3. Plan 4. Execute
    Phase Steps
    1. Understand the core competencies
    2. Measure security and business satisfaction and alignment
    1. Assess stakeholder relationships
    2. Assess core competencies
    1. Identify resources to address your CISO’s competency gaps
    2. Plan an approach to improve stakeholder relationships
    1. Decide next actions and support your CISO moving forward
    2. Regularly reassess to measure development and progress
    Phase Outcomes

    At the end of this phase, you will have:

    • Determined the current gaps in satisfaction and business alignment for your IT security program.
    • Identified the desired qualities in a security leader, specific to your current organizational needs.

    At the end of this phase, you will have:

    • Used the core competencies to help identify the ideal candidate.
    • Identified areas for development in your new or existing CISO.
    • Determined stakeholder relationships to cultivate.

    At the end of this phase, you will have:

    • Created a high-level plan to address any deficiencies.
    • Improved stakeholder relations.

    At the end of this phase, you will have:

    • Created an action-based development plan, including relevant metrics, due dates, and identified stakeholders. This plan is the beginning, not the end. Continually reassessing your organizational needs and revisiting this blueprint’s method will ensure ongoing development.

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    CISO Core Competency Evaluation Tool

    Assess the competency levels of a current or prospective CISO and identify areas for improvement.

    Stakeholder Power Map Template

    Visualize the importance of various stakeholders and their concerns.

    Stakeholder Management Strategy Template

    Document a plan to manage stakeholders and track actions.

    Key deliverable:

    CISO Development Plan Template

    The CISO Development Plan Template is used to map specific activities and time frames for competency development to address gaps and achieve your goal.

    Strategic competencies will benefit the organization and the CISO

    Career development should not be seen as an individual effort. By understanding the personal core competencies that Info-Tech has identified, the individual wins by developing relevant new skills and the organization wins because the CISO provides increased value.

    Organizational Benefits Individual Benefits
    • Increased alignment between security and business objectives
    • Development of information security that is elastic, nimble, and flexible for the business
    • Reduction in wasted efforts and resources, and improvement in efficiency of security and the organization as a whole
    • True synergy between security and business stakeholders, where the goals of both groups are being met
    • Increased opportunity as you become a trusted partner within your organization
    • Improved relationships with peers and stakeholders
    • Less resistance and more support for security initiatives
    • More involvement and a stronger role for security at all levels of the organization

    Measured value of a world-class CISO

    Organizations with a CISO saw an average of $145,000 less in data breach costs.1

    However, we aren’t talking about hiring just any CISO. This blueprint seeks to develop your CISO’s competencies and reach a new level of effectiveness.

    Organizations invest a median of around $375,000 annually in their CISO.2 The CISO would have to be only 4% more effective to represent $15,000 more value from this position. This would offset the cost of an Info-Tech workshop, and this conservative estimate pales in comparison to the tangible and intangible savings as shown below.

    Your specific benefits will depend on many factors, but the value of protecting your reputation, adopting new and secure revenue opportunities, and preventing breaches cannot be overstated. There is a reason that investment in information security is on the rise: Organizations are realizing that the payoff is immense and the effort is worthwhile.

    Tangible cost savings from having a world-class CISO Intangible cost savings from having a world-class CISO
    • Cost savings from incident reduction.
    • Cost savings achieved through optimizing information security investments, resulting in savings from previously misdiagnosed issues.
    • Cost savings from ensuring that dollars spent on security initiatives support business strategy.
    • More opportunities to create new business processes through greater alignment between security and business.
    • Improved reputation and brand equity achieved through a proper evaluation of the organization’s security posture.
    • Continuous improvement achieved through a good security assessment and measurement strategy.
    • Ability to plan for the future since less security time will be spent firefighting and more time will be spent engaged with key stakeholders.

    1 IBM Security
    2 Heidrick & Struggles International, Inc.

    Case Study

    In the middle of difficulty lies opportunity

    SOURCE
    Kyle Kennedy
    CISO, CyberSN.com

    Challenge
    The security program identified vulnerabilities at the database layer that needed to be addressed.

    The decision was made to move to a new vendor. There were multiple options, but the best option in the CISO’s opinion was a substantially more expensive service that provided more robust protection and more control features.

    The CISO faced the challenge of convincing the board to make a financial investment in his IT security initiative to implement this new software.

    Solution
    The CISO knew he needed to express this challenge (and his solution!) in a way that was meaningful for the executive stakeholders.

    He identified that the business has $100 million in revenue that would move through this data stream. This new software would help to ensure the security of all these transactions, which they would lose in the event of a breach.

    Furthermore, the CISO identified new business plans in the planning stage that could be protected under this initiative.

    Results
    The CISO was able to gain support for and implement the new database platform, which was able to protect current assets more securely than before. Also, the CISO allowed new revenue streams to be created securely.

    This approach is the opposite of the cautionary tales that make news headlines, where new revenue streams are created before systems are put in place to secure them.

    This proactive approach is the core of the world-class CISO.

    Info-Tech offers various levels of support to best suit your needs

    Guided Implementation

    What does a typical GI on this topic look like?

    Launch Assess Plan Execute

    Call #1: Review and discuss CISO core competencies.

    Call #2: Discuss Security Business Satisfaction and Alignment diagnostic results.

    Call #3: Discuss the CISO Stakeholder Power Map Template and the importance of relationships.

    Call #4: Discuss the CISO Core Competency Evaluation Tool.

    Call #5: Discuss results of the CISO Core Competency Evaluation and identify resources to close gaps.

    Call #6: Review organizational structure and key stakeholder relationships.

    Call #7: Discuss and create your CISO development plan and track your development

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 6 to 10 calls over the course of 3 to 6 months.

    Phase 1

    Launch

    Phase 1
    1.1 Understand Core Competencies
    1.2 Measure Security and Business Satisfaction and Alignment

    Phase 2
    2.1 Assess Stakeholder Relationships
    2.2 Assess the Core Competencies

    Phase 3
    3.1 Identify Resources to Address Competency Gaps
    3.2 Plan Approach to Improve Stakeholder Relationships

    Phase 4
    4.1 Decide Next Actions and Support Your CISO Moving Forward
    4.2 Regularly Reassess to Measure Development and Progress

    This phase will walk you through the following activities:

    • Review and understand the core competencies of a world-class CISO.
    • Launch your diagnostic survey.
    • Evaluate current business satisfaction with IT security.
    • Determine the competencies that are valuable to your IT security program’s needs.

    Hire or Develop a World-Class CISO

    Case study

    Mark Lester
    InfoSec Manager, SC Ports Authority

    An organization hires a new Information Security Manager into a static and well-established IT department.

    Situation: The organization acknowledges the need for improved information security, but there is no framework for the Security Manager to make successful changes.

    Challenges Next Steps
    • The Security Manager is an outsider in a company with well-established habits and protocols. He is tasked with revamping the security strategy to create unified threat management.
    • Initial proposals for information security improvements are rejected by executives. It is a challenge to implement changes or gain support for new initiatives.
    • The Security Manager will engage with individuals in the organization to learn about the culture and what is important to them.
    • He will assess existing misalignments in the business so that he can target problems causing real pains to individuals.

    Follow this case study throughout the deck to see this organization’s results

    Step 1.1

    Understand the Core Competencies of a World-Class CISO

    Activities

    Review core competencies the security leader must develop to become a strategic business partner

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step
    Analysis and understanding of the eight strategic CISO competencies required to become a business partner

    Launch

    Core competencies

    Info-Tech has identified eight core competencies affecting the CISO’s progression to becoming a strategic business partner.

    Business Acumen
    A CISO must focus primarily on the needs of the business.

    Leadership
    A CISO must be a security leader and not simply a practitioner.

    Communication
    A CISO must have executive communication skills

    Technical Knowledge
    A CISO must have a broad technical understanding.

    Innovative Problem Solving
    A good CISO doesn’t just say “no,” but rather finds creative ways to say “yes.”

    Vendor Management
    Vendor and financial management skills are critical to becoming a strategic CISO.

    Change Management
    A CISO improves security processes by being an agent of change for the organization.

    Collaboration
    A CISO must be able to use alliances and partnerships strategically.

    1.1 Understand the core competencies a CISO must focus on to become a strategic business partner

    < 1 hour

    Over the next few slides, review each world-class CISO core competency. In Step 1.2, you will determine which competencies are a priority for your organization.

    CISO Competencies Description
    Business Acumen

    A CISO must focus primarily on the needs of the business and how the business works, then determine how to align IT security initiatives to support business initiatives. This includes:

    • Contributing to business growth with an understanding of the industry, core functions, products, services, customers, and competitors.
    • Understanding the business’ strategic direction and allowing it to securely capitalize on opportunities.
    • Understanding the key drivers of business performance and the use of sound business practice.
    Leadership

    A CISO must be a security leader, and not simply a practitioner. This requires:

    • Developing a holistic view of security, risk, and compliance for the organization.
    • Fostering a culture of risk management.
    • Choosing a strong team. Having innovative and reliable employees who do quality work is a critical component of an effective department.
      • This aspect involves identifying talent, engaging your staff, and managing their time and abilities.

    1.1 Understand the core competencies (continued)

    CISO Competencies Description
    Communication

    Many CISOs believe that using technical jargon impresses their business stakeholders – in fact, it only makes business stakeholders become confused and disinterested. A CISO must have executive communication skills. This involves:

    • Clearly communicating with business leaders in meaningful language (i.e. business, financial, social) that they understand by breaking down the complexities of IT security into simple and relatable concepts.
    • Not using acronyms or technological speak. Easy-to-understand translations will go a long way.
    • Strong public speaking and presentation abilities.
    Technical Knowledge

    A CISO must have a broad technical understanding of IT security to oversee a successful security program. This includes:

    • Understanding key security and general IT technologies and processes.
    • Assembling a complementary team, because no individual can have deep knowledge in all areas.
    • Maintaining continuing education to stay on top of emerging technologies and threats.

    1.1 Understand the core competencies (continued)

    CISO Competencies Description
    Innovative Problem Solving

    A good CISO doesn’t just say “no,” but rather finds creative ways to say “yes.” This can include:

    • Taking an active role in seizing opportunities created by emerging technologies.
    • Facilitating the secure implementation of new, innovative revenue models.
    • Developing solutions for complex business problems that require creativity and ingenuity.
    • Using information and technology to drive value around the customer experience.
    Vendor Management

    With the growing use of “anything as a service,” negotiation, vendor, and financial management skills are critical to becoming a strategic CISO.

    • The CISO must be able to evaluate service offerings and secure favorable contracts with the right provider. It is about extracting the maximum value from vendors for the dollars you are spending.
    • Vendor products must be aligned with future business plans to create maximum ongoing value.
    • The CISO must develop financial management skills. This includes the ability to calculate total cost of ownership, return on investment, and project spending over multiyear business plans.

    1.1 Understand the core competencies (continued)

    CISO Competencies Description
    Change Management

    A world-class CISO improves security processes by being an agent of change for the organization. This involves:

    • Leading, guiding, and motivating teams to adopt a responsible risk management culture.
    • Communicating important and complex ideas in a persuasive way.
    • Demonstrating an ability to change themselves and taking the initiative in adopting more efficient behaviors.
    • Handling unplanned change, such as unforeseen attacks or personnel changes, in a professional and proactive manner.
    Collaboration

    A CISO must be able to use alliances and partnerships strategically to benefit both the business and themselves. This includes:

    • Identifying formal and informal networks and constructive relationships to enable security development.
    • Leveraging stakeholders to influence positive outcomes for the organization.
    • Getting out of the IT or IT security sphere and engaging relationships in diverse areas of the organization.

    Step 1.2

    Evaluate satisfaction and alignment between the business and IT security

    Activities

    • Conduct the Information Security Business Satisfaction and Alignment diagnostic
    • Use your results as input into the CISO Core Competency Evaluation Tool

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step
    Determine current gaps in satisfaction and alignment between information security and your organization.

    If seeking to hire/develop a CISO: Your diagnostic results will help develop a profile of the ideal CISO candidate to use as a hiring and interview guide.

    If developing a current CISO, use your diagnostic results to identify existing competency gaps and target them for improvement.

    For the CISO seeking to upgrade capabilities: Use the core competencies guide to self-assess and identify competencies that require improvement.

    Launch

    1.2 Get started by conducting Info-Tech’s Information Security Business Satisfaction and Alignment diagnostic

    Suggested Time: One week for distribution, completion, and collection of surveys
    One-hour follow-up with an Info-Tech analyst

    The primary goal of IT security is to protect the organization from threats. This does not simply mean bolting everything down, but it means enabling business processes securely. To do this effectively requires alignment between IT security and the overall business.

    • Once you have completed the diagnostic, call Info-Tech to review your results with one of our analysts.
    • The results from this assessment will provide insights to inform your entries in the CISO Core Competency Evaluation Tool.

    Call an analyst to review your results and provide you with recommendations.

    Info-Tech Insight
    Focus on the high-priority competencies for your organization. You may find a candidate with perfect 10s across the board, but a more pragmatic strategy is to find someone with strengths that align with your needs. If there are other areas of weakness, then target those areas for development.

    1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

    After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

    • Your diagnostic results will indicate where your information security program is aligned well or poorly with your business.
    • For example, the diagnostic may show significant misalignment between information security and executives over the level of external compliance. The CISO behavior that would contribute to solving this is aligning security enablement with business requirements.
      • This misalignment may be due to a misunderstanding by either party. The competencies that will contribute to resolving this are communication, technical knowledge, and business acumen.
      • This mapping method is what will be used to determine which competencies are most important for your needs at the present moment.

    Download the CISO Core Competency Evaluation Tool

    1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

    After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

    1. Starting on Tab 2: CISO Core Competencies, use your understanding of each competency from section 1.1 along with the definitions described in the tool.
      • For each competency, assign a degree of importance using the drop-down menu in the second column from the right.
      • Importance ratings will range from not at all important at the low end to critically important at the high end.
      • Your importance score will be influenced by several factors, including:
        • The current alignment of your information security department.
        • Your organizational security posture.
        • The size and structure of your organization.
        • The existing skills and maturity within your information security department.

    Download the CISO Core Competency Evaluation Tool

    1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

    After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

    1. Still on Tab 2. CISO Core Competencies, you will now assign a current level of effectiveness for each competency.
      • This will range from foundational at a low level of effectiveness up to capable, then inspirational, and at the highest rating, transformational.
      • Again, this rating will be very specific to your organization, depending on your structure and your current employees.
      • Fundamentally, these scores will reflect what you want to improve in the area of information security. This is not an absolute scale, and it will be influenced by what skills you want to support your goals and direction as an organization.

    Download the CISO Core Competency Evaluation Tool

    Phase 2

    Assess

    Phase 1
    1.1 Understand Core Competencies
    1.2 Measure Security and Business Satisfaction and Alignment

    Phase 2
    2.1 Assess Stakeholder Relationships
    2.2 Assess the Core Competencies

    Phase 3
    3.2 Plan Approach to Improve Stakeholder Relationships

    Phase 4
    4.1 Decide Next Actions and Support Your CISO Moving Forward
    4.2 Regularly Reassess to Measure Development and Progress

    This phase will walk you through the following activities:

    • Use the CISO Core Competency Evaluation Tool to create and implement an interview guide.
    • Assess and analyze the core competencies of your prospective CISOs. Or, if you are a current CISO, use the CISO Core Competency Evaluation Tool as a self-analysis and identify areas for personal development.
    • Evaluate the influence, impact, and support of key executive business stakeholders using the CISO Stakeholder Power Map Template.

    Hire or Develop a World-Class CISO

    Case study

    Mark Lester
    InfoSec Manager, SC Ports Authority

    The new Security Manager engages with employees to learn the culture.

    Outcome: Understand what is important to individuals in order to create effective collaboration. People will engage with a project if they can relate it to something they value.

    Actions Next Steps
    • The Security Manager determines that he must use low-cost small wins to integrate with the organizational culture and create trust and buy-in and investment will follow.
    • The Security Manager starts a monthly newsletter to get traction across the organization, create awareness of his mandate to improve information security, and establish himself as a trustworthy partner.
    • The Security Manager will identify specific ways to engage and change the culture.
    • Create a persuasive case for investing in information security based on what resonates with the organization.

    Follow this case study throughout the deck to see this organization’s results

    Step 2.1

    Identify key stakeholders for the CISO and assess current relationships

    Activities

    Evaluate the power, impact, and support of key stakeholders

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    • Power map of executive business stakeholders
    • Evaluation of each stakeholder in terms of influence, impact, and current level of support

    Assess

    Identify key stakeholders who own business processes that intersect with security processes

    Info-Tech Insight
    Most organizations don’t exist for the sole purpose of doing information security. For example, if your organization is in the business of selling pencils, then information security is in business to enable the selling of pencils. All the security in the world is meaningless if it doesn’t enable your primary business processes. The CISO must always remember the fundamental goals of the business.

    The above insight has two implications:

    1. The CISO needs to understand the key business processes and who owns them, because these are the people they will need to collaborate with. Like any C-level, the CISO should be one of the most knowledgeable people in the organization regarding business processes.
    2. Each of these stakeholders stands to win or lose depending on the performance of their process, and they can act to either block or enable your progress.
      • To work effectively with these stakeholders, you must learn what is important to them, and pose your initiatives so that you both benefit.

    When people are not receptive to the CISO, it’s usually because the CISO has not been part of the discussion when plans were being made. This is the heart of proactivity.

    You need to be involved from the start … from the earliest part of planning.

    The job is not to come in late and say “No” ... the job is to be involved early and find creative and intelligent ways to say “Yes.”

    The CISO needs to be the enabling security asset that drives business.

    – Elliot Lewis, CEO at Keyavi Data

    Evaluate the importance of business stakeholders and the support necessary from them

    The CISO Stakeholder Power Map Template is meant to provide a visualization of the CISO’s relationships within the organization. This should be a living document that can be updated throughout the year as relationships develop and the structure of an organization changes.

    At a glance, this tool should show:

    • How influential each stakeholder is within the company.
    • How supportive they currently are of the CISO’s initiatives.
    • How strongly each person is impacted by IT security activities.

    Once this tool has been created, it provides a good reference as the CISO works to develop lagging relationships. It shows the landscape of influence and impact within the organization, which may help to guide the CISO’s strategy in the future.

    Evaluate the importance of business stakeholders and the support necessary from them

    Download the CISO Stakeholder Power Map Template

    Evaluate the importance of business stakeholders and the support necessary from them

    1. Identify key stakeholders.
      1. Focus on owners of important business processes.
    2. Evaluate and map each stakeholder in terms of:
      1. Influence (up/down)
      2. Support (left/right)
      3. Impact (size of circle)
      4. Involvement (color of circle)
    3. Decide whether the level of support from each stakeholder needs to change to facilitate success.

    Evaluate the importance of business stakeholders and the support necessary from them

    Info-Tech Insight
    Some stakeholders must work closely with your incoming CISO. It is worth consideration to include these individuals in the interview process to ensure you will have partners that can work well together. This small piece of involvement early on can save a lot of headache in the future.

    Where can you find your desired CISO?

    Once you know which competencies are a priority in your new CISO, the next step is to decide where to start looking. This person may already exist in your company.

    Internal

    Take some time to review your current top information security employees or managers. It may be immediately clear that certain people will or will not be suitable for the CISO role. For those that have potential, proceed to Step 2.2 to map their competencies.

    Recruitment

    If you do not have any current employees that will fit your new CISO profile, or you have other reasons for wanting to bring in an outside individual, you can begin the recruitment process. This could start by posting the position for applications or by identifying and targeting specific candidates.

    Ready to start looking for your ideal candidate? You can use Info-Tech’s Chief Information Security Officer job description template.

    Use the CISO job description template

    Alternatives to hiring a CISO

    Small organizations are less able to muster the resources required to find and retain a CISO,

    Technical Counselor Seat

    In addition to having access to our research and consulting services, you can acquire a Technical Counselor Seat from our Security & Risk practice, where one of our senior analysts would serve with you on a retainer. You may find that this option saves you the expense of having to hire a new CISO altogether.

    Virtual CISO

    A virtual CISO, or vCISO, is essentially a “CISO as a service.” A vCISO provides an organization with an experienced individual that can, on a part-time basis, lead the organization’s security program through policy and strategy development.

    Why would an organization consider a vCISO?

    • A vCISO can provide services that are flexible, technical, and strategic and that are based on the specific requirements of the organization.
    • They can provide a small organization with program maturation within the organization’s resources.
    • They can typically offer depth of experience beyond what a small business could afford if it were to pursue a full-time CISO.

    Source: InfoSec Insights by Sectigo Store

    Why would an organization not consider a vCISO?

    • The vCISO’s attention is divided among their other clients.
    • They won’t feel like a member of your organization.
    • They won’t have a deep understanding of your systems and processes.

    Source: Georgia State University

    Step 2.2

    Assess CISO candidates and evaluate their current competency

    Activities

    Assess CISO candidates in terms of desired core competencies

    or

    Self-assess your personal core competencies

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO

    or

    • Current CISO seeking to upgrade capabilities

    and

    • Any key stakeholders or collaborators you choose to include in the assessment process

    Outcomes of this step

    • You have assessed your requirements for a CISO candidate.
    • The process of hiring is under way, and you have decided whether to hire a CISO, develop a CISO, or consider a Counselor Seat as another option.

    Assess

    2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to assess your CISO candidate

    Use Info-Tech’s CISO Core Competency Evaluation Tool to assess your CISO candidate

    Download the CISO Core Competency Evaluation Tool

    Info-Tech Insight
    The most important competencies should be your focus. Unless you are lucky enough to find a candidate that is perfect across the board, you will see some areas that are not ideal. Don’t forget the importance you assigned to each competency. If a candidate is ideal in the most critical areas, you may not mind that some development is needed in a less important area.

    2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to evaluate your candidates

    After deciding the importance of and requirements for each competency in Phase 1, assess your CISO candidates.

    Your first pass on this tool will be to look at internal candidates. This is the develop a CISO option.

    1. In the previous phase, you rated the Importance and Current Effectiveness for each competency in Tab 2. CISO Core Competencies. In this step, use Tab 3. Gap Analysis to enter a Minimum Level and a Desired Level for each competency. Keep in mind that it may be unrealistic to expect a candidate to be fully developed in all aspects.
    2. Next, enter a rating for your candidate of interest for each of the eight competencies.
    3. This scorecard will generate an overall suitability score for the candidate. The color of the output (from red to green) indicates the suitability, and the intensity of the color indicates the importance you assigned to that competency.

    Download the CISO Core Competency Evaluation Tool

    2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to evaluate your candidates

    • If the internal search does not identify a suitable candidate, you will want to expand your search.
    • Repeat the scoring process for external candidates until you find your new CISO.
    • You may want to skip your external search altogether and instead contact Info-Tech for more information on our Counselor Seat options.

    Download the CISO Core Competency Evaluation Tool

    Phase 3

    Plan

    Phase 1
    1.1 Understand Core Competencies
    1.2 Measure Security and Business Satisfaction and Alignment

    Phase 2
    2.1 Assess Stakeholder Relationships
    2.2 Assess the Core Competencies

    Phase 3
    3.1 Identify Resources to Address Competency Gaps
    3.2 Plan Approach to Improve Stakeholder Relationships

    Phase 4
    4.1 Decide Next Actions and Support Your CISO Moving Forward
    4.2 Regularly Reassess to Measure Development and Progress

    This phase will walk you through the following activities:

    • Create a plan to develop your competency gaps.
    • Construct and consider your organizational model.
    • Create plan to cultivate key stakeholder relationships.

    Hire or Develop a World-Class CISO

    Case study

    Mark Lester
    InfoSec Manager, SC Ports Authority

    The new Security Manager changes the security culture by understanding what is meaningful to employees.

    Outcome: Engage with people on their terms. The CISO must speak the audience’s language and express security terms in a way that is meaningful to the audience.

    Actions Next Steps
    • The Security Manager identifies recent events where ransomware and social engineering attacks were successful in penetrating the organization.
    • He uses his newsletter to create organization-wide discussion on this topic.
    • This very personal example makes employees more receptive to the Security Manager’s message, enabling the culture of risk management.
    • The Security Manager will leverage his success in improving the information security culture and awareness to gain support for future initiatives.

    Follow this case study throughout the deck to see this organization’s results

    Step 3.1

    Identify resources for your CISO to remediate competency gaps

    Activities

    Create a plan to remediate competency gaps

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO
    • The newly hired CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    • Identification of core competency deficiencies
    • A plan to close the gaps

    Plan

    3.1 Close competency gaps with Info-Tech’s Cybersecurity Workforce Development Training

    Resources to close competency gaps

    Info-Tech’s Cybersecurity Workforce Training develops critical cybersecurity skills missing within your team and organization. The leadership track provides the same deep coverage of technical knowledge as the analyst track but adds hands-on support and has a focus on strategic business alignment, program management, and governance.

    The program builds critical skills through:

    • Standardized curriculum with flexible projects tailored to business needs
    • Realistic cyber range scenarios
    • Ready-to-deploy security deliverables
    • Real assurance of skill development

    Info-Tech Insight
    Investing in a current employee that has the potential to be a world-class CISO may take less time, effort, and money than finding a unicorn.

    Learn more on the Cybersecurity Workforce Development webpage

    3.1 Identify resources for your CISO to remediate competency gaps

    < 2 hours

    CISO Competencies Description
    Business Acumen

    Info-Tech Workshops & Blueprints

    Actions/Activities

    • Take a business acumen course: Acumen Learning, What the CEO Wants You to Know: Building Business Acumen.
    • Meet with business stakeholders. Ask them to take you through the strategic plan for their department and then identify opportunities where security can provide support to help drive their initiatives.
    • Shadow another C-level executive. Understand how they manage their business unit and demonstrate an eagerness to learn.
    • Pursue an MBA or take a business development course.

    3.1 Identify resources for your CISO to remediate competency gaps (continued)

    < 2 hours

    CISO Competencies Description
    Leadership

    Info-Tech Training and Blueprints

    Action/Activities

    • Communicate your vision for security to your team. You will gain buy-in from your employees by including them in the creation of your program, and they will be instrumental to your success.

    Info-Tech Insight
    Surround yourself with great people. Insecure leaders surround themselves with mediocre employees that aren’t perceived as a threat. Great leaders are supported by great teams, but you must choose that great team first.

    3.1 Identify resources for your CISO to remediate competency gaps (continued)

    < 2 hours

    CISO Competencies Description
    Communication

    Info-Tech Workshops & Blueprints

    Build and Deliver an Optimized IT Update Presentation: Show IT’s value and relevance by dropping the technical jargon and speaking to the business in their terms.

    Master Your Security Incident Response Communications Program: Learn how to talk to your stakeholders about what’s going on when things go wrong.

    Develop a Security Awareness and Training Program That Empowers End Users: Your weakest link is between the keyboard and the chair, so use engaging communication to create positive behavior change.

    Actions/Activities

    Learn to communicate in the language of your audience (whether business, finance, or social), and frame security solutions in terms that are meaningful to your listener.

    Technical Knowledge

    Actions/Activities

    • In many cases, the CISO is progressing from a strong technical background, so this area is likely a strength already.
    • However, as the need for executive skills are being recognized, many organizations are opting to hire a business or operations professional as a CISO. In this case, various Info-Tech blueprints across all our silos (e.g. Security, Infrastructure, CIO, Apps) will provide great value in understanding best practices and integrating technical skills with the business processes.
    • Pursue an information security leadership certification: GIAC, (ISC)², and ISACA are a few of the many organizations that offer certification programs.

    3.1 Identify resources for your CISO to remediate competency gaps (continued)

    < 2 hours

    CISO Competencies Description
    Innovative Problem Solving

    Info-Tech Workshops & Blueprints

    Actions/Activities

    Vendor Management

    Info-Tech Blueprints & Resources

    Actions/Activities

    3.1 Identify resources for your CISO to remediate competency gaps (continued)

    < 2 hours

    CISO Competencies Description
    Change Management

    Info-Tech Blueprints

    Actions/Activities

    • Start with an easy-win project to create trust and support for your initiatives.
    Collaboration

    Info-Tech Blueprints

    Actions/Activities

    • Get out of your office. Have lunch with people from all areas of the business. Understanding the goals and the pains of employees throughout your organization will help you to design effective initiatives and cultivate support.
    • Be clear and honest about your goals. If people know what you are trying to do, then it is much easier for them to work with you on it. Being ambiguous or secretive creates confusion and distrust.

    3.1 Create the CISO’s personal development plan

    • Use Info-Tech’s CISO Development Plan Template to document key initiatives that will close previously identified competency gaps.
    • The CISO Development Plan Template is used to map specific actions and time frames for competency development, with the goal of addressing competency gaps and helping you become a world-class CISO. This template can be used to document:
      • Core competency gaps
      • Security process gaps
      • Security technology gaps
      • Any other career/development goals
    • If you have a coach or mentor, you should share your plan and report progress to that person. Alternatively, call Info-Tech to speak with an executive advisor for support and advice.
      • Toll-Free: 1-888-670-8889

    What you will need to complete this exercise

    • CISO Core Competency Evaluation Tool results
    • Information Security Business Satisfaction and Alignment diagnostic results
    • Insights gathered from business stakeholder interviews

    Step 3.2

    Plan an approach to improve your relationships

    Activities

    • Review engagement strategies for different stakeholder types
    • Create a stakeholder relationship development plan

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO
    • The newly hired CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    • Stakeholder relationship strategy deliverable

    Plan

    Where should the CISO sit?

    Where the CISO sits in the organization can have a big impact on the security program.

    • Organizations with CISOs in the C-suite have a fewer security incidents.1
    • Organizations with CISOs in the C-suite generally have better IT ability.1
    • An organization whose CISO reports to the CIO risks conflict of interest.1
    • 51% of CISOs believe their effectiveness can be hampered by reporting lines.2
    • Only half of CISOs feel like they are in a position to succeed.2

    A formalized security organizational structure assigns and defines the roles and responsibilities of different members around security. Use Info-Tech’s blueprint Implement a Security Governance and Management Program to determine the best structure for your organization.

    Who the CISO reports to, by percentage of organizations3

    Who the CISO reports to, by percentage of organizations

    Download the Implement a Security Governance and Management Program blueprint

    1. Journal of Computer Science and Information
    2. Proofpoint
    3. Heidrick & Struggles International, Inc

    3.2 Make a plan to manage your key stakeholders

    Managing stakeholders requires engagement, communication, and relationship management. To effectively collaborate and gain support for your initiatives, you will need to build relationships with your stakeholders. Take some time to review the stakeholder engagement strategies for different stakeholder types.

    Influence Mediators
    (Satisfy)
    Key Players
    (Engage)
    Spectators
    (Monitor)
    Noisemakers
    (Inform)
    Support for you

    When building relationships, I find that what people care about most is getting their job done. We need to help them do this in the most secure way possible.

    I don’t want to be the “No” guy, I want to enable the business. I want to find to secure options and say, “Here is how we can do this.”

    – James Miller, Information Security Director, Xavier University

    Download the CISO Stakeholder Management Strategy Template

    Key players – Engage

    Goal Action
    Get key players to help champion your initiative and turn your detractors into supporters. Actively involve key players to take ownership.
    Keep It Positive Maintain a Close Relationship
    • Use their positive support to further your objectives and act as your foundation of support.
    • Key players can help you build consensus among other stakeholders.
    • Get supporters to be vocal in your town halls.
    • Ask them to talk to other stakeholders over whom they have influence.
    • Get some quick wins early to gain and maintain stakeholder support and help convert them to your cause.
    • Use their influence and support to help persuade blockers to see your point of view.
    • Collaborate closely. Key players are tuned in to information streams that are important. Their advice can keep you informed and save you from being blindsided.
    • Keep them happy. By definition, these individuals have a stake in your plans and can be affected positively or negatively. Going out of your way to maintain relationships can be well worth the effort.

    Info-Tech Insight
    Listen to your key players. They understand what is important to other business stakeholders, and they can provide valuable insight to guide your future strategy.

    Mediators – Satisfy

    Goal Action
    Turn mediators into key players Increase their support level.
    Keep It Positive Maintain a Close Relationship
    • Make stakeholders part of the conversation by consulting them for input on planning and strategy.
    • Sample phrases:
      • “I’ve heard you have experience in this area. Do you have time to answer a few questions?”
      • “I’m making some decisions and I would value your thoughts. Can I get your perspective on this?”
    • Enhance their commitment by being inclusive. Encourage their support whenever possible.
    • Make them feel acknowledged and solicit feedback.
    • Listen to blockers with an open mind to understand their point of view. They may have valuable insight.
    • Approach stakeholders on their individual playing fields.
      • They want to know that you understand their business perspective.
    • Stubborn mediators might never support you. If consulting doesn’t work, keep them informed of important decision-making points and give them the opportunity to be involved if they choose to be.

    Info-Tech Insight
    Don’t dictate to stakeholders. Make them feel like valued contributors by including them in development and decision making. You don’t have to incorporate all their input, but it is essential that they feel respected and heard.

    Noisemakers – Inform

    Goal Action
    Have noisemakers spread the word to increase their influence. Encourage noisemakers to influence key stakeholders.
    Keep It Positive Maintain a Close Relationship
    • Identify noisemakers who have strong relationships with key stakeholders and focus on them.
      • These individuals may not have decision-making power, but their opinions and advice may help to sway a decision in your favor.
    • Look for opportunities to increase their influence over others.
    • Put effort into maintaining the positive relationship so that it doesn’t dwindle.
    • You already have this group’s support, but don’t take it for granted.
    • Be proactive, pre-emptive, and transparent.
    • Address issues or bad news early and be careful not to exaggerate their significance.
    • Use one-on-one meetings to give them an opportunity to express challenges in a private setting.
    • Show individuals in this group that you are a problem-solver:
      • “The implementation was great, but we discovered problems afterward. Here is what we’re doing about it.”

    Spectators – Monitor

    Goal Action
    Keep spectators content and avoid turning them into detractors. Keep them well informed.
    Keep It Positive Maintain a Close Relationship
    • A hands-on approach is not required with this group.
    • Keep them informed with regular, high-altitude communications and updates.
    • Use positive, exciting announcements to increase their interest in your initiatives.
    • Select a good venue for generating excitement and assessing the mood of spectators.
    • Spectators may become either supporters or blockers. Monitor them closely and keep in touch with them to stop these individuals from becoming blockers.
    • Listen to questions from spectators carefully. View any engagement as an opportunity to increase participation from this group and generate a positive shift in interest.

    3.2 Create the CISO’s stakeholder management strategy

    Develop a strategy to manage key stakeholders in order to drive your personal development plan initiatives.

    • The purpose of the CISO Stakeholder Management Strategy Template is to document the results of the power mapping exercise, create a plan to proactively manage stakeholders, and track the actions taken.
    • Use this in concert with Info-Tech’s CISO Stakeholder Power Map Template to help visualize the importance of key stakeholders to your personal development. You will document:
      • Stakeholder role and type.
      • Current relationship with the stakeholder.
      • Level of power/influence and degree of impact.
      • Current and desired level of support.
      • Initiatives that require the stakeholder’s engagement.
      • Actions to be taken – along with the status and results.

    What you will need to complete this exercise

    • Completed CISO Stakeholder Power Map
    • Security Business Satisfaction and Alignment Diagnostic results

    Download the CISO Stakeholder Management Strategy Template

    Phase 4

    Execute

    Phase 1
    1.1 Understand Core Competencies
    1.2 Measure Security and Business Satisfaction and Alignment

    Phase 2
    2.1 Assess Stakeholder Relationships
    2.2 Assess the Core Competencies

    Phase 3
    3.1 Identify Resources to Address Competency Gaps
    3.2 Plan Approach to Improve Stakeholder Relationships

    Phase 4
    4.1 Decide Next Actions and Support Your CISO Moving Forward
    4.2 Regularly Reassess to Measure Development and Progress

    This phase will walk you through the following activities:

    • Populate the CISO Development Plan Template with appropriate targets and due dates.
    • Set review and reassess dates.
    • Review due dates with CISO.

    Hire or Develop a World-Class CISO

    Case study

    Mark Lester
    InfoSec Manager, SC Ports Authority

    The new Security Manager leverages successful cultural change to gain support for new security investments.

    Outcome: Integrating with the business on a small level and building on small successes will lead to bigger wins and bigger change.

    Actions Next Steps
    • By fostering positive relationships throughout the organization, the Security Manager has improved the security culture and established himself as a trusted partner.
    • In an organization that had seen very little change in years, he has used well developed change management, business acumen, leadership, communication, collaboration, and innovative problem-solving competencies to affect his initiatives.
    • He can now return to the board with a great deal more leverage in seeking support for security investments.
    • The Security Manager will leverage his success in improving the information security culture and awareness to gain support for future initiatives.

    Step 4.1

    Decide next actions and support your CISO moving forward

    Activities

    • Complete the Info-Tech CISO Development Plan Template
    • Create a stakeholder relationship development plan

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO
    • The newly hired CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    Next actions for each of your development initiatives

    Execute

    Establish a set of first actions to set your plan into motion

    The CISO Development Plan Template provides a simple but powerful way to focus on what really matters to execute your plan.

    • By this point, the CISO is working on the personal competency development while simultaneously overseeing improvements across the security program, managing stakeholders, and seeking new business initiatives to engage with. This can be a lot to juggle effectively.
    • Disparate initiatives like these can hinder progress by creating confusion.
    • By distilling your plan down to Subject > Action > Outcome, you immediately restore focus and turn your plans into actionable items.
    • The outcome is most valuable when it is measurable. This makes progress (or lack of it) very easy to track and assess, so choose a meaningful metric.
    Item to Develop
    (competency/process/tech)
    First Action Toward Development
    Desired Outcome, Including a Measurable Indicator

    Download the CISO Development Plan Template

    4.1 Create a CISO development plan to keep all your objectives in one place

    Use Info-Tech’s CISO Development Plan Template to create a quick and simple yet powerful tool that you can refer to and update throughout your personal and professional development initiatives. As instructed in the template, you will document the following:

    Your Item to Develop The Next Action Required The Target Outcome
    This could be a CISO competency, a security process item, a security technology item, or an important relationship (or something else that is a priority). This could be as simple as “schedule lunch with a stakeholder” or “email Info-Tech to schedule a Guided Implementation call.” This part of the tool is meant to be continually updated as you progress through your projects. The strength of this approach is that it focuses your project into simple actionable steps that are easily achieved, rather than looking too far down the road and seeing an overwhelming task ahead. This will be something measurable like “reduce spending by 10%” or “have informal meeting with leaders from each department.”

    Info-Tech Insight
    A good plan doesn’t require anything that is outside of your control. Good measurable outcomes are behavior based rather than state based.
    “Increase the budget by 10%” is a bad goal because it is ultimately reliant on someone else and can be derailed by an unsupportive executive. A better goal is “reduce spending by 10%.” This is something more within the CISO’s control and is thus a better performance indicator and a more achievable goal.

    4.1 Create a CISO development plan to keep all your objectives in one place

    Below you will find sample content to populate your CISO Development Plan Template. Using this template will guide your CISO in achieving the goals identified here.

    The template itself is a metric for assessing the development of the CISO. The number of targets achieved by the due date will help to quantify the CISO’s progress.

    You may also want to include improvements to the organization’s security program as part of the CISO development plan.

    Area for Development Item for Development Next Action Required Key Stakeholders/ Owners Target Outcome Due Date Completed
    Core Competencies:
    Communication
    Executive
    communication
    Take economics course to learn business language Course completed [Insert date] [Y/N]
    Core Competencies:
    Communication
    Improve stakeholder
    relationships
    Email Bryce from finance to arrange lunch Improved relationship with finance department [Insert date] [Y/N]
    Technology Maturity: Security Prevention Identity and access management (IAM) system Call Info-Tech to arrange call on IAM solutions 90% of employees entered into IAM system [Insert date] [Y/N]
    Process Maturity: Response & Recovery Disaster recovery Read Info-Tech blueprint on disaster recovery Disaster recovery and backup policies in place [Insert date] [Y/N]

    Check out the First 100 Days as CISO blueprint for guidance on bringing improvements to the security program

    4.1 Use your action plan to track development progress and inform stakeholders

    • As you progress toward your goals, continually update the CISO development plan. It is meant to be a living document.
    • The Next Action Required should be updated regularly as you make progress so you can quickly jump in and take meaningful actions without having to reassess your position every time you open the plan. This is a simple but very powerful method.
    • To view your initiatives in customizable ways, you can use the drop-down menu on any column header to sort your initiatives (i.e. by due date, completed status, area for development). This allows you to quickly and easily see a variety of perspectives on your progress and enables you to bring upcoming or incomplete projects right to the top.
    Area for Development Item for Development Next Action Required Key Stakeholders/ Owners Target Outcome Due Date Completed
    Core Competencies:
    Communication
    Executive
    communication
    Take economics course to learn business language Course completed [Insert date] [Y/N]
    Core Competencies:
    Communication
    Improve stakeholder
    relationships
    Email Bryce from finance to arrange lunch Improved relationship with finance department [Insert date] [Y/N]
    Technology Maturity: Security Prevention Identity and access management (IAM) system Call Info-Tech to arrange call on IAM solutions 90% of employees entered into IAM system [Insert date] [Y/N]
    Process Maturity: Response & Recovery Disaster recovery Read Info-Tech blueprint on disaster recovery Disaster recovery and backup policies in place [Insert date] [Y/N]

    Step 4.2

    Regularly reassess to track development and progress

    Activities

    Create a calendar event for you and your CISO, including which items you will reassess and when

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO
    • The newly hired CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    Scheduled reassessment of the CISO’s competencies

    Execute

    4.2 Regularly evaluate your CISO’s progress

    < 1 day

    As previously mentioned, your CISO development plan is meant to be a living document. Your CISO will use this as a companion tool throughout project implementation, but periodically it will be necessary to re-evaluate the entire program to assess your progress and ensure that your actions are still in alignment with personal and organizational goals.

    Info-Tech recommends performing the following assessments quarterly or twice yearly with the help of our executive advisors (either over the phone or onsite).

    1. Sit down and re-evaluate your CISO core competencies using the CISO Core Competency Evaluation Tool.
    2. Analyze your relationships using the CISO Stakeholder Power Map Template.
    3. Compare all of these against your previous results to see what areas you have strengthened and decide if you need to focus on a different area now.
    4. Consider your CISO Development Plan Template and decide whether you have achieved your desired outcomes. If not, why?
    5. Schedule your next reassessment, then create a new plan for the upcoming quarter and get started.
    Materials
    • Laptop
    • CISO Development Plan Template
    Participants
    • CISO
    • Hiring executive (possibly)
    Output
    • Complete CISO and security program development plan

    Summary of Accomplishment

    Knowledge Gained

    • Understanding of the competencies contributing to a successful CISO
    • Strategic approach to integrate the CISO into the organization
    • View of various CISO functions from a variety of business and executive perspectives, rather than just a security view

    Process Optimized

    • Hiring of the CISO
    • Assessment and development of stakeholder relationships for the CISO
    • Broad planning for CISO development

    Deliverables Completed

    • IT Security Business Satisfaction and Alignment Diagnostic
    • CISO Core Competency Evaluation Tool
    • CISO Stakeholder Power Map Template
    • CISO Stakeholder Management Strategy Template
    • CISO Development Plan Template

    If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation

    Contact your account representative for more information

    workshop@infotech.com
    1-888-670-8889

    Related Info-Tech Research

    Build an Information Security Strategy
    Your security strategy should not be based on trying to blindly follow best practices but on a holistic risk-based assessment that is risk aware and aligns with your business context.

    The First 100 Days as CISO
    Every CISO needs to follow Info-Tech’s five-step approach to truly succeed in their new position. The meaning and expectations of a CISO role will differ from organization to organization and person to person, but the approach to the new position will be relatively the same.

    Implement a Security Governance and Management Program
    Business and security goals should be the same. Businesses cannot operate without security, and security's goal is to enable safe business operations.

    Research Contributors

    • Mark Lester, Information Security Manager, South Carolina State Ports Authority
    • Kyle Kennedy, CISO, CyberSN.com
    • James Miller, Information Security Director, Xavier University
    • Elliot Lewis, Vice President Security & Risk, Info-Tech Research Group
    • Andrew Maroun, Enterprise Security Lead, State of California
    • Brian Bobo, VP Enterprise Security, Schneider National
    • Candy Alexander, GRC Security Consultant, Towerall Inc.
    • Chad Fulgham, Chairman, PerCredo
    • Ian Parker, Head of Corporate Systems Information Security Risk and Compliance, Fujitsu EMEIA
    • Diane Kelly, Information Security Manager, Colorado State Judicial Branch
    • Jeffrey Gardiner, CISO, Western University
    • Joey LaCour, VP & Chief Security, Colonial Savings
    • Karla Thomas, Director IT Global Security, Tower Automotive
    • Kevin Warner, Security and Compliance Officer, Bridge Healthcare Providers
    • Lisa Davis, CEO, Vicinage
    • Luis Brown, Information Security & Compliance Officer, Central New Mexico Community College
    • Peter Clay, CISO, Qlik
    • Robert Banniza, Senior Director IT Center Security, AMSURG
    • Tim Tyndall, Systems Architect, Oregon State

    Bibliography

    Dicker, William. "An Examination of the Role of vCISO in SMBs: An Information Security Governance Exploration." Dissertation, Georgia State University, May 2, 2021. Accessed 30 Sep. 2022.

    Heidrick & Struggles. "2022 Global Chief Information Security Officer (CISO) Survey" Heidrick & Struggles International, Inc. September 6, 2022. Accessed 30 Sep. 2022.

    IBM Security. "Cost of a Data Breach Report 2022" IBM. August 1, 2022. Accessed 9 Nov. 2022.

    Mehta, Medha. "What Is a vCISO? Are vCISO Services Worth It?" Infosec Insights by Sectigo, June 23, 2021. Accessed Nov 22. 2022.

    Milica, Lucia. “Proofpoint 2022 Voice of the CISO Report” Proofpoint. May 2022. Accessed 6 Oct. 2022.

    Navisite. "The State of Cybersecurity Leadership and Readiness" Navisite. November 9, 2021. Accessed 9 Nov. 2022.

    Shayo, Conrad, and Frank Lin. “An Exploration of the Evolving Reporting Organizational Structure for the Chief Information Security Officer (CISO) Function” Journal of Computer Science and Information Technology, vol. 7, no. 1, June 2019. Accessed 28 Sep. 2022.

    Considerations for a Move to Virtual Desktops

    • Buy Link or Shortcode: {j2store}69|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: End-User Computing Strategy
    • Parent Category Link: /end-user-computing-strategy
    • Hybrid work environments, remote from anywhere and any device, and the security concerns that go hand-in-hand with these strategies have accelerated the move to VDI and DaaS.
    • IT departments can encounter many obstacles to VDI and DaaS, many of which will be determined by your business model and other factors, including complicated shared infrastructure, inadequate training or insufficient staff, and security and compliance concerns.
    • If you do not consider how your end user will be impacted, you will run into multiple issues that affect end-user satisfaction, productivity, and adoption.
    • How will you manage and navigate the right solution for your organization?

    Our Advice

    Critical Insight

    • In the world of VDI and DaaS, if you do not get buy-in from the end user, the rate of adoption and the overall success of the implementation will prove difficult to measure. It will be impossible to calculate ROI even as you feel the impact of your TCO.

    Impact and Result

    • The dimensions of end-user experience can be broken down into four distinct categories that will impact not only the end user but also the business: performance, availability, functionality, and security.
    • Picturing your landscape in this framework will help clearly define your considerations when deciding on whether a VDI or DaaS solution is right for your business.

    Considerations for a Move to Virtual Desktops Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Considerations for a Move to Virtual Desktops Storyboard – A guide to the strategic, technical, and support implications that should be considered in support of a move to VDI or DaaS.

    By defining your goals, framing solutions based on end-user workloads, and understanding the pros and cons of various solutions, you can visualize what success looks like for your VDI/DaaS deployment. This includes defining your KPIs by end-user experience, knowing the decision gates for a successful deployment, and defining your hypothesis for value to make your decision more accurate and gain C-suite buy-in.

    • Considerations for a Move to Virtual Desktops Storyboard
    [infographic]

    Further reading

    What strategic, technical, and support implications should be considered in support of a move to VDI or DaaS?

    Executive Summary

    Insight

    End-user experience is your #1 consideration

    Virtual desktop infrastructure (VDI)/desktop as a service (DaaS) users expect their user experience to be at least equal to that provided by a physical PC, and they do not care about the underlying infrastructure. If the experience is less, then IT has failed in the considerations for VDI/ DaaS. In this research we analyze the data that the IT industry tracks but doesn't use or sometimes even look at regarding user experience (UX).

    Identify the gaps in your IT resources that are critical to success

    Understanding the strengths and weaknesses in your in-house technical skills and business requirements will assist you in making the right decision when it comes to VDI or DaaS solutions. In the case of DaaS this will include a managed service provider for small to medium-sized IT teams. Many IT teams lack a seasoned IT project manager who can identify gaps, risks, and weaknesses in the organization's preparedness. Redeploy your IT staff to new roles that impact management and monitoring of UX.

    IT should think about VDI and DaaS solutions

    Ultimately, IT needs to reduce its complexity, increase user satisfaction, reduce management and storage costs, and maintain a secure and effective environment for both the end user and the business. They must also ensure productivity standards throughout the considerations, strategically, tactically, and in support of a move to a VDI or DaaS solution.

    Executive Summary

    Your Challenge

    With the evolution of VDI over the last 15-plus years, there has been a proliferation of solutions, such as Citrix desktop services, VMware Horizon, and in-house hypervisor solutions (e.g. ESX hosts). There has also been a great deal of growth and competition of DaaS and SaaS solutions in the cloud space. Hybrid work environments, remote from anywhere and any device, and the security concerns that go hand-in-hand with these strategies have certainly accelerated the move to VDI and DaaS.

    How will you manage and navigate the right solution for your organization?

    Common Obstacles

    IT departments can encounter many obstacles to VDI and DaaS, many of which will be determined by your business model and other factors, such as:

    • Complicated shared infrastructure such as federated multitenant partners and legacy app servers.
    • Inadequate in-house training or insufficient staff to execute migration or manage post-migration activates such as governance and retention policies.
    • Security, compliance, legal, and data classification concerns. Some security tools cannot be deployed in the cloud, limiting you to an on-premises solution.
    Info-Tech’s Approach

    By defining your end goals, framing solutions based on end-user workloads, and understanding the pros and cons of what solution(s) will meet your needs, you can visualize what success looks like.

    1. Define your KPIs by end-user experience.
    2. Knowing what the decision gates are for a successful VDI/DaaS deployment will prove out your selection process.
    3. Define your hypothesis for value. How you determine value will make your decision more accurate and gain C-suite buy-in.

    Info-Tech Insight

    Every IT organization needs to be asking what success looks like. If you do not consider how your end user will be impacted, whether they are doing something as simple as holding a team meeting with voice and video or working with highly technical workloads on a virtual environment, you will run into multiple issues that affect end-user satisfaction, productivity, and adoption. Understand the tension metrics that may conflict with meeting business objectives and KPIs.

    Voice of the customer

    Client-Driven Insight

    Different industries have different requirements and issues, so they look at solutions differently.

    Info-Tech Insight

    If end-user experience is at the forefront of business requirements, then any solution that fits the business KPIs can be successful.

    Client Pain Point

    Description Indicators

    Flexible work environmentWhat VDI solution can support a work-from-anywhere scenario? Possible solutions: Azure Virtual Desktop, IGEL client, Citrix virtual apps, and desktop services.
    Security concerns Corporate resources need to be secure. Working with untrusted endpoints or unsecured locations. Using VPN-type solution.
    End-user experience What performance metrics should be used to evaluate UX? Are there issues around where the endpoint is located? What kind of link do they have to the virtual desktop? What solutions are there?
    Optimization of routing What routings need to take place to achieve reduced latency and improved experience?
    Multifactor authenticationSecurity features such as a multilayered MFA and corporate data protection.
    Business continuity What are the options when dealing with cloud outages, meeting SLAs, and building resilience?
    Optimizing app performance and response times Define users based on a multiuser environment. Engineers and designers require more CPU resources, which negatively impacts on other users. Optimize CPU to avoid this situation. MS Teams and video streaming apps are not performing in an optimized manner.
    Optimization of cloud costs Scalability and usage schedule. Minimize cloud costs with tools to handle workloads and usage.
    Third-party access outsourcingContractors and third parties accessing business resources need to control data and source code along with developer tools in a centrally managed SaaS.

    The enterprise end-user compute landscape is changing

    Starting on the left are three computer types 'Windows on a PC', 'Mac', and 'VDI on a Thick Client'. In the next part, the first two are combined into 'BYOD', and the tree begins at 'Win11'. Branches from Win11 are: 'DIY' which branches to 'Autopilot & Endpoint Manager (Intune)'; 'Outsource' which branches to 'Device as a Service' which brances to 'Dell', 'Lenovo', and 'HP'; and another branch from 'Outsource', 'Azure Desktop', Which snakes us around to the top of the diagram at 'VDI'. VDI branches to 'VDI on a thin client' and 'VDI on a Browser', then they both branch into 'DIY' which branches to 'Citrix', 'VMware', and 'Azure', and 'Outsource' which branches to 'Desktop as a Service Vendor'.

    Surveys are telling us a story

    Questions you should be asking before you create your RFP
    • What are the use cases and types of workloads?
    • What is the quality of the network connection and bandwidth for the user base?
    • What are the application requirements?
    • What type of end points does the user have and what is the configuration?
    • Where are the data storage containers, how are they accessed, and are there proximity constraints?
    • What is the business security and identity policy requirements?
    • What are the functional and nonfunctional requirements?
    • Will the virtual desktops be persistent or non-persistent?

    How would you rate the user experience on your VDI/DaaS solution?


    (Source: Hysolate, 2020)

    • 18% of CISOs say htue employees are happy with their company's VDI/DaaS solution
    • 82% say their employees are neutral or unhappy with their company's VDI/DaaS solution

    Info-Tech Insight

    Asking critical use-case questions should give you a clear picture of the end-user experience outcome.

    End-user KPI metrics are difficult to gather

    Security is always quoted as a primary justification for VDI/DaaS, while UX is far down the list of KPIs. WHY?

    IT engineers use network and performance metrics to manage end-user complaints of “slowness,” which in reality is not what the user is experiencing.

    IT needs to invest in more meaningful metrics to manage end-user pain:

    • Logon duration
    • App load time
    • App response time
    • Session response time
    • Graphic quality and responsiveness and latency
    • Application availability and performance
    Bar chart of justifications used for business investment in VDI/DaaS. The most used justification is 'IT Efficiency' at 38%, and highlighted in the 2nd last place is 'Employee Experience' at 11%.
    (Source: Enterprise Strategy Group, 2020)

    Dimensions of user experience

    The dimensions of end-user experience can be broken down into four distinct categories that will impact not only the end user but also the business.

    Picturing your landscape in this framework will help clearly define your considerations when deciding on whether a VDI or DaaS solution is right for your business. We will investigate how these scenarios impact the end user, what that means, and how that can guide the questions that you are asking as you move to an RFP.

    Info-Tech Insight

    In the world of VDI and DaaS, if you do not get buy-in from the end user, the rate of adoption and the overall success of the implementation will prove difficult to measure. It will be impossible to calculate ROI even as you feel the impact of your TCO.

    Three arrows pointing right with labels in sequence 'Dimensions', 'Operational Metrics', and 'Technical Capabilities/ Controls'

    Cycle diagram with many tiers, titled 'USER EXPERIENCE'. The first tier from the center has four items cycling clockwise 'Availability', 'Functionality', 'Security', and 'Performance'. The second tier is associated to the first tier: under Availability is 'Maintenance', 'Uptime', and 'Degradation'; under Functionality is 'Graphics Quality', 'User Friction', and 'Usability'; under Security is 'Endpoint Monitoring', 'Plane Control', and 'Identity'; under Performance is 'Response Time', 'Reliability', and 'Latency'. Around the edge on the third tier are many different related terms.

    KPIs and metrics

    • Understand the types of end-user activities that are most likely to be reported as being slow.
    • You need to know what storage, CPU, memory, and network resources are being used when the user performs those activities. In other words, what is the OS doing behind the scenes and what hardware is it using?
    • Once you have determined which resources are being used by the various activities you will have to monitor the UX metrics to see which OS, network, storage, or server configuration issue is causing the performance issue that the user is reporting.

    What IT measures

    Most business KPI objectives concentrate on business goals, whether it be cost containment, security, simplification, ease of management, or centralization of apps and data, but rarely is there a KPI for end-user experience.

    You can’t fix what you can’t see. Putting a cost benefit to end-user satisfaction may come in the form of productivity.

    This may be a central reason why VDI has not been widely adopted as an architecture since it came to the marketplace more than 15 years ago.

    Samples of different KPIs and metrics.

    VDI processes to monitor

    Monitoring end-user metrics will mitigate the tension between business KPIs and end-user satisfaction

    Metric

    Description

    End-User
    Experience

    PERFORMANCELogon durationOnce the user puts in their password, how long does it take to get to their desktop? What is the measurement and how do you measure?
    App load timeWhen an app is launched by the user there should be immediate indication that it is loading.
    App response timeWhen the user performs a task, there should be no wait time, or hourglass icon, waiting for the app to catch up to the user input. (There is no succinct way to measure this.)
    Session response timeHow does the user’s OS respond to I/O? The user should not experience any latency issues when doing a drag and drop, clicking on a menu item, or doing a search.
    AVAILABILITYSLAsWhen something goes wrong in the VDI/DaaS environment, how quickly can the user expect to get back to their tasks?
    Geographic locationWhen all other considerations are configured correctly, the user experience may be impacted by their location. So, for example, a user working out of Mexico and logging into a VDI may experience latency based on location compared to a user in California, for example, where the resources are stored, managed, and monitored.
    Application availabilityMuch like app load time and response time, the only factor affecting the user experience is the back-end load on the app itself, for example a CAD or heavy resource app not properly resourced.
    FUNCTIONALITYConfiguration of user desktopDegradation in functionality is caused by improper allocation of CPU, RAM, and GPU for the tasks at hand, creating a bad UX and end-user satisfaction score.
    Graphics quality and responsivenessThe user should have the same experience as if on their own physical machine. A video experience should not have any lag in it, for example. MS Teams should not have latency or sound quality issues.
    Predictive analysisContinuous performance and availability monitoring.
    END USERBrowser real user monitoring (RUM)A real-time view into how the web application is performing from the point of view of a real end user.
    Customer satisfaction scoreSurvey-based metrics on customer satisfaction.

    “If employees are the competitive edge and key differentiator for a business, I&O has a duty of care to ensure that the employees’ digital experience enables and does not impede the value of that asset.” (John Annand, Principal Director, Info-Tech Research Group)

    The case for VDI today

    Is security and data sovereignty the only reason?

    Technical capability
    AVAILABILITYVDI is a better fit than DaaS in organizations that have limited or unreliable internet connectivity.
    FUNCTIONALITYApplication flexibility: Resource-intensive applications may require specific virtual desktop configurations, for example in-house GIS apps, CAD, and gaming software requiring specific GPU configurations.
    SECURITYData protection is often stated as a need to maintain an on-premises VDI solution, ensuring sensitive and highly privileged data does not travel across the internet.
    AVAILABILITYWhile some cloud providers will allow you to bring your OS licensing along with a cloud migration, many subscriptions already include OS licensing, and you may be paying additional licensing costs.
    SECURITYVDI makes sense if security and control are primary business KPIs, the IT resources are experienced virtual infrastructure engineers and administrators, and funding is not a hindrance.
    PERFORMANCEWhen processing power is a functional requirement, such as CPU, GPU, and storage capacity, VDI offers performance benefits over a standard PC, reducing the need to deploy high-powered PCs to end users.

    “Though the desktops are moving to the cloud, accountability is not.” (Gary Bea, Director of Consulting Services and Technical Operations, Goliath Technologies)

    The case for DaaS

    Any device anywhere: key benefits of DaaS

    Technical capabilityChallenges
    AVAILABILITYDelivers a consistent user experience regardless of location or device.

    Info-Tech Insight

    The total cost of the solution will be higher than you anticipate, and management is complex. Additionally, your ability to set your conditions and controls is limited.

    Info-Tech Insight

    Depending on your technical abilities and experience with cloud services, you will likely benefit from professional third-party services, technical services, and consulting, which can be critical when deciding if DaaS can fit into your current IT architecture, processes, and security posture.

    SECURITYEnhances security posture by eliminating your client VPN and keeping sensitive data off the endpoint device.
    FUNCTIONALITYOnboard and offboard users quickly and securely.
    FUNCTIONALITYProvides centralize workspace management.
    FUNCTIONALITYScale up or down on demand with a consumption- and subscription-based contract.
    FUNCTIONALITYSignificantly reduce operational overhead compared to managing a traditional VDI deployment.

    Technical capability comparison

    Table comparing technical capabilities using a scale of circle quarters: zero quarters being 'Poor' and 4 quarters being 'Good'. There are six columns in the body, three of which are under 'VDI': 'Thin Client', 'Thick Client', and 'Web Client', and the other three are 'Desktop as a service', 'Device as a service', and 'Win11 w/ Autopilot & Intune'. Rows are split into four categories: In 'Performance' are 'Reliability', 'Response Time', and 'Latency'; in 'Availability' are 'Uptime' and 'Degradation'; in 'Functionality' are 'Usability', 'Graphics Quality', and 'User Friction'; in 'Security' are 'Endpoint Mgt.', 'Control Plane', and 'Identity'.

    X as an endpoint client

    From an end-user experience perspective, what makes sense in terms of usage and cost?

    Thin Client
    • ✓ Easy provisioning and simple to use and manage
    • ✓ Easy to secure and update
    • ✓ Less vulnerable to data loss
    • ✓ Easily scaled
    • ✓ Requires less power
    • ✓ Cheaper than PCs
    • x compared to a PC
    • x Not powerful enough to manage loads such as CAD
    • x Infrastructure and network must be robust and up to date to avoid possible network latency
    • Examples: Terminals, Dell Wyse 5070, Lenovo M625, IGEL, HP Thin Client, repurposed PCs, Chromebook
    Desktop as a Service
    • ✓ Flexibility: work from anywhere, on any device, collaboratively
    • ✓ Resource scalability not reliant on on-premises server hardware
    • ✓ Easy to configure, install, and maintain
    • ✓ Reliable and easy to provision
    • ✓ Centralized sensitive data cloud security
    • x Requires high-speed internet, especially for remote users
    • x Learning curve can cause user friction
    • x Workload configuration use cases
    • Examples: Citrix, VM Horizon, AWS WorkSpaces, WVD, BYOD
    Thick Client
    • ✓ Completely flexible, for use with on-premises or cloud infrastructure
    • ✓ Able to work offline
    • ✓ Multimedia or bandwidth-intensive resource processing
    • ✓ Higher server capacity due to less resource load on servers
    • x Higher maintenance and updates attention
    • x Patching, security, and data migration friction
    • x More security vulnerability
    • x Less cost effective
    • Examples: Windows, MacOS desktops, laptops, smartphones, tablets
    Device as a Service
    • ✓ Device supply chain flow fulfillment, services, and recovery
    • ✓ Able to update to new equipment more frequently
    • ✓ Scale up and down as needed
    • ✓ Better device backup, asset tracking , security, and EOL disposal
    • x Challenging risk management, regulatory obligations, and liabilities
    • x Change in helpdesk and business workflows
    • x Vendor may limit selection
    • Examples: PCs, smartphones, mobile computing devices, Lenovo, HP, Microsoft, Dell, Macs, iPads, iPhones
    Web Client
    • ✓ Can be accessed from any computer; only requires username and password
    • ✓ Client works with a URL, so browser-based
    • ✓ Updates are easier than on a Windows client
    • x Security risk and information leakage
    • x Dependent on internet access
    • x Unable to work on high-impact resource apps (e.g. CAD, graphics)
    • x Limited user base, less technical operations
    • Examples: Chrome, Edge, HTML5

    Security: on-premises versus cloud

    Security decisions based on risk tolerance

    • What is your risk tolerance? When deciding between VDI and DaaS, the first consideration is whether the business is better served with an on-premises or a cloud solution.
    • Low risk tolerance: Considerer data sovereignty, complex compliance requirements, and data classification. For example, at the Pentagon, DoD requires heavy compliance with security and data sovereignty. DaaS cloud providers may be in a better position to respond to threats and attacks in a timely manner.
    • Low risk tolerance: If the business mandates security tools that cannot be deployed in cloud solutions, VDI is a better solution.
    • Low risk tolerance: Smaller businesses that don’t have resources with the expertise and skill set to handle security are better served in cloud. Security operations centers (SOCs) are more likely to present in large corporations.
    • Low risk tolerance: When patching requires customization, for example in legacy applications, the ability to test patches is impacted, which may cause possible complications or failures.
    • High risk tolerance: For cloud-based solutions, patching is taken out of the IT team’s hands, and testing is done against the complete cloud solution.

    Info-Tech Insight

    What is the better security posture and control plane? Clarify your stakeholders’ objectives, then see if VDI is an adequate solution.

    Security needs for VDI and DaaS

    • IDENTITY AND ACCESS MANAGEMENT — MFA, authorization, provisioning, SSO, identity federation, data owners, workflows, role-based access control (RBAC), user lifecycle management
    • ENCRYPTION — TLS 1.3, and 256-bit, endpoint encryption, file encryption, AES, PKI, BitLocker
    • DATA LOSS PREVENTION — Centralized policy management, sensitive data detection, HIPAA, GDPR
    • ANTIVIRUS & PATCH MANAGEMENT — Group policy management, AV exclusions, anti-ransomware, keylogger mitigation
    • DDoS protection — HTTP, UDP flood mitigation, content delivery network, always-on services
    • ENDPOINT DETECTION & RESPONSE — Detect and react to advanced active attacks on endpoints

    Activity

    Define the virtual infrastructure solution for your end users

    1. Define and build your value hypothesis/proposition
      1. What is the business case? Who is championing the investment?
      2. Identify the project management team and stakeholders.
      3. Set goals to be achieved based on value.
      4. Identify KPIs and metrics to measure success.
    2. Identify use cases and personas
      1. Identify possible user friction (e.g. emotional, cognitive, interaction).
      2. Understand current infrastructure shortcomings/capabilities (e.g. network, security posture/tolerance, staffing needs, qualified technicians, end-user devices).
    3. Articulate use cases into functional and nonfunctional requirements
      1. Separate must haves and nice to haves.
      2. Categorize requirements into identifiable functionality capabilities.
      3. Review your outputs and identify “gotchas” using the MECE (mutually exclusive, collectively exhaustive) principle.

    Related Info-Tech Research

    Stock image of a dashboard.Modernize and Transform Your End-User Computing Strategy

    Phase 3.2 of this research set covers virtual desktop infrastructure.

    Stock image of a world surrounded by clouds.Implement Desktop Virtualization and Transition to Everything as a Service

    Follow Info-Tech’s process for implementing the right desktop virtualization solution to create a project plan that will help ensure that you not only choose the right solution but also implement it effectively.

    Stock image of a finger pushing a button.Cloud Strategy Workbook

    Use this tool to assess cloud services (desktop-as-a-service).

    Stock image of a world surrounded by clouds.Desktop Virtualization TCO Calculator

    This tool is designed to help you understand what desktop virtualization looks like from a cost perspective.

    Bibliography

    Anderson, Joseph. “Five Ways VDI Will Grow in 2022 Thanks to Hybrid Work.” StratoDesk, 28 Feb. 2022. Web.

    Bowker, Mark. “Are Desktops Doomed? Trends in Digital Workspaces, VDI, and DaaS.” ESG, May 2020. Web.

    “The CISO's Dilemma: How Chief Information Security Officers Are Balancing Enterprise Endpoint Security and Worker Productivity in Response to COVID-19.” Hysolate, Oct. 2020. Web.

    King, Val. “Why the End-User Experience Is Not Good for Your Remote Workforce .” Whitehat Virtual Technologies, 2 Dec. 2021. Web.

    Perry, Yifat. “VDI vs DaaS: 5 Key Differences and 6 Leading Solutions.” NetApp, 26 Aug. 2020. Web.

    Rigg, Christian. “Best virtual desktop services 2022.” TechRadar, 20 Jan. 2022 . Web.

    Seget, Vladan. “Key metrics to consider when assessing the performance of your VDI/DaaS environment.” vladan.fr, 19 April 2021. Web.

    Spruijt, Ruben. “Why Should You Care About VDI and Desktop-as-a-Service?” Nutanix, 28 Jan. 2020. Web.

    Stowers, Joshua. “The Best Desktop as a Service (DaaS) Providers 2022.” business.com, 21 Dec. 2021. Web.

    “Virtual Desktop Infrastructure(VDI) Market 2022.” MarketWatch, 5 Jan. 2022. Web. Press release.

    Zamir, Tal. “VDI Security Best Practices: Busting the Myths.” Hysolate, 29 Nov. 2021. Web.

    Zychowicz, Paul. “Why do virtual desktop deployments fail?” Turbonomic Blog, 16 Dec. 2016. Web.

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Create a Service Management Roadmap

      • Buy Link or Shortcode: {j2store}394|cart{/j2store}
      • member rating overall impact: 8.9/10 Overall Impact
      • member rating average dollars saved: $71,003 Average $ Saved
      • member rating average days saved: 24 Average Days Saved
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • Inconsistent adoption of holistic practices has led to a chaotic service delivery model that results in poor customer satisfaction.
      • There is little structure, formalization, or standardization in the way IT services are designed and managed, leading to diminishing service quality and low business satisfaction.

      Our Advice

      Critical Insight

      • Having effective service management practices in place will allow you to pursue activities, such as innovation, and drive the business forward.
      • Addressing foundational elements like business alignment and management practices will enable you to build effective core practices that deliver business value.
      • Providing consistent leadership support and engagement is essential to allow practitioners to focus on delivering expected outcomes.

      Impact and Result

      • Understand the foundational and core elements that allow you to build a successful service management practice focused on outcomes.
      • Use Info-Tech’s advice and tools to perform an assessment of your organization’s current state, identify the gaps, and create a roadmap for success.
      • Increase business and customer satisfaction by delivering services focused on creating business value.

      Create a Service Management Roadmap Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why many service management maturity projects fail to address foundational and core elements, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch the project

      Kick-off the project and complete the project charter.

      • Create a Service Management Roadmap – Phase 1: Launch Project
      • Service Management Roadmap Project Charter

      2. Assess the current state

      Determine the current state for service management practices.

      • Create a Service Management Roadmap – Phase 2: Assess the Current State
      • Service Management Maturity Assessment Tool
      • Organizational Change Management Capability Assessment Tool
      • Service Management Roadmap Presentation Template

      3. Build the roadmap

      Build your roadmap with identified initiatives.

      • Create a Service Management Roadmap – Phase 3: Identify the Target State

      4. Build the communication slide

      Create the communication slide that demonstrates how things will change, both short and long term.

      • Create a Service Management Roadmap – Phase 4: Build the Roadmap
      [infographic]

      Workshop: Create a Service Management Roadmap

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Service Management

      The Purpose

      Understand service management.

      Key Benefits Achieved

      Gain a common understanding of service management, the forces that impact your roadmap, and the Info-Tech Service Management Maturity Model.

      Activities

      1.1 Understand service management.

      1.2 Build a compelling vision and mission.

      Outputs

      Constraints and enablers chart

      Service management vision, mission, and values

      2 Assess the Current State of Service Management

      The Purpose

      Assess the organization’s current service management capabilities.

      Key Benefits Achieved

      Understand attitudes, behaviors, and culture.

      Understand governance and process ownership needs.

      Understand strengths, weaknesses, opportunities, and threats.

      Defined desired state.

      Activities

      2.1 Assess cultural ABCs.

      2.2 Assess governance needs.

      2.3 Perform SWOT analysis.

      2.4 Define desired state.

      Outputs

      Cultural improvements action items

      Governance action items

      SWOT analysis action items

      Defined desired state

      3 Continue Current-State Assessment

      The Purpose

      Assess the organization’s current service management capabilities.

      Key Benefits Achieved

      Understand the current maturity of service management processes.

      Understand organizational change management capabilities.

      Activities

      3.1 Perform service management process maturity assessment.

      3.2 Complete OCM capability assessment.

      3.3 Identify roadmap themes.

      Outputs

      Service management process maturity activities

      OCM action items

      Roadmap themes

      4 Build Roadmap and Communication Tool

      The Purpose

      Use outputs from previous steps to build your roadmap and communication one-pagers.

      Key Benefits Achieved

      Easy-to-understand roadmap one-pager

      Communication one-pager

      Activities

      4.1 Build roadmap one-pager.

      4.2 Build communication one-pager.

      Outputs

      Service management roadmap

      Service management roadmap – Brought to Life communication slide

      Further reading

      Create a Service Management Roadmap

      Implement service management in an order that makes sense.

      ANALYST PERSPECTIVE

      "More than 80% of the larger enterprises we’ve worked with start out wanting to develop advanced service management practices without having the cultural and organizational basics or foundational practices fully in place. Although you wouldn’t think this would be the case in large enterprises, again and again IT leaders are underestimating the importance of cultural and foundational aspects such as governance, management practices, and understanding business value. You must have these fundamentals right before moving on."

      Tony Denford,

      Research Director – CIO

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIO
      • Senior IT Management

      This Research Will Help You:

      • Create or maintain service management (SM) practices to ensure user-facing services are delivered seamlessly to business users with minimum interruption.
      • Increase the level of reliability and availability of the services provided to the business and improve the relationship and communication between IT and the business.

      This Research Will Also Assist

      • Service Management Process Owners

      This Research Will Help Them:

      • Formalize, standardize, and improve the maturity of service management practices.
      • Identify new service management initiatives to move IT to the next level of service management maturity.

      Executive summary

      Situation

      • Inconsistent adoption of holistic practices has led to a chaotic service delivery model that results in poor customer satisfaction.
      • There is little structure, formalization, or standardization in the way IT services are designed and managed, leading to diminishing service quality and low business satisfaction.

      Complication

      • IT organizations want to be seen as strategic partners, but they fail to address the cultural and organizational constraints.
      • Without alignment with the business goals, services often fail to provide the expected value.
      • Traditional service management approaches are not adaptable for new ways of working.

      Resolution

      • Follow Info-Tech’s methodology to create a service management roadmap that will help guide the optimization of your IT services and improve IT’s value to the business.
      • The blueprint will help you right-size your roadmap to best suit your specific needs and goals and will provide structure, ownership, and direction for service management.
      • This blueprint allows you to accurately identify the current state of service management at your organization. Customize the roadmap and create a plan to achieve your target service management state.

      Info-Tech Insight

      Having effective service management practices in place will allow you to pursue activities such as innovation and drive the business forward. Addressing foundational elements like business alignment and management practices will enable you to build effective core practices that deliver business value. Consistent leadership support and engagement is essential to allow practitioners to focus on delivering expected outcomes.

      Poor service management manifests in many different pains across the organization

      Immaturity in service management will not result in one pain – rather, it will create a chaotic environment for the entire organization, crippling IT’s ability to deliver and perform.

      Low Service Management Maturity

      These are some of the pains that can be attributed to poor service management practices.

      • Frequent service-impacting incidents
      • Low satisfaction with the service desk
      • High % of failed deployments
      • Frequent change-related incidents
      • Frequent recurring incidents
      • Inability to find root cause
      • No communication with the business
      • Frequent capacity-related incidents

      And there are many more…

      Mature service management practices are a necessity, not a nice-to-have

      Immature service management practices are one of the biggest hurdles preventing IT from reaching its true potential.

      In 2004, PwC published a report titled “IT Moves from Cost Center to Business Contributor.” However, the 2014-2015 CSC Global CIO Survey showed that a high percentage of IT is still considered a cost center.

      And low maturity of service management practices is inhibiting activities such as agility, DevOps, digitalization, and innovation.

      A pie chart is shown that is titled: Where does IT sit? The chart has 3 sections. One section represents IT and the business have a collaborative partnership 28%. The next section represents at 33% where IT has a formal client/service provider relationship with the business. The last section has 39% where IT is considered as a cost center.
      Source: CSC Global CIO Survey: 2014-2015 “CIOs Emerge as Disruptive Innovators”

      39%: Resources are primarily focused on managing existing IT workloads and keeping the lights on.

      31%: Too much time and too many resources are used to handle urgent incidents and problems.

      There are many misconceptions about what service management is

      Misconception #1: “Service management is a process”

      Effective service management is a journey that encompasses a series of initiatives that improves the value of services delivered.

      Misconception #2: “Service Management = Service Desk”

      Service desk is the foundation, since it is the main end-user touch point, but service management is a set of people and processes required to deliver business-facing services.

      Misconception #3: “Service management is about the ITSM tool”

      The tool is part of the overall service management program, but the people and processes must be in place before implementing.

      Misconception #4: “Service management development is one big initiative”

      Service management development is a series of initiatives that takes into account an organization’s current state, maturity, capacities, and objectives.

      Misconception #5: “Service management processes can be deployed in any order, assuming good planning and design”

      A successful service management program takes into account the dependencies of processes.

      Misconception #6: “Service management is resolving incidents and deploying changes”

      Service management is about delivering high-value and high-quality services.

      Misconception #7: “Service management is not the key determinant of success”

      As an organization progresses on the service management journey, its ability to deliver high-value and high-quality services increases.

      Misconception #8: “Resolving Incidents = Success”

      Preventing incidents is the name of the game.

      Misconception #9: “Service Management = Good Firefighter”

      Service management is about understanding what’s going on with user-facing services and proactively improving service quality.

      Misconception #10: “Service management is about IT and technical services (e.g. servers, network, database)”

      Service management is about business/user-facing services and the value the services provide to the business.

      Service management projects often don’t succeed because they are focused on process rather than outcomes

      Service management projects tend to focus on implementing process without ensuring foundational elements of culture and management practices are strong enough to support the change.

      1. Aligning your service management goals with your organizational objectives leads to better understanding of the expected outcomes.
      2. Understand your customers and what they value, and design your practices to deliver this value.

      3. IT does not know what order is best when implementing new practices or process improvements.
      4. Don't run before you can walk. Fundamental practices must reach the maturity threshold before developing advanced practices. Implement continuous improvement on your existing processes so they continue to support new practices.

      5. IT does not follow best practices when implementing a practice.
      6. Our best-practice research is based on extensive experience working with clients through advisory calls and workshops.

      Info-Tech can help you create a customized, low-effort, and high-value service management roadmap that will shore up any gaps, prove IT’s value, and achieve business satisfaction.

      Info-Tech’s methodology will help you customize your roadmap so the journey is right for you

      With Info-Tech, you will find out where you are, where you want to go, and how you will get there.

      With our methodology, you can expect the following:

      • Eliminate or reduce rework due to poor execution.
      • Identify dependencies/prerequisites and ensure practices are deployed in the correct order, at the correct time, and by the right people.
      • Engage all necessary resources to design and implement required processes.
      • Assess current maturity and capabilities and design the roadmap with these factors in mind.

      Doing it right the first time around

      You will see these benefits at the end

        ✓ Increase the quality of services IT provides to the business.

        ✓ Increase business satisfaction through higher alignment of IT services.

        ✓ Lower cost to design, implement, and manage services.

        ✓ Better resource utilization, including staff, tools, and budget.

      Focus on a strong foundation to build higher value service management practices

      Info-Tech Insight

      Focus on behaviors and expected outcomes before processes.

      Foundational elements

      • Operating model facilitates service management goals
      • Culture of service delivery
      • Governance discipline to evaluate, direct, and monitor
      • Management discipline to deliver

      Stabilize

      • Deliver stable, reliable IT services to the business
      • Respond to user requests quickly and efficiently
      • Resolve user issues in a timely manner
      • Deploy changes smoothly and successfully

      Proactive

      • Avoid/prevent service disruptions
      • Improve quality of service (performance, availability, reliability)

      Service Provider

      • Understand business needs
      • Ensure services are available
      • Measure service performance, based on business-oriented metrics

      Strategic Partner

      • Fully aligned with business
      • Drive innovation
      • Drive measurable value

      Info-Tech Insight

      Continued leadership support of the foundational elements will allow delivery teams to provide value to the business. Set the expectation of the desired maturity level and allow teams to innovate.

      Follow our model and get to your target state

      A model is depicted that shows the various target states. There are 6 levels showing in the example, and the example is made to look like a tree with a character watering it. In the roots, the level is labelled foundational. The trunk is labelled the core. The lowest hanging branches of the tree is the stabilize section. Above it is the proactive section. Nearing the top of the tree is the service provider. The canopy of the tree are labelled strategic partner.

      Before moving to advanced service management practices, you must ensure that the foundational and core elements are robust enough to support them. Leadership must nurture these practices to ensure they are sustainable and can support higher value, more mature practices.

      Each step along the way, Info-Tech has the tools to help you

      Phase 1: Launch the Project

      Assemble a team with the right talent and vision to increase the chances of project success.

      Phase 2: Assess Current State

      Understand where you are currently on the service management journey using the maturity assessment tool.

      Phase 3: Build Roadmap

      Based on the assessments, build a roadmap to address areas for improvement.

      Phase 4: Build Communication slide

      Based on the roadmap, define the current state, short- and long-term visions for each major improvement area.

      Info-Tech Deliverables:

      • Project Charter
      • Assessment Tools
      • Roadmap Template
      • Communication Template

      CIO call to action

      Improving the maturity of the organization’s service management practice is a big commitment, and the project can only succeed with active support from senior leadership.

      Ideally, the CIO should be the project sponsor, even the project leader. At a minimum, the CIO needs to perform the following activities:

      1. Walk the talk – demonstrate personal commitment to the project and communicate the benefits of the service management journey to IT and the steering committee.
      2. Improving or adopting any new practice is difficult, especially for a project of this size. Thus, the CIO needs to show visible support for this project through internal communication and dedicated resources to help complete this project.

      3. Select a senior, capable, and results-driven project leader.
      4. Most likely, the implementation of this project will be lengthy and technical in some nature. Therefore, the project leader must have a good understanding of the current IT structure, senior standing within the organization, and the relationship and power in place to propel people into action.

      5. Help to define the target future state of IT’s service management.
      6. Determine a realistic target state for the organization based on current capability and resource/budget restraints.

      7. Conduct periodic follow-up meetings to keep track of progress.
      8. Reinforce or re-emphasize the importance of this project to the organization through various communication channels if needed.

      Stabilizing your environment is a must before establishing any more-mature processes

      CASE STUDY

      Industry: Manufacturing

      Source: Engagement

      Challenge

      • The business landscape was rapidly changing for this manufacturer and they wanted to leverage potential cost savings from cloud-first initiatives and consolidate multiple, self-run service delivery teams that were geographically dispersed.

      Solution

      Original Plan

      • Consolidate multiple service delivery teams worldwide and implement service portfolio management.

      Revised Plan with Service Management Roadmap:

      • Markets around the world had very different needs and there was little understanding of what customers value.
      • There was also no understanding of what services were currently being offered within each geography.

      Results

      • Plan was adjusted to understand customer value and services offered.
      • Services were then stabilized and standardized before consolidation.
      • Team also focused on problem maturity and drove a continuous improvement culture and increasing transparency.

      MORAL OF THE STORY:

      Understanding the value of each service allowed the organization to focus effort on high-return activities rather than continuous fire fighting.

      Understand the processes involved in the proactive phase

      CASE STUDY

      Industry: Manufacturing

      Source: Engagement

      Challenge

      • Services were fairly stable, but there were significant recurring issues for certain services.
      • The business was not satisfied with the service quality for certain services, due to periodic availability and reliability issues.
      • Customer feedback for the service desk was generally good.

      Solution

      Original Plan

      • Review all service desk and incident management processes to ensure that service issues were handled in an effective manner.

      Revised Plan with Service Management Roadmap:

      • Design and deploy a rigorous problem management process to determine the root cause of recurring issues.
      • Monitor key services for events that may lead to a service outage.

      Results

      • Root cause of recurring issues was determined and fixes were deployed to resolve the underlying cause of the issues.
      • Service quality improved dramatically, resulting in high customer satisfaction.

      MORAL OF THE STORY:

      Make sure that you understand which processes need to be reviewed in order to determine the cause for service instability. Focusing on the proactive processes was the right answer for this company.

      Have the right culture and structure in place before you become a service provider

      CASE STUDY

      Industry: Healthcare

      Source:Journal of American Medical Informatics Association

      Challenge

      • The IT organization wanted to build a service catalog to demonstrate the value of IT to the business.
      • IT was organized in technology silos and focused on applications, not business services.
      • IT services were not aligned with business activities.
      • Relationships with the business were not well established.

      Solution

      Original Plan

      • Create and publish a service catalog.

      Revised Plan: with Service Management Roadmap:

      • Establish relationships with key stakeholders in the business units.
      • Understand how business activities interface with IT services.
      • Lay the groundwork for the service catalog by defining services from the business perspective.

      Results

      • Strong relationships with the business units.
      • Deep understanding of how business activities map to IT services.
      • Service definitions that reflect how the business uses IT services.

      MORAL OF THE STORY:

      Before you build and publish a service catalog, make sure that you understand how the business is using the IT services that you provide.

      Calculate the benefits of using Info-Tech’s methodology

      To measure the value of developing your roadmap using the Info-Tech tools and methodology, you must calculate the effort saved by not having to develop the methods.

      A. How much time will it take to develop an industry-best roadmap using Info-Tech methodology and tools?

      Using Info-Tech’s tools and methodology you can accurately estimate the effort to develop a roadmap using industry-leading research into best practice.

      B. What would be the effort to develop the insight, assess your team, and develop the roadmap?

      This metric represents the time your team would take to be able to effectively assess themselves and develop a roadmap that will lead to service management excellence.

      C. Cost & time saving through Info-Tech’s methodology

      Measured Value

      Step 1: Assess current state

      Cost to assess current state:

      • 5 Directors + 10 Managers x 10 hours at $X an hour = $A

      Step 2: Build the roadmap

      Cost to create service management roadmap:

      • 5 Directors + 10 Managers x 8 hours at $X an hour = $B

      Step 3: Develop the communication slide

      Cost to create roadmaps for phases:

      • 5 Directors + 10 Managers x 6 hours at $X an hour = $C

      Potential financial savings from using Info-Tech resources:

      Estimated cost to do “B” – (Step 1 ($A) + Step 2 ($B) + Step 3 ($C)) = $Total Saving

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Create a Service Management Roadmap – project overview


      Launch the project

      Assess the current state

      Build the roadmap

      Build communication slide

      Best-Practice Toolkit

      1.1 Create a powerful, succinct mission statement

      1.2 Assemble a project team with representatives from all major IT teams

      1.3 Determine project stakeholders and create a communication plan

      1.4 Establish metrics to track the success of the project

      2.1 Assess impacting forces

      2.2 Build service management vision, mission, and values

      2.3 Assess attitudes, behaviors, and culture

      2.4 Assess governance

      2.5 Perform SWOT analysis

      2.6 Identify desired state

      2.7 Assess SM maturity

      2.8 Assess OCM capabilities

      3.1 Document overall themes

      3.2 List individual initiatives

      4.1 Document current state

      4.2 List future vision

      Guided Implementations

      • Kick-off the project
      • Build the project team
      • Complete the charter
      • Understand current state
      • Determine target state
      • Build the roadmap based on current and target state
      • Build short- and long-term visions and initiative list

      Onsite Workshop

      Module 1: Launch the project

      Module 2: Assess current service management maturity

      Module 3: Complete the roadmap

      Module 4: Complete the communication slide

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information

      Workshop Day 1

      Workshop Day 2

      Workshop Day 3

      Workshop Day 4

      Activities

      Understand Service Management

      1.1 Understand the concepts and benefits of service management.

      1.2 Understand the changing impacting forces that affect your ability to deliver services.

      1.3 Build a compelling vision and mission for your service management program.

      Assess the Current State of Your Service Management Practice

      2.1 Understand attitudes, behaviors, and culture.

      2.2 Assess governance and process ownership needs.

      2.3 Perform SWOT analysis.

      2.4 Define the desired state.

      Complete Current-State Assessment

      3.1 Conduct service management process maturity assessment.

      3.2 Identify organizational change management capabilities.

      3.3 Identify themes for roadmap.

      Build Roadmap and Communication Tool

      4.1 Build roadmap one-pager.

      4.2 Build roadmap communication one-pager.

      Deliverables

      1. Constraints and enablers chart
      2. Service management vision, mission, and values
      1. Action items for cultural improvements
      2. Action items for governance
      3. Identified improvements from SWOT
      4. Defined desired state
      1. Service Management Process Maturity Assessment
      2. Organizational Change Management Assessment
      1. Service management roadmap
      2. Roadmap Communication Tool in the Service Management Roadmap Presentation Template

      PHASE 1

      Launch the Project

      Launch the project

      This step will walk you through the following activities:

      • Create a powerful, succinct mission statement based on your organization’s goals and objectives.
      • Assemble a project team with representatives from all major IT teams.
      • Determine project stakeholders and create a plan to convey the benefits of this project.
      • Establish metrics to track the success of the project.

      Step Insights

      • The project leader should have a strong relationship with IT and business leaders to maximize the benefit of each initiative in the service management journey.
      • The service management roadmap initiative will touch almost every part of the organization; therefore, it is important to have representation from all impacted stakeholders.
      • The communication slide needs to include the organizational change impact of the roadmap initiatives.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Launch the Project

      Step 1.1 – Kick-off the Project

      Start with an analyst kick-off call:

      • Identify current organization pain points relating to poor service management practices
      • Determine high-level objectives
      • Create a mission statement

      Then complete these activities…

      • Identify potential team members who could actively contribute to the project
      • Identify stakeholders who have a vested interest in the completion of this project

      With these tools & templates:

      • Service Management Roadmap Project Charter

      Step 1.2 – Complete the Charter

      Review findings with analyst:

      • Create the project team; ensure all major IT teams are represented
      • Review stakeholder list and identify communication messages

      Then complete these activities…

      • Establish metrics to complete project planning
      • Complete the project charter

      With these tools & templates:

      • Service Management Roadmap Project Charter

      Use Info-Tech’s project charter to begin your initiative

      1.1 Service Management Roadmap Project Charter

      The Service Management Roadmap Project Charter is used to govern the initiative throughout the project. It provides the foundation for project communication and monitoring.

      The template has been pre-populated with sample information appropriate for this project. Please review this sample text and change, add, or delete information as required.

      The charter includes the following sections:

      • Mission Statement
      • Goals & Objectives
      • Project Team
      • Project Stakeholders
      • Current State (from phases 2 & 3)
      • Target State (from phases 2 & 3)
      • Target State
      • Metrics
      • Sponsorship Signature
      A screenshot of Info-Tech's Service Management Roadmap Project Charter is shown.

      Use Info-Tech’s ready-to-use deliverable to customize your mission statement

      Adapt and personalize Info-Tech’s Service Management Roadmap Mission Statement and Goals & Objectives below to suit your organization’s needs.

      Goals & Objectives

      • Create a plan for implementing service management initiatives that align with the overall goals/objectives for service management.
      • Identify service management initiatives that must be implemented/improved in the short term before deploying more advanced initiatives.
      • Determine the target state for each initiative based on current maturity and level of investment available.
      • Identify service management initiatives and understand dependencies, prerequisites, and level of effort required to implement.
      • Determine the sequence in which initiatives should be deployed.
      • Create a detailed rollout plan that specifies initiatives, time frames, and owners.
      • Engage the right teams and obtain their commitment throughout both the planning and assessment of roadmap initiatives.
      • both the planning and assessment of roadmap initiatives. Obtain support for the completed roadmap from executive stakeholders.

      Example Mission Statement

      To help [Organization Name] develop a set of service management practices that will better address the overarching goals of the IT department.

      To create a roadmap that sequences initiatives in a way that incorporates best practices and takes into consideration dependencies and prerequisites between service management practices.

      To garner support from the right people and obtain executive buy-in for the roadmap.

      Create a well-balanced project team

      The project leader should be a member of your IT department’s senior executive team with goals and objectives that will be impacted by service management implementation. The project leader should possess the following characteristics:

      Leader

      • Influence and impact
      • Comprehensive knowledge of IT and the organization
      • Relationship with senior IT management
      • Ability to get things done

      Team Members

      Identify

      The project team members are the IT managers and directors whose day-to-day lives will be impacted by the service management roadmap and its implementation. The service management initiative will touch almost every IT staff member in the organization; therefore, it is important to have representatives from every single group, including those that are not mentioned. Some examples of individuals you should consider for your team:

      • Service Delivery Managers
      • Director/Manager of Applications
      • Director/Manager of Infrastructure
      • Director/Manager of Service Desk
      • Business Relationship Managers
      • Project Management Office

      Engage & Communicate

      You want to engage your project participants in the planning process as much as possible. They should be involved in the current-state assessment, the establishment of goals and objectives, and the development of your target state.

      To sell this project, identify and articulate how this project and/or process will improve the quality of their job. For example, a formal incident management process will benefit people working at the service desk or on the applications or infrastructure teams. Helping them understand the gains will help to secure their support throughout the long implementation process by giving them a sense of ownership.

      The project stakeholders should also be project team members

      When managing stakeholders, it is important to help them understand their stake in the project as well as their own personal gain that will come out of this project.

      For many of the stakeholders, they also play a critical role in the development of this project.

      Role & Benefits

      • CIO
      • The CIO should be actively involved in the planning stage to help determine current and target stage.

        The CIO also needs to promote and sell the project to the IT team so they can understand that higher maturity of service management practices will allow IT to be seen as a partner to the business, giving IT a seat at the table during decision making.

      • Service Delivery Managers/Process Owners
      • Service Delivery Managers are directly responsible for the quality and value of services provided to the business owners. Thus, the Service Delivery Managers have a very high stake in the project and should be considered for the role of project leader.

        Service Delivery Managers need to work closely with the process owners of each service management process to ensure clear objectives are established and there is a common understanding of what needs to be achieved.

      • IT Steering Committee
      • The Committee should be informed and periodically updated about the progress of the project.

      • Manager/Director – Service Desk
      • The Manager of the Service Desk should participate closely in the development of fundamental service management processes, such as service desk, incident management, and problem management.

        Having a more established process in place will create structure, governance, and reduce service desk staff headaches so they can handle requests or incidents more efficiently.

      • Manager/Director –Applications & Infrastructure
      • The Manager of Applications and Infrastructure should be heavily relied on for their knowledge of how technology ties into the organization. They should be consulted regularly for each of the processes.

        This project will also benefit them directly, such as improving the process to deploy a fix into the environment or manage the capacity of the infrastructure.

      • Business Relationship Manager
      • As the IT organization moves up the maturity ladder, the Business Relationship Manager will play a fundamental role in the more advanced processes, such as business relationship management, demand management, and portfolio management.

        This project will be an great opportunity for the Business Relationship Manager to demonstrate their value and their knowledge of how to align IT objectives with business vision.

      Ensure you get the entire IT organization on board for the project with a well-practiced change message

      Getting the IT team on board will greatly maximize the project’s chance of success.

      One of the top challenges for organizations embarking on a service management journey is to manage the magnitude of the project. To ensure the message is not lost, communicate this roadmap in two steps.

      1. Communicate the roadmap initiative

      The most important message to send to the IT organization is that this project will benefit them directly. Articulate the pains that IT is currently experiencing and explain that through more mature service management, these pains can be greatly reduced and IT can start to earn a place at the table with the business.

      2. Communicate the implementation of each process separately

      The communication of process implementation should be done separately and at the beginning of each implementation. This is to ensure that IT staff do not feel overwhelmed or overloaded. It also helps to keep the project more manageable for the project team.

      Continuously monitor feedback and address concerns throughout the entire process

      • Host lunch and learns to provide updates on the service management initiative to the entire IT team.
      • Understand if there are any major roadblocks and facilitate discussions on how to overcome them.

      Articulate the service management initiative to the IT organization

      Spread the word and bring attention to your change message through effective mediums and organizational changes.

      Key aspects of a communication plan

      The methods of communication (e.g. newsletters, email broadcast, news of the day, automated messages) notify users of implementation.

      In addition, it is important to know who will deliver the message (delivery strategy). You need IT executives to deliver the message – work hard on obtaining their support as they are the ones communicating to their staff and should be your project champions.

      Anticipate organizational changes

      The implementation of the service management roadmap will most likely lead to organizational changes in terms of structure, roles, and responsibilities. Therefore, the team should be prepared to communicate the value that these changes will bring.

      Communicating Change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • What are we trying to achieve?
      • How often will we be updated?

      The Qualities of Leadership: Leading Change

      Create a project communication plan for your stakeholders

      This project cannot be successfully completed without the support of senior IT management.

      1. After the CIO has introduced this project through management meetings or informal conversation, find out how each IT leader feels about this project. You need to make sure the directors and managers of each IT team, especially the directors of application and infrastructure, are on board.
      2. After the meeting, the project leader should seek out the major stakeholders (particularly the heads of applications and infrastructure) and validate their level of support through formal or informal meetings. Create a list documenting the major stakeholders, their level of support, and how the project team will work to gain their approval.
      3. For each identified stakeholder, create a custom communication plan based on their role. For example, if the director of infrastructure is not a supporter, demonstrate how this project will enable them to better understand how to improve service quality. Provide periodic reporting or meetings to update the director on project progress.

      INPUT

      • A collaborative discussion between team members

      OUTPUT

      • Thorough briefing for project launch
      • A committed team

      Materials

      • Communication message and plan
      • Metric tracking

      Participants

      • Project leader
      • Core project team

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1

      A screenshot of activity 1.1 is shown.

      Create a powerful, succinct mission statement

      Using Info-Tech’s sample mission statement as a guide, build your mission statement based on the objectives of this project and the benefits that this project will achieve. Keep the mission statement short and clear.

      1.2

      A screenshot of activity 1.2 is shown.

      Assemble the project team

      Create a project team with representatives from all major IT teams. Engage and communicate to the project team early and proactively.

      1.3

      A screenshot of activity 1.3 is shown.

      Identify project stakeholders and create a communication plan

      Info-Tech will help you identify key stakeholders who have a vested interest in the success of the project. Determine the communication message that will best gain their support.

      1.4

      A screenshot of activity 1.4 is shown.

      Use metrics to track the success of the project

      The onsite analyst will help the project team determine the appropriate metrics to measure the success of this project.

      PHASE 2

      Assess Your Current Service Management State

      Assess your current state

      This step will walk you through the following activities:

      • Use Info-Tech’s Service Management Maturity Assessment Tool to determine your overall practice maturity level.
      • Understand your level of completeness for each individual practice.
      • Understand the three major phases involved in the service management journey; know the symptoms of each phase and how they affect your target state selection.

      Step Insights

      • To determine the real maturity of your service management practices, you should focus on the results and output of the practice, rather than the activities performed for each process.
      • Focus on phase-level maturity as opposed to the level of completeness for each individual process.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Determine Your Service Management Current State

      Step 2.1 – Assess Impacting Forces

      Start with an analyst kick-off call:

      • Discuss the impacting forces that can affect the success of your service management program
      • Identify internal and external constraints and enablers
      • Review and interpret how to leverage or mitigate these elements

      Then complete these activities…

      • Present the findings of the organizational context
      • Facilitate a discussion and create consensus amongst the project team members on where the organization should start

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.2 – Build Vision, Mission, and Values

      Review findings with analyst:

      • Review your service management vision and mission statement and discuss the values

      Then complete these activities…

      • Socialize the vision, mission, and values to ensure they are aligned with overall organizational vision. Then, set the expectations for behavior aligned with the vision, mission, and values

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.3 – Assess Attitudes, Behaviors, and Culture

      Review findings with analyst:

      • Discuss tactics for addressing negative attitudes, behaviors, or culture identified

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.4 – Assess Governance Needs

      Review findings with analyst:

      • Understand the typical types of governance structure and the differences between management and governance
      • Choose the management structure required for your organization

      Then complete these activities…

      • Determine actions required to establish an effective governance structure and add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.5 – Perform SWOT Analysis

      Review findings with analyst:

      • Discuss SWOT analysis results and tactics for addressing within the roadmap

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.6 – Identify Desired State

      Review findings with analyst:

      • Discuss desired state and commitment needed to achieve aspects of the desired state

      Then complete these activities…

      • Use the desired state to critically assess the current state of your service management practices and whether they are achieving the desired outcomes
      • Prep for the SM maturity assessment

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.7 – Perform SM Maturity Assessment

      Review findings with analyst:

      • Review and interpret the output from your service management maturity assessment

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Service Management Maturity Assessment

      Step 2.8 – Review OCM Capabilities

      Review findings with analyst:

      • Review and interpret the output from your organizational change management maturity assessment

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Organizational Change Management Assessment

      Understand and assess impacting forces – constraints and enablers

      Constraints and enablers are organizational and behavioral triggers that directly impact your ability and approach to establishing Service Management practices.

      A model is shown to demonstrate the possibe constraints and enablers on your service management program. It incorporates available resources, the environment, management practices, and available technologies.

      Effective service management requires a mix of different approaches and practices that best fit your organization. There’s not a one-size-fits-all solution. Consider the resources, environment, emerging technologies, and management practices facing your organization. What items can you leverage or use to mitigate to move your service management program forward?

      Use Info-Tech’s “Organizational Context” template to list the constraints and enablers affecting your service management

      The Service Management Roadmap Presentation Template will help you understand the business environment you need to consider as you build out your roadmap.

      Discuss and document constraints and enablers related to the business environment, available resources, management practices, and emerging technologies. Any constraints will need to be addressed within your roadmap and enablers should be leveraged to maximize your results.


      Screenshot of Info-Tech's Service Management Roadmap Presentation Template is shown.

      Document constraints and enablers

      1. Discuss and document the constrains and enablers for each aspect of the management mesh: environment, resources, management practices, or technology.
      2. Use this as a thought provoker in later exercises.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Organizational context constraints and enablers

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      Build compelling vision and mission statements to set the direction of your service management program

      While you are articulating the vision and mission, think about the values you want the team to display. Being explicit can be a powerful tool to create alignment.

      A vision statement describes the intended state of your service management organization, expressed in the present tense.

      A mission statement describes why your service management organization exists.

      Your organizational values state how you will deliver services.

      Use Info-Tech’s “Vision, Mission, and Values” template to set the aspiration & purpose of your service management practice

      The Service Management Roadmap Presentation Template will help you document your vision for service management, the purpose of the program, and the values you want to see demonstrated.

      If the team cannot gain agreement on their reason for being, it will be difficult to make traction on the roadmap items. A concise and compelling statement can set the direction for desired behavior and help team members align with the vision when trying to make ground-level decisions. It can also be used to hold each other accountable when undesirable behavior emerges. It should be revised from time to time, when the environment changes, but a well-written statement should stand the test of time.

      A screenshot of the Service Management Roadmap Presentation Temaplate is shown. Specifically it is showing the section on the vision, mission, and values results.

      Document your organization’s vision, mission , and values

      1. Vision: Identify your desired target state, consider the details of that target state, and create a vision statement.
      2. Mission: Consider the fundamental purpose of your SM program and craft a statement of purpose.
      3. Values: As you work through the vision and mission, identify values that your organization prides itself in or has the aspiration for.
      4. Discuss common themes and then develop a concise vision statement and mission statement that incorporates the group’s ideas.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Vision statement
      • Mission statement
      • Organizational values

      Materials

      • Whiteboards or flip charts
      • Sample vision and mission statements

      Participants

      • All stakeholders
      • Senior leadership

      Understanding attitude, behavior, and culture

      Attitude

      • What people think and feel. It can be seen in their demeanor and how they react to change initiatives, colleagues, and users.

      Any form of organizational change involves adjusting people’s attitudes, creating buy-in and commitment. You need to identify and address attitudes that can lead to negative behaviors and actions or that are counter-productive. It must be made visible and related to your desired behavior.

      Behaviour

      • What people do. This is influenced by attitude and the culture of the organization.

      To implement change within IT, especially at a tactical level, both IT and organizational behavior needs to change. This is relevant because people don’t like to change and will resist in an active or passive way unless you can sell the need, value, and benefit of changing their behavior.

      Culture

      • The accepted and understood ways of working in an organization. The values and standards that people find normal and what would be tacitly identified to new resources.

      The organizational or corporate “attitude,” the impact on employee behavior and attitude is often not fully understood. Culture is an invisible element, which makes it difficult to identify, but it has a strong impact and must be addressed to successfully embed any organizational change or strategy.

      Culture is a critical and under-addressed success factor

      43% of CIOs cited resistance to change as the top impediment to a successful digital strategy.

      CIO.com

      75% of organizations cannot identify or articulate their culture or its impact.

      Info-Tech

      “Shortcomings in organizational culture are one of the main barriers to company success in the digital age.”

      McKinsey – “Culture for a digital age”

      Examples of how they apply

      Attitude

      • “I’ll believe that when I see it”
      • Positive outlook on new ideas and changes

      Behaviour

      • Saying you’ll follow a new process but not doing so
      • Choosing not to document a resolution approach or updating a knowledge article, despite being asked

      Culture

      • Hero culture (knowledge is power)
      • Blame culture (finger pointing)
      • Collaborative culture (people rally and work together)

      Why have we failed to address attitude, behavior, and culture?

        ✓ While there is attention and better understanding of these areas, very little effort is made to actually solve these challenges.

        ✓ The impact is not well understood.

        ✓ The lack of tangible and visible factors makes it difficult to identify.

        ✓ There is a lack of proper guidance, leadership skills, and governance to address these in the right places.

        ✓ Addressing these issues has to be done proactively, with intent, rigor, and discipline, in order to be successful.

        ✓ We ignore it (head in the sand and hoping it will fix itself).

      Avoidance has been a common strategy for addressing behavior and culture in organizations.

      Use Info-Tech’s “Culture and Environment” template to identify cultural constraints that should be addressed in roadmap

      The Service Management Roadmap Presentation Template will help you document attitude, behavior, and culture constraints.

      Discuss as a team attitudes, behaviors, and cultural aspects that can either hinder or be leveraged to support your vision for the service management program. Capture all items that need to be addressed in the roadmap.

      A screenshot of the Service Management Roadmap Presentation Template is shown. Specifically showing the culture and environment slide.

      Document your organization’s attitudes, behaviors, and culture

      1. Discuss and document positive and negative aspects of attitude, behavior, or culture within your organization.
      2. Identify the items that need to be addressed as part of your roadmap.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Culture and environment worksheet

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      The relationship to governance

      Attitude, behavior, and culture are still underestimated as core success factors in governance and management.

      Behavior is a key enabler of good governance. Leading by example and modeling behavior has a cascading impact on shifting culture, reinforcing the importance of change through adherence.

      Executive leadership and governing bodies must lead and support cultural change.

      Key Points

      • Less than 25% of organizations have formal IT governance in place (ITSM Tools).
      • Governance tends to focus on risk and compliance (controls), but forgets the impact of value and performance.

      Lack of oversight often limits the value of service management implementations

      Organizations often fail to move beyond risk mitigation, losing focus of the goals of their service management practices and the capabilities required to produce value.

      Risk Mitigation

      • Stabilize IT
      • Service Desk
      • Incident Management
      • Change Management

      Gap

      • Organizational alignment through governance
      • Disciplined focus on goals of SM

      Value Production

      • Value that meets business and consumer needs

      This creates a situation where service management activities and roadmaps focus on adjusting and tweaking process areas that no longer support how the organization needs to work.

      How does establishing governance for service management provide value?

      Governance of service management is a gap in most organizations, which leads to much of the failure and lack of value from service management processes and activities.

      Once in place, effective governance enables success for organizations by:

      1. Ensuring service management processes improve business value
      2. Measuring and confirming the value of the service management investment
      3. Driving a focus on outcome and impact instead of simply process adherence
      4. Looking at the integrated impact of service management in order to ensure focused prioritization of work
      5. Driving customer-experience focus within organizations
      6. Ensuring quality is achieved and addressing quality impacts and dependencies between processes

      Four common service management process ownership models

      Your ownership structure largely defines how processes will need to be implemented, maintained, and improved. It has a strong impact on their ability to integrate and how other teams perceive their involvement.

      An organizational structure is shown. In the image is an arrow, with the tip facing in the right direction. The left side of the arrow is labelled: Traditional, and the right side is labelled: Complex. The four models are noted along the arrow. Starting on the left side and going to the right are: Distributed Process Ownership, Centralized Process Ownership, Federated Process Ownership, and Service Management Office.

      Most organizations are somewhere within this spectrum of four core ownership models, usually having some combination of shared traits between the two models that are closest to them on the scale.

      Info-Tech Insight

      The organizational structure that is best for you depends on your needs, and one is not necessarily better than another. The next four slides describe when each ownership level is most appropriate.

      Distributed process ownership

      Distributed process ownership is usually evident when organizations initially establish their service management practices. The processes are assigned to a specific group, who assumes some level of ownership over its execution.

      The distributed process ownership model is shown. CIO is listed at the top with four branches leading out from below it. The four branches are labelled: Service Desk, Operations, Applications, and Security.

      Info-Tech Insight

      This model is often a suitable approach for initial implementations or where it may be difficult to move out of siloes within the organization’s structure or culture.

      Centralized process ownership

      Centralized process ownership usually becomes necessary for organizations as they move into a more functional structure. It starts to drive management of processes horizontally across the organization while still retaining functional management control.

      A centralized process ownership model is shown. The CIO is at the top and the following are branches below it: Service Manager, Support, Middleware, Development, and Infrastructure.

      Info-Tech Insight

      This model is often suitable for maturing organizations that are starting to look at process integration and shared service outcomes and accountability.

      Federated process ownership

      Federated process ownership allows for global control and regional variation, and it supports product orientation and Agile/DevOps principles

      A federated process ownership model is shown. The Sponsor/CIO is at the top, with the ITSM Executive below it. Below that level is the: Process Owner, Process Manager, and Process Manager.

      Info-Tech Insight

      Federated process ownership is usually evident in organizations that have an international or multi-regional presence.

      Service management office (SMO)

      SMO structures tend to occur in highly mature organizations, where service management responsibility is seen as an enterprise accountability.

      A service management office model is shown. The CIO is at the top with the following branches below it: SMO, End-User Services, Infra., Apps., and Architecture.

      Info-Tech Insight

      SMOs are suitable for organizations with a defined IT and organizational strategy. A SMO supports integration with other enterprise practices like enterprise architecture and the PMO.

      Determine which process ownership and governance model works best for your organization

      The Service Management Roadmap Presentation Template will help you document process ownership and governance model

      Example:

      Key Goals:

        ☐ Own accountability for changes to core processes

        ☐ Understand systemic nature and dependencies related to processes and services

        ☐ Approve and prioritize improvement and CSI initiatives related to processes and services

        ☐ Evaluate success of initiative outcomes based on defined benefits and expectations

        ☐ Own Service Management and Governance processes and policies

        ☐ Report into ITSM executive or equivalent body

      Membership:

        ☐ Process Owners, SM Owner, Tool Owner/Liaison, Audit

      Discuss as a team which process ownership model works for your organization. Determine who will govern the service management practice. Determine items that should be identified in your roadmap to address governance and process ownership gaps.

      Use Info-Tech’s “SWOT” template to identify strengths, weaknesses, opportunities & threats that should be addressed

      The Service Management Roadmap Presentation Template will help you document items from your SWOT analysis.

      A screenshot of the Service Management Roadmap Presentation Template is shown. Specifically the SWOT section is shown.

      Brainstorm the strengths, weaknesses, opportunities, and threats related to resources, environment, technology, and management practices. Add items that need to be addressed to your roadmap.

      Perform a SWOT analysis

      1. Brainstorm each aspect of the SWOT with an emphasis on:
      • Resources
      • Environment
      • Technologies
      • Management Practices
    • Record your ideas on a flip chart or whiteboard.
    • Add items to be addressed to the roadmap.
    • INPUT

      • A collaborative discussion

      OUTPUT

      • SWOT analysis
      • Priority items identified

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      Indicate desired maturity level for your service management program to be successful

      Discuss the various maturity levels and choose a desired level that would meet business needs.

      The desired maturity model is depicted.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Desired state of service management maturity

      Materials

      • None

      Participants

      • All stakeholders

      Use Info-Tech’s Service Management Process Maturity Assessment Tool to understand your current state

      The Service Management Process Maturity Assessment Tool will help you understand the true state of your service management.

      A screenshot of Info-Tech's Service Management Process Assessment Tool is shown.

      Part 1, Part 2, and Part 3 tabs

      These three worksheets contain questions that will determine the overall maturity of your service management processes. There are multiple sections of questions focused on different processes. It is very important that you start from Part 1 and continue the questions sequentially.

      Results tab

      The Results tab will display the current state of your service management processes as well as the percentage of completion for each individual process.

      Complete the service management process maturity assessment

      The current-state assessment will be the foundation of building your roadmap, so pay close attention to the questions and answer them truthfully.

      1. Start with tab 1 in the Service Management Process Maturity Assessment Tool. Remember to read the questions carefully and always use the feedback obtained through the end-user survey to help you determine the answer.
      2. In the “Degree of Process Completeness” column, use the drop-down menu to input the results solicited from the goals and objectives meeting you held with your project participants.
      3. A screenshot of Info-Tech's Service Management Process Assessment Tool is shown. Tab 1 is shown.
      4. Host a meeting with all participants following completion of the survey and have them bring their results. Discuss in a round-table setting, keeping a master sheet of agreed upon results.

      INPUT

      • Service Management Process Maturity Assessment Tool questions

      OUTPUT

      • Determination of current state

      Materials

      • Service Management Process Maturity Assessment Tool

      Participants

      • Project team members

      Review the results of your current-state assessment

      At the end of the assessment, the Results tab will have action items you could perform to close the gaps identified by the process assessment tool.

      A screenshot of Info-Tech's Service Management Process Maturity Assessment Results is shown.

      INPUT

      • Maturity assessment results

      OUTPUT

      • Determination of overall and individual practice maturity

      Materials

      • Service Management Maturity Assessment Tool

      Participants

      • Project team members

      Use Info-Tech’s OCM Capability Assessment tool to understand your current state

      The Organizational Change Management Capabilities Assessment tool will help you understand the true state of your organizational change management capabilities.

      A screenshot of Info-Tech's Organizational Change Management Capabilities Assessment

      Complete the Capabilities tab to capture the current state for organizational change management. Review the Results tab for interpretation of the capabilities. Review the Recommendations tab for actions to address low areas of maturity.

      Complete the OCM capability assessment

      1. Open Organizational Change Management Capabilities Assessment tool.
      2. Come to consensus on the most appropriate answer for each question. Use the 80/20 rule.
      3. Review result charts and discuss findings.
      4. Identify roadmap items based on maturity assessment.

      INPUT

      • A collaborative discussion

      OUTPUT

      • OCM Assessment tool
      • OCM assessment results

      Materials

      • OCM Capabilities Assessment tool

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1

      A screenshot of activity 2.1 is shown.

      Create a powerful, succinct mission statement

      Using Info-Tech’s sample mission statement as a guide, build your mission statement based on the objectives of this project and the benefits that this project will achieve. Keep the mission statement short and clear.

      2.2

      A screenshot of activity 2.2 is shown.

      Complete the assessment

      With the project team in the room, go through all three parts of the assessment with consideration of the feedback received from the business.

      2.3

      A screenshot of activity 2.3 is shown.

      Interpret the results of the assessment

      The Info-Tech onsite analyst will facilitate a discussion on the overall maturity of your service management practices and individual process maturity. Are there any surprises? Are the results reflective of current service delivery maturity?

      PHASE 3

      Build Your Service Management Roadmap

      Build Roadmap

      This step will walk you through the following activities:

      • Document your vision and mission on the roadmap one-pager.
      • Using the inputs from the current-state assessments, identify the key themes required by your organization.
      • Identify individual initiatives needed to address key themes.

      Step Insights

      • Using the Info-Tech thought model, address foundational gaps early in your roadmap and establish the management methods to continuously make them more robust.
      • If any of the core practices are not meeting the vision for your service management program, be sure to address these items before moving on to more advanced service management practices or processes.
      • Make sure the story you are telling with your roadmap is aligned to the overall organizational goals.

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Determine Your Service Management Target State

      Step 3.1 – Document the Overall Themes

      Start with an analyst kick-off call:

      • Review the outputs from your current-state assessments to identify themes for areas that need to be included in your roadmap

      Then complete these activities…

      • Ensure foundational elements are solid by adding any gaps to the roadmap
      • Identify any changes needed to management practices to ensure continuous improvement

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 3.2 – Determine Individual Initiatives

      Review findings with analyst:

      • Determine the individual initiatives needed to close the gaps between the current state and the vision

      Then complete these activities…

      • Finalize and document roadmap for executive socialization

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Focus on a strong foundation to build higher value service management practices

      Info-Tech Insight

      Focus on behaviors and expected outcomes before processes.

      Foundational elements

      • Operating model facilitates service management goals
      • Culture of service delivery
      • Governance discipline to evaluate, direct, and monitor
      • Management discipline to deliver

      Stabilize

      • Deliver stable, reliable IT services to the business
      • Respond to user requests quickly and efficiently
      • Resolve user issues in a timely manner
      • Deploy changes smoothly and successfully

      Proactive

      • Avoid/prevent service disruptions
      • Improve quality of service (performance, availability, reliability)

      Service Provider

      • Understand business needs
      • Ensure services are available
      • Measure service performance, based on business-oriented metrics

      Strategic Partner

      • Fully aligned with business
      • Drive innovation
      • Drive measurable value

      Info-Tech Insight

      Continued leadership support of the foundational elements will allow delivery teams to provide value to the business. Set the expectation of the desired maturity level and allow teams to innovate.

      Identify themes that can help you build a strong foundation before moving to higher level practices

      A model is depicted that shows the various target states. There are 6 levels showing in the example, and the example is made to look like a tree with a character watering it. In the roots, the level is labelled foundational. The trunk is labelled the core. The lowest hanging branches of the tree is the stabilize section. Above it is the proactive section. Nearing the top of the tree is the service provider. The top most branches of the tree is labelled strategic partner.

      Before moving to advanced service management practices, you must ensure that the foundational and core elements are robust enough to support them. Leadership must nurture these practices to ensure they are sustainable and can support higher value, more mature practices.

      Use Info-Tech’s “Service Management Roadmap” template to document your vision, themes and initiatives

      The Service Management Roadmap Presentation Template contains a roadmap template to help communicate your vision, themes to be addressed, and initiatives

      A screenshot of Info-Tech's Service Management Roadmap template is shown.

      Working from the lower maturity items to the higher value practices, identify logical groupings of initiatives into themes. This will aid in communicating the reasons for the needed changes. List the individual initiatives below the themes. Adding the service management vision and mission statements can help readers understand the roadmap.

      Document your service management roadmap

      1. Document the service management vision and mission on the roadmap template.
      2. Identify, from the assessments, areas that need to be improved or implemented.
      3. Group the individual initiatives into logical themes that can ease communication of what needs to happen.
      4. Document the individual initiatives.
      5. Document in terms that business partners and executive sponsors can understand.

      INPUT

      • Current-state assessment outputs
      • Maturity model

      OUTPUT

      • Service management roadmap

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1

      A screenshot of activity 3.1 is shown.

      Identify themes to address items from the foundational level up to higher value service management practices

      Identify easily understood themes that will help others understand the expected outcomes within your organization.

      A screenshot of activity 3.2 is shown.

      Document individual initiatives that contribute to the themes

      Identify specific activities that will close gaps identified in the assessments.

      PHASE 2

      Build Communication Slide

      Complete your service management roadmap

      This step will walk you through the following activities:

      • Use the current-state assessment exercises to document the state of your service management practices. Document examples of the behaviors that are currently seen.
      • Document the expected short-term gains. Describe how you want the behaviors to change.
      • Document the long-term vision for each item and describe the benefits you expect to see from addressing each theme.

      Step Insights

      • Use the communication template to acknowledge the areas that need to be improved and paint the short- and long-term vision for the improvements to be made through executing the roadmap.
      • Write it in business terms so that it can be used widely to gain acceptance of the upcoming changes that need to occur.
      • Include specific areas that need to be fixed to make it more tangible.
      • Adding the values from the vision, mission, and values exercise can also help you set expectations about how the team will behave as they move towards the longer-term vision.

      Phase 4 Outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Build the Service Management Roadmap

      Step 4.1: Document the Current State

      Start with an analyst kick-off call:

      • Review the pain points identified from the current state analysis
      • Discuss tactics to address specific pain points

      Then complete these activities…

      • Socialize the pain points within the service delivery teams to ensure nothing is being misrepresented
      • Gather ideas for the future state

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 4.2: List the Future Vision

      Review findings with analyst:

      • Review short- and long-term vision for improvements for the pain points identified in the current state analysis

      Then complete these activities…

      • Prepare to socialize the roadmap
      • Ensure long-term vision is aligned with organizational objectives

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Use Info-Tech’s “Service Management Roadmap – Brought to Life” template to paint a picture of the future state

      The Service Management Roadmap Presentation Template contains a communication template to help communicate your vision of the future state

      A screenshot of Info-Tech's Service Management Roadmap - Brought to Life template

      Use this template to demonstrate how existing pain points to delivering services will improve over time by painting a near- and long-term picture of how things will change. Also list specific initiatives that will be launched to affect the changes. Listing the values identified in the vision, mission, and values exercise will also demonstrate the team’s commitment to changing behavior to create better outcomes.

      Document your current state and list initiatives to address them

      1. Use the previous assessments and feedback from business or customers to identify current behaviors that need addressing.
      2. Focus on high-impact items for this document, not an extensive list.
      3. An example of step 1 and 2 are shown.
      4. List the initiatives or actions that will be used to address the specific pain points.

      An example of areas for improvement.

      INPUT

      • Current-state assessment outputs
      • Feedback from business

      OUTPUT

      • Service Management Roadmap Communication Tool, in the Service Management Roadmap Presentation

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      Document your future state

      An example of document your furture state is shown.

      1. For each pain point document the expected behaviors, both short term and longer term.
      2. Write in terms that allow readers to understand what to expect from your service management practice.

      INPUT

      • Current-state assessment outputs
      • Feedback from business

      OUTPUT

      • Service Management Roadmap Communication Tool, in the Service Management Roadmap Presentation Template

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.1

      A screenshot of activity 4.1 is shown.

      Identify the pain points and initiatives to address them

      Identify items that the business can relate to and initiatives or actions to address them.

      4.2

      A screenshot of activity 4.2 is shown.

      Identify short- and long-term expectations for service management

      Communicate the benefits of executing the roadmap both short- and long-term gains.

      Research contributors and experts

      Photo of Valence Howden

      Valence Howden, Principal Research Director, CIO Practice

      Info-Tech Research Group

      Valence helps organizations be successful through optimizing how they govern, design, and execute strategies, and how they drive service excellence in all work. With 30 years of IT experience in the public and private sectors, he has developed experience in many information management and technology domains, with focus in service management, enterprise and IT governance, development and execution of strategy, risk management, metrics design and process design, and implementation and improvement.

      Photo of Graham Price

      Graham Price, Research Director, CIO Practice

      Info-Tech Research Group

      Graham has an extensive background in IT service management across various industries with over 25 years of experience. He was a principal consultant for 17 years, partnering with Fortune 500 clients throughout North America, leveraging and integrating industry best practices in IT service management, service catalog, business relationship management, IT strategy, governance, and Lean IT and Agile.

      Photo of Sharon Foltz

      Sharon Foltz, Senior Workshop Director

      Info-Tech Research Group

      Sharon is a Senior Workshop Director at Info-Tech Research Group. She focuses on bringing high value to members via leveraging Info-Tech’s blueprints and other resources enhanced with her breadth and depth of skills and expertise. Sharon has spent over 15 years in various IT roles in leading companies within the United States. She has strong experience in organizational change management, program and project management, service management, product management, team leadership, strategic planning, and CRM across various global organizations.

      Related Info-Tech Research

      Build a Roadmap for Service Management Agility

      Extend the Service Desk to the Enterprise

      Bibliography

      • “CIOs Emerge as Disruptive Innovators.” CSC Global CIO Survey: 2014-2015. Web.
      • “Digital Transformation: How Is Your Organization Adapting?” CIO.com, 2018. Web.
      • Goran, Julie, Laura LaBerge, and Ramesh Srinivasan. “Culture for a digital age.” McKinsey, July 2017. Web.
      • The Qualities of Leadership: Leading Change. Cornelius & Associates, 14 April 2012.
      • Wilkinson, Paul. “Culture, Ethics, and Behavior – Why Are We Still Struggling?” ITSM Tools, 5 July 2018. Web.

      Build IT Capabilities to Enable Digital Marketing Success

      • Buy Link or Shortcode: {j2store}553|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Misalignment: Even if IT builds the capabilities to pursue digital channels, the channels will underperform in realizing organizational goals if the channels and the goals are misaligned.
      • Ineffective analytics: Failure to integrate and analyze new data will undermine organizational success in influencer and sentiment identification.
      • Missed opportunity: If IT does not develop the capabilities to support these channels, then lead generation, brand promotion, and engagement opportunities will be lost.
      • Lack of control: Marketing is developing and depending on internal power users and agencies. This practice can isolate IT from digital marketing technology decision making.

      Our Advice

      Critical Insight

      • Identify and understand the digital marketing channels that can benefit your organization.
      • Get stakeholder buy-in to facilitate collaboration between IT and product marketing groups to identify necessary IT capabilities.
      • Build IT capability by purchasing software, outsourcing, and training or hiring individuals with necessary skillsets.
      • Become transformational: use IT capabilities to support analytics that identify new customer segments, key influencers, and other invaluable insights.
      • Time is of the essence! It is easier to begin strengthening the relationship between marketing and IT today then it will be at any point in the future.
      • Being transformational means more than just enabling the channels marketing wants to pursue; IT must assist in identifying new segments and digital marketing opportunities, such as enabling influencer management.

      Impact and Result

      • IT is involved in decision making and has a complete understanding of the digital channels the organization is going to migrate to or phase out if unused.
      • IT has the necessary capabilities to support and enable success in all relevant digital channel management technologies.
      • IT is a key player in ensuring that all relevant data from new digital channels is managed and analyzed in order to maintain a 360 degree view of customers and feed real-time campaigns.
      • This enables the organization to not only target existing segments effectively, but also to identify and pursue new opportunities not presented before.
      • These opportunities include: identifying new segments among social networks, identifying key influencers as a new target, identifying proactive service and marketing opportunities from the public social cloud, and conducting new competitive analyses on the public social cloud.

      Build IT Capabilities to Enable Digital Marketing Success Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the case for building IT capabilities

      Identify the symptoms of inadequate IT support of digital marketing to diagnose the problems in your organization.

      • Storyboard: Build IT Capabilities to Enable Digital Marketing Success

      2. Identify digital marketing opportunities to understand the need for action in your organization

      Identify the untapped digital marketing value in your organization to understand where your organization needs to improve.

      • Digital Marketing Capability Builder Tool

      3. Mobilize for action: get stakeholder buy-in

      Develop a plan for communicating with stakeholders to ensure buy-in to the digital marketing capability building project.

      • Digital Marketing Communication Deck

      4. Identify the product/segment-specific digital marketing landscape to identify required IT capabilities

      Assess how well each digital channel reaches target segments. Identify the capabilities that must be built to enable digital channels.

      5. Create a roadmap for building capabilities to enable digital marketing

      Assess the people, processes, and technologies required to build required capabilities and determine the best fit with your organization.

      [infographic]

      Workshop: Build IT Capabilities to Enable Digital Marketing Success

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Digital Marketing Opportunities

      The Purpose

      Determine the fit of each digital channel with your organizational goals.

      Determine the fit of digital channels with your organizational structure and business model.

      Compare the fit of digital channels with your organization’s current levels of use to:Identify missed opportunities your organization should capitalize on.Identify digital channels that your organization is wasting resources on.

      Identify missed opportunities your organization should capitalize on.

      Identify digital channels that your organization is wasting resources on.

      Key Benefits Achieved

      IT department achieves consensus around which opportunities need to be pursued.

      Understanding that continuing to pursue excellent-fit digital channels that your organization is currently active on is a priority.

      Identification of the channels that stopping activity on could free up resources for.

      Activities

      1.1 Define and prioritize organizational goals.

      1.2 Assess digital channel fit with goals and organizational characteristics.

      1.3 Identify missed opportunities and wasted resources in your digital channel mix.

      1.4 Brainstorm creative ways to pursue untapped digital channels.

      Outputs

      Prioritized list of organizational goals.

      Assigned level of fit to digital channels.

      List of digital channels that represent missed opportunities or wasted resources.

      List of brainstormed ideas for pursuing digital channels.

      2 Identify Your Product-Specific Digital Marketing Landscape

      The Purpose

      Identify the digital channels that will be used for specific products and segments.

      Identify the IT capabilities that must be built to enable digital channels.

      Prioritize the list of IT capabilities.

      Key Benefits Achieved

      IT and marketing achieve consensus around which digital channels will be pursued for specific product-segment pairings.

      Identification of the capabilities that IT must build.

      Activities

      2.1 Assess digital channel fit with specific products.

      2.2 Identify the digital usage patterns of target segments.

      2.3 Decide precisely which digital channels you will use to sell specific products to specific segments.

      2.4 Identify and prioritize the IT capabilities that need to be built to succeed on each digital channel.

      Outputs

      Documented channel fit with products.

      Documented channel usage by target segments.

      Listed digital channels that will be used for each product-segment pairing.

      Listed and prioritized capabilities that must be built to enable success on necessary digital channels.

      3 Enable Digital Marketing Capabilities and Leverage Analytics

      The Purpose

      Identification of the best possible way to build IT capabilities for all channels.

      Creation of a plan for leveraging transformational analytics to supercharge your digital marketing strategy.

      Key Benefits Achieved

      IT understanding of the costs and benefits of capability building options (people, process, and technology).

      Information about how specific technology vendors could fit with your organization.

      IT identification of opportunities to leverage transformational analytics in your organization.

      Activities

      3.1 Identify the gaps in your IT capabilities.

      3.2 Evaluate options for building capabilities.

      3.3 Identify opportunities for transformational analytics.

      Outputs

      A list of IT capability gaps.

      An action plan for capability building.

      A plan for leveraging transformational analytics.

      Map Your Business Architecture to Define Your Strategy

      • Buy Link or Shortcode: {j2store}579|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $357,799 Average $ Saved
      • member rating average days saved: 30 Average Days Saved
      • Parent Category Name: Strategy & Operating Model
      • Parent Category Link: /strategy-and-operating-model
      • Organizations need to innovate rapidly to respond to the changing forces in their industry, but their IT initiatives often fail to deliver meaningful outcomes.
      • Planners face challenges in understanding the relationships between the important customer-focused innovations they’re trying to introduce and the resources (capabilities) that make them possible, including applications, human resources, information, and processes. For example, are we risking the success of a new service offering by underpinning it with a legacy or manual solution?

      Our Advice

      Critical Insight

      Successful execution of business strategy requires planning that:

      1. Accurately reflects organizational capabilities.
      2. Is traceable so all levels can understand how decisions are made.
      3. Makes efficient use of organizational resources.

      To accomplish this, the business architect must engage stakeholders, model the business, and drive planning with business architecture.

      • Business architecture is often regarded as an IT function when its role and tools should be fixtures within the business planning and innovation practice.
      • Any size of organization – from start-ups to global enterprises -- can benefit from using a common language and modeling rigor to identify the opportunities that will produce the greatest impact and value.
      • You don’t need sophisticated modeling software to build an effective business architecture knowledgebase. In fact, the best format for engaging business stakeholders is intuitive visuals using business language.

      Impact and Result

      • Execute more quickly on innovation and transformation initiatives.
      • More effectively target investments in resources and IT according to what goals and requirements are most important.
      • Identify problematic areas (e.g. legacy applications, manual processes) that hinder the business strategy and create inefficiencies in our information technology operation.

      Map Your Business Architecture to Define Your Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Map Your Business Architecture Deck – A step-by-step document that walks you through how to properly engage business and IT in applying a common language and process rigor to build key capabilities required to achieve innovation and growth goals.

      Build a structured, repeatable framework for both IT and business stakeholders to appraise the activities that deliver value to consumers; and assess the readiness of their capabilities to enable them.

      • Map Your Business Architecture to Define Your Strategy – Phases 1-3

      2. Stakeholder Engagement Strategy Template – A best-of-breed template to help you build a clear, concise, and compelling strategy document for identifying and engaging stakeholders.

      This template helps you ensure that your business architecture practice receives the resources, visibility, and support it needs to be successful, by helping you develop a strategy to engage the key stakeholders involved.

      • Stakeholder Engagement Strategy Template

      3. Value Stream Map Template – A template to walk through the value streams that are tied to your strategic goals.

      Record the complete value stream and decompose it into stages. Add a description of the expected outcome of the value stream and metrics for each stage.

      • Value Stream Map Template

      4. Value Stream Capability Mapping Template – A template to define capabilities and align them to selected value streams.

      Build a business capability model for the organization and map capabilities to the selected value stream.

      • Value Stream – Capability Mapping Template
      [infographic]

      Workshop: Map Your Business Architecture to Define Your Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Discover the Business Context

      The Purpose

      Identify and consult stakeholders to discover the business goals and value proposition for the customer.

      Key Benefits Achieved

      Engage stakeholders and SMEs in describing the business and its priorities and culture.

      Identify focus for the areas we will analyze and work on.

      Activities

      1.1 Select key stakeholders

      1.2 Plan for engaging stakeholders

      1.3 Gather business goals and priorities

      Outputs

      Stakeholder roles

      Engagement plan

      Business strategy, value proposition

      2 Define Value Streams

      The Purpose

      Describe the main value-adding activities of the business from the consumer’s point of view, e.g. provide product or service.

      Key Benefits Achieved

      Shared understanding of why we build resources and do what we do.

      Starting point for analyzing resources and investing in innovation.

      Activities

      2.1 Define or update value streams

      2.2 Decompose selected value stream(s) into value stages and identify problematic areas and opportunities

      Outputs

      Value streams for the enterprise

      Value stages breakdown for selected value stream(s)

      3 Build Business Capability Map

      The Purpose

      Describe all the capabilities that make up an organization and enable the important customer-facing activities in the value streams.

      Key Benefits Achieved

      Basis for understanding what resources the organization has and their ability to support its growth and success.

      Activities

      3.1 Define and describe all business capabilities (Level 1)

      3.2 Decompose and analyze capabilities for a selected priority value stream.

      Outputs

      Business Capability Map (Level 1)

      Business Capabilities Level 2 for selected value stream

      4 Develop a Roadmap

      The Purpose

      Use the Business Capability Map to identify key capabilities (e.g. cost advantage creator), and look more closely at what applications or information or business processes are doing to support or hinder that critical capability.

      Key Benefits Achieved

      Basis for developing a roadmap of IT initiatives, focused on key business capabilities and business priorities.

      Activities

      4.1 Identify key capabilities (cost advantage creators, competitive advantage creators)

      4.2 Assess capabilities with the perspective of how well applications, business processes, or information support the capability and identify gaps

      4.3 Apply analysis tool to rank initiatives

      Outputs

      Business Capability Map with key capabilities: cost advantage creators and competitive advantage creators

      Assessment of applications or business processes or information for key capabilities

      Roadmap of IT initiatives

      Further reading

      Map Your Business Architecture to Define Your Strategy

      Plan your organization’s capabilities for best impact and value.

      Info-Tech Research Group

      Info-Tech is a provider of best-practice IT research advisory services that make every IT leader’s job easier.

      35,000 members sharing best practices you can leverage Millions spent developing tools and templates annually Leverage direct access to over 100 analysts as an extension of your team Use our massive database of benchmarks and vendor assessments Get up to speed in a fraction of the time

      Analyst perspective

      Know your organization’s capabilities to build a digital and customer-driven culture.

      Business architecture provides a holistic and unified view of:

      • All the organization’s activities that provide value to their clients (value streams).
      • The resources that make them possible and effective (capabilities, i.e. its employees, software, processes, information).
      • How they inter-relate, i.e. depend on and impact each other to help deliver value.

      Without a business architecture it is difficult to see the connections between the business’s activities for the customer and the IT resources supporting them – to demonstrate that what we do in IT is customer-driven.

      As a map of your business, the business architecture is an essential input to the digital strategy:

      • Develop a plan to transform the business by investing in the most important capabilities.
      • Ensure project initiatives are aligned with business goals as they evolve.
      • Respond more quickly to customer requirements and to disruptions in the industry by streamlining operations and information sharing across the enterprise.

      Crystal Singh, Research Director, Data and Analytics

      Crystal Singh
      Research Director, Data and Analytics
      Info-Tech Research Group

      Andrea Malick, Research Director, Data and Analytics

      Andrea Malick
      Research Director, Data and Analytics
      Info-Tech Research Group

      Executive summary

      Your Challenge Common Obstacles Info-Tech’s Approach

      Organizations need to innovate rapidly to respond to ever-changing forces and demands in their industry. But they often fail to deliver meaningful outcomes from their IT initiatives within a reasonable time.

      Successful companies are transforming, i.e. adopting fluid strategies that direct their resources to customer-driven initiatives and execute more quickly on those initiatives. In a responsive and digital organization, strategies, capabilities, information, people, and technology are all aligned, so work and investment are consistently allocated to deliver maximum value.

      You don’t have a complete reference map of your organization’s capabilities on which to base strategic decisions.

      You don’t know how to prioritize and identify the capabilities that are essential for achieving the organization’s customer-driven objectives.

      You don’t have a shared enterprise vision, where everyone understands how the organization delivers value and to whom.

      Begin important business decisions with a map of your organization – a business reference architecture. Model the business in the form of architectural blueprints.

      Engage your stakeholders. Recognize the opportunity for mapping work, and identify and engage the right stakeholders.

      Drive business architecture forward to promote real value to the organization. Assess your current projects to determine if you are investing in the right capabilities. Conduct business capability assessments to identify opportunities and prioritize projects.

      Info-Tech Insight
      Business architecture is the set of strategic planning techniques that connects organization strategy to execution in a manner that is accurate and traceable and promotes the efficient use of organizational resources.

      Blueprint activities summary

      Phase Purpose Activity Outcome
      1. Business context:
      Identify organization goals, industry drivers, and regulatory requirements in consultation with business stakeholders.
      Identify forces within and outside the organization to consider when planning the focus and timing of digital growth, through conducting interviews and surveys and reviewing existing strategies. Business value canvas, business strategy on a page, customer journey
      2. Customer activities (value stream):
      What is the customer doing? What is our reason for being as a company? What products and services are we trying to deliver?
      Define or update value streams, e.g. purchase product from supplier, customer order, and deliver product to customer. Value streams enterprise-wide (there may be more than one set of value streams, e.g. a medical school and community clinic)
      Prioritize value streams:
      Select key value streams for deeper analysis and focus.
      Assess value streams. Priority value streams
      Value stages:
      Break down the selected value stream into its stages.
      Define stages for selected value streams. Selected value stream stages
      3. Business capability map, level 1 enterprise:
      What resources and capabilities at a high level do we have to support the value streams?
      Define or update the business capabilities that align with and support the value streams. Business capability map, enterprise-wide capabilities level 1
      Business capability map, level 2 for selected area:
      List resources and capabilities that we have at a more detailed level.
      Define or update business capabilities for selected value stream to level 2. Business capability map, selected value stream, capability level 2
      Heatmap Business Capability Map: Flag focus areas in supporting technology, applications, data and information.

      Info-Tech’s workshop methodology

      Day 1: Discover Business Context Day 2: Define Value Streams Day 3: Build Business Capability Map Day 4: Roadmap Business Architecture
      Phase Steps

      1.1 Collect corporate goals and strategies

      1.2 Identify stakeholders

      2.1 Build or update value streams

      2.2 Decompose selected value stream into value stages and analyze for opportunities

      3.1 Update business capabilities to level 1 for enterprise

      3.2 For selected value streams, break down level 1 to level 2

      3.3 Use business architecture to heatmap focus areas: technology, information, and processes

      3.4 Build roadmap of future business architecture initiatives

      Phase Outcomes
      • Organizational context and goals
      • Business strategy on a page, customer journey map, business model canvas
      • Roles and responsibilities
      • Value stream map and definitions
      • Selected value stream(s) decomposed into value stages
      • Enterprise business capabilities map to level 1
      • Business architecture to level 2 for prioritized value stream
      • Heatmap business architecture
      • Business architecture roadmap, select additional initiatives

      Key concepts for this blueprint

      INDUSTRY VALUE CHAIN DIGITAL TRANSFORMATION BUSINESS ARCHITECTURE
      A high-level analysis of how the industry creates value for the consumer as an overall end-to-end process. The adoption of digital technologies to innovate and re-invent existing business, talent ,and operating models to drive growth, business value, and improved customer experience. A holistic, multidimensional business view of capabilities, end-to-end value, and operating model in relation to the business strategy.
      INDUSTRY VALUE STREAM STRATEGIC OBJECTIVES CAPABILITY ASSESSMENTS
      A set of activities, tasks, and processes undertaken by a business or a business unit across the entire end-to-end business function to realize value. A set of standard objectives that most industry players will feature in their corporate plans. A heat-mapping effort to analyze the maturity and priority of each capability relative to the strategic priorities that they serve.

      Info-Tech’s approach

      1 Understand the business context and drivers
      Deepen your understanding of the organization’s priorities by gathering business strategies and goals. Talking to key stakeholders will allow you to get a holistic view of the business strategy and forces shaping the strategy, e.g. economy, workforce, and compliance.
      2 Define value streams; understand the value you provide
      Work with senior leadership to understand your customers’ experience with you and the ways your industry provides value to them.
      Assess the value streams for areas to explore and focus on.
      3 Customize the industry business architecture; develop business capability map
      Work with business architects and enterprise architects to customize Info-Tech’s business architecture for your industry as an enterprise-wide map of the organization and its capabilities.
      Extend the business capability map to more detail (Level 2) for the value stream stages you select to focus on.

      Business architecture is a planning function that connects strategy to execution

      Business architecture provides a framework that connects business strategy and IT strategy to project execution through a set of models that provide clarity and actionable insights. How well do you know your business?

      Business architecture is:

      • Inter-disciplinary: Business architecture is a core planning activity that supports all important decisions in the organization, for example, organizational resources planning. It’s not just about IT.
      • Foundational: The best way to answer the question, “Where do we start?” or “Where is our investment best directed?”, comes from knowing your organization, what its core functions and capabilities are (i.e. what’s important to us as an organization), and where there is work to do.
      • Connecting: Digital transformation and modernization cannot work with siloes. Connecting siloes means first knowing the organization and its functions and recognizing where the siloes are not communicating.

      Business architecture must be branded as a front-end planning function to be appropriately embedded in the organization’s planning process.

      Brand business architecture as an early planning pre-requisite on the basis of maintaining clarity of communication and spreading an accurate awareness of how strategic decisions are being made.

      As an organization moves from strategy toward execution, it is often unclear as to exactly how decisions pertaining to execution are being made, why priority is given to certain areas, and how the planning function operates.

      The business architect’s primary role is to model this process and document it.

      In doing so, the business architect creates a unified view as to how strategy connects to execution so it is clearly understood by all levels of the organization.

      Business architecture is part of the enterprise architecture framework

      Business Architecture
      Business strategy map Business model canvas Value streams
      Business capability map Business process flows Service portfolio
      Data Architecture Application Architecture Infrastructure Architecture
      Conceptual data model Application portfolio catalog Technology standards catalog
      Logical data model Application capability map Technology landscape
      Physical data model Application communication model Environments location model
      Data flow diagram Interface catalog Platform decomposition diagram
      Data lifecycle diagram Application use-case diagram Network computing / hardware diagram
      Security Architecture
      Enterprise security model Data security model Application security model

      Business architecture is a set of shared and practical views of the enterprise

      The key characteristic of the business architecture is that it represents real-world aspects of a business, along with how they interact.

      Many different views of an organization are typically developed. Each view is a diagram that illustrates a way of understanding the enterprise by highlighting specific information about it:

      • Business strategy view captures the tactical and strategic goals that drive an organization forward.
      • Business capabilities view describes the primary business functions of an enterprise and the pieces of the organization that perform those functions.
      • Value stream view defines the end-to-end set of activities that deliver value to external and internal stakeholders.
      • Business knowledge view establishes the shared semantics (e.g. customer, order, and supplier) within an organization and relationships between those semantics (e.g. customer name, order date, supplier name) – an information map.
      • Organizational view captures the relationships among roles, capabilities, and business units, the decomposition of those business units into subunits, and the internal or external management of those units.

      Business architect connects all the pieces

      The business owns the strategy and operating model; the business architect connects all the pieces together.

      R Business Architect (Responsible)
      A Business Unit Leads (Accountable)
      C Subject Matter Experts (Consulted)
      – Business Lines, Operations, Data, Technology Systems & Infrastructure Leads
      I Business Operators (Informed)
      – Process, Data, Technology Systems & Infrastructure

      Choose a key business challenge to address with business architecture

       Choose a key business challenge to address with business architecture

      Picking the right project is critical to setting the tone for business architecture work in the organization.

      Best practices for business architecture success

      Consider these best practices to maintain a high level of engagement from key stakeholders throughout the process of establishing or applying business architecture.

      Balance short-term cost savings with long-term benefits

      Participate in project governance to facilitate compliance

      Create a center of excellence to foster dialogue

      Identify strategic business objectives

      Value streams: Understand how you deliver value today

      It is important to understand the different value-generating activities that deliver an outcome for and from your customers.

      We do this by looking at value streams, which refer to the specific set of activities an industry player undertakes to create and capture value for and from the end consumer (and so the question to ask is, how do you make money as an organization?).

      Our approach helps you to strengthen and transform those value streams that generate the most value for your organization.

      Understand how you deliver value today

      An organization can have more than one set of streams.
      For example, an enterprise can provide both retail shopping and financial services, such as credit cards.

      Define the organization’s value streams

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within. Value streams can extend beyond the organization into the supporting ecosystem, whereas business processes are contained within and the organization has complete control over them.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Example: Value stream descriptions for the retail industry

      Value Streams Create or Purchase the Product Manage Inventory Distribute Product Sell Product, Make Product Available to Customers
      • Product is developed before company sells it.
      • Make these products by obtaining raw materials from external suppliers or using their own resources.
      • Retailers purchase the products they are going to sell to customers from manufacturers or wholesale distributors.
      • Retailer success depends on its ability to source products that customers want and are willing to buy.
      • Inventory products are tracked as they arrive in the warehouse, counted, stored, and prepared for delivery.
      • Estimate the value of your inventory using retail inventory management software.
      • Optimizing distribution activities is an important capability for retailers. The right inventory needs to be at a particular store in the right quantities exactly when it is needed. This helps to maximize sales and minimize how much cash is held up in inventory.
      • Proper supply chain management can not only reduce costs for retailers but drive revenues by enhancing shopping experiences.
      • Once produced, retailers need to sell the products. This is done through many channels including physical stores, online, the mail, or catalogs.
      • After the sale, retailers typically have to deliver the product, provide customer care, and manage complaints.
      • Retailers can use loyalty programs, pricing, and promotions to foster repeat business.

      Value streams describe your core business

      Value streams describe your core business

      Value streams – the activities we do to provide value to customers – require business capabilities.

      Value streams are broken down further into value stages, for example, the Sell Product value stream has value stages Evaluate Options, Place Order, and Make Payment.

      Think of value streams as the core operations: the reason for your organization’s being. A professional consulting organization may have a legal team but it does not brand itself as a law firm. A core value stream is providing research products and services; a business capability that supports it is legal counsel.

      Decompose the value stream into stages

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream, e.g. Place Order or Make Payment.

      Each value stream should have a trigger or starting point and an end result for a client or receiver.

      Decompose the value stream into stages

      There should be measurable value or benefits at each stage. These are key performance indicators (KPIs). Spot problem areas in the stream.

      Value streams usually fall into one of these categories:

      1. Fulfillment of products and services
      2. Manufacturing
      3. Software products
      4. Supporting value streams (procurement of supplies, product planning)

      Value streams need capabilities

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • There can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Value streams need business capabilities

      Business capabilities are built up to allow the business to perform the activities that bring value to customers. Map capabilities to the value-add activities in the value stream. Business capabilities lie at the top layer of the business architecture:

      • They are the most stable reference for planning organizations.
      • They make strategy more tangible.
      • If properly defined, they can help overcome organizational silos.

      Value streams need business capabilities

      Example business capability map – Higher Education

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Higher Education

      Example business capability map for Higher Education

      Example business capability map – Local Government

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Example business capability map for: Local Government

      Example business capability map for Local Government

      Value streams need business capabilities

      Value streams – the activities we do to provide value to customers – require business capabilities. Value streams are broken down further into value stages.

      Business capabilities are built up to allow the business to perform the activities that bring value to customers. Map capabilities to the activities in the value stage to spot opportunities and problems in delivering services and value.

      Business processes fulfill capabilities. They are a step-by-step description of who is performing what to achieve a goal. Capabilities consist of networks of processes and the resources – people, technology, materials – to execute them.

      Capability = Processes + Software, Infrastructure + People

      Prioritize a value stream and identify its supporting capabilities

      Prioritize your improvement objectives and business goals and identify a value stream to transform.

      Align the business objectives of your organization to your value streams (the critical actions that take place within your organization to add value to a customer).

      Prioritize a value stream to transform based on the number of priorities aligned to a value stream, and/or the business value (e.g. revenue, EBITDA earnings, competitive differentiation, or cost efficiency).

      Decompose the selected value stream into value stages.

      Align capabilities level 1 and 2 to value stages. One capability may support several value stages in the stream.

      Build a business architecture for the prioritized value stream with a map of business capabilities up to level 2.

      NOTE: We can’t map all capabilities all at once: business architecture is an ongoing practice; select key mapping initiatives each year based on business goals.

      Prioritize a value stream and identify its supporting capabilities

      Map business capabilities to Level 2

       Map business capabilities to Level 2

      Map capabilities to value stage

      Map capabilities to value stage

      Business value realization

      Business value defines the success criteria of an organization as manifested through organizational goals and outcomes, and it is interpreted from four perspectives:

      • Profit generation: The revenue generated from a business capability with a product that is enabled with modern technologies.
      • Cost reduction: The cost reduction when performing business capabilities with a product that is enabled with modern technologies.
      • Service enablement: The productivity and efficiency gains of internal business operations from products and capabilities enhanced with modern technologies.
      • Customer and market reach: The improved reach and insights of the business in existing or new markets.

      Business Value Matrix

      Value, goals, and outcomes cannot be achieved without business capabilities

      Break down your business goals into strategic and achievable initiatives focused on specific value streams and business capabilities.

      Business goals and outcomes

      Accelerate the process with an industry business architecture

      It’s never a good idea to start with a blank page.

      The business capability map available from Info-Tech and with industry standard models can be used as an accelerator. Assemble the relevant stakeholders – business unit leads and product/service owners – and modify the business capability map to suit your organization’s context.

      Acceleration path: Customize generic capability maps with the assistance of our industry analysts.

      Accelerate the process with an industry business architecture

      Identify goals and drivers

      Consider organizational goals and industry forces when planning.

      Business context Define value streams Build business capability map
      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals
      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream
      3.1 Build level 1 capability map
      3.2 Build level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      Use inputs from business goals and strategies to understand priorities.

      It is not necessary to have a comprehensive business strategy document to start – with key stakeholders, the business architect should be able to gather a one-page business value canvas or customer journey.

      Determine how the organization creates value

      Begin the process by identifying and locating the business mission and vision statements.

      What is business context?

      “The business context encompasses an understanding of the factors impacting the business from various perspectives, including how decisions are made and what the business is ultimately trying to achieve. The business context is used by IT to identify key implications for the execution of its strategic initiatives.”

      Source: Businesswire, 2018

      Identify the key stakeholders who can help you promote the value of business architecture

      First, as the CIO, you must engage executive stakeholders and secure their support.
      Focus on key players who have high power and high interest in business architecture.

      Engage the stakeholders who are impacted the most and have the power to impede the success of business architecture.

      For example, if the CFO – who has the power to block funding – is disengaged, business architecture will be put at risk.

      Use Info-Tech’s Stakeholder Power Map Template to help prioritize time spent with stakeholders.

      Sample power map

      Identify the key stakeholders concerned with the business architecture project

      A business architecture project may involve the following stakeholders:

      Business architecture project stakeholders

      You must identify who the stakeholders are for your business architecture work.

      Think about:

      • Who are the decision makers and key influencers?
      • Who will impact the business architecture work? Who will the work impact?
      • Who has vested interest in the success or failure of the practice?
      • Who has the skills and competencies necessary to help us be successful?

      Avoid these common mistakes:

      • Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
      • Don’t ignore subject-matter experts on either the business or IT side. You will need to consider both.

      1.1 Identify and assemble key stakeholders

      1-3 hours

      Build an accurate depiction of the business.

      1. It is important to make sure the right stakeholders participate in this exercise. The exercise of identifying capabilities for an organization is very introspective and requires deep analysis.
      2. Consider:
        1. Who are the decision makers and key influencers?
        2. Who will impact the business capability work? Who has a vested interest in the success or failure of the outcome?
        3. Who has the skills and competencies necessary to help you be successful?
      3. Avoid:
        1. Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
        2. Don’t ignore subject matter experts on either the business or IT side. You will need to consider both.
      Input Output
      • List of who is accountable for key business areas and decisions
      • Organizational chart
      • List of who has decision-making authority
      • A list of the key stakeholders
      Materials Participants
      • Whiteboard/Flip Charts
      • Modeling software (e.g. Visio, ArchiMate)
      • Business capability map industry models
      • CIO
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • Departmental Executives & Senior Managers

      Conduct interviews with the business to gather intelligence for strategy

      Talking to key stakeholders will allow you to get a holistic view of the business strategy.

      Stakeholder interviews provide holistic view of business strategy

      Build a strategy on a page through executive interviews and document reviews

      Understanding the business mandate and priorities ensures alignment across the enterprise.

      A business strategy must articulate the long-term destination the business is moving into. This illustration shapes all the strategies and activities in every other part of the business, including what IT capabilities and resources are required to support business goals. Ultimately, the benefits of a well-defined business strategy increase as the organization scales and as business units or functions are better equipped to align the strategic planning process in a manner that reflects the complexity of the organization.

      Using the Business Strategy on a Page canvas, consider the questions in each bucket to elicit the overall strategic context of the organization and uncover the right information to build your digital strategy. Interview key executives including your CEO, CIO, CMO, COO, CFO, and CRO, and review documents from your board or overall organizational strategy to uncover insights.

      Info-Tech Insight
      A well-articulated and clear business strategy helps different functional and business units work together and ensures that individual decisions support the overall direction of the business.

      Focus on business value and establish a common goal

      Business architecture is a strategic planning function and the focus must be on delivering business value.

      Examples business objectives:

      • Digitally transform the business, redefining its customer interactions.
      • Identify the root cause for escalating customer complaints and eroding satisfaction.
      • Identify reuse opportunities to increase operational efficiency.
      • Identify capabilities to efficiently leverage suppliers to handle demand fluctuations.

      Info-Tech Insight
      CIOs are ideally positioned to be the sponsors of business architecture given that their current top priorities are digital transformation, innovation catalyzation, and business alignment.

      1.2 Collect and understand business objectives

      1-3 hours

      Having a clear understanding of the business is crucial to executing on the strategic IT initiatives.

      1. Discover the strategic CIO initiatives your organization will pursue:
      • Schedule interviews.
      • Use the CIO Business Vision diagnostic or Business Context Discovery Tool.
    • Document the business goals.
    • Update and finalize business goals.
    • InputOutput
      • Existing business goals and strategies
      • Existing IT strategies
      • Interview findings
      • Diagnostic results
      • List of business goals
      • Strategy on a page
      • Business model canvas
      • Customer journey
      MaterialsParticipants
      • CIO Business Vision diagnostic
      • Interview questionnaire
      • CIO
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • Departmental Executives & Senior Managers

      CIO Business Vision Diagnostic

      CEO

      Vision

      Where do you want to go?
      What is the problem your organization is addressing?

      Mission/Mandate

      What do you do?
      How do you do?
      Whom do you do it for?

      Value Streams

      Why are you in business? What do you do?
      What products and services do you provide?
      Where has your business seen persistent demand?

      Key Products & Services

      What are your top three to five products and services?

      Key Customer Segments

      Who are you trying to serve or target?
      What are the customer segments that decide your value proposition?

      Value Proposition

      What is the value you deliver to your customers?

      Future Value Proposition

      What is your value proposition in three to five years’ time?

      Digital Experience Aspirations

      How can you create a more effective value stream?
      For example, greater value to customers or better supplier relationships.

      Business Resilience Aspirations

      How can you reduce business risks?
      For example, compliance, operational, security, or reputational.

      Sustainability (or ESG) Aspirations

      How can you deliver ESG and sustainability goals?

      Interview the following executives for each business goal area.

      CEO
      CRO
      COO

      Core Business Goals

      What are the core business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      CMO
      COO
      CFO

      Shared Business Goals

      What are the shared (operational) business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      CFO
      CIO
      COO
      CHRO

      Enabling Business Goals

      What are the enabling (supporting/enterprise) business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      Craft a strategy to increase stakeholder support and participation

      The BA practice’s supporters are potential champions who will help you market the value of BA; engage with them first to create positive momentum. Map out the concerns of each group of stakeholders so you can develop marketing tactics and communications vehicles to address them.

      Example Communication Strategy

      Stakeholder Concerns Tactics to Address Concerns Communication Vehicles Frequency
      Supporters
      (High Priority)
      • Build ability to execute BA techniques
      • Build executive support
      • Build understanding of how they can contribute to the success of the BA practice
      • Communicate the secured executive support
      • Help them apply BA techniques in their projects
      • Show examples of BA work (case studies)
      • Personalized meetings and interviews
      • Department/functional meetings
      • Communities of practice or centers of excellent (education and case studies)
      Bi-Monthly
      Indifferent
      (Medium Priority)
      • Build awareness and/or confidence
      • Feel like BA has nothing to do with them
      • Show quick wins and case studies
      • Centers of excellence (education and case studies
      • Use the support of the champions
      Quarterly
      Resistors
      (Medium Priority)
      • BA will cause delays
      • BA will step in their territory
      • BA’s scope is too broad
      • Lack of understanding
      • Prove the value of BA – case studies and metrics
      • Educate how BA complements their work
      • Educate them on the changes resulting from the BA practice’s work, and involve them in crafting the process
      • Individual meetings and interviews
      • Political jockeying
      • Use the support of the champions
      Tailored to individual groups

      1.3 Craft a strategy to increase stakeholder support and participation

      1-2 hours

      Now that you have organized and categorized your stakeholders based on their power, influence, interest, and knowledge of business architecture, it is time to brainstorm how you are going to gain their support and participation.

      Think about the following:

      • What are your stakeholders’ concerns?
      • How can you address them?
      • How will you deliver the message?
      • How often will you deliver the message?

      Avoid these common mistakes:

      • Your communication strategy development should be an iterative process. Do not assume to know the absolute best way to get through to every resistor right away. Instead, engage with your supporters for their input on how to communicate to resistors and repeat the process for indifferent stakeholders as well.
      Input Output
    • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      Materials Participants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      Engaging the right stakeholders

      CASE STUDY

      Industry
      Financial - Banking

      Source
      Anonymous

      Situation Complication Result

      To achieve success with the business architecture initiative, the bank’s CIO needed to put together a plan to engage the right stakeholders in the process.

      Without the right stakeholders, the initiative would suffer from inadequate information and thus would run the risk of delivering an ineffective solution.

      The bank’s culture was resistant to change and each business unit had its own understanding of the business strategy. This was a big part of the problem that led to decreasing customer satisfaction.

      The CIO needed a unified vision for the business architecture practice involving people, process, and technology that all stakeholders could support.

      Starting with enlisting executive support in the form of a business sponsor, the CIO identified the rest of the key stakeholders, in this case, the business unit heads, who were necessary to engage for the initiative.

      Once identified, the CIO promoted the benefits of business architecture to each of the business unit heads while taking stock of their individual needs.

      1.4 Develop a plan to engage key stakeholders

      1 hour

      Using your stakeholder power map as a starting point, focus on the three most important quadrants: those that contain stakeholders you must keep informed, those to keep satisfied, and the key players.

      Plot the stakeholders from those quadrants on a stakeholder engagement map.

      Think about the following:

      • Who are your resistors? These individuals will actively detract from project’s success if you don’t address their concerns.
      • Who is indifferent? These individuals need to be educated more on the benefits of business architecture to have an opinion either way.
      • Who are your supporters? These individuals will support you and spread your message if you equip them to do so.

      Avoid these common mistakes:

      • Do not jump to addressing resistor concerns first. Instead, equip your supporters with the info they need to help your cause and gain positive momentum before approaching resistors.
      InputOutput
      • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      MaterialsParticipants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers
      • CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      1.5 Craft a strategy to increase stakeholder support and participation

      1-2 hours

      Now that you have organized and categorized your stakeholders based on their power, influence, interest, and knowledge of business architecture, it is time to brainstorm how you are going to gain their support and participation.

      Think about the following:

      • What are your stakeholders’ concerns?
      • How can you address them?
      • How will you deliver the message?
      • How often will you deliver the message?

      Avoid these common mistakes:

      • Your communication strategy development should be an iterative process. Do not assume to know the absolute best way to get through to every resistor right away. Instead, engage with your supporters for their input on how to communicate to resistors and repeat the process for indifferent stakeholders as well.
      InputOutput
      • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      MaterialsParticipants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers
      • CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      Define value streams

      Identify the core activities your organization does to provide value to your customers.

      Business context Define value streams Build business capability map

      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals

      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream

      3.1 Build Level 1 capability map
      3.2 Build Level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      This phase will walk you through the following activities:

      • Note: It is recommended that you gather and leverage relevant industry standard business architecture models you may have available to you. Example: Info-Tech Industry Business Architecture, BIZBOK, APQC.
      • Defining or updating the organization’s value streams.
      • Selecting priority value streams for deeper analysis.

      This phase involves the following participants:

      • Business Architect, Enterprise Architect
      • Relevant Business Stakeholder(s): Business Unit Leads, Departmental Executives, Senior Mangers, Business Analysts

      Define the organization’s value streams

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the marketplace by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within. Value streams can extend beyond the organization into the supporting ecosystem, whereas business processes are contained within and the organization has complete control over them.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Connect business goals to value streams

      Example strategy map and value stream

      Identifying value streams

      Value streams connect business goals to organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities.

      There are several key questions to ask when endeavoring to identify value streams.

      Key Questions
      • Who are your customers?
      • What are the benefits we deliver to them?
      • How do we deliver those benefits?
      • How does the customer receive the benefits?

      Example: Value stream descriptions for the retail industry

      Value StreamsCreate or Purchase ProductManage InventoryDistribute ProductSell Product
      • Retailers need to purchase the products they are going to sell to customers from manufacturers or wholesale distributors.
      • A retailer’s success depends on its ability to source products that customers want and are willing to buy.
      • In addition, they need to purchase the right amount and assortment of products based on anticipated demand.
      • The right inventory needs to be at a particular store in the right quantities exactly when it is needed. This helps to maximize sales and minimize how much cash is held up in inventory.
      • Inventory management includes tracking, ordering, and stocking products, e.g. raw materials, finished products, buffer inventory.
      • Optimizing distribution activities is important for retailers.
      • Proper supply chain management can not only reduce costs for retailers but also drive revenues by enhancing shopping experiences.
      • Distribution includes transportation, packaging and delivery.
      • As business becomes global, it is important to ensure the whole distribution channel is effective.
      • Once produced, retailers need to sell the products. This is done through many channels including physical stores, online, the mail, or catalogs.
      • After the sale, retailers typically have to deliver the product, provide customer care, and manage complaints.
      • Retailers can use loyalty programs, pricing, and promotions to foster repeat business.

      Value streams describe your core business

      Value streams – the activities we do to provide value to customers – require business capabilities.

      Value streams are broken down further into value stages, for example, Sell Product value stream has value stages Evaluate Options, Place Order, and Make Payment.

      Think of value streams as the core operations, the reason for our organization’s being. A professional consulting organization may have a legal team but it does not brand itself as a law firm. A core value stream is providing research products and services – a business capability that supports it is legal counsel.

      2.1 Define value streams

      1-3 hours

      Unify the organization’s perspective on how it creates value.

      1. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream. Validate the accuracy of the descriptions with your key stakeholders.
      2. Consider:
        1. How does the organization deliver those benefits?
        2. How does the customer receive the benefits?
        3. What is the scope of your value stream? What will trigger the stream to start and what will the final value be?
      3. Avoid: Don’t start with a blank page. Use Info-Tech’s business architecture models for sample value streams.
      Input Output
      • Business strategy or goals
      • Financial statements
      • Info-Tech’s industry-specific business architecture
      • List of organizational specific value streams
      • Detailed value stream definition(s)
      Materials Participants
      • Whiteboard / Kanban Board
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Info-Tech Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      See your Info-Tech Account Representative for access to the Reference Architecture Template

      Decompose the value stream into stages

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream, e.g. Place Order or Make Payment.

      Each value stream should have a trigger or starting point and an end result for a client or receiver.

      Decompose the value stream into stages

      There should be measurable value or benefits at each stage.
      These are key performance indicators (KPIs).
      Spot problem areas in the stream.

      Value streams usually fall into one of these categories:

      1. Fulfillment of products and services
      2. Manufacturing
      3. Software products
      4. Supporting value streams (procurement of supplies, product planning)

      Value stream and value stages examples

      Customer Acquisitions
      Identify Prospects > Contact Prospects > Verify Interests

      Sell Product
      Identify Options > Evaluate Options > Negotiate Price and Delivery Date > Place Order > Get Invoice > Make Payment

      Product Delivery
      Confirm Order > Plan Load > Receive Warehouse > Fill Order > Ship Order > Deliver Order > Invoice Customer

      Product Financing
      Initiate Loan Application > Decide on Application > Submit Documents > Review & Satisfy T&C > Finalize Documents > Conduct Funding > Conduct Funding Audits

      Product Release
      Ideate > Design > Build > Release

      Sell Product is a value stream, made up of value stages Identify options, Evaluate options, and so on.

      2.2 Decompose selected value streams

      1-3 hours

      Once we have a good understanding of our value streams, we need to decide which ones to focus on for deeper analysis and modeling, e.g. extend the business architecture to more detailed level 2 capabilities.

      Organization has goals and delivers products or services.

      1. Identify which value propositions are most important, e.g. be more productive or manage money more simply.
      2. Identify the value stream(s) that create the value proposition.
      3. Break the selected value stream into value stages.
      4. Analyze value stages for opportunities.

      Practical Guide to Agile Strategy Execution

      InputOutput
      • Value stream maps and definitions
      • Business goals, business model canvas, customer journey (value proposition) Selected value streams decomposed into value stages
      • Analysis of selected value streams for opportunities
      • Value stream map
      MaterialsParticipants
      • Whiteboard / Kanban Board
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Build your value stream one layer at a time to ensure clarity and comprehensiveness

      The first step of creating a value stream is defining it.

      • In this step, you create the parameters around the value stream and document them in a list format.
      • This allows you to know where each value stream starts and ends and the unique value it provides.

      The second step is the value stream mapping.

      • The majority of the mapping is done here where you break down your value stream into each of its component stages.
      • Analysis of these stages allows for a deeper understanding of the value stream.
      • The mapping layer connects the value stream to organizational capabilities.

      Define the value streams that are tied to your strategic goals and document them in a list

      Title

      • Create a title for your value stream that indicates the value it achieves.
      • Ensure your title is clear and will be understood the same way across the organization.
      • The common naming convention for value streams is to use nouns, e.g. product purchase.

      Scope

      • Determine the scope of your value stream by defining the trigger to start the value stream and final value delivered to end the value stream.
      • Be precise with your trigger to ensure you do not mistakenly include actions that would not trigger your value stream.
      • A useful tip is creating a decision tree and outlining the path that results in your trigger.

      Objectives

      • Determine the objectives of the value stream by highlighting the outcome it delivers.
      • Identify the desired outcomes of the value stream from the perspective of your organization.

      Example Value Streams List

      Title Scope Objectives
      Sell Product From option identification to payment Revenue Growth

      Create a value stream map

      A Decompose the Value Stream Into Stages B Add the Customer Perspective
      • Determine the different stages that comprise the value stream.
      • Place the stages in the correct order.
      • Outline the likely sentiment and meaningful needs of the customer at each value stage.
      C Add the Expected Outcome D Define the Entry and Exit Criteria
      • Define the desired outcome of each stage from the perspective of the organization.
      • Define both the entry and exit criteria for each stage.
      • Note that the entry criteria of the first stage is what triggers the value stream.
      E Outline the Metrics F Assess the Stages
      • For each stage of the value stream, outline the metrics the organization can use to identify its ability to attain the desired outcome.
      • Assess how well each stage of the value stream is performing against its target metrics and use this as the basis to drill down into how/where improvements can be made.

      Decompose the value stream into its value stages

      The first step in creating a value stream map is breaking it up into its component stages.

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream.

      Illustration of decomposing value stream into its value stages

      The Benefit
      Segmenting your value stream into individual stages will give you a better understanding of the steps involved in creating value.

      Connect the stages of the value stream to a specific customer perspective

      Example of a sell product value stream

      The Benefit
      Adding the customer’s perspective will inform you of their priorities at each stage of the value stream.

      Connect the stages of the value stream to a desired outcome

      Example of a sell product value stream

      The Benefit
      Understanding the organization’s desired outcome at each stage of the value stream will help set objectives and establish metrics.

      Define the entry and exit criteria of each stage

      Example of entry and exit criteria for each stage

      The Benefit
      Establishing the entry and exit criteria for each stage will help you understand how the customer experience flows from one end of the stream to the other.

      Outline the key metric(s) for each stage

      Outline the key metrics for each stage

      The Benefit
      Setting metrics for each stage will facilitate the tracking of success and inform the business architecture practitioner of where investments should be made.

      Example value stream map: Sell Product

      Assess the stages of your value stream map to determine which capabilities to examine further

      To determine which specific business capabilities you should seek to assess and potentially refine, you must review performance toward target metrics at each stage of the value stream.

      Stages that are not performing to their targets should be examined further by assessing the capabilities that enable them.

      Value Stage Metric Description Metric Target Current Measure Meets Objective?
      Evaluate Options Number of Product Demonstrations 12,000/month 9,000/month No
      Identify Options Google Searches 100K/month 100K/month Yes
      Identify Options Product Mentions 1M/month 1M/month Yes
      Website Traffic (Hits)
      Average Deal Size
      Number of Deals
      Time to Complete an Order
      Percentage of Invoices Without Error
      Average Time to Acquire Payment in Full

      Determine the business capabilities that support the value stage corresponding with the failing metric

      Sell Product

      Identify Options > Evaluate Options > Negotiate Price and Delivery Date > Place Order > Get Invoice > Make Payment

      The value stage(s) that doesn’t meet its objective metrics should be examined further.

      • This is done through business capability mapping and assessment.
      • Starting at the highest level (level 0) view of a business, the business architecture practitioner must drill down into the lower level capabilities that support the specific value stage to diagnose/improve an issue.

      Info-Tech Insight
      In the absence of tangible metrics, you will have to make a qualitative judgement about which stage(s) of the value stream warrant further examination for problems and opportunities.

      Build business capability map

      Align supporting capabilities to priority activities.

      Business context Define value streams Build business capability map
      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals
      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream
      3.1 Build Level 1 capability map
      3.2 Build Level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      This step will walk you through the following activities:

      • Determine which business capabilities support value streams
      • Accelerate the process with an industry reference architecture
      • Validate the business capability map
      • Establish level 2 capability

      This step involves the following participants:

      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Outcomes of this step

    • A validated level 1 business capability map
    • Level 2 capabilities for selected value stream(s)
    • Heatmapped business capability map
    • Business architecture initiatives roadmap
    • Develop a business capability map – level 1

      • Business architecture consists of a set of techniques to create multiple views of an organization; the primary view is known as a business capability map.
      • A business capability defines what a business does to enable value creation and achieve outcomes, rather than how. Business capabilities are business terms defined using descriptive nouns such as “Marketing” or “Research and Development.” They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome. Business capabilities should not be defined as organizational units and are typically longer lasting than organizational structures.
      • A business capability mapping process should begin at the highest-level view of an organization, the level 1, which presents the entire business on a page.
      • An effective method of organizing business capabilities is to split them into logical groupings or categories. At the highest level, capabilities are either “core” (customer-facing functions) or “enabling” (supporting functions).
      • As a best practice, Info-Tech recommends dividing business capabilities into the categories illustrated to the right.

      The Business Capability Map is the primary visual representation of the organization’s key abilities or services that are delivered to stakeholders. This model forms the basis of strategic planning discussions.

      Example of a business capability map

      Example business capability map – Higher Education

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Higher Education

      Example business capability map for higher education

      Example business capability map – Local Government

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Local Government

      Example business capability map for local government

      Map capabilities to value stage

      Example of a value stage

      Source: Lambert, “Practical Guide to Agile Strategy Execution”

      3.1 Build level 1 business capability map

      1-3 hours

      1. Analyze the value streams to identify and describe the organization’s capabilities that support them. This stage requires a good understanding of the business and will be a critical foundation for the business capability map. Use the reference business architecture’s business capability map for your industry for examples of level 1 and 2 business capabilities and the capability map template to work in.
      2. Avoid:
        1. Don’t repeat capabilities. Capabilities are typically mutually exclusive activities.
        2. Don’t include temporary initiatives. Capabilities should be stable over time. The people, processes, and technologies that support capabilities will change continuously.

      Ensure you engage with the right stakeholders:

      Don’t waste your efforts building an inaccurate depiction of the business: The exercise of identifying capabilities for an organization is very introspective and requires deep analysis.

      It is challenging to develop a common language that everyone will understand and be able to apply. Invest in the time to ensure the right stakeholders are brought into the fold and bring their business area expertise and understanding to the table.

      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map for enterprise
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Prioritize one value stream and build a business architecture to level 2 capabilities

      Prioritize your innovation objectives and business goals, and identify a value stream to transform.

      Align the innovation goals and business objectives of your organization to your value streams (the critical actions that take place within your organization to add value to a customer).
      Prioritize a value stream to transform based on the number of priorities aligned to a value stream and/or the business value (e.g. revenue, EBITDA earnings, competitive differentiation, or cost efficiency).
      Working alongside a business or enterprise architect, build a reference architecture for the prioritized value stream up to level 2.

      Example of a value stream to business architecture level 2 capabilities

      Info-Tech Insight
      To produce maximum impact, focus on value streams that provide two-thirds of your enterprise value (EBITDA earnings).

      From level 1 to level 2 business capabilities

      Example moving from level 1 to level 2 business capabilities

      3.2 Build level 2 business capability map

      1-3 hours

      It is only at level 2 and further that we can pinpoint the business capabilities – the exact resources, whether applications or data or processes – that we need to focus on to realize improvements in the organization’s performance and customer experience.

      1. Gather industry reference models and any existing business capability maps.
      2. For the selected value stream, further break down its level 1 business capabilities into level 2 capabilities.
      3. You can often represent the business capabilities on a single page, providing a holistic visual for decision makers.
      4. Use meaningful names for business capabilities so that planners, stakeholders, and subject matter experts can easily search the map.
      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map
      • Level 2 Business Capability Map for selected Value Stream
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      3.3 Heatmap business capability map

      1-3 hours

      Determine the organization’s key capabilities.

      1. Determine cost advantage creators. If your organization has a cost advantage over competitors, the capabilities that enable it should be identified and prioritized. Highlight these capabilities and prioritize the programs that support them.
      2. Determine competitive advantage creators. If your organization does not have a cost advantage over competitors, determine if it can deliver differentiated end-customer experiences. Once you have identified the competitive advantages, understand which capabilities enable them. These capabilities are critical to the success of the organization and should be highly supported.
      3. Define key future state capabilities. In addition to the current and competitive advantage creators, the organization may have the intention to enhance new capabilities. Discuss and select the capabilities that will help drive the attainment of future goals.
      4. Assess how well information, applications, and processes support capabilities.
      InputOutput
      • Business capability map
      • Cost advantage creators
      • Competitive advantage creators
      • IT and business assessments
      • Key business capabilities
      • Business process review
      • Information assessment
      • Application assessment
      • List of IT implications
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      Business capability map: Education

      Illustrative example of a business capability map for education

      Define key capabilities

      Illustrative example of Define key capabilities

      Note: Illustrative Example

      Business process review

      Illustrative example of a business process review

      Note: Illustrative Example

      Information assessment

       Illustrative example of an Information assessment

      Note: Illustrative Example

      Application assessment

       Illustrative example of an Application assessment

      Note: Illustrative Example

      MoSCoW analysis for business capabilities

       Illustrative example of a MoSCoW analysis for business capabilities

      Note: Illustrative Example

      Ranked list of IT implications

      MoSCoW Rank IT Implication Value Stream Impacted Comments/Actions
      M [Implication] [Value Stream]
      M [Implication] [Value Stream]
      M [Implication] [Value Stream]
      S [Implication] [Value Stream]
      S [Implication] [Value Stream]
      S [Implication] [Value Stream]
      C [Implication] [Value Stream]
      C [Implication] [Value Stream]
      C [Implication] [Value Stream]
      W [Implication] [Value Stream]
      W [Implication] [Value Stream]
      W [Implication] [Value Stream]

      3.4 Roadmap business architecture initiatives

      1-3 hours

      Unify the organization’s perspective on how it creates value.

      1. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream. Validate the accuracy of the descriptions with your key stakeholders.
      2. Consider:
        1. How does the organization deliver those benefits?
        2. How does the customer receive the benefits?
        3. What is the scope of your value stream? What will trigger the stream to start and what will the final value be?
      3. Don’t start with a blank page. Use Info-Tech’s business architecture models for sample value streams.
      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map
      • Heatmapped business capability map
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      Example: Business architecture deliverables

      Enterprise Architecture Domain Architectural View Selection
      Business Architecture Business strategy map Required
      Business Architecture Business model canvas Optional
      Business Architecture Value streams Required
      Business Architecture Business capability map Not Used
      Business Architecture Business process flows
      Business Architecture Service portfolio
      Data Architecture Conceptual data model
      Data Architecture Logical data model
      Data Architecture Physical data model
      Data Architecture Data flow diagram
      Data Architecture Data lineage diagram

      Tools and templates to compile and communicate your business architecture work

      The Industry Business Reference Architecture Template for your industry is a place for you to collect all of the activity outputs and outcomes you’ve completed for use in next-steps.

      Download the Industry Business Reference Architecture Template for your industry

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options

      Research Contributors and Experts

      Name Role Organization
      Ibrahim Abdel-Kader Research Analyst, Data & Analytics Info-Tech Research Group
      Ben Abrishami-Shirazi Technical Counselor, Enterprise Architecture Info-Tech Research Group
      Andrew Bailey Consulting, Manager Info-Tech Research Group
      Dana Dahar Research & Advisory Director, CIO / Digital Business Strategy Info-Tech Research Group
      Larry Fretz VP Info-Tech Research Group
      Shibly Hamidur Enterprise Architect Toronto Transit Commission (TTC)
      Rahul Jaiswal Principal Research Director, Industry Info-Tech Research Group
      John Kemp Executive Counselor, Executive Services Info-Tech Research Group
      Gerald Khoury Senior Executive Advisor Info-Tech Research Group
      Igor Ikonnikov Principal Advisory Director, Data & Analytics Info-Tech Research Group
      Daniel Lambert VP Benchmark Consulting
      Milena Litoiu Principal Research Director, Enterprise Architecture Info-Tech Research Group
      Andy Neill AVP Data & Analytics, Chief Enterprise Architect Info-Tech Research Group
      Rajesh Parab Research Director, Data & Analytics Info-Tech Research Group
      Rick Pittman VP, Research Info-Tech Research Group
      Irina Sedenko Research Director, Data & Analytics Info-Tech Research Group

      Bibliography

      Andriole, Steve. “Why No One Understands Enterprise Architecture & Why Technology Abstractions Always Fail.” Forbes, 18 September 2020. Web.

      “APQC Process Classification Framework (PCF) – Retail.” American Productivity & Quality Center, 9 January 2019. Web.

      Brose, Cari. “Who’s on First? Architecture Roles and Responsibilities in SAFe.” Business Architecture Guild, 9 March 2017. Web.

      Burlton, Roger, Jim Ryne, and Daniel St. George. “Value Streams and Business Processes: The Business Architecture Perspective.” Business Architecture Guild, December 2019. Web.

      “Business Architecture: An overview of the business architecture professional.” Capstera, 5 January 2022. Web.

      Business Architecture Guild. “What is Business Architecture?” Business Analyst Mentor, 18 November 2022. Web.

      “Business Architecture Overview.” The Business Architecture Working Group of the Object Management Group (OMG), n.d. Web.

      “Delivering on your strategic vision.” The Business Architecture Guild, n.d. Web.

      Ecker, Grant. “Deploying business architecture.” LinkedIn, 11 November 2021. (Presentation)

      IRIS. “Retail Business Architecture Framework and Examples.” IRIS Business Architect, n.d. Web.

      IRIS. “What Is Business Architecture?” IRIS Business Architect, 8 May 2014. Web.

      IRIS. “Your Enterprise Architecture Practice Maturity 2021 Assessment.” IRIS Business Architect, 17 May 2021. Web.

      Khuen, Whynde. “How Business Architecture Breaks Down and Bridges Silos.” Biz Arch Mastery, January 2020. Web.

      Lambert, Daniel. “Practical Guide to Agile Strategy Execution.” 18 February 2020.

      Lankhorst, Marc, and Bernd Ihnen. “Mapping the BIZBOK Metamodel to the ArchiMate Language.” Bizzdesign, 2 September 2021. Web.

      Ramias, Alan, and Andrew Spanyi, “Demystifying the Relationship Between Processes and Capabilities: A Modest Proposal.” BPTrends, 2 February 2015. Web.

      Newman, Daniel. “NRF 2022: 4 Key Trends From This Year’s Big Show.” Forbes, 20 January 2022. Web.

      Research and Markets. “Define the Business Context Needed to Complete Strategic IT Initiatives: 2018 Blueprint.” Business Wire, 1 February 2018. Web.

      Sabanoglu, Tugba. “Retail market worldwide - Statistics & Facts.” Statista, 21 April 2022. Web.

      Spacey, John. “Capability vs Process.” Simplicable, 18 November 2016. Web.

      “The Definitive Guide to Business Capabilities.” LeanIX, n.d. Web.

      TOGAF 9. Version 9.1. The Open Group, 2011. Web.

      “What is Business Architecture?” STA Group, 2017. PDF.

      Whittie, Ralph. “The Business Architecture, Value Streams and Value Chains.” BA Institute, n.d. Web.

      Prepare for Post-Quantum Cryptography

      • Buy Link or Shortcode: {j2store}268|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • Fault-tolerant quantum computers, capable of breaking existing encryption algorithms and cryptographic systems, are widely expected to be available sooner than originally projected.
      • Data considered secure today may already be at risk due to the threat of harvest-now-decrypt-later schemes.
      • Many current security controls will be completely useless, including today's strongest encryption techniques.

      Our Advice

      Critical Insight

      The advent of quantum computing is closer than you think: some nations have already demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer provide sufficient protection. You need to act now to begin your transformation to quantum-resistant encryption.

      Impact and Result

      • Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications.
      • Organizations need to act now to begin their transformation to quantum-resistant encryption.
      • Data security (especially for sensitive data) should be an organization’s top priority. Organizations with particularly critical information need to be on top of this quantum movement.

      Prepare for Post-Quantum Cryptography Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare for Post-Quantum Cryptography Storyboard – Research to help organizations to prepare and implement quantum-resistance cryptography solutions.

      Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications. Organizations need to act now to begin their transformation to quantum-resistant encryption.

      • Prepare for Post-Quantum Cryptography Storyboard
      [infographic]

      Further reading

      Prepare for Post-Quantum Cryptography

      It is closer than you think, and you need to act now.

      Analyst Perspective

      It is closer than you think, and you need to act now.

      The quantum realm presents itself as a peculiar and captivating domain, shedding light on enigmas within our world while pushing the boundaries of computational capabilities. The widespread availability of quantum computers is expected to occur sooner than anticipated. This emerging technology holds the potential to tackle valuable problems that even the most powerful classical supercomputers will never be able to solve. Quantum computers possess the ability to operate millions of times faster than their current counterparts.

      As we venture further into the era of quantum mechanics, organizations relying on encryption must contemplate a future where these methods no longer suffice as effective safeguards. The astounding speed and power of quantum machines have the potential to render many existing security measures utterly ineffective, including the most robust encryption techniques used today. To illustrate, a task that currently takes ten years to crack through a brute force attack could be accomplished by a quantum computer in under five minutes.

      Amid this transition into a quantum future, the utmost priority for organizations remains data security, particularly safeguarding sensitive information. Organizations must proactively prepare for the development of countermeasures and essential resilience measures to attain a state of being "quantum safe."

      This is a picture of Alan Tang

      Alan Tang
      Principal Research Director, Security and Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Anticipated advancements in fault-tolerant quantum computers, surpassing existing encryption algorithms and cryptographic systems, are expected to materialize sooner than previously projected. The timeframe for their availability is diminishing daily.
      • Data that is presently deemed secure faces potential vulnerability due to the emergence of harvest-now-decrypt-later strategies.
      • Numerous contemporary security controls, including the most robust encryption techniques, have become obsolete and offer little efficacy.

      Common Obstacles

      • The complexity involved makes it challenging for organizations to incorporate quantum-resistant cryptography into their current IT infrastructure.
      • The endeavor of transitioning to quantum-resilient cryptography demands significant effort and time, with the specific requirements varying for each organization.
      • A lack of comprehensive understanding regarding the cryptographic technologies employed in existing IT systems poses difficulties in identifying and prioritizing systems for upgrading to post-quantum cryptography.

      Info-Tech's Approach

      • The development of quantum-resistant cryptography capabilities is essential for safeguarding the security and integrity of critical applications.
      • Organizations must proactively initiate their transition toward quantum-resistant encryption to ensure data protection.
      • Ensuring the security of corporate data assets should be of utmost importance for organizations, with special emphasis on those possessing highly critical information in light of the advancements in quantum technology.

      Info-Tech Insight

      The advent of quantum computing (QC) is closer than you think: some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

      Evolvement of QC theory and technologies

      1900-1975

      1976-1997

      1998-2018

      2019-Now

      1. 1900: Max Planck – The energy of a particle is proportional to its frequency: E = hv, where h is a relational constant.
      2. 1926: Erwin Schrödinger – Since electrons can affect each other's states, their energies change in both time and space. The total energy of a particle is expressed as a probability function.
      1. 1976: Physicist Roman Stanisław Ingarden publishes the paper "Quantum Information Theory."
      2. 1980: Paul Benioff describes the first quantum mechanical model of a computer.
      3. 1994: Peter Shor publishes Shor's algorithm.
      1. 1998: A working 2-qubit NMR quantum computer is used to solve Deutsch's problem by Jonathan A. Jones and Michele Mosca at Oxford University.
      2. 2003: DARPA Quantum Network becomes fully operational.
      3. 2011: D-Wave claims to have developed the first commercially available quantum computer, D-Wave One.
      4. 2018: the National Quantum Initiative Act was signed into law by President Donald Trump.
      1. 2019: A paper by Google's quantum computer research team was briefly available, claiming the project has reached quantum supremacy.
      2. 2020: Chinese researchers claim to have achieved quantum supremacy, using a photonic peak 76-qubit system known as Jiuzhang.
      3. 2021: Chinese researchers reported that they have built the world's largest integrated quantum communication network.
      4. 2022: The Quantinuum System Model H1-2 doubled its performance claiming to be the first commercial quantum computer to pass quantum volume 4096.

      Info-Tech Insight

      The advent of QC will significantly change our perception of computing and have a crucial impact on the way we protect our digital economy using encryption. The technology's applicability is no longer a theory but a reality to be understood, strategized about, and planned for.

      Fundamental physical principles and business use cases

      Unlike conventional computers that rely on bits, quantum computers use quantum bits or qubits. QC technology surpasses the limitations of current processing powers. By leveraging the properties of superposition, interference, and entanglement, quantum computers have the capacity to simultaneously process millions of operations, thereby surpassing the capabilities of today's most advanced supercomputers.

      A 2021 Hyperion Research survey of over 400 key decision makers in North America, Europe, South Korea, and Japan showed nearly 70% of companies have some form of in-house QC program.

      Three fundamental QC physical principles

      1. Superposition
      2. Interference
      3. Entanglement

      This is an image of two headings, Optimization; and Simulation. there are five points under each heading, with an arrow above pointing left to right, labeled Qbit Count.

      Info-Tech Insight

      Organizations need to reap the substantial benefits of QC's power, while simultaneously shielding against the same technologies when used by cyber adversaries.

      Percentage of Surveyed Companies That Have QC Programs

      • 31% Have some form of in-house QC program
      • 69% Have no QC program

      Early adopters and business value

      QC early adopters see the promise of QC for a wide range of computational workloads, including machine learning applications, finance-oriented optimization, and logistics/supply chain management.

      This is an image of the Early Adopters, and the business value drivers.

      Info-Tech Insight

      Experienced attackers are likely to be the early adopters of quantum-enabled cryptographic solutions, harnessing the power of QC to exploit vulnerabilities in today's encryption methods. The risks are particularly high for industries that rely on critical infrastructure.

      The need of quantum-safe solution is immediate

      Critical components of classical cryptography will be at risk, potentially leading to the exposure of confidential and sensitive information to the general public. Business, technology, and security leaders are confronted with an immediate imperative to formulate a quantum-safe strategy and establish a roadmap without delay.

      Case Study – Google, 2019

      In 2019, Google claimed that "Our Sycamore processor takes about 200 seconds to sample one instance of a quantum circuit a million times—our benchmarks currently indicate that the equivalent task for a state-of-the-art classical supercomputer would take approximately 10,000 years."
      Source: Nature, 2019

      Why You Should Start Preparation Now

      • The complexity with integrating QC technology into existing IT infrastructure.
      • The effort to upgrade to quantum-resilient cryptography will be significant.
      • The amount of time remaining will decrease every day.

      Case Study – Development in China, 2020

      On December 3, 2020, a team of Chinese researchers claim to have achieved quantum supremacy, using a photonic peak 76-qubit system (43 average) known as Jiuzhang, which performed calculations at 100 trillion times the speed of classical supercomputers.
      Source: science.org, 2020

      Info-Tech Insight

      The emergence of QC brings forth cybersecurity threats. It is an opportunity to regroup, reassess, and revamp our approaches to cybersecurity.

      Security threats posed by QC

      Quantum computers have reached a level of advancement where even highly intricate calculations, such as factoring large numbers into their primes, which serve as the foundation for RSA encryption and other algorithms, can be solved within minutes.

      Threat to data confidentiality

      QC could lead to unauthorized decryption of confidential data in the future. Data confidentiality breaches also impact improperly disposed encrypted storage media.

      Threat to authentication protocols and digital governance

      A recovered private key, which is derived from a public key, can be used through remote control to fraudulently authenticate a critical system.

      Threat to data integrity

      Cybercriminals can use QC technology to recover private keys and manipulate digital documents and their digital signatures.

      Example:

      Consider RSA-2048, a widely used public-key cryptosystem that facilitates secure data transmission. In a 2021 survey, a majority of leading authorities believed that RSA-2048 could be cracked by quantum computers within a mere 24 hours.
      Source: Quantum-Readiness Working Group, 2022

      Info-Tech Insight

      The development of quantum-safe cryptography capabilities is of utmost importance in ensuring the security and integrity of critical applications' data.

      US Quantum Computing Cybersecurity Preparedness Act

      The US Congress considers cryptography essential for the national security of the US and the functioning of the US economy. The Quantum Computing Cybersecurity Preparedness Act was introduced on April 18, 2022, and became a public law (No: 117-260) on December 21, 2022.

      Purpose

      The purpose of this Act is to encourage the migration of Federal Government information technology systems to quantum-resistant cryptography, and for other purposes.

      Scope and Exemption

      • Scope: Systems of government agencies.
      • Exemption: This Act shall not apply to any national security system.

      Main Obligations

      Responsibilities

      Requirements
      Inventory Establishment Not later than 180 days after the date of enactment of this Act, the Director of OMB, shall issue guidance on the migration of information technology to post-quantum cryptography.
      Agency Reports "Not later than 1 year after the date of enactment of this Act, and on an ongoing basis thereafter, the head of each agency shall provide to the Director of OMB, the Director of CISA, and the National Cyber Director— (1) the inventory described in subsection (a)(1); and (2) any other information required to be reported under subsection (a)(1)(C)."
      Migration and Assessment "Not later than 1 year after the date on which the Director of NIST has issued post-quantum cryptography standards, the Director of OMB shall issue guidance requiring each agency to— (1) prioritize information technology described under subsection (a)(2)(A) for migration to post-quantum cryptography; and (2) develop a plan to migrate information technology of the agency to post-quantum cryptography consistent with the prioritization under paragraph (1)."

      "It is the sense of Congress that (1) a strategy for the migration of information technology of the Federal Government to post-quantum cryptography is needed; and (2) the government wide and industry-wide approach to post- quantum cryptography should prioritize developing applications, hardware intellectual property, and software that can be easily updated to support cryptographic agility." – Quantum Computing Cybersecurity Preparedness Act

      The development of post-quantum encryption

      Since 2016, the National Institute of Standards and Technology (NIST) has been actively engaged in the development of post-quantum encryption standards. The objective is to identify and establish standardized cryptographic algorithms that can withstand attacks from quantum computers.

      NIST QC Initiative Key Milestones

      Date Development
      Dec. 20, 2016 Round 1 call for proposals: Announcing request for nominations for public-key post-quantum cryptographic algorithms
      Nov. 30, 2017 Deadline for submissions – 82 submissions received
      Dec. 21, 2017 Round 1 algorithms announced (69 submissions accepted as "complete and proper")
      Jan. 30, 2019 Second round candidates announced (26 algorithms)

      July 22, 2020

      Third round candidates announced (7 finalists and 8 alternates)

      July 5, 2022

      Announcement of candidates to be standardized and fourth round candidates
      2022/2024 (Plan) Draft standards available

      Four Selected Candidates to be Standardized

      CRYSTALS – Kyber

      CRYSTALS – Dilithium

      FALCON

      SPHINCS+

      NIST recommends two primary algorithms to be implemented for most use cases: CRYSTALS-KYBER (key-establishment) and CRYSTALS-Dilithium (digital signatures). In addition, the signature schemes FALCON and SPHINCS+ will also be standardized.

      Info-Tech Insight

      There is no need to wait for formal NIST PQC standards selection to begin your post-quantum mitigation project. It is advisable to undertake the necessary steps and allocate resources in phases that can be accomplished prior to the finalization of the standards.

      Prepare for post-quantum cryptography

      The advent of QC is closer than you think: some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

      This is an infographic showing the three steps: Threat is Imminent; Risks are Profound; and Take Acton Now.

      Insight summary

      Overarching Insight

      The advent of QC is closer than you think as some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

      Business Impact Is High

      The advent of QC will significantly change our perception of computing and have a crucial impact on the way we protect our digital economy using encryption. The technology's applicability is no longer a theory but a reality to be understood, strategized about, and planned for.

      It's a Collaborative Effort

      Embedding quantum resistance into systems during the process of modernization requires collaboration beyond the scope of a Chief Information Security Officer (CISO) alone. It is a strategic endeavor shaped by leaders throughout the organization, as well as external partners. This comprehensive approach involves the collective input and collaboration of stakeholders from various areas of expertise within and outside the organization.

      Leverage Industry Standards

      There is no need to wait for formal NIST PQC standards selection to begin your post-quantum mitigation project. It is advisable to undertake the necessary steps and allocate resources in phases that can be accomplished prior to the finalization of the standards.

      Take a Holistic Approach

      The advent of QC poses threats to cybersecurity. It's a time to regroup, reassess, and revamp.

      Blueprint benefits

      IT Benefits

      Business Benefits

      • This blueprint will help organizations to discover and then prioritize the systems to be upgraded to post-quantum cryptography.
      • This blueprint will enable organizations to integrate quantum-resistant cryptography into existing IT infrastructure.
      • Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications.
      • This blueprint will help organizations to save effort and time needed upgrade to quantum-resilient cryptography.
      • Organizations will reap the substantial benefits of QC's power, while simultaneously shielding against the same technologies when used by cyber adversaries.
      • Avoid reputation and brand image by preventing data breach and leakage.
      • This blueprint will empower organizations to protect corporate data assets in the post-quantum era.
      • Be compliant with various security and privacy laws and regulations.

      Info-Tech Project Value

      Time, value, and resources saved to obtain buy-in from senior leadership team using our research material:

      1 FTEs*10 days*$100,000/year = $6,000

      Time, value, and resources saved to implement quantum-resistant cryptography using our research guidance:

      2 FTEs* 30 days*$100,000/year = $24,000

      Estimated cost and time savings from this blueprint:

      $6,000 + $24,000 =$30,000

      Get prepared for a post-quantum world

      The advent of sufficiently powerful quantum computers poses a risk of compromising or weakening traditional forms of asymmetric and symmetric cryptography. To safeguard data security and integrity for critical applications, it is imperative to undertake substantial efforts in migrating an organization's cryptographic systems to post-quantum encryption. The development of quantum-safe cryptography capabilities is crucial in this regard.

      Phase 1 - Prepare

      • Obtain buy-in from leadership team.
      • Educate your workforce about the upcoming transition.
      • Create defined projects to reduce risks and improve crypto-agility.

      Phase 2 - Discover

      • Determine the extent of your exposed data, systems, and applications.
      • Establish an inventory of classical cryptographic use cases.

      Phase 3 - Assess

      • Assess the security and data protection risks posed by QC.
      • Assess the readiness of transforming existing classical cryptography to quantum-resilience solutions.

      Phase 4 - Prioritize

      • Prioritize transformation plan based on criteria such as business impact, near-term technical feasibility, and effort, etc.
      • Establish a roadmap.

      Phase 5 - Mitigate

      • Implement post-quantum mitigations.
      • Decommissioning old technology that will become unsupported upon publication of the new standard.
      • Validating and testing products that incorporate the new standard.

      Phase 1 – Prepare: Protect data assets in the post-quantum era

      The rise of sufficiently powerful quantum computers has the potential to compromise or weaken conventional asymmetric and symmetric cryptography methods. In anticipation of a quantum-safe future, it is essential to prioritize crypto-agility. Consequently, organizations should undertake specific tasks both presently and in the future to adequately prepare for forthcoming quantum threats and the accompanying transformations.

      Quantum-resistance preparations must address two different needs:

      Reinforce digital transformation initiatives

      To thrive in the digital landscape, organizations must strengthen their digital transformation initiatives by embracing emerging technologies and novel business practices. The transition to quantum-safe encryption presents a unique opportunity for transformation, allowing the integration of these capabilities to evolve business transactions and relationships in innovative ways.

      Protect data assets in the post-quantum era

      Organizations should prioritize supporting remediation efforts aimed at ensuring the quantum safety of existing data assets and services. The implementation of crypto-agility enables organizations to respond promptly to cryptographic vulnerabilities and adapt to future changes in cryptographic standards. This proactive approach is crucial, as the need for quantum-safe measures existed even before the complexities posed by QC emerged.

      Preparation for the post-quantum world has been recommended by the US government and other national bodies since 2016.

      In 2016, NIST, the National Security Agency (NSA), and Central Security Service stated in their Commercial National Security Algorithm Suite and QC FAQ: "NSA believes the time is now right [to start preparing for the post-quantum world] — consistent with advances in quantum computing."
      Source: Cloud Security Alliance, 2021

      Phase 1 – Prepare: Key tasks

      Preparing for quantum-resistant cryptography goes beyond simply acquiring knowledge and conducting experiments in QC. It is vital for senior management to receive comprehensive guidance on the challenges, risks, and potential mitigations associated with the post-quantum landscape. Quantum and post-quantum education should be tailored to individuals based on their specific roles and the impact of post-quantum mitigations on their responsibilities. This customized approach ensures that individuals are equipped with the necessary knowledge and skills relevant to their respective roles.

      Leadership Buy-In

      • Get senior management commitment to post-quantum project.
      • Determine the extent of exposed data, systems, and applications.
      • Identify near-term, achievable cryptographic maturity goals, creating defined projects to reduce risks and improve crypto-agility.

      Roles and Responsibilities

      • The ownership should be clearly defined regarding the quantum-resistant cryptography program.
      • This should be a cross-functional team within which members represent various business units.

      Awareness and Education

      • Senior management needs to understand the strategic threat to the organization and needs to adequately address the cybersecurity risk in a timely fashion.
      • Educate your workforce about the upcoming transition. All training and education should seek to achieve awareness of the following items with the appropriate stakeholders.

      Info-Tech Insight

      Embedding quantum resistance into systems during the process of modernization requires collaboration beyond the scope of a CISO alone. It is a strategic endeavor shaped by leaders throughout the organization, as well as external partners. This comprehensive approach involves the collective input and collaboration of stakeholders from various areas of expertise within and outside the organization.

      Phase 2 – Discover: Establish a data protection inventory

      During the discovery phase, it is crucial to locate and identify any critical data and devices that may require post-quantum protection. This step enables organizations to understand the algorithms in use and their specific locations. By conducting this thorough assessment, organizations gain valuable insights into their existing infrastructure and cryptographic systems, facilitating the implementation of appropriate post-quantum security measures.

      Inventory Core Components

      1. Description of devices and/or data
      2. Location of all sensitive data and devices
      3. Criticality of the data
      4. How long the data or devices need to be protected
      5. Effective cryptography in use and cryptographic type
      6. Data protection systems currently in place
      7. Current key size and maximum key size
      8. Vendor support timeline
      9. Post-quantum protection readiness

      Key Things to Consider

      • The accuracy and thoroughness of the discovery phase are critical factors that contribute to the success of a post-quantum project.
      • It is advisable to conduct this discovery phase comprehensively across all aspects, not solely limited to public-key algorithms.
      • Performing a data protection inventory can be a time-consuming and challenging phase of the project. Breaking it down into smaller subtasks can help facilitate the process.
      • Identifying all information can be particularly challenging since data is typically scattered throughout an organization. One approach to begin this identification process is by determining the inputs and outputs of data for each department and team within the organization.
      • To ensure accountability and effectiveness, it is recommended to assign a designated individual as the ultimate owner of the data protection inventory task. This person should have the necessary responsibilities and authority to successfully accomplish the task.

      Phase 3 – Assess: The workflow

      Quantum risk assessment entails evaluating the potential consequences of QC on existing security measures and devising strategies to mitigate these risks. This process involves analyzing the susceptibility of current systems to attacks by quantum computers and identifying robust security measures that can withstand QC threats.

      Risk Assessment Workflow

      This is an image of the Risk Assessment Workflow

      By identifying the security gaps that will arise with the advent of QC, organizations can gain insight into the substantial vulnerabilities that core business operations will face when QC becomes a prevalent reality. This proactive understanding enables organizations to prepare and implement appropriate measures to address these vulnerabilities in a timely manner.

      Phase 4 – Prioritize: Balance business value, security risks, and effort

      Organizations need to prioritize the mitigation initiatives based on various factors such as business value, level of security risk, and the effort needed to implement the mitigation controls. In the diagram below, the size of the circle reflects the degree of effort. The bigger the size, the more effort is needed.

      This is an image of a chart where the X axis represents Security Risk level, and the Y axis is Business Value.

      QC Adopters Anticipated Annual Budgets

      This is an image of a bar graph showing the Anticipated Annual Budgets for QC Adopters.
      Source: Hyperion Research, 2022

      Hyperion's survey found that the range of expected budget varies widely.

      • The most selected option, albeit by only 38% of respondents, was US$5 million to US$15 million.
      • About one-third of respondents foresaw annual budgets that exceeded US$15 million, and one-fifth expected budgets to exceed US$25 million.

      Build your risk mitigation roadmap

      2 hours

      1. Review the quantum-resistance initiatives generated in Phase 3 – Assessment.
      2. With input from all stakeholders, prioritize the initiatives based on business value, security risks, and effort using the 2x2 grid.
      3. Review the position of all initiatives and adjust accordingly considering other factors such as dependency, etc.
      4. Place prioritized initiatives to a wave chart.
      5. Assign ownership and target timeline for each initiative.

      This is an image the Security Risk Vs. Business value graph, above an image showing Initiatives Numbered 1-7, divided into Wave 1; Wave 2; and Wave 3.

      Input

      • Data protection inventory created in phase 2
      • Risk assessment produced in phase 3
      • Business unit leaders' and champions' understanding (high-level) of challenges posed by QC

      Output

      • Prioritization of quantum-resistance initiatives

      Materials

      • Whiteboard/flip charts
      • Sticky notes
      • Pen/whiteboard markers

      Participants

      • Quantum-resistance program owner
      • Senior leadership team
      • Business unit heads
      • Chief security officer
      • Chief privacy officer
      • Chief information officer
      • Representatives from legal, risk, and governance

      Phase 5 – Mitigate: Implement quantum-resistant encryption solutions

      To safeguard against cybersecurity risks and threats posed by powerful quantum computers, organizations need to adopt a robust defense-in-depth approach. This entails implementing a combination of well-defined policies, effective technical defenses, and comprehensive education initiatives. Organizations may need to consider implementing new cryptographic algorithms or upgrading existing protocols to incorporate post-quantum encryption methods. The selection and deployment of these measures should be cost-justified and tailored to meet the specific needs and risk profiles of each organization.

      Governance

      Implement solid governance mechanisms to promote visibility and to help ensure consistency

      • Update policies and documents
      • Update existing acceptable cryptography standards
      • Update security and privacy audit programs

      Industry Standards

      • Stay up to date with newly approved standards
      • Leverage industry standards (i.e. NIST's post-quantum cryptography) and test the new quantum-safe cryptographic algorithms

      Technical Mitigations

      Each type of quantum threat can be mitigated using one or more known defenses.

      • Physical isolation
      • Replacing quantum-susceptible cryptography with quantum-resistant cryptography
      • Using QKD
      • Using quantum random number generators
      • Increasing symmetric key sizes
      • Using hybrid solutions
      • Using quantum-enabled defenses

      Vendor Management

      • Work with key vendors on a common approach to quantum-safe governance
      • Assess vendors for possible inclusion in your organization's roadmap
      • Create acquisition policies regarding quantum-safe cryptography

      Research Contributors and Experts

      This is a picture of Adib Ghubril

      Adib Ghubril
      Executive Advisor, Executive Services
      Info-Tech Research Group

      This is a picture of Erik Avakian

      Erik Avakian
      Technical Counselor
      Info-Tech Research Group

      This is a picture of Alaisdar Graham

      Alaisdar Graham
      Executive Counselor
      Info-Tech Research Group

      This is a picture of Carlos Rivera

      Carlos Rivera
      Principal Research Advisor
      Info-Tech Research Group

      This is a picture of Hendra Hendrawan

      Hendra Hendrawan
      Technical Counselor
      Info-Tech Research Group

      This is a picture of Fritz Jean-Louis

      Fritz Jean-Louis
      Principal Cybersecurity Advisor
      Info-Tech Research Group

      Bibliography

      117th Congress (2021-2022). H.R.7535 - Quantum Computing Cybersecurity Preparedness Act. congress.gov, 21 Dec 2022.
      Arute, Frank, et al. Quantum supremacy using a programmable superconducting processor. Nature, 23 Oct 2019.
      Bernhardt, Chris. Quantum Computing for Everyone. The MIT Press, 2019.
      Bob Sorensen. Quantum Computing Early Adopters: Strong Prospects For Future QC Use Case Impact. Hyperion Research, Nov 2022.
      Candelon, François, et al. The U.S., China, and Europe are ramping up a quantum computing arms race. Here's what they'll need to do to win. Fortune, 2 Sept 2022.
      Curioni, Alessandro. How quantum-safe cryptography will ensure a secure computing future. World Economic Forum, 6 July 2022.
      Davis, Mel. Toxic Substance Exposure Requires Record Retention for 30 Years. Alert presented by CalChamber, 18 Feb 2022.
      Eddins, Andrew, et al. Doubling the size of quantum simulators by entanglement forging. arXiv, 22 April 2021.
      Gambetta, Jay. Expanding the IBM Quantum roadmap to anticipate the future of quantum-centric supercomputing. IBM Research Blog, 10 May 2022.
      Golden, Deborah, et al. Solutions for navigating uncertainty and achieving resilience in the quantum era. Deloitte, 2023.
      Grimes, Roger, et al. Practical Preparations for the Post-Quantum World. Cloud Security Alliance, 19 Oct 2021.
      Harishankar, Ray, et al. Security in the quantum computing era. IBM Institute for Business Value, 2023.
      Hayat, Zia. Digital trust: How to unleash the trillion-dollar opportunity for our global economy. World Economic Forum, 17 Aug 2022.
      Mateen, Abdul. What is post-quantum cryptography? Educative, 2023.
      Moody, Dustin. Let's Get Ready to Rumble—The NIST PQC 'Competition.' NIST, 11 Oct 2022.
      Mosca, Michele, Dr. and Dr. Marco Piani. 2021 Quantum Threat Timeline Report. Global Risk Institute, 24 Jan 2022.
      Muppidi, Sridhar and Walid Rjaibi. Transitioning to Quantum-Safe Encryption. Security Intelligence, 8 Dec 2022.
      Payraudeau, Jean-Stéphane, et al. Digital acceleration: Top technologies driving growth in a time of crisis. IBM Institute for Business Value, Nov 2020.
      Quantum-Readiness Working Group (QRWG). Canadian National Quantum-Readiness- Best Practices and Guidelines. Canadian Forum for Digital Infrastructure Resilience (CFDIR), 17 June 2022.
      Rotman, David. We're not prepared for the end of Moore's Law. MIT Technology Review, 24 Feb 2020.
      Saidi, Susan. Calculating a computing revolution. Roland Berger, 2018.
      Shorter., Ted. Why Companies Must Act Now To Prepare For Post-Quantum Cryptography. Forbes.com, 11 Feb 2022.
      Sieger, Lucy, et al. The Quantum Decade, Third edition. IBM, 2022.
      Sorensen, Bob. Broad Interest in Quantum Computing as a Driver of Commercial Success. Hyperion Research, 17 Nov 2021.
      Wise, Jason. How Much Data is Created Every Day in 2022? Earthweb, 22 Sept 2022.
      Wright, Lawrence. The Plague Year. The New Yorker, 28 Dec 2020.
      Yan, Bao, et al. Factoring integers with sublinear resources on a superconducting quantum processor. arXiv, 23 Dec 2022.
      Zhong, Han-Sen, et al. Quantum computational advantage using photons. science.org, 3 Dec 2020.

      10 Secrets for Successful Disaster Recovery in the Cloud

      • Buy Link or Shortcode: {j2store}419|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,096 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • The pay-per-use pricing structure of cloud services make it a cheaper DR option, but there are gotchas you need to avoid, ranging from unexpected licensing costs to potential security vulnerabilities.
      • You likely started on the path to cloud DR with consideration of cloud storage for offsite retention of backups. Systems recovery in the cloud can be a real value-add to using cloud as a backup target.
      • Your cloud-based DR environment has to be secure and compliant, but performance also has to be “good enough” to operate the business.
      • Location still matters, and selecting the DR site that optimizes latency tolerance and geo-redundancy can be difficult.

      Our Advice

      Critical Insight

      • Keep your systems dormant until disaster strikes. Prepare as much of your environment as possible without tapping into compute resources. Enjoy the low at-rest costs, and leverage the reliability of the cloud in your failover.
      • Avoid failure on the failback! Bringing up your systems in the cloud is a great temporary solution, but an expensive long-term strategy. Make sure you have a plan to get back on premises.
      • Leverage cloud DR as a start for cloud migration. Cloud DR provides a gateway for broader infrastructure lift and shift to cloud IaaS, but this should only be the first phase of a longer-term roadmap that ends in multi-service hybrid cloud.

      Impact and Result

      • Calculate the cost of your DR solution with a cloud vendor. Test your systems often to build out more accurate budgets and to define failover and failback action plans to increase confidence in your capabilities.
      • Define “good enough” performance by consulting with the business and setting correct expectations for the recovery state.
      • Dig deeper into the various flavors of cloud-based DR beyond backup and restore, including pilot light, warm standby, and multi-site recovery. Each of these has unique benefits and challenges when done in the cloud.

      10 Secrets for Successful Disaster Recovery in the Cloud Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out the 10 secrets for success in cloud-based DR deployment, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      [infographic]

      Grow Your Own PPM Solution

      • Buy Link or Shortcode: {j2store}436|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $47,944 Average $ Saved
      • member rating average days saved: 29 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • As portfolio manager, you’re responsible for supporting the intake of new project requests, providing visibility into the portfolio of in-flight projects, and helping to facilitate the right approval and prioritization decisions.
      • You need a project portfolio management (PPM) tool that promotes the maintenance and flow of good data to help you succeed in these tasks. However, while throwing expensive technology at bad process rarely works, many organizations take this approach to solve their PPM problems.
      • Commercial PPM solutions are powerful and compelling, but they are also expensive, complex, and hard to use. When a solution is not properly adopted, the data can be unreliable and inconsistent, defeating the point of purchasing a tool in the first place.

      Our Advice

      Critical Insight

      • Your choice of PPM solution must be in tune with your organizational PPM maturity to ensure that you are prepared to sustain the tool use without having the corresponding PPM processes collapse under its own weight.
      • A spreadsheet-based homegrown PPM solution can provide key capabilities of an optimized PPM solution with a high level of sophistication and complexity without the prohibitive capital and labor costs demanded by commercial PPM solution.
      • Focus on your PPM decision makers that will consume the reports and insights by investigating their specific reporting needs.

      Impact and Result

      • Think outside the commercial box. Develop an affordable, adoptable, and effective PPM solution using widely available tools based on Info-Tech’s ready-to-deploy templates.
      • Make your solution sustainable. When it comes to portfolio management, high level is better. A tool that is accurate and maintainable will provide more value than one that strives for precise data yet is ultimately unmaintainable.
      • Report success. A PPM tool needs to foster portfolio visibility in order to engage and inform the executive layer and support effective decision making.

      Grow Your Own PPM Solution Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should grow your own PPM solution, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Right-size your PPM solution

      Scope an affordable, adoptable, and effective PPM solution with Info-Tech's Portfolio Manager 2017 workbook.

      • Grow Your Own PPM Solution – Phase 1: Right-Size Your PPM Solution
      • Portfolio Manager 2017 Cost-in-Use Estimation Tool
      • None

      2. Get to know Portfolio Manager 2017

      Learn how to use Info-Tech's Portfolio Manager 2017 workbook and create powerful reports.

      • Grow Your Own PPM Solution – Phase 2: Meet Portfolio Manager 2017
      • Portfolio Manager 2017
      • Portfolio Manager 2017 (with Actuals)
      • None
      • None
      • None

      3. Implement your homegrown PPM solution

      Plan and implement an affordable, adoptable, and effective PPM solution with Info-Tech's Portfolio Manager 2017 workbook.

      • Grow Your Own PPM Solution – Phase 3: Implement Your PPM Solution
      • Portfolio Manager 2017 Operating Manual
      • Stakeholder Engagement Workbook
      • Portfolio Manager Debut Presentation for Portfolio Owners
      • Portfolio Manager Debut Presentation for Data Suppliers

      4. Outgrow your own PPM solution

      Develop an exit strategy from your home-grown solution to a commercial PPM toolset. In this video, we show a rapid transition from the Excel dataset shown on this page to a commercial solution from Meisterplan. Christoph Hirnle of Meisterplan is interviewed starting at 9 minutes.

      • None
      [infographic]

      Workshop: Grow Your Own PPM Solution

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope a Homegrown PPM Solution for Your Organization

      The Purpose

      Assess the current state of project portfolio management capability at your organization. The activities in this module will inform the next modules by exploring your organization’s current strengths and weaknesses and identifying areas that require improvement.

      Set up the workbook to generate a fully functional project portfolio workbook that will give you a high-level view into your portfolio.

      Key Benefits Achieved

      A high-level review of your current project portfolio capability is used to decide whether a homegrown PPM solution is an appropriate choice

      Cost-benefit analysis is done to build a business case for supporting this choice

      Activities

      1.1 Review existing PPM strategy and processes.

      1.2 Perform a cost-benefit analysis.

      Outputs

      Confirmation of homegrown PPM solution as the right choice

      Expected benefits for the PPM solution

      2 Get to Know Portfolio Manager 2017

      The Purpose

      Define a list of requirements for your PPM solution that meets the needs of all stakeholders.

      Key Benefits Achieved

      A fully customized PPM solution in your chosen platform

      Activities

      2.1 Introduction to Info-Tech's Portfolio Manager 2017: inputs, outputs, and the data model.

      2.2 Gather requirements for enhancements and customizations.

      Outputs

      Trained project/resource managers on the homegrown solution

      A wish list of enhancements and customizations

      3 Implement Your Homegrown PPM Solution

      The Purpose

      Determine an action plan regarding next steps for implementation.

      Implement your homegrown PPM solution. The activities outlined in this step will help to promote adoption of the tool throughout your organization.

      Key Benefits Achieved

      A set of processes to integrate the new homegrown PPM solution into existing PPM activities

      Plans for piloting the new processes, process improvement, and stakeholder communication

      Activities

      3.1 Plan to integrate your new solution into your PPM processes.

      3.2 Plan to pilot the new processes.

      3.3 Manage stakeholder communications.

      Outputs

      Portfolio Manager 2017 operating manual, which documents how Portfolio Manager 2017 is used to augment the PPM processes

      Plan for a pilot run and post-pilot evaluation for a wider rollout

      Communication plan for impacted PPM stakeholders

      Establish High-Value IT Performance Dashboards and Metrics

      • Buy Link or Shortcode: {j2store}58|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $8,599 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Performance Measurement
      • Parent Category Link: /performance-measurement

      While most CIOs understand the importance of using metrics to measure IT’s accomplishments, needs, and progress, when it comes to creating dashboards to communicate these metrics, they:

      • Concentrate on the data instead of the audience.
      • Display information specific to IT activities instead of showing how IT addresses business goals and problems.
      • Use overly complicated, out of context graphs that crowd the dashboard and confuse the viewer.

      Our Advice

      Critical Insight

      While most CIOs understand the importance of using metrics to measure IT’s accomplishments, needs, and progress, when it comes to creating dashboards to communicate these metrics, they:

      • Concentrate on the data instead of the audience.
      • Display information specific to IT activities instead of showing how IT addresses business goals and problems.
      • Use overly complicated, out of context graphs that crowd the dashboard and confuse the viewer.

      Impact and Result

      Use Info-Tech’s ready-made dashboards for executives to ensure you:

      • Speak to the right audience
      • About the right things
      • In the right quantity
      • Using the right measures
      • At the right time.

      Establish High-Value IT Performance Dashboards and Metrics Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish High-Value IT Performance Metrics and Dashboards – a document that walks you through Info-Tech’s ready-made IT dashboards.

      This blueprint guides you through reviewing Info-Tech’s IT dashboards for your audience and organization, then walks you through practical exercises to customize the dashboards to your audience and organization. The blueprint also gives practical guidance for delivering your dashboards and actioning your metrics.

      • Establish High-Value IT Performance Metrics and Dashboards Storyboard

      2. Info-Tech IT Dashboards and Guide – Ready-made IT dashboards for the CIO to communicate to the CXO.

      IT dashboards with visuals and metrics that are aligned and organized by CIO priority and that allow you to customize with your own data, eliminating 80% of the dashboard design work.

      • Info-Tech IT Dashboards and Guide

      3. IT Dashboard Workbook – A step-by-step tool to identify audience needs, translate needs into metrics, design your dashboard, and track/action your metrics.

      The IT Dashboard Workbook accompanies the Establish High Value IT Metrics and Dashboards blueprint and guides you through customizing the Info-Tech IT Dashboards to your audience, crafting your messages, delivering your dashboards to your audience, actioning metrics results, and addressing audience feedback.

      • Info-Tech IT Dashboards Workbook

      4. IT Metrics Library

      Reference the IT Metrics Library for ideas on metrics to use and how to measure them.

      • IT Metrics Library

      5. HR Metrics Library

      Reference the HR Metrics Library for ideas on metrics to use and how to measure them.

      • HR Metrics Library

      Infographic

      Workshop: Establish High-Value IT Performance Dashboards and Metrics

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Test Info-tech’s IT Dashboards Against Your Audience’s Needs and Translate Audience Needs Into Metrics

      The Purpose

      Introduce the Info-Tech IT Dashboards to give the participants an idea of how they can be used in their organization.

      Understand the importance of starting with the audience and understanding audience needs before thinking about data and metrics.

      Explain how audience needs translate into metrics.

      Key Benefits Achieved

      Understanding of where to begin when it comes to considering dashboards and metrics (the audience).

      Identified audience and needs and derived metrics from those identified needs.

      Activities

      1.1 Review the info-Tech IT Dashboards and document impressions for your organization.

      1.2 Identify your audience and their attributes.

      1.3 Identify timeline and deadlines for dashboards.

      1.4 Identify and prioritize audience needs and desired outcomes.

      1.5 Associate metrics to each need.

      1.6 Identify a dashboard for each metric.

      Outputs

      Initial impressions of Info-Tech IT Dashboards.

      Completed Tabs 2 and 3 of the IT Dashboard Workbook.

      2 Inventory Your Data and Assess Data Quality and Readiness

      The Purpose

      Provide guidance on how to derive metrics and assess data.

      Key Benefits Achieved

      Understand the importance of considering how you will measure each metric and get the data.

      Understand that measuring data can be costly and that sometimes you just can’t afford to get the measure or you can’t get the data period because the data isn’t there.

      Understand how to assess data quality and readiness.

      Activities

      2.1 Complete a data inventory for each metric on each dashboard: determine how you will measure the metric, the KPI, any observation biases, the location of the data, the type of source, the owner, and the security/compliance requirements.

      2.2 Assess data quality for availability, accuracy, and standardization.

      2.3 Assess data readiness and the frequency of measurement and reporting.

      Outputs

      Completed Tab 4 of the IT Dashboard Workbook.

      3 Design and Build Your Dashboards

      The Purpose

      Guide participants in customizing the Info-Tech IT Dashboards with the data identified in previous steps.

      This step may vary as some participants may not need to alter the Info-Tech IT Dashboards other than to add their own data.

      Key Benefits Achieved

      Understanding of how to customize the dashboards to the participants’ organization.

      Activities

      3.1 Revisit the Info-Tech IT Dashboards and use the identified metrics to determine what should change in them.

      3.2 Build your dashboards by editing the Info-Tech IT Dashboards with your changes as planned in Step 3.1.

      Outputs

      Assessed Info-Tech IT Dashboards for your audience’s needs.

      Completed Tab 5 of the IT Dashboard Workbook.

      Finalized dashboards.

      4 Deliver Your Dashboard and Plan to Action Metrics

      The Purpose

      Guide participants in learning how to create a story around the dashboards.

      Guide participants in planning to action metrics and where to record results.

      Guide participants in how to address results of metrics and feedback from audience about dashboards.

      Key Benefits Achieved

      Participants understand how to speak to their dashboards.

      Participants understand how to action metrics results and feedback about dashboards.

      Activities

      4.1 Craft your story.

      4.2 Practice delivering your story.

      4.3 Plan to action your metrics.

      4.4 Understand how to record and address your results.

      Outputs

      Completed Tabs 6 and 7 of the IT Dashboard Workbook.

      5 Next Steps and Wrap-Up

      The Purpose

      Finalize work outstanding from previous steps and answer any questions.

      Key Benefits Achieved

      Participants have thought about and documented how to customize the Info-Tech IT Dashboards to use in their organization, and they have everything they need to customize the dashboards with their own metrics and visuals (if necessary).

      Activities

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Outputs

      Completed IT Dashboards tailored to your organization.

      Completed IT Dashboard Workbook

      Further reading

      Establish High-Value IT Performance Dashboards and Metrics

      Spend less time struggling with visuals and more time communicating about what matters to your executives.

      Analyst Perspective

      A dashboard is a communication tool that helps executives make data-driven decisions

      CIOs naturally gravitate toward data and data analysis. This is their strength. They lean into this strength, using data to drive decisions, track performance, and set targets because they know good data drives good decisions.

      However, when it comes to interpreting and communicating this complex information to executives who may be less familiar with data, CIOs struggle, often falling back on showing IT activity level data instead of what the executives care about. This results in missed opportunities to tell IT’s unique story, secure funding, reveal important trends, or highlight key opportunities for the organization.

      Break through these traditional barriers by using Info-Tech’s ready-made IT dashboards. Spend less time agonizing over visuals and layout and more time concentrating on delivering IT information that moves the organization forward.

      Photo of Diana MacPherson
      Diana MacPherson
      Senior Research Analyst, CIO
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      While most CIOs understand the importance of using metrics to measure IT’s accomplishments, needs, and progress, when it comes to creating dashboards to communicate these metrics, they:

      • Concentrate on the data instead of the audience.
      • Display information specific to IT activities instead of showing how IT addresses business goals and problems.
      • Use overly complicated, out of context graphs that crowd the dashboard and confuse the viewer.

      Common Obstacles

      CIOs often experience these challenges because they:

      • Have a natural bias toward data and see it as the whole story instead of a supporting character in a larger narrative.
      • Assume that the IT activity metrics that are easy to get and useful to them are equally interesting to all their stakeholders.
      • Do not have experience communicating visually to an audience unfamiliar with IT operations or lingo.

      Info-Tech’s Approach

      Use Info-Tech’s ready-made dashboards for executives to ensure you:

      • Speak to the right audience
      • About the right things
      • In the right quantity
      • Using the right measures
      • At the right time

      Info-Tech Insight

      The purpose of a dashboard is to drive decision making. A well designed dashboard presents relevant, clear, concise insights that help executives make data-driven decisions.

      Your challenge

      CIOs struggle to select the right metrics and dashboards to communicate IT’s accomplishments, needs, and progress to their executives. CIOs:

      • Fail to tailor metrics to their audience, often presenting graphs that are familiar and useful to them, but not their executives. This results in dashboards full of IT activities that executives neither understand nor find valuable.
      • Do not consider the timeliness of their metrics, which has the same effect as not tailoring their metrics: the executives do not care about the metrics they are shown.
      • Present too many metrics, which not only clutters the board but also dilutes the message the CIO needs to communicate.
      • Do not act on the results of their metrics and show progress, which makes metrics meaningless. Why measure something if you won’t act on the results?

      The bottom line: CIOs often communicate to the wrong audience, about the wrong things, in the wrong amount, using the wrong metrics, at the wrong time.

      In a survey of 500 executives, organizations that struggled with dashboards identified the reasons as:
      61% Inadequate context
      54% Information overload

      — Source: Exasol

      CXOs and CIOs agree that IT performance metrics need improvement

      When asked which performance indicators should be implemented in your business, CXOs and CIOs both agree that IT needs to improve its metrics across several activity areas: technology performance, cost and salary, and risk.

      A diagram that shows performance indicators and metrics from cxo and cio.

      The Info-Tech IT Dashboards center key metrics around these activities ensuring you align your metrics to the needs of your CXO audience.

      Info-Tech CEO/CIO Alignment Survey Benchmark Report n=666

      The Info-Tech IT Dashboards are organized by the top CIO priorities

      The top six areas that a CIO needs to prioritize and measure outcomes, no matter your organization or industry, are:

      • Managing to a budget: Reducing operational costs and increasing strategic IT spend
      • Customer/constituent satisfaction: Directly and indirectly impacting customer experience.
      • Risk management: Actively knowing and mitigating threats to the organization.
      • Delivering on business objectives: Aligning IT initiatives to the vision of the organization.
      • Employee engagement: Creating an IT workforce of engaged and purpose-driven people.
      • Business leadership relations: Establishing a network of influential business leaders.

      Deliver High-Value IT Dashboards to Your Executives

      A diagram that shows Delivering High-Value IT Dashboards to Your Executives

      Info-Tech’s approach

      Deliver High-Value Dashboards to Your Executives

      A diagram that shows High-Value Dashboard Process.

      Executives recognize the benefits of dashboards:
      87% of respondents to an Exasol study agreed that their organization’s leadership team would make more data-driven decisions if insights were presented in a simpler and more understandable way
      (Source: Exasol)

      The Info-Tech difference:

      We created dashboards for you so you don’t have to!

      1. Eliminate 80% of the dashboard design work by selecting from our ready-made Info-Tech IT Dashboards.
      2. Use our IT Dashboard Workbook to adjust the dashboards to your audience and organization.
      3. Follow our blueprint and IT Dashboard Workbook tool to craft, and deliver your dashboard to your CXO team, then action feedback from your audience to continuously improve.

      Info-Tech’s methodology for establishing high-value dashboards

      1. Test Info-Tech’s IT Dashboards Against Your Audience’s Needs

      Phase Steps

      1. Validate Info-Tech’s IT Dashboards for Your Audience
      2. Identify and Document Your Audience’s Needs

      Phase Outcomes

      1. Initial impressions of Info-Tech IT Dashboards
      2. Completed Tabs 2 of the IT Dashboard Workbook

      2. Translate Audience Needs into Metrics

      Phase Steps

      1. Review Info-Tech’s IT Dashboards for Your Audience
      2. Derive Metrics from Audience Needs
      3. Associate metrics to Dashboards

      Phase Outcomes

      1. Completed IT Tab 3 of IT Dashboard Workbook

      3. Ready Your Data for Dashboards

      Phase Steps

      1. Assess Data Inventory
      2. Assess Data Quality
      3. Assess Data Readiness
      4. Assess Data Frequency

      Phase Outcomes

      1. Assessed Info-Tech IT Dashboards for your audience’s needs
      2. Completed Tab 5 of the IT Dashboard Workbook
      3. Finalized dashboards

      4. Build and Deliver Your Dashboards

      Phase Steps

      1. Design Your Dashboard
      2. Update Your Dashboards
      3. Craft Your Story and Deliver Your Dashboards

      Phase Outcomes

      1. Completed IT Tab 5 and 6 of IT Dashboard Workbook and finalized dashboards

      5. Plan, Record, and Action Your Metrics

      Phase Steps

      1. Plan How to Record Metrics
      2. Record and Action Metrics

      Phase Outcomes

      1. Completed IT Dashboards tailored to your organization
      2. Completed IT Dashboard Workbook

      How to Use This Blueprint

      Choose the path that works for you

      A diagram that shows path of using this blueprint.

      The Info-Tech IT Dashboards address several needs:

      1. New to dashboards and metrics and not sure where to begin? Let the phases in the blueprint guide you in using Info-Tech’s IT Dashboards to create your own dashboards.
      2. Already know who your audience is and what you want to show? Augment the Info-Tech’s IT Dashboards framework with your own data and visuals.
      3. Already have a tool you would like to use? Use the Info-Tech’s IT Dashboards as a design document to customize your tool.

      Insight Summary

      The need for easy-to-consume data is on the rise making dashboards a vital data communication tool.

      70%: Of employees will be expected to use data heavily by 2025, an increase from 40% in 2018.
      — Source: Tableau

      Overarching insight

      A dashboard’s primary purpose is to drive action. It may also serve secondary purposes to update, educate, and communicate, but if a dashboard does not drive action, it is not serving its purpose.

      Insight 1

      Start with the audience. Resist the urge to start with the data. Think about who your audience is, what internal and external environmental factors influence them, what problems they need to solve, what goals they need to achieve, then tailor the metrics and dashboards to suit.

      Insight 2

      Avoid showing IT activity-level metrics. Instead use CIO priority-based metrics to report on what matters to the organization. The Info-Tech IT Dashboards are organized by the CIO priorities: risks, financials, talent, and strategic initiatives.

      Insight 3

      Dashboards show the what not the why. Do not assume your audience will draw the same conclusions from your graphs and charts as you do. Provide the why by interpreting the results, adding insights and calls to action, and marking key areas for discussion.

      Insight 4

      A dashboard is a communication tool and should reflect the characteristics of good communication. Be clear, concise, consistent, and relevant.

      Insight 5

      Action your data. Act and report progress on your metrics. Gathering metrics has a cost, so if you do not plan to action a metric, do not measure it.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Photo of Dashboards

      Key deliverable: Dashboards

      Ready-made risk, financials, talent, and strategic initiatives dashboards that organize your data in a visually appealing way so you can concentrate on the metrics and communication.

      Photo of IT Dashboard Workbook

      IT Dashboard Workbook

      The IT Dashboard Workbook keeps all your metrics, data, and dashboard work in one handy file!

      Photo of IT Dashboard Guide

      IT Dashboard Guide

      The IT Dashboard Guide provides the Info-Tech IT Dashboards and information about how to use them.

      Blueprint benefits

      CIO Benefits

      • Reduces the burden of figuring out what metrics to show executives and how to categorize and arrange the visuals.
      • Increases audience engagement through tools and methods that guide CIOs through tailoring metrics and dashboards to audience needs.
      • Simplifies CIO messages so executives better understand IT needs and value.
      • Provides CIOs with the tools to demonstrate transparency and competency to executive leaders.
      • Provides tools and techniques for regular review and action planning of metrics results, which leads to improved performance, efficiency, and effectiveness.

      Business Benefits

      • Provides a richer understanding of the IT landscape and a clearer connection of how IT needs and issues impact the organization.
      • Increases understanding of the IT team’s contribution to achieving business outcomes.
      • Provides visibility into IT and business trends.
      • Speeds up decision making by providing insights and interpretations to complex situations.

      Measure the value of this blueprint

      Realize measurable benefits after using Info-Tech’s approach:

      Determining what you should measure, what visuals you should use, and how you should organize your visuals, is time consuming. Calculate the time it has taken you to research what metrics you should show, create the visuals, figure out how to categorize the visuals, and layout your visuals. Typically, this takes about 480 hours of time. Use the ready-made Info-Tech IT Dashboards and the IT Dashboard Workbook to quickly put together a set of dashboards to present your CXO. Using these tools will save approximately 480 hours.

      A study at the University of Minnesota shows that visual presentations are 43% more effective at persuading their audiences (Bonsignore). Estimate how persuasive you are now by averaging how often you have convinced your audience to take a specific course of action. After using the Info-Tech IT Dashboards and visual story telling techniques described in this blueprint, average again. You should be 43% more persuasive.

      Further value comes from making decisions faster. Baseline how long it takes, on average, for your executive team to make a decision before using Info-Tech’s IT Dashboards then time how long decisions take when you use your Info-Tech’s IT Dashboards. Your audience should reach decisions 21% faster according to studies at Stanford University and the Wharton School if business (Bonsignore).

      Case Study

      Visuals don’t have to be fancy to communicate clear messages.

      • Industry: Construction
      • Source: Anonymous interview participant

      Challenge

      Year after year, the CIO of a construction company attended business planning with the Board to secure funding for the year. One year, the CEO interrupted and said, “You're asking me for £17 million. You asked me for £14 million last year and you asked me for £12 million the year before that. I don't quite understand what we get for our money.”

      The CEO could not understand how fixing laptops would cost £17 million and for years no one had been able to justify the IT spend.

      Solutions

      The CIO worked with his team to produce a simple one-page bubble diagram representing each IT department. Each bubble included the total costs to deliver the service, along with the number of employees. The larger the bubble, the higher the cost. The CIO brought each bubble to life as he explained to the Board what each department did.

      The Board saw, for example, that IT had architects who thought about the design of a service, where it was going, the life cycle of that service, and the new products that were coming out. They understood what those services cost and knew how many architects IT had to provide for those services.

      Recommendations

      The CEO remarked that he finally understood why the CIO needed £17 million. He even saw that the costs for some IT departments were low for the amount of people and offered to pay IT staff more (something the CIO had requested for years).

      Each year the CIO used the same slide to justify IT costs and when the CIO needed further investment for things like security or new products, an upgrade, or end of life support, the sign-offs came very quickly because the Board understood what IT was doing and that IT wasn't a bottomless pit.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      What does a typical GI on this topic look like?

      A diagram that shows Guided Implementation in 5 phases.

      Workshop overview

      Day 1: Test Info-tech’s IT Dashboards Against Your Audience’s Needs and Translate Audience Needs Into Metrics

      Activities
      1.1 Review the info-Tech IT Dashboards and document impressions for your organization.
      1.2 Identify your audience’s attributes.
      1.3 Identify timeline and deadlines for dashboards.
      1.4 Identify and prioritize audience needs and desired outcomes.
      1.5 Associate metrics to each need.
      1.6 Identify a dashboard for each metric.

      Deliverables
      1. Initial impressions of Info-Tech IT Dashboards.
      2. Completed Tabs 2 and 3 of the IT Dashboard Workbook.

      Day 2: Inventory Your Data; Assess Data Quality and Readiness

      Activities
      2.1 Complete a data inventory for each metric on each dashboard: determine how you will measure the metric, the KPI, any observation biases, the location of the data, the type of source, and the owner and security/compliance requirements.
      2.2 Assess data quality for availability, accuracy, and standardization.
      2.3 Assess data readiness and frequency of measurement and reporting.

      Deliverables
      1. Completed Tab 4 of the IT Dashboard Workbook.

      Day 3: Design and Build Your Dashboards

      Activities
      3.1 Revisit the Info-Tech IT Dashboards and use the identified metrics to determine what should change on the dashboards.
      3.2 Build your dashboards by editing the Info-Tech IT Dashboards with your changes as planned in Step 3.1.

      Deliverables
      1. Assessed Info-Tech IT Dashboards for your audience’s needs.
      2. Completed Tab 5 of the IT Dashboard Workbook.
      3. Finalized dashboards.

      Day 4: Deliver Your Dashboard and Plan to Action Metrics

      Activities
      4.1 Craft your story.
      4.2 Practice delivering your story.
      4.3 Plan to action your metrics.
      4.4 Understand how to record and address your results.

      Deliverables
      1. Completed Tabs 6 and 7 of the IT Dashboard Workbook.

      Day 5: Next Steps and Wrap-Up (offsite)

      Activities
      5.1 Complete in-progress deliverables from previous four days
      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables
      1. Completed IT Dashboards tailored to your organization.
      2. Completed IT Dashboard Workbook.

      Contact your account representative for more information.

      workshops@infotech.com
      1-888-670-8889

      What is an IT dashboard?

      A photo of Risks - Protect the Organization. A photo of Financials: Transparent, fiscal responsibility
      A photo of talent attrat and retain top talent A photo of Strategic Initiatives: Deliver Value to Customers.

      An IT dashboard is…
      a visual representation of data, and its main purpose is to drive actions. Well-designed dashboards use an easy to consume presentation style free of clutter. They present their audience with a curated set of visuals that present meaningful metrics to their audience.

      Dashboards can be both automatically or manually updated and can show information that is dynamic or a snapshot in time.

      Info-Tech IT Dashboards

      Review the Info-Tech IT Dashboards

      We created dashboards so you don’t have to.

      A photo of Risks - Protect the Organization. A photo of Financials: Transparent, fiscal responsibility A photo of talent attrat and retain top talent A photo of Strategic Initiatives: Deliver Value to Customers.

      Use the link below to download the Info-Tech IT Dashboards and consider the following:

      1. What are your initial reactions to the dashboards?
      2. Are the visuals appealing? If so, what makes them appealing?
      3. Can you use these dashboards in your organization? What makes them usable?
      4. How would you use these dashboards to speak your own IT information to your audience?

      Download the Info-Tech IT Dashboards

      Why Use Dashboards When We Have Data?

      How graphics affect us

      Cognitively

      • Engage our imagination
      • Stimulate the brain
      • Heighten creative thinking
      • Enhance or affect emotions

      Emotionally

      • Enhance comprehension
      • Increase recollection
      • Elevate communication
      • Improve retention

      Visual clues

      • Help decode text
      • Attract attention
      • Increase memory

      Persuasion

      • 43% more effective than text alone

      — Source: (Vogel et al.)

      Phase 1

      Test Info-Tech’s IT Dashboards Against Your Audience’s Needs

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Documenting impressions for using Info-Tech’s IT Dashboards for your audience.
      • Documenting your audience and their needs and metrics for your IT dashboards

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Info-Tech IT Dashboard organization and audience

      We created a compelling way to organize IT dashboards so you don’t have to. The Info-Tech IT Dashboards are organized by CIO Priorities, and these are consistent irrespective of industry or organization. This is a constant that you can organize your metrics around.

      A photo of Info-Tech IT Dashboards

      Dashboard Customization

      The categories represent a constant around which you can change the order; for example, if your CXO is more focused on Financials, you can switch the Financials dashboard to appear first.

      The Info-Tech IT Dashboards are aimed at a CXO audience so if your audience is the CXO, then you may decide to change very little, but you can customize any visual to appeal to your audience.

      Phase 1 will get you started with your audience.

      Always start with the audience

      …and not the data!

      Reliable, accurate data plays a critical role in dashboards, but data is only worthwhile if it is relevant to the audience who consumes it, and dashboards are only as meaningful as the data and metrics they represent.

      Instead of starting with the data, start with the audience. The more IT understands about the audience, the more relevant the metrics will be to their audience and the more aligned leadership will be with IT.

      Don’t forget yourself and who you are. Your audience will have certain preconceived notions about who you are and what you do. Consider these when you think about what you want your audience to know.

      46% executives identify lack of customization to individual user needs as a reason they struggle with dashboards.
      — Source: (Exasol)

      Resist the Data-First Temptation

      If you find yourself thinking about data and you haven’t thought about your audience, pull yourself back to the audience.

      Ask first Ask later
      Who is this dashboard for? What data should I show?
      How will the audience use the dashboard to make decisions? Where do I get the data?
      How can I show what matters to the audience? How much effort is required to get the data?

      Meaningful measures rely on understanding your audience and their needs

      It is crucial to think about who your audience is so that you can translate their needs into metrics and create meaningful visuals for your dashboards.

      A diagram that highlights step 1-3 of understanding your audience in the high-value dashboard process.

      Step 1.1

      Review and Validate Info-Tech’s IT Dashboards for Your Audience

      Activities:
      1.1.1 Examine Info-Tech’s IT Dashboards.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 1.1 & 1.2 to Test Info-Tech’s IT Dashboards Against Your Audience’s Needs.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Info-Tech dashboards reviewed for your organization’s audience.

      1.1.1 Examine the Info-Tech IT Dashboards

      30 minutes

      1. If you haven’t already downloaded the Info-Tech IT Dashboards, click the link below to download.
      2. Complete a quick review of the dashboards and consider how your audience would receive them.
      3. Document your thoughts, with special emphasis on your audience in the Info-Tech Dashboard Impressions slide.

      A diagram that shows Info-Tech IT Dashboards

      Download Info-Tech IT Dashboards

      Reviewing visuals can help you think about how your audience will respond to them

      Jot down your thoughts below. You can refer to this later as you consider your audience.

      Consider:

      • Who is your dashboard audience?
      • Are their needs different from the Info-Tech IT Dashboard audience’s? If so, how?
      • Will the visuals work for your audience on each dashboard?
      • Will the order of the dashboards work for your audience?
      • What is missing?

      Step 1.2

      Identify and Document Your Audience’s Needs

      Activities:
      1.2.1 Document your audience’s needs in the IT Dashboard Workbook.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 1.1 & 1.2 to Test Info-Tech’s IT Dashboards Against Your Audience’s Needs.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Audience details documented in IT Dashboard Workbook

      Identify Your Audience and dig deeper to understand their needs

      Connect with your audience

      • Who is your audience?
      • What does your audience care about? What matters to them?
      • How is their individual success measured? What are their key performance indicators (KPIs)?
      • Connect the challenges and pain points of your audience to how IT can help alleviate those pain points:
        • For example, poor financial performance could be due to a lack of digitization. Identify areas where IT can help alleviate this issue.
        • Try to uncover the root cause behind the need. Root causes are often tied to broad organizational objectives, so think about how IT can impact those objectives.

      Validate the needs you’ve uncovered with the audience to ensure you have not misinterpreted them and clarify the desired timeline and deadline for the dashboard.

      Document audiences and needs on Tab 2 of the IT Dashboard Workbook

      Typical Audience Needs
      Senior Leadership
      • Inform strategic planning and track progress toward objectives.
      • Understand critical challenges.
      • Ensure risks are managed.
      • Ensure budgets are managed.
      Board of Directors
      • Understand organizational risks.
      • Ensure organization is fiscally healthy.
      Business Partners
      • Support strategic workforce planning.
      • Surface upcoming risks to workforce.
      CFO
      • IT Spend
      • Budget Health and Risks

      Prioritize and select audience needs that your dashboard will address

      Prioritize needs by asking:

      • Which needs represent the largest value to the entire organization (i.e. needs that impact more of the organization than just the audience)?
      • Which needs will have the largest impact on the audience’s success?
      • Which needs are likely to drive action (e.g. if supporting a decision, is the audience likely to be amenable to changing the way they make that decision based on the data)?

      Select three to five of the highest priority needs for each audience to include on a dashboard.

      Prioritize needs on Tab 2 of the IT Dashboard Workbook

      A diagram that shows 3 tiers of high priority, medium priority, and low priority.

      1.2.1 Document Your Audience Needs in the IT Dashboard Workbook

      1 hour

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 2. The workbook contains pre-populated text that reflects information about Info-Tech’s IT Dashboards. You may want to keep the pre-populated text as reference as you identify your own audience then remove after you have completed your updates.

      A table of documenting audience, including key attributes, desired timeline, deadline, needs, and priority.

      Download Info-Tech IT Dashboard Workbook

      Phase 2

      Translate Audience Needs Into Metrics

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Revisiting the Info-Tech IT Dashboards for your audience.
      • Documenting your prioritized audience’s needs and the desired outcome of each in the IT Dashboard Workbook.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Linking audience needs to metrics has positive outcomes

      When you present metrics that your audience cares about, you:

      • Deliver real value and demonstrate IT’s value as a trusted partner.
      • Improve the relationship between the business and IT.
      • Enlighten the business about what IT does and how it is connected to the organization.

      29% of respondents to The Economist Intelligence Unit survey cited inadequate collaboration between IT and the business as one of the top barriers to the organization’s digital objectives.
      — Source: Watson, Morag W., et al.

      Dashboard Customization

      The Info-Tech IT Dashboards use measures for each dashboard that correspond with what the audience (CXO) cares about. You can find these measures in the IT Dashboard Workbook. If your audience is the CXO, you may have to change a little but you should still validate the needs and metrics in the IT Dashboard Workbook.

      Phase 2 covers the process of translating needs into metrics.

      Once you know what your audience needs, you know what to measure

      A diagram that highlights step 4-5 of knowing your audience needs in the high-value dashboard process.

      Step 2.1

      Document Desired Outcomes for Each Prioritized Audience Need

      Activities:
      2.1.1 Compare the Info-Tech IT Dashboards with your audience’s needs.
      2.1.2 Document prioritized audience needs and the desired outcome of each in the IT Dashboard Workbook.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 2.1 to 2.3 to translate audience needs into metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Understanding of how well Info-Tech IT Dashboards address audience needs.
      • Documented desired outcomes for each audience need.

      2.1.1 Revisit Info-Tech’s IT Dashboards and Review for Your Audience

      30 minutes

      1. If you haven’t already downloaded the Info-Tech IT Dashboards, click the link below to download.
      2. Click the link below to download the Info-Tech IT Dashboard Workbook.
      3. Recall your first impressions of the dashboards that you recorded on earlier in Phase 1 and open up the audience and needs information you documented in Tab 2 of the IT Dashboard Workbook.
      4. Compare the dashboards with your audience’s needs that you documented on Tab 2.
      5. Record any updates to your thoughts or impressions on the next slide. Think about any changes to the dashboards that you would make so that you can reference it when you build the dashboards.

      Download Info-Tech IT Dashboard Workbook

      A photo of Info-Tech IT Dashboards
      The Info-Tech IT Dashboards contain a set of monthly metrics tailored toward a CXO audience.

      Download Info-Tech IT Dashboards

      Knowing what your audience needs, do the metrics the visuals reflect address them?

      Any changes to the Info-Tech IT Dashboards?

      Consider:

      • Are your audience’s needs already reflected in the visuals in each of the dashboards? If so, validate this in the next activity by reviewing the prioritized needs, desired outcomes, and associated metrics already documented in the IT Dashboard Workbook.
      • Are there any visuals your audience would need that you don’t see reflected in the dashboards? Write them here to use in the next exercise.

      Desired outcomes make identifying metrics easier

      When it’s not immediately apparent what the link between needs and metrics is, brainstorm desired outcomes.

      A diagram that shows an example of desired outcomes

      2.1.2 Document your audience’s desired outcome per prioritized need

      Now that you’ve examined the Info-Tech IT Dashboards and considered the needs of your audience, it is time to understand the outcomes and goals of each need so that you can translate your audience’s needs into metrics.

      1 hour

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 3. The workbook contains pre-populated text that reflects information about Info-Tech’s IT Dashboards. You may want to keep the pre-populated text as reference as you identify your own audience then remove it after you have completed your updates.

      A diagram that shows desired outcome per prioritized need

      Download Info-Tech IT Dashboard Workbook

      Deriving Meaningful Metrics

      Once you know the desired outcomes, you can identify meaningful metrics

      A diagram of an example of meaningful metrics.

      Common Metrics Mistakes

      Avoid the following oversights when selecting your metrics.

      A diagram that shows 7 metrics mistakes

      Step 2.2

      Derive Metrics From Audience Needs

      Activities:
      2.2.1 Derive metrics using the Info-Tech IT Dashboards and the IT Dashboard Workbook.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 2.1 to 2.3 to translate audience needs into metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented metrics for audience needs.

      2.2.1 Derive metrics from desired outcomes

      Now that you have completed the desired outcomes, you can determine if you are meeting those desired outcomes. If you struggle with the metrics, revisit the desired outcomes. It could be that they are not measurable or are not specific enough.

      2 hours

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 3. The workbook contains pre-populated text that reflects information about Info-Tech’s IT Dashboards. You may want to keep the pre-populated text as reference as you identify your own audience then remove it after you have completed your updates.

      A diagram that shows derive metrics from desired outcomes

      Download Info-Tech IT Dashboard Workbook

      Download IT Metrics Library

      Download HR Metrics Library

      Step 2.3

      Associate Metrics to Dashboards

      Activities:
      2.3.1 Review the metrics and identify which dashboard they should appear on.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 2.1 to 2.3 to translate audience needs into metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Metrics associated to each dashboard.

      2.3.1 Associate metrics to dashboards

      30 minutes

      Once you have identified all your metrics from Step 2.2, identify which dashboard they should appear on. As with all activities, if the Info-Tech IT Dashboard meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information.

      A diagram that shows associate metrics to dashboards

      Phase 3

      Ready Your Data for Dashboards

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Inventorying your data
      • Assessing your data quality
      • Determining data readiness
      • Determining data measurement frequency

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Can you measure your metrics?

      Once appropriate service metrics are derived from business objectives, the next step is to determine how easily you can get your metric.

      A diagram that highlights step 5 of measuring your metrics in the high-value dashboard process.

      Make sure you select data that your audience trusts

      40% of organizations say individuals within the business do not trust data insights.
      — Source: Experian, 2020

      Phase 3 covers the process of identifying data for each metric, creating a data inventory, assessing the readiness of your data, and documenting the frequency of measuring your data. Once complete, you will have a guide to help you add data to your dashboards.

      Step 3.1

      Assess Data Inventory

      Activities:
      3.1.1 Download the IT Dashboard Workbook and complete the data inventory section on Tab 4.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 3.1 to 3.4 to ready your data for dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented data inventory for each metric.

      3.1.1 Data Inventory

      1 hour

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 4. The pre-populated text is arranged into the tables according to the dashboard they appear on; you may need to scroll down to see all the dashboard tables.

      Create a data inventory by placing each metric identified on Tab 3 into the corresponding dashboard table. Complete each column as described below.

      A diagram that shows 9 columns of data inventory.

      Metrics Libraries: Use the IT Metrics Library and HR Metrics Library for ideas for metrics to use and how to measure them.

      Download Info-Tech IT Dashboard Workbook

      Step 3.2

      Assess Data Quality

      Activities:
      3.2.1 Use the IT Dashboard Workbook to complete an assessment of data quality on Tab 4.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 3.1 to 3.4 to ready your data for dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented data quality assessment for each metric.

      3.2.1 Assess Data Quality

      1 hour

      Document the data quality on Tab 4 of the IT Dashboard Workbook by filling in the data availability, data accuracy, and data standardization columns as described below.

      A diagram that shows data availability, data accuracy, and data standardization columns.

      Data quality is a struggle for many organizations. Consider how much uncertainty you can tolerate and what would be required to improve your data quality to an acceptable level. Consider cost, technological resources, people resources, and time required.

      Download Info-Tech IT Dashboard Workbook

      Step 3.3

      Assess Data Readiness

      Activities:
      3.3.1 Use the IT Dashboard Workbook to determine the readiness of your data.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 3.1 to 3.4 to ready your data for dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented data readiness for each metric

      3.3.1 Determine Data Readiness

      1 hour

      Once the data quality has been documented and examined, complete the Data Readiness section of Tab 4 in the Info-Tech IT Dashboard Workbook. Select a readiness classification using the definitions below. Use the readiness of your data to determine the level of effort required to obtain the data and consider the constraints and cost/ROI to implement new technology or revise processes and data gathering to produce the data.

      A diagram that shows data readiness section

      Remember: Although in most cases, simple formulas that can be easily understood are the best approach, both because effort is lower and data that is not manipulated is more trustworthy, do not abandon data because it is not perfect but instead plan to make it easier to obtain.

      Download Info-Tech IT Dashboard Workbook

      Step 3.4

      Assess Data Frequency

      Activities:
      3.4.1 Use the IT Dashboard Workbook to determine the readiness of your data and how frequently you will measure your data.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 3.1 to 3.4 to assess data inventory, quality, and readiness.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented frequency of measurement for each metric.

      3.4.1 Document Planned Frequency of measurement

      10 minutes

      Document the planned frequency of measurement for all your metrics on Tab 4 of the IT Dashboard Workbook.

      For each metric, determine how often you will need to refresh it on the dashboard and select a frequency from the drop down. The Info-tech IT Dashboards assume a monthly refresh.

      Download Info-Tech IT Dashboard Workbook

      Phase 4

      Build and Deliver Your Dashboards

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Designing your dashboards
      • Updating your dashboards
      • Crafting your story
      • Delivering your dashboards

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Using your dashboard to tell your story with visuals

      Now that you have linked metrics to the needs of your audience and you understand how to get your data, it is time to start building your dashboards.

      A diagram that highlights step 6 of creating meaningful visuals in the high-value dashboard process.

      Using visual language

      • Shortens meetings by 24%
      • Increases the ability to reach consensus by 21%
      • Strengthens persuasiveness by 43%

      — Source: American Management Association

      Phase 4 guides you through using the Info-Tech IT Dashboard visuals for your audience’s needs and your story.

      Step 4.1

      Design Your Dashboard

      Activities:
      4.1.1 Plan and validate dashboard metrics, data, level of effort and visuals.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 4.1 to 4.3 to build and deliver your dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Identified and validated metrics, data, and visuals for your IT dashboards.

      Use clear visuals that avoid distracting the audience

      Which visual is better to present?

      Sample A:
      A photo of Sample A visuals

      Sample B:
      A diagram Sample B visuals

      Select the appropriate visuals

      Identify the purpose of the visualization. Determine which of the four categories below aligns with the story and choose the appropriate visual to display the data.

      Relationship

      A photo of Scatterplots
      Scatterplots

      • Used to show relationships between two variables.
      • Can be difficult to interpret for audiences that are not familiar with them.

      Distribution

      A photo of Histogram
      Histogram

      • Use a histogram to show spread of a given numeric variable.
      • Can be used to organize groups of data points.
      • Requires continuous data.
      • Can make comparisons difficult.

      A photo of Scatterplot
      Scatterplot

      • Can show correlation between variables.
      • Show each data plot, making it easier to compare.

      Composition

      A photo of Pie chart
      Pie chart

      • Use pie charts to show different categories.
      • Avoid pie charts with numerous slices.
      • Provide numbers alongside slices, as it can be difficult to compare slices based on size alone.

      A photo of Table
      Table

      • Use tables when there are a large number of categories.
      • Presents information in a simple way.

      Comparison

      A photo of Bar graph
      Bar graph

      • Use to compare categories.
      • Easy to understand, familiar format.

      A photo of Line chart
      Line chart

      • Use to show trends or changes over time.
      • Clear and easy to analyze.

      (Calzon)

      Examples of data visualization

      To compare categories, use a bar chart:
      2 examples of bar chart
      Conclusion: Visualizing the spend in various areas helps prioritize.


      To show trends, use a line graph:
      An example of line graph.
      Conclusion: Overlaying a trend line on revenue per employee helps justify headcount costs.


      To show simple results, text is sometimes more clear:
      A diagram that shows examples of text and graphics.
      Conclusion: Text with meaningful graphics conveys messages quickly.


      To display relative percentages of values, use a pie chart:
      An example of pie chart.
      Conclusion: Displaying proportions in a pie chart gives an at-a-glance understanding of the amount any area uses.

      Choose effective colors and design

      Select colors that will enhance the story

      • Use color strategically to help draw the audience’s attention and highlight key information.
      • Choose two to three colors to use consistently throughout the dashboard, as too many colors will be distracting to the audience.
      • Use colors that connect with the audience (e.g., organization or department colors).
      • Don’t use colors that are too similar in shade or brightness level, as those with colorblindness might have difficulty discerning them.

      Keep the design simple and clear

      • Leave white space to separate sections and keep the dashboard simple.
      • Don’t measure everything; show just enough to address the audience’s needs.
      • Use blank space between data points to provide natural contrast (e.g., leaving space between each bar on a bar graph). Don’t rely on contrast between colors to separate data (Miller).
      • Label each data point directly instead of using a separate key, so anyone who has difficulty discerning color can still interpret the data (Miller).

      Example

      A example that shows colours and design of a chart.

      Checklist to build compelling visuals in your presentation

      Leverage this checklist to ensure you are creating the perfect visuals and graphs for your presentation.

      Checklist:

      • Do the visuals grab the audience’s attention?
      • Will the visuals mislead the audience/confuse them?
      • Do the visuals facilitate data comparison or highlight trends and differences in a more effective manner than words?
      • Do the visuals present information simply, cleanly, and accurately?
      • Do the visuals illustrate messages and themes from the accompanying text?

      4.1.1 Plan and validate your dashboard visuals

      1 hour

      Click the links below to download the Info-Tech IT Dashboards and the IT Dashboard Workbook. Open the IT Dashboard Workbook and select Tab 5. For each dashboard, represented by its own table, open the corresponding Info-Tech IT Dashboard as reference.

      A diagram of dashboard and its considerations when selecting visuals.

      Download Info-Tech IT Dashboards

      Download Info-Tech IT Dashboard Workbook

      Step 4.2

      Update Your Dashboards

      Activities:
      4.2.1 Update the visuals on the Info-Tech IT Dashboards with data and visuals identified in the IT Dashboard Workbook.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 4.1 to 4.3 to build and deliver your dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Dashboards updated with your visuals, metrics, and data identified in the IT Dashboard Workbook.

      4.2.1 Update visuals with your own data

      2 hours

      1. Get the data that you identified in Tab 4 and Tab 5 of the IT Dashboard Workbook.
      2. Click the link below to go to the Info-Tech IT Dashboards and follow the instructions to update the visuals.

      Do not worry about the Key Insights or Calls to Action; you will create this in the next step when you plan your story.

      Download Info-Tech IT Dashboards

      Step 4.3

      Craft Your Story and Deliver Your Dashboards

      Activities:
      4.3.1 Craft Your Story
      4.3.2 Finalize Your Dashboards
      4.3.3 Practice Delivering Your Story With Your Dashboards

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 4.1 to 4.3 to build and deliver your dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented situations, key insights, and calls to action for each dashboard/visual.
      • A story to tell for each dashboard.
      • Understanding of how to practice delivering the dashboards using stories.

      Stories are more easily understood and more likely to drive decisions

      IT dashboards are valuable tools to provide insights that drive decision making.

      • Monitor: Track and report on strategic areas IT supports.
      • Provide insights: sPresent important data and information to audiences in a clear and efficient way.

      “Data storytelling is a universal language that everyone can understand – from people in STEM to arts and psychology.” — Peter Jackson, Chief Data and Analytics Officer at Exasol

      Storytelling provides context, helping the audience understand and connect with data and metrics.

      • 93% of respondents (business leaders and data professionals) agreed that decisions made as a result of successful data storytelling have the potential to help increase revenue.
      • 92% of respondents agreed that data storytelling was critical to communicate insights effectively.
      • 87% percent of respondents agreed that leadership teams would make more data-driven decisions if insights gathered from data were presented more simply.

      — Exasol

      For more visual guidance, download the IT Dashboard Guide

      Include all the following pieces in your message for an effective communication

      A diagram of an effective message, including consistent, clearn, relevant, and concise.

      Info-Tech Insight

      Time is a non-renewable resource. The message crafted must be considered a value-adding communication to your audience.

      Enable good communication with these components

      Be Consistent

      • The core message must be consistent regardless of audience, channel, or medium.
      • Test your communication with your team or colleagues to obtain feedback before delivering to a broader audience.
      • A lack of consistency can be interpreted as an attempt at deception. This can hurt credibility and trust.

      Be Clear

      • Say what you mean and mean what you say.
      • Choice of language is important: “Do you think this is a good idea? I think we could really benefit from your insights and experience here.” Or do you mean: “I think we should do this. I need you to do this to make it happen.”
      • Avoid jargon.

      Be Relevant

      • Talk about what matters to the audience.
      • Tailor the details of the message to the audience’s specific concerns.
      • IT thinks in processes but wider audiences focus mostly on results; talk in terms of results.
      • IT wants to be understood, but this does not matter to stakeholders. Think: “What’s in it for them?”
      • Communicate truthfully; do not make false promises or hide bad news.

      Be Concise

      • Keep communication short and to the point so key messages are not lost in the noise.
      • There is a risk of diluting your key message if you include too many other details.
      • If you provide more information than necessary, the clarity and consistency of the message can be lost.

      Draft the core messages to communicate

      1. Hook your audience: Use a compelling introduction that ensures your target audience cares about the message. Start with a story or metaphor and then support with the data on your dashboard. Avoid rushing in with data first.
      2. Demonstrate you can help: Let the audience know that based on the unique problem, you can help. There is value in engaging and working with you further.
      3. Write for the ear: Use concise and clear sentences, avoid technological language, and when you read it aloud ensure it sounds like how you would normally speak.
      4. Interpret visuals for your audience: Do not assume they will reach the same conclusions as you. For example, walk them through what a chart shows even if the axes are labeled, tell them what a trend line indicates or what the comparison between two data points means.
      5. Identify a couple of key insights: Think about one or two key takeaways you want your audience to leave with.
      6. Finish with a call to action: Your concluding statement should not be a thank-you but a call to action that ignites how your audience will behave after the communication. Dashboards exist to drive decisions, so if you have no call to action, you should ask if you need to include the visual.

      4.3.1 Craft Your Story

      1 hour

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 6. The workbook contains grey text that reflects a sample story about the Info-Tech IT Dashboards. You may want to keep the sample text as reference, then remove after you have entered your information.

      A diagram of dashboard to craft your story.

      Download Info-Tech IT Dashboard Workbook

      4.3.2 Finalize Your Dashboards

      30 minutes

      1. Take the Key Insights and Calls to Action that you documented in Tab 6 of the IT Dashboard Workbook and place them in their corresponding dashboard.
      2. Add any text to your dashboard as necessary but only if the visual requires more information. You can add explanations more effectively during the presentation.

      A diagram that shows strategic initiatives: deliver value to customers.

      Tip: Aim to be brief and concise with any text. Dashboards simplify information and too much text can clutter the visuals and obscure the message.

      Download Info-Tech IT Dashboard Workbook

      4.3.3 Practice Delivering Your Story With Your Dashboards

      1 hour

      Ideally you can present your dashboard to your audience so that you are available to clarify questions and add a layer of interpretation that would crowd out boards if added as text.

      1. To prepare to tell your story, consult the Situation, Key Insights, and Call to Action sections that you documented for each dashboard in Tab 6 of the Info-Tech IT Dashboard Workbook.
      2. Practice your messages as you walk through your dashboards. The next two slides provide delivery guidance.
      3. Once you deliver your dashboards, update Tab 6 with audience feedback. Often dashboards are iterative and when your audience sees them, they are usually inspired to think about what else they would like to see. This is good and shows your audience is engaged!

      Don’t overwhelm your audience with information and data. You spent time to craft your dashboards so that they are clear and concise, so spend time practicing delivering a message that matches your clear, concise dashboards

      Download Info-Tech IT Dashboard Workbook

      Hone presentation skills before meeting with key stakeholders

      Using voice and body

      Think about the message you are trying to convey and how your body can support that delivery. Hands, stance, and frame all have an impact on what might be conveyed.

      If you want your audience to lean in and be eager about your next point, consider using a pause or softer voice and volume.

      Be professional and confident

      State the main points of your dashboard confidently. While this should be obvious, it needs to be stated explicitly. Your audience should be able to clearly see that you believe the points you are stating.

      Present in a way that is genuine to you and your voice. Whether you have an energetic personality or a calm and composed personality, the presentation should be authentic to you.

      Connect with your audience

      Look each member of the audience in the eye at least once during your presentation or if you are presenting remotely, look into the camera. Avoid looking at the ceiling, the back wall, or the floor. Your audience should feel engaged – this is essential to keeping their attention.

      Avoid reading the text from your dashboard, and instead paraphrase it while maintaining eye/camera contact.

      Info-Tech Insight

      You are responsible for the response of your audience. If they aren’t engaged, it is on you as the communicator.

      Communication Delivery Checklist

      • Have you practiced delivering the communication to team members or coaches?
      • Have you practiced delivering the communication to someone with little to no technology background?
      • Are you making yourself open to feedback and improvement opportunities?
      • If the communication is derailed from your plan, are you prepared to handle that change?
      • Can you deliver the communication without reading your notes word for word?
      • Have you adapted your voice throughout the communication to highlight specific components you want the audience to focus on?
      • Are you presenting in a way that is genuine to you and your personality?
      • Can you communicate the message within the time allotted?
      • Are you moving in an appropriate manner based on your communication (e.g., toward the screen, across the stage, hand gestures)
      • Do you have room for feedback on the dashboards? Solicit feedback with your audience after the meeting and record it in Tab 6 of the IT Dashboard Workbook.

      Phase 5

      Plan, record, and action your metrics

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Planning to track your metrics
      • Recording your metrics
      • Actioning your metrics

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Actioning your metrics to drive results

      To deliver real value from your dashboards, you need to do something with the results.

      Don’t fail on execution! The whole reason you labor to create inviting visuals and meaningful metrics is to action those metrics. The metrics results inform your entire story! It’s important to plan and do, but everything is lost if you fail to check and act.

      70%: of survey respondents say that managers do not get insights from performance metrics to improve strategic decision making.
      60%: of survey respondents say that operational teams do not get insights to improve operation decision making.

      (Bernard Marr)

      “Metrics aren’t a passive measure of progress but an active part of an organization’s everyday management….Applying the “plan–do–check–act” feedback loop…helps teams learn from their mistakes and identify good ideas that can be applied elsewhere”

      (McKinsey)

      Step 5.1

      Plan How to Record Metrics

      Activities:
      5.1.1 For each dashboard, add a baseline and target to existing metrics and KPIs.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 5.1 to 5.2 to plan, record, and action your metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Baselines and targets identified and recorded for each metric.

      5.1.1 Identify Baselines and Targets

      1 hour

      To action your metrics, you must first establish what your baselines and targets are so that you can determine if you are on track.

      To establish baselines:
      If you do not have a baseline. Run your metric to establish one.

      To establish targets:

      • Use historical data and trends of performance.
      • If you do not have historical data, establish an initial target based on stakeholder-identified requirements and expectations.
      • You can also run the metrics report over a defined period of time and use the baseline level of achievement to establish an initial target.
      • The target may not always be a number – it could be a trend. The initial target may be changed after review with stakeholders.

      Actions for Success:
      How will you ensure you can get this metric? For example, if you would like to measure delivered value, to make sure the metric is measurable, you will need to ensure that measures of success are documented for an imitative and then measured once complete.

      • If you need help with Action plans, the IT Metrics Library includes action plans for all of its metrics that may help

      A diagram of identify metrics and to identify baselines and targets.

      Download Info-Tech IT Dashboard Workbook

      Step 5.2

      Record and Action Metrics

      Activities:
      5.2.1 Record and Action Results

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 5.1 to 5.2 to plan, record, and action your metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Understanding of what and where to record metrics once run.

      5.2.1 Record and Action Results

      1 hour

      After analyzing your results, use this information to update your dashboards. Revisit Tab 6 of the IT Dashboard Workbook to update your story. Remember to record any audience feedback about the dashboards in the Audience Feedback section.

      Action your measures as well as your metrics

      What should be measured can change over time as your organization matures and the business environment changes. Understanding what creates business value for your organization is critical. If metrics need to be changed, record metrics actions under Identified Actions on Tab 7. A metric will need to be addressed in one of the following ways:

      • Added: A new metric is required or an existing metric needs large-scale changes (example: calculation method or scope).
      • Changed: A minor change is required to the presentation format or data. Note: a major change in a metric would be performed through the Add option.
      • Removed: The metric is no longer required, and it needs to be removed from reporting and data gathering. A final report date for that metric should be determined.
      • Maintained: The metric is still useful and no changes are required to the metric, its measurement, or how it’s reported.

      A diagram of record results and identify how to address results.

      Don’t be discouraged if you need to update your metrics a few times before you get it right. It can take some trial and error to find the measures that best indicate the health of what you are measuring.

      Download Info-Tech IT Dashboard Workbook

      Tips for actioning results

      Sometimes actioning your metrics results requires more analysis

      If a metric deviates from your target, you may need to analyze how to correct the issue then run the metric again to see if the results have improved.

      Identify Root Cause
      Root Cause Analysis can include problem exploration techniques like The 5 Whys, fishbone diagrams, or affinity mapping.

      Select a Solution
      Once you have identified a possible root cause, use the same technique to brainstorm and select a solution then re-run your metrics.

      Consider Tension Metrics
      Consider tension metrics when selecting a solution. Will improving one area affect another? A car can go faster but it will consume more fuel – a project can be delivered faster but it may affect the quality.

      Summary of Accomplishment

      Problem Solved

      1. Using this blueprint and the IT Dashboard Workbook, you validated and customized the dashboards for your audience and organization, which reduced or eliminated time spent searching for and organizing your own visuals.
      2. You documented your dashboards’ story so you are ready to present them to your audience.
      3. You assessed the data for your dashboards and you built a metrics action-tracking plan to maintain your dashboards’ metrics.

      If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.

      Contact your account representative for more information.
      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      Contact your account representative for more information.

      workshops@infotech.com
      1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      A photo of Info-Tech IT Dashboards
      Review the Info-Tech IT Dashboards
      Determine how you can use the Info-Tech IT Dashboards in your organization and the anticipated level of customization.

      A photo of the IT Dashboard Workbook
      Plan your dashboards
      Complete the IT Dashboard Workbook to help plan your dashboards using Info-Tech’s IT Dashboards.

      Research Contributors and Experts

      Photo of John Corrado
      John Corrado
      Head of IT
      X4 Pharmaceuticals

      As head of IT, John is charged with the creation of strategic IT initiatives that align with X4s vision, mission, culture, and long-term goals and is responsible for the organization’s systems, security, and infrastructure. He works closely developing partnerships with X4tizens across the organization to deliver value through innovative programs and services.

      Photo of Grant Frost
      Grant Frost
      Chief Information & Security Officer
      Niagara Catholic School Board

      Grant Frost is an experienced executive, information technologist and security strategist with extensive experience in both the public and private sector. Grant is known for, and has extensive experience in, IT transformation and the ability to increase capability while decreasing cost in IT services.

      Photo of Nick Scozzaro
      Nick Scozzaro
      CEO and Co-Founder of MobiStream and ShadowHQ
      ShadowHQ

      Nick got his start in software development and mobility working at BlackBerry where he developed a deep understanding of the technology landscape and of what is involved in both modernizing legacy systems and integrating new ones. Working with experts across multiple industries, he innovated, learned, strategized, and ultimately helped push the boundaries of what was possible.

      Photo of Joseph Sanders
      Joseph Sanders
      Managing Director of Technology/Cyber Security Services
      Kentucky Housing Corporation

      In his current role Joe oversees all IT Operations/Applications Services that are used to provide services and support to the citizens of Kentucky. Joe has 30+ years of leadership experience and has held several executive roles in the public and private sector. He has been a keynote speaker for various companies including HP, IBM, and Oracle.

      Photo of Jochen Sievert
      Jochen Sievert
      Director Performance Excellence & IT
      Zeon Chemicals

      Jochen moved to the USA from Duesseldorf, Germany in 2010 to join Zeon Chemicals as their IT Manager. Prior to Zeon, Jochen has held various technical positions at Novell, Microsoft, IBM, and Metro Management Systems.

      Info-Tech Contributors

      Ibrahim Abdel-Kader, Research Analyst
      Donna Bales, Principal Research Director
      Shashi Bellamkonda, Principal Research Director
      John Burwash, Executive Counselor
      Tony Denford, Research Lead
      Jody Gunderman, Senior Executive Advisor
      Tom Hawley, Managing Partner
      Mike Higginbotham, Executive Counselor
      Valence Howden, Principal Research Director
      Dave Kish, Practice Lead
      Carlene McCubbin, Practice Lead
      Jennifer Perrier, Principal Research Director
      Gary Rietz, Executive Counselor
      Steve Schmidt, Senior Managing Partner
      Aaron Shum, Vice President, Security & Privacy
      Ian Tyler-Clarke, Executive Counselor

      Plus, an additional four contributors who wish to remain anonymous.

      Related Info-Tech Research

      Photo of Build an IT Risk Taxonomy

      Build an IT Risk Taxonomy

      Use this blueprint as a baseline to build a customized IT risk taxonomy suitable for your organization.

      Photo of Create a Holistic IT Dashboard

      Create a Holistic IT Dashboard

      This blueprint will help you identify the KPIs that matter to your organization.

      Photo of Develop Meaningful Service Metrics

      Develop Meaningful Service Metrics

      This blueprint will help you Identify the appropriate service metrics based on stakeholder needs.

      Photo of IT Spend & Staffing Benchmarking

      IT Spend & Staffing Benchmarking

      Use this benchmarking service to capture, analyze, and communicate your IT spending and staffing.

      Photo of Key Metrics for Every CIO

      Key Metrics for Every CIO

      This short research piece highlights the top metrics for every CIO, how those align to your CIO priorities, and action steps against those metrics.

      Photo of Present Security to Executive Stakeholders

      Present Security to Executive Stakeholders

      This blueprint helps you identify communication drivers and goals and collect data to support your presentation. It provides checklists for building and delivering a captivating security presentation.

      Bibliography

      “10 Signs You Are Sitting on a Pile of Data Debt.” Experian, n.d. Web.

      “From the What to the Why: How Data Storytelling Is Key to Success.” Exasol, 2021. Web.

      Bonsignore, Marian. “Using Visual Language to Create the Case for Change.” Amarican Management Association. Accessed 19 Apr. 2023.

      Calzon, Bernardita. “Top 25 Dashboard Design Principles, Best Practices & How To’s.” Datapine, 5 Apr. 2023.

      “Data Literacy.” Tableau, n.d. Accessed 3 May 2023.

      “KPIs Don’t Improve Decision-Making In Most Organizations.” LinkedIn, n.d. Accessed 2 May 2023.

      Miller, Amanda. “A Comprehensive Guide to Accessible Data Visualization.” Betterment, 2020. Accessed May 2022.

      “Performance Management: Why Keeping Score Is so Important, and so Hard.” McKinsey. Accessed 2 May 2023.

      Vogel, Douglas, et al. Persuasion and the Role of Visual Presentation Support: The UM/3M Study. Management Information Systems Research Center School of Management University of Minnesota, 1986.

      Watson, Morag W., et al. ”IT’s Changing Mandate in an Age of Disruption.” The Economist Intelligence Unit Limited, 2021.

      Select an ERP Implementation Partner

      • Buy Link or Shortcode: {j2store}591|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $77,174 Average $ Saved
      • member rating average days saved: 17 Average Days Saved
      • Parent Category Name: Enterprise Resource Planning
      • Parent Category Link: /enterprise-resource-planning
      • Enterprise application implementations are complex, and their success is critical to business operations.
      • Selecting the right software implementation partner is as important for the success of the ERP initiative as selecting the right software.
      • System implementation often thrusts the product into the spotlight, with the implementation partner being an afterthought, and all too often organizational needs are ignored altogether.

      Our Advice

      Critical Insight

      • ERP implementation is not a one-and-done exercise. Most often it is the start of a multi-year working relationship between the software vendor or systems integrator and your organization. Take the time to find the right fit to ensure success.
      • The conventional approach to ERP implementation partner selection puts the ERP vendor and systems integrators in the driver's seat with little regard to your specific needs as an organization. You need to take an eyes-wide-open approach to your organization’s strengths and weaknesses to properly select and manage the implementation partner relationship.
      • Self-assessment is the critical first step in a successful implementation. Every organization has a unique combination of critical success factors (CSFs) that will be required to unlock the potential of their ERP. You must find the right partner or partners whose strengths complement your weaknesses to ensure your success.
      • Before you start knocking on vendors’ doors, ensure you have a holistic request that encompasses the strategic, tactical, operational, and commodity factors required for the success of your ERP implementation.

      Impact and Result

      • Use Info-Tech’s implementation partner selection process to find the right fit for your organization.
      • Understand the enterprise application CSFs and determine the unique requirements of your organization through this lens.
      • Define your implementation partner requirements separately from your software requirements and allow vendors to respond to those specifically.
      • Use our assessment tools to score and assess the CSFs required to select the right software implementation partners.

      Select an ERP Implementation Partner Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should focus on selecting the right implementation partner, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify your strategic needs

      Review the CSFs that are of strategic importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.

      • Select an ERP Implementation Partner Workbook

      2. Review your tactical, commodity, and operational needs

      Review the CSFs that are of tactical, commodity, and operational importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.

      3. Build your RFx and evaluate the responses

      Review your RFx and build an initial list of vendor/implementors to reach out to. Finally, build your evaluation checklist to rate the incoming responses.

      • Short-Form RFP Template
      • Long-Form RFP Template
      • Lean RFP Template
      • Supplementary RFx Material
      • RFx Vendor Evaluation Tool
      [infographic]

      Workshop: Select an ERP Implementation Partner

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Organizational Strategic Needs

      The Purpose

      Review the critical success factors that are of strategic importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.

      Key Benefits Achieved

      ERP strategy model defined

      Strategic needs identified

      Activities

      1.1 Review the business context.

      1.2 Build your ERP strategy model.

      1.3 Assess your strategic needs.

      Outputs

      ERP strategy model

      ERP strategy model

      Strategic needs analysis

      2 Review Your Tactical, Commodity, and Operational Needs

      The Purpose

      Review the critical success factors that are of tactical, commodity, and operational importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.

      Key Benefits Achieved

      Tactical, commodity, and operational needs identified

      Activities

      2.1 Assess your tactical needs.

      2.2 Assess your commodity needs.

      2.3 Assess your operational needs.

      Outputs

      Tactical needs analysis

      Commodity needs analysis

      Operational needs analysis

      3 Build Your RFx

      The Purpose

      Review your RFx and build an initial list of vendor/implementors to reach out to. Finally, build your evaluation checklist to rate the incoming responses.

      Key Benefits Achieved

      Draft RFI or RFP

      Target vendor list

      Activities

      3.1 Decide on an RFI or RFP.

      3.2 Complete the RFx with the needs analysis.

      3.3 Build a list of targeted vendors

      Outputs

      Draft RFI or RFP

      Draft RFI or RFP

      Target vendor list

      4 Evaluate Vendors

      The Purpose

      Build a scoring template for use in vendor evaluation to ensure consistent comparison criteria are used.

      Key Benefits Achieved

      A consistent and efficient evaluation process

      Activities

      4.1 Assign weightings to the evaluation criteria.

      4.2 Run a vendor evaluation simulation to validate the process.

      Outputs

      Completed partner evaluation tool

      Agile Readiness Assessment Survey

      • Buy Link or Shortcode: {j2store}160|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Today’s realities are driving organizations to digitize faster and become more Agile.
      • Agile transformations are difficult and frequently fail for a variety of reasons.
      • To achieve the benefits of Agile, organizations need to be ready for the significant changes that Agile demands.
      • Challenges to your Agile transformation can come from a variety of sources.

      Our Advice

      Critical Insight

      • Use Info-Tech’s CLAIM+G model to examine potential roadblocks to Agile on six different organizational dimensions.
      • Use survey results to identify and address the issues that are most likely to derail your Agile transformation.

      Impact and Result

      • Better understand where and how your organization needs to change to support your Agile transformation.
      • Focus your attention on your organization’s biggest roadblocks to Agile.
      • Improve your organization’s chances of a successful Agile transformation.

      Agile Readiness Assessment Survey Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Agile Readiness Assessment Deck – A guide to help your organization survey its Agile readiness.

      Read this deck to see how an Agile Readiness Assessment can help your organization understand its readiness for Agile transformation. The storyboard guides you through how to collect, consolidate, and examine survey responses and create an actionable list of improvements to make your organization more Agile ready.

      • Agile Readiness Assessment Storyboard

      2. Survey Templates (Excel or MS Forms, available in English and French) – Use these templates to create and distribute the survey broadly within your organization.

      The Agile Readiness Assessment template is available in either Excel or Microsoft Forms (both English and French versions are available). Download the Excel templates here or use the links in the above deck to access the online versions of the survey.

      • Agile Readiness Survey – English
      • Agile Readiness Survey – French

      3. Agile Readiness Assessment Consolidated Results Tool – Use this tool to consolidate and analyze survey responses.

      The Agile Readiness Assessment Consolidated Results Tool allows you to consolidate survey responses by team/role and produces your heatmap for analysis.

      • Agile Readiness Assessment Consolidated Results Tool
      [infographic]

      Further reading

      Agile Readiness Assessment

      Understand how ready your organization is for an Agile transformation.

      Info-Tech Research Group Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.

      Analyst Perspective

      Use the wisdom of crowds to understand how ready you are for Agile transformation.

      Photo of Alex Ciraco, Principal Research Director, Application Delivery and Management, Info-Tech Research Group

      Agile transformations can be difficult and complex to implement. That’s because they require fundamental changes in the way an organization thinks and behaves (and many organizations are not ready for these changes).

      Use Info-Tech’s Agile Readiness Assessment to broadly survey the organization’s readiness for Agile along six dimensions:

      • Culture
      • Learning
      • Automation
      • Integrated teams
      • Metrics
      • Governance

      The survey results will help you to examine and address those areas that are most likely to hinder your move to Agile.

      Alex Ciraco
      Principal Research Director, Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Your organization wants to shorten delivery time and improve quality by adopting Agile practices.
      • Your organization has not yet used Agile successfully.
      • You know that Agile transformations are complex and difficult to implement.
      • You want to maximize your Agile transformation’s chances of success.

      Common Obstacles

      • Risks to your Agile transformation can come from a variety of sources, including:
        • Organizational culture
        • Learning practices
        • Use of automation
        • Ability to create integrated teams
        • Use of metrics
        • Governance practices

      Info-Tech’s Approach

      • Use Info-Tech’s Agile Readiness Assessment to broadly survey your organization’s readiness for Agile.
      • Examine the consolidated results of this survey to identify challenges that are most likely to hinder Agile success.
      • Discuss and address these challenges to increase your chances of success.

      Info-Tech Insight

      By first understanding the numerous challenges to Agile transformations and then broadly surveying your organization to identify and address the challenges that are at play, you are more likely to have a successful Agile transformation.

      Info-Tech’s methodology

      1. Distribute Survey 2. Consolidate Survey Results 3. Examine Results and Problem Solve
      Phase Steps

      1.1 Identify the teams/roles you will survey.

      1.2 Configure the survey to reflect your teams/roles.

      1.3 Distribute the Agile Readiness Assessment Survey broadly in the organization.

      2.1 Collect survey responses from all participants.

      2.2 Consolidate the results using the template provided.

      3.1 Examine the consolidated results (both OVERALL and DETAILED Heatmaps)

      3.2 Identify key challenge areas (those which are most “red”) and discuss these challenges with participants

      3.3 Brainstorm, select and refine potential solutions to these challenges

      Phase Outcomes An appreciation for the numerous challenges associated with Agile transformations Identified challenges to Agile within your organization (both team-specific and organization-wide challenges) An actionable list of solutions/actions to address your organization’s Agile challenges.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Agile Readiness Assessment Survey

      Survey the organization to understand your readiness for an Agile transformation on six dimensions.

      Sample of the Agile Readiness Assessment Survey blueprint deliverable.

      Agile Readiness Assessment Consolidated Results

      Examine your readiness for Agile and identify team-specific and organization-wide challenges.

      Sample of the Agile Readiness Assessment Consolidated Results blueprint deliverable.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 8 calls over the course of 1 to 2 months.

      What does a typical GI on this topic look like?

        Phase 1: Distribute Survey

      • Call #1: Scope requirements, objectives, and your specific challenges (identify potential participants).
      • Call #2: First call with participants (introduce Phase 1 and assign survey for completion).
      • Call #3: Gather survey responses (prep for Phase 2 calls).
      • Phase 2: Consolidate Survey Results

      • Call #4: Consolidate all survey responses using the template.
      • Call #5: Conduct initial review of consolidated results (prep for Phase 3 calls).
      • Phase 3: Examine Results and Problem Solve

      • Call #6: Present consolidated results to participants and agree on most pressing challenges.
      • Call #7: Brainstorm, identify, and refine potential solutions to most pressing challenges.
      • Call #8: Conduct closing and communication call.

      Phase 1 — Phase 1 of 3, 'Distribute Survey'.

      Customize and distribute the survey

      Decide which teams/roles will participate in the survey.

      Decide which format and language(s) you will use for your Agile Readiness Assessment Survey.

      Configure the survey templates to reflect your selected teams/roles.

      Distribute the survey for participants to complete.

      • 1.1 The Agile Readiness Assessment Survey will help you to identify both team-specific and organization-wide challenges to your Agile transformation. It is best to distribute the survey broadly across the organization and include several teams and roles. Identify and make note of the teams/roles that will be participating in the survey.
      • 1.2 Select which format of survey you will be using (Excel or online), along with the language(s) you will use (links to the survey templates can be found in the table below). Then configure the survey templates to reflect your list of teams/roles from Step 1.1.
      • Format Language Download Survey Template
        Excel English Agile Readiness Assessment Excel Survey Template – EN and FR
        Excel French
        Online English Agile Readiness Assessment Online Survey Template – EN
        Online French Agile Readiness Assessment Online Survey Template – FR

      • 1.3 Distribute your Agile Readiness Assessment Survey broadly in the organization. Give all participants a deadline date for completion of the survey.

      Phase 2 — Phase 2 of 3, 'Consolidate Results'.

      Consolidate Survey Results

      Collect and consolidate all survey responses using the template provided.

      Review the OVERALL and DETAILED Heatmaps generated by the template.

      • 2.1 Collect the survey responses from all participants. All responses completed using the online form will be anonymous (for responses returned using the Excel form, assign each a unique identifier so that anonymity of responses is maintained).
      • 2.2 Consolidate the survey responses using the template below. Follow the instructions in the template to incorporate all survey responses.
      • Download the Agile Readiness Assessment Consolidated Results Tool

        Sample of the Agile Readiness Assessment Consolidated Results Tool, ranking maturity scores in 'Culture', 'Learning', 'Automation', 'Integrated Teams', 'Metrics', and 'Governance'.

      Phase 3 — Phase 3 of 3, 'Examine Results'.

      Examine Survey Results and Problem Solve

      Review the consolidated survey results as a team.

      Identify the challenges that need the most attention.

      Brainstorm potential solutions. Decide which are most promising and create a plan to implement them.

      • 3.1 Examine the consolidated results (both OVERALL and DETAILED Heatmaps) and look at both team-specific and organization-wide challenge areas.
      • 3.2 Identify which challenge areas need the most attention (typically those that are most red in the heatmap) and discuss these challenges with survey participants.
      • 3.3 As a team, brainstorm potential solutions to these challenges. Select from and refine the solutions that are most promising, then create a plan to implement them.

      3.1 Exercise: Collaborative Problem Solving — Phase 3 of 3, 'Examine Results'.

      60 Mins

      Input: Consolidated survey results

      Output: List of actions to address your most pressing challenges along with a timeline to implement them

      Materials: Agile Readiness Assessment Consolidated Results Tool, Whiteboard and markers

      Participants: Survey participants, Other interested parties

      This exercise will create a plan for addressing your most pressing Agile-related challenges.

      • As a team, agree on which survey challenges are most important to address (typically the most red in the heatmap).
      • Brainstorm potential solutions/actions to address these challenges.
      • Assign solutions/actions to individuals and set a timeline for completion.
      Challenge Proposed Solution Owner Timeline
      Enrichment
      lack of a CoE
      Establish a service-oriented Agile Center of Excellence (CoE) staffed with experienced Agile practitioners who can directly help new-to-Agile teams be successful. Bill W. 6 Months
      Tool Chain
      (lack of Agile tools)
      Select a standard Agile work management tool (e.g. Jira, Rally, ADO) that will be used by all Agile teams. Cindy K. 2 Months

      Related Info-Tech Research

      Sample of an Info-Tech blueprint. Modernize Your SDLC
      • Strategically adopt today’s SDLC good practices to streamline value delivery.
      Sample of an Info-Tech blueprint. Implement Agile Practices That Work
      • Guide your organization through its Agile transformation journey.
      Sample of an Info-Tech blueprint. Implement DevOps Practices That Work
      • Streamline business value delivery through the strategic adoption of DevOps practices.
      Sample of an Info-Tech blueprint. Mentoring for Agile Teams
      • Leverage an experience Agile Mentor to give your in-flight Agile project a helping hand.

      Research Contributors and Experts

      • Columbus Brown, Senior Principal – Practice Lead – Business Alignment, Daugherty Business Solutions
      • Saeed Khan, Founder, Transformation Labs
      • Brenda Peshak, Product Owner/Scrum Master/Program Manager, John Deere/Source Allies/Widget Industries LLC
      • Vincent Mirabelli, Principal, Global Project Synergy Group
      • Len O'Neill, Sr. Vice President and Chief Information Officer, The Suddath Companies
      • Shameka A. Jones, MPM, CSM, Lead Business Management Consultant, Mainspring Business Group, LLC
      • Ryland Leyton, Lead Business Analyst, Aptos Retail
      • Ashish Nangia, Lead Business System Analyst, Ashley Furniture Industries
      • Barbara Carkenord, CBAP, IIBA-AAC, PMI-PBA, PMP, SAFe POPM, President, Carkenord Consulting
      • Danelkis Serra, CBAP, Chapter Operations Manager, Regions & Chapters, IIBA (International Institute of Business Analysis)
      • Lorrie Staples-Ellis, CyberSecurity Integration Strategist, Wealth Management, Truist Bank
      • Ginger Sundberg, Independent Consultant
      • Kham Raven, Project Manager, Fraud Strategy & Execution, Truist Bank
      • Sarah Vollett, PMP, Business Analyst, Operations, College of Physicians and Surgeons of British Columbia
      • Nicole J Coyle, ICP-ACC, CEAC, SPC4, SASM, POPM, CSM, ECM, CCMP, CAPM, Team Agile Coach and Team Facilitator, HCQIS Foundational Components
      • Joe Glower, IT Director, Jet Support Services, Inc. (JSSI)
      • Harsh Daharwal, Senior Director, Application Delivery, J.R. Simplot
      • Hans Eckman, Principal Research Director, Info-Tech Research Group
      • Valence Howden, Principal Research Director, Info-Tech Research Group

      Corporate security consultancy

      Corporate security consultancy

      Based on experience
      Implementable advice
      human-based and people-oriented

      Engage our corporate security consultancy firm to discover any weaknesses within your company’s security management. Tymans Group has extensive expertise in helping small and medium businesses set up clear security protocols to safeguard their data and IT infrastructure. Read on to discover how our consulting firm can help improve corporate security within your company.

      Why should you hire a corporate security consultancy company?

      These days, corporate security includes much more than just regulating access to your physical location, be it an office or a store. Corporate security increasingly deals in information and data security, as well as general corporate governance and responsibility. Proper security protocols not only protect your business from harm, but also play an important factor in your overall success. As such, corporate security is all about setting up practical and effective strategies to protect your company from harm, regardless of whether the threat comes from within or outside. As such, hiring a security consulting firm to improve corporate security and security management within your company is not an unnecessary luxury, but a must.

      Security and risk management

      Our security and risk services

      Security strategy

      Security Strategy

      Embed security thinking through aligning your security strategy to business goals and values

      Read more

      Disaster Recovery Planning

      Disaster Recovery Planning

      Create a disaster recovey plan that is right for your company

      Read more

      Risk Management

      Risk Management

      Build your right-sized IT Risk Management Program

      Read more

      Check out all our services

      Improve your corporate security with help from our consulting company

      As a consultancy firm, Tymans Group can help your business to identify possible threats and help set up strategies to avoid them. However, as not all threats can be avoided, our corporate security consultancy firm also helps you set up protocols to mitigate and manage them, as well as help you develop effective incident management protocols. All solutions are practical, people-oriented and based on our extensive experience and thus have proven effectiveness.

      Hire our experienced consultancy firm

      Engage the services of our consulting company to improve corporate security within your small or medium business. Contact us to set up an appointment on-site or book a one-hour talk with expert Gert Taeymans to discuss any security issues you may be facing. We are happy to offer you a custom solution.

      Register to read more …

      Improve Application Development Throughput

      • Buy Link or Shortcode: {j2store}151|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $59,399 Average $ Saved
      • member rating average days saved: 39 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • The business is demanding more features at an increasing pace. It is expecting your development teams to keep up with its changing needs while maintaining high quality.
      • However, your development process is broken. Tasks are taking significant time to complete, and development handoffs are not smooth.

      Our Advice

      Critical Insight

      • Lean development is independent of your software development lifecycle (SDLC) methodology. Lean development practices can be used in both Agile and Waterfall teams.
      • Lean isn’t about getting rid of sound development processes. Becoming lean means fine-tuning the integration of core practices like coding and testing.
      • Lean thinking motivates automation. By focusing on optimizing the development process, automation becomes a logical and necessary step toward greater maturity and improved throughput.

      Impact and Result

      • Gain a deep understanding of lean principles and associated behaviors. Become familiar with the core lean principles and the critical attitudes and mindsets required by lean. Understand how incorporating DevOps and Agile principles can help your organization.
      • Conduct a development process and tool review. Use a value-stream analysis of your current development process and tools to reveal bottlenecks and time-consuming or wasteful tasks. Analyze these insights to identify root causes and the impact to product delivery.
      • Incorporate the right tools and practices to become more lean. Optimize the key areas where you are experiencing the most pain and consuming the most resources. Look at how today’s best development and testing practices (e.g. version control, branching) and tools (e.g. automation, continuous integration) can improve the throughput of your delivery pipeline.

      Improve Application Development Throughput Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should make development teams leaner, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Conduct a current state analysis

      Acquire a holistic perspective of the development team, process, and tools to identify the bottlenecks and inefficiency points that are significantly delaying releases.

      • Improve Application Development Throughput – Phase 1: Conduct a Current State Analysis
      • Lean Implementation Roadmap Template
      • Lean Development Readiness Assessment

      2. Define the lean future state

      Identify the development guiding principles and artifact management practices and build automation and continuous integration processes and tools that best fit the context and address the organization’s needs.

      • Improve Application Development Throughput – Phase 2: Define the Lean Future State

      3. Create an implementation roadmap

      Prioritize lean implementation initiatives in a gradual, phased approach and map the critical stakeholders in the lean transformation.

      • Improve Application Development Throughput – Phase 3: Create an Implementation Roadmap
      [infographic]

      Workshop: Improve Application Development Throughput

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Conduct a Current State Analysis

      The Purpose

      Assess the current state of your development environment.

      Select a pilot project to demonstrate the value of your optimization.

      Key Benefits Achieved

      Realization of the root causes behind the bottlenecks and inefficiencies in your current development process.

      Valuation of your current development tools.

      Selection of a pilot project that will be used to gather the metrics in order obtain buy-in for wider optimization initiatives.

      Activities

      1.1 Assess your readiness to transition to lean development.

      1.2 Conduct a SWOT analysis and value-stream assessment of your current development process.

      1.3 Evaluate your development tools.

      1.4 Select a pilot project.

      Outputs

      Lean development readiness assessment

      Current state analysis of development process

      Value assessment of existing development tools

      Pilot project selection

      2 Define Your Lean Future State

      The Purpose

      Establish your development guiding principles.

      Enhance the versioning and management of your development artifacts.

      Automatically build and continuously integrate your code.

      Key Benefits Achieved

      Grounded and well-understood set of guiding principles that are mapped to development tasks and initiatives.

      Version control strategy of development artifacts, including source code, adapted to support lean development.

      A tailored approach to establish the right environment to support automated build, testing, and continuous integration tools.

      Activities

      2.1 Assess your alignment to the lean principles.

      2.2 Define your lean development guiding principles.

      2.3 Define your source code branching approach.

      2.4 Define your build automation approach.

      2.5 Define your continuous integration approach.

      Outputs

      Level of alignment to lean principles

      Development guiding principles

      Source code branching approach

      Build automation approach.

      Continuous integration approach

      3 Create Your Implementation Roadmap

      The Purpose

      Prioritize your optimization initiatives to build an implementation roadmap.

      Identify the stakeholders of your lean transformation.

      Key Benefits Achieved

      Phased implementation roadmap that accommodates your current priorities, constraints, and enablers.

      Stakeholder engagement strategy to effectively demonstrate the value of the optimized development environment.

      Activities

      3.1 Identify metrics to gauge the success of your lean transformation.

      3.2 List and prioritize your implementation steps.

      3.3 Identify the stakeholders of your lean transformation.

      Outputs

      List of product, process, and tool metrics

      Prioritized list of tasks to optimize your development environment

      Identification of key stakeholders

      Cost Optimization

      • Buy Link or Shortcode: {j2store}14|cart{/j2store}
      • Related Products: {j2store}14|crosssells{/j2store}
      • Up-Sell: {j2store}14|upsells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Financial Management
      • Parent Category Link: /financial-management
      Minimize the damage of IT cost cuts

      Engineer Your Event Management Process

      • Buy Link or Shortcode: {j2store}461|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management

      Build an event management practice that is situated in the larger service management environment. Purposefully choose valuable events to track and predefine their associated actions to cut down on data clutter.

      Our Advice

      Critical Insight

      Event management is useless in isolation. The goals come from the pain points of other ITSM practices. Build handoffs to other service management practices to drive the proper action when an event is detected.

      Impact and Result

      Create a repeatable framework to define monitored events, their root cause, and their associated action. Record your monitored events in a catalog to stay organized.

      Engineer Your Event Management Process Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Engineer Your Event Management Deck – A step-by-step document that walks you through how to choose meaningful, monitored events to track and action.

      Engineer your event management practice with tracked events informed by the business impact of the related systems, applications, and services. This storyboard will help you properly define and catalog events so you can properly respond when alerted.

      • Engineer Your Event Management Process – Phases 1-3

      2. Event Management Cookbook – A guide to help you walk through every step of scoping event management and defining every event you track in your IT environment.

      Use this tool to define your workflow for adding new events to track. This cookbook includes the considerations you need to include for every tracked event as well as the roles and responsibilities of those involved with event management.

      • Event Management Cookbook

      3. Event Management Catalog – Using the Event Management Cookbook as a guide, record all your tracked events in the Event Management Catalog.

      Use this tool to record your tracked events and alerts in one place. This catalog allows you to record the rationale, root-cause, action, and data governance for all your monitored events.

      • Event Management Catalog

      4. Event Management Workflow – Define your event management handoffs to other service management practices.

      Use this template to help define your event management handoffs to other service management practices including change management, incident management, and problem management.

      • Event Management Workflow (Visio)
      • Event Management Workflow (PDF)

      5. Event Management Roadmap – Implement and continually improve upon your event management practice.

      Use this tool to implement and continually improve upon your event management process. Record, prioritize, and assign your action items from the event management blueprint.

      • Event Management Roadmap
      [infographic]

      Workshop: Engineer Your Event Management Process

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Situate Event Management in Your Service Management Environment

      The Purpose

      Determine goals and challenges for event management and set the scope to business-critical systems.

      Key Benefits Achieved

      Defined system scope of Event Management

      Roles and responsibilities defined

      Activities

      1.1 List your goals and challenges

      1.2 Monitoring and event management RACI

      1.3 Abbreviated business impact analysis

      Outputs

      Event Management RACI (as part of the Event Management Cookbook)

      Abbreviated BIA (as part of the Event Management Cookbook)

      2 Define Your Event Management Scope

      The Purpose

      Define your in-scope configuration items and their operational conditions

      Key Benefits Achieved

      Operational conditions, related CIs and dependencies, and CI thresholds defined

      Activities

      2.1 Define operational conditions for systems

      2.2 Define related CIs and dependencies

      2.3 Define conditions for CIs

      2.4 Perform root-cause analysis for complex condition relationships

      2.5 Set thresholds for CIs

      Outputs

      Event Management Catalog

      3 Define Thresholds and Actions

      The Purpose

      Pre-define actions for every monitored event

      Key Benefits Achieved

      Thresholds and actions tied to each monitored event

      Activities

      3.1 Set thresholds to monitor

      3.2 Add actions and handoffs to event management

      Outputs

      Event Catalog

      Event Management Workflows

      4 Start Monitoring and Implement Event Management

      The Purpose

      Effectively implement event management

      Key Benefits Achieved

      Establish an event management roadmap for implementation and continual improvement

      Activities

      4.1 Define your data policy for event management

      4.2 Identify areas for improvement and establish an implementation plan

      Outputs

      Event Catalog

      Event Management Roadmap

      Further reading

      Engineer Your Event Management Process

      Track monitored events purposefully and respond effectively.

      EXECUTIVE BRIEF

      Analyst Perspective

      Event management is useless in isolation.

      Event management creates no value when implemented in isolation. However, that does not mean event management is not valuable overall. It must simply be integrated properly in the service management environment to inform and drive the appropriate actions.

      Every step of engineering event management, from choosing which events to monitor to actioning the events when they are detected, is a purposeful and explicit activity. Ensuring that event management has open lines of communication and actions tied to related practices (e.g. problem, incident, and change) allows efficient action when needed.

      Catalog your monitored events using a standardized framework to allow you to know:

      1. The value of tracking the event.
      2. The impact when the event is detected.
      3. The appropriate, right-sized reaction when the event is detected.
      4. The tool(s) involved in tracking the event.

      Properly engineering event management allows you to effectively monitor and understand your IT environment and bolster the proactivity of the related service management practices.

      Benedict Chang

      Benedict Chang
      Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Strive for proactivity. Implement event management to reduce response times of technical teams to solve (potential) incidents when system performance degrades.

      Build an integrated event management practice where developers, service desk, and operations can all rely on event logs and metrics.

      Define the scope of event management including the systems to track, their operational conditions, related configuration items (CIs), and associated actions of the tracked events.

      Common Obstacles

      Managed services, subscription services, and cloud services have reduced the traditional visibility of on- premises tools.

      System(s) complexity and integration with the above services has increased, making true cause and effect difficult to ascertain.

      Info-Tech’s Approach

      Clearly define a limited number of operational objectives that may benefit from event management.

      Focus only on the key systems whose value is worth the effort and expense of implementing event management.

      Understand what event information is available from the CIs of those systems and map those against your operational objectives.

      Write a data retention policy that balances operational, audit, and debugging needs against cost and data security needs.

      Info-Tech Insight

      More is NOT better. Even in an AI-enabled world, every event must be collected with a specific objective in mind. Defining the purpose of each tracked event will cut down on data clutter and response time when events are detected.

      Your challenge

      This research is designed to help organizations who are facing these challenges or looking to:

      • Build an event management practice that is situated in the larger service management environment.
      • Purposefully choose events and to track as well as their related actions based on business-critical systems, their conditions, and their related CIs.
      • Cut down on the clutter of current events tracked.
      • Create a framework to add new events when new systems are onboarded.

      33%

      In 2020, 33% of organizations listed network monitoring as their number one priority for network spending. 27% of organizations listed network monitoring infrastructure as their number two priority.
      Source: EMA, 2020; n=350

      Common obstacles

      These barriers make this challenge difficult to address for many organizations:

      • Many organizations have multiple tools across multiple teams and departments that track the current state of infrastructure, making it difficult to consolidate event management into a single practice.
      • Managed services, subscription services, and cloud services have reduced the traditional visibility of on-premises tools
      • System(s) complexity and integration with the above services has increased, making true cause and effect difficult to ascertain.

      Build event management to bring value to the business

      33%

      33% of all IT organizations reported that end users detected and reported incidents before the network operations team was aware of them.
      Source: EMA, 2020; n=350

      64%

      64% of enterprises use 4-10 monitoring tools to troubleshoot their network.
      Source: EMA, 2020; n=350

      Info-Tech’s approach

      Choose your events purposefully to avoid drowning in data.

      A funnel is depicted. along the funnel are the following points: Event Candidates: 1. System Selection by Business Impact; 2. System Decomposition; 3. Event Selection and Thresholding; 4. Event Action; 5. Data Management; Valuable, Monitored, and Actioned Events

      The Info-Tech difference:

      1. Start with a list of your most business-critical systems instead of data points to measure.
      2. Decompose your business-critical systems into their configuration items. This gives you a starting point for choosing what to measure.
      3. Choose your events and label them as notifications, warnings, or exceptions. Choose the relevant thresholds for each CI.
      4. Have a pre-defined action tied to each event. That action could be to log the datapoint for a report or to open an incident or problem ticket.
      5. With your event catalog defined, choose how you will measure the events and where to store the data.

      Event management is useless in isolation

      Define how event management informs other management practices.

      Logging, Archiving, and Metrics

      Monitoring and event management can be used to establish and analyze your baseline. The more you know about your system baselines, the easier it will be to detect exceptions.

      Change Management

      Events can inform needed changes to stay compliant or to resolve incidents and problems. However, it doesn’t mean that changes can be implemented without the proper authorization.

      Automatic Resolution

      The best use case for event management is to detect and resolve incidents and problems before end users or IT are even aware.

      Incident Management

      Events sitting in isolation are useless if there isn’t an effective way to pass potential tickets off to incident management to mitigate and resolve.

      Problem Management

      Events can identify problems before they become incidents. However, you must establish proper data logging to inform problem prioritization and actioning.

      Info-Tech’s methodology for Engineering Your Event Management Process

      1. Situate Event Management in Your Service Management Environment 2. Define Your Monitoring Thresholds and Accompanying Actions 3. Start Monitoring and Implement Event Management

      Phase Steps

      1.1 Set Operational and Informational Goals

      1.2 Scope Monitoring and States of Interest

      2.1 Define Conditions and Related CIs

      2.2 Set Monitoring Thresholds and Alerts

      2.3 Action Your Events

      3.1 Define Your Data Policy

      3.2 Define Future State

      Event Cookbook

      Event Catalog

      Phase Outcomes

      Monitoring and Event Management RACI

      Abbreviated BIA

      Event Workflow

      Event Management Roadmap

      Insight summary

      Event management is useless in isolation.

      The goals come from the pain points of other ITSM practices. Build handoffs to other service management practices to drive the proper action when an event is detected.

      Start with business intent.

      Trying to organize a catalog of events is difficult when working from the bottom up. Start with the business drivers of event management to keep the scope manageable.

      Keep your signal-to-noise ratio as high as possible.

      Defining tracked events with their known conditions, root cause, and associated actions allows you to be proactive when events occur.

      Improve slowly over time.

      Start small if need be. It is better and easier to track a few items with proper actions than to try to analyze events as they occur.

      More is NOT better. Avoid drowning in data.

      Even in an AI-enabled world, every event must be collected with a specific objective in mind. Defining the purpose of each tracked event will cut down on data clutter and response time when events are detected.

      Add correlations in event management to avoid false positives.

      Supplement the predictive value of a single event by aggregating it with other events.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key deliverable:

      This is a screenshot of the Event Management Cookbook

      Event Management Cookbook
      Use the framework in the Event Management Cookbook to populate your event catalog with properly tracked and actioned events.

      This is a screenshot of the Event Management RACI

      Event Management RACI
      Define the roles and responsibilities needed in event management.

      This is a screenshot of the event management workflow

      Event Management Workflow
      Define the lifecycle and handoffs for event management.

      This is a screenshot of the Event Catalog

      Event Catalog
      Consolidate and organize your tracked events.

      This is a screenshot of the Event Roadmap

      Event Roadmap
      Roadmap your initiatives for future improvement.

      Blueprint benefits

      IT Benefits

      • Provide a mechanism to compare operating performance against design standards and SLAs.
      • Allow for early detection of incidents and escalations.
      • Promote timely actions and ensure proper communications.
      • Provide an entry point for the execution of service management activities.
      • Enable automation activity to be monitored by exception
      • Provide a basis for service assurance, reporting and service improvements.

      Business Benefits

      • Less overall downtime via earlier detection and resolution of incidents.
      • Better visibility into SLA performance for supplied services.
      • Better visibility and reporting between IT and the business.
      • Better real-time and overall understanding of the IT environment.

      Case Study

      An event management script helped one company get in front of support calls.

      INDUSTRY - Research and Advisory

      SOURCE - Anonymous Interview

      Challenge

      One staff member’s workstation had been infected with a virus that was probing the network with a wide variety of usernames and passwords, trying to find an entry point. Along with the obvious security threat, there existed the more mundane concern that workers occasionally found themselves locked out of their machine and needed to contact the service desk to regain access.

      Solution

      The system administrator wrote a script that runs hourly to see if there is a problem with an individual’s workstation. The script records the computer's name, the user involved, the reason for the password lockout, and the number of bad login attempts. If the IT technician on duty notices a greater than normal volume of bad password attempts coming from a single account, they will reach out to the account holder and inquire about potential issues.

      Results

      The IT department has successfully proactively managed two distinct but related problems: first, they have prevented several instances of unplanned work by reaching out to potential lockouts before they receive an incident report. They have also successfully leveraged event management to probe for indicators of a security threat before there is a breach.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Introduce the Cookbook and explore the business impact analysis.

      Call #4: Define operational conditions.

      Call #6: Define actions and related practices.

      Call #8: Identify and prioritize improvements.

      Call #3: Define system scope and related CIs/ dependencies.

      Call #5: Define thresholds and alerts.

      Call #7: Define data policy.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Situate Event Management in Your Service Management Environment Define Your Event Management Scope Define Thresholds and Actions Start Monitoring and Implement Event Management Next Steps and Wrap-Up (offsite)

      Activities

      1.1 3.1 Set Thresholds to Monitor

      3.2 Add Actions and Handoffs to Event Management

      Introductions

      1.2 Operational and Informational Goals and Challenges

      1.3 Event Management Scope

      1.4 Roles and Responsibilities

      2.1 Define Operational Conditions for Systems

      2.2 Define Related CIs and Dependencies

      2.3 Define Conditions for CIs

      2.4 Perform Root-Cause Analysis for Complex Condition Relationships

      2.4 Set Thresholds for CIs

      3.1 Set Thresholds to Monitor

      3.2 Add Actions and Handoffs to Event Management

      4.1 Define Your Data Policy for Event Management

      4.2 Identify Areas for Improvement and Future Steps

      4.3 Summarize Workshop

      5.1 Complete In-Progress Deliverables From Previous Four Days

      5.2 Set Up Review Time for Workshop Deliverables and to Discuss Next Steps

      Deliverables
      1. Monitoring and Event Management RACI (as part of the Event Management Cookbook)
      2. Abbreviated BIA (as part of the Event Management Cookbook)
      3. Event Management Cookbook
      1. Event Management Catalog
      1. Event Management Catalog
      2. Event Management Workflows
      1. Event Management Catalog
      2. Event Management Roadmap
      1. Workshop Summary

      Phase 1

      Situate Event Management in Your Service Management Environment

      Phase 1 Phase 2 Phase 3

      1.1 Set Operational and Informational Goals
      1.2 Scope Monitoring and Event Management Using Business Impact

      2.1 Define Conditions and Related CIs
      2.2 Set Monitoring Thresholds and Alerts
      2.3 Action Your Events

      3.1 Define Your Data Policy
      3.2 Set Your Future of Event Monitoring

      Engineer Your Event Management Process

      This phase will walk you through the following activities:

      1.1.1 List your goals and challenges

      1.1.2 Build a RACI chart for event management

      1.2.1 Set your scope using business impact

      This phase involves the following participants:

      Infrastructure management team

      IT managers

      Step 1.1

      Set Operational and Informational Goals

      Activities

      1.1.1 List your goals and challenges

      1.1.2 Build a RACI chart for event management

      Situate Event Management in Your Service Management Environment

      This step will walk you through the following activities:

      Set the overall scope of event management by defining the governing goals. You will also define who is involved in event management as well as their responsibilities.

      This step involves the following participants:

      Infrastructure management team

      IT managers

      Outcomes of this step

      Define the goals and challenges of event management as well as their data proxies.

      Have a RACI matrix to define roles and responsibilities in event management.

      Situate event management among related service management practices

      This image depicts the relationship between Event Management and related service management practices.

      Event management needs to interact with the following service management practices:

      • Incident Management – Event management can provide early detection and/or prevention of incidents.
      • Availability and Capacity Management – Event management helps detect issues with availability and capacity before they become an incident.
      • Problem Management – The data captured in event management can aid in easier detection of root causes of problems.
      • Change Management – Event management can function as the rationale behind needed changes to fix problems and incidents.

      Consider both operational and informational goals for event management

      Event management may log real-time data for operational goals and non-real time data for informational goals

      Event Management

      Operational Goals (real-time)

      Informational Goals (non-real time)

      Incident Response & Prevention

      Availability Scaling

      Availability Scaling

      Modeling and Testing

      Investigation/ Compliance

      • Knowing what the outcomes are expected to achieve helps with the design of that process.
      • A process targeted to fewer outcomes will generally be less complex, easier to adhere to, and ultimately, more successful than one targeted to many goals.
      • Iterate for improvement.

      1.1.1 List your goals and challenges

      Gather a diverse group of IT staff in a room with a whiteboard.

      Have each participant write down their top five specific outcomes they want from improved event management.

      Consolidate similar ideas.

      Prioritize the goals.

      Record these goals in your Event Management Cookbook.

      Priority Example Goals
      1 Reduce response time for incidents
      2 Improve audit compliance
      3 Improve risk analysis
      4 Improve forecasting for resource acquisition
      5 More accurate RCAs

      Input

      • Pain points

      Output

      • Prioritized list of goals and outcomes

      Materials

      • Whiteboard/flip charts
      • Sticky notes

      Participants

      • Infrastructure management team
      • IT managers

      Download the Event Management Cookbook

      Event management is a group effort

      • Event management needs to involve multiple other service management practices and service management roles to be effective.
      • Consider the roles to the right to see how event management can fit into your environment.

      Infrastructure Team

      The infrastructure team is accountable for deciding which events to track, how to track, and how to action the events when detected.

      Service Desk

      The service desk may respond to events that are indicative of incidents. Setting a root cause for events allows for quicker troubleshooting, diagnosis, and resolution of the incident.

      Problem and Change Management

      Problem and change management may be involved with certain event alerts as the resultant action could be to investigate the root cause of the alert (problem management) or build and approve a change to resolve the problem (change management).

      1.1.2 Build a RACI chart for event management

      1. As a group, complete the RACI chart using the template to the right. RACI stands for the following:
        • Responsible. The person doing the work.
        • Accountable. The person who ensures the work is done.
        • Consulted. Two-way communication.
        • Informed. One-way communication
        • There must be one and only one accountable person for each task. There must also be at least one responsible person. Depending on the use case, RACI letters may be combined (e.g. AR means the person who ensures the work is complete but also the person doing the work).
      2. Start with defining the roles in the first row in your own environment.
      3. Look at the tasks on the first column and modify/add/subtract tasks as necessary.
      4. Populate the RACI chart as necessary.

      Download the Event Management Cookbook

      Event Management Task IT Manager SME IT Infrastructure Manager Service Desk Configuration Manager (Event Monitoring System) Change Manager Problem Manager
      Defining systems and configuration items to monitor R C AR R
      Defining states of operation R C AR C
      Defining event and event thresholds to monitor R C AR I I
      Actioning event thresholds: Log A R
      Actioning event thresholds: Monitor I R A R
      Actioning event thresholds: Submit incident/change/problem ticket R R A R R I I
      Close alert for resolved issues AR RC RC

      Step 1.2

      Scope Monitoring and Event Management Using Business Impact

      Activities

      1.2.1 Set your scope using business impact

      Situate Event Management in Your Service Management Environment

      This step will walk you through the following activities:

      • Set your scope of event management using an abbreviated business impact analysis.

      This step involves the following participants:

      • Infrastructure manager
      • IT managers

      Outcomes of this step

      • List of systems, services, and applications to monitor.

      Use the business impact of your systems to set the scope of monitoring

      Picking events to track and action is difficult. Start with your most important systems according to business impact.

      • Business impact can be determined by how costly system downtime is. This could be a financial impact ($/hour of downtime) or goodwill impact (internal/external stakeholders affected).
      • Use business impact to determine the rating of a system by Tier (Gold, Silver, or Bronze):
        • GOLD: Mission-critical services. An outage is catastrophic in terms of cost or public image/goodwill. Example: trading software at a financial institution.
        • SILVER: Important to daily operations but not mission critical. Example: email services at any large organization.
        • BRONZE: Loss of these services is an inconvenience more than anything, though they do serve a purpose and will be missed if they are never brought back online. Example: ancient fax machines.
      • Align a list of systems to track with your previously selected goals for event management to determine WHY you need to track that system. Tracking the system could inform critical SLAs (performance/uptime), vulnerability, compliance obligations, or simply system condition.

      More is not better

      Tracking too many events across too many tools could decrease your responsiveness to incidents. Start tracking only what is actionable to keep the signal-to-noise ratio of events as high as possible.

      % of Incidents Reported by End Users Before Being Recognized by IT Operations

      A bar graph is depicted. It displays the following Data: All Organizations: 40%; 1-3 Tools: 29; 4-10 Tools: 36%; data-verified=11 Tools: 52">

      Source: Riverbed, 2016

      1.2.1 Set your scope using business impact

      Collating an exhaustive list of applications and services is onerous. Start small, with a subset of systems.

      1. Gather a diverse group of IT staff and end users in a room with a whiteboard.
      2. List 10-15 systems and services. Solicit feedback from the group. Questions to ask:
        • What services do you regularly use? What do you see others using?
          (End users)
        • Which service comprises the greatest number of service calls? (IT)
        • What services are the most critical for business operations? (Everybody)
        • What is the cost of downtime (financial and goodwill) for these systems? (Business)
        • How does monitoring these systems align with your goals set in Step 1.1?
      3. Assign an importance to each of these systems from Gold (most important) to Bronze (least important).
      4. Record these systems in your Event Management Cookbook.
      Systems/Services/Applications Tier
      1 Core Infrastructure Gold
      2 Internet Access Gold
      3 Public-Facing Website Gold
      4 ERP Silver
      15 PaperSave Bronze

      Include a variety of services in your analysis

      It might be tempting to jump ahead and preselect important applications. However, even if an application is not on the top 10 list, it may have cross-dependencies that make it more valuable than originally thought.

      For a more comprehensive BIA, see Create a Right-Sized Disaster Recovery Plan
      Download the Event Management Cookbook

      Phase 2

      Define Your Monitoring Thresholds and Accompanying Actions

      Phase 1Phase 2Phase 3

      1.1 Set Operational and Informational Goals
      1.2 Scope Monitoring and Event Management Using Business Impact

      2.1 Define Conditions and Related CIs
      2.2 Set Monitoring Thresholds and Alerts
      2.3 Action Your Events

      3.1 Define Your Data Policy
      3.2 Set Your Future of Event Monitoring

      Engineer Your Event Management Process

      This phase will walk you through the following activities:

      • 2.1.1 Define performance conditions
      • 2.1.2 Decompose services into Related CIs
      • 2.2.1 Verify your CI conditions with a root-cause analysis
      • 2.2.2 Set thresholds for your events
      • 2.3.1 Set actions for your thresholds
      • 2.3.2 Build your event management workflow

      This phase involves the following participants:

      • Business system owners
      • Infrastructure manager
      • IT managers

      Step 2.1

      Define Conditions and Related CIs

      Activities

      2.1.1 Define performance conditions

      2.1.2 Decompose services into related CIs

      Define Your Monitoring Thresholds and Accompanying Actions

      This step will walk you through the following activities:

      For each monitored system, define the conditions of interest and related CIs.

      This step involves the following participants:

      Business system owners

      Infrastructure manager

      IT managers

      Outcomes of this step

      List of conditions of interest and related CIs for each monitored system.

      Consider the state of the system that is of concern to you

      Events present a snapshot of the state of a system. To determine which events you want to monitor, you need to consider what system state(s) of importance.

      • Systems can be in one of three states:
        • Up
        • Down
        • Degraded
      • What do these states mean for each of your systems chosen in your BIA?
      • Up and Down are self-explanatory and a good place to start.
      • However, degraded systems are indicative that one or more component systems of an overarching system has failed. You must uncover the nature of such a failure, which requires more sophisticated monitoring.

      2.1.1 Define system states of greatest importance for each of your systems

      1. With the system business owners and compliance officers in the room, list the performance states of your systems chosen in your BIA.
      2. If you have too many systems listed, start only with the Gold Systems.
      3. Use the following proof approaches if needed:
        • Positive Proof Approach – every system when it has certain technical and business performance expectations. You can use these as a baseline.
        • Negative Proof Approach – users know when systems are not performing. Leverage incident data and end-user feedback to determine failed or degraded system states and work backwards.
      4. Focus on the end-user facing states.
      5. Record your critical system states in the Event Management Cookbook.
      6. Use these states in the next several activities and translate them into measurable infrastructure metrics.

      Input

      • Results of business impact analysis

      Output

      • Critical system states

      Materials

      • Whiteboard/flip charts
      • Sticky notes
      • Markers

      Participants

      • Infrastructure manager
      • Business system owners

      Download the Event Management Cookbook

      2.1.2 Decompose services into relevant CIs

      Define your system dependencies to help find root causes of degraded systems.

      1. For each of your systems identified in your BIA, list the relevant CIs.
      2. Identify dependencies and relationship of those CIs with other CIs (linkages and dependencies).
      3. Starting with the Up/Down conditions for your Gold systems, list the conditions of the CIs that would lead to the condition of the system. This may be a 1:1 relationship (e.g. Core Switches down = Core Infrastructure down) or a many:1 relationship (some virtualization hosts + load balancers down = Core Infrastructure down). You do not need to define specific thresholds yet. Focus on conditions for the CIs.
      4. Repeat step 3 with Degraded conditions.
      5. Repeat step 3 and 4 with Silver and Bronze systems.
      6. Record the results in the Event Management Cookbook.

      Core Infrastructure Example

      An iceberg is depicted. below the surface, are the following terms in order from shallowest to deepest: MPLS Connection, Core Switches, DNS; DHCP, AD ADFS, SAN-01; Load Balancers, Virtualization Hosts (x 12); Power and Cooling

      Download the Event Management Cookbook

      Step 2.2

      Set Monitoring Thresholds and Alerts

      Activities

      2.2.1 Verify your CI conditions with a root-cause analysis

      2.2.2 Set thresholds for your events

      Define Your Monitoring Thresholds and Accompanying Actions

      This step will walk you through the following activities:

      Set monitoring thresholds for each CI related to each condition of interest.

      This step involves the following participants:

      Business system managers

      Infrastructure manager

      IT managers

      Service desk manager

      Outcomes of this step

      List of events to track along with their root cause.

      Event management will involve a significant number of alerts

      Separate the serious from trivial to keep the signal-to-noise ratio high.

      Event Categories: Exceptions: Alarms Indicate Failure; Alerts indicate exceeded thresholds; Normal Operation. Event Alerts: Informational; Exceptional; Warning

      Set your own thresholds

      You must set your own monitoring criteria based on operational needs. Events triggering an action should be reviewed via an assessment of the potential project and associated risks.

      Consider the four general signal types to help define your tracked events

      Latency – time to respond

      Examples:

      • Web server – time to complete request
      • Network – roundtrip ping time
      • Storage – read/write queue times

      Traffic – amount of activity per unit time

      Web sever – how many pages per minute

      Network – Mbps

      Storage – I/O read/writes per sec

      Errors – internally tracked erratic behaviors

      Web Server – page load failures

      Network – packets dropped

      Storage – disk errors

      Saturation – consumption compared to theoretical maximum

      Web Server – % load

      Network – % utilization

      Storage – % full

      2.2.1 Verify your CI conditions with a root-cause analysis

      RCAs postulate why systems go down; use the RCA to inform yourself of the events leading up to the system going down.

      1. Gather a diverse group of IT staff in a room with a whiteboard.
      2. Pick a complex example of a system condition (many:1 correlation) that has considerable data associated with it (e.g. recorded events, problem tickets).
      3. Speculate on the most likely precursor conditions. For example, if a related CI fails or is degraded, which metrics would you likely see before the failure?
      4. If something failed, imagine what you’d most likely see before the failure.
      5. Extend that timeline backward as far as you can be reasonably confident.
      6. Pick a value for that event.
      7. Write out your logic flow from event recognition to occurrence.
      8. Once satisfied, program the alert and ideally test in a non-prod environment.

      Public Website Example

      Dependency CIs Tool Metrics
      ISP WAN SNMP Traps Latency
      Telemetry Packet Loss
      SNMP Pooling Jitter
      Network Performance Web Server Response Time
      Connection Stage Errors
      Web Server Web Page DOM Load Time
      Performance
      Page Load Time

      Let your CIs help you

      At the end of the day, most of us can only monitor what our systems let us. Some (like Exchange Servers) offer a crippling number of parameters to choose from. Other (like MPLS) connections are opaque black boxes giving up only the barest of information. The metrics you choose are largely governed by the art of the possible.

      Case Study

      Exhaustive RCAs proved that 54% of issues were not caused by storage.

      This is the Nimble Storage Logo

      INDUSTRY - Enterprise IT
      SOURCE - ESG, 2017

      Challenge

      Despite a laser focus on building nothing but all-flash storage arrays, Nimble continued to field a dizzying number of support calls.

      Variability and complexity across infrastructure, applications, and configurations – each customer install being ever so slightly different – meant that the problem of customer downtime seemed inescapable.

      Solution

      Nimble embedded thousands of sensors into its arrays, both at a hardware level and in the code. Thousands of sensors per array multiplied by 7,500 customers meant millions of data points per second.

      This data was then analyzed against 12,000 anonymized app-data gap-related incidents.

      Patterns began to emerge, ones that persisted across complex customer/array/configuration combinations.

      These patterns were turned into signatures, then acted on.

      Results

      54% of app-data gap related incidents were in fact related to non-storage factors! Sub-optimal configuration, bad practices, poor integration with other systems, and even VM or hosts were at the root cause of over half of reported incidents.

      Establishing that your system is working fine is more than IT best practice – by quickly eliminating potential options the right team can get working on the right system faster thus restoring the service more quickly.

      Gain an even higher SNR with event correlation

      Filtering:

      Event data determined to be of minimal predictive value is shunted aside.

      Aggregation:

      De-duplication and combination of similar events to trigger a response based on the number or value of events, rather than for individual events.

      Masking:

      Ignoring events that occur downstream of a known failed system. Relies on accurate models of system relationships.

      Triggering:

      Initiating the appropriate response. This could be simple logging, any of the exception event responses, an alert requiring human intervention, or a pre-programmed script.

      2.2.2 Set thresholds for your events

      If the event management team toggles the threshold for an alert too low (e.g. one is generated every time a CPU load reaches 60% capacity), they will generate too many false positives and create far too much work for themselves, generating alert fatigue. If they go the other direction and set their thresholds too high, there will be too many false negatives – problems will slip through and cause future disruptions.

      1. Take your list of RCAs from the previous activity and conduct an activity with the group. The goal of the exercise is to produce the predictive event values that confidently predict an imminent event.
      2. Questions to ask:
        • What are some benign signs of this incident?
        • Is there something we could have monitored that would have alerted us to this issue before an incident occurred?
        • Should anyone have noticed this problem? Who? Why? How?
        • Go through this for each of the problems identified and discuss thresholds. When complete, include the information in the Event Management Catalog.

      Public Website Example

      Dependency Metrics Threshold
      Network Performance Latency 150ms
      Packet Loss 10%
      Jitter >1ms
      Web Server Response Time 750ms
      Performance
      Connection Stage Errors 2
      Web Page Performance DOM Load time 1100ms
      Page Load time 1200ms

      Download the Event Management Cookbook

      Step 2.3

      Action Your Events

      Activities

      2.3.1 Set actions for your thresholds

      2.3.2 Build your event management workflow

      Define Your Monitoring Thresholds and Associated Actions

      This step will walk you through the following activities:

      With your list of tracked events from the previous step, build associated actions and define the handoff from event management to related practices.

      This step involves the following participants:

      Event management team

      Infrastructure team

      Change manager

      Problem manager

      Incident manager

      Outcomes of this step

      Event management workflow

      Set actions for your thresholds

      For each of your thresholds, you will need an action tied to the event.

      • Review the event alert types:
        • Informational
        • Warning
        • Exception
      • Your detected events will require one of the following actions if detected.
      • Unactioned events will lead to a poor signal-to-noise ratio of data, which ultimately leads to confusion in the detection of the event and decreased response effectiveness.

      Event Logged

      For informational alerts, log the event for future analysis.

      Automated Resolution

      For a warning or exception event or a set of events with a well-known root cause, you may have an automated resolution tied to detection.

      Human Intervention

      For warnings and exceptions, human intervention may be needed. This could include manual monitoring or a handoff to incident, change, or problem management.

      2.3.1 Set actions for your thresholds

      Alerts generated by event management are useful for many different ITSM practitioners.

      1. With the chosen thresholds at hand, analyze the alerts and determine if they require immediate action or if they can be logged for later analysis.
      2. Questions to ask:
        1. What kind of response does this event warrant?
        2. How could we improve our event management process?
        3. What event alerts would have helped us with root-cause analysis in the past?
      3. Record the results in the Event Management Catalog.

      Public Website Example

      Outcome Metrics Threshold Response (s)
      Network Performance Latency 150ms Problem Management Tag to Problem Ticket 1701
      Web Page Performance DOM Load time 1100ms Change Management

      Download the Event Management Catalog

      Input

      • List of events generated by event management

      Output

      • Action plan for various events as they occur

      Materials

      • Whiteboard/flip charts
      • Pens
      • Paper

      Participants

      • Event Management Team
      • Infrastructure Team
      • Change Manager
      • Problem Manager
      • Incident Manager

      2.3.2 Build your event management workflow

      1. As a group, discuss your high-level monitoring, alerting, and actioning processes.
      2. Define handoff processes to incident, problem, and change management. If necessary, open your incident, problem, and change workflows and discuss how the event can further pass onto those practices. Discuss the examples below:
        • Incident Management: Who is responsible for opening the incident ticket? Can the incident ticket be automated and templated?
        • Change Management: Who is responsible for opening an RFC? Who will approve the RFC? Can it be a pre-approved change?
        • Problem Management : Who is responsible for opening the problem ticket? How can the event data be useful in the problem management process?
      3. Use and modify the example workflow as needed by downloading the Event Management Workflow.

      Example Workflow:

      This is an image of an example Event Management Workflow

      Download the Event Management Workflow

      Common datapoints to capture for each event

      Data captured will help related service management practices in different ways. Consider what you will need to record for each event.

      • Think of the practice you will be handing the event to. For example, if you’re handing the event off to incident or problem management, data captured will have to help in root-cause analysis to find and execute the right solution. If you’re passing the event off to change management, you may need information to capture the rationale of the change.
      • Knowing the driver for the data can help you define the right data captured for every event.
      • Consider the data points below for your events:

      Data Fields

      Device

      Date/time

      Component

      Parameters in exception

      Type of failure

      Value

      Download the Event Management Catalog

      Start Monitoring and Implement Event Management

      Phase 1Phase 2Phase 3

      1.1 Set Operational and Informational Goals
      1.2 Scope Monitoring and Event Management Using Business Impact

      2.1 Define Conditions and Related CIs
      2.2 Set Monitoring Thresholds and Alerts
      2.3 Action Your Events

      3.1 Define Your Data Policy
      3.2 Set Your Future of Event Monitoring

      Engineer Your Event Management Process

      This phase will walk you through the following activities:

      3.1.1 Define data policy needs

      3.2.1 Build your roadmap

      This phase involves the following participants:

      Business system owners

      Infrastructure manager

      IT managers

      Step 3.1

      Define Your Data Policy

      Activities

      3.1.1 Define data policy needs

      Start Monitoring and Implement Event Management

      This step will walk you through the following activities:

      Your overall goals from Phase 1 will help define your data retention needs. Document these policy statements in a data policy.

      This step involves the following participants:

      CIO

      Infrastructure manager

      IT managers

      Service desk manager

      Outcomes of this step

      Data retention policy statements for event management

      Know the difference between logs and metrics

      Logs

      Metrics

      A log is a complete record of events from a period:

      • Structured
      • Binary
      • Plaintext
      Missing entries in logs can be just as telling as the values existing in other entries. A metric is a numeric value that gives information about a system, generally over a time series. Adjusting the time series allows different views of the data.

      Logs are generally internal constructs to a system:

      • Applications
      • DB replications
      • Firewalls
      • SaaS services

      Completeness and context make logs excellent for:

      • Auditing
      • Analytics
      • Real-time and outlier analysis
      As a time series, metrics operate predictably and consistently regardless of system activity.

      This independence makes them ideal for:

      • Alerts
      • Dashboards
      • Profiling

      Large amounts of log data can make it difficult to:

      • Store
      • Transmit
      • Sift
      • Sort

      Context insensitivity means we can apply the same metric to dissimilar systems:

      • This is especially important for blackbox systems not fully under local control.

      Understand your data requirements

      Amount of event data logged by a 1000 user enterprise averages 113GB/day

      Source: SolarWinds

      Security Logs may contain sensitive information. Best practice is to ensure logs are secure at rest and in transit. Tailor your security protocol to your compliance regulations (PCI, etc.).
      Architecture and Availability When production infrastructure goes down, logging tends to go down as well. Holes in your data stream make it much more difficult to determine root causes of incidents. An independent secondary architecture helps solve problems when your primary is offline. At the very least, system agents should be able to buffer data until the pipeline is back online.
      Performance Log data grows: organically with the rest of the enterprise and geometrically in the event of a major incident. Your infrastructure design needs to support peak loads to prevent it from being overwhelmed when you need it the most.
      Access Control Events have value for multiple process owners in your enterprise. You need to enable access but also ensure data consistency as each group performs their own analysis on the data.
      Retention Near-real time data is valuable operationally; historic data is valuable strategically. Find a balance between the two, keeping in mind your obligations under compliance frameworks (GDPR, etc.).

      3.1.1 Set your data policy for every event

      1. Given your event list in the Event Management Catalog, include the following information for each event:
        • Retention Period
        • Data Sensitivity
        • Data Rate
      2. Record the results in the Event Management Catalog.

      Public Website Example

      Metrics/Log Retention Period Data Sensitivity Data Rate
      Latency 150ms No
      Packet Loss 10% No
      Jitter >1ms No
      Response Time 750ms No
      HAProxy Log 7 days Yes 3GB/day
      DOM Load time 1100ms
      Page Load time 1200ms
      User Access 3 years Yes

      Download the Event Management Catalog

      Input

      • List of events generated by event management
      • List of compliance standards your organization adheres to

      Output

      • Data policy for every event monitored and actioned

      Materials

      • Whiteboard/flip charts
      • Pens
      • Paper

      Participants

      • Event management team
      • Infrastructure team

      Step 3.2

      Set Your Future of Event Monitoring

      Activities

      3.2.1 Build your roadmap

      Start Monitoring and Implement Event Management

      This step will walk you through the following activities:

      Event management maturity is slowly built over time. Define your future actions in a roadmap to stay on track.

      This step involves the following participants:

      CIO

      Infrastructure manager

      IT managers

      Outcomes of this step

      Event management roadmap and action items

      Practice makes perfect

      For every event that generates an alert, you want to judge the predictive power of said event.

      Engineer your event management practice to be predictive. For example:

      • Up/Down Alert – Expected Consequence: Service desk will start working on the incident ticket before a user reports that said system has gone down.
      • SysVol Capacity Alert – Expected Consequence: Change will be made to free up space on the volume prior to the system crashing.

      If the expected consequence is not observed there are three places to look:

      1. Was the alert received by the right person?
      2. Was the alert received in enough time to do something?
      3. Did the event triggering the alert have a causative relationship with the consequence?

      While impractical to look at every action resulting from an alert, a regular review process will help improve your process. Effective alerts are crafted with specific and measurable outcomes.

      Info-Tech Insight

      False positives are worse than missed positives as they undermine confidence in the entire process from stakeholders and operators. If you need a starting point, action your false positives first.

      Mind Your Event Management Errors

      Two Donut charts are depicted. The first has a slice which is labeled 7% False Positive. The Second has a slice which is labeled 33% False Negative.

      Source: IEEE Communications Magazine March 2012

      Follow the Cookbook for every event you start tracking

      Consider building event management into new, onboarded systems as well.

      You now have several core systems, their CIs, conditions, and their related events listed in the Event Catalog. Keep the Catalog as your single reference point to help manage your tracked events across multiple tools.

      The Event Management Cookbook is designed to be used over and over. Keep your tracked events standard by running through the steps in the Cookbook.

      An additional step you could take is to pull the Cookbook out for event tracking for each new system added to your IT environment. Adding events in the Catalog during application onboarding is a good way to manage and measure configuration.

      Event Management Cookbook

      This is a screenshot of the Event Management Cookbook

      Use the framework in the Event Management Cookbook to populate your event catalog with properly tracked and actioned events.

      3.2.1 Build an event management roadmap

      Increase your event management maturity over time by documenting your goals.

      Add the following in-scope goals for future improvement. Include owner, timeline, progress, and priority.

      • Add additional systems/applications/services to event management
      • Expand condition lists for given systems
      • Consolidate tracking tools for easier data analysis and actioning
      • Integrate event management with additional service management practices

      This image contains a screenshot of a sample Event Management Roadmap

      Summary of Accomplishment

      Problem Solved

      You now have a structured event management process with a start on a properly tracked and actioned event catalog. This will help you detect incidents before they become incidents, changes needed to the IT environment, and problems before they spread.

      Continue to use the Event Management Cookbook to add new monitored events to your Event Catalog. This ensures future events will be held to the same or better standard, which allows you to avoid drowning in too much data.

      Lastly, stay on track and continually mature your event management practice using your Event Management Roadmap.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      This is an example of a RACI Chart for Event Management

      Build a RACI Chart for Event Management

      Define and document the roles and responsibilities in event management.

      This is an example of a business impact chart

      Set Your Scope Using Business Impact

      Define and prioritize in-scope systems and services for event management.

      Related Info-Tech Research

      Standardize the Service Desk

      Improve customer service by driving consistency in your support approach and meeting SLAs.

      Improve Incident and Problem Management

      Don’t let persistent problems govern your department

      Harness Configuration Management Superpowers

      Build a service configuration management practice around the IT services that are most important to the organization.

      Select Bibliography

      DeMattia, Adam. “Assessing the Financial Impact of HPE InfoSight Predictive Analytics.” ESG, Softchoice, Sept. 2017. Web.

      Hale, Brad. “Estimating Log Generation for Security Information Event and Log Management.” SolarWinds, n.d. Web.

      Ho, Cheng-Yuan, et al. “Statistical Analysis of False Positives and False Negatives from Real Traffic with Intrusion Detection/Prevention Systems.” IEEE Communications Magazine, vol. 50, no. 3, 2012, pp. 146-154.

      ITIL Foundation ITIL 4 Edition = ITIL 4. The Stationery Office, 2019.

      McGillicuddy, Shamus. “EMA: Network Management Megatrends 2016.” Riverbed, April 2016. Web.

      McGillicuddy, Shamus. “Network Management Megatrends 2020.” Enterprise Management Associates, APCON, 2020. Web.

      Rivas, Genesis. “Event Management: Everything You Need to Know about This ITIL Process.” GB Advisors, 22 Feb. 2021. Web.

      “Service Operations Processes.” ITIL Version 3 Chapters, 21 May 2010. Web.

      Build a Digital Workspace Strategy

      • Buy Link or Shortcode: {j2store}294|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,399 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: End-User Computing Strategy
      • Parent Category Link: /end-user-computing-strategy
      • IT must figure out what a digital workspace is, why they’re building one, and what type they want.
      • Remote work creates challenges that cannot be solved by technology alone.
      • Focusing solely on technology risks building something the business doesn’t want or can’t use.

      Our Advice

      Critical Insight

      Building a smaller digital workspace doesn’t mean that the workspace will have a smaller impact on the business.

      Impact and Result

      • Partner with the business to create a team of digital workspace champions.
      • Empower employees with a tool that makes remote work easier.

      Build a Digital Workspace Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should partner with the business for building a digital workspace, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify the digital workspace you want to build

      Create a list of benefits that the organization will find compelling and build a cross-functional team to champion the workspace.

      • Build a Digital Workspace Strategy – Phase 1: Identify the Digital Workspace You Want to Build
      • Digital Workspace Strategy Template
      • Digital Workspace Executive Presentation Template

      2. Identify high-level requirements

      Design the digital workspace’s value proposition to drive your requirements.

      • Build a Digital Workspace Strategy – Phase 2: Identify High-Level Requirements
      • Sample Digital Workspace Value Proposition
      • Flexible Work Location Policy
      • Flexible Work Time Policy
      • Flexible Work Time Off Policy
      • Mobile Device Remote Wipe Waiver Template
      • Mobile Device Connectivity & Allowance Policy
      • General Security – User Acceptable Use Policy

      3. Identify initiatives and a high-level roadmap

      Take an agile approach to building your digital workspace.

      • Build a Digital Workspace Strategy – Phase 3: Identify Initiatives and a High-Level Roadmap
      [infographic]

      Workshop: Build a Digital Workspace Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify the Digital Workspace You Want to Build

      The Purpose

      Ensure that the digital workspace addresses real problems the business is facing.

      Key Benefits Achieved

      Defined benefits that will address business problems

      Identified strategic business partners

      Activities

      1.1 Identify the digital workspace’s direction.

      1.2 Prioritize benefits and define a vision.

      1.3 Assemble a team of digital workspace champions.

      Outputs

      Vision statement

      Mission statement

      Guiding principles

      Prioritized business benefits

      Metrics and key performance indicators

      Service Owner, Business Owner, and Project Sponsor role definitions

      Project roles and responsibilities

      Operational roles and responsibilities

      2 Identify Business Requirements

      The Purpose

      Drive requirements through a well-designed value proposition.

      Key Benefits Achieved

      Identified requirements that are based in employees’ needs

      Activities

      2.1 Design the value proposition.

      2.2 Identify required policies.

      2.3 Identify required level of input from users and business units.

      2.4 Document requirements for user experiences, processes, and services.

      2.5 Identify in-scope training and culture requirements.

      Outputs

      Prioritized functionality requirements

      Value proposition for three business roles

      Value proposition for two service provider roles

      Policy requirements

      Interview and focus group plan

      Business process requirements

      Training and culture initiatives

      3 Identify IT and Service Provider Requirements

      The Purpose

      Ensure that technology is an enabler.

      Key Benefits Achieved

      Documented requirements for IT and service provider technology

      Activities

      3.1 Identify systems of record requirements.

      3.2 Identify requirements for apps.

      3.3 Identify information storage requirements.

      3.4 Identify management and security integrations.

      3.5 Identify requirements for internal and external partners.

      Outputs

      Requirements for systems for record

      Prioritized list of apps

      Storage system requirements

      Data and security requirements

      Outsourcing requirements

      Prepare for the Upgrade to Windows 11

      • Buy Link or Shortcode: {j2store}166|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Devices
      • Parent Category Link: /end-user-computing-devices
      • Windows 10 is going EOL in 2025.That is closer than you think.
      • Many of your endpoints are not eligible for the Windows 11 upgrade. You can’t afford to replace all your endpoints this year. How do you manage this Microsoft initiated catastrophe?
      • You want to stay close to the leading edge of technology and services, but how do you do that while keeping your spending in check and within budget?

      Our Advice

      Critical Insight

      Windows 11 is a step forward in security, which is one of the primary reasons for the release of the new operating system. Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

      Impact and Result

      Windows 11 hardware requirements will result in devices that are not eligible for the upgrade. Companies will be left to spend money on replacement devices. Following the Info-Tech guidance will help clients properly budget for hardware replacements before Windows 10 is no longer supported by Microsoft. Eligible devices can be upgraded, but Info-Tech guidance can help clients properly plan the upgrade using the upgrade ring approach.

      Prepare for the Upgrade to Windows 11 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare for the Upgrade to Windows 11 Deck – A look into some of the pros and cons of Microsoft’s latest desktop operating system, along with guidance on moving forward with this inevitable upgrade.

      Discover the reason for the release of Windows 11, what you require to be eligible for the upgrade, what features were added or updated, and what features were removed. Our guidance will assist you with a planned and controlled rollout of the Windows 11 upgrade. We also provide guidance on how to approach a device refresh plan if some devices are not eligible for Windows 11. The upgrade is inevitable, but you have time, and you have options.

      • Prepare for the Upgrade to Windows 11 Storyboard

      2. What Are My Options If My Devices Cannot Upgrade to Windows 11? – Build a Windows 11 Device Replacement budget with our Hardware Asset Management Budgeting Tool.

      This tool will help you budget for a hardware asset refresh and to adjust the budget as necessary to accommodate any unexpected changes. The tool can easily be modified to assist in developing and justifying the budget for hardware assets for a Windows 11 project. Follow the instructions on each tab and feel free to play with the HAM budgeting tool to fit your needs.

      • HAM Budgeting Tool
      [infographic]

      Further reading

      Prepare for the Upgrade to Windows 11

      The upgrade is inevitable, but you have time, and you have options.

      Analyst Perspective

      Upgrading to Windows 11 is easy, and while it should be properly investigated and planned, it should absolutely be an activity you undertake.

      “You hear that Mr. Anderson? That is the sound of inevitability.” ("The Matrix Quotes" )

      The fictitious Agent Smith uttered those words to Keanu Reeves’ character, Neo, in The Matrix in 1999, and while Agent Smith was using them in a very sinister and figurative context, the words could just as easily be applied to the concept of upgrading to the Windows 11 operating system from Microsoft in 2022.

      There have been two common, recurring themes in the media since late 2019. One is the global pandemic and the other is cyber-related crime. Microsoft is not in a position to make an impact on a novel coronavirus, but it does have the global market reach to influence end-user technology and it appears that it has done just that. Windows 11 is a step forward in endpoint security and functionality. It also solidifies the foundation for future innovations in end-user operating systems and how they are delivered. Windows-as-a-Service (WAAS) is the way forward for Microsoft. Windows 10 is living on borrowed time, with a defined end of support date of October 14, 2025. Upgrading to Windows 11 is easy, and while it should be properly investigated and planned, it should absolutely be an activity you undertake.

      It is inevitable!

      P.J. Ryan

      Research Director, Infrastructure & Operations

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Windows 10 is going EOL in 2025. That is closer than you think.
      • Many of your endpoints are not eligible for the Windows 11 upgrade. You can’t afford to replace all your endpoints this year. How do you manage this Microsoft-initiated catastrophe?
      • You want to stay close to the leading edge of technology and services, but how do you do that while keeping your spending in check and within budget?

      Common Obstacles

      • The difference between Windows 10 and Windows 11 is not clear. Windows 11 looks like Windows 10 with some minor changes, mostly cosmetic. Many online users don’t see the need. Why upgrade? What are the benefits?
      • The cost of upgrading devices just to be eligible for Windows 11 is high.
      • Your end users don’t like change. This is not going to go over well!

      Info-Tech's Approach

      • Spend wisely. Space out your endpoint replacements and upgrades over several years. You do not have to upgrade everything right away.
      • Be patient. Windows 11 contained some bugs when it was initially released. Microsoft fixed most of the issues through monthly quality updates, but you should ensure that you are comfortable with the current level of functionality before you upgrade.
      • Use the upgrade ring approach. Test your applications with a small group first, and then stage the rollout to increasingly larger groups over time.

      Info-Tech Insight

      There is a lot of talk about Windows 11, but this is only an operating system upgrade, and it is not a major one. Understand what is new, what is added, and what is missing. Check your devices to determine how many are eligible and ineligible. Many organizations will have to spend capital on endpoint upgrades. Solid asset management practices will help.

      Insight summary

      Windows 11 is a step forward in security, which is one of the primary reasons for the release of the new operating system.

      Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

      The hardware requirements for Windows 11 enable security features such as password-less logon, disk encryption, increased startup protection with secure boot, and virtualization-based security.

      Many organizations will have to spend capital on endpoint upgrades.

      Microsoft now insists that modern hardware is required for Windows 11 for not only security but also for improved stability. That same hardware requirement will mean that many devices that are only three or four years old (as well as older ones) may not be eligible for Windows 11.

      Windows 11 is a virtualization challenge for some providers.

      The hardware requirements for physical devices are also required for virtual devices. The TPM module appears to be the biggest challenge. Oracle VirtualBox and Citrix Hypervisor as well as AWS and Google are unable to support Windows 11 virtual devices as of the time of writing.

      Windows 10 will be supported by Microsoft until October 2025.

      That will remove some of the pressure felt due to the ineligibility of many devices and the need to refresh them. Take your time and plan it out, keeping within budget constraints. Use the upgrade ring approach for systems that are eligible for the Windows 11 upgrade.

      New look and feel, and a center screen taskbar.

      Corners are rounded, some controls look a little different, but overall Windows 11 is not a dramatic shift from Windows 10. It is easier to navigate and find features. Oh, and yes, the taskbar (and start button) is shifted to the center of the screen, but you can move them back to the left if desired.

      The education industry gets extra attention with the release of Windows 11.

      Windows 11 comes with multiple subscription-based education offerings, but it also now includes a new lightweight SE edition that is intended for the K-8 age group. Microsoft also released a Windows 11 Education SE specific laptop, at a very attractive price point. Other manufacturers also offer Windows 11 SE focused devices.

      Why Windows 11?

      Windows 10 was supposed to be the final desktop OS from Microsoft, wasn’t it?

      Maybe. It depends who you ask.

      Jerry Nixon, a Microsoft developer evangelist, gained notoriety when he uttered these words while at a Microsoft presentation as part of Microsoft Ignite in 2015: “Right now we’re releasing Windows 10, and because Windows 10 is the last version of Windows, we’re all still working on Windows 10,” (Hachman). Microsoft never officially made that statement. Interestingly enough, it never denied the comments made by Jerry Nixon either.

      Perhaps Microsoft released a new operating system as a financial grab, a way to make significant revenue?

      Nope.

      Windows 11 is a free upgrade or is included with any new computer purchase.

      Market share challenges?

      Doubtful.

      It’s true that Microsoft's market share of desktop operating systems is dropping while Apple OS X and Google Chrome OS are rising.

      In fact, Microsoft has relinquished over 13% of the market share since 2012 and Apple has almost doubled its market share. BUT:

      Microsoft is still holding 75.12% of the market while Apple is in the number 2 spot with 14.93% (gs.statcounter.com).

      The market share is worth noting for Microsoft but it hardly warrants a new operating system.

      New look and feel?

      Unlikely

      New start button and taskbar orientation, new search window, rounded corners, new visual look on some controls like the volume bar, new startup sound, new Windows logo, – all minor changes. Updates could achieve the same result.

      Security?

      Likely the main reason.

      Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

      The hardware requirements for Windows 11 enable security features such as password-less logon, disk encryption, increased startup protection with secure boot, and virtualization-based security.

      The features are available on all Windows 11 physical devices, due to the common hardware requirements.

      Windows 11 hardware-based security

      These hardware options and features were available in Windows 10 but not enforced. With Windows 11, they are no longer optional. Below is a description and explanation of the main features.

      Feature What it is How it works
      TPM 2.0 (Trusted Platform Module) Chip TPM is a chip on the motherboard of the computer. It is used to store encryption keys, certificates, and passwords. TPM does this securely with tamper-proof prevention. It can also generate encryption keys and it includes its own unique encryption key that cannot be altered (helpdeskgeek.com). You do not need to enter your password once you setup Windows Hello, so the password is no longer easy to capture and steal. It is set up on a device per device basis, meaning if you go to a different device to sign in, your Windows Hello authentication will not follow you and you must set up your Hello pin or facial recognition again on that particular device. TPM (Trusted Platform Module) can store the credentials used by Windows Hello and encrypt them on the module.
      Windows Hello Windows Hello is an alternative to using a password for authentication. Users can use a pin, a fingerprint, or facial recognition to authenticate.
      Device Encryption Device encryption is only on when your device is off. It scrambles the data on your disk to make it unreadable unless you have the key to unscramble it. If your endpoint is stolen, the contents of the hard drive will remain encrypted and cannot be accessed by anyone unless they can properly authenticate on the device and allow the system to unscramble the encrypted data.
      UEFI Secure Boot Capable UEFI is an acronym for Unified Extensible Firmware Interface. It is an interface between the operating system and the computer firmware. Secure Boot, as part of the firmware interface, ensures that only unchangeable and approved software and drivers are loaded at startup and not any malware that may have infiltrated the system (Lumunge). UEFI, with Secure Boot, references a database containing keys and signatures of drivers and runtime code that is approved as well as forbidden. It will not let the system boot up unless the signature of the driver or run-time code that is trying to execute is approved. This UEFI Secure boot recognition process continues until control is handed over to the operating system.
      Virtualization Based Security (VBS) and Hypervisor-Protected Code Integrity (HVCI) VBS is security based on virtualization capabilities. It uses the virtualization features of the Windows operating system, specifically the Hyper-V hypervisor, to create and isolate a small chunk of memory that is isolated from the operating system. HVCI checks the integrity of code for violations. The Code Integrity check happens in the isolated virtual area of memory protected by the hypervisor, hence the acronym HVCI (Hypervisor Protected Code Integrity) (Murtaza). In the secure, isolated region of memory created by VBS with the hypervisor, Windows will run checks on the integrity of the code that runs various processes. The isolation protects the stored item from tampering by malware and similar threats. If they run incident free, they are released to the operating system and can run in the standard memory space. If issues are detected, the code will not be released, nor will it run in the standard memory space of the operating system, and damage or compromise will be prevented.

      How do all the hardware-based security features work?

      This scenario explains how a standard boot up and login should happen.

      You turn on your computer. Secure Boot authorizes the processes and UEFI hands over control to the operating system. Windows Hello works with TPM and uses a pin to authenticate the user and the operating systems gives you access to the Windows environment.

      Now imagine the same process with various compromised scenarios.

      You turn on your computer. Secure Boot does not recognize the signature presented to it by the second process in the boot sequence. You will be presented with a “Secure Boot Violation” message and an option to reboot. Your computer remains protected.

      You boot up and get past the secure boot process and UEFI passes control over to the Windows 11 operating system. Windows Hello asks for your pin, but you cannot remember the pin and incorrectly enter it three times before admitting temporary defeat. Windows Hello did not find a matching pin on the TPM and will not let you proceed. You cannot log in but in the eyes of the operating system, it has prevented an unauthorized login attempt.

      You power up your computer, log in without issue, and go about your morning routine of checking email, etc. You are not aware that malware has infiltrated your system and modified a page in system memory to run code and access the operating system kernel. VBS and HVCI check the integrity of that code and detect that it is malicious. The code remains isolated and prevented from running, protecting your system.

      TPM, Hello, UEFI with Secure Boot, VBS and HVCI all work together like a well-oiled machine.

      “Microsoft's rationale for Windows 11's strict official support requirements – including Secure Boot, a TPM 2.0 module, and virtualization support – has always been centered on security rather than raw performance.” – Andrew Cunningham, arstechnica.com

      “Windows 11 raises the bar for security by requiring hardware that can enable protections like Windows Hello, Device Encryption, virtualization-based security (VBS), hypervisor-protected code integrity (HVCI), and Secure Boot. These features in combination have been shown to reduce malware by 60% on tested devices.” – Steven J. Vaughan-Nichols, Computerworld

      Can any device upgrade to Windows 11?

      In addition to the security-related hardware requirements listed previously, which may exclude some devices from Windows 11 eligibility, Windows 11 also has a minimum requirement for other hardware components.

      Windows 7 and Windows 10 were publicized as being backward compatible and almost any hardware would be able to run those operating systems. That changed with Windows 11. Microsoft now insists that modern hardware is required for Windows 11 for not only security but also improved stability.

      Software Requirement

      You must be running Windows 10 version 2004 or greater to be eligible for a Windows 11 upgrade (“Windows 11 Requirements”).

      Complete hardware requirements for Windows 11

      • 1 GHz (or faster) compatible 64-bit processor with two or more cores
      • 4 GB RAM
      • 64 GB or more of storage space
      • Compatible with DirectX 12 or later with WDDM 2.0 driver
        • DirectX connects the hardware in your computer with Windows. It allows software to display graphics using the video card or play audio, as long as that software is DirectX compatible. Windows 11 requires version 12 (“What are DirectX 12 compatible graphics”).
        • WDDM is an acronym for Windows Display Driver Model. WDDM is the architecture for the graphics driver for Windows (“Windows Display Driver Model”).
        • Version 2.0 of WDDM is required for Windows 11.
      • 720p display greater than 9" diagonally with 8 bits per color channel
      • UEFI Secure Boot capable
      • TPM 2.0 chip
      • (“Windows 11 Requirements”)

      Windows 11 may challenge your virtual environment

      When Windows 11 was initially released, some IT administrators experienced issues when trying to install or upgrade to Windows 11 in the virtual world.

      The Challenge

      The issues appeared to be centered around the Windows 11 hardware requirements, which must be detected by the Windows 11 pre-install check before the operating system will install.

      The TPM 2.0 chip requirement was indeed a challenge and not offered as a configuration option with Citrix Hypervisor, the free VMware Workstation Player or Oracle VM VirtualBox when Windows 11 was released in October 2021, although it is on the roadmap for Oracle and Citrix Hypervisor. VMware provides alternative products to the free Workstation Player that do support a virtual TPM. Oracle and Citrix reported that the feature would be available in the future and Windows 11 would work on their platforms.

      Short-Term Solutions

      VMware and Microsoft users can add a vTPM hardware type when configuring a virtual Windows 11 machine. Microsoft Azure does offer Windows 11 as an option as a virtual desktop. Citrix Desktop-As-A-Service (DAAS) will connect to Azure, AWS, or Google Cloud and is only limited by the features of the hosting cloud service provider.

      Additional Insight

      According to Microsoft, any VM running Windows 11 must meet the following requirements (“Virtual Machine Support”):

      • It must be a generation 2 VM, and upgrading a generation 1 VM to Windows 11 (in-place) is not possible
      • 64 GB of storage or greater
      • Secure Boot capable with the virtual TPM enabled
      • 4 GB of memory or greater
      • 2 or more virtual processors
      • The CPU of the physical computer that is hosting the VM must meet the Windows 11 (“Windows Processor Requirements”)

      What’s new or updated in Windows 11?

      The following two slides highlight some of the new and updated features in Windows 11.

      Security

      The most important change with Windows 11 is what you cannot see – the security. Windows 11 adds requirements and controls to make the user and device more secure, as described in previous slides.

      Taskbar

      The most prominent change in relation to the look and feel of Windows 11 is the shifting of the taskbar (and Start button) to the center of the screen. Some users may find this more convenient but if you do not and prefer the taskbar and start button back on the left of your screen, you can change it in taskbar settings.

      Updated Apps

      Paint, Photos, Notepad, Media Player, Mail, and other standard Windows apps have been updated with a new look and in some cases minor enhancements.

      User Interface

      The first change users will notice after logging in to Windows 11 is the new user interface – the look and feel. You may not notice the additional colors added to the Windows palette, but you may have thought that the startup sound was different, and the logo also looks different. You would be correct. Other look-and-feel items that changed include the rounded corners on windows, slightly different icons, new wallpapers, and controls for volume and brightness are now a slide bar. File explorer and the settings app also have a new look.

      Microsoft Teams

      Microsoft Teams is now installed on the taskbar by default. Note that this is for a personal Microsoft account only. Teams for Work or School will have to be installed separately if you are using a work or school account.

      What’s new or updated in Windows 11?

      Snap Layouts

      Snap layouts have been enhanced and snap group functionality has been added. This will allow you to quickly snap one window to the side of the screen and open other Windows in the other side. This feature can be accessed by dragging the window you wish to snap to the left or right edge of the screen. The window should then automatically resize to occupy that half of the screen and allow you to select other Windows that are already open to occupy the remaining space on the screen. You can also hover your mouse over the maximize button in the upper right-hand corner of the window. A small screen with multiple snap layouts will appear for your selection. Multiple snapped Windows can be saved as a “Snap Group” that will open together if one of the group windows are snapped in the future.

      Widgets

      Widgets are expanding. Microsoft started the re-introduction of widgets in Windows 10, specifically focusing on the weather. Widgets now include other services such as news, sports, stock prices, and others.

      Android Apps

      Android apps can now run in Windows 11. You will have to use the Amazon store to access and install Android apps, but if it is available in the Amazon store, you can install it on Windows 11.

      Docking

      Docking has improved with Windows 11. Windows knows when you are docked and will minimize apps when you undock so they are not lost. They will appear automatically when you dock again.

      This is not intended to be an inclusive list but does cover some of the more prominent features.

      What’s missing from Windows 11?

      The following features are no longer found in Windows 11:

      • Backward compatibility
        • The introduction of the hardware requirements for Windows 11 removed the backward compatibility (from a hardware perspective) that made the transition from previous versions of Windows to their successor less of a hardware concern. If a computer could run Windows 7, then it could also run Windows 10. That does not automatically mean it can also run Windows 11.
      • Internet Explorer
        • Internet Explorer is no longer installed by default in Windows 11. Microsoft Edge is now the default browser for Windows. Other browsers can also be installed if preferred.
      • Tablet mode
        • Windows 11 does not have a "tablet" mode, but the operating system will maximize the active window and add more space between icons to make selecting them easier if the 2-in-1 hardware detects that you wish to use the device as a tablet (keyboard detached or device opened up beyond 180 degrees, etc.).
      • Semi-annual updates
        • It may take six months or more to realize that semi-annual feature updates are missing. Microsoft moved to an annual feature update schema but continued with monthly quality updates with Windows 11.
      • Specific apps
        • Several applications have been removed (but can be manually added from the Microsoft Store by the user). They include:
          • OneNote for Windows 10
          • 3D Viewer
          • Paint 3D
          • Skype
      • Cortana (by default)
        • Cortana is missing from Windows 11. It is installed but not enabled by default. Users can turn it on if desired.

      Microsoft included a complete list of features that have been removed or deprecated with Windows 11, which can be found here Windows 11 Specs and System Requirements.

      Windows 11 editions

      • Windows 11 is offered in several editions:
        • Windows 11 Home
        • Windows 11 Pro
        • Windows 11 Pro for Workstations
        • Windows 11 Enterprise Windows 11 for Education
        • Windows 11 SE for Education
      • Windows 11 hardware requirements and security features are common throughout all editions.
      • The new look and feel along with all the features mentioned previously are common to all editions as well.
      • Windows Home
        • Standard offering for home users
      • Pro versus Pro for Workstations
        • Windows 11 Pro and Pro for Workstations are both well suited for the business environment with available features such as support for Active Directory or Azure Active Directory, Windows Autopilot, OneDrive for Business, etc.
        • Windows Pro for Workstations is designed for increased demands on the hardware with the higher memory limits (2 TB vs. 6 TB) and processor count (2 CPU vs. 4 CPU).
        • Windows Pro for Workstations also features Resilient File System, Persistent Memory, and SMB Direct. Neither of these features are available in the Windows 11 Pro edition.
        • Windows 11 Pro and Pro for Workstations are both very business focused, although Pro may also be a common choice for non-business users (Home and Education).
      • Enterprise Offerings
        • Enterprise licenses are subscription based and are part of the Microsoft 365 suite of offerings.
        • Windows 11 Enterprise is Windows 11 Pro with some additional addons and functionality in areas such as device management, collaboration, and security services.
        • The level of the Microsoft 365 Enterprise subscription (E3 or E5) would dictate the additional features and functionality, such as the complete Microsoft Defender for Endpoint suite or the Microsoft phone system and Audio Conferencing, which are only available with the E5 subscription.

      Windows 11 Education Editions

      With the release of a laptop targeted specifically at the education market, Microsoft must be taking notice of the Google Chrome educational market penetration, especially with headlines like these.

      “40 Million Chromebooks in Use in Education” (Thurrott)

      “The Unprecedented Growth of the Chromebook Education Market Share” (Carklin)

      “Chromebooks Gain Market Share as Education Goes Online” (Hruska)

      “Chromebooks Gain Share of Education Market Despite Shortages” (Mandaro)

      “Chromebook sales skyrocketed in Q3 2020 with online education fueling demand” (Duke)

      • Education licenses are subscription based and are part of the Microsoft 365 suite of offerings. Educational pricing is one benefit of the Microsoft 365 Education model.
      • Windows 11 Education is Windows 11 Pro with some additional addons and functionality similar to the Enterprise offerings for Windows 11 in areas such as device management, collaboration, and security services. Windows 11 Education also adds some education specific settings such as Classroom Tools, which allow institutions to add new students and their devices to their own environment with fewer issues, and includes OneNote Class Notebook, Set Up School PCs app, and Take a Test app.
      • The level of the Microsoft 365 Education subscription (A3 or A5) would dictate the additional features and functionality, such as the complete Microsoft Defender for Endpoint suite or the Microsoft phone system and Audio Conferencing, which are only available with the A5 subscription.
      • Windows 11 SE for Education:
        • A cloud-first edition of Windows 11 specifically designed for the K-8 education market.
        • Windows 11 SE is a light version of Windows 11 that is designed to run on entry-level devices with better performance and security on that hardware.
        • Windows 11 SE requires Intune for Education and only IT admins can install applications.
      • Microsoft and others have come out with Windows SE specific devices at a low price point.
        • The Microsoft Surface Laptop SE comes pre-loaded with Windows 11 SE and can be purchased for US$249.00.
        • Dell, Asus, Acer, Lenovo, and others also offer Windows 11 SE specific devices (“Devices for Education”).

      Initial Reactions

      Below you can find some actual initial reactions to Windows 11.

      Initial reactions are mixed, as is to be expected with any new release of an operating system. The look and feel is new, but it is not a huge departure from the Windows 10 look and feel. Some new features are well received such as the snap feature.

      The shift of the taskbar (and start button) is the most popular topic of discussion online when it comes to Windows 11 reactions. Some love it and some do not. The best part about the shift of the taskbar is that you can adjust it in settings and move it back to its original location.

      The best thing about reactions is that they garner attention, and thanks in part to all the online reactions and comments, Microsoft is continually improving Windows 11 through quality updates and annual feature releases.

      “My 91-year-old Mum has found it easy!” Binns, Paul ITRG

      “It mostly looks quite nice and runs well.” Jmbpiano, Reddit user

      “It makes me feel more like a Mac user.” Chang, Ben Info-Tech

      “At its core, Windows 11 appears to be just Windows 10 with a fresh coat of paint splashed all over it.” Rouse, Rick RicksDailyTips.com

      “Love that I can snap between different page orientations.” Roberts, Jeremy Info-Tech

      “I finally feel like Microsoft is back on track again.” Jawed, Usama Neowin

      “A few of the things that seemed like issues at first have either turned out not to be or have been fixed with patches.” Jmbpiano, Reddit user

      “The new interface is genuinely intuitive, well-designed, and colorful.” House, Brett AnandTech

      “No issues. Have it out on about 50 stations.” Sandrews1313, Reddit User

      “The most striking change is to the Start menu.” Grabham, Dan pocket-lint.com

      How do I upgrade to Windows 11?

      The process is very similar to applying updates in Windows 10.

      • Windows 11 is offered as an upgrade through the standard Windows 10 update procedure. Windows Update will notify you when the Windows 11 upgrade is ready (assuming your device is eligible for Windows 11).
        • Allow the update (upgrade in this case) to proceed, reboot, and your endpoint will come back to life with Windows 11 installed and ready for you.
      • A fresh install can be delivered by downloading the required Windows 11 installation media from the Microsoft Software Download site for Windows 11.
      • Business users can control the timing and schedule of the Windows 11 rollout to corporate endpoints using Microsoft solutions such as WSUS, Configuration Manager, Intune and Endpoint Manager, or by using other endpoint management solutions.
      • WSUS and Configuration Manager will have to sync the product category for Windows 11 to manage the deployment.
      • Windows Update for Business policies will have to use the target version capability rather than using the feature update referrals alone.
      • Organizations using Intune and a Microsoft 365 E3 license will be able to use the Feature Update Deployments page to select Windows 11.
      • Other modern endpoint management solutions may also allow for a controlled deployment.

      Info-Tech Insight

      The upgrade itself may be a simple process but be prepared for the end-user reactions that will follow. Some will love it but others will despise it. It is not an optional upgrade in the long run, so everyone will have to learn to accept it.

      When can I upgrade to Windows 11?

      You can upgrade right now BUT there is no need to rush. Windows 11 was released in October 2021 but that doesn’t mean you have to upgrade everyone right away. Plan this out.

      • Build deployment rings into your Windows 11 upgrade approach: This approach, also referred to as Canary Releases or deployment rings, allows you to ensure that IT can support users if there's a major problem with the upgrade. Instead of disrupting all end users, you are only disrupting a portion of end users.
        • Deploy the initial update to your test environment.
        • After testing is successful or changes have been made, deploy Windows 11 to your pilot group of users.
        • After the pilot group gives you the thumbs up, deploy to the rest of production in phases. Phases are sometimes by office/location, sometimes by department, sometimes by persona (i.e. defer people that don't handle updates well), and usually by a combination of these factors.
        • Increase the size of each ring as you progress.
      • Always back up your data before any upgrade.

      Deployment Ring Example

      Pilot Ring - Individuals from all departments - 10 users

      Ring #1 - Dev, Finance - 20 Users

      Ring #2 - Research - 100 Users

      Ring #3 - Sales, IT, Marketing - 500 Users

      Upgrade your eligible devices and users to Windows 11

      Build Windows 11 Deployment Rings

      Instructions:

      1. Identify who will be in the pilot group. Use individuals instead of user groups.
      2. Identify how many standard rings you need. This number will be based on the total number of employees per office.
      3. Map groups to rings. Define which user groups will be in each ring.
      4. Allow some time to elapse between upgrades. Allow the first group to work with Windows 11 and identify any potential issues that may arise before upgrading the next group.
      5. Track and communicate. Record all information into a spreadsheet like the one on the right. This will aid in communication and tracking.
      Ring Department or Group Total Users Delay Time Before Next Group
      Pilot Ring Individuals from all departments 10 Three weeks
      Ring 1 Dev Finance 20 Two weeks
      Ring 2 Research 100 One week
      Ring 3 Sales, IT Marketing 500 N/A

      What are my options if my devices cannot upgrade to Windows 11?

      Don’t rush out to replace all the ineligible endpoint devices. You have some time to plan this out. Windows 10 will be available and supported by Microsoft until October 2025.

      Use asset management strategies and budget techniques in your Windows 11 upgrade approach:

      • Start with current inventory and determine which devices will not be eligible for upgrade to Windows 11.
      • Prioritize the devices for replacement, taking device age, the role of the user the device supports, and delivery times for remote users into consideration.
      • Take this opportunity to review overall device offerings and end-user compute strategy. This will help decide which devices to offer going forward while improving end-user satisfaction.
      • Determine the cost for replacement devices:
        • Compare vendor offerings using an RFP process.
      • Use the hardware asset management planning spreadsheet on the next slide to budget for the replacements over the coming months leading up to October 2025.

      Leverage Info-Tech research to improve your end-user computing strategy and hardware asset management processes:

      New to End User Computing Strategies? Start with Modernize and Transform Your End-User Computing Strategy.

      New to IT asset management? Use Info-Tech’s Implement Hardware Asset Management blueprint.

      Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget

      Build a Windows 11 Device Replacement Budget

      The link below will open up a hardware asset management (HAM) budgeting tool. This tool can easily be modified to assist in developing and justifying the budget for hardware assets for the Windows 11 project. The tool will allow you to budget for hardware asset refresh and to adjust the budget as needed to accommodate any changes. Follow the instructions on each tab to complete the tool.

      A sample of a possible Windows 11 budgeting spreadsheet is shown on the right, but feel free to play with the HAM budgeting tool to fit your needs.

      HAM Budgeting Tool

      Windows 11 Replacement Schedule
      2022 2023 2024 2025
      Department Total to replace Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Left to allocate
      Finance 120 20 20 20 10 10 20 20 0
      HR 28 15 13 0
      IT 30 15 15 0
      Research 58 8 15 5 20 5 5 0
      Planning 80 10 15 15 10 15 15 0
      Other 160 5 30 5 15 15 30 30 30 0
      Totals 476 35 38 35 35 35 35 38 35 50 35 35 35 35 0

      Related Info-Tech Research

      Modernize and Transform Your End-User Computing Strategy

      This project helps support the workforce of the future by answering the following questions: What types of computing devices, provisioning models, and operating systems should be offered to end users? How will IT support devices? What are the policies and governance surrounding how devices are used? What actions are we taking and when? How do end-user devices support larger corporate priorities and strategies?

      Implement Hardware Asset Management

      This project will help you analyze the current state of your HAM program, define assets that will need to be managed, and build and involve the ITAM team from the beginning to help embed the change. It will also help you define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.

      Bibliography

      aczechowski, et al. “Windows 11 Requirements.” Microsoft, 3 June 2022. Accessed 13 June 2022.

      Binns, Paul. Personal interview. 07 June 2022.

      Butler, Sydney. “What Is Trusted Platform Module (TPM) and How Does It Work?” Help Desk Geek, 5 August 2021. Accessed 18 May 2022.

      Carklin, Nicolette. “The Unprecedented Growth of the Chromebook Education Market Share.” Parallels International GmbH, 26 October 2021. Accessed 19 May 2022.

      Chang, Ben. Personal interview. 26 May 2022.

      Cunningham, Andrew. “Why Windows 11 has such strict hardware requirements, according to Microsoft.” Ars Technica, 27 August 2021. Accessed 19 May 2022.

      Dealnd-Han, et al. “Windows Processor Requirements.” Microsoft, 9 May 2022. Accessed 18 May 2022.

      “Desktop Operating Systems Market Share Worldwide.” Statcounter Globalstats, June 2021–June 2022. Accessed 17 May 2022.

      “Devices for education.” Microsoft, 2022. Accessed 13 June 2022.

      Duke, Kent. “Chromebook sales skyrocketed in Q3 2020 with online education fueling demand.” Android Police, 16 November 2020. Accessed 18 May 2022.

      Grabham, Dan. “Windows 11 first impressions: Our initial thoughts on using Microsoft's new OS.” Pocket-Lint, 24 June 2021. Accessed 3 June 2022.

      Hachman, Mark. “Why is there a Windows 11 if Windows 10 is the last Windows?” PCWorld, 18 June 2021. Accessed 17 May 2022.

      Howse, Brett. “What to Expect with Windows 11: A Day One Hands-On.” Anandtech, 16 November 2020. Accessed 3 June 2022.

      Hruska, Joel. “Chromebooks Gain Market Share as Education Goes Online.” Extremetech, 26 October 2020. Accessed 19 May 2022.

      Jawed, Usama. “I am finally excited about Windows 11 again.” Neowin, 26 February 2022. Accessed 3 June 2022.

      Jmbpiano. “Windows 11 - What are our initial thoughts and feelings?” Reddit, 22 November 2021. Accessed 3 June 2022.

      Lumunge, Erick. “UEFI and Legacy boot.” OpenGenus, n.d. Accessed 18 May 2022.

      Bibliography

      Mandaro, Laura. “Chromebooks Gain Share of Education Market Despite Shortages.” The Information, 9 September 2020. Accessed 19 May 2022.

      Murtaza, Fawad. “What Is Virtualization Based Security in Windows?” Valnet Inc, 24 October 2021. Accessed 17 May 2022.

      Roberts, Jeremy. Personal interview. 27 May 2022.

      Rouse, Rick. “My initial thoughts about Windows 11 (likes and dislikes).” RicksDailyTips.com, 5 September 2021. Accessed 3 June 2022.

      Sandrews1313. “Windows 11 - What are our initial thoughts and feelings?” Reddit, 22 November 2021. Accessed 3 June 2022.

      “The Matrix Quotes." Quotes.net, n.d. Accessed 18 May 2022.

      Thurrott, Paul.” Google: 40 Million Chromebooks in Use in Education.” Thurrott, 21 January 2020. Accessed 18 May 2022.

      Vaughan-Nichols, Steven J. “The real reason for Windows 11.” Computerworld, 6 July 2021, Accessed 19 May 2022.

      “Virtual Machine Support.” Microsoft,3 June 2022. Accessed 13 June 2022.

      “What are DirectX 12 compatible graphics and WDDM 2.x.” Wisecleaner, 20 August 2021. Accessed 19 May 2022.

      “Windows 11 Specs and System Requirements.” Microsoft, 2022. Accessed 13 June 2022.

      “Windows Display Driver Model.” MiniTool, n.d. Accessed 13 June 2022.

      Prepare Your Organization to Successfully Embrace the “New Normal”

      • Buy Link or Shortcode: {j2store}422|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $61,749 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • The COVID-19 pandemic is creating significant challenges across every sector, but even the deepest crisis will eventually pass. However, many of the changes it has brought to how organizations function are here to stay.
      • As an IT leader, it can be challenging to envision what this future state will look like and how to position IT as a trusted partner to the business to help steer the ship as the crisis abates.

      Our Advice

      Critical Insight

      • Organizations need to cast their gaze into the “New Normal” and determine an appropriate strategy to stabilize their operations, mitigate ongoing challenges, and seize new opportunities that will be presented in a post-COVID-19 world.
      • IT needs to understand the key trends and permanent changes that will exist following the crisis and develop a proactive roadmap for rapidly adapting their technology stack, processes, and resourcing to adjust to the new normal.

      Impact and Result

      • Info-Tech recommends a three-step approach for adapting to the new normal: begin by surveying crucial changes that will occur as a result of the COVID-19 pandemic, assess their relevance to your organization’s unique situation, and create an initiatives roadmap to support the new normal.
      • This mini-blueprint will examine five key themes: changing paradigms for remote work, new product delivery models, more self-service options for customers, greater decentralization and agility for organizational decision making, and a renewed emphasis on security architecture.

      Prepare Your Organization to Successfully Embrace the “New Normal” Research & Tools

      Read the Research

      Understand the five key trends that will persist after the pandemic has passed and create a roadmap of initiatives to help your organization adapt to the "New Normal."

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Prepare Your Organization to Successfully Embrace the “New Normal” Storyboard
      [infographic]

      Implement a New IT Organizational Structure

      • Buy Link or Shortcode: {j2store}276|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $30,999 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Organizational Design
      • Parent Category Link: /organizational-design
      • Organizational design implementations can be highly disruptive for IT staff and business partners. Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.
      • CIOs walk a tightrope as they manage the operational and emotional turbulence while aiming to improve business satisfaction within IT. Failure to achieve balance could result in irreparable failure.

      Our Advice

      Critical Insight

      • Mismanagement will hurt you. The majority of IT organizations do not manage organizational design implementations effectively, resulting in decreased satisfaction, productivity loss, and increased IT costs.
      • Preventing mismanagement is within your control. 72% of change management issues can be directly improved by managers. IT leaders have a tendency to focus their efforts on operational changes rather than on people.

      Impact and Result

      Leverage Info-Tech’s organizational design implementation process and deliverables to build and implement a detailed transition strategy and to prepare managers to lead through change.

      Follow Info-Tech’s 5-step process to:

      1. Effect change and sustain productivity through real-time employee engagement monitoring.
      2. Kick off the organizational design implementation with effective communication.
      3. Build an integrated departmental transition strategy.
      4. Train managers to effectively lead through change.
      5. Develop personalized transition plans.

      Implement a New IT Organizational Structure Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how you should implement a new organizational design, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a change communication strategy

      Create strategies to communicate the changes to staff and maintain their level of engagement.

      • Implement a New Organizational Structure – Phase 1: Build a Change Communication Strategy
      • Organizational Design Implementation FAQ
      • Organizational Design Implementation Kick-Off Presentation

      2. Build the organizational transition plan

      Build a holistic list of projects that will enable the implementation of the organizational structure.

      • Implement a New Organizational Structure – Phase 2: Build the Organizational Transition Plan
      • Organizational Design Implementation Project Planning Tool

      3. Lead staff through the reorganization

      Lead a workshop to train managers to lead their staff through the changes and build transition plans for all staff members.

      • Implement a New Organizational Structure – Phase 3: Lead Staff Through the Reorganization
      • Organizational Design Implementation Manager Training Guide
      • Organizational Design Implementation Stakeholder Engagement Plan Template
      • Organizational Design Implementation Transition Plan Template
      [infographic]

      Workshop: Implement a New IT Organizational Structure

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build Your Change Project Plan

      The Purpose

      Create a holistic change project plan to mitigate the risks of organizational change.

      Key Benefits Achieved

      Building a change project plan that encompasses both the operational changes and minimizes stakeholder and employee resistance to change.

      Activities

      1.1 Review the new organizational structure.

      1.2 Determine the scope of your organizational changes.

      1.3 Review your MLI results.

      1.4 Brainstorm a list of projects to enable the change.

      Outputs

      Project management planning and monitoring tool

      McLean Leadership Index dashboard

      2 Finalize Change Project Plan

      The Purpose

      Finalize the change project plan started on day 1.

      Key Benefits Achieved

      Finalize the tasks that need to be completed as part of the change project.

      Activities

      2.1 Brainstorm the tasks that are contained within the change projects.

      2.2 Determine the resource allocations for the projects.

      2.3 Understand the dependencies of the projects.

      2.4 Create a progress monitoring schedule.

      Outputs

      Completed project management planning and monitoring tool

      3 Enlist Your Implementation Team

      The Purpose

      Enlist key members of your team to drive the implementation of your new organizational design.

      Key Benefits Achieved

      Mitigate the risks of staff resistance to the change and low engagement that can result from major organizational change projects.

      Activities

      3.1 Determine the members that are best suited for the team.

      3.2 Build a RACI to define their roles.

      3.3 Create a change vision.

      3.4 Create your change communication strategy.

      Outputs

      Communication strategy

      4 Train Your Managers to Lead Through Change

      The Purpose

      Train your managers who are more technically focused to handle the people side of the change.

      Key Benefits Achieved

      Leverage your managers to translate how the organizational change will directly impact individuals on their teams.

      Activities

      4.1 Conduct the manager training workshop with managers.

      4.2 Review the stakeholder engagement plans.

      4.3 Review individual transition plan template with managers.

      Outputs

      Conflict style self-assessments

      Stakeholder engagement plans

      Individual transition plan template

      5 Build Your Transition Plans

      The Purpose

      Complete transition plans for individual members of your staff.

      Key Benefits Achieved

      Create individual plans for your staff members to ease the transition into their new roles.

      Activities

      5.1 Bring managers back in to complete transition plans.

      5.2 Revisit the new organizational design as a source of information.

      5.3 Complete aspects of the templates that do not require staff feedback.

      5.4 Discuss strategies for transitioning.

      Outputs

      Individual transition plan template

      Further reading

      Implement a New IT Organizational Structure

      Prioritize quick wins and critical services during IT org changes.

      This blueprint is part 3/3 in Info-Tech’s organizational design program and focuses on implementing a new structure

      Part 1: Design Part 2: Structure Part 3: Implement
      IT Organizational Architecture Organizational Sketch Organizational Structure Organizational Chart Transition Strategy Implement Structure
      1. Define the organizational design objectives.
      2. Develop strategically-aligned capability map.
      3. Create the organizational design framework.
      4. Define the future state work units.
      5. Create future state work unit mandates.
      1. Assign work to work units (accountabilities and responsibilities).
      2. Develop organizational model options (organizational sketches).
      3. Assess options and select go-forward model.
      1. Define roles by work unit.
      2. Create role mandates.
      3. Turn roles into jobs.
      4. Define reporting relationships between jobs.
      5. Define competency requirements.
      1. Determine number of positions per job.
      2. Conduct competency assessment.
      3. Assign staff to jobs.
      1. Form OD implementation team.
      2. Develop change vision.
      3. Build communication presentation.
      4. Identify and plan change projects.
      5. Develop organizational transition plan.
      1. Train managers to lead through change.
      2. Define and implement stakeholder engagement plan.
      3. Develop individual transition plans.
      4. Implement transition plans.
      Risk Management: Create, implement, and monitor risk management plan.
      HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.

      Monitor and Sustain Stakeholder Engagement →

      The sections highlighted in green are in scope for this blueprint. Click here for more information on designing or on structuring a new organization.

      Our understanding of the problem

      This Research is Designed For:

      • CIOs

      This Research Will Help You:

      • Effectively implement a new organizational structure.
      • Develop effective communications to minimize turnover and lost productivity during transition.
      • Identify a detailed transition strategy to move to your new structure with minimal interruptions to service quality.
      • Train managers to lead through change and measure ongoing employee engagement.

      This Research Will Also Assist:

      • IT Leaders

      This Research Will Help Them:

      • Effectively lead through the organizational change.
      • Manage difficult conversations with staff and mitigate staff concerns and turnover.
      • Build clear transition plans for their teams.

      Executive summary

      Situation

      • Organizational Design (OD) projects are typically undertaken in order to enable organizational priorities, improve IT performance, or to reduce IT costs. However, due to the highly disruptive nature of the change, only 25% of changes achieve their objectives over the long term. (2013 Towers Watson Change and Communication ROI Survey)

      Complication

      • OD implementations can be highly disruptive for IT staff and business partners. Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.
      • CIOs walk a tightrope as they manage the operational and emotional turbulence while aiming to improve business satisfaction within IT. Failure to achieve balance could result in irreparable failure.

      Resolution

      • Leverage Info-Tech’s organizational design implementation process and deliverables to build and implement a detailed transition strategy and to prepare managers to lead through change. Follow Info-Tech’s 5-step process to:
        1. Effect change and sustain productivity through real-time employee engagement monitoring.
        2. Kick off the organizational design implementation with effective communication.
        3. Build an integrated departmental transition strategy.
        4. Train managers to effectively lead through change.
        5. Develop personalized transition plans.

      Info-Tech Insight

      1. Mismanagement will hurt you. The majority of IT organizations do not manage OD implementations effectively, resulting in decreased satisfaction, productivity loss, and increased IT costs.
      2. Preventing mismanagement is within your control. 72% of change management issues can be directly improved by managers. (Abilla, 2009) IT leaders have a tendency to focus their efforts on operational changes rather than on people. This is a recipe for failure.

      Organizational Design Implementation

      Managing organizational design (OD) changes effectively is critical to maintaining IT service levels and retaining top talent throughout a restructure. Nevertheless, many organizations fail to invest appropriate consideration and resources into effective OD change planning and execution.

      THREE REASONS WHY CIOS NEED TO EFFECTIVELY MANAGE CHANGE:

      1. Failure is the norm; not the exception. According to a study by Towers Watson, only 55% of organizations experience the initial value of a change. Even fewer organizations, a mere 25%, are actually able to sustain change over time to experience the full expected benefits. (2013 Towers Watson Change and Communication ROI Survey)
      2. People are the biggest cause of failure. Organizational design changes are one of the most difficult types of changes to manage as staff are often highly resistant. This leads to decreased productivity and poor results. The most significant people challenge is the loss of momentum through the change process which needs to be actively managed.
      3. Failure costs money. Poor IT OD implementations can result in increased turnover, lost productivity, and decreased satisfaction from the business. Managing the implementation has a clear ROI as the cost of voluntary turnover is estimated to be 150% of an employee’s annual salary. (Inc)

      86% of IT leaders believe organization and leadership processes are critical, yet the majority struggle to be effective

      PERCENTAGE OF IT LEADERS WHO BELIEVE THEIR ORGANIZATION AND LEADERSHIP PROCESSES ARE HIGHLY IMPORTANT AND HIGHLY EFFECTIVE

      A bar graph, with the following organization and leadership processes listed on the Y-axis: Human Resources Management; Leadership, Culture, Values; Organizational Change Management; and Organizational Design. The bar graph shows that over 80% of IT leaders rate these processes as High Importance, but less than 40% rate them as having High Effectiveness.

      GAP BETWEEN IMPORTANCE AND EFFECTIVENESS

      Human Resources Management - 61%

      Leadership, Culture, Values - 48%

      Organizational Change Management - 55%

      Organizational Design - 45%

      Note: Importance and effectiveness were determined by identifying the percentage of individuals who responded with 8-10/10 to the questions…

      • “How important is this process to the organization’s ability to achieve business and IT goals?” and…
      • “How effective is this process at helping the organization to achieve business and IT goals?”

      Source: Info-Tech Research Group, Management and Governance Diagnostic. N=22,800 IT Professionals

      Follow a structured approach to your OD implementation to improve stakeholder satisfaction with IT and minimize risk

      • IT reorganizations are typically undertaken to enable strategic goals, improve efficiency and performance, or because of significant changes to the IT budget. Without a structured approach to manage the organizational change, IT might get the implementation done, but fail to achieve the intended benefits, i.e. the operation succeeds, but the patient has died on the table.
      • When implementing your new organizational design, it’s critical to follow a structured approach to ensure that you can maintain IT service levels and performance and achieve the intended benefits.
      • The impact of organizational structure changes can be emotional and stressful for staff. As such, in order to limit voluntary turnover, and to maintain productivity and performance, IT leaders need to be strategic about how they communicate and respond to resistance to change.

      TOP 3 BENEFITS OF FOLLOWING A STRUCTURED APPROACH TO IMPLEMENTING ORGANIZATIONAL DESIGN

      1. Improved stakeholder satisfaction with IT. A detailed change strategy will allow you to successfully transition staff into new roles with limited service interruptions and with improved stakeholder satisfaction.
      2. Experience minimal voluntary turnover throughout the change. Know how to actively engage and minimize resistance of stakeholders throughout the change.
      3. Execute implementation on time and on budget. Effectively managed implementations are 65–80% more likely to meet initial objectives than those with poor organizational change management. (Boxley Group, LLC)

      Optimize your organizational design implementation results by actively preparing managers to lead through change

      IT leaders have a tendency to make change even more difficult by focusing on operations rather than on people. This is a recipe for failure. People pose the greatest risk to effective implementation and as such, IT managers need to be prepared and trained on how to lead their staff through the change. This includes knowing how to identify and manage resistance, communicating the change, and maintaining positive momentum with staff.

      Staff resistance and momentum are the most challenging part of leading through change (McLean & Company, N=196)

      A bar graph with the following aspects of Change Management listed on the Y-Axis, in increasing order of difficulty: Dealing with Technical Issues; Monitoring metrics to measure progress; Amending policies and processes; Coordinating with stakeholders; Getting buy-in from staff; Maintaining a positive momentum with staff.

      Reasons why change fails: 72% of failures can be directly improved by the manager (shmula)

      A pie chart showing the reasons why change fails: Management behavior not supportive of change = 33%; Employee resistance to change = 39%; Inadequate resources or budget = 14%; and All other obstacles = 14%.

      Leverage organizational change management (OCM) best practices for increased OD implementation success

      Effective change management correlates with project success

      A line graph, with Percent of respondents that met or exceeded project objectives listed on the Y-axis, and Poor, Fair, Good, and Excellent listed on the X-axis. The line represents the overall effectiveness of the change management program, and as the value on the Y-axis increases, so does the value on the X-axis.

      Source: Prosci. From Prosci’s 2012 Best Practices in Change Management benchmarking report.

      95% of projects with excellent change management met or EXCEEDED OBJECTIVES, vs. 15% of those with poor OCM. (Prosci)

      143% ROI on projects with excellent OCM. In other words, for every dollar spent on the project, the company GAINS 43 CENTS. This is in contrast to 35% ROI on projects with poor OCM. (McKinsey)

      Info-Tech’s approach to OD implementation is a practical and tactical adaptation of several successful OCM models

      BUSINESS STRATEGY-ORIENTED OCM MODELS. John Kotter’s 8-Step model, for instance, provides a strong framework for transformational change but doesn’t specifically take into account the unique needs of an IT transformation.

      GENERAL-PURPOSE OCM FRAMEWORKS such as ACMP’s Standard for Change Management, CMI’s CMBoK, and Prosci’s ADKAR model are very comprehensive and need to be configured to organizational design implementation-specific initiatives.

      COBIT MANAGEMENT PRACTICE BAI05: MANAGE ORGANIZATIONAL CHANGE ENABLEMENT follows a structured process for implementing enterprise change quickly. This framework can be adapted to OD implementation; however, it is most effective when augmented with the people and management training elements present in other frameworks.

      References and Further Reading

      Tailoring a comprehensive, general-purpose OCM framework to an OD implementation requires familiarity and experience. Info-Tech’s OD implementation model adapts the best practices from a wide range of proven OCM models and distills it into a step-by-step process that can be applied to an organizational design transformation.

      The following OD implementation symptoms can be avoided through structured planning

      IN PREVIOUS ORGANIZATIONAL CHANGES, I’VE EXPERIENCED…

      “Difficultly motivating my staff to change.”

      “Higher than average voluntary turnover during and following the implementation.”

      “An overall sense of staff frustration or decreased employee engagement.”

      “Decreased staff productivity and an inability to meet SLAs.”

      “Increased overtime caused by being asked to do two jobs at once.”

      “Confusion about the reporting structure during the change.”

      “Difficulty keeping up with the rate of change and change fatigue from staff.”

      “Business partner dissatisfaction about the change and complaints about the lack of effort or care put in by IT employees.”

      “Business partners not wanting to adjust to the change and continuing to follow outdated processes.”

      “Decrease in stakeholder satisfaction with IT.”

      “Increased prevalence of shadow IT during or following the change.”

      “Staff members vocally complaining about the IT organization and leadership team.”

      Follow this blueprint to develop and execute on your OD implementation

      IT leaders often lack the experience and time to effectively execute on organizational changes. Info-Tech’s organizational design implementation program will provide you with the needed tools, templates, and deliverables. Use these insights to drive action plans and initiatives for improvement.

      How we can help

      • Measure the ongoing engagement of your employees using Info-Tech’s MLI diagnostic. The diagnostic comes complete with easily customizable reports to track and act on employee engagement throughout the life of the change.
      • Use Info-Tech’s customizable project management tools to identify all of the critical changes, their impact on stakeholders, and mitigate potential implementation risks.
      • Develop an in-depth action plan and transition plans for individual stakeholders to ensure that productivity remains high and that service levels and project expectations are met.
      • Align communication with real-time staff engagement data to keep stakeholders motivated and focused throughout the change.
      • Use Info-Tech’s detailed facilitation guide to train managers on how to effectively communicate the change, manage difficult stakeholders, and help ensure a smooth transition.

      Leverage Info-Tech’s customizable deliverables to execute your organizational design implementation

      A graphic with 3 sections: 1.BUILD A CHANGE COMMUNICATION STRATEGY; 2.BUILD THE ORGANIZATIONAL TRANSITION PLAN; 3.1 TRAIN MANAGERS TO LEAD THROUGH CHANGE; 3.2 TRANSITION STAFF TO NEW ROLES. An arrow emerges from point one and directs right, over the rest of the steps. Text above the arrow reads: ONGOING ENGAGEMENT MONITORING AND COMMUNICATION. Dotted arrows emerge from points two and three directing back toward point one. Text below the arrow reads: COMMUNICATION STRATEGY ITERATION.

      CUSTOMIZABLE PROJECT DELIVERABLES

      1. BUILD A CHANGE COMMUNICATION STRATEGY

      • McLean Leadership Index: Real-Time Employee Engagement Dashboard
      • Organizational Design
      • Implementation Kick-Off Presentation
      • Organizational Design Implementation FAQ

      2. BUILD THE ORGANIZATIONAL TRANSITION PLAN

      • Organizational Design Implementation Project Planning Tool

      3.1 TRAIN MANAGERS TO LEAD THROUGH CHANGE

      3.2 TRANSITION STAFF TO NEW ROLES

      • Organizational Design Implementation Manager Training Guide
      • Organizational Design Implementation Transition Plan Template

      Leverage Info-Tech’s tools and templates to overcome key engagement program implementation challenges

      KEY SECTION INSIGHTS:

      BUILD A CHANGE COMMUNICATION STRATEGY

      Effective organizational design implementations mitigate the risk of turnover and lost productivity through ongoing monitoring and managing of employee engagement levels. Take a data-driven approach to managing engagement with Info-Tech’s real-time MLI engagement dashboard and adjust your communication and implementation strategy before engagement risks become issues.

      BUILD THE ORGANIZATIONAL TRANSITION PLAN

      Your organizational design implementation is made up of a series of projects and needs to be integrated into your larger project schedule. Too often, organizations attempt to fit the organizational design implementation into their existing schedules which results in poor resource planning, long delays in implementation, and overall poor results.

      LEAD STAFF THROUGH THE REORGANIZATION

      The majority of IT managers were promoted because they excelled at the technical aspect of their job rather than in people management. Not providing training is setting your organization up for failure. Train managers to effectively lead through change to see a 72% decrease in change management issues. (Abilla, 2009)

      METRICS:

      1. Voluntary turnover: Conduct an exit interview with all staff members during and after transition. Identify any staff members who cite the change as a reason for departure. For those who do leave, multiply their salary by 1.5% (the cost of a new hire) and track this over time.
      2. Business satisfaction trends: Conduct CIO Business Vision one year prior to the change vs. one year after change kick-off. Prior to the reorganization, set metrics for each category for six months after the reorganization, and one year following.
      3. Saved development costs: Number of hours to develop internal methodology, tools, templates, and process multiplied by the salary of the individual.

      Use this blueprint to save 1–3 months in implementing your new organizational structure

      Time and Effort Using Blueprint Without Blueprint
      Assess Current and Ongoing Engagement 1 person ½ day – 4 weeks 1–2 hours for diagnostic set up (allow extra 4 weeks to launch and review initial results). High Value 4–8 weeks
      Set Up the Departmental Change Workbooks 1–5 people 1 day 4–5 hours (varies based on the scope of the change). Medium Value 1–2 weeks
      Design Transition Strategy 1–2 people 1 day 2–10 hours of implementation team’s time. Medium Value 0–2 weeks
      Train Managers to Lead Through Change 1–5 people 1–2 weeks 1–2 hours to prepare training (allow for 3–4 hours per management team to execute). High Value 3–5 weeks

      These estimates are based on reviews with Info-Tech clients and our experience creating the blueprint.

      Totals:

      Workshop: 1 week

      GI/DIY: 2-6 weeks

      Time and Effort Saved: 8-17 weeks

      CIO uses holistic organizational change management strategies to overcome previous reorganization failures

      CASE STUDY

      Industry: Manufacturing

      Source: Client interview

      Problem

      When the CIO of a large manufacturing company decided to undertake a major reorganization project, he was confronted with the stigma of a previous CIO’s attempt. Senior management at the company were wary of the reorganization since the previous attempt had failed and cost a lot of money. There was major turnover since staff were not happy with their new roles costing $250,000 for new hires. The IT department saw a decline in their satisfaction scores and a 10% increase in help desk tickets. The reorganization also cost the department $400,000 in project rework.

      Solution

      The new CIO used organizational change management strategies in order to thoroughly plan the implementation of the new organizational structure. The changes were communicated to staff in order to improve adoption, every element of the change was mapped out, and the managers were trained to lead their staff through the change.

      Results

      The reorganization was successful and eagerly adopted by the staff. There was no turnover after the new organizational structure was implemented and the engagement levels of the staff remained the same.

      $250,000 - Cost of new hires and salary changes

      10% - Increase in help desk tickets

      $400,000 - Cost of project delays due to the poorly effective implementation of changes

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Implement a New Organizational Structure

      3. Lead Staff Through the Reorganization
      1. Build a Change Communication Strategy 2. Build the Organizational Transition Plan 3.1 Train Managers to Lead Through Change 3.2 Transition Staff to New Roles
      Best-Practice Toolkit

      1.1 Launch the McLean Leadership Index to set a baseline.

      1.2 Establish your implementation team.

      1.3 Build your change communication strategy and change vision.

      2.1 Build a holistic list of change projects.

      2.2 Monitor and track the progress of your change projects.

      3.1.1 Conduct a workshop with managers to prepare them to lead through the change.

      3.1.2 Build stakeholder engagement plans and conduct conflict style self-assessments.

      3.2.1 Build transition plans for each of your staff members.

      3.2.2 Transition your staff to their new roles.

      Guided Implementations
      • Set up your MLI Survey.
      • Determine the members and roles of your implementation team.
      • Review the components of a change communication strategy.
      • Review the change dimensions and how they are used to plan change projects.
      • Review the list of change projects.
      • Review the materials and practice conducting the workshop.
      • Debrief after conducting the workshop.
      • Review the individual transition plan and the process for completing it.
      • Final consultation before transitioning staff to their new roles.
      Onsite Workshop Module 1: Effectively communicate the reorganization to your staff. Module 2: Build the organizational transition plan. Module 3.1: Train your managers to lead through change. Module 3.2: Complete your transition plans

      Phase 1 Results:

      • Plans for effectively communicating with your staff.

      Phase 2 Results:

      • A holistic view of the portfolio of projects required for a successful reorg

      Phase 3.1 Results:

      • A management team that is capable of leading their staff through the reorganization

      Phase 3.2 Results:

      • Completed transition plans for your entire staff.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Build Your Change Project Plan

      1.1 Review the new organizational structure.

      1.2 Determine the scope of your organizational changes.

      1.3 Review your MLI results.

      1.4 Brainstorm a list of projects to enable the change.

      Finalize Change Project Plan

      2.1 Brainstorm the tasks that are contained within the change projects.

      2.2 Determine the resource allocation for the projects.

      2.3 Understand the dependencies of the projects.

      2.4 Create a progress monitoring schedule

      Enlist Your Implementation Team

      3.1 Determine the members that are best suited for the team.

      3.2 Build a RACI to define their roles.

      3.3 Create a change vision.

      3.4 Create your change communication strategy.

      Train Your Managers to Lead Through Change

      4.1 Conduct the manager training workshop with managers.

      4.2 Review the stakeholder engagement plans.

      4.3 Review individual transition plan template with managers

      Build Your Transition Plans

      5.1 Bring managers back in to complete transition plans.

      5.2 Revisit new organizational design as a source for information.

      5.3 Complete aspects of the template that do not require feedback.

      5.4 Discuss strategies for transitioning.

      Deliverables
      1. McLean Leadership Index Dashboard
      2. Organizational Design Implementation Project Planning Tool
      1. Completed Organizational Design Implementation Project Planning Tool
      1. Communication Strategy
      1. Stakeholder Engagement Plans
      2. Conflict Style Self-Assessments
      3. Organizational Design Implementation Transition Plan Template
      1. Organizational Design Implementation Transition Plan Template

      Phase 1

      Build a Change Communication Strategy

      Build a change communication strategy

      Outcomes of this Section:

      • Launch the McLean Leadership Index
      • Define your change team
      • Build your reorganization kick-off presentation and FAQ for staff and business stakeholders

      This section involves the following participants:

      • CIO
      • IT leadership team
      • IT staff

      Key Section Insight:

      Effective organizational design implementations mitigate the risk of turnover and lost productivity through ongoing monitoring of employee engagement levels. Take a data-driven approach to managing engagement with Info-Tech’s real-time MLI engagement dashboard and adjust your communication and implementation strategy in real-time before engagement risks become issues.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Build a Change Communication Strategy

      Proposed Time to Completion (in weeks): 1-6 weeks

      Step 1.1: Launch Your McLean Leadership Index Survey

      Start with an analyst kick off call:

      • Discuss the benefits and uses of the MLI.
      • Go over the required information (demographics, permissions, etc.).
      • Set up a live demo of the survey.

      Then complete these activities…

      • Launch the survey with your staff.
      • Have a results call with a member of the Info-Tech staff.

      With these tools & templates:

      McLean Leadership Index

      Step 1.2: Establish Your Implementation Team

      Review findings with analyst:

      • Review what members of your department should participate.
      • Build a RACI to determine the roles of your team members.

      Then complete these activities…

      • Hold a kick-off meeting with your new implementation team.
      • Build the RACI for your new team members and their roles.

      Step 1.3: Build Your Change Communication Strategy

      Finalize phase deliverable:

      • Customize your reorganization kick-off presentation.
      • Create your change vision. Review the communication strategy.

      Then complete these activities…

      • Hold your kick-off presentation with staff members.
      • Launch the reorganization communications.

      With these tools & templates:

      • Organizational Design Implementation Kick-Off Presentation
      • Organizational Design Implementation FAQ

      Set the stage for the organizational design implementation by effectively introducing and communicating the change to staff

      Persuading people to change requires a “soft,” empathetic approach to keep them motivated and engaged. But don’t mistake “soft” for easy. Managing the people and communication aspects around the change are amongst the toughest work there is, and require a comfort and competency with uncertainty, ambiguity, and conflict.

      Design Engagement Transition
      Communication

      Communication and engagement are the chains linking your design to transition. If the organizational design initiative is going to be successful it is critical that you manage this effectively. The earlier you begin planning the better. The more open and honest you are about the change the easier it will be to maintain engagement levels, business satisfaction, and overall IT productivity.

      Kick-Off Presentation Inputs

      • LAUNCH THE MCLEAN LEADERSHIP INDEX
      • IDENTIFY YOUR CHANGE TEAM
      • DETERMINE CHANGE TEAM RESPONSIBILITIES
      • DEVELOP THE CHANGE VISION
      • DEFINE KEY MESSAGES AND GOALS
      • IDENTIFY MAJOR CHANGES
      • IDENTIFY KEY MILESTONES
      • BUILD AND MAINTAIN A CHANGE FAQ

      Use the MLI engagement dashboard to measure your current state and the impact of the change in real-time

      The McLean Leadership Index diagnostic is a low-effort, high-impact program that provides real-time metrics on staff engagement levels. Use these insights to understand your employees’ engagement levels throughout the organizational design implementation to measure the impact of the change and to manage turnover and productivity levels throughout the implementation.

      WHY CARE ABOUT ENGAGEMENT DURING THE CHANGE? ENGAGED EMPLOYEES REPORT:

      39% Higher intention to stay at the organization.

      29% Higher performance and increased likelihood to work harder and longer hours. (Source: McLean and Company N=1,308 IT Employees)

      Why the McLean Leadership Index?

      Based on the Net Promoter Score (NPS), the McLean Leadership Index is one question asked monthly to assess engagement at various points in time.

      Individuals responding to the MLI question with a 9 or 10 are your Promoters and are most positive and passionate. Those who answer 7 or 8 are Passives while those who answer 0 to 6 are Detractors.

      Track your engagement distribution using our online dashboard to view MLI data at any time and view results based on teams, locations, manager, tenure, age, and gender. Assess the reactions to events and changes in real-time, analyze trends over time, and course-correct.

      Dashboard reports: Know your staff’s overall engagement and top priorities

      McLean Leadership Index

      OVERALL ENGAGEMENT RESULTS

      You get:

      • A clear breakdown of your detractors, passives, and promotors.
      • To view results by team, location, and individual manager.
      • To dig deeper into results by reviewing results by age, gender, and tenure at the organization to effectively identify areas where engagement is weak.

      TIME SERIES TRENDS

      You get:

      • View of changes in engagement levels for each team, location, and manager.
      • Breakdown of trends weekly, monthly, quarterly, and yearly.
      • To encourage leaders to monitor results to analyze root causes for changes and generate improvement initiatives.

      QUALITATIVE COMMENTS

      You get:

      • To view qualitative comments provided by staff on what is impacting their engagement.
      • To reply directly to comments without impacting the anonymity of the individuals making the comments.
      • To leverage trends in the comments to make changes to communication approaches.

      Launch the McLean Leadership Index in under three weeks

      Info-Tech’s dedicated team of program managers will facilitate this diagnostic program remotely, providing you with a convenient, low-effort, high-impact experience.

      We will guide you through the process with your goals in mind to deliver deep insight into your successes and areas to improve.

      What You Need To Do:

      1. Contact Info-Tech to launch the program and test the functionality in a live demo.
      2. Identify demographics and set access permissions.
      3. Complete manager training with assistance from Info-Tech Advisors.
      4. Participate in a results call with an Info-Tech Advisor to review results and develop an action plan.

      Info-Tech’s Program Manager Will:

      1. Collect necessary inputs and generate your custom dashboard.
      2. Launch, maintain, and support the online system in the field.
      3. Send out a survey to 25% of the staff each week.
      4. Provide ongoing support over the phone, and the needed tools and templates to communicate and train staff as well as take action on results.

      Explore your initial results in a one-hour call with an Executive Advisor to fully understand the results and draw insights from the data so you can start your action plan.

      Start Your Diagnostic Now

      We'll help you get set up as soon as you're ready.

      Start Now

      Communication has a direct impact on employee engagement; measure communication quality using your MLI results

      A line graph titled: The impact of manager communication on employee engagement. The X-axis is labeled from Strongly Disagree to Strongly Agree, and the Y-axis is labeled: Percent of Engaged Respondents. There are 3 colour-coded lines: dark blue indicates My manager provides me with high-quality feedback; light blue indicates I clearly understand what is expected of me on the job; and green indicates My manager keeps me well informed about decisions that affect me. The line turns upward as it moves to the right of the graph.

      (McLean & Company, 2015 N=17,921)

      A clear relationship exists between how effective a manager’s communication is perceived to be and an employee’s level of engagement. If engagement drops, circle back with employees to understand the root causes.

      Establish an effective implementation team to drive the organizational change

      The implementation team is responsible for developing and disseminating information around the change, developing the transition strategy, and for the ongoing management of the changes.

      The members of the implementation team should include:

      • CIO
      • Current IT leadership team
      • Project manager
      • Business relationship managers
      • Human resources advisor

      Don’t be naïve – building and executing the implementation plan will require a significant time commitment from team members. Too often, organizations attempt to “fit it in” to their existing schedules resulting in poor planning, long delays, and overall poor results. Schedule this work like you would a project.

      TOP 3 TIPS FOR DEFINING YOUR IMPLEMENTATION TEAM

      1. Select a Project Manager. Info-Tech strongly recommends having one individual accountable for key project management activities. They will be responsible for keeping the project on time and maintaining a holistic view of the implementation.
      2. Communication with Business Partners is Critical. If you have Business Relationship Managers (BRMs), involve them in the communication planning or assign someone to play this role. You need your business partners to be informed and bought in to the implementation to maintain satisfaction.
      3. Enlist Your “Volunteer Army.” (Kotter’s 8 Principles) If you have an open culture, Info-Tech encourages you to have an extended implementation team made up of volunteers interested in supporting the change. Their role will be to support the core group, assist in planning, and communicate progress with peers.

      Determine the roles of your implementation team members

      1.1 30 Minutes

      Input

      • Implementation team members

      Output

      • RACI for key transition elements

      Materials

      • RACI chart and pen

      Participants

      • Core implementation committee
      1. Each member should be actively engaged in all elements of the organizational design implementation. However, it’s important to have one individual who is accountable for key activities and ensures they are done effectively and measured.
      2. Review the chart below and as a group, brainstorm any additional key change components.
      3. For each component listed below, identify who is Accountable, Responsible, Consulted, and Informed for each (suggested responsibility below).
      CIO IT Leaders PM BRM HR
      Communication Plan A R R R C
      Employee Engagement A R R R C

      Departmental Transition Plan

      R A R I R
      Organizational Transition Plan R R A I C
      Manager Training A R R I C

      Individual Transition Plans

      R A R I I
      Technology and Logistical Changes R R A I I
      Hiring A R I I R
      Learning and Development R A R R R
      Union Negotiations R I I I A
      Process Development R R A R I

      Fast-track your communication planning with Info-Tech’s Organizational Design Implementation Kick-Off Presentation

      Organizational Design Implementation Kick-Off Presentation

      Communicate what’s important to your staff in a simple, digestible way. The communication message should reflect what is important to your stakeholders and what they want to know at the time.

      • Why is this change happening?
      • What are the goals of the reorganization?
      • What specifically is changing?
      • How will this impact me?
      • When is this changing?
      • How and where can I get more information?

      It’s important that the tone of the meeting suits the circumstances.

      • If the reorganization is going to involve lay-offs: The meeting should maintain a positive feel, but your key messages should stress the services that will be available to staff, when and how people will be communicated with about the change, and who staff can go to with concerns.
      • If the reorganization is to enable growth: Focus on celebrating where the organization is going, previous successes, and stress that the staff are critical in enabling team success.

      Modify the Organizational Design ImplementationKick-Off Presentation with your key messages and goals

      1.2 1 hour

      Input

      • New organizational structure

      Output

      • Organizational design goal statements

      Materials

      • Whiteboard & marker
      • ODI Kick-off Presentation

      Participants

      • OD implementation team
      1. Within your change implementation team, hold a meeting to identify and document the change goals and key messages.
      2. As a group, discuss what the key drivers were for the organizational redesign by asking yourselves what problem you were trying to solve.
      3. Select 3–5 key problem statements and document them on a whiteboard.
      4. For each problem statement, identify how the new organizational design will allow you to solve those problems.
      5. Document these in your Organizational Design Implementation Kick-Off Presentation.

      Modify the presentation with your unique change vision to serve as the center piece of your communication strategy

      1.3 1 hour

      Input

      • Goal statements

      Output

      • Change vision statement

      Materials

      • Sticky notes
      • Pens
      • Voting dots

      Participants

      • Change team
      1. Hold a meeting with the change implementation team to define your change vision. The change vision should provide a picture of what the organization will look like after the organizational design is implemented. It should represent the aspirational goal, and be something that staff can all rally behind.
      2. Hand out sticky notes and ask each member to write down on one note what they believe is the #1 desired outcome from the organizational change and one thing that they are hoping to avoid (you may wish to use your goal statements to drive this).
      3. As a group, review each of the sticky notes and group similar statements in categories. Provide each individual with 3 voting dots and ask them to select their three favorite statements.
      4. Select your winning statements in teams of 2–3. Review each statement and as a team work to strengthen the language to ensure that the statement provides a call to action, that it is short and to the point, and motivational.
      5. Present the statements back to the group and select the best option through a consensus vote.
      6. Document the change vision in your Organizational Design Implementation Kick-Off Presentation.

      Customize the presentation identifying key changes that will be occurring

      1.4 2 hours

      Input

      • Old and new organizational sketch

      Output

      • Identified key changes that are occurring

      Materials

      • Whiteboard
      • Sticky notes & Pens
      • Camera

      Participants

      • OD implementation team
      1. On a whiteboard, draw a high-level picture of your previous organizational sketch and your new organizational sketch.
      2. Using sticky notes, ask individuals to highlight key high-level challenges that exist in the current model (consider people, process, and technology).
      3. Consider each sticky note, and highlight and document how and where your new sketch will overcome those challenges and the key differences between the old structure and the new.
      4. Take a photo of the two sketches and comments, and document these in your Organizational Design Implementation Kick-Off Presentation.

      Modify the presentation by identifying and documenting key milestones

      1.5 1 hour

      Input

      • OD implementation team calendars

      Output

      • OD implementation team timeline

      Materials

      • OD Implementation Kick-Off Presentation

      Participants

      • OD implementation team
      1. Review the timeline in the Organizational Design Implementation Kick-Off Presentation. As a group, discuss the key milestones identified in the presentation:
        • Kick-off presentation
        • Departmental transition strategy built
        • Organizational transition strategy built
        • Manager training
        • One-on-one meetings with staff to discuss changes to roles
        • Individual transition strategy development begins
      2. Review the timeline, and keeping your other commitments in mind, estimate when each of these tasks will be completed and update the timeline.

      Build an OD implementation FAQ to proactively address key questions and concerns about the change

      Organizational Design Implementation FAQ

      Leverage this template as a starting place for building an organizational design implementation FAQ.

      This template is prepopulated with example questions and answers which are likely to arise.

      Info-Tech encourages you to use the list of questions as a basis for your FAQ and to add additional questions based on the changes occurring at your organization.

      It may also be a good idea to store the FAQ on a company intranet portal so that staff has access at all times and to provide users with a unique email address to forward questions to when they have them.

      Build your unique organizational design implementation FAQ to keep staff informed throughout the change

      1.6 1 hour + ongoing

      Input

      • OD implementation team calendars

      Output

      • OD implementation team timeline

      Materials

      • OD Implementation Kick-Off Presentation

      Participants

      • OD implementation team
      1. Download a copy of the Organizational Design Implementation FAQ and as a group, review each of the key questions.
      2. Delete any questions that are not relevant and add any additional questions you either believe you will receive or which you have already been asked.
      3. Divide the questions among team members and have each member provide a response to these questions.
      4. The CIO and the project manager should review the responses for accuracy and ensure they are ready to be shared with staff.
      5. Publish the responses on an IT intranet site and make the location known to your IT staff.

      Dispelling rumors by using a large implementation team

      CASE STUDY

      Industry: Manufacturing

      Source: CIO

      Challenge

      When rumors of the impending reorganization reached staff, there was a lot of confusion and some of the more vocal detractors in the department enforced these rumors.

      Staff were worried about changes to their jobs, demotions, and worst of all, losing their jobs. There was no communication from senior management to dispel the gossip and the line managers were also in the dark so they weren’t able to offer support.

      Staff did not feel comfortable reaching out to senior management about the rumors and they didn’t know who the change manager was.

      Solution

      The CIO and change manager put together a large implementation team that included many of the managers in the department. This allowed the managers to handle the gossip through informal conversations with their staff.

      The change manager also built a communication strategy to communicate the stages of the reorganization and used FAQs to address the more common questions.

      Results

      The reorganization was adopted very quickly since there was little confusion surrounding the changes with all staff members. Many of the personnel risks were mitigated by the communication strategy because it dispelled rumors and took some of the power away from the vocal detractors in the department.

      An engagement survey was conducted 3 months after the reorganization and the results showed that the engagement of staff had not changed after the reorganization.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1a: Launch the MLI Dashboard (Pre-Work)

      Prior to the workshop, Info-Tech’s advisors will work with you to launch the MLI diagnostic to understand the overall engagement levels of your organization.

      1b: Review Your MLI Results

      The analysts will facilitate several exercises to help you and your team identify your current engagement levels, and the variance across demographics and over time.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      1.1: Define Your Change Team Responsibilities

      Review the key responsibilities of the organizational design implementation team and define the RACI for each individual member.

      1.3: Define Your Change Vision and Goals

      Identify the change vision statement which will serve as the center piece for your change communications as well as the key message you want to deliver to your staff about the change. These messages should be clear, emotionally impactful, and inspirational.

      1.4: Identify Key Changes Which Will Impact Staff

      Collectively brainstorm all of the key changes that are happening as a result of the change, and prioritize the list based on the impact they will have on staff. Document the top 10 biggest changes – and the opportunities the change creates or problems it solves.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      1.5: Define the High-Level Change Timeline

      Identify and document the key milestones within the change as a group, and determine key dates and change owners for each of the key items. Determine the best way to discuss these timelines with staff, and whether there are any which you feel will have higher levels of resistance.

      1.5: Build the FAQ and Prepare for Objection Handling

      As a group, brainstorm the key questions you believe you will receive about the change and develop a common FAQ to provide to staff members. The advisor will assist you in preparing to manage objections to limit resistance.

      Phase 2

      Build The Organizational Transition Plan

      Build the organizational transition plan

      Outcomes of this section:

      • A holistic list of projects that will enable the implementation of the organizational structure.
      • A schedule to monitor the progress of your change projects.

      This section involves the following participants:

      • CIO
      • Reorganization Implementation Team

      Key Section Insight:

      Be careful to understand the impacts of the change on all groups and departments. For best results, you will need representation from all departments to limit conflict and ensure a smooth transition. For large IT organizations, you will need to have a plan for each department/work unit and create a larger integration project.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Build the Organizational Transition Plan

      Proposed Time to Completion (in weeks): 2-4 weeks

      Step 2.1: Review the Change Dimensions and How They Are Used to Plan Change Projects

      Start with an analyst kick off call:

      • Review the purpose of the kick-off meeting.
      • Review the change project dimensions.
      • Review the Organizational Design Implementation Project Planning Tool.

      Then complete these activities…

      • Conduct your kick-off meeting.
      • Brainstorm a list of reorganization projects and their related tasks.

      With these tools & templates:

      • Organizational Design Implementation Project Planning Tool

      Step 2.2: Review the List of Change Projects

      Review findings with analyst:

      • Revisit the list of projects and tasks developed in the brainstorming session.
      • Assess the list and determine resourcing and dependencies for the projects.
      • Review the monitoring process.

      Then complete these activities…

      • Complete the Organizational Design Implementation Project Planning Tool.
      • Map out your project dependencies and resourcing.
      • Develop a schedule for monitoring projects.

      With these tools & templates:

      • Organizational Design Implementation Project Planning Tool

      Use Info-Tech’s Organizational Design Implementation Project Planning Tool to plan and track your reorganization

      • Use Info-Tech’s Organizational Design Implementation Project Planning Tool to document and track all of the changes that are occurring during your reorganization.
      • Automatically build Gantt charts for all of the projects that are being undertaken, track problems in the issue log, and monitor the progress of projects in the reporting tab.
      • Each department/work group will maintain its own version of this tool throughout the reorganization effort and the project manager will maintain a master copy with all of the projects listed.
      • The chart comes pre-populated with example data gathered through the research and interview process to help generate ideas for your own reorganization.
      • Review the instructions at the top of each work sheet for entering and modifying the data within each chart.

      Have a short kick-off meeting to introduce the project planning process to your implementation team

      2.1 30 minutes

      Output

      • Departmental ownership of planning tool

      Materials

      • OD Implementation Project Planning Tool

      Participants

      • Change Project Manager
      • Implementation Team
      • Senior Management (optional)
      1. The purpose of this kick-off meeting is to assign ownership of the project planning process to members of the implementation team and to begin thinking about the portfolio of projects required to successfully complete the reorganization.
      2. Use the email template included on this slide to invite your team members to the meeting.
      3. The topics that need to be covered in the meeting are:
        • Introducing the materials/templates that will be used throughout the process.
        • Assigning ownership of the Organizational Design Implementation Project Planning Tool to members of your team.
          • Ownership will be at the departmental level where each department or working group will manage their own change projects.
        • Prepare your implementation team for the next meeting where they will be brainstorming the list of projects that will need to be completed throughout the reorganization.
      4. Distribute/email the tools and templates to the team so that they may familiarize themselves with the materials before the next meeting.

      Hello [participant],

      We will be holding our kickoff meeting for our reorganization on [date]. We will be discussing the reorganization process at a high level with special attention being payed to the tools and templates that we will be using throughout the process. By the end of the meeting, we will have assigned ownership of the Project Planning Tool to department representatives and we will have scheduled the next meeting where we’ll brainstorm our list of projects for the reorganization.

      Consider Info-Tech’s four organizational change dimensions when identifying change projects

      CHANGE DIMENSIONS

      • TECHNOLOGY AND LOGISTICS
      • COMMUNICATION
      • STAFFING
      • PROCESS

      Technology and Logistics

      • These are all the projects that will impact the technology used and physical logistics of your workspace.
      • These include new devices, access/permissions, new desks, etc.

      Communication

      • All of the required changes after the reorganization to ongoing communications within IT and to the rest of the organization.
      • Also includes communication projects that are occurring during the reorganization.

      Staffing

      • These projects address the changes to your staff’s roles.
      • Includes role changes, job description building, consulting with HR, etc.

      Process

      • Projects that address changes to IT processes that will occur after the reorganization.

      Use these trigger questions to help identify all aspects of your coming changes

      STAFFING

      • Do you need to hire short or long-term staff to fill vacancies?
      • How long does it typically take to hire a new employee?
      • Will there be staff who are new to management positions?
      • Is HR on board with the reorganization?
      • Have they been consulted?
      • Have transition plans been built for all staff members who are transitioning roles/duties?
      • Will gaps in the structure need to be addressed with new hires?

      COMMUNICATION

      • When will the change be communicated to various members of the staff?
      • Will there be disruption to services during the reorganization?
      • Who, outside of IT, needs to know about the reorganization?
      • Do external communications need to be adjusted because of the reorganization? Moving/centralizing service desk, BRMs, etc.?
      • Are there plans/is there a desire to change the way IT communicates with the rest of the organization?
      • Will the reorganization affect the culture of the department? Is the new structure compatible with the current culture?

      Use these trigger questions to help identify all aspects of your coming changes (continued)

      TECHNOLOGY AND LOGISTICS

      • Will employees require new devices in their new roles?
      • Will employees be required to move their workspace?
      • What changes to the workspace are required to facilitate the new organization?
      • Does new furniture have to be purchased to accommodate new spaces/staff?
      • Is the workspace adequate/up to date technologically (telephone network, Wi-Fi coverage, etc.)?
      • Will employees require new permissions/access for their changing roles?
      • Will permissions/access need to be removed?
      • What is your budget for the reorganization?
      • If a large geographical move is occurring, have problems regarding geography, language barriers, and cultural sensitivities been addressed?

      PROCESS

      • What processes need to be developed?
      • What training for processes is required?
      • Is the daily functioning of the IT department predicted to change?
      • Are new processes being implemented during the reorganization?
      • How will the project portfolio be affected by the reorganization?
      • Is new documentation required to accompany new/changing processes?

      Brainstorm the change projects to be carried out during the reorganization for your team/department

      2.2 3 hours

      Input

      • Constructive group discussion

      Output

      • Thorough list of all reorganization projects

      Materials

      • Whiteboard, sticky notes
      • OD Implementation Project Planning Tool

      Participants

      • Implementation Team
      • CIO
      • Senior Management
      1. Before the meeting, distribute the list of trigger questions presented on the two previous slides to prepare your implementation team for the brainstorming session.
      2. Begin the meeting by dividing up your implementation team into the departments/work groups that they represent (and have ownership of the tool over).
      3. Distribute a different color of sticky notes to each team and have them write out each project they can think of for each of the change planning dimensions (Staffing, Communication, Process and Technology/Logistics) using the trigger questions.
      4. After one hour, ask the groups to place the projects that they brainstormed onto the whiteboard divided into the four change dimensions.
      5. Discuss the complete list of projects on the board.
        • Remove projects that are listed more than once since some projects will be universal to some/all departments.
        • Adjust the wording of projects for the sake of clarity.
        • Identify projects that are specific to certain departments.
      6. Document the list of high-level projects on tab 2 “Project Lists” within the OD Implementation Project Planning Tool after the activity is complete.

      Prioritize projects to assist with project planning modeling

      Prioritization is the process of ranking each project based on its importance to implementation success. Hold a meeting for the implementation team and extended team to prioritize the project list. At the conclusion of the meeting, each requirement should be assigned a priority level. The implementation teams will use these priority levels to ensure efforts are targeted towards the proper projects. A simple way to do this for your implementation is to use the MoSCoW Model of Prioritization to effectively order requirements.

      The MoSCoW Model of Prioritization

      MUST HAVE - Projects must be implemented for the organizational design to be considered successful.

      SHOULD HAVE - Projects are high priority that should be included in the implementation if possible.

      COULD HAVE - Projects are desirable but not necessary and could be included if resources are available.

      WON'T HAVE - Projects won’t be in the next release, but will be considered for the future releases.

      The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994.

      Keep the following criteria in mind as you determine your priorities

      Effective Prioritization Criteria

      Criteria Description
      Regulatory & Legal Compliance These requirements will be considered mandatory.
      Policy or Contract Compliance Unless an internal policy or contract can be altered or an exception can be made, these projects will be considered mandatory.
      Business Value Significance Give a higher priority to high-value projects.
      Business Risk Any project with the potential to jeopardize the entire project should be given a high priority and implemented early.
      Implementation Complexity Give a higher priority to quick wins.
      Alignment with Strategy Give a higher priority to requirements that enable the corporate strategy and IT strategy.
      Urgency Prioritize projects based on time sensitivity.
      Dependencies A project on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.
      Funding Availability Do we have the funding required to make this change?

      Prioritize the change projects within your team/department to be executed during the reorganization

      2.3 3 hours

      Input

      • Organizational Design Implementation Project Planning Tool

      Output

      • Prioritized list of projects

      Materials

      • Whiteboard, sticky notes
      • OD Implementation Project Planning Tool

      Participants

      • Implementation Team
      • Extended Implementation Team
      1. Divide the group into their department teams. Draw 4 columns on a whiteboard, including the following:
        • Must have
        • Should have
        • Could have
        • Won’t have
      2. As a group, review each project and collaboratively identify which projects fall within each category. You should have a strong balance between each of the categories.
      3. Beginning with the “must have” projects, determine if each has any dependencies. If any of the projects are dependent on another, add the dependency project to the “must have” category. Group and circle the dependent projects.
      4. Continue the same exercise with the “should have” and “could have” options.
      5. Record the results on tab “2. Project List” of the Organizational Design Implementation Project Planning Tool using the drop down option.

      Determine resource availability for completing your change projects

      2.4 2 hours

      Input

      • Constructive group discussion

      Output

      • Thorough list of all reorganization projects

      Materials

      • Whiteboard, sticky notes
      • OD Implementation Project Planning Tool

      Participants

      • Implementation Team
      • CIO
      • Senior Management
      1. Divide the group into their department teams to plan the execution of the high-level list of projects developed in activity 2.2.
      2. Review the list of high-level projects and starting with the “must do” projects, consider each in turn and brainstorm all of the tasks required to complete these projects. Write down each task on a sticky note and place it under the high-level project.
      3. On the same sticky note as the task, estimate how much time would be required to complete each task. Be realistic about time frames since these projects will be on top of all of the regular day-to-day work.
      4. Along with the time frame, document the resources that will be required and who will be responsible for the tasks. If you have a documented Project Portfolio, use this to determine resourcing.
      5. After mapping out the tasks, bring the group back together to present their list of projects, tasks, and required resources.
        • Go through the project task lists to make sure that nothing is missed.
        • Review the timelines to make sure they are feasible.
        • Review the resources to ensure that they are available and realistic based on constraints (time, current workload, etc.).
        • Repeat the process for the Should do and Could do projects.
      1. Document the tasks and resources in tab “3. Task Monitoring” in the OD Implementation Project Planning Tool after the activity is complete.

      Map out the change project dependencies at the departmental level

      2.5 2 hours

      Input

      • Constructive group discussion

      Output

      • Thorough list of all reorganization projects

      Materials

      • Whiteboard, sticky notes
      • OD Implementation Project Planning Tool

      Participants

      • Implementation Team
      • CIO
      • Senior Management
      1. Divide the group into their department teams to map the dependencies of their tasks created in activity 2.3.
      2. Take the project task sticky notes created in the previous activity and lay them out along a timeline from start to finish.
      3. Determine the dependencies of the tasks internal to the department. Map out the types of dependencies.
        • Finish to Start: Preceding task must be completed before the next can start.
        • Start to Start: Preceding task must start before the next task can start.
        • Finish to Finish: Predecessor must finish before successor can finish.
        • Start to Finish: Predecessor must start before successor can finish.
      4. Bring the group back together and review each group’s timeline and dependencies to make sure that nothing has been missed.
      5. As a group, determine whether there are dependencies that span the departmental lists of projects.
      6. Document all of the dependencies within the department and between departmental lists of projects and tasks in the OD Implementation Project Planning Tool.

      Amalgamate all of the departmental change planning tools into a master copy

      2.6 3 hours

      Input

      • Department-specific copies of the OD Implementation Project Planning Tool

      Output

      • Universal list of all of the change projects

      Materials

      • Whiteboard and sticky notes

      Participants

      • Implementation Project Manager
      • Members of the implementation team for support (optional)
      1. Before starting the activity, gather all of the OD Implementation Project Planning Tools completed at the departmental level.
      2. Review each completed tool and write all of the individual projects with their timelines on sticky notes and place them on the whiteboard.
      3. Build timelines using the documented dependencies for each department. Verify that the resources (time, people, physical) are adequate and feasible.
      4. Combine all of the departmental project planning tools into one master tool to be used to monitor the overall status of the reorganization. Separate the projects based on the departments they are specific to.
      5. Finalize the timeline based on resource approval and using the dependencies mapped out in the previous exercise.
      6. Approve the planning tools and store them in a shared drive so they can be accessed by the implementation team members.

      Create a progress monitoring schedule

      2.7 1 hour weekly

      Input

      • OD Implementation Project Planning Tools (departmental & organizational)

      Output

      • Actions to be taken before the next pulse meeting

      Participants

      • Implementation Project Manager
      • Members of the implementation team for support
      • Senior Management
      1. Hold weekly pulse meetings to keep track of project progress.
      2. The agenda of each meeting should include:
        • Resolutions to problems/complications raised at the previous week’s meeting.
        • Updates on each department’s progress.
        • Raising any issues/complications that have appeared that week.
        • A discussion of potential solutions to the issues/complications.
        • Validating the work that will be completed before the next meeting.
        • Raising any general questions or concerns that have been voiced by staff about the reorganization.
      3. Upload notes from the meeting about resolutions and changes to the schedules to the shared drive containing the tools.
      4. Increase the frequency of the meetings towards the end of the project if necessary.

      Building a holistic change plan enables adoption of the new organizational structure

      CASE STUDY

      Industry: Manufacturing

      Source: CIO

      Challenge

      The CIO was worried about the impending reorganization due to problems that they had run into during the last reorganization they had conducted. The change management projects were not planned well and they led to a lot of uncertainty before and after the implementation.

      No one on the staff was ready for the reorganization. Change projects were completed four months after implementation since many of them had not been predicted and cataloged. This caused major disruptions to their user services leading to drops in user satisfaction.

      Solution

      Using their large and diverse implementation team, they spent a great deal of time during the early stages of planning devoted to brainstorming and documenting all of the potential change projects.

      Through regular meetings, the implementation team was able to iteratively adjust the portfolio of change projects to fit changing needs.

      Results

      Despite having to undergo a major reorganization that involved centralizing their service desk in a different state, there were no disruptions to their user services.

      Since all of the change projects were documented and completed, they were able to move their service desk staff over a weekend to a workspace that was already set up. There were no changes to the user satisfaction scores over the period of their reorganization.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.2 Brainstorm Your List of Change Projects

      Review your reorganization plans and facilitate a brainstorming session to identify a complete list of all of the projects needed to implement your new organizational design.

      2.5 Map Out the Dependencies and Resources for Your Change Projects

      Examine your complete list of change projects and determine the dependencies between all of your change projects. Align your project portfolio and resource levels to the projects in order to resource them adequately.

      Phase 3

      Lead Staff Through the Reorganization

      Train managers to lead through change

      Outcomes of this Section:

      • Completed the workshop: Lead Staff Through Organizational Change
      • Managers possess stakeholder engagement plans for each employee
      • Managers are prepared to fulfil their roles in implementing the organizational change

      This section involves the following participants:

      • CIO
      • IT leadership team
      • IT staff

      Key Section Insight:

      The majority of IT managers were promoted because they excelled at the technical aspect of their job rather than in people management. Not providing training is setting your organization up for failure. Train managers to effectively lead through change to see a 72% decrease in change management issues. (Source: Abilla, 2009)

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Train Managers to Lead Through Change

      Proposed Time to Completion (in weeks): 1-2 weeks

      Step 3.1: Train Your Managers to Lead Through the Change

      Start with an analyst kick off call:

      • Go over the manager training workshop section of this deck.
      • Review the deliverables generated from the workshop (stakeholder engagement plan and conflict style self-assessment).

      Then complete these activities…

      • Conduct the workshop with your managers.

      With these tools & templates:

      • Organizational Design Implementation Manager Training Guide
      • Organizational Design Implementation Stakeholder Engagement Plan Template

      Step 3.2: Debrief After the Workshop

      Review findings with analyst:

      • Discuss the outcomes of the manager training.
      • Mention any feedback.
      • High-level overview of the workshop deliverables.

      Then complete these activities…

      • Encourage participants to review and revise their stakeholder engagement plans.
      • Review the Organizational Design Implementation Transition Plan Template and next steps.

      Get managers involved to address the majority of obstacles to successful change

      Managers all well-positioned to translate how the organizational change will directly impact individuals on their teams.

      Reasons Why Change Fails

      EMPLOYEE RESISTANCE TO CHANGE - 39%

      MANAGEMENT BEHAVIOR NOT SUPPORTIVE OF CHANGE - 33%

      INADEQUATE RESOURCE OR BUDGET - 14%

      OTHER OBSTACLES - 14%

      72% of change management issues can be directly improved by management.

      (Source: shmula)

      Why are managers crucial to organizational change?

      • Managers are extremely well-connected.
        • They have extensive horizontal and vertical networks spanning the organization.
        • Managers understand the informal networks of the organization.
      • Managers are valuable communicators.
        • Managers have established strong relationships with employees.
        • Managers influence the way staff perceive messaging.

      Conduct a workshop with managers to help them lead their teams through change

      Organizational Design Implementation Manager Training Guide

      Give managers the tools and skills to support their employees and carry out difficult conversations.

      Understand the role of management in communicating the change

      Understand reactions to change

      Resolve conflict

      Respond to FAQs

      Monitor and measure employee engagement

      Prepare managers to effectively execute their role in the organizational change by running a 2-hour training workshop.

      Complete the activities on the following slides to:

      • Plan and prepare for the workshop.
      • Execute the group exercises.
      • Help managers develop stakeholder engagement plans for each of their employees.
      • Initiate the McLean Leadership Index™ survey to measure employee engagement.

      Plan and prepare for the workshop

      3.1 Plan and prepare for the workshop.

      Output

      • Workshop participants
      • Completed workshop prep

      Materials

      • Organizational Design Implementation Manager Training Guide

      Instructions

      1. Create a list of all managers that will be responsible for leading their teams through the change.
      2. Select a date for the workshop.
        • The training session will run approximately 2 hours and should be scheduled within a week of when the implementation plan is communicated organization-wide.
      3. Review the material outlined in the presentation and prepare the Organizational Design Implementation Manager Training Guide for the workshop:
        • Copy and print the “Pre-workshop Facilitator Instructions” and “Facilitator Notes” located in the notes section below each slide.
        • Revise frequently asked questions (FAQs) and responses.
        • Delete instruction slides.

      Invite managers to the workshop

      Workshop Invitation Email Template

      Make necessary modifications to the Workshop Invitation Email Template and send invitations to managers.

      Hi ________,

      As you are aware, we are starting to roll out some of the initiatives associated with our organizational change mandate. A key component of our implementation plan is to ensure that managers are well-prepared to lead their teams through the transition.

      To help you proactively address the questions and concerns of your staff, and to ensure that the changes are implemented effectively, we will be conducting a workshop for managers on .

      While the change team is tasked with most of the duties around planning, implementing, and communicating the change organization-wide, you and other managers are responsible for ensuring that your employees understand how the change will impact them specifically. The workshop will prepare you for your role in implementing the organizational changes in the coming weeks, and help you refine the skills and techniques necessary to engage in challenging conversations, resolve conflicts, and reduce uncertainty.

      Please confirm your attendance for the workshop. We look forward to your participation.

      Kind regards,

      Change team

      Prepare managers for the change by helping them build useful deliverables

      ODI Stakeholder Engagement Plan Template & Conflict Style Self-Assessment

      Help managers create useful deliverables that continue to provide value after the workshop is completed.

      Workshop Deliverables

      Organizational Design Implementation Stakeholder Engagement Plan Template

      • Document the areas of change resistance, detachment, uncertainty, and support for each employee.
      • Document strategies to overcome resistance, increase engagement, reduce uncertainty, and leverage their support.
      • Create action items to execute after the workshop.

      Conflict Style Self-Assessment

      • Determine how you approach conflicts.
      • Analyze the strengths and weaknesses of this approach.
      • Identify ways to adopt different conflict styles depending on the situation.

      Book a follow-up meeting with managers and determine which strategies to Start, Stop, or Continue

      3.2 1 hour

      Output

      • Stakeholder engagement templates

      Materials

      • Sticky notes
      • Pen and paper

      Participants

      • Implementation Team
      • Managers
      1. Schedule a follow-up meeting 2–3 weeks after the workshop.
      2. Facilitate an open conversation on approaches and strategies that have been used or could be used to:
        • Overcome resistance
        • Increase engagement
        • Reduce uncertainty
        • Leverage support
      3. During the discussion, document ideas on the whiteboard.
      4. Have participants vote on whether the approaches and strategies should be started, stopped, or continued.
        • Start: actions that the team would like to begin.
        • Stop: actions that the team would like to stop.
        • Continue: actions that work for the team and should proceed.
      5. Encourage participants to review and revise their stakeholder engagement plans.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1 The Change Maze

      Break the ice with an activity that illustrates the discomfort of unexpected change, and the value of timely and instructive communication.

      3.2 Perform a Change Management Retrospective

      Leverage the collective experience of the group. Share challenges and successes from previous organizational changes and apply those lessons to the current transition.

      3.3 Create a Stakeholder Engagement Plan

      Have managers identify areas of resistance, detachment, uncertainty, and support for each employee and share strategies for overcoming resistance and leveraging support to craft an action plan for each of their employees.

      3.4 Conduct a Conflict Style Self-Assessment

      Give participants an opportunity to better understand how they approach conflicts. Administer the Conflict Style Self-Assessment to identify conflict styles and jumpstart a conversation about how to effectively resolve conflicts.

      Transition your staff to their new roles

      Outcomes of this Section:

      • Identified key responsibilities to transition
      • Identified key relationships to be built
      • Built staff individual transition plans and timing

      This section involves the following participants:

      • All IT staff members

      Key Section Insight

      In order to ensure a smooth transition, you need to identify the transition scheduled for each employee. Knowing when they will retire and assume responsibilities and aligning this with the organizational transition will be crucial.

      Phase 3b outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3b: Transition Staff to New Roles

      Proposed Time to Completion (in weeks): 2-4

      Step 4.1: Build Your Transition Plans

      Start with an analyst kick off call:

      • Review the Organizational Design Implementation Transition Plan Template and its contents.
      • Return to the new org structure and project planning tool for information to fill in the template.

      Then complete these activities…

      • Present the template to your managers.
      • Have them fill in the template with their staff.
      • Approve the completed templates.

      With these tools & templates:

      • Organizational Design Implementation Project Planning Tool
      • Organizational Design Implementation Transition Plan Template

      Step 4.2: Finalize Your Transition Plans

      Review findings with analyst:

      • Discuss strategies for timing the transition of your employees.
      • Determine the readiness of your departments for transitioning.

      Then complete these activities…

      • Build a transition readiness timeline of your departments.
      • Move your employees to their new roles.

      With these tools & templates:

      • Organizational Design Implementation Project Planning Tool
      • Organizational Design Implementation Transition Plan Template

      Use Info-Tech’s transition plan template to map out all of the changes your employees will face during reorganization

      Organizational Design Implementation Transition Plan Template

      • Use Info-Tech’s Organizational Design Implementation Transition Plan Template to document (in consultation with your employees) all of the changes individual staff members need to go through in order to transition into their new roles.
      • It provides a holistic view of all of the changes aligned to the change planning dimensions, including:
        • Current and new job responsibilities
        • Outstanding projects
        • Documenting where the employee may be moving
        • Technology changes
        • Required training
        • New relationships that need to be made
        • Risk mitigation
      • The template is designed to be completed by managers for their direct reports.

      Customize the transition plan template for all affected staff members

      4.1 30 minutes per employee

      Output

      • Completed transition plans

      Materials

      • Individual transition plan templates (for each employee)

      Participants

      • Implementation Team
      • Managers
      1. Implementation team members should hold one-on-one meetings with the managers from the departments they represent to go through the transition plan template.
      2. Some elements of the transition plan can be completed at the initial meeting with knowledge from the implementation team and documentation from the new organizational structure:
        • Employee information (except for the planned transition date)
        • New job responsibilities
        • Logistics and technology changes
        • Relationships (recommendations can be made about beneficial relationships to form if the employee is transitioning to a new role)
      3. After the meeting, managers can continue filling in information based on their own knowledge of their employees:
        • Current job responsibilities
        • Outstanding projects
        • Training (identify gaps in the employee’s knowledge if their role is changing)
        • Risks (potential concerns or problems for the employee during the reorganization)

      Verify and complete the individual transition plans by holding one-on-one meetings with the staff

      4.2 30 minutes per employee

      Output

      • Completed transition plans

      Materials

      • Individual transition plan templates (for each employee)

      Participants

      • Managers
      • Staff (Managers’ Direct Reports)
      1. After the managers complete everything they can in the transition plan templates, they should schedule one-on-one meetings with their staff to review the completed document to ensure the information is correct.
      2. Begin the meeting by verifying the elements that require the most information from the employee:
        • Current job responsibilities
        • Outstanding projects
        • Risks (ask about any problems or concerns they may have about the reorganization)
      3. Discuss the following elements of the transition plan to get feedback:
        • Training (ask if there is any training they feel they may need to be successful at the organization)
        • Relationships (determine if there are any relationships that the employee would like to develop that you may have missed)
      4. Since this may be the first opportunity that the staff member has had to discuss their new role (if they are moving to one), review their new job title and new job responsibilities with them. If employees are prepared for their new role, they may feel more accountable for quickly adopting the reorganization.
      5. Document any questions that they may have so that they can be answered in future communications from the implementation team.
      6. After completing the template, managers will sign off on the document in the approval section.

      Validate plans with organizational change project manager and build the transition timeline

      4.3 3 hours

      Input

      • Individual transition plans
      • Organizational Design Implementation Project Planning Tool

      Output

      • Timeline outlining departmental transition readiness

      Materials

      • Whiteboard

      Participants

      • Implementation Project Manager
      • Implementation Team
      • Managers
      1. After receiving all of the completed individual transition plan templates from managers, members of the implementation team need to approve the contents of the templates (for the departments that they represent).
      2. Review the logistics and technology requirements for transition in each of the templates and align them with the completion dates of the related projects in the Project Planning Tool. These dates will serve as the earliest possible time to transition the employee. Use the latest date from the list to serve as the date that the whole department will be ready to transition.
      3. Hand the approved transition plan templates and the dates at which the departments will be ready for transitioning to the Implementation Project Manager.
      4. The Project Manager needs to verify the contents of the transition plans and approve them.
      5. On a calendar or whiteboard, list the dates that each department will be ready for transitioning.
      6. Review the master copy of the Project Planning Tool. Determine if the outstanding projects limit your ability to transition the departments (when they are ready to transition). Change the ready dates of the departments to align with the completion dates of those projects.
      7. Use these dates to determine the timeline for when you would like to transition your employees to their new roles.

      Overcoming inexperience by training managers to lead through change

      CASE STUDY

      Industry: Manufacturing

      Source: CIO

      Challenge

      The IT department had not undergone a major reorganization in several years. When they last reorganized, they experienced high turnover and decreased business satisfaction with IT.

      Many of the managers were new to their roles and only one of them had been around for the earlier reorganization. They lacked experience in leading their staff through major organizational changes.

      One of the major problems they faced was addressing the concerns, fears, and resistance of their staff properly.

      Solution

      The implementation team ran a workshop for all of the managers in the department to train them on the change and how to communicate the impending changes to their staff. The workshop included information on resistance and conflict resolution.

      The workshop was conducted early on in the planning phases of the reorganization so that any rumors or gossip could be addressed properly and quickly.

      Results

      The reorganization was well accepted by the staff due to the positive reinforcement from their managers. Rumors and gossip about the reorganization were under control and the staff adopted the new organizational structure quickly.

      Engagement levels of the staff were maintained and actually improved by 5% immediately after the reorganization.

      Voluntary turnover was minimal throughout the change as opposed to the previous reorganization where they lost 10% of their staff. There was an estimated cost savings of $250,000–$300,000.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.2.1 Build Your Staff Transition Plan

      Review the contends of the staff transition plan, and using the organizational change map as a guide, build the transition schedule for one employee.

      3.2.1 Review the Transition Plan With the Transition Team

      Review and validate the results for your transition team schedule with other team members. As a group, discuss what makes this exercise difficult and any ideas for how to simplify the exercise.

      Works cited

      American Productivity and Quality Center. “Motivation Strategies.” Potentials Magazine. Dec. 2004. Web. November 2014.

      Bersin, Josh. “Time to Scrap Performance Appraisals?” Forbes Magazine. 5 June 2013. Web. 30 Oct 2013.

      Bridges, William. Managing Transitions, 3rd Ed. Philadelphia: Da Capo Press, 2009.

      Buckley, Phil. Change with Confidence – Answers to the 50 Biggest Questions that Keep Change Leaders up at Night. Canada: Jossey-Bass, 2013.

      “Change and project management.” Change First. 2014. Web. December 2009. <http://www.changefirst.com/uploads/documents/Change_and_project_management.pdf>.

      Cheese, Peter, et al. “Creating an Agile Organization.” Accenture. Oct. 2009. Web. Nov. 2013.

      Croxon, Bruce et al. “Dinner Series: Performance Management with Bruce Croxon from CBC's 'Dragon's Den.'” HRPA Toronto Chapter. Sheraton Hotel, Toronto, ON. 12 Nov. 2013. Panel discussion.

      Culbert, Samuel. “10 Reasons to Get Rid of Performance Reviews.” Huffington Post Business. 18 Dec. 2012. Web. 28 Oct. 2013. <http://www.huffingtonpost.com/samuel-culbert/performance-reviews_b_2325104.html>.

      Denning, Steve. “The Case Against Agile: Ten Perennial Management Objections.” Forbes Magazine. 17 Apr. 2012. Web. Nov. 2013.

      Works cited cont.

      “Establish A Change Management Structure.” Human Technology. Web. December 2014.

      Estis, Ryan. “Blowing up the Performance Review: Interview with Adobe’s Donna Morris.” Ryan Estis & Associates. 17 June 2013. Web. Oct. 2013. <http://ryanestis.com/adobe-interview/>.

      Ford, Edward L. “Leveraging Recognition: Noncash incentives to Improve Performance.” Workspan Magazine. Nov 2006. Web. Accessed May 12, 2014.

      Gallup, Inc. “Gallup Study: Engaged Employees Inspire Company Innovation.” Gallup Management Journal. 12 Oct. 2006. Web. 12 Jan 2012.

      Gartside, David, et al. “Trends Reshaping the Future of HR.” Accenture. 2013. Web. 5 Nov. 2013.

      Grenville-Cleave, Bridget. “Change and Negative Emotions.” Positive Psychology News Daily. 2009.

      Heath, Chip, and Dan Heath. Switch: How to Change Things When Change Is Hard. Portland: Broadway Books. 2010.

      HR Commitment AB. Communicating organizational change. 2008.

      Keller, Scott, and Carolyn Aiken. “The Inconvenient Truth about Change Management.” McKinsey & Company, 2009. <http://www.mckinsey.com/en.aspx>.

      Works cited cont.

      Kotter, John. “LeadingChange: Why Transformation Efforts Fail.” Harvard Business Review. March-April 1995. <http://hbr.org>.

      Kubler-Ross, Elisabeth and David Kessler. On Grief and Grieving: Finding the Meaning of Grief Through the Five Stages of Loss. New York: Scribner. 2007.

      Lowlings, Caroline. “The Dangers of Changing without Change Management.” The Project Manager Magazine. December 2012. Web. December 2014. <http://changestory.co.za/the-dangers-of-changing-without-change-management/>.

      “Managing Change.” Innovative Edge, Inc. 2011. Web. January 2015. <http://www.getcoherent.com/managing.html>.

      Muchinsky, Paul M. Psychology Applied to Work. Florence: Thomson Wadsworth, 2006.

      Nelson, Kate and Stacy Aaron. The Change Management Pocket Guide, First Ed., USA: Change Guides LLC, 2005.

      Nguyen Huy, Quy. “In Praise of Middle Managers.” Harvard Business Review. 2001. Web. December 2014. <https://hbr.org/2001/09/in-praise-of-middle-managers/ar/1>

      “Only One-Quarter of Employers Are Sustaining Gains From Change Management Initiatives, Towers Watson Survey Finds.” Towers Watson. August 2013. Web. January 2015. <http://www.towerswatson.com/en/Press/2013/08/Only-One-Quarter-of-Employers-Are-Sustaining-Gains-From-Change-Management>.

      Shmula. “Why Transformation Efforts Fail.” Shmula.com. September 28, 2009. <http://www.shmula.com/why-transformation-efforts-fail/1510/>

      Don't try this at home

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      Brilliant little and very amusing way to deal with a scammer.

      But do not copy this method as it will actually reveal quite a bit and confirm that your email is valid and active.

      Click to watch Joe Lycett

       

      Tame the Project Backlog

      • Buy Link or Shortcode: {j2store}439|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • Unmanaged project backlogs can become the bane of IT departments, tying IT leaders and PMO staff down to an ever-growing receptacle of project ideas that provides little by way of strategic value and that typically represents a lack of project intake and approval discipline.
      • Decision makers frequently use the backlog to keep the peace. Lacking the time to assess the bulk of requests, or simply wanting to avoid difficult conversations with stakeholders, they “approve” everything and leave it to IT to figure it out.
      • As IT has increasing difficulty assessing – let alone starting – any of the projects in the backlog, stakeholder relations suffer. Requestors view inclusion in the backlog as a euphemism for “declined,” and often characterize the backlog as the place where good project ideas go to die.
      • Faced with these challenges, you need to make your project backlog more useful and reliable. The backlog may contain projects worth doing, but in its current untamed state, you have difficulty discerning, let alone capitalizing upon, those instances of value.

      Our Advice

      Critical Insight

      • Project backlogs are an investment and need to be treated as such. Incurring a cost impact that can be measured in terms of time and money, the backlog needs to be actively managed to ensure that you’re investing wisely and getting a good return in terms of strategic value and project throughput.
      • Unmanageable project backlogs are rooted in bad habits and poorly-defined processes. Identifying the sources that fuel backlog growth is key to long-term success. Unless the problem is addressed at the root, any gains made in the near-term will simply fade away as old, unhealthy habits re-emerge and take hold.
      • Backlog management should facilitate executive awareness about the status of backlog items as new work is being approved. In the long run, this ongoing executive engagement will not only help to keep the backlog manageable, but it will also help to bring more even workloads to IT project staff.

      Impact and Result

      • Keep the best, forget the rest. Develop a near-term approach to limit the role of the backlog to include only those items that add value to the business.
      • Shine a light. Improve executive visibility into the health and status of the backlog so that the backlog is taken into account when decision makers approve new work.
      • Evolve the organizational culture. Effectively employ organizational change management practices to evolve the culture that currently exists around the project backlog in order to ensure customer-service needs are more effectively addressed.
      • Ensure long-term sustainability. Institute processes to make sure that your list of pending projects – should you still require one after implementing this blueprint – remains minimal, maintainable, and of high value.

      Tame the Project Backlog Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how a more disciplined approach to managing your project backlog can help you realize increased value and project throughput.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create a project backlog battle plan

      Calculate the cost of the project backlog and assess the root causes of its unmanageability.

      • Tame the Project Backlog – Phase 1: Create a Backlog Battle Plan
      • Project Backlog ROI Calculator

      2. Execute a near-term backlog cleanse

      Increase the manageability of the backlog by updating stale requests and removing dead weight.

      • Tame the Project Backlog – Phase 2: Execute a Near-Term Backlog Cleanse
      • Project Backlog Management Tool
      • Project Backlog Stakeholder Communications Template

      3. Ensure long-term backlog manageability

      Develop and maintain a manageable backlog growth rate by establishing disciplined backlog management processes.

      • Tame the Project Backlog – Phase 3: Ensure Long-Term Backlog Manageability
      • Project Backlog Operating Plan Template
      • Project Backlog Manager
      [infographic]

      Workshop: Tame the Project Backlog

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Create a Project Backlog Battle Plan

      The Purpose

      Gauge the manageability of your project backlog in its current state.

      Calculate the total cost of your project backlog investments.

      Determine the root causes that contribute to the unmanageability of your project backlog.

      Key Benefits Achieved

      An understanding of the organizational need for more disciplined backlog management.

      Visibility into the costs incurred by the project backlog.

      An awareness of the sources that feed the growth of the project backlog and make it a challenge to maintain.

      Activities

      1.1 Calculate the sunk and marginal costs that have gone into your project backlog.

      1.2 Estimate the throughput of backlog items.

      1.3 Survey the root causes of your project backlog.

      Outputs

      The total estimated cost of the project backlog.

      A project backlog return-on-investment score.

      A project backlog root cause analysis.

      2 Execute a Near-Term Project Backlog Cleanse

      The Purpose

      Identify the most organizationally appropriate goals for your backlog cleanse.

      Pinpoint those items that warrant immediate removal from the backlog and establish a game plan for putting a bullet in them.

      Communicate backlog decisions with stakeholders in a way that minimizes friction and resistance. 

      Key Benefits Achieved

      An effective, achievable, and organizationally right-sized approach to cleansing the backlog.

      Criteria for cleanse outcomes and a protocol for carrying out the near-term cleanse.

      A project sponsor outreach plan to help ensure that decisions made during your near-term cleanse stick. 

      Activities

      2.1 Establish roles and responsibilities for the near-term cleanse.

      2.2 Determine cleanse scope.

      2.3 Develop backlog prioritization criteria.

      2.4 Prepare a communication strategy.

      Outputs

      Clear accountabilities to ensure the backlog is effectively minimized and outcomes are communicated effectively.

      Clearly defined and achievable goals.

      Effective criteria for cleansing the backlog of zombie projects and maintaining projects that are of strategic and operational value.

      A communication strategy to minimize stakeholder friction and resistance.

      3 Ensure Long-Term Project Backlog Manageability

      The Purpose

      Ensure ongoing backlog manageability.

      Make sure the executive layer is aware of the ongoing status of the backlog when making project decisions.

      Customize a best-practice toolkit to help keep the project backlog useful. 

      Key Benefits Achieved

      A list of pending projects that is minimal, maintainable, and of high value.

      Executive engagement with the backlog to ensure intake and approval decisions are made with a view of the backlog in mind.

      A backlog management tool and processes for ongoing manageability. 

      Activities

      3.1 Develop a project backlog management operating model.

      3.2 Configure a project backlog management solution.

      3.3 Assign roles and responsibilities for your long-term project backlog management processes.

      3.4 Customize a project backlog management operating plan.

      Outputs

      An operating model to structure your long-term strategy around.

      A right-sized management tool to help enable your processes and executive visibility into the backlog.

      Defined accountabilities for executing project backlog management responsibilities.

      Clearly established processes for how items get in and out of the backlog, as well as for ongoing backlog review.

      Automate Testing to Get More Done

      • Buy Link or Shortcode: {j2store}285|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $29,139 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Testing, Deployment & QA
      • Parent Category Link: /testing-deployment-and-qa
      • Today’s rapidly changing software products and operational processes create mounting pressure on software delivery teams to release new features and changes quickly while meeting high and demanding quality standards.
      • Most organizations see automated testing as a solution to meet this demand alongside their continuous delivery pipeline. However, they often lack the critical foundations, skills, and practices that are imperative for success.
      • The technology is available to enable automated testing for many scenarios and systems, but industry noise and an expansive tooling marketplace create confusion for those interested in adopting this technology.

      Our Advice

      Critical Insight

      • Good automated testing improves development throughput. No matter how quickly you put changes into production, end users will not accept them if they do not meet quality standards. Escaped defects, refactoring, and technical debt can significantly hinder your team’s ability to deliver software on time and on budget. In fact, 65% of organizations saw a reduction of test cycle time and 62% saw reductions in test costs with automated testing (Sogeti, World Quality Report 2020–21).
      • Start automation with unit and functional tests. Automated testing has a sharp learning curve, due to either the technical skills to implement and operate it or the test cases you are asked to automate. Unit tests and functional tests are ideal starting points in your automation journey because of the available tools and knowledge in the industry, the contained nature of the tests you are asked to execute, and the repeated use of the artifacts in more complicated tests (such as performance and integration tests). After all, you want to make sure the application works before stressing it.
      • Automated testing is a cross-functional practice, not a silo. A core component of successful software delivery throughput is recognizing and addressing defects, bugs, and other system issues early and throughout the software development lifecycle (SDLC). This involves having all software delivery roles collaborate on and participate in automated test case design, configure and orchestrate testing tools with other delivery tools, and proactively prepare the necessary test data and environments for test types.

      Impact and Result

      • Bring the right people to the table. Automated testing involves significant people, process and technology changes across multiple software delivery roles. These roles will help guide how automated testing will compliment and enhance their responsibilities.
      • Build a foundation. Review your current circumstances to understand the challenges blocking automated testing. Establish a strong base of good practices to support the gradually adoption of automated testing across all test types.
      • Start with one application. Verify and validate the automated testing practices used in one application and their fit for other applications and systems. Develop a reference guide to assist new teams.

      Automate Testing to Get More Done Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should automate testing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      2. Adopt good automated testing practices

      Develop and implement practices that mature your automated testing capabilities.

      • Automated Testing Quick Reference Template

      Infographic

      Workshop: Automate Testing to Get More Done

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Adopt Good Automated Testing Practices

      The Purpose

      Understand the goals of and your vision for your automated testing practice.

      Develop your automated testing foundational practices.

      Adopt good practices for each test type.

      Key Benefits Achieved

      Level set automated testing expectations and objectives.

      Learn the key practices needed to mature and streamline your automated testing across all test types.

      Activities

      1.1 Build a foundation.

      1.2 Automate your test types.

      Outputs

      Automated testing vision, expectations, and metrics

      Current state of your automated testing practice

      Ownership of the implementation and execution of automated testing foundations

      List of practices to introduce automation to for each test type

      Make the Case for Legacy Application Modernization

      • Buy Link or Shortcode: {j2store}613|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation
      • Organizations are under continual pressure to deliver faster, with shorter time-to-market, while introducing new products and services at the same time.
      • You and your team have concerns that your existing portfolio of applications is not up to the task.
      • While you understand the need for more investments to modernize your portfolio, your leadership does not appreciate what is required.

      Our Advice

      Critical Insight

      • Legacy modernization is a process, not a single event.
      • Your modernization approach requires you to understand your landscape and decide on a path that minimizes business continuity risks, keeps the investments under control, and is prepared for surprises but always has your final state in mind.

      Impact and Result

      • Evaluate the current state, develop a legacy application strategy, and execute in an agile manner.
      • When coupled with a business case and communications strategy, this approach gives the organization a clear decision-making framework that will maximize business outcomes and deliver value where needed.

      Make the Case for Legacy Application Modernization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for Legacy Application Modernization Storyboard – Understand legacy application modernization in the context of your organization, assess your landscape of applications, and define prioritization and disposition.

      This blueprint provides the steps necessary to build your own enterprise application implementation playbook that can be deployed and leveraged by your implementation teams.

      • Make the Case for Legacy Application Modernization Storyboard

      2. Make the Case for Legacy Application Modernization Presentation Template – The key output from leveraging this research is a presentation to pitch the modernization process.

      Build a proposal deck to make the case for legacy application modernization for your stakeholders. This will contain a definition of what a legacy application is in the context of your organization, a list of candidate applications to modernize, and a disposition strategy for each selected application.

      • Make the Case for Legacy Application Modernization Presentation Template
      [infographic]

      Further reading

      Make the Case for Legacy Application Modernization

      Revamp your business potential to improve agility, security, and user experience while reducing costs.

      Analyst Perspective

      An old application may have served us reliably, but it can prevent us from pursuing future business needs.

      Legacy systems remain well-embedded in the fabric of many organizations' application portfolios. They were often custom-built to meet the needs of the business. Typically, these are core tools that the business leverages to accomplish its goals.

      A legacy application becomes something we need to address when it no longer supports our business goals, is no longer supportable, bears an unsustainable ownership cost, or poses a threat to the organization's cybersecurity or compliance.

      When approaching your legacy application strategy, you must navigate a complex web of business, stakeholder, software, hardware, resourcing, and financial decisions. To complicate matters, the full scope of required effort is not immediately clear. Years of development are embedded in these legacy applications, which must be uncovered and dealt with appropriately.

      IT leaders require a proactive approach for evaluating the current state, developing a legacy application strategy, and executing in an agile manner. When coupled with a business case and communications strategy, the organization will have a clear decision-making framework that will maximize business outcomes and deliver value where needed.

      Ricardo de Oliveira, Research Director, Enterprise Applications

      Ricardo de Oliveira
      Research Director, Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech's Approach
      • Organizations face continual pressure to decrease time-to-market while also introducing new products and services.
      • You and your team have concerns that the existing application portfolio is not up to the task.
      • While you may understand the need for greater investment to modernize your portfolio, leadership does not appreciate what is required.
      • For well-established organizations, applications can have a long lifespan. Employees who are used to existing tools and processes often resist change.
      • Modernization plans can be substantial, but budget and resources are limited.
      • Poor documentation of legacy applications can make it challenging to know what to modernize and how to do it effectively.
      • There are concerns that any changes will have material impacts on business continuity.
      • Info-Tech will enable you to build a proposal deck to make the case for legacy application modernization for your stakeholders. This will assist with:
        • Defining what a legacy application is in the context of your organization.
        • Creating a list of candidate applications for modernization.
        • Articulating the right disposition strategy for each selected applications.
        • Laying out what is next on your modernization journey.

      Info-Tech Insight
      Legacy modernization is a process, not a single event. Your modernization approach requires you to understand your landscape and decide on a path that minimizes business continuity risks, keeps investments under control, and is prepared for surprises but always has your final state in mind.

      An approach to making the case for legacy application modernization

      Understand
      Assess the challenges, lay out the reasons, define your legacy, and prepare to remove the barriers to modernization.
      Assess
      Determine the benefits by business capability. Leverage APM foundations to select the candidate applications and prioritize.
      Legacy Application Modernization
      Define
      Use the prioritized application list to drive the next steps to modernization.

      Legacy application modernization is perceived as necessary to remain competitive

      The 2022 State CIO Survey by NASCIO shows that legacy application modernization jumped from fifth to second in state CIO priorities.

      "Be patient and also impatient. Patient because all states have a lot of legacy tech they are inheriting and government is NOT easy. But also, impatient because there is a lot to do - make your priorities clear but also find out what the CIO needs to accomplish those priorities."

      Source: NASCIO, 2022

      State CIO Priorities

      US government agencies feel pressured to deal with legacy applications

      In fiscal year 2021, the US government planned to spend over $100 billion on information technology. Most of that was to be used to operate and maintain existing systems, including legacy applications, which can be both more expensive to maintain and more vulnerable to hackers. The Government Accountability Office (GAO) identified:

      • 10 critical federal IT legacy systems
      • In operation between 8 and 51 years
      • Collectively cost $337 million per year to operate and maintain

      Source: U.S. Government Accountability Office, 2021

      Example: In banking, modern platforms are essential

      Increasing competition from fintech 73% of financial services executives perceive retail banking as being the most susceptible to fintech disruption (PwC, 2016)
      Growing number of neo-banks The International Monetary Fund (IMF) notes the fast growth of fintech in financial services is creating systemic risk to global financial stability (IMF, 2022)
      Access to data and advanced analytics Estimated global bank revenue lost due to poor data is 15% to 25% (MIT, 2017)
      Shifting client expectations/demographics 50% of Gen X, millennials, and Gen Z use a digital bank to provide their primary checking account (Finextra, 2022)
      Generational transfer of wealth It is estimated that up to US$68 trillion in wealth will be transferred from baby boomers (Forbes, 2021)

      Case Study

      Delta takes off with a modernized blend of mainframes and cloud

      INDUSTRY: Transportation
      SOURCE: CIO Magazine, 2023

      Challenge
      The airline has hundreds of applications in the process of moving to the cloud, but most main capabilities are underpinned by workloads on the mainframe and will remain so for the foreseeable future.
      Some of those workloads include travel reservation systems and crew scheduling systems - mission-critical, 24/7 applications that are never turned off.
      Solution
      Delta has shifted to a hybrid architecture, with a customer experience transformation that makes the most of the cloud's agility and the mainframe's dependability.
      Delta's foray into the cloud began about two years ago as the pandemic brought travel to a virtual halt. The airline started migrating many front-end and distributed applications to the cloud while retaining traditional back-end workloads on the mainframe.
      Results
      Hybrid infrastructures are expected to remain in complex industries such as airlines and banking, where high availability and maximum reliability are non-negotiable.
      While some CIOs are sharpening their mainframe exit strategies by opting for a steep journey to the cloud, mainframes remain ideal for certain workloads.

      Phase 1: Make the Case for Legacy Application Modernization

      Phase 1
      1.1 Understand your challenges
      1.2 Define legacy applications
      1.3 Assess your barriers
      1.4 Find the impacted capabilities
      1.5 Define candidate applications
      1.6 Now, Next, Later

      This phase will walk you through the following activities:

      • Understand your challenges with modernization
      • Define legacy applications in your context
      • Assess your barriers to modernization
      • Find the impacted capabilities and their benefits
      • Define candidate applications and dispositions

      This phase involves the following participants:

      • Application group leaders
      • Individual application owners

      Define Your Digital Business Strategy

      • Buy Link or Shortcode: {j2store}55|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $83,641 Average $ Saved
      • member rating average days saved: 26 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Your organizational digital business strategy sits on the shelf because it fails to guide implementation.
      • Your organization has difficulty adapting new technologies or rethinking their existing business models.
      • Your organization lacks a clear vision for the digital customer journey.
      • Your management team lacks a framework to rethink how your organization delivers value today, which causes annual planning to become an ideation session that lacks focus.

      Our Advice

      Critical Insight

      • Pre-pandemic digital strategies have been primarily focused on automation. However, your post-pandemic digital strategy must focus on driving resilience for growth opportunities.

      Impact and Result

      • Design a strategy that applies innovation to your business model, streamline and transform processes, and make use of technologies to enhance interactions with customers and employees.
      • Use digital for transforming non-routine cognitive activities and for derisking key elements of the value chain.
      • Create a balanced roadmap that improves digital maturity and prepares you for long-term success in a digital economy.

      Define Your Digital Business Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Digital Business Strategy Deck – A step-by-step document that walks you through how to identify top value chains and a digitally enabled growth opportunity, transform stakeholder journeys, and build a digital transformation roadmap.

      This blueprint guides you through a value-driven approach to digital transformation that allows you to identify what aspects of the business to transform, what technologies to embrace, what processes to automate, and what new business models to create. This approach to digital transformation unifies digital possibilities with your customer experiences.

      • Define Your Digital Business Strategy – Phases 1-4

      2. Digital Business Strategy Workbook – A tool to guide you in planning and prioritizing projects to build an effective digital business strategy.

      This tool guides you in planning and prioritizing projects to build an effective digital business strategy. Key activities include conducting a horizon scan, conducting a journey mapping exercise, prioritizing opportunities from a journey map, expanding opportunities into projects, and lastly, building the digital transformation roadmap using a Gantt chart visual to showcase project execution timelines.

      • Digital Strategy Workbook

      3. Digital Business Strategy Final Report Template – Use this template to capture the synthesized content from outputs of the activities.

      This deck is a visual presentation template for this blueprint. The intent is to capture the contents of the activities in a presentation PowerPoint. It uses sample data from “City of X” to demonstrate the digital business strategy.

      • Digital Business Strategy Final Report Template
      [infographic]

      Workshop: Define Your Digital Business Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Two Existing Value Chains

      The Purpose

      Understand how your organization creates value today.

      Key Benefits Achieved

      Identify opportunities for digital transformation in how you currently deliver value today.

      Activities

      1.1 Validate business context.

      1.2 Assess business ecosystem.

      1.3 Identify and prioritize value streams.

      1.4 Break down value stream into value chains.

      Outputs

      Business context

      Overview of business ecosystem

      Value streams and value chains

      2 Identify a Digitally Enabled Growth Opportunity

      The Purpose

      Leverage strategic foresight to evaluate how complex trends can evolve over time and identify opportunities to leapfrog competitors.

      Key Benefits Achieved

      Identify a leapfrog idea to sidestep competitors.

      Activities

      2.1 Conduct a horizon scan.

      2.2 Identify leapfrog ideas.

      2.3 Identify impact to existing or new value chains.

      Outputs

      One leapfrog idea

      Corresponding value chain

      3 Transform Stakeholder Journeys

      The Purpose

      Design a journey map to empathize with your customers and identify opportunities to streamline or enhance existing and new experiences.

      Key Benefits Achieved

      Identify a unified view of customer experience.

      Identify opportunities to automate non-routine cognitive tasks.

      Identify gaps in value delivery.

      Improve customer journey.

      Activities

      3.1 Identify stakeholder persona.

      3.2 Identify journey scenario.

      3.3 Conduct one journey mapping exercise.

      3.4 Identify opportunities to improve stakeholder journey.

      3.5 Break down opportunities into projects.

      Outputs

      Stakeholder persona

      Stakeholder scenario

      Journey map

      Journey-based projects

      4 Build a Digital Transformation Roadmap

      The Purpose

      Build a customer-centric digital transformation roadmap.

      Key Benefits Achieved

      Keep your team on the same page with key projects, objectives, and timelines.

      Activities

      4.1 Prioritize and categorize initiatives.

      4.2 Build roadmap.

      Outputs

      Digital goals

      Unified roadmap

      Further reading

      Define Your Digital Business Strategy

      After a major crisis, find your place in the digital economy.

      Info-Tech Research Group

      Info-Tech is a provider of best-practice IT research advisory services that make every IT leader’s job easier.

      35,000 members sharing best practices you can leverage

      Millions spent developing tools and templates annually

      Leverage direct access to over 100 analysts as an extension of your team

      Use our massive database of benchmarks and vendor assessments

      Get up to speed in a fraction of the time

      Analyst Perspective

      Build business resilience and prepare for a digital economy.

      This is a picture of Senior Research Analyst, Dana Daher

      Dana Daher
      Senior Research Analyst

      To survive one of the greatest economic downturns since the Great Depression, organizations had to accelerate their digital transformation by engaging with the Digital Economy. To sustain growth and thrive as the pandemic eases, organizations must focus their attention on building business resilience by transforming how they deliver value today.
      This requires a value-driven approach to digital transformation that is capable of identifying what aspects of the business to transform, what technologies to embrace, what processes to automate, and what new business models to create. And most importantly, it needs to unify digital possibilities with your customer experiences.
      If there was ever a time for an organization to become a digital business, it is today.

      Executive Summary

      Your Challenge

      • Your organization has difficulty adapting new technologies or rethinking the existing business models.
      • Your management lacks a framework to rethink how your organization delivers value today, which causes annual planning to become an ideation session that lacks focus.
      • There is uncertainty on how to meet evolving customer needs and how to compete in a digital economy.

      Common Obstacles

      • Your organization might approach digital transformation as if we were still in 2019, not recognizing that the pandemic resulted in a major shift to an end-to-end digital economy.
      • Your senior-most leadership thinks digital is "IT's problem" because digital is viewed synonymously with technology.
      • On the other hand, your IT team lacks the authority to make decisions without the executives’ involvement in the discussion around digital.

      Info-Tech’s Approach

      • Design a strategy that applies innovation to your business model, streamline and transform processes, and make use of technologies to enhance interactions with customers and employees.
      • Use digital for transforming non-routine cognitive activities and for de-risking key elements of the value chain.
      • Create a balanced roadmap that improves digital maturity and prepares you for long-term success in a digital economy.

      Info-Tech Insight

      After a major crisis, focus on restarting the growth engine and bolstering business resilience.

      Your digital business strategy aims to transform the business

      Digital Business Strategy

      • Looks for ways to transform the business by identifying what technologies to embrace, what processes to automate, and what new business models to create.
      • Unifies digital possibilities with your customer experiences.
      • Accountability lies with the executive leadership.
      • Must involve cross-functional participation from senior management from the different areas of the organization.

      IT Strategy

      • Aims to identify how to change, fix, or improve technology in support of the organization’s business strategy.
      • Accountability lies with the CIO.
      • Must involve IT management and gather strategic input from the business.

      Becoming a digital business

      Automate tasks to free up time for innovation.

      Business activities (tasks, procedures, and processes, etc.) are used to create, sell, buy, and deliver goods and services.

      When we convert information into a readable format used by computers, we call this digitization (e.g. converting paper into digital format). When we convert these activities into a format to be processed by a computer, we have digitalization (e.g. scheduling appointments online).

      These two processes alter how work takes place in an organization and form the foundation of the concept digital transformation.

      We maintain that digital transformation is all about becoming a “digital business” – an organization that performs more than 66% of all work activities via executable code.

      As organizations take a step closer to this optimal state, new avenues are open to identify advances to promote growth, enhance customer experiences, secure sustainability, drive operational efficiencies, and unearth potential future business ventures.

      Key Concepts:

      Digital: The representation of a physical item in a format used by computers

      Digitization: Conversion of information and processes into a digital format

      Digitalization: Conversion of information into a format to be processed by a computer

      Why transform your business?

      COVID-19 has irrefutably changed livelihoods, businesses, and the economy. During the pandemic, digital tools have acted as a lifeline, helping businesses and economies survive, and in the process, have acted as a catalyst for digital transformation.

      As organizations continue to safeguard business continuity and financial recovery, in the long term, recovery won’t be enough.

      Although many pandemic/recession recovery periods have occurred before, this next recovery period will present two first-time challenges no one has faced before. We must find ways to:

      • Recover from the COVID-19 recession.
      • Compete in a digital economy.

      To grow and thrive in this post-pandemic world, organizations must provide meaningful and lasting changes to brace for a future defined by digital technologies. – Dana Daher, Info-Tech Research Group

      We are amid an economic transformation

      What we are facing today is a paradigm shift transforming the ways in which we work, live, and relate to one another.

      In the last 60 years alone, performance and productivity have been vastly improved by IT in virtually all economic activities and sectors. And today, digital technologies continue to advance IT's contribution even further by bringing unprecedented insights into economic activities that have largely been untouched by IT.

      As technological innovation and the digitalization of products and services continue to support economic activities, a fundamental shift is occurring that is redefining how we live, work, shop, and relate to one another.

      These rapid changes are captured in a new 21st century term:

      The Digital Economy.

      90% of CEOs believe the digital economy will impact their industry. But only 25% have a plan in place. – Paul Taylor, Forbes, 2020

      Analyst Perspective

      Become a Digital Business

      this is a picture of Research Fellow, Kenneth McGee

      Kenneth McGee
      Research Fellow

      Today, the world faces two profoundly complex, mega-challenges simultaneously:

      1. Ending the COVID-19 pandemic and recession.
      2. Creating strategies for returning to business growth.

      Within the past year, healthcare professionals have searched for and found solutions that bring real hope to the belief the global pandemic/recession will soon end.

      As progress towards ending COVID-19 continues, business professionals are searching for the most effective near-term and long-term methods of restoring or exceeding the rates of growth they were enjoying prior to 2020.

      We believe developing a digital business strategy can deliver cost savings to help achieve near-term business growth while preparing an enterprise for long-term business growth by effectively competing within the digital economy of the future.

      The Digital Economy

      The digital economy refers to a concept in which all economic activity is facilitated or managed through digital technologies, data, infrastructure, services, and products (OECD, 2020).

      The digital economy captures decades of digital trends including:

      • Declining enterprise computing costs
      • Improvements in computing power and performance; unprecedent analytic capabilities
      • Rapid growth in network speeds, affordability, and geographic reach
      • High adoption rates of PCs, mobile, and other computing devices

      These trends among others have set the stage to permanently alter how buying and selling will take place within and between local, regional, national, and international economies.

      The emerging digital economy concept is so compelling that the world economists, financial experts, and others are currently investigating how they must substantially rewrite the rules governing how taxes, trade, tangible and intangible assets, and countless other financial issues will be assessed and valued in a digital economy.

      Download Info-Tech’s Digital Economy Report

      Signals of Change

      60%
      of People on Earth Use the Internet
      (DataReportal, 2021)
      20%
      of Global Retail Sales Performed via E-commerce
      (eMarketer, 2021)
      6.64T
      Global Business-to-Business
      E-commerce Market
      (Derived from The Business Research Company, 2021)
      9.6%
      of US GDP ($21.4T) accounted for by the digital economy ($2.05T)
      (Bureau of Economic Analysis, 2021)

      The digital economy captures technological developments transforming the way in which we live, work, and socialize

      Technological evolution

      this image contains a timeline of technological advances, from computers and information technology, to the digital economy of the future

      Info-Tech’s approach to digital business strategy

      A path to thrive in a digital economy.

      1. Identify top value chains to be transformed
      2. Identify a digitally enabled growth opportunity
      3. Transform stakeholder journeys
      4. Build a digital transformation roadmap

      Info-Tech Insight

      Pre-pandemic digital strategies have been primarily focused on automation. However, your post-pandemic digital strategy must focus on driving resilience for growth opportunities.

      The Info-Tech difference:

      • Understand how your organization creates value today to identify opportunities for digital transformation.
      • Leverage strategic foresight to evaluate how complex trends can evolve over time and identify opportunities to leapfrog competitors.
      • Design a journey map to empathize with your customers and identify opportunities to streamline or enhance existing and new experiences.
      • Create a balanced roadmap that improves digital maturity and prepares you for long-term success in a digital economy.

      A digital transformation starts by transforming how you deliver value today

      As digital transformation is an effort to transform how you deliver value today, it is important to understand the different value-generating activities that deliver an outcome for and from your customers.

      We do this by looking at value streams –which refer to the specific set of activities an industry player undertakes to create and capture value for and from the end consumer (and so the question to ask is, how do you make money as an organization?).

      Our approach helps you to digitally transform those value streams that generate the most value for your organization.

      Higher Education Value stream

      Recruitment → Admission → Student Enrolment → Instruction & Research → Graduation → Advancement

      Local Government Value Stream

      Sustain Land, Property, and the Environment → Facilitate Civic Engagement → Protect Local Health and Safety → Grow the Economy → Provide Regional Infrastructure

      Manufacturing Value Stream

      Design Product → Produce Product → Sell Product

      Visit Info-Tech’s Industry Coverage Research to identify your industry’s value streams

      Assess your external environment to identify new value generators

      Assessing your external environment allows you to identify trends that will have a high impact on how you deliver value today.

      Traditionally, a PESTLE analysis is used to assess the external environment. While this is a helpful tool, it is often too broad as it identifies macro trends that are not relevant to an organization's addressable market. That is because not every factor that affects the macro environment (for example, the country of operation) affects a specific organization’s industry in the same way.

      And so, instead of simply assessing the macro environment and trying to project its evolution along the PESTLE factors, we recommend to:

      • Conduct a PESTLE first and deduce, from the analysis, what are possible shifts in six characteristics of an organization’s industry, or
      • Proceed immediately with identifying evolutionary trends that impact the organization’s direct market.

      the image depicts the relationship of factors from the Macro Environment, to the Industry/Addressable Market, to the Organization. the macro environmental factors are Political; Economic; Social; Technological; Legal; and Environmental. the Industry/addressable market factors are the Customer; Talent; Regulation; technology and; Supply chain.

      Info-Tech Insight

      While PESTLE is helpful to scan the macro environment, the analysis often lacks relevance to an organization’s industry.

      An analysis of evolutionary shifts in five industry-specific characteristics would be more effective for identifying trends that impact the organization

      A Market Evolution Trend Analysis (META) identifies changes in prevailing market conditions that are directly relevant to an organization’s industry, and thus provides some critical input to the strategy design process, since these trends can bring about strategic risks or opportunities.
      Shifts in these five characteristics directly impact an organization:

      ORGANIZATION

      • Customer Expectations
      • Talent Availability
      • Regulatory System
      • Supply Chain Continuity
      • Technological Landscape

      Capture existing and new value generators through a customer journey map

      As we prioritize value streams, we break them down into value chains – that is the “string” of processes that interrelate that work.

      However, once we identify these value chains and determine what parts we wish to digitally transform, we take on the perspective of the user, as the way they interact with your products and services will be different to the view of those within the organization who implement and provide those services.

      This method allows us to build an empathetic and customer-centric lens, granting the capability to uncover challenges and potential opportunities. Here, we may define new experiences or redesign existing ones.

      This image contains an example of how a school might use a value chain and customer journey map. the value streams listed include: Recruitment; Admission; Student Enrolment; Instruction& Research; Graduation; and Advancement. the Value chain for the Instruction and Research Value stream. The value chain includes: Research; Course Creation, Delivery, and assessment. The Customer journey map for curricula delivery includes: Understanding the needs of students; Construct the course material; Deliver course material; Conduct assessment and; Upload Grades into system

      A digital transformation is not just about customer journeys but also about building business resilience

      Pre-pandemic, a digital transformation was primarily focused around improving customer experiences. Today, we are facing a paradigm shift in the way in which we capture the priorities and strategies for a digital transformation.

      As the world grows increasingly uncertain, organizations need to continue to focus on improving customer experience while simultaneously protecting their enterprise value.

      Ultimately, a digital transformation has two purposes:

      1. The classical model – whereby there is a focus on improving digital experiences.
      2. Value protection or the reduction of enterprise risk by systematically identifying how the organization delivers value and digitally transforming it to protect future cashflows and improve the overall enterprise value.
      Old Paradigm New Paradigm
      Predictable regulatory changes with incremental impact Unpredictable regulatory changes with sweeping impact
      Reluctance to use digital collaboration Wide acceptance of digital collaboration
      Varied landscape of brick-and-mortar channels Last-mile consolidation
      Customers value brand Customers value convenience/speed of fulfilment
      Intensity of talent wars depends on geography Broadened battlefields for the war for talent
      Cloud-first strategies Cloud-only strategies
      Physical assets Aggressive asset decapitalization
      Digitalization of operational processes Robotization of operational processes
      Customer experience design as an ideation mechanism Business resilience for value protection and risk reduction

      Key deliverable:

      Digital Business Strategy Presentation Template

      A highly visual and compelling presentation template that enables easy customization and executive-facing content.

      three images are depicted, which contain slides from the Digital Business Strategy presentation template, which will be available in 2022.

      *Coming in 2022

      Blueprint deliverables

      The Digital Business Strategy Workbook supports each step of this blueprint to help you accomplish your goals:

      Initiative Prioritization

      A screenshot from the Initiative Prioritization blueprint is depicted, no words are legible in the image.

      Use the weighted scorecard approach to evaluate and prioritize your opportunities and initiatives.

      Roadmap Gantt Chart

      A screenshot from the Roadmap Gantt Chart blueprint is depicted, no words are legible in the image.

      Populate your Gantt chart to visually represent your key initiative plan over the next 12 months.

      Journey Mapping Workbook

      A screenshot from the Journey Mapping Workbook blueprint is depicted, no words are legible in the image.

      Populate the journey maps to evaluate a user experience over its end-to-end journey.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 0 Phase 1 Phase 2 Phase 3 Phase 4
      Call #1:
      Discuss business context and customize your organization’s capability map.
      Call #2:
      Assess business ecosystem.
      Call #3:
      Perform horizon scanning and trends identification.
      Call #5:
      Identify stakeholder personas and scenarios.
      Call #7:
      Discuss initiative generation and inputs into roadmap.
      Call #3:
      Identify how your organization creates value.
      Call #4:
      Discuss value chain impact.
      Call #6:
      Complete journey mapping exercise.
      Call #8:
      Summarize results and plan next steps.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
      A typical GI is between 8 to 12 calls over the course of 2 to 4 months.

      Workshop Requirements

      Business Inputs

      Gather business strategy documents and find information on:

      • Business goals
      • Current transformation initiatives
      • Business capabilities to create or enhance
      • Identify top ten revenue and expense generators
      • Identify stakeholders

      Interview the following stakeholders to uncover business context information:

      • CEO
      • CIO

      Download the Business Context Discovery Tool

      Optional Diagnostic

      • Assess your digital maturity (Concierge Service)

      Visit Assess Your Digital Maturity

      Phase 1

      Identify top value chains to be transformed

      • Understand the business
      • Assess your business ecosystem
      • Identify two value chains for transformation

      This phase will walk you through the following activities:

      Understand how your organization delivers value today and identify value chains to be transformed.

      This phase involves the following participants:

      A cross-functional cohort across all levels of the organization.

      Outcomes

      • Business ecosystem
      • Existing value chains to be transformed

      Step 1.1

      Understand the business

      Activities

      • Review business documents.

      Identify top value chains to be transformed

      This step will walk you through the following activities:

      In this section you will gain an understanding of the business context for your strategy.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Business Context

      Understand the business context

      Understanding the business context is a must for all strategic initiatives. A pre-requisite to all strategic planning should be to elicit the business context from your business stakeholders.

      Inputs Document(s)/ Method Outputs
      Key stakeholders Strategy Document Stakeholders that are actively involved in, affected by or influence outcome of the organization, e.g. employers, customers, vendors.
      Vision and mission of the organization Website Strategy Document What the organization wants to achieve and how it strives to accomplish those goals.
      Business drivers CEO Interview Inputs and activities that drive the operational and financial results of the organization.
      Key targets CEO Interview Quantitative benchmarks to support strategic goals, e.g. double the enterprise EBITD, improve top-of-mind brand awareness by 15%,
      Strategic investment goals CFO Interview
      Digital Strategy
      Financial investments corresponding with strategic objectives of the organization, e.g. geographic expansion, digital investments.
      Top three value-generating lines of business Financial Document Identification of your top three value-generating products and services or lines of business.
      Goals of the organization over the next 12 months Strategy Document
      Corporate Retreat Notes
      Strategic goals to support the vision, e.g. hire 100 new sales reps, improve product management and marketing.
      Top business initiatives over the next 12 months Strategy Document
      CEO Interview
      Internal campaigns to support strategic goals, e.g. invest in sales team development, expand the product innovation team.
      Business model Strategy Document Products or services that the organization plans to sell, the identified market and customer segments, price points, channels and anticipated expenses.
      Competitive landscape Internal Research Analysis Who your typical or atypical competitors are.

      1.1 Understand the business context

      Objective: Elicit the business context with a careful review of business and strategy documents.

      1. Gather the strategy creation team and review your business context documents. This includes business strategy documents, interview notes from executive stakeholders, and other sources for uncovering the business strategy.
      2. Brainstorm in smaller groups answers to the question you were assigned:
        • What are the strengths and weaknesses of the organization?
        • What are some areas of improvement or opportunity?
        • What does it mean to have a digital business strategy?
      3. Discuss the questions above with participants and document key findings. Share with the group and work through the balanced scorecard questions to complete this exercise.
      4. Document your findings.

      Assess your digital readiness with Info-Tech’s Digital Maturity Assessment

      Input

      • Business Strategy Documents
      • Executive Stakeholder Interviews

      Output

      • Business Context Information

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Step 1.2

      Assess your business ecosystem

      Activities

      • Identify disruptors and incumbents.

      Info-Tech Insight

      Your digital business strategy cannot be formulated without a clear vision of the evolution of your industry.

      Identify top value chains to be transformed

      This step will walk you through the following activities:

      In this section, we will assess who the incumbents and disruptors are in your ecosystem and identify who your stakeholders are.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Business Ecosystem

      Assess your business ecosystem

      Understand the nature of your competition.

      Learn what your competitors are doing.

      To survive, grow, or transform in today's digital era, organizations must first have a strong pulse on their business ecosystem. Learning what your competitors are doing to grow their bottom line is key to identifying how to grow your own. Start by understanding who the key incumbents and disruptors in your industry are to identify where your industry is heading.

      Incumbents: These are established leaders in the industry that possess the largest market share. Incumbents often focus their attention to their most demanding or profitable customers and neglect the needs of those down market.

      Disruptors: Disruptors are primarily new entrants (typically startups) that possess the ability to displace the existing market, industry, or technology. Disruptors are often focused on smaller markets that the incumbents aren’t focused on. (Clayton Christenson, 1997)

      An image is shown demonstrating the relationship within an industry between incumbents, disruptors, and the organization. The incumbents are represented by two large purple circles. The disruptors are represented by 9 smaller blue circles, which represent smaller individual customer bases, but overall account for a larger portion of the industry.

      ’Disruption’ specifically refers to what happens when the incumbents are so focused on pleasing their most profitable customers that they neglect or misjudge the needs of their other segments.– Ilan Mochari, Inc., 2015

      Example Business Ecosystem Analysis

      Business Target Market & Customer Product/Service & Key Features Key Differentiators Market Positioning
      University XYZ
      • Local Students
      • Continuous Learner
      • Certificate programs
      • Associate degrees
      • Strong engineering department with access to high-quality labs
      • Strong community impact
      Affordable education with low tuition cost and access to bursaries & scholarships.
      University CDE University CDE
      • Local students
      • International students
      • Continuous learning students
      • Continuous learning offerings (weekend classes)
      • Strong engineering program
      • Strong continuous learning programs
      Outcome focused university with strong co-ops/internship programs and career placements for graduates
      University MNG
      • Local students
      • Non degree, freshman and continuous learning adults
      • Associate degrees
      • Certificate programs (IT programs)
      • Dual credit program
      • More locations/campuses
      • Greater physical presence
      • High web presence
      Nurturing university with small student population and classroom sizes. University attractive to adult learners.
      Disruptors Online Learning Company EFG
      • Full-time employees & executives– (online presence important)
      • Shorter courses
      • Full-time employees & executives– (online presence important)
      Competitive pricing with an open acceptance policy
      University JKL Online Credential Program
      • High school
      • University students
      • Adult learners
      • Micro credentials
      • Ability to acquire specific skills
      Borderless and free (or low cost) education

      1.2 Understand your business ecosystem

      Objective: Identify the incumbents and disruptors in your business ecosystem.

      1. Identify the key incumbents and disruptors in your business ecosystem.
        • Incumbents: These are established leaders in the industry that possess the largest market share.
        • Disruptors: Disruptors are primarily new entrants (startups) that possess the ability to displace the existing market, industry, or technology.
      2. Identify target market and key customers. Who are the primary beneficiaries of your products or service offerings? Your key customers are those who keep you in business, increase profits, and are impacted by your operations.
      3. Identify what their core products or services are. Assess what core problem their products solve for key customers and what key features of their solution support this.
      4. Assess what the competitors' key differentiators are. There are many differentiators that an organization can have, examples include product, brand, price, service, or channel.
      5. Identify what the organization’s value proposition is. Why do customers come to them specifically? Leverage insights from the key differentiators to derive this.
      6. Finally, assess how your organization derives value relative to your competitors.

      Input

      • Market Assessment

      Output

      • Key Incumbents and Disruptors

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Step 1.3

      Value-chain prioritization

      Activities

      • Identify and prioritize value chains for innovation.

      Identify top value chains to be transformed

      This step will walk you through the following activities:

      Identify and prioritize how your organization currently delivers value today and identify value chains to be transformed.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Prioritized Value Chains

      Determine what value the organization creates

      Identify areas for innovation.

      Value streams and value chains connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within.

      Different types of value your organization creates

      This an example of a value chain which a school would use to analyze how their organization creates value. The value streams listed include: Recruitment; Admission; Student Enrolment; Instruction& Research; Graduation; and Advancement. the Value chain for the Student enrolment stream is displayed. The value chain includes: Matriculation; Enrolment into a Program and; Unit enrolment.

      Value Streams

      A value stream refers to the specific set of activities an industry player undertakes to create and capture value for and from the end consumer.

      Value Chains

      A value chain is a ”string” of processes within a company that interrelate and work together to meet market demand. Examining the value chain of a company will reveal how it achieves competitive advantage.

      Visit Info-Tech’s Industry Coverage Research to identify value streams

      Begin with understanding your industry’s value streams

      Value Streams

      Recruitment

      • The promotion of the institution and the communication with prospective students is accommodated by the recruitment component.
      • Prospective students are categorized as domestic and international, undergraduate and graduate. Each having distinct processes.

      Admission

      • Admission into the university involves processes distinct from recruitment. Student applications are processed and evaluated and the students are informed of the decision.
      • This component is also concerned with transfer students and the approval of transfer credits.

      Student Enrolment

      • Student enrolment is concerned with matriculation when the student first enters the institution, and subsequent enrolment and scheduling of current students.
      • The component is also concerned with financial aid and the ownership of student records.

      Instruction & Research

      • Instruction involves program development, instructional delivery and assessment, and the accreditation of courses of study.
      • The research component begins with establishing policy and degree fundamentals and concerns the research through to publication and impact assessment.

      Graduation

      • Graduation is not only responsible for the ceremony but also the eligibility of the candidate for an award and the subsequent maintenance of transcripts.

      Advancement

      • Alumni relations are the first responsibility of advancement. This involves the continual engagement with former students.
      • Fundraising is the second responsibility. This includes the solicitation and stewardship of gifts from alumni and other benefactors.

      Value stream defined…

      Value streams connect business goals to the organization’s value realization activities in the marketplace. Those activities are dependent on the specific industry segment in which an organization operates.

      There are two types of value streams: core value streams and support value streams.

      • Core value streams are mostly externally facing. They deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map.
      • Support value streams are internally facing and provide the foundational support for an organization to operate.

      An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers.

      Leverage your industry’s capability maps to identify value chains

      Business Capability Map Defined

      A business capability defines what a business does to enable value creation, rather than how. Business capabilities:

      • Represent stable business functions.
      • Are unique and independent of each other.
      • Typically, will have a defined business outcome.

      A capability map is a great starting point to identify value chains within an organization as it is a strong indicator of the processes involved to deliver on the value streams.

      this image contains an example of a business capability map using the value streams identified earlier in this blueprint.

      Info-Tech Insight

      Leverage your industry reference architecture to define value streams and value chains.

      Visit Info-Tech’s Industry Coverage Research to identify value streams

      Prioritize value streams to be supported or enhanced

      Use an evaluation criteria that considers both the human and business value generators that these streams provide.

      two identical value streams are depicted. The right most value stream has Student Enrolment and Instruction Research highlighted in green. between the two streams, are two boxes. In these boxes is the following: Business Value: Profit; Enterprise Value; Brand value. Human Value: Faculty satisfaction; Student satisfaction; Community impact.

      Info-Tech Insight

      To produce maximum impact, focus on value streams that provide two-thirds of your enterprise value.

      Business Value

      Assess the value generators to the business, e.g. revenue dollars, enterprise value, cost or differentiation (competitiveness), etc.

      Human Value

      Assess the value generators to people, e.g. student/faculty satisfaction, well-being, and social cohesion.

      Identify value chains for transformation

      Value chains, pioneered by the academic Michael Porter, refer to the ”string” of processes within a company that interrelate and work together to meet market demand. An organization’s value chain is connected to the larger part of the value stream. This perspective of how value is generated encourages leaders to see each activity as a part of a series of steps required deliver value within the value stream and opens avenues to identify new opportunities for value generation.

      this image depicts two sample value chains for the value streams: student enrolment and Instruction & Research. Each value chain has a stakeholder associated with it. This is the primary stakeholder that seeks to gain value from that value chain.

      Prioritize value chains for transformation

      Once we have identified the key value chains within each value stream element, evaluate the individual processes within the value chain to identify opportunities for transformation. Evaluate the value chain processes based on the level of pain experienced by a stakeholder to accomplish that task, and the financial impact that level of the process has on the organization.

      this image depicts the same value chains as the image above, with a legend showing which steps have a financial impact, which steps have a high degree of risk, and which steps are prioritized for transformation. Matriculation and publishing are shown to have a financial impact. Research foundation is shown to have a high degree of risk, and enrollment into a program and conducting research are prioritized for transformation.

      1.3 Value chain analysis

      Objective: Determine how the organization creates value, and prioritize value chains for innovation.

      1. The first step of delivering value is defining how it will happen. Use the organization’s industry segment to start a discussion on how value is created for customers. Working back from the moment value is realized by the customer, consider the sequential steps required to deliver value in your industry segment.
      2. Define and validate the organization’s value stream. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream.
      3. Prioritize the value streams based on an evaluation criteria that reflects business and human value generators to the organization.
      4. Identify value chains that are associated with each value stream. The value chains refer to a string of processes within the value stream element. Each value chain also captures a particular stakeholder that benefits from the value chain.
      5. Once we have identified the key value chains within each value stream element, evaluate the individual processes within the value chain and identify areas for transformation. Evaluate the value chain processes based on the level of pain or exposure to risk experienced by a stakeholder to accomplish that task and the financial impact that level of the process has on the organization.

      Visit Info-Tech’s Industry Coverage Research to identify value streams and capability maps

      Input

      • Market Assessment

      Output

      • Key Incumbents and Disruptors

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Phase 2

      Identify a digitally enabled growth opportunity

      • Conduct horizon scan
      • Identify leapfrog idea
      • Conduct value chain impact analysis

      This phase will walk you through the following activities:

      Assess trends that are impacting your industry and identify strategic growth opportunities.

      This phase involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes

      Identify new growth opportunities and value chains impacted

      Phase 2.1

      Horizon scanning

      Activities

      • Scan the internal and external environment for trends.

      Info-Tech Insight

      Systematically scan your environment to identify avenues or opportunities to skip one or several stages of technological development and stay ahead of disruption.

      Identify a digitally enabled growth opportunity

      This step will walk you through the following activities:

      Scan the environment for external environment for megatrends, trends, and drivers. Prioritize trends and build a trends radar to keep track of trends within your environment.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Growth opportunity

      Horizon scanning

      Understand how your industry is evolving.

      Horizon scanning is a systematic analysis of detecting early signs of future changes or threats.

      Horizon scanning involves scanning, analyzing, and communicating changes in an organization’s environment to prepare for potential threats and opportunities. Much of what we know about the future is based around the interactions and trajectory of macro trends, trends, and drivers. These form the foundations for future intelligence.

      Macro Trends

      A macro trend captures a large-scale transformative trend that could impact your addressable market.

      Trends

      A trend captures a business use case of the macro trend. Consider trends in relation to competitors in your industry.

      Drivers

      A driver is an underlying force causing the trend to occur. There can be multiple causal forces, or drivers, that influence a trend, and multiple trends can be influenced by the same causal force.

      Identify signals of change in the present and their potential future impacts.

      Identifying macro trends

      A macro trend captures a large-scale transformative trend that could change the addressable market. Here are some examples of macro trends to consider when horizon scanning for your own organization:

      Talent Availability

      • Decentralized workforce
      • Hybrid workforce
      • Diverse workforce
      • Skills gap
      • Digital workforce
      • Multigenerational workforce

      Customer Expectations

      • Personalization
      • Digital experience
      • Data ownership
      • Transparency
      • Accessibility

      Technological Landscape

      • AI & robotics
      • Virtual world
      • Ubiquitous connectivity,
      • Genomics
      • Materials (smart, nano, bio)

      Regulatory System

      • Market control
      • Economic shifts
      • Digital regulation
      • Consumer protection
      • Global green

      Supply Chain Continuity

      • Resource scarcity
      • Sustainability
      • Supply chain digitization
      • Circular supply chains
      • Agility

      Identifying trends and drivers

      A trend captures a business use case of a macro trend. Assessing trends can reduce some uncertainties about the future and highlight potential opportunities for your organization. A driver captures the internal or external forces that lead the trend to occur. Understanding and capturing drivers is important to understanding why these trends are occurring and the potential impacts to your value chains.

      This image contains a flow chart, demonstrating the relationship between Macro trends, Trends, and Drivers. in this example, the macro trend is Accessibility. The Trends, or patterns of change, are an increase in demands for micro-credentials, and Preference for eLearning. The Drivers, or the why, are addressing skill gaps for increase in demand for micro-credentials, and Accommodating adult/working learners- for Preference for eLearning.

      Leverage industry roundtables and trend reports to understand the art of the possible

      Uncover important business and industry trends that can inform possibilities for technology innovation.

      Explore trends in areas such as:

      • Machine Learning
      • Citizen Dev 2.0
      • Venture Architecture
      • Autonomous Organizations
      • Self-Sovereign Cloud
      • Digital Sustainability

      Market research is critical in identifying factors external to your organization and identifying technology innovation that will provide a competitive edge. It’s important to evaluate the impact each trend or opportunity will have in your organization and market.

      Visit Info-Tech’s Trends & Priorities Research Center

      Visit Info-Tech’s Industry Coverage Research to identify your industry’s value streams

      this image contains three screenshots from Rethinking Higher Education Report and 2021 Tech Trends Report

      Images are from Info-Tech’s Rethinking Higher Education Report and 2021 Tech Trends Report

      Example horizon scanning activity

      Macro Trends Trends Drivers
      Talent Availability Diversity Inclusive campus culture Systemic inequities
      Hybrid workforce Online learning staff COVID-19 and access to physical institutions
      Customer Expectations Digital experience eLearning for working learners Accommodate adult learners
      Accessibility Micro-credentials for non-traditional students Addressing skills gap
      Technological Landscape Artificial intelligence and robotics AI for personalized learning Hyper personalization
      IoT IoT for monitoring equipment Asset tracking
      Augmented reality Immersive education AR and VR Personalized experiences
      Regulatory System Regulatory System Alternative funding for research Changes in federal funding
      Global Green Environmental and sustainability education curricula Regulatory and policy changes
      Supply Chain Continuity Circular supply chains Vendors recycling outdated technology Sustainability
      Cloud-based solutions Cloud-based eLearning software Convenience and accessibility

      Visit Info-Tech’s Industry Coverage Research to identify your industry’s value streams

      Prioritize trends

      Develop a cross-industry holistic view of trends.

      Visualize emerging and prioritize action.

      Moving from horizon scanning to action requires an evaluation process to determine which trends can lead to growth opportunities. First, we need to make a short list of trends to analyze. For your digital strategy, consider trends on the time horizon that are under 24 months. Next, we need to evaluate the shortlisted opportunities by a second set of criteria: relevance to your organization and impact on industry.

      Timing

      The estimated time to disruption this trend will have for your industry. Assess whether the trend will require significant developments to support its entry into the ecosystem.

      Relevance

      The relevance of the trend to your organization. Does the trend fulfil the vision or goals of the organization?

      Impact

      The degree of impact the trend will have on your industry. A trend with high impact will drive new business models, products, or services.

      Prioritize trends to adopt into your organization

      Prioritize trends based on timing, impact, and relevance.

      Trend Timing
      (S/M/L)
      Impact
      (1-5)
      Relevance
      ( 1-5)
      1. Micro-credentialing S 5 5
      2. IoT-connected devices for personalized experience S 1 3
      3. International partnerships with educational institutions M
      4. Use of chatbots throughout enrollment process L
      5. IoT for energy management of campus facilities L
      6. Gamification of digital course content M
      7. Flexible learning curricula S 4 3
      Deprioritize trends
      that have a time frame
      to disruption of more
      than 24 months.
      this image contains a graph demonstrating the relationship between relevance (x axis) and Impact (Y axis).

      2.1 Scanning the horizon

      Objective: Generate trends

      60 minutes

      • Start by selecting macro trends that are occurring in your environment using the five categories. These are the large-scale transformative trends that impact your addressable market. Macro trends have three key characteristics:
        • They span over a long period of time.
        • They impact all geographic regions.
        • They impact governments, individuals, and organizations.
      • Begin to break down these macro trends into trends. Trends should reflect the direction of a macro trend and capture the pattern in events. Consider trends that directly impact your organization.
      • Understand the drivers behind these trends. Why are they occurring? What is driving them? Understanding the drivers helps us understand the value they may generate.
      • Deprioritize trends that are expected to happen beyond 24 months.
      • Prioritize trends that have a high impact and relevance to the organization.
      • If you identify more than one trend, discuss with the group which trend you would like to pursue and limit it to one opportunity.

      Input

      • Macro Trends
      • Trends

      Output

      • Trends Prioritization

      Materials

      • Digital Strategy Workbook

      Participants

      • Executive Team

      Step 2.2

      Leapfrogging ideation

      Activities

      • Identify leapfrog ideas.
      • Identify impact to value chain.

      Info-Tech Insight

      A systematic approach to leapfrog ideation is one of the most critical ways in which an organization can build the capacity for resilient innovation.

      This step will walk you through the following activities:

      Evaluate trend opportunities and determine the strategic opportunities they pose. You will also work towards identifying the impact the trend has on your value chain.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • Strategic growth opportunities
      • Value chain impact

      Leapfrog into the future

      Turn trends into growth opportunities.

      To thrive in the digital age, organizations must innovate big, leverage internal creativity, and prepare for flexibility.

      In this digital era, organizations are often playing catch up to a rapidly evolving technological landscape and following a strict linear approach to innovation. However, this linear catch-up approach does not help companies get ahead of competitors. Instead, organizations must identify avenues to skip one or several stages of technological development to leapfrog ahead of their competitors.

      The best way to predict the future is to invent it. – Alan Kay

      Leapfrogging takes place when an organization introduces disruptive innovation into the market and sidesteps competitors who are unable to mobilize to respond to the opportunities.

      Case Study

      Classroom of the Future

      Higher Education: Barco’s Virtual Classroom at UCL

      University College London (UCL), in the United Kingdom, selected Barco weConnect virtual classroom technology for its continuing professional development medical education offering. UCL uses the platform for synchronous teaching, where remote students can interact with a lecturer.

      One of the main advantages of the system is that it enables direct interaction with students through polls, questions, and whiteboarding. The system also allows you to track student engagement in real time.

      The system has also been leveraged for scientific research and publications. In their “Delphi” process, key opinion leaders were able to collaborate in an effective way to reach consensus on a subject matter. The processes that normally takes months were successfully completed in 48 hours (McCann, 2020).

      Results

      The system has been largely successful and has supported remote, real-time teaching, two-way engagement, engagement with international staff, and an overall enriched teaching experience.

      Funnel trends into leapfrog ideas

      Go from trend insights into ideas.

      Brainstorm ways of generating leapfrog ideas from trend insights.

      Dealing with trends is one of the most important tasks for innovation. It provides the basis of developing the future orientation of the organization. However, being aware of a trend is one thing, to develop strategies for response is another.

      To identify the impact the trend has on the organization, consider the four areas of growth strategies for the organization:

      1. New Customers: Leverage the trend to target new customers for existing products or services.
      2. New Business Models: Adjust the business model to capture a change in how the organization delivers value.
      3. New Markets: Enter or create new markets by applying existing products or services to different problems.
      4. New Product or Service Offerings: Introduce new products or services to the existing market.
      A funnel shaped image is depicted. At the top, at the entrance of the funnel, is the word Trend. At the bottom of the image, at the output of the funnel, is the word Opportunity.

      From trend to leapfrog ideas

      Trend New Customer New Market New Business Model New Product or Service
      What trends pose a high-immediate impact to the organization? Target new customers for existing products or services Enter or create new markets by applying existing products or services to different problems Adjust the business model to capture a change in how the organization delivers value Introduce new products or services to the existing market
      Micro-credentials for non-traditional students Target non-traditional learners/students - Online delivery Introduce mini MBA program

      2.2 Identify and prioritize opportunities

      60 minutes

      1. Gather the prioritized trend identified in the horizon scanning exercise (the trend identified to be “adopted” within the organization).
      2. Analyze each trend identified and assess whether the trend provides an opportunity for a new customers, new markets, new business models, or new products and services.

      Input

      • “Adopt” Trends

      Output

      • Trends to pursue
      • Breakdown of strategic opportunities that the trends pose

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Step 2.3

      Value chain impact

      Activities

      • Identify impact to value chain.

      This step will walk you through the following activities:

      Evaluate trend opportunities and determine the strategic opportunities they pose. Prioritize the opportunities and identify impact to your value chain.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • Strategic growth opportunities

      Value chain analysis

      Identify implications of strategic growth opportunities to the value chains.

      As we identify and prioritize the opportunities available to us, we need to assess their impacts on value chains. Does the opportunity directly impact an existing value chain? Or does it open us to the creation of a new value chain?

      The value chain perspective allows an organization to identify how to best minimize or enhance impacts and generate value.
      As we move from opportunity to impact, it is important to break down opportunities into the relevant pieces so we can see a holistic picture of the sources of differentiation.

      this image depicts the value chain for the value stream, student enrolment.

      2.3 Value chain impact

      Objective: Identify impacts to the value chain from the opportunities identified.
      60 minutes

      1. Once you have identified the opportunity, turn back to the value stream, and with the working group, identify the value stream impacted most by the opportunity. Leverage the human impact/business impact criteria to support the identification of the value stream to be impacted.
      2. Within the value stream, brainstorm what parts of the value chain will be impacted by the new opportunity. Or ask whether this new opportunity provides you with a new value chain to be created.
      3. If this opportunity will require a new value chain, identify what set of new processes or steps will be created to support this new entrant.
      4. Identify any critical value chains that will be impacted by the new opportunity. What areas of the value chain pose the greatest risk? And where can we estimate the financial revenue will be impacted the most?

      Input

      • Opportunity

      Output

      • Value chains impacted

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Phase 3

      Transform stakeholder journeys

      • Identify stakeholder personas and scenarios
      • Conduct journey map
      • Identify projects

      This phase will walk you through the following activities:

      Take the prioritized value chains and create a journey map to capture the end-to-end experience of a stakeholder.

      Through a journey mapping exercise, you will identify opportunities to digitize parts of the journey. These opportunities will be broken down into functional initiatives to tackle in your strategy.

      This phase involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes

      1. Stakeholder persona
      2. Stakeholder scenario
      3. Stakeholder journey map
      4. Opportunities

      Step 3.1

      Identify stakeholder persona and journey scenario

      Activities

      • Identify stakeholder persona.
      • Identify stakeholder journey scenario.

      Transform stakeholder journeys

      This step will walk you through the following activities:

      In this step, you with identify stakeholder personas and scenarios relating to the prioritized value chains.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • A taxonomy of critical stakeholder journeys.

      Identify stakeholder persona and journey scenario

      From value chain to journey scenario.

      Stakeholder personas and scenarios help us build empathy towards our customers. It helps put us into the shoes of a stakeholder and relate to their experience to solve problems or understand how they experience the steps or processes required to accomplish a goal. A user persona is a valuable basis for stakeholder journey mapping.

      A stakeholder scenario describes the situation the journey map addresses. Scenarios can be real (for existing products and services) or anticipated.

      A stakeholder persona is a fictitious profile to represent a customer or a user segment. Creating this persona helps us understand who your customers really are and why they are using your service or product.

      Learn more about applying design thinking methodologies

      Identify stakeholder scenarios to map

      For your digital strategy, leverage the existing and opportunity value chains identified in phase 1 and 2 for journey mapping.

      Identify two existing value chains to be transformed.
      In section 1, we identified existing value chains to be transformed. For example, your stakeholder persona is a member of the faculty (engineering), and the scenario is the curricula design process.
      this image contains the value chains for instruction (engineering) and enrolment of engineering student. the instruction(engineering) value chain includes curricula research, curricula design, curricula delivery, and Assessment for the faculty-instructor. The enrolment of engineering student value chain includes matriculation, enrolment into a program, and unit enrolment for the student. In the instruction(engineering) value chain, curricula design is highlighted in blue. In the enrolment of engineering student value chain, Enrolment into a program is highlighted.
      Identify one new value chain.
      In section 2, we identified a new value chain. However, for a new opportunity, the scenario is more complex as it may capture many different areas of a value chain. Subsequently, a journey map for a new opportunity may require mapping all parts of the value chain.
      this image contains an example of a value chain for micro-credentialing (mini online MBA)

      Identify stakeholder persona

      Who are you transforming for?

      To define a stakeholder scenario, we need to understand who we are mapping for. In each value chain, we identified a stakeholder who gains value from that value chain. We now need to develop a stakeholder persona: a representation of the end user to gain a strong understanding of who they are, what they need, and their pains and gains.

      One of the best ways to flesh out your stakeholder persona is to engage with the stakeholders directly or to gather the input of those who may engage with them within the organization.

      For example, if we want to define a journey map for a student, we might want to gather the input of students or teaching faculty that have firsthand encounters with different student types and are able to define a common student type.

      Info-Tech Insight

      Run a survey to understand your end users and develop a stronger picture of who they are and what they are seeking to gain from your organization.

      Example Stakeholder Persona

      Name: Anne
      Age: 35
      Occupation: Engineering Faculty
      Location: Toronto, Canada

      Pains

      What are their frustrations, fears, and anxieties?

      • Time restraints
      • Using new digital tools
      • Managing a class while incorporating individual learning
      • Varying levels within the same class
      • Unmotivated students

      What do they need to do?

      What do they want to get done? How will they know they are successful?

      • Design curricula in a hybrid mode without loss of quality of experience of in-classroom learning.

      Gains

      What are their wants, needs, hopes, and dreams?

      • Interactive content for students
      • Curriculum alignment
      • Ability to run a classroom lab (in hybrid format)
      • Self-paced and self-directed learning opportunities for students

      (Adapted from Osterwalder, et al., 2014)

      Define a journey statement for mapping

      Now that we understand who we are mapping for, we need to define a journey statement to capture the stakeholder journey.
      Leverage the following format to define the journey statement.
      As a [stakeholder], I need to [prioritized value chain task], so that I can [desired result or overall goal].

      this image contains the instruction(engineering) value chain shown above. next to it is a stakeholder journey statement, which states: As an engineering faculty member, I want to design my curricula in a hybrid mode of delivery so that I can simulate in-classroom experiences.

      3.1 Identify stakeholder persona and journey scenario

      Objective: Identify stakeholder persona and journey scenario statement for journey mapping exercise.

      1. Start by identifying who your stakeholder is. Give your stakeholder a demographic profile – capture a typical stakeholder for this value chain.
      2. Identify what the gains and pains are during this value chain and what the stakeholder is seeking to accomplish.
      3. Looking at the value chain, create a statement that captures the goals and needs of the stakeholder. Use the following format to create a statement:
        As a [stakeholder], I need to [prioritized value chain task], so that I can [desired result or overall goal].

      Input

      • Prioritized Value Chains (existing and opportunity)

      Output

      • Stakeholder Persona
      • Stakeholder Journey Statement

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)
      • Stakeholder Persona Canvas

      Participants

      • Executive Team
      • Stakeholders (if possible)
      • Individual who works directly with stakeholders

      Step 3.2

      Map stakeholder journeys

      Activities

      • Map stakeholder journeys.

      Transform stakeholder journeys

      This step will walk you through the following activities:

      Prioritize the journeys by focusing on what matters most to the stakeholders and estimating the organizational effort to improve those experiences.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • Candidate journeys identified for redesign or build.

      Leverage customer journey mapping to capture value chains to be transformed

      Conduct a journey mapping exercise to identify opportunities for innovation or automation.

      A journey-based approach helps an organization understand how a stakeholder moves through a process and interacts with the organization in the form of touch points, channels, and supporting characters. By identifying pain points in the journey and the activity types, we can identify opportunities for innovation and automation along the journey.

      Embrace design thinking methodologies to elevate the stakeholder journey and to build a competitive advantage for your organization.

      this image contains an example of the result of a journey mapping exercise. the main headings are Awareness, Consideration, Acquisition, Service and, Loyalty.

      Internal vs. external stakeholder perspective

      In journey mapping, we always start with the stakeholder's perspective, then eventually transition into what the organization does business-wise to deliver value to each stakeholder. It is important to keep in mind both perspectives while conducting a journey mapping exercise as there are often different roles, processes, and technologies associated with each of the journey steps.

      Stakeholder Journey
      (External Perspective)

      • Awareness
      • Consideration
      • Selecting
      • Negotiating
      • Approving

      Business Processes
      (Internal Perspective)

      • Preparation
      • Prospecting
      • Presentation
      • Closing
      • Follow-Up

      Info-Tech Insight

      Take the perspective of an end user, who interacts with your products and services, as it is different from the view of those inside the organization, who implement and provide those services.

      Build a stakeholder journey map

      A stakeholder journey map is a tool used to illustrate the user’s perceptions, emotions, and needs as they move through a process and interact with the organization in the form of touch points, channels, and supporting characters.

      this image depicts an example of a stakeholder journey map, the headings in the map are: Journey Activity; Touch Points; Metrics; Nature of Activity; Key Moments & Pain Points; Opportunities

      Stakeholder Journey Map: Journey Activity

      The journey activity refers to the steps taken to accomplish a goal.

      The journey activity comprises the steps or sequence of tasks the stakeholder takes to accomplish their goal. These steps reflect the high-level process your candidates perform to complete a task or solve a problem.

      Stakeholder Journey Map: Touch Points

      Touch points are the points of interaction between a stakeholder and the organization.

      A touch point refers to any time a stakeholder interacts with your organization or brand. Consider three main points of interaction with the customer in the journey:

      • Before: How did they find out about you? How did they first contact you to start this journey? What channels or mediums were used?
        • Social media
        • Rating & reviews
        • Word of mouth
        • Advertising
      • During: How was the sale or service accomplished?
        • Website
        • Catalog
        • Promotions
        • Point of sale
        • Phone system
      • After: What happened after the sale or service?
        • Billing
        • Transactional emails
        • Marketing emails
        • Follow-ups
        • Thank-you emails

      Stakeholder Journey Map: Nature of Activity

      The nature of activity refers to the type of task the journey activity captures.

      We categorize the activity type to identify opportunities for automation. There are four main types of task types, which in combination (as seen in the table below) capture a task or job to be automated.

      Routine Non-Routine
      Cognitive Routine Cognitive: repeatable tasks that rely on knowledge work, e.g. sales, administration
      Prioritize for automation (2)
      Non-Routine Cognitive: infrequent tasks that rely on knowledge work, e.g. driving, fraud detection
      Prioritize for automation (3)
      Non-Routine Cognitive: infrequent tasks that rely on knowledge work, e.g. driving, fraud detection Prioritize for automation (3) Routine Manual: repeatable tasks that rely on physical work, e.g. manufacturing, production
      Prioritize for automation (1)
      Non-Routine Manual: infrequent tasks that rely on physical work, e.g. food preparation
      Not mature for automation

      Info-Tech Insight

      Where automation makes sense, routine manual activities should be transformed first, followed by routine cognitive activities. Non-routine cognitive activities are the final frontier.

      Stakeholder Journey Map: Metrics

      Metrics are a quantifiable measurement of a process, activity, or initiative.

      Metrics are crucial to justify expenses and to estimate growth for capacity planning and resourcing. There are multiple benefits to identifying and implementing metrics in a journey map:

      • Metrics provide accurate indicators for accurate IT and business decisions.
      • Metrics help you identify stakeholder touch point efficiencies and problems and solve issues before they become more serious.
      • Active metrics tracking makes root cause analysis of issues much easier.

      Example of journey mapping metrics: Cost, effort, turnaround time, throughput, net promoter score (NPS), satisfaction score

      Stakeholder Journey Map: Key Moments & Pain Points

      Key moments and pain points refer to the emotional status of a stakeholder at each stake of the customer journey.

      The key moments are defining pieces or periods in a stakeholder's experience that create a critical turning point or memory.

      The pain points are the critical problems that the stakeholder is facing during the journey or business continuity risks. Prioritize identifying pain points around key moments.

      Info-Tech Insight

      To identify key moments, look for moments that can dramatically influence the quality of the journey or end the journey prematurely. To improve the experience, analyze the hidden needs and how they are or aren’t being met.

      Stakeholder Journey Map: Opportunities

      An opportunity is an investment into people, process, or technology for the purposes of building or improving a business capability and accomplishing a specific organizational objective.

      An opportunity refers to the initiatives or projects that should address a stakeholder pain. Opportunities should also produce a demonstrable financial impact – whether direct (e.g. cost reduction) or indirect (e.g. risk mitigation) – and be evaluated based on how technically difficult it will be to implement.

      Customer

      Create new or different experiences for customers

      Workforce

      Generate new organizational skills or new ways of working

      Operations

      Improve responsiveness and resilience of operations

      Innovation

      Develop different products or services

      Example of stakeholder journey output: Higher Education

      Stakeholder: A faculty member
      Journey: As an engineering faculty member, I want to design my curricula in a hybrid mode of delivery so that I can simulate in-classroom experiences

      Journey activity Understanding the needs of students Construct the course material Deliver course material Conduct assessments Upload grades into system
      Touch Points
      • Research (primary or secondary)
      • Teaching and learning center
      • Training on tools
      • Office suite
      • Video tools
      • PowerPoint live
      • Chat (live)
      • Forum (FAQ
      • Online assessment tool
      • ERP
      • LMS
      Nature of Activity Non-routine cognitive Non-routine cognitive Non-routine cognitive Routine cognitive Routine Manual
      Metrics
      • Time to completion
      • Time to completion
      • Student satisfaction
      • Student satisfaction
      • Student scores
      Ken Moments & Pain Points Lack of centralized repository for research knowledge
      • Too many tools to use
      • Lack of Wi-Fi connectivity for students
      • Loss of social aspects
      • Adjusting to new forms of assessments
      No existing critical pain points; process already automated
      Opportunities
      • Centralized repository for research knowledge
      • Rationalize course creation tool set
      • Connectivity self-assessment/checklist
      • Forums for students
      • Implement an online proctoring tool

      3.2 Stakeholder journey mapping

      Objective: Conduct journey mapping exercise for existing value chains and for opportunities.

      1. Gather the working group and, with the journey mapping workbook, begin to map out the journey scenario statements identified in the value chain analysis. In total, there should be three journey maps:
        • Two for the existing value chains. Map out the specific point in the value chain that is to be transformed.
        • One for the opportunity value chain. Map out all parts of the value chain to be impacted by the new opportunity.
      2. Start with the journey activity and map out the steps involved to accomplish the goal of the stakeholder.
      3. Identify the touch points involved in the value chain.
      4. Categorize the nature of the activity in the journey activity.
      5. Identify metrics for the journey. How can we measure the success of the journey?
      6. Identify pain points and opportunities in parallel with one another.

      Input

      • Value Chain Analysis
      • Stakeholder Personas
      • Journey Mapping Scenario

      Output

      • Journey Map

      Materials

      • Digital Strategy Workbook, Stakeholder Journey tab

      Participants

      • Executives
      • Individuals in the organization that have a direct interaction with the stakeholders

      Info-Tech Insight

      Aim to build out 90% of the stakeholder journey map with the working team; validate the last 10% with the stakeholder themselves.

      Step 3.3

      Prioritize opportunities

      Activities

      • Prioritize opportunities.

      Transform stakeholder journeys

      This step will walk you through the following activities:

      Prioritize the opportunities that arose from the stakeholder journey mapping exercise.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Prioritized opportunities

      Prioritization of opportunities

      Leverage design-thinking methods to prioritize opportunities.

      As there may be many opportunities arising from the journey map, we need to prioritize ideas to identify which ones we can tackle first – or at all. Leverage IDEO’s design-thinking “three lenses of innovation” to support prioritization:

      • Feasibility: Do you currently have the capabilities to deliver on this opportunity? Do we have the right partners, resources, or technology?
      • Desirability: Is this a solution the stakeholder needs? Does it solve a known pain point?
      • Viability: Does this initiative have an impact on the financial revenue of the organization? Is it a profitable solution that will support the business model? Will this opportunity require a complex cost structure?
      Opportunities Feasibility
      (L/M/H)
      Desirability
      (L/M/H)
      Viability
      (L/M/H)
      Centralized repository for research knowledge H H H
      Rationalize course creation tool set H H H
      Connectivity self-assessment/ checklist H M H
      Forums for students M H H
      Exam preparation (e.g. education or practice exams) H H H

      3.3 Prioritization of opportunities

      Objective: Prioritize opportunities for creating a roadmap.

      1. Gather the opportunities identified in the journey mapping exercise
      2. Assess the opportunities based on IDEO’s three lenses of innovation:
        • Feasibility: Do you currently have the capabilities to deliver on this opportunity? Do we have the right partners, resources, or technology?
        • Viability: Does this initiative have an impact on the financial revenue of the organization? Is it a profitable solution that will support the business model? Will this opportunity require a complex cost structure?
        • Desirability: Is this a solution the stakeholder needs? Does it solve a known pain point?
      3. Opportunities that score high in all three areas are prioritized for the roadmap.

      Input

      • Opportunities From Journey Map

      Output

      • Prioritized Opportunities

      Materials

      • Digital Strategy Workbook

      Participants

      • Executives

      Step 3.4

      Define digital goals

      Activities

      Transform stakeholder journeys

      This step will walk you through the following activities:

      Define a digital goal as it relates to the prioritized opportunities and the stakeholder journey map.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Digital goals

      Define digital goals

      What digital goals can be derived from the stakeholder journey?

      With the prioritized set of opportunities for each stakeholder journey, take a step back and assess what the sum of these opportunities mean for the journey. What is the overall goal or objective of these opportunities? How do these opportunities change or facilitate the journey experience? From here, identify a single goal statement for each stakeholder journey.

      Stakeholder Scenario Prioritized Opportunities Goal
      Faculty (Engineering) As a faculty (Engineering), I want to prepare and teach my course in a hybrid mode of delivery Centralized repository for research knowledge
      Rationalized course creation tool set
      Support hybrid course curricula development through value-driven toolsets and centralized knowledge

      3.4 Define digital goals

      Objective: Identify digital goals derived from the journey statements.

      1. With the prioritized set of opportunities for each stakeholder journey (the two existing journeys and one opportunity journey) take a step back and assess what the sum of these opportunities means for each journey.
        • What is the overall goal or objective of these opportunities?
        • How do these opportunities change or facilitate the journey experience?
      2. From here, identify a single goal for each stakeholder journey.

      Input

      • Opportunities From Journey Map
      • Stakeholder Persona

      Output

      • Digital Goals

      Materials

      • Prioritization Matrix

      Participants

      • Executives

      Step 3.5

      Breakdown opportunities into series of initiatives

      Activities

      • Identify initiatives from the opportunities.

      Transform stakeholder journeys

      This step will walk you through the following activities:

      Identify people, process, and technology initiatives for the opportunities identified.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • People, process, and technology initiatives

      Break down opportunities into a series of initiatives

      Brainstorm initiatives for each high-priority opportunity using the framework below. Describe each initiative as a plan or action to take to solve the problem.

      Opportunity → Initiatives:

      People: What initiatives are required to manage people, data, and other organizational factors that are impacted by this opportunity?

      Process: What processes must be created, changed, or removed based on the data?

      Technology: What systems are required to support this opportunity?

      Break down opportunities into a series of initiatives

      Initiatives
      Centralized repository for research knowledge Technology Acquire and implement knowledge management application
      People Train researchers on functionality
      Process Periodically review and validate data entries into repository
      Initiatives
      Rationalize course creation toolset Technology Retire duplicate or under-used tools
      People Provide training on tool types and align to user needs
      Process Catalog software applications and tools across the organization
      Identify under-used or duplicate tools/applications

      Info-Tech Insight

      Ruthlessly evaluate if a initiative should stand alone or if it can be rolled up with another. Fewer initiatives or opportunities increases focus and alignment, allowing for better communication.

      3.5 Break down opportunities into initiatives

      Objective: Break down opportunities into people, process, and technology initiatives.

      1. Split into groups and identify initiatives required to deliver on each opportunity. Document each initiative on sticky notes.
      2. Have each team answer the following questions to identify initiatives for the prioritized opportunities:
        • People: What initiatives are required to manage people, data, and other organizational factors that are impacted by this opportunity?
        • Process: What processes must be created, changed, or removed based on the data?
        • Technology: What systems are required to support this opportunity?
      3. Document findings in the Digital Strategy Workbook.

      Input

      • Opportunities

      Output

      • Opportunity initiatives categorized by people, process and technology

      Materials

      • Digital Strategy Workbook

      Participants

      • Executive team

      Phase 4

      Build a digital transformation roadmap

      • Detail initiatives
      • Build a unified roadmap roadmap

      This phase will walk you through the following activities:

      Build a digital transformation roadmap that captures people, process, and technology initiatives.

      This phase involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes

      • Digital transformation roadmap

      Step 4.1

      Detail initiatives

      Activities

      • Detail initiatives.

      Build a digital transformation roadmap

      This step will walk you through the following activities:

      Detail initiatives for each priority initiative on your horizon.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • A roadmap for your digital business strategy.

      Create initiative profiles for each high-priority initiative on your strategy

      this image contains a screenshot of an example initiative profile

      Step 4.2

      Build a roadmap

      Activities

      • Create a roadmap of initiatives.

      Build a digital transformation roadmap

      Info-Tech Insight

      A roadmap that balances growth opportunities with business resilience will transform your organization for long-term success in the digital economy.

      This step will walk you through the following activities:

      Identify timing of initiatives and build a Gantt chart roadmap.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • A roadmap for your digital transformation and the journey canvases for each of the prioritized journeys.

      Build a roadmap to visualize your key initiative plan

      Visual representations of data are more compelling than text alone.

      Develop a high-level document that travels with the initiative from inception through executive inquiry, project management, and finally execution.

      A initiative needs to be discrete: able to be conceptualized and discussed as an independent item. Each initiative must have three characteristics:

      • Specific outcome: Describe an explicit change in the people, processes, or technology of the enterprise.
      • Target end date: When the described outcome will be in effect.
      • Owner: Who on the IT team is responsible for executing on the initiative.
      this image contains screenshots of a sample roadmap for supporting hybrid course curricula development through value-driven toolsets and centralized knowledge.

      4.2 Build your roadmap (30 minutes)

      1. For the Gantt chart:
        • Input the Roadmap Start Year date.
        • Change the months and year in the Gantt chart to reflect the same roadmap start year.
        • Populate the planned start and planned end date for the pre-populated list of high-priority initiatives in each category (people, process, and technology).

      Input

      • Initiatives
      • Initiative start & end dates
      • Initiative category

      Output

      • Digital strategy roadmap visual

      Materials

      • Digital Strategy Workbook

      Participants

      • Senior Executive

      Learn more about project portfolio management strategy

      Step 4.3

      Create a refresh strategy

      Activities

      • Refresh your strategy.

      Build a digital transformation roadmap

      Info-Tech Insight

      A digital strategy is a design process, it must be revisited to pressure test and account for changes in the external environment.

      This step will walk you through the following activities:

      Detail a refresh strategy.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • Refresh strategy

      Create a refresh strategy

      It is important to dedicate time to your strategy throughout the year. Create a refresh plan to assess for the changing business context and its impact on the digital business strategy. Make sure the regular planning cycle is not the primary trigger for strategy review. Put a process in place to review the strategy and make your organization proactive. Start by examining the changes to the business context and how the effect would trickle downwards. It’s typical for organizations to build a refresh strategy around budget season and hold planning and touch points to accommodate budget approval time.
      Example:

      this image contains an example of a refresh strategy.

      4.3 Create a refresh strategy (30 minutes)

      1. Work with the digital strategy creation team to identify the time frequencies the organization should consider to refresh the digital business strategy. Time frequencies can also be events that trigger a review (i.e. changing business goals). Record the different time frequencies in the Refresh of the Digital Business Strategy slide of the section.
      2. Discuss with the team the different audience members for each time frequency and the scope of the refresh. The scope represents what areas of the digital business strategy need to be re-examined and possibly changed.

      Example:

      Frequency Audience Scope Date
      Annually Executive Leadership Resurvey, review/ validate, update schedule Pre-budget
      Touch Point Executive Leadership Status update, risks/ constraints, priorities Oct 2021
      Every Year (Re-build) Executive Leadership Full planning Jan 2022

      Input

      • Digital Business Strategy

      Output

      • Refresh Strategy

      Materials

      • Digital Business Strategy Presentation Template
      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Leaders

      Related Info-Tech Research

      Design a Customer-Centric Digital Operating Model

      Design a Customer-Centric Digital Operating Model

      Establish a new way of working to deliver value on your digital transformation initiatives.

      Develop a Project Portfolio Management Strategy

      Develop a Project Portfolio Management Strategy

      Drive project throughput by throttling resource capacity.

      Adopt Design Thinking in Your Organization

      Adopt Design Thinking in Your Organization

      Innovation needs design thinking.

      Digital Maturity Improvement Service

      Digital Maturity Improvement Service

      Prepare your organization for digital transformation – or risk falling behind.

      Research Contributors and Experts

      Kenneth McGee

      this is a picture of Research Fellow, Kenneth McGee

      Research Fellow
      Info-Tech Research Group

      Kenneth McGee is a Research Fellow within the CIO practice at Info-Tech Research Group and is focused on IT business and financial management issues, including IT Strategy, IT Budgets and Cost Management, Mergers & Acquisitions (M&A), and Digital Transformation. He also has extensive experience developing radical IT cost reduction and return-to-growth initiatives during and following financial recessions.

      Ken works with CIOs and IT leaders to help establish twenty-first-century IT organizational charters, structures, and responsibilities. Activities include IT organizational design, IT budget creation, chargeback, IT strategy formulation, and determining the business value derived from IT solutions. Ken’s research has specialized in conducting interviews with CEOs of some of the world’s largest corporations. He has also interviewed a US Cabinet member and IT executives at the White

      House. He has been a frequent keynote speaker at industry conventions, client sales kick-off meetings, and IT offsite planning sessions.

      Ken obtained a BA in Cultural Anthropology from Dowling College, Oakdale, NY, and has pursued graduate studies at Polytechnic Institute (now part of NYU University). He has been an adjunct instructor at State University of New York, Westchester Community College.

      Jack Hakimian

      this is a picture of Vice President of the Info-Tech Research Group, Jack Hakimian

      Vice President
      Info-Tech Research Group

      Jack has more than 25 years of technology and management consulting experience. He has served multi-billion dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served a number of large public sector institutions.

      Prior to joining the Info-Tech Research Group, he worked for leading consulting players such as Accenture, Deloitte, EY, and IBM.

      Jack led digital business strategy engagements as well as corporate strategy and M&A advisory services for clients across North America, Europe, the Middle East, and Africa. He is a seasoned technology consultant who has developed IT strategies and technology roadmaps, led large business transformations, established data governance programs, and managed the deployment of mission-critical CRM and ERP applications.

      He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master’s degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.

      Bibliography

      Abrams, Karin von. “Global Ecommerce Forecast 2021.” eMarketer, Insider Intelligence, 7 July 2021. Web.

      Christenson, Clayton. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business School, 1997. Book.

      Drucker, Peter F., and Joseph A. Maciariello. Innovation and Entrepreneurship. Routledge, 2015.

      Eagar, Rick, David Boulton, and Camille Demyttenaere. “The Trends in Megatrends.” Arthur D Little, Prism, no. 2, 2014. Web.

      Enright, Sara, and Allison Taylor. “The Future of Stakeholder Engagement.” The Business of a Better World, October 2016. Web.

      Hatem, Louise, Daniel Ker, and John Mitchell. “A roadmap toward a common framework for measuring the digital economy.” Report for the G20 Digital Economy Task Force, OECD, 2020. Web.

      Kemp, Simon. “Digital 2021 April Statshot Report.” DataReportal, Global Digital Insights, 21 Apr. 2021. Web.

      Larson, Chris. “Disruptive Innovation Theory: 4 Key Concepts.” Business Insights, Harvard Business School, HBS Online, 15 Nov. 2016. Web.

      McCann, Leah. “Barco's Virtual Classroom at UCL: A Case Study for the Future of All University Classrooms?” rAVe, 2 July 2020. Web.

      Mochari, Ilan. “The Startup Buzzword Almost Everyone Uses Incorrectly.” Inc., 19 Nov. 2015. Web.

      Osterwalder, Alexander, et al. Value Proposition Design. Wiley, 2014.

      Reed, Laura. “Artificial Intelligence: Is Your Job at Risk?” Science Node, 9 August 2017.

      Rodeck, David. “Alphabet Soup: Understanding the Shape of a Covid-19 Recession.” Forbes, 8 June 2020. Web.

      Tapscott, Don. Wikinomics. Atlantic Books, 2014.

      Taylor, Paul. “Don't Be A Dodo: Adapt to the Digital Economy.” Forbes, 27 Aug. 2015. Web.

      The Business Research Company. "Wholesale Global Market Report 2021: COVID-19 Impact and Recovery to 2030." Research and Markets, January 2021. Press Release.

      “Topic 1: Megatrends and Trends.” BeFore, 11 October 2018.

      “Updated Digital Economy Estimates – June 2021.” Bureau of Economic Analysis, June 2021. Web.

      Williamson, J. N. The Leader Manager. John Wiley & Sons, 1984.

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud

      • Buy Link or Shortcode: {j2store}472|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy
      • The organization is planning to move resources to cloud or devise a networking strategy for their existing cloud infrastructure to harness value from cloud.
      • The right topology needs to be selected to deploy network level isolation, design the cloud for management efficiencies and provide access to shared services on cloud.
      • A perennial challenge for infrastructure on cloud is planning for governance vs flexibility which is often overlooked.

      Our Advice

      Critical Insight

      Don’t wait until the necessity arises to evaluate your networking in the cloud. Get ahead of the curve and choose the topology that optimizes benefits and supports organizational needs in the present and the future.

      Impact and Result

      • Define organizational needs and understand the pros and cons of cloud network topologies to strategize for the networking design.
      • Consider the layered complexities of addressing the governance vs. flexibility spectrum for your domains when designing your networks.

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Deck – A document to guide you through designing your network in the cloud.

      What cloud networking topology should you use? How do you provide access to shared resources in the cloud or hybrid infrastructure? What sits in the hub and what sits in the spoke?

      • Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Storyboard
      [infographic]

      Further reading

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud

      Don't revolve around a legacy design; choose a network design that evolves with the organization.

      Analyst Perspective

      Cloud adoption among organizations increases gradually across both the number of services used and the amount those services are used. However, network builders tend to overlook the vulnerabilities of network topologies, which leads to complications down the road, especially since the structures of cloud network topologies are not all of the same quality. A network design that suits current needs may not be the best solution for the future state of the organization.

      Even if on-prem network strategies were retained for ease of migration, it is important to evaluate and identify the cloud network topology that can not only elevate the performance of your infrastructure in the cloud, but also that can make it easier to manage and provision resources.

      An "as the need arises" strategy will not work efficiently since changing network designs will change the way data travels within your network, which will then need to be adopted to existing application architectures. This becomes more complicated as the number of services hosted in the cloud grows.

      Keep a network strategy in place early on and start designing your infrastructure accordingly. This gives you more control over your networks and eliminates the need for huge changes to your infrastructure down the road.

      This is a picture of Nitin Mukesh

      Nitin Mukesh
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The organization is planning to move resources to the cloud or devise a networking strategy for their existing cloud infrastructure to harness value from the cloud.

      The right topology needs to be selected to deploy network level isolation, design the cloud for management efficiencies, and provide access to shared services in the cloud.

      A perennial challenge for infrastructure in the cloud is planning for governance vs. flexibility, which is often overlooked.

      Common Obstacles

      The choice of migration method may result in retaining existing networking patterns and only making changes when the need arises.

      Networking in the cloud is still new, and organizations new to the cloud may not be aware of the cloud network designs they can consider for their business needs.

      Info-Tech's Approach

      Define organizational needs and understand the pros and cons of cloud network topologies to strategize for the networking design.

      Consider the layered complexities of addressing the governance vs. flexibility spectrum for your domains when designing your networks.

      Insight Summary

      Don't wait until the necessity arises to evaluate your networking in the cloud. Get ahead of the curve and choose the topology that optimizes benefits and supports organizational needs in the present and future.

      Your challenge

      Selecting the right topology: Many organizations migrate to the cloud retaining a mesh networking topology from their on-prem design, or they choose to implement the mesh design leveraging peering technologies in the cloud without a strategy in place for when business needs change. While there may be many network topologies for on-prem infrastructure, the network design team may not be aware of the best approach in cloud platforms for their requirements, or a cloud networking strategy may even go overlooked during the migration.

      Finding the right cloud networking infrastructure for:

      • Management efficiencies
      • Network-level isolation of resources
      • Access to shared services

      Deciding between governance and flexibility in networking design: In the hub and spoke model, if a domain is in the hub, the greater the governance over it, and if it sits in the spoke, the higher the flexibility. Having a strategy for the most important domains is key. For example, some security belongs in the hub and some security belongs in the spoke. The tradeoff here is if it sits completely in the spoke, you give it a lot of freedom, but it becomes harder to standardize across the organization.

      Mesh network topology

      A mesh is a design where virtual private clouds (VPCs) are connected to each other individually creating a mesh network. The network traffic is fast and can be redirected since the nodes in the network are interconnected. There is no hierarchical relationship between the networks, and any two networks can connect with each other directly.

      In the cloud, this design can be implemented by setting up peering connections between any two VPCs. These VPCs can also be set up to communicate with each other internally through the cloud service provider's network without having to route the traffic via the internet.

      While this topology offers high redundancy, the number of connections grows tremendously as more networks are added, making it harder to scale a network using a mesh topology.

      Mesh Network on AWS

      This is an image of a Mesh Network on AWS

      Source: AWS, 2018

      Constraints

      The disadvantages of peering VPCs into a mesh quickly arise with:

      • Transitive connections: Transitive connections are not supported in the cloud, unlike with on-prem networking. This means that if there are two networks that need to communicate, a single peering link can be set up between them. However, if there are more than two networks and they all need to communicate, they should all be connected to each other with separate individual connections.
      • Cost of operation: The lack of transitive routing requires many connections to be set up, which adds up to a more expensive topology to operate as the number of networks grows. Cloud providers also usually limit the number of peering networks that can be set up, and this limit can be hit with as few as 100 networks.
      • Management: Mesh tends to be very complicated to set up, owing to the large number of different peering links that need to be established. While this may be manageable for small organizations with small operations, for larger organizations with robust cybersecurity practices that require multiple VPCs to be deployed and interconnected for communications, mesh opens you up to multiple points of failure.
      • Redundancy: With multiple points of failure already being a major drawback of this design, you also cannot have more than one peered connection between any two networks at the same time. This makes designing your networking systems for redundancy that much more challenging.
      Number of virtual networks 10 20 50 100
      Peering links required
      [(n-1)*n]/2
      45 190 1225 4950

      Proportional relationship of virtual networks to required peering links in a mesh topology

      Case study

      INDUSTRY: Blockchain
      SOURCE: Microsoft

      An organization with four members wants to deploy a blockchain in the cloud, with each member running their own virtual network. With only four members on the team, a mesh network can be created in the cloud with each of their networks being connected to each other, adding up to a total of 12 peering connections (four members with three connections each). While the members may all be using different cloud accounts, setting up connections between them will still be possible.

      The organization wants to expand to 15 members within the next year, with each new member being connected with their separate virtual networks. Once grown, the organization will have a total of 210 peering connections since each of the virtual networks will then need 14 peering connections. While this may still be possible to deploy, the number of connections makes it harder to manage and would be that much more difficult to deploy if the organization grows to even 30 or 40 members. The new scale of virtual connections calls for an alternative networking strategy that cloud providers offer – the hub and spoke topology.

      This is an image of the connections involved in a mesh network with four participants.

      Source: Microsoft, 2017

      Hub and spoke network topology

      In hub and spoke network design, each network is connected to a central network that facilitates intercommunication between the networks. The central network, also called the hub, can be used by multiple workloads/servers/services for hosting services and for managing external connectivity. Other networks connected to the hub through network peering are called spokes and host workloads.

      Communications between the workloads/servers/services on spokes pass in or out of the hub where they are inspected and routed. The spokes can also be centrally managed from the hub with IT rules and processes.

      A hub and spoke design enable a larger number of virtual networks to be interconnected as each network only needs one peered connection (to the hub) to be able to communicate with any other network in the system.

      Hub and Spoke Network on AWS

      This is an image of the Hub and Spoke Network on AWS

      What hub and spoke networks do better

      1. Ease of connectivity: Hub and spoke decreases the liabilities of scale that come from a growing business by providing a consistent connection that can be scaled easily. As more networks are added to an organization, each will only need to be connected once – to the hub. The number of connections is considerably lower than in a mesh topology and makes it easier to maintain and manage.
      2. Business agility and scalability: It is easier to increase the number of networks than in mesh, making it easier to grow your business into new channels with less time, investment, and risk.
      3. Data collection: With a hub and spoke design, all data flows through the hub – depending on the design, this includes all ingress and egress to and from the system. This makes it an excellent central network to collect all business data.
      4. Network-level isolation: Hub and spoke enables separation of workloads and tiers into different networks. This is particularly useful to ensure an issue affecting a network or a workload does not affect the rest.
      5. Network changes: Changes to a separated network are much easier to carry out knowing the changes made will not affect all the other connected networks. This reduces work-hours significantly when systems or applications need to be altered.
      6. Compliance: Compliance requirements such as SOC 1 and SOC 2 require separate environments for production, development, and testing, which can be done in a hub and spoke model without having to re-create security controls for all networks.

      Hub and spoke constraints

      While there are plenty of benefits to using this topology, there are still a few notable disadvantages with the design.

      Point-to-point peering

      The total number of total peered connections required might be lower than mesh, but the cost of running independent projects is cheaper on mesh as point-to-point data transfers are cheaper.

      Global access speeds with a monolithic design

      With global organizations, implementing a single monolithic hub network for network ingress and egress will slow down access to cloud services that users will require. A distributed network will ramp up the speeds for its users to access these services.

      Costs for a resilient design

      Connectivity between the spokes can fail if the hub site dies or faces major disruptions. While there are redundancy plans for cloud networks, it will be an additional cost to plan and build an environment for it.

      Leverage the hub and spoke strategy for:

      Providing access to shared services: Hub and spoke can be used to give workloads that are deployed on different networks access to shared services by placing the shared service in the hub. For example, DNS servers can be placed in the hub network, and production or host networks can be connected to the hub to access it, or if the central network is set up to host Active Directory services, then servers in other networks can act as spokes and have full access to the central VPC to send requests. This is also a great way to separate workloads that do not need to communicate with each other but all need access to the same services.

      Adding new locations: An expanding organization that needs to add additional global or domestic locations can leverage hub and spoke to connect new network locations to the main system without the need for multiple connections.

      Cost savings: Apart from having fewer connections than mesh that can save costs in the cloud, hub and spoke can also be used to centralize services such as DNS and NAT to be managed in one location rather than having to individually deploy in each network. This can bring down management efforts and costs considerably.

      Centralized security: Enterprises can deploy a center of excellence on the hub for security, and the spokes connected to it can leverage a higher level of security and increase resilience. It will also be easier to control and manage network policies and networking resources from the hub.

      Network management: Since each spoke is peered only once to the hub, detecting connectivity problems or other network issues is made simpler in hub and spoke than on mesh. A network manager deployed on the cloud can give access to network problems faster than on other topologies.

      Hub and spoke – mesh hybrid

      The advantages of using a hub and spoke model far exceed those of using a mesh topology in the cloud and go to show why most organizations ultimately end up using the hub and spoke as their networking strategy.

      However, organizations, especially large ones, are complex entities, and choosing only one model may not serve all business needs. In such cases, a hybrid approach may be the best strategy. The following slides will demonstrate the advantages and use cases for mesh, however limited they might be.

      Where it can be useful:

      An organization can have multiple network topologies where system X is a mesh and system Y is a hub and spoke. A shared system Z can be a part of both systems depending on the needs.

      An organization can have multiple networks interconnected in a mesh and some of the networks in the mesh can be a hub for a hub-spoke network. For example, a business unit that works on data analysis can deploy their services in a spoke that is connected to a central hub that can host shared services such as Active Directory or NAT. The central hub can then be connected to a regional on-prem network where data and other shared services can be hosted.

      Hub and spoke – mesh hybrid network on AWS

      This is an image of the Hub and spoke – mesh hybrid network on AWS

      Why mesh can still be useful

      Benefits Of Mesh

      Use Cases For Mesh

      Security: Setting up a peering connection between two VPCs comes with the benefit of improving security since the connection can be private between the networks and can isolate public traffic from the internet. The traffic between the networks never has to leave the cloud provider's network, which helps reduce a class of risks.

      Reduced network costs: Since the peered networks communicate internally through the cloud's internal networks, the data transfer costs are typically cheaper than over the public internet.

      Communication speed: Improved network latency is a key benefit from using mesh because the peered traffic does not have to go over the public internet but rather the internal network. The network traffic between the connections can also be quickly redirected as needed.

      Higher flexibility for backend services: Mesh networks can be desirable for back-end services if egress traffic needs to be blocked to the public internet from the deployed services/servers. This also helps avoid having to set up public IP or network address translation (NAT) configurations.

      Connecting two or more networks for full access to resources: For example, consider an organization that has separate networks for each department, which don't all need to communicate with each other. Here, a peering network can be set up only between the networks that need to communicate with full or partial access to each other such as finance to HR or accounting to IT.

      Specific security or compliance need: Mesh or VPC peering can also come in handy to serve specific security needs or logging needs that require using a network to connect to other networks directly and in private. For example, global organizations that face regulatory requirements of storing or transferring data domestically with private connections.

      Systems with very few networks that do not need internet access: Workloads deployed in networks that need to communicate with each other but do not require internet access or network address translation (NAT) can be connected using mesh especially when there are security reasons to keep them from being connected to the main system, e.g. backend services such as testing environments, labs, or sandboxes can leverage this design.

      Designing for governance vs. flexibility in hub and spoke

      Governance and flexibility in managing resources in the cloud are inversely proportional: The higher the governance, the less freedom you have to innovate.

      The complexities of designing an organization's networks grow with the organization as it becomes global and takes on more services and lines of business. Organizations that choose to deploy the hub and spoke model face a dilemma in choosing between governance and flexibility for their networks. Organizations need to find that sweet spot to find the right balance between how much they want to govern their systems, mainly for security- and cost-monitoring, and how much flexibility they want to provide for innovation and other operations, since the two usually tend to have an inverse relationship.

      This decision in hub and spoke usually means that the domains chosen for higher governance must be placed in the hub network, and the domains that need more flexibility in a spoke. The key variables in the following slide will help determine the placement of the domain and will depend entirely on the organization's context.

      The two networking patterns in the cloud have layered complexities that need to be systematically addressed.

      Designing for governance vs. flexibility in hub and spoke

      If a network has more flexibility in all or most of these domains, it may be a good candidate for a spoke-heavy design; otherwise, it may be better designed in a hub-centric pattern.

      • Function: The function the domain network is assigned to and the autonomy the function needs to be successful. For example, software R&D usually requires high flexibility to be successful.
      • Regulations: The extent of independence from both internal and external regulatory constraints the domain has. For example, a treasury reporting domain typically has high internal and external regulations to adhere to.
      • Human resources: The freedom a domain has to hire and manage its resources to perform its function. For example, production facilities in a huge organization have the freedom to manage their own resources.
      • Operations: The freedom a domain has to control its operations and manage its own spending to perform its functions. For example, governments usually have different departments and agencies, each with its own budget to perform its functions.
      • Technology: The independence and the ability a domain has to manage its selection and implementation of technology resources in the cloud. For example, you may not want a software testing team to have complete autonomy to deploy resources.

      Optimal placement of services between the hub and spoke

      Shared services and vendor management

      Resources that are shared between multiple projects or departments or even by the entire organization should be hosted on the hub network to simplify sharing these services. For example, e-learning applications that may be used by multiple business units to train their teams, Active Directory accessed by most teams, or even SAAS platforms such as O365 and Salesforce can leverage buying power and drive down the costs for the organization. Shared services should also be standardized across the organization and for that, it needs to have high governance.

      Services that are an individual need for a network and have no preexisting relationship with other networks or buying power and scale can be hosted in a spoke network. For example, specialized accounting software used exclusively by the accounting team or design software used by a single team. Although the services are still a part of the wider network, it helps separate duties from the shared services network and provides flexibility to the teams to customize and manage their services to suit their individual needs.

      Network egress and interaction

      Network connections, be they in the cloud or hybrid-cloud, are used by everyone to either connect to the internet, access cloud services, or access the organization's data center. Since this is a shared service, a centralized networking account must be placed in the hub for greater governance. Interactions between the spokes in a hub and spoke model happens through the hub, and providing internet access to the spokes through the hub can help leverage cost benefits in the cloud. The network account will perform routing duties between the spokes, on-prem assets, and egress out to the internet.

      For example, NAT gateways in the cloud that are managed services are usually charged by the hour, and deploying NAT on each spoke can be harder to manage and expensive to maintain. A NAT gateway deployed in a central networking hub can be accessed by all spokes, so centralizing it is a great option.

      Note that, in some cases, when using edge locations for data transfers, it may be cost effective to deploy a NAT in the spoke, but such cases usually do not apply to most organizational units.

      A centralized network hub can also be useful to configure network policies and network resources while organizational departments can configure non-network resources, which helps separate responsibilities for all the spokes in the system. For example, subnets and routes can be controlled from the central network hub to ensure standardized network policies across the network.

      Security

      While there needs to be security in the hub and the spokes individually, finding the balance of operation can make the systems more robust. Hub and spoke design can be an effective tool for security when a principal security hub is hosted in the hub network. The central security hub can collect data from the spokes as well as non-spoke sources such as regulatory bodies and threat intelligence providers, and then share the information with the spokes.

      Threat information sharing is a major benefit of using this design, and the hub can take actions to analyze and enrich the data before sharing it with spokes. Shared services such as threat intelligence platforms (TIP) can also benefit from being centralized when stationed in the hub. A collective defense approach between the hub and spoke can be very successful in addressing sophisticated threats.

      Compliance and regulatory requirements such as HIPAA can also be placed in the hub, and the spokes connected to it can make use of it instead of having to deploy it in each spoke individually.

      Cloud metering

      The governance vs. flexibility paradigm usually decides the placement of cloud metering, i.e. if the organization wants higher control over cloud costs, it should be in the central hub, whereas if it prioritizes innovation, the spokes should be allowed to control it. Regardless of the placement of the domain, the costs can be monitored from the central hub using cloud-native monitoring tools such as Azure Monitor or any third-party software deployed in the hub.

      For ease of governance and since resources are usually shared at a project level, most cloud service providers suggest that an individual metering service be placed in the spokes. The centralized billing system of the organization, however, can make use of scale and reserved instances to drive down the costs that the spokes can take advantage of. For example, billing and access control resources are placed in the lower levels in GCP to enable users to set up projects and perform their tasks. These billing systems in the lower levels are then controlled by a centralized billing system to decide who pays for the resources provisioned.

      Don't get stuck with your on-prem network design. Design for the cloud.

      1. Peering VPCs into a mesh design can be an easy way to get onto the cloud, but it should not be your networking strategy for the long run.
      2. Hub and spoke network design offers more benefits than any other network strategy to be adopted only when the need arises. Plan for the design early on and keep a strategy in place to deploy it as early as possible.
      3. Hybrid of mesh and hub and spoke will be very useful in connecting multiple large networks especially when they need to access the same resources without having to route the traffic over the internet.
      4. Governance vs. flexibility should be a key consideration when designing for hub and spoke to leverage the best out of your infrastructure.
      5. Distribute domains across the hub or spokes to leverage costs, security, data collection, and economies of scale, and to foster secure interactions between networks.

      Cloud network design strategy

      This is an image of the framework for developing a Cloud Network Design Strategy.

      Bibliography

      Borschel, Brett. "Azure Hub Spoke Virtual Network Design Best Practices." Acendri Solutions, 13 Jan. 2022. Web.
      Singh, Garvit. "Amazon Virtual Private Cloud Connectivity Options." AWS, January 2018. Web.
      "What Is the Hub and Spoke Information Sharing Model?" Cyware, 16 Aug. 2021. Web.
      Youseff, Lamia. "Mesh and Hub-and-Spoke Networks on Azure." Microsoft, Dec. 2017. Web.

      Optimize the Service Desk With a Shift-Left Strategy

      • Buy Link or Shortcode: {j2store}478|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $21,171 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Tier 2 and 3 specialists lose time and resources working on tickets instead of more complex projects.
      • The service desk finds themselves resolving the same incidents over and over, wasting manual work on tasks that could be automated.
      • Employees expect modern, consumer-like experiences when they need help; they want to access information and resources from wherever they are and have the tools to solve their problems themselves without waiting for help.

      Our Advice

      Critical Insight

      • It can be difficult to overcome the mindset that difficult functions need to be escalated. Shift left involves a cultural change to the way the service desk works, and overcoming objections and getting buy-in up front is critical.
      • Many organizations have built a great knowledgebase but fail to see the value of it over time as it becomes overburdened with overlapping and out-of-date information. Knowledge capture, updating, and review must be embedded into your processes if you want to keep the knowledgebase useful.
      • Similarly, the self-service portal is often deployed out of the box with little input from end users and fails to deliver its intended benefits. The portal needs to be designed from the end user’s point of view with the goal of self-resolution if it will serve its purpose of deflecting tickets.

      Impact and Result

      • Embrace a shift-left strategy by moving repeatable service desk tasks and requests into lower-cost delivery channels such as self-help tools and automation.
      • Shift work from Tier 2 and 3 support to Tier 1 through good knowledge management practices that empower the first level of support with documented solutions to recurring issues and free up more specialized resources for project work and higher value tasks.
      • Shift knowledge from the service desk to the end user by enabling them to find their own solutions. A well-designed and implemented self-service portal will result in fewer logged tickets to the service desk and empowered, satisfied end users.
      • Shift away manual repetitive work through the use of AI and automation.
      • Successfully shifting this work left can reduce time to resolve, decrease support costs, and increase end-user satisfaction.

      Optimize the Service Desk With a Shift-Left Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand why a shift-left strategy can help to optimize your service desk, review Info-Tech's methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare to shift left

      Assess whether you’re ready to optimize the service desk with a shift-left strategy, get buy-in for the initiative, and define metrics to measure success.

      • Optimize the Service Desk With a Shift-Left Strategy – Phase 1: Prepare to Shift Left
      • Shift-Left Prerequisites Assessment
      • Shift-Left Strategy
      • Shift-Left Stakeholder Buy-In Presentation

      2. Design shift-left model

      Build strategy and identify specific opportunities to shift service support left to Level 1 through knowledge sharing and other methods, to the end-user through self-service, and to automation and AI.

      • Optimize the Service Desk With a Shift-Left Strategy – Phase 2: Design Shift Left Model
      • Shift-Left Action Plan
      • Knowledge Management Workflows (Visio)
      • Knowledge Management Workflows (PDF)
      • Self-Service Portal Checklist
      • Self-Service Resolution Workflow (Visio)
      • Self-Service Resolution Workflow (PDF)

      3. Implement and communicate

      Identify, track, and implement specific shift-left opportunities and document a communications plan to increase adoption.

      • Optimize the Service Desk With a Shift-Left Strategy – Phase 3: Implement & Communicate
      • Incident Management Workflow (Visio)
      • Incident Management Workflow (PDF)
      [infographic]

      Workshop: Optimize the Service Desk With a Shift-Left Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Prepare to Shift Left

      The Purpose

      Define how shift left would apply in your organization, get buy-in for the initiative, and define metrics to measure success.

      Key Benefits Achieved

      Defined scope and objectives for the shift-left initiative

      Buy-in for the program

      Metrics to keep the project on track and evaluate success

      Activities

      1.1 Review current service desk structure

      1.2 Discuss challenges

      1.3 Review shift-left model and discuss how it would apply in your organization

      1.4 Complete the Shift-Left Prerequisites Assessment

      1.5 Complete a RACI chart for the project

      1.6 Define and document objectives

      1.7 Review the stakeholder buy-in presentation

      1.8 Document critical success factors

      1.9 Define KPIs and metrics

      Outputs

      Shift-left scope

      Completed shift-left prerequisites assessment

      RACI chart

      Defined objectives

      Stakeholder buy-in presentation

      Critical success factors

      Metrics to measure success

      2 Plan to Shift to Level 1

      The Purpose

      Build strategy and identify specific opportunities to shift service support left to Level 1 through knowledge sharing and other methods.

      Key Benefits Achieved

      Identified initiatives to shift work to Level 1

      Documented knowledge management process workflows and strategy

      Activities

      2.1 Identify barriers to Level 1 resolution

      2.2 Discuss knowledgebase challenges and areas for improvement

      2.3 Optimize KB input process

      2.4 Optimize KB usage process

      2.5 Optimize KB review process

      2.6 Discuss and document KCS strategy and roles

      2.7 Document knowledge success metrics

      2.8 Brainstorm additional methods of increasing FLR

      Outputs

      KB input workflow

      KB usage workflow

      KB review workflow

      KCS strategy and roles

      Knowledge management metrics

      Identified opportunities to shift to Level 1

      3 Plan to Shift to End User and Automation

      The Purpose

      Build strategy and identify specific opportunities to shift service support left to the end user through self-service and to automation and AI.

      Key Benefits Achieved

      Identified initiatives to shift work to self-service and automation

      Evaluation of self-service portal and identified opportunities for improvement

      Activities

      3.1 Review existing self-service portal and discuss vision

      3.2 Identify opportunities to improve portal accessibility, UI, and features

      3.3 Evaluate the user-facing knowledgebase

      3.4 Optimize the ticket intake form

      3.5 Document plan to improve, communicate, and evaluate portal

      3.6 Map the user experience with a workflow

      3.7 Document your AI strategy

      3.8 Identify candidates for automation

      Outputs

      Identified opportunities to improve portal

      Improvements to knowledgebase

      Improved ticket intake form

      Strategy to communicate and measure success of portal

      Self-service resolution workflow

      Strategy to apply AI and automation

      Identified opportunities to shift tasks to automation

      4 Build Implementation and Communication Plan

      The Purpose

      Build an action plan to implement shift left, including a communications strategy.

      Key Benefits Achieved

      Action plan to track and implement shift-left opportunities

      Communications plan to increase adoption

      Activities

      4.1 Examine process workflows for shift-left opportunities

      4.2 Document shift-left-specific responsibilities for each role

      4.3 Identify and track shift-left opportunities in the action plan

      4.4 Brainstorm objections and responses

      4.5 Document communications plan

      Outputs

      Incident management workflow with shift-left opportunities

      Shift left responsibilities for key roles

      Shift-left action plan

      Objection handling responses

      Communications plan

      Applications Priorities 2022

      • Buy Link or Shortcode: {j2store}183|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy

      There is always more work than hours in the day. IT often feels understaffed and doesn’t know how to get it all done. Trying to satisfy all the requests results in everyone getting a small piece of the pie and in users being dissatisfied.

      Our Advice

      Critical Insight

      Focusing on one initiative will allow leaders to move the needle on what is important.

      Impact and Result

      Focus on the big picture, leveraging Info-Tech’s blueprints. By increasing maturity and efficiency, IT staff can spend more time on value-added activities.

      Applications Priorities 2022 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Applications Priorities 2022 – A deck that discusses the five priorities we are seeing among Applications leaders.

      There is always more work than hours in the day. IT often feels understaffed and doesn’t know how to get it all done. Trying to satisfy all the requests results in everyone getting a small piece of the pie and in users being dissatisfied. Use Info-Tech's Applications Priorities 2022 to learn about the five initiatives that IT should prioritize for the coming year.

      • Applications Priorities Report for 2022
      [infographic]

      Maintain Employee Engagement During the COVID-19 Pandemic

      • Buy Link or Shortcode: {j2store}548|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,399 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • The uncertainty of the pandemic means that employee engagement is at higher risk.
      • Organizations need to think beyond targeting traditional audiences by considering engagement of onsite, remote, and laid-off employees.

      Our Advice

      Critical Insight

      • The changing way of work triggered by this pandemic means engagement efforts must be easy to implement and targeted for relevant audiences.

      Impact and Result

      • Identify key drivers to leverage during the pandemic to boost engagement as well as at-risk drivers to focus efforts on.
      • Select quick-win tactics to sustain and boost engagement for relevant target audiences.

      Maintain Employee Engagement During the COVID-19 Pandemic Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Determine the scope

      Evaluate the current state, stakeholder capacity, and target audience of engagement actions.

      • Maintain Employee Engagement During the COVID-19 Pandemic Storyboard
      • Pandemic Engagement Workbook

      2. Identify engagement drivers

      Review impact to engagement drivers in order to prioritize and select tactics for addressing each.

      • Tactics Catalog: Maintain Employee Engagement During the COVID-19 Pandemic
      • Employee Engagement During COVID-19: Manager Tactics

      3. Determine ownership and communicate engagement actions

      Designate owners of tactics, select measurement tools and cadence, and communicate engagement actions.

      • Crisis Communication Guide for HR
      • Crisis Communication Guide for Leaders
      • Leadership Crisis Communication Guide Template
      • HR Action and Communication Plan
      [infographic]

      Right-Size the Service Desk for Small Enterprise

      • Buy Link or Shortcode: {j2store}487|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk

      The service desk is a major function within IT. Small enterprises with constrained resources need to look at designing a service desk that enables consistency in supporting the business and finds the right balance of documentation.

      Determining the right level of documentation to provide backup and getting the right level of data for good reporting may seem like a waste of time when the team is small, but this is key to knowing when to invest in more people, upgraded technology, and whether your efforts to improve service are successful.

      Our Advice

      Critical Insight

      It’s easy to lose sight of the client experience when working as a small team supporting a variety of end users. Changing from a help desk to a service desk requires a focus on what it means to be a customer centric service desk and a change to the way the technicians think about providing support.

      • Make the best use of the team. Clearly define roles and responsibilities and monitor those wearing multiple hats to make sure they don’t burn out.
      • Build cross training and documentation into your culture to preserve service levels while giving team members time off to recharge.
      • Don’t discount the benefit of good tools. As volume increases, so does the likelihood of issues and requests getting missed. Look for tools that will help to keep a customer focus.

      Impact and Result

      • Improved workload distribution for technicians and enable prioritization based on work type, urgency, and impact.
      • Improved communications methods and messaging will help the technicians to set expectations appropriately and reduce friction between each other and their supported end users.
      • Best practices and use of industry standard tools will reduce administrative overhead while improving workload management.

      Right-Size the Service Desk for Small Enterprise Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Right-Size the Service Desk for Small Enterprise Storyboard – A step-by-step guide to help you identify and prioritize initiatives to become more customer centric.

      This blueprint provides a framework to quickly identify a plan for service desk improvements. It also provides references to build out additional skills and functionality as a continual improvement initiative.

      • Right-Size the Service Desk for Small Enterprise Storyboard

      2. Maturity Assessment – An assessment to determine baseline maturity.

      The maturity assessment will provide a baseline and identify areas of focus based on level of current and target maturity.

      • IT Service Desk Maturity Assessment for Small Enterprise

      3. Standard Operating Procedure – A template to build out a clear, concise SOP right-sized for a small enterprise.

      The SOP provides an excellent guide to quickly inform new team members or contractors of your support approach.

      • Incident Management and Service Desk SOP for Small Enterprise

      4. Categorization Scheme – A template to build out an effective categorization scheme.

      The categorization scheme template provides examples of asset-based categories, resolution codes and status.

      • Service Desk Asset-Based Categories Template

      5. Improvement Plan – A template to present the improvement plan to stakeholders.

      This template provides a starting point for building your communications on planned improvements.

      • Service Desk Improvement Initiative
      [infographic]

      Further reading

      Right-Size the Service Desk for Small Enterprise

      Turn your help desk into a customer-centric service desk.

      Analyst Perspective

      Small enterprises have many of the same issues as large ones, but with far fewer resources. Focus on the most important aspects to improve customer service.

      The service desk is a major function within IT. Small enterprises with constrained resources need to look at designing a service desk that enables consistency in supporting the business and finds the right balance of documentation.

      Evaluate documentation to ensure there is always redundancy built in to cover absences. Determining coverage will be an important factor, especially if vendors will be brought into the organization to assist during shortages. They will not have the same level of knowledge as teammates and may have different requirements for documentation.

      It is important to be customer centric, thinking about how services are delivered and communicated with a focus on providing self-serve at the appropriate level for your users and determining what information the business needs for expectation-setting and service level agreements, as well as communications on incidents and changes.

      And finally, don’t discount the value of good reporting. There are many reasons to document issues besides just knowing the volume of workload and may become more important as the organization evolves or grows. Stakeholder reporting, regulatory reporting, trend spotting, and staff increases are all good reasons to ensure minimum documentation standards are defined and in use.

      Photo of Sandi Conrad, Principal Research Director, Info-Tech Research Group. Sandi Conrad
      Principal Research Director
      Info-Tech Research Group

      Table of Contents

      Title Page Title Page
      Blueprint benefits 6 Incident management 25
      Start / Stop / Continue exercise 10 Prioritization scheme 27
      Complete a maturity assessment 11 Define SLAs 29
      Select an ITSM tool 13 Communications 30
      Define roles & responsibilities 15 Reporting 32
      Queue management 17 What can you do to improve? 33
      Ticket handling best practices 18 Staffing 34
      Customer satisfaction surveys 19 Knowledge base & self-serve 35
      Categorization 20 Customer service 36
      Separate ticket types 22 Ticket analysis 37
      Service requests 23 Problem management 38
      Roadmap 39

      Insight summary

      Help desk to service desk

      It’s easy to lose sight of the client experience when working as a small team supporting a variety of end users. Changing from a help desk to a service desk requires a focus on what it means to be a customer-centric service desk and a change to the way the technicians think about providing support.

      Make the best use of the team

      • Clearly define primary roles and responsibilities, and identify when and where escalations should occur.
      • Divide the work in a way that makes the most sense based on intake patterns and categories of incidents or service requests.
      • Recognize who is wearing multiple hats, and monitor to make sure they don’t burn out or struggle to keep up.
      • Determine the most appropriate areas to outsource based on work type and skills required.

      Build cross-training into your culture

      • Primary role holders need time off and need to know the day-to-day work won’t be waiting for them when they come back.
      • The knowledge base is your first line of defense to make sure incidents don’t have to wait for resolution and to avoid having technicians remote in on their day off.
      • When volumes spike for incidents and service requests, everyone needs to be prepared to pitch in. Train the team to recognize and step up to the call to action.

      Don’t discount the benefit of good tools

      • When volume increases, so does the likelihood of missing issues and requests.
      • Designate a single solution to manage the workload, so there is one place to go for work orders, incident reporting, asset data, and more.
      • Set up self-serve for users so they have access to how-to articles and can check the status of tickets themselves.
      • Create a service catalog to make it easy for them to request the most frequent items easily.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Standard Operating Procedures

      Sample of the Standard Operating Procedures deliverable.

      Maturity Assessment

      Sample of the Maturity Assessment deliverable.

      Categorization scheme

      Sample of the Categorization scheme deliverable.

      Improvement Initiative

      Sample of the Improvement Initiative deliverable.
      Create a standard operating procedure to ensure the support team has a consistent understanding of how they need to engage with the business.

      Blueprint benefits

      IT benefits

      • Improve workload distribution for technicians and enable prioritization based on work type, urgency, and impact.
      • Improved communications methods and messaging will help the technicians set expectations appropriately and reduce friction between each other and their supported end users.
      • Best practices and use of industry-standard tools will reduce administrative overhead while improving workload management.

      Business benefits

      • IT taking a customer-centric approach will improve access to support and reduce interruptions to the way they do business.
      • Expectation setting and improved communications will allow the business to better plan their work around new requests and will have a better understanding of service level agreements.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is six to ten calls over the course of three to four months.

      The current state discussion will determine the path.

      What does a typical GI on this topic look like?

      Current State & Vision

      Best Practices

      Service Requests & Incidents

      Communications

      Next Steps & Roadmap

      Call #1: Discuss current state & create a vision

      Call #2: Document roles & responsibilities

      Call #3:Review and define best practices for ticket handling Call #4: Review categorization

      Call #5: Discuss service requests & self-serve

      Call #6: Assess incident management processes
      Call #7: Assess and document reporting and metrics

      Call #8: Discuss communications methods

      Call #9: Review next steps

      Call #10: Build roadmap for updates

      For a workshop on this topic, see the blueprint Standardize the Service Desk

      Executive Brief Case Study

      Southwest CARE Center
      Logo for Southwest Care.
      INDUSTRY
      Healthcare

      Service Desk Project

      After relying on a managed service provider (MSP) for a number of years, the business hired Kevin to repatriate IT. As part of that mandate, his first strategic initiative was to build a service desk. SCC engaged Info-Tech Research Group to select and build a structure; assign roles and responsibilities; implement incident management, request fulfilment, and knowledge management processes; and integrate a recently purchased ITSM tool.

      Over the course of a four-day onsite engagement, SCC’s IT team worked with two Info-Tech analysts to create and document workflows, establish ticket handling guidelines, and review their technological requirements.

      Results

      The team developed a service desk standard operating procedure and an implementation roadmap with clear service level agreements.

      Southwest CARE Center (SCC) is a leading specialty healthcare provider in New Mexico. They offer a variety of high-quality services with a focus on compassionate, patient-centered healthcare.

      “Info-Tech helped me to successfully rebrand from an MSP help desk to an IT service desk. Sandi and Michel provided me with a customized service desk framework and SOP that quickly built trust within the organization. By not having to tweak and recalibrate my service desk processes through trial and error, I was able to save a year’s worth of work, resulting in cost savings of $30,000 to $40,000.” (Kevin Vigil, Director of Information Technology, Southwest CARE Center)

      The service desk is the cornerstone for customer satisfaction

      Bar charts comparing 'Dissatisfied' vs 'Satisfied End Users' in both 'Service Desk Effectiveness' and 'Timeliness'.
      N=63, small enterprise organizations from the End-User Satisfaction Diagnostic, at December 2021
      Dissatisfied was classified as those organizations with an average score less than 7.
      Satisfied was classified as those organizations with an average score greater or equal to 8.
      • End users who were satisfied with service desk effectiveness rated all other IT processes 36% higher than dissatisfied end users.
      • End users who were satisfied with service desk timeliness rated all other IT processes 34% higher than dissatisfied end-users.

      Improve the service desk with a Start, Stop, Continue assessment

      Use this exercise as an opportunity to discuss what’s working and what isn’t with your current help desk. Use this to define your goals for the improvement project, with a plan to return to the results and rerun the exercise on a regular basis.

      STOP

      • What service desk processes are counterproductive?
      • What service blockers exist that consistently undermine good results?
      • Are end-user relationships with individual team members negatively impacting satisfaction?
      • Make notes on initial ideas for improvement.

      START

      • What service process improvements could be implemented immediately?
      • What technical qualifications do individual staff members need to improve?
      • What opportunities exist to improve service desk communications with end users?
      • How can escalation and triage be more efficient?

      CONTINUE

      • What aspects of your current service desk are positive?
      • What processes are efficient and can be emulated elsewhere?
      • Where can you identify high levels of end-user satisfaction?

      Complete a maturity assessment to create a baseline and areas of focus

      The Service Desk Maturity Assessment tool helps organizations assess their service desk process maturity and focus the project on the activities that matter most.

      The tool will help guide improvement efforts and measure your progress.

      • The second tab of the tool walks through a qualitative assessment of your service desk practices. Questions will prompt you to evaluate how you are executing key activities. Select the answer in the drop-down menus that most closely aligns with your current state.
      • The third tab displays your rate of process completeness and maturity. You will receive a score for each phase, an overall score, and advice based on your performance.
      • Document the results of the efficiency assessment in the Service Desk Improvement Initiative.
      • The tool is intended for periodic use. Review your answers each year and devise initiatives to improve the process performance where you need it most.
      Sample of the Service Desk Maturity Assessment.

      Define your vision for the support structure

      Use this vision for communicating with the business and your IT team

      Consider service improvements and how those changes can be perceived by the organization. For example, offering multiple platforms, such as adding Macs to end-user devices, could translate to “Providing the right IT solutions for the way our employees want to work.”

      To support new platforms, you might need to look at the following steps to get there:
      • Evaluate skills needed – can you upskill generalists quickly, or will specialists be required? Determine training needs for support staff on new platforms.
      • Estimate uptake of the new platform and adjusting budgets – will these mostly be role-based decisions?
      • Determine what applications will work on the new platform and which will have a parity offering, which will require a solution like Parallels or VirtualBox, and which might need substitute applications.
      • What utilities will be needed to secure your solutions such as for encryption, antivirus, and firewalls?
      • What changes in the way you deploy and patch machines?
      • What level of support do you need to provide – just platform, or applications as well? What self-serve training can be made available?
      If you need to change the way you deploy equipment, you may want to review the blueprint Simplify Remote Deployment With Zero-Touch Provisioning

      Info-Tech Insight

      Identify some high-level opportunities and plan out how these changes will impact the way you provide support today. Document steps you’ll need to follow to make it happen. This may include new offerings and product sourcing, training, and research.

      Facilitate service desk operations with an ITSM tool

      You don’t need to spend a fortune. Many solutions are free or low-cost for a small number of users, and you don’t necessarily have to give up functionality to save money.

      Encourage users to submit requests through email or self-serve to keep organized. Ensure that reporting will provide you with the basics without effort, but ensure report creation is easy enough if you need to add more.

      Consider tools that do more than just store tickets. ITSM tools for small enterprises can also assist with:
      • Equipment and software license management
      • Self-serve for password reset and improving the experience for end users to submit tickets
      • Software deployment
      • Onboarding and offboarding workflows
      • Integration with monitoring tools
      Info-Tech Insight Buying rather than building allows you the greatest flexibility and can provide enterprise-level functionality at small-enterprise pricing. Use Info-Tech’s IT Service Management Selection Guide to create a business case and list of requirements for your ITSM purchase.
      Logo for Spiceworks.
      Logo for ZenDesk. Logo for SysAid.
      Logo for ManageEngine.
      Logo for Vector Networks.
      Logo for Freshworks.
      Logo for Squadcast.
      Logo for Jira Software.
      Logos contain links

      ITSM implementations are the perfect time to fix processes

      Consider engaging a partner for the installation and setup as they will have the expertise to troubleshoot and get you to value quickly.

      Even with a partner, don’t rely on them to set up categories, prioritizations, and workflows. If you have unique requirements, you will need to bring your design work to the table to avoid getting a “standard install” that will need to be modified later.

      When we look at what makes a strong and happy product launch, it boils down to a few key elements:
      • Improving customer service, or at least avoiding a decline
      • Improving access to information for technical team and end users
      • Successfully taking advantage of workflows, templates, and other features designed to improve the technician and user experience
      • Using existing processes with the new tools, without having to completely reengineer how things are done
      For a complete installation guide, visit the blueprint Build an ITSM Implementation Plan
      To prepare for a quick time to value in setting up the new ITSM tool, prioritize in this order:
      1. Categorization and status codes
      2. Prioritization
      3. Divide tickets into incidents and service requests
      4. Create workflows for onboarding and offboarding (automate where you can)
      5. Track escalations to vendors
      6. Reporting
      7. Self-serve
      8. Equipment inventory (leading to hardware asset management)

      Define roles looking to balance between customer service and getting things done

      The team will need to provide backfill for each other with high volume, vacations, and leave, but also need to proactively manage interruptions appropriately as they work on projects.
      Icon of a bullseye. First contact – customer service, general knowledge
      Answers phones, chats, responds to email, troubleshooting, creates knowledge articles for end users.
      Icon of a pie chart. Analyst – experienced troubleshooter, general knowledge
      Answers phone when FC isn’t available, responds to email, troubleshooting, creates knowledge articles for first contact, escalates to other technicians or vendors.
      Icon of a lightbulb. Analyst – experienced troubleshooter, specialist
      Answers phones only when necessary, troubleshooting, creates knowledge articles for anyone in IT, consults with peers, escalates to vendors.
      Icon of gear on a folder. Engineer – deep expertise, specialist
      Answers phones only when necessary, troubleshooting, creates knowledge articles for anyone in IT, consults with peers, escalates to vendors.
      Icon of a handshake. Vendor, Managed Service Providers
      Escalation point per contract terms, must meet SLAs, communicate regularly with analysts and management as appropriate. Who escalates and who manages them?
      Row of colorful people.

      Note roles in the Incident Management and Service Desk – Standard Operating Procedure Template

      Keep customers happy and technicians calm by properly managing your queue

      If ticket volume is too high or too dispersed to effectively have teams self-select tickets, assign a queue manager to review tickets throughout the day to ensure they’re assigned and on the technician’s schedule. This is particularly important for technicians who don’t regularly work out of the ticketing system. Follow up on approaching or missed SLAs.

      • Separate incidents (break fix) and service requests: Prioritize incidents over service requests to focus on getting users doing business as soon as possible. Schedule service requests for slower times or assign to technicians who are not working the front lines.
      • First in/first out…mostly: We typically look to prioritize incidents over service requests and only prioritize incidents if there are multiple people or VIPs affected. Where everything is equal, deal with the oldest first. Pause occasionally to deal with quick wins such as password resets.
      • Update ticket status and notes: Knowing what tickets are in progress and which ones are waiting on information or parts is important for anyone looking to pick up the next ticket. Make sure everyone is aware of the benefits of keeping this information up to date, so technicians know what to work on next without duplicating each other’s work.
      • Implement solutions quickly by using knowledge articles: Continue to build out the knowledge base to be able to resolve end-user issues quickly, check to see if additional information is needed before escalating tickets to other technicians.
      • Encourage end users to create tickets through the portal: Issues called in are automatically moved to the front of the queue, regardless of urgency. Make it easy for users to report issues using the portal and save the phone for urgent issues to allow appropriate prioritization of tickets.
      • Create a process to add additional resources on a regular basis to keep control of the backlog: A few extra hours once a week may be enough if the team is focused without interruptions.
      • Determine what backlog is acceptable to your users: Set that as a maximum time to resolve. Ideally, set up automated escalations for tickets that are approaching target SLAs, and build flexibility into schedules to have an “all hands on deck” option if the volume gets too high.

      Info-Tech Insight

      Make sure your queue manager has an accurate escalation list and has the authority to assign tickets and engage with the technical team to manage SLAs; otherwise, SLAs will never be consistently managed.

      Best practices for ticket handling

      Accurate data leads to good decisions. If working toward adding staff members, reducing recurring incidents, gaining access to better tools, or demonstrating value to the business, tickets will enable reporting and dashboards to manage your day-to-day business and provide reports to stakeholders.
      • Provide an easy way for end users to electronically submit tickets and encourage them to do so. This doesn’t mean you shouldn’t still accept phone calls, but that should be encouraged for time sensitive issues.
      • Create and update tickets, but not at the expense of good customer service. Agents can start the ticket but shouldn’t spend five minutes creating the ticket when they should be troubleshooting the problem.
      • Update the ticket when the issue is resolved or needs to be escalated. If agents are escalating, they should make sure all relevant information is passed along to the next technician.
      • Update user of ETA if issue cannot be resolved quickly.
      • Update categories to reflect the actual issue and resolution.
      • Reference or link to the knowledge base article as the documented steps taken to resolve the incident.
      • Validate incident is resolved with client. Automate this process with ticket closure after a certain time.
      • Close or resolve the ticket on time.
      Ticket templates (or quick tickets) for common incidents can lead to fast creation, data input, and categorizations. Templates can reduce the time it takes to create tickets from two minutes to 30 seconds.
      Sample ticket template.

      Create a right-sized self-service portal

      Review tickets and talk to the team to find out the most frequent requests and the most frequent incidents that could be solved by the end user if there were clear instructions. Check with your user community to see what they would like to see in the portal.

      A portal is only as attractive as it is useful. Enabling ticket creation and review is the bare minimum and may not entice users to the portal if email is just as easy to use for ticket creation.

      Consider opening the portal to groups other than IT. HR, finance, and others may have information they want to share or forms to fill in or download where an employee portal rather than an IT portal could be helpful. Work with other departments to see if they would find value. Make sure your solution is easy to use when adding content. Low-code options are useful for this.

      Portals could be built in the ITSM solution or SharePoint/Teams and should include:

      • Easy ways to create and see status on all tickets
      • Manuals, how-to articles, links to training
      • Answers to common questions, could be a wiki or Q&A for users to help each other as well as IT
      • Could have a chatbot to help people find documents or to create a ticket

      Info-Tech Insight

      Consider using video capture software to create short how-to videos for common questions. Vendors such as TechSmith Snagit , Vimeo Screen Recorder, Screencast-O-Matic Video Recording, and Movavi Screen Recording may be quick and easy to learn.

      49%

      49% of employees have trouble finding information at work

      35%

      Employees can cut time spent looking for information by 35% with quality intranet

      (Source: Liferay)

      Use customer satisfaction surveys to monitor service levels

      Transactional surveys are tied to specific interactions and provide a means of communication to help users communicate satisfaction or dissatisfaction with single interactions.
      • Keep it simple: One question to rate the service with opportunity to add a comment is enough to understand the sentiment and potential issues, and it will be more likely that the user will fill it out.
      • Follow up: Feedback will only be provided if customers think it’s being read and actioned. Set an alert to receive notification of any negative feedback and follow up within one or two business days to show you’re listening.

      A simple customer feedback form with smiley face scale.

      Relationship surveys can be run annually to obtain feedback on the overall customer experience.

      Inform yourself of how well you are doing or where you need improvement in the broad services provided.

      Provide a high-level perspective on the relationship between the business and IT.

      Help with strategic improvement decisions.

      Should be sent over a duration of time and to the entire customer base after they’ve had time to experience all the services provided by the service desk. This can be done on an annual basis.

      For example: Info-Tech’s End User Satisfaction Diagnostic. Included in your membership.

      Keep categorizations simple

      Asset categorization provides reports that are straightforward and useful for IT and that are typically used where the business isn’t demanding complex reports.

      Too many options can cause confusion; too few options provide little value. Try to avoid using “miscellaneous” – it’s not useful information. Test your tickets against your new scheme to make sure it works for you. Effective classification schemes are concise, easy to use correctly, and easy to maintain.

      Build out the categories with these questions:
      • What kind of asset am I working on? (type)
      • What general asset group am I working on? (category)
      • What particular asset am I working on? (sub-category)

      Create resolution codes to further modify the data for deeper reporting. This is typically a separate field, as you could use the same code for many categories. Keep it simple, but make sure it’s descriptive enough to understand the type of work happening in IT.

      Create and define simple status fields to quickly review tickets and know what needs to be actioned. Don’t stop the clock for any status changes unless you’re waiting on users. The elapsed time is important to measure from a customer satisfaction perspective.

      Info-Tech Insight

      Think about how you will use the data to determine which components need to be included in reports. If components won’t be used for reporting, routing, or warranty, reporting down to the component level adds little value.

      Example table of categorizations.


      Need to make quick progress? Use Info-Tech Research Group’s Service Desk Asset-Based Categories template.

      1.1 Build or review your categories

      1-3 hours

      Input: Existing tickets

      Output: Categorization scheme

      Materials: Whiteboard/Flip charts, Markers, Sample categorization scheme

      Participants: CIO, Service desk manager, Technicians

      Discuss:

      • How can you use categories and resolution information to enhance reporting?
      • What level of detail do you need to be able to understand the data and take action? What level of detail is too much?
      • Are current status fields allowing you to accurately assess pending work at a glance?

      Draft:

      1. Start with existing categories and review, identifying duplicates and areas of inconsistency.
      2. Write out proposed resolution codes and status fields and critically assess their value.
      3. Test categories and resolution codes against a few recent tickets.
      4. Record the ticket categorization scheme in the Incident Management and Service Desk – Standard Operating Procedure.

      Download the Incident Management and Service Desk – Standard Operating Procedure Template

      Separate tickets into service requests and incidents

      Tickets should be separated into different ticket types to be able to see briefly what needs to be prioritized. This may seem like a non-issue if you have a small team, but if you ever need to report how quickly you’re solving break-fix issues or whether you’re doing root cause analysis, this will save on future efforts. Separating ticket types may make it easier to route tickets automatically or to a new provider in the future.

      INCIDENTS

      SERVICE REQUESTS

      Icon of a bullseye.

      PRIORITIZATION

      Incidents will be prioritized based on urgency and impact to the organization. Service requests will be scheduled and only increase in prioritization if there is an issue with the request process (e.g. new hire start).
      Icon of a handshake.

      SLAs

      Did incidents get resolved according to prioritization rules? REPONSE & RESOLUTION Did service requests get completed on time? SCHEDULING & FULFILMENT
      Icon of a lightbulb.

      TRIAGE & ROOT CAUSE ANALYSIS

      Incidents will typically need triage at the service desk unless something is set up to go directly to a specialist. Service requests don’t need triage and can be routed automatically for approvals and fulfillment.

      “For me, the first key question is, is this keeping you from doing business? Is this a service request? Is it actually something that's broken? Well, okay. Now let's have the conversation about what's broken and keeping you from doing business.” (Anonymous CIO)

      Determine how service requests will be fulfilled

      Process steps for service requests: 'Request, Approve, Schedule, Fulfill, Notify requester, Close ticket'.

      • Identify standard requests, meaning any product approved for use and deployment in the organization.
      • Determine whether this should be published and how. Consider a service catalog with the ability to create tickets right from the request page. If there is an opportunity to automate fulfillment, build that into your workflow and project plans.
      • Create workflows for complicated requests such as onboarding, and build them into a template in the service desk tool. This will allow you to reduce the administrative work to deploy tasks.
      • Who will fulfill requests? There may be a need for more than one technician to be able to fulfill if volume dictates, but it’s important to determine what will be done by each level to quickly assign those tickets for scheduling. Define what will be done by each group of technicians.
      • Determine reasonable SLAs for most service requests. Identify which ones will not meet “normal” SLAs. As you build out a service catalog or automate fulfillment, SLAs can be refined.

      Info-Tech Insight

      Service requests are not as urgent as incidents and should be scheduled.

      Set the SLA based on time to fulfill, plus a buffer to schedule around more urgent service requests.

      1.2 Identify service requests and routing needs

      2-3 hours

      Input: Ticket data, Existing workflow diagrams

      Output: Workflow diagrams

      Materials: Whiteboard/Flip charts, Markers, Visio

      Participants: CIO, Service desk manager, Technicians

      Identify:

      1. Create your list of typical service requests and identify the best person to fulfill, based on complexity, documentation, specialty, access rights.
      2. Review service requests which include multiple people or departments, such as onboarding and offboarding
      3. Draw existing processes.
      4. Discuss challenges and critique existing process.
      5. Document proposed changes and steps that will need to be taken to improve the process.

      Download the Incident Management and Service Desk – Standard Operating Procedure Template

      Incident management

      Critical incidents and normal incidents

      Even with a small team, it’s important to define a priority for response and resolution time for SLA and uptime reporting and extracting insights for continual improvement efforts.

      • Mission-critical systems or problems that affect many people should always come first (i.e. Severity Level 1).
      • The bulk of reported problems, however, are often individual problems with desktop PCs (i.e. Severity Level 3 or 4).
      • Some questions to consider when deciding on problem severity include:
        • How is productivity affected?
        • How many users are affected?
        • How many systems are affected?
        • How critical are the affected systems to the organization?
      • Decide how many severity levels the organization needs the service desk to have. Four levels of severity is ideal for most organizations.
      Go to incident management for SE

      Super-specialization of knowledge is also a common factor in smaller teams and is caused by complex architectures. While helpful, if that knowledge isn’t documented, it can walk out the door with the resource and the rest of the team is left scrambling.

      Lessons learned may be gathered for critical incidents but often are not propagated, which impacts the ability to solve recurring incidents.

      Over time, repeated incidents can have a negative impact on the customer’s perception that the service desk is a credible and essential service to the business.

      Cover image for 'Incident Management for Small Enterprise'.
      Click picture for a link to the blueprint

      1.3 Activity: Identify critical systems

      1 hour

      Input: Ticket data, Business continuity plan

      Output: Service desk SOP

      Materials: Whiteboard/Flip charts, Markers

      Participants: CIO, Service desk manager, Technicians

      Discuss and document:

      1. Create a list of the most critical systems, and identify and document the escalation path.
      2. Review inventory of support documents for critical systems and identify any that require runbooks to ensure quick resolution in the event of an outage or major performance issue. Refer to the blueprint Incident Management for Small Enterprise to prioritize and document runbooks as needed.
      3. Review vendor agreements to determine if SLAs are appropriate to support needs. If there is a need for adjustments, determine options for modifying or renegotiating SLAs.

      Download the Incident Runbook Prioritization Tool

      Prioritization scheme

      Keep the priority scheme simple and meaningful, using this framework to communicate and report to stakeholders and set SLAs for response and resolution.
      1. Focus primarily on incidents. Service requests should always be medium urgency, unless there is a valid reason to move one to high level.
      2. Separate major outages from all other tickets as these are a major factor in business impact.
      3. Decide how many levels of severity are appropriate for your organization.
      4. Build a prioritization matrix, breaking down priority levels by impact and urgency.
      5. Build out the definitions of “impact” and “urgency” to complete the prioritization matrix.
      6. Run through examples of each priority level to make sure everyone is on the same page.
      A matrix of prioritization with rows as levels of 'IMPACT' and columns as levels of 'URGENCY'. Ratings range from 'Critical' at 'Extensive/Critical' to 'Low' at 'Low Impact/Low'.

      Document escalation rules and contacts

      Depending on the size of the team, escalations may be mostly to internal technical colleagues or could be primarily to vendors.

      • Ensure the list of escalation rules and contacts is accurate and available, adding expected SLAs for quick reference
      • If tickets are being escalated but shouldn’t be, ensure knowledge articles and training materials are up to date
      • Follow up on all external escalations, ensuring SLAs are respected
      • Publish an escalation path for clients if service is not meeting their needs (for internal and external providers) and automate escalations for tickets breaching SLAs
      Escalation rules strung together.
      User doesn’t know who will fix the issue but expects to see it done in a reasonable time. If issue cannot be resolved right away, set expectations for resolution time.
      • Document information so next technician doesn’t need to ask the same questions.
      • Escalate to the right technician the first time.
      • Check notes to catch up on the issue.
      • Run tests if necessary.
      • Contact user to troubleshoot and fix.
      • Meet SLAs or update client on new ETA.
      • Provide complete information to vendor.
      • Monitor resolution.
      • Follow up with vendor if delays.
      • Update client as needed.
      • Vendor will provide support according to agreement.
      • Encourage vendor to provide regular updates to IT.
      • Review vendor performance regularly.
      • IT will validate issue is resolved and close ticket.
      Validate user is happy with the experience

      Define, measure, and report on service level agreements

      Improving communications is the most effective way to improve customer service
      1. Set goals for time to respond and time to resolve for different incident levels, communicate to the technical team, and test ability to meet these goals.
      2. Set goals for time to fulfil for most service requests, document exceptions (e.g. onboarding).
      3. Create reports to measure against goals and determine what information will be most effective for reporting to the business.
      4. Management: Communicate expectations to the business leaders and end users.
      5. Management: Set regular cadence to meet with stakeholders to discuss expectations and review relevant metrics.
      6. Management: Determine how metrics will be tracked and reviewed to manage technical partners.
      Keep messaging simple
      • Be prepared with detailed reporting if needed, but focus on a few key metrics to inform stakeholders of progress against goals.
      • Use trending to tell a story, especially when presenting success stories.
      • Use appropriate media for each type of message. For example: SLAs can be listed on automated ticket responses or in a banner on the portal.

      Determine what communications are most important and who will do them

      Icon of a bperson ascending a staircase.

      PROACTIVE, PLANNED CHANGES

      From: Service Desk

      Messaging provided by engineer or director, sent to all employees; proactive planning with business unit leaders.

      Icon of a bullseye.

      OUTAGES & UPDATES

      From: Service Desk

      Use templates to send out concise messaging and updates hourly, with input from technical team working on restoring services to all; director to liaise with business stakeholders.

      Icon of a lightbulb.

      UPDATES TO SERVICES, SELF-SERVE

      From: Director

      Send announcements no more than monthly about new services and processes.

      Icon of a handshake.

      REGULAR STAKEHOLDER COMMUNICATIONS

      From: Director

      Monthly reporting to business and IT stakeholders on strategic and project goals, manage escalations.

      1.4 Create communications plan

      2 hours

      Input: Sample past communications

      Output: Communications templates

      Materials: Whiteboard/flip charts, Markers

      Participants: CIO, Service desk manager, Technicians

      Determine where templates are needed to ensure quick and consistent communications. Review sample templates and modify to suit your needs:

      1. Proactive, planned changes
      2. Outages and updates
      3. Updates to services, self-serve
      4. Regular stakeholder communications

      Download the communications templates

      Create reports that are useful and actionable

      Reporting serves two purposes:

      1. Accountability to stakeholders
      2. Identification of items that need action

      To determine what reports are needed, ask yourself:

      • What are your goals?
      • What story are you trying to tell?
      • What do you need to manage day to day?
      • What do you need to report to get funding?
      • What do you need to report to your stakeholders for service updates?

      Determine which metrics will be most useful to suit your strategic and operational goals

      STRATEGIC GOAL (stakeholders): Improve customer service evidenced by:

      TIME

      • Aged backlog
      • Service requests solved within SLA (could also look for quick ones, e.g. tickets solved in one day, % solved within one hour)
      • Volume of incidents and time to solve each type
      • Critical incidents solved in 4 hours
      • Incidents solved same day

      QUALITY

      • Percentage of tickets solved at first contact
      • SLAs missed
      • Percentage of services available to request through catalog
      • Percentage of tickets created through portal (speaks to quality of experience)
      • Customer satisfaction survey results – transactional and annual

      RESOURCES

      • Knowledge articles used by technicians
      • Knowledge articles used by end users
      • Tickets resolved at each technician level (volume)
      • Non-standard requests evaluated and fulfilled by volume & time served
      • Volume of recurring incidents
      OPERATIONAL GOALS: Report to director & technicians

      What else can you do to improve service?

      Review the next few pages to see if you need additional blueprints to help you:
      • Evaluate staffing and training needs to ensure the right number of resources are available and they have the skills they need for your environment.
      • Create self-service for end users to get quick answers and create tickets.
      • Create a knowledge base to ensure backup for technical expertise.
      • Develop customer service skills through training.
      • Perform ticket analysis to better understand your technical environment.

      Be agile in your approach to service

      It’s easy for small teams to get overwhelmed when covering for vacations, illness, or leave. Determine where priorities may be adjusted during busy or short-staffed times.

      • Have a plan to cross-train technicians and create comprehensive knowledge articles for coverage during vacations and unexpected absences.
      • Know where it makes sense to bring in vendors, such as for managed print services, or to cover for extended absences.
      • Look for opportunities to automate functions or reduce administrative overhead through workflows.
      • Identify any risks and determine how to mitigate, such as managing or changing administrative passwords.
      • Create self-serve to enable ticket creation and self-solve for those users who wish to use it.

      Staff the service desk to meet demand

      • With increasing complexity of support and demand on service desks, staff are often left feeling overwhelmed and struggling to keep up with ticket volume, resulting in long resolution times and frustrated end users.
      • However, it’s not as simple as hiring more staff to keep up with ticket volume. IT managers must have the data to support their case for increasing resources or even maintaining their current resources in an environment where many executives are looking to reduce headcount.
      • Without changing resources to match demand, IT managers will need to determine how to maximize the use of their resources to deliver better service.

      Cover image for 'Staff the Service Desk to Meet Demand'.
      Click picture for a link to the blueprint

      Create and manage a knowledge base

      With a small team, it may seem redundant to create a knowledge base, but without key system and process workflows and runbooks, an organization is still at risk of bottlenecks and knowledge failure.

      • Use a knowledge base to document pre-escalation troubleshooting steps, known errors and workarounds, and runbook solutions.
      • Where incidents may have many root causes, document which are the most frequent solutions and where variations are typically used.
      • Start with an inventory of personal documents, compare and consolidate into the knowledge base, and ensure they are accurate and up to date.
      • Assign someone to review articles on a regular basis and flag for editing and archiving as the technical environment changes.
      • Supplement with vendor-provided or purchased content. Two options for purchased content include RightAnswers or Netformx.

      Info-Tech Insight

      Appeal to a broad audience. Use non-technical language whenever possible to help less technical readers. Identify error messages and use screenshots where it makes sense. Take advantage of social features like voting buttons to increase use.

      Optimize the service desk with a shift-left strategy

      • “Shift left” is a strategy which moves appropriate technical work to users through knowledge articles, automation and service catalogs, freeing up time for technicians to work on more complex issues.
      • Many organizations have built a great knowledge base but fail to see the value of it over time as it becomes overburdened with overlapping and out-of-date information. Knowledge capture, updating, and review must be embedded into your processes if you want to keep the knowledge base useful.
      • Similarly, the self-service portal is often deployed out of the box with little input from end users and fails to deliver its intended benefits. The portal needs to be designed from the end user’s point of view with the goal of self-resolution if it will serve its purpose of deflecting tickets.

      Cover image for 'Optimize the Service Desk With a Shift-Left Strategy'.
      Click picture for a link to the blueprint

      Customer service isn’t just about friendliness

      Your team will all need to deal with end users at some point, and that may occur in times of high stress. Ensure the team has the skills they need to actively listen, stay positive, and de-escalate.

      Info-Tech’s customer service program is a modular approach to improve skills one area at a time. Delivering good customer service means being effective in these areas:
      • Customer focus – Focus on the customer and use a positive, caring, and helpful attitude.
      • Listening and verbal communication skills – Demonstrate empathy and patience, actively listen, and speak in user-friendly ways to help get your point across.
      • Written communication skills – Use appropriate tone, language, and terms in writing (whether via chat, email, or other).
      • Manage difficult situations – Remain calm and in control when dealing with difficult customers and situations.
      • Go the extra mile – Go beyond simply resolving the request to make each interaction positive and memorable.

      Deliver a customer service training program to your IT department

      • There’s a common misconception that customer service skills can’t be taught, so no effort is made to improve those skills.
      • Even when there is a desire to improve customer service, it’s hard for IT teams to make time for training and improvement when they’re too busy trying to keep up with tickets.
      • A talented service desk agent with both great technical and customer service skills doesn’t have to be a rare unicorn, and an agent without innate customer service skills isn’t a lost cause. Relevant and impactful customer service habits, techniques, and skills can be taught through practical, role-based training.
      • IT leaders can make time for this training through targeted, short modules along with continual on-the-job coaching and development.

      Cover image for 'Deliver Customer Service Training Program to Your IT Department'.
      Click picture for a link to the blueprint

      Improve your ticket analysis

      Once you’ve got great data coming into the ticketing system, it’s important to rethink your metrics and determine if there are more insights to be found.

      Analyzing ticket data involves:
      • Collecting ticket data and keeping it clean. Based on the metrics you’re analyzing, define ticket expectations and keep the data up to date.
      • Showing the value of the service desk. SLAs are meaningless if they are not met consistently. The prerequisite to implementing proper SLAs is fully understanding the proper workload of the service desk.
      • Understanding – and improving – the user experience. You cannot improve the user experience without meaningful metrics that allow you to understand the user experience. Different user groups will have different needs and different expectations of the level of service. Your metrics should reflect those needs and expectations.

      Analyze your service desk ticket data

      Properly analyzing ticket data is challenging for the following reasons:
      • Poor ticket hygiene and unclear ticket handling
      • Service desk personnel are not sure where to start with analysis
      • Too many metrics are tracked to parse actionable data from the noise
      Ticket data won’t give you a silver bullet, but it can help point you in the right direction.

      Cover image for 'Analyze Your Service Desk Ticket Data'.
      Click picture for a link to the blueprint

      Start doing problem management

      Proactively focusing on root cause analysis will reduce the most disruptive incidents to the organization.

      • A focus on elimination of critical incidents and the more disruptive recurring incidents will reduce future workloads for the team and improve customer satisfaction.
      • This can be challenging when the team is already struggling with workload; however, setting a regular cadence to review tickets, looking for trends, and identifying at least one focus area a month can be a positive outcome for everyone.
      • Focus on the most impactful ticket or service first. The initial goal should be to reduce or eliminate critical and high-impact incidents. Once the high-stress situations are reduced, proactively scheduling the smaller but still time-consuming repeatable incidents can be done.
      • Where you have vendors involved, work with them to determine when root cause analysis must happen and where they’ll need to coordinate with your team or other supporting vendors.

      Problem management

      Problem management can be challenging because it requires skills and knowledge to go deep into a problem and troubleshoot the root cause of an issue, but it also requires uninterrupted time.
      • Problem management, however, can be taught, and the issue isn’t always hard to spot if you have time to look.
      • Using tried and true methods for walking through an issue step by step will enable the team to improve their investigative and troubleshooting skills.
      • Reduction of one or two major incidents and recurring incidents per month will pay off quickly in reducing reactive ticket volume and improve customer satisfaction.

      Cover image for 'Problem Management'.
      Click picture for a link to the blueprint

      Create your roadmap with high-level requirements

      Determine what tasks and projects need to be completed to meet your improvement goals. Create a high-level project plan and balance with existing resources.

      Roadmap of high-level requirements with 'Goals' as row headers and their timelines mapped out across fiscal quarters.

      Bibliography

      Taylor, Sharon and Ivor Macfarlane. ITIL Small Scale Implementation. Office of Government Commerce, 2005.

      “Share, Collaborate, and Communicate on One Consistent Platform.” Liferay, n.d. Accessed 19 July 2022.

      Rodela, Jimmy. “A Beginner’s Guide to Customer Self-Service.” The Ascent, 18 May 2022. Web.

      Streamline Application Management

      • Buy Link or Shortcode: {j2store}403|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $64,272 Average $ Saved
      • member rating average days saved: 40 Average Days Saved
      • Parent Category Name: Maintenance
      • Parent Category Link: /maintenance
      • Today’s rapidly scaling and increasingly complex products create mounting pressure on delivery teams to release new features and changes quickly and with sufficient quality.
      • Many organizations lack the critical management capabilities to balance maintenance with new development and ensure high product value.
      • Application management is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on management when it becomes a problem.
      • The lack of governance and practice accountability leaves application management in a chaotic state: politics take over, resources are not strategically allocated, and customers are frustrated.

      Our Advice

      Critical Insight

      • New features, fixes, and enhancements are all treated the same and managed in a single backlog. Teams need to focus on prioritizing their efforts on what is valuable to the organization, not to a single department.
      • Business integration is not optional. The business (i.e. product owners) must be represented in guiding delivery efforts and performing ongoing validation and verification of new features and changes.

      Impact and Result

      • Justify the necessity to optimize application management. Gain a grounded understanding of stakeholder objectives and validate their achievability against the current maturity of application management.
      • Strengthen backlog management practices. Obtain a holistic picture of the business and technical impacts, risks, value, complexity, and urgency of each backlog item in order to justify its priority and relevance. Apply the appropriate management approach to each software product according to its criticality and value to the business.
      • Establish and govern a repeatable process. Develop a management process with well-defined steps, quality controls, and roles and responsibilities, and instill good practices to improve the success of delivery.

      Streamline Application Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should sustain your application management practice, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define your priorities

      State the success criteria of your application management practice through defined objectives and metrics. Assess your maturity.

      • Streamline Application Management – Phase 1: Define Your Priorities
      • Application Management Strategy Template
      • Application Management Maturity Assessment Tool

      2. Govern application management

      Structure your application management governance model with the right process and roles. Inject product ownership into your practice.

      • Streamline Application Management – Phase 2: Govern Application Management

      3. Build your optimization roadmap

      Build your application management optimization roadmap to achieve your target state.

      • Streamline Application Management – Phase 3: Build Your Optimization Roadmap
      [infographic]

      Workshop: Streamline Application Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your Priorities

      The Purpose

      State the success criteria of your application management practice through defined objectives and metrics.

      Assess your maturity.

      Key Benefits Achieved

      Grounded stakeholder expectations

      Application management maturity and identification of optimization opportunities

      Activities

      1.1 Set your objectives.

      1.2 Assess your maturity.

      Outputs

      Application management objectives and metrics

      Application management maturity and optimization opportunities

      2 Govern Application Management

      The Purpose

      Structure your application management governance model with the right process and roles.

      Inject product ownership into your practice.

      Key Benefits Achieved

      Management approach aligned to product value and criticality

      Management techniques to govern the product backlog

      Target-state application management process and roles

      Activities

      2.1 Select your management approach.

      2.2 Manage your single product backlog.

      2.3 Optimize your management process.

      2.4 Define your management roles.

      Outputs

      Application management approach for each application

      Product backlog management practices

      Application management process

      Application management roles and responsibilities and communication flow

      3 Build Your Optimization Roadmap

      The Purpose

      Build your application management optimization roadmap to achieve your target state.

      Key Benefits Achieved

      Optimization opportunities

      Application management optimization roadmap

      Activities

      3.1 Build your optimization roadmap.

      Outputs

      Application management optimization roadmap

      Enhance Your Solution Architecture Practices

      • Buy Link or Shortcode: {j2store}157|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $33,359 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • In today’s world, business agility is essential to stay competitive. Quick responses to business needs through efficient development and deployment practices is critical for business value delivery.
      • A mature solution architecture practice is the basic necessity for a business to have technical agility.

      Our Advice

      Critical Insight

      Don’t architect for normal situations. That is a shallow approach and leads to decisions that may seem “right” but will not be able to stand up to system elasticity needs.

      Impact and Result

      • Understand the different parts of a continuous security architecture framework and how they may apply to your decisions.
      • Develop a solution architecture for upcoming work (or if there is a desire to reduce tech debt).

      Enhance Your Solution Architecture Practices Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Solution Architecture Practices Deck – A deck to help you develop an approach for or validate existing solution architecture capability.

      Translate stakeholder objectives into architecture requirements, solutions, and changes. Incorporate architecture quality attributes in decisions to increase your architecture’s life. Evaluate your solution architecture from multiple views to obtain a holistic perspective of the range of issues, risks, and opportunities.

      • Enhance Your Solution Architecture Practices – Phases 1-3

      2. Solution Architecture Template – A template to record the results from the exercises to help you define, detail, and make real your digital product vision.

      Identify and detail the value maps that support the business, and discover the architectural quality attribute that is most important for the value maps. Brainstorm solutions for design decisions for data, security, scalability, and performance.

      • Solution Architecture Template
      [infographic]

      Workshop: Enhance Your Solution Architecture Practices

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Vision and Value Maps

      The Purpose

      Document a vision statement for the solution architecture practice (in general) and/or a specific vision statement, if using a single project as an example.

      Document business architecture and capabilities.

      Decompose capabilities into use cases.

      Key Benefits Achieved

      Provide a great foundation for an actionable vision and goals that people can align to.

      Develop a collaborative understanding of business capabilities.

      Develop a collaborative understanding of use cases and personas that are relevant for the business.

      Activities

      1.1 Develop vision statement.

      1.2 Document list of value stream maps and their associated use cases.

      1.3 Document architectural quality attributes needed for use cases using SRME.

      Outputs

      Solution Architecture Template with sections filled out for vision statement canvas and value maps

      2 Continue Vision and Value Maps, Begin Phase 2

      The Purpose

      Map value stream to required architectural attributes.

      Prioritize architecture decisions.

      Discuss and document data architecture.

      Key Benefits Achieved

      An understanding of architectural attributes needed for value streams.

      Conceptual understanding of data architecture.

      Activities

      2.1 Map value stream to required architectural attributes.

      2.2 Prioritize architecture decisions.

      2.3 Discuss and document data architecture.

      Outputs

      Solution Architecture Template with sections filled out for value stream and architecture attribute mapping; a prioritized list of architecture design decisions; and data architecture

      3 Continue Phase 2, Begin Phase 3

      The Purpose

      Discuss security and threat assessment.

      Discuss resolutions to threats via security architecture decisions.

      Discuss system’s scalability needs.

      Key Benefits Achieved

      Decisions for security architecture.

      Decisions for scalability architecture.

      Activities

      3.1 Discuss security and threat assessment.

      3.2 Discuss resolutions to threats via security architecture decisions.

      3.3 Discuss system’s scalability needs.

      Outputs

      Solution Architecture Template with sections filled out for security architecture and scalability design

      4 Continue Phase 3, Start and Finish Phase 4

      The Purpose

      Discuss performance architecture.

      Compile all the architectural decisions into a solutions architecture list.

      Key Benefits Achieved

      A complete solution architecture.

      A set of principles that will form the foundation of solution architecture practices.

      Activities

      4.1 Discuss performance architecture.

      4.2 Compile all the architectural decisions into a solutions architecture list.

      Outputs

      Solution Architecture Template with sections filled out for performance and a complete solution architecture

      Further reading

      Enhance Your Solution Architecture Practice

      Ensure your software systems solution is architected to reflect stakeholders’ short- and long-term needs.

      Analyst Perspective

      Application architecture is a critical foundation for supporting the growth and evolution of application systems. However, the business is willing to exchange the extension of the architecture’s life with quality best practices for the quick delivery of new or enhanced application functionalities. This trade-off may generate immediate benefits to stakeholders, but it will come with high maintenance and upgrade costs in the future, rendering your system legacy early.

      Technical teams know the importance of implementing quality attributes into architecture but are unable to gain approval for the investments. Overcoming this challenge requires a focus of architectural enhancements on specific problem areas with significant business visibility. Then, demonstrate how quality solutions are vital enablers for supporting valuable application functionalities by tracing these solutions to stakeholder objectives and conducting business and technical risk and impact assessments through multiple business and technical perspectives.

      this is a picture of Andrew Kum-Seun

      Andrew Kum-Seun
      Research Manager, Applications
      Info-Tech Research Group

      Enhance Your Solution Architecture

      Ensure your software systems solution is architected to reflect stakeholders’ short- and long-term needs.

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      • Most organizations have some form of solution architecture; however, it may not accurately and sufficiently support the current and rapidly changing business and technical environments.
      • To enable quick delivery, applications are built and integrated haphazardly, typically omitting architecture quality practices.

      Common Obstacles

      • Failing to involve development and stakeholder perspectives in design can lead to short-lived architecture and critical development, testing, and deployment constraints and risks being omitted.
      • Architects are experiencing little traction implementing solutions to improve architecture quality due to the challenge of tracing these solutions back to the right stakeholder objectives.

      Info-Tech's Approach

      • Translate stakeholder objectives into architecture requirements, solutions, and changes. Incorporate architecture quality attributes in decisions to increase your architecture’s life.
      • Evaluate your solution architecture from multiple views to obtain a holistic perspective of the range of issues, risks, and opportunities.
      • Regularly review and recalibrate your solution architecture so that it accurately reflects and supports current stakeholder needs and technical environments.

      Info-Tech Insight

      Well-received applications can have poor architectural qualities. Functional needs often take precedence over quality architecture. Quality must be baked into design, execution, and decision-making practices to ensure the right tradeoffs are made.

      A badly designed solution architecture is the root of all technical evils

      A well-thought-through and strategically designed solution architecture is essential for the long-term success of any software system, and by extension, the organization because:

      1. It will help achieve quality attribute requirements (security, scalability, performance, usability, resiliency, etc.) for a software system.
      2. It can define and refine architectural guiding principles. A solution architecture is not only important for today but also a vision for the future of the system’s ability to react positively to changing business needs.
      3. It can help build usable (and reusable) services. In a fast-moving environment, the convenience of having pre-made plug-and-play architectural objects reduces the risk incurred from knee-jerk reactions in response to unexpected demands.
      4. It can be used to create a roadmap to an IT future state. Architectural concerns support transition planning activities that can lead to the successful implementation of a strategic IT plan.

      Demand for quick delivery makes teams omit architectural best practices, increasing downstream risks

      In its need for speed, a business often doesn’t see the value in making sure architecture is maintainable, reusable, and scalable. This demand leads to an organizational desire for development practices and the procurement of vendors that favor time-to-market over long-term maintainability. Unfortunately, technical teams are pushed to omit design quality and validation best practices.

      What are the business impacts of omitting architecture design practices?

      Poor quality application architecture impedes business growth opportunities, exposes enterprise systems to risks, and consumes precious IT budgets in maintenance that could otherwise be used for innovation and new projects.

      Previous estimations indicate that roughly 50% of security problems are the result of software design. […] Flaws in the architecture of a software system can have a greater impact on various security concerns in the system, and as a result, give more space and flexibility for malicious users.(Source: IEEE Software)

      Errors in software requirements and software design documents are more frequent than errors in the source code itself according to Computer Finance Magazine. Defects introduced during the requirements and design phase are not only more probable but also more severe and more difficult to remove. (Source: iSixSigma)

      Design a solution architecture that can be successful within the constraints and complexities set before you

      APPLICATION ARCHITECTURE…

      … describes the dependencies, structures, constraints, standards, and development guidelines to successfully deliver functional and long-living applications. This artifact lays the foundation to discuss the enhancement of the use and operations of your systems considering existing complexities.

      Good architecture design practices can give you a number of benefits:

      Lowers maintenance costs by revealing key issues and risks early. The Systems Sciences Institute at IBM has reported that the cost to fix an error found after product release was 4 to 5 times as much as one uncovered during design.(iSixSigma)

      Supports the design and implementation activities by providing key insights for project scheduling, work allocation, cost analysis, risk management, and skills development.(IBM: developerWorks)

      Eliminates unnecessary creativity and activities on the part of designers and implementers, which is achieved by imposing the necessary constraints on what they can do and making it clear that deviation from constraints can break the architecture.(IBM: developerWorks)

      Use Info-Tech’s Continuous Solution Architecture (CSA) Framework for designing adaptable systems

      Solution architecture is not a one-size-fits-all conversation. There are many design considerations and trade-offs to keep in mind as a product or services solution is conceptualized, evaluated, tested, and confirmed. The following is a list of good practices that should inform most architecture design decisions.

      Principle 1: Design your solution to have at least two of everything.

      Principle 2: Include a “kill switch” in your fault-isolation design. You should be able to turn off everything you release.

      Principle 3: If it can be monitored, it should be. Use server and audit logs where possible.

      Principle 4: Asynchronous is better than synchronous. Asynchronous design is more complex but worth the processing efficiency it introduces.

      Principle 5: Stateless over stateful: State data should only be used if necessary.

      Principle 6: Go horizonal (scale out) over vertical (scale up).

      Principle 7: Good architecture comes in small packages.

      Principle 8: Practice just-in-time architecture. Delay finalizing an approach for as long as you can.

      Principle 9: X-ilities over features. Quality of an architecture is the foundation over which features exist. A weak foundation can never be obfuscated through shiny features.

      Principle 10: Architect for products not projects. A product is an ongoing concern, while a project is short lived and therefore only focused on what is. A product mindset forces architects to think about what can or should be.

      Principle 11: Design for rollback: When all else fails, you should be able to stand up the previous best state of the system.

      Principle 12: Test the solution architecture like you test your solution’s features.

      CSA should be used for every step in designing a solution’s architecture

      Solution architecture is a technical response to a business need, and like all complex evolutionary systems, must adapt its design for changing circumstances.

      The triggers for changes to existing solution architectures can come from, at least, three sources:

      1. Changing business goals
      2. Existing backlog of technical debt
      3. Solution architecture roadmap

      A solution’s architecture is cross-cutting and multi-dimensional and at the minimum includes:

      • Product Portfolio Strategy
      • Application Architecture
      • Data Architecture
      • Information Architecture
      • Operational Architecture

      along with several qualitative attributes (also called non-functional requirements).

      This image contains a chart which demonstrates the relationship between changing hanging business goals, Existing backlog of technical debt, Solution architecture roadmap, and Product Portfolio Strategy, Application Architecture, Data Architecture, Information Architecture and, Operational Architecture

      Related Research: Product Portfolio Strategy

      Integrate Portfolios to Create Exceptional Customer Value

      • Define an organizing principle that will structure your projects and applications in a way that matters to your stakeholders.
      • Bridge application and project portfolio data using the organizing principle that matters to communicate with stakeholders across the organization.
      • Create a dashboard that brings together the benefits of both project and application portfolio management to improve visibility and decision making.

      Deliver on Your Digital Portfolio Vision

      • Recognize that a vision is only as good as the data that backs it up. Lay out a comprehensive backlog with quality built in that can be effectively communicated and understood through roadmaps.
      • Your intent is only a dream if it cannot be implemented ; define what goes into a release plan via the release canvas.
      • Define a communication approach that lets everyone know where you are heading.

      Related Research: Data, Information & Integration Architecture

      Build a Data Architecture Roadmap

      • Have a framework in place to identify the appropriate solution for the challenge at hand. Our three-phase practical approach will help you build a custom and modernized data architecture.
      • Identify and prioritize the business drivers in which data architecture changes would create the largest overall benefit and determine the corresponding data architecture tiers that need to be addressed.
      • Discover the best-practice trends, measure your current state, and define the targets for your data architecture tactics.
      • Build a cohesive and personalized roadmap for restructuring your data architecture. Manage your decisions and resulting changes.

      Build a Data Pipeline for Reporting and Analytics

      • Understand your high-level business capabilities and interactions across them – your data repositories and flows should be just a digital reflection thereof.
      • Divide your data world in logical verticals overlaid with various speed data progression lanes, i.e. build your data pipeline – and conquer it one segment at a time.
      • Use the most appropriate database design pattern for a given phase/component in your data pipeline progression.

      Related Research:Operational Architecture

      Optimize Application Release Management

      • Acquire release management ownership. Ensure there is appropriate accountability for the speed and quality of the releases passing through the entire pipeline.
      • A release manager has oversight over the entire release process and facilitates the necessary communication between business stakeholders and various IT roles.
      • Instill holistic thinking. Release management includes all steps required to push release and change requests to production along with the hand-off to Operations and Support. Increase the transparency and visibility of the entire pipeline to ensure local optimizations do not generate bottlenecks in other areas.
      • Standardize and lay a strong release management foundation. Optimize the key areas where you are experiencing the most pain and continually improve.

      Build Your Infrastructure Roadmap

      • Increased communication. More information being shared to more people who need it.
      • Better planning. More accurate information being shared.
      • Reduced lead times. Less due diligence or discovery work required as part of project implementations.
      • Faster delivery times. Less low-value work, freeing up more time for project work.

      Related Research:Security Architecture

      Identify Opportunities to Mature the Security Architecture

      • A right-sized security architecture can be created by assessing the complexity of the IT department, the operations currently underway for security, and the perceived value of a security architecture within the organization. This will bring about a deeper understanding of the organizational infrastructure.
      • Developing a security architecture should also result in a list of opportunities (i.e. initiatives) that an organization can integrate into a roadmap. These initiatives will seek to improve security operations and strengthen the IT department’s understanding of security’s role within the organization.
      • A better understanding of the infrastructure will help to save time on determining the correct technologies required from vendors, and therefore, cut down on the amount of vendor noise.
      • Creating a defensible roadmap will assist with justifying future security spend.

      Key deliverable:

      Solution Architecture Template
      Record the results from the exercises to help you define, detail, and make real your digital product vision.

      Blueprint Deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      This image contains screenshots of the deliverables which will be discussed later in this blueprint

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.

      Guided Implementation

      Our team knows that we need to fix a process, but we need assistance to determine where to focus. some check-ins along the way would help keep us on track

      Workshop

      We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place

      Consulting

      Our team does not have the time or the knowledge to take this project on. we need assistance through the entirety of this project.

      Diagnostics and consistent frameworks are used throughout all four options

      Workshop Overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4
      Exercises
      1. Articulate an architectural vision
      2. Develop dynamic value stream maps
      1. Create a conceptual map between the value stream, use case, and required architectural attribute
      2. Create a prioritized list of architectural attributes
      3. Develop a data architecture that supports transactional and analytical needs
      1. Document security architecture risks and mitigations
      2. Document scalability architecture
      1. Document performance-enhancing architecture
      2. Bring it all together
      Outcomes
      1. Architecture vision
      2. Dynamic value stream maps (including user stories/personas)
      1. List of required architectural attributes
      2. Architectural attributes prioritized
      3. Data architecture design decisions
      1. Security threat and risk analysis
      2. Security design decisions
      3. Scalability design decisions
      1. Performance design decisions
      2. Finalized decisions

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
      This GI is between 8 to 10 calls over the course of approximately four to six months.

      Phase 1 Phase 2 Phase 2
      Call #1:
      Articulate an architectural vision.
      Call #4:
      Continue discussion on value stream mapping and related use cases.
      Call #6:
      Document security design decisions.
      Call #2:
      Discuss value stream mapping and related use cases.
      Call #5:
      • Map the value streams to required architectural attribute.
      • Create a prioritized list of architectural attributes.
      Call #7:
      • Document scalability design decisions.
      • Document performance design decisions.
      Call #3:
      Continue discussion on value stream mapping and related use cases.
      Call #8:
      Bring it all together.

      Phase 1: Visions and Value Maps

      Phase 1

      1.1 Articulate an Architectural Vision
      1.2 Develop Dynamic Value Stream Maps
      1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
      1.4 Create a Prioritized List of Architectural Attributes

      Phase 2

      2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
      2.2 Document Security Architecture Risks and Mitigations

      Phase 3

      3.1 Document Scalability Architecture
      3.2 Document Performance Enhancing Architecture
      3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

      This phase will walk you through the following activities:

      • Determine a vision for architecture outcomes
      • Draw dynamic value stream maps
      • Derive architectural design decisions
      • Prioritize design decisions

      This phase involves the following participants:

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect
      • Database Architect
      • Enterprise Architect

      Enhance Your Solution Architecture Practice

      Let’s get this straight: You need an architectural vision

      If you start off by saying I want to architect a system, you’ve already lost. Remember what a vision is for!

      An architectural vision...

      … is your North Star

      Your product vision serves as the single fixed point for product development and delivery.

      … aligns stakeholders

      It gets everyone on the same page.

      … helps focus on meaningful work

      There is no pride in being a rudderless ship. It can also be very expensive.

      And eventually...

      … kick-starts your strategy

      We know where to go, we know who to bring along, and we know the steps to get there. Let’s plan this out.

      An architectural vision is multi-dimensional

      Who is the target customer (or customers)?

      What is the key benefit a customer can get from using our service or product?

      Why should they be engaged with you?

      What makes our service or product better than our competitors?

      (Adapted from Crossing the Chasm)

      Info-Tech Insight

      It doesn’t matter if you are delivering value to internal or external stakeholders, you need a product vision to ensure everyone understands the “why.”

      Use a canvas as the dashboard for your architecture

      The solution architecture canvas provides a single dashboard to quickly define and communicate the most important information about the vision. A canvas is an effective tool for aligning teams and providing an executive summary view.

      This image contains a sample canvas for you to use as the dashboard for your architecture. The sections are: Solution Name, Tracking Info, Vision, Business Goals, Metrics, Personas, and Stakeholders.

      Leverage the solution architecture canvas to state and inform your architecture vision

      This image contains the sample canvas from the previous section, with annotations explaining what to do for each of the headings.

      1.1 Craft a vision statement for your solution’s architecture

      1. Use the product canvas template provided for articulating your solution’s architecture.

      *If needed, remove or add additional data points to fit your purposes.

      There are different statement templates available to help form your product vision statements. Some include:

      • For [our target customer], who [customer’s need], the [product] is a [product category or description] that [unique benefits and selling points]. Unlike [competitors or current methods], our product [main differentiators].
      • We believe (in) a [noun: world, time, state, etc.] where [persona] can [verb: do, make, offer, etc.], for/by/with [benefit/goal].
      • To [verb: empower, unlock, enable, create, etc.] [persona] to [benefit, goal, future state].
      • Our vision is to [verb: build, design, provide] the [goal, future state] to [verb: help, enable, make it easier to...] [persona].

      (Adapted from Crossing the Chasm)

      Download the Solution Architecture Template and document your vision statement.

      Input

      • Business Goals
      • Product Portfolio Vision

      Output

      • Solution Architecture Vision

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Product Owner
      • IT Leadership
      • Business Leadership

      Solution Architecture Canvas: Refine your vision statement

      This image contains a screenshot of the canvas from earlier in the blueprint, with only the annotation for Solution Name: Vision, unique value proposition, elevator pitch, or positioning statement.

      Understand your value streams before determining your solution’s architecture

      Business Strategy

      Sets and communicates the direction of the entire organization.

      Value Stream

      Segments, groups, and creates a coherent narrative as to how an organization creates value.

      Business Capability Map

      Decomposes an organization into its component parts to establish a common language across the organization.

      Execution

      Implements the business strategy through capability building or improvement projects.

      Identify your organization’s goals and define the value streams that support them

      Goal

      Revenue Growth

      Value Streams

      Stream 1- Product Purchase
      Stream 2- Customer Acquisition
      stream 3- Product Financing

      There are many techniques that help with constructing value streams and their capabilities.

      Domain-driven design is a technique that can be used for hypothesizing the value maps, their capabilities, and associated solution architecture.

      Read more about domain-driven design here.

      Value streams can be external (deliver value to customers) or internal (support operations)

        External Perspective

      1. Core value streams are mostly externally facing: they deliver value to either an external/internal customer and they tie to the customer perspective of the strategy map.
      • E.g. customer acquisition, product purchase, product delivery

      Internal Perspective

    • Support value streams are internally facing: they provide the foundational support for an organization to operate.
      • E.g. employee recruitment to retirement

      Key Questions to Ask While Evaluating Value Streams

      • Who are your customers?
      • What benefits do we deliver to them?
      • How do we deliver those benefits?
      • How does the customer receive the benefits?
      This image contains an example of value streams. The main headings are: Customer Acquisitions, Product Purchase, Product Delivery, Confirm Order, Product Financing, and Product Release.

      Value streams highlight the what, not the how

      Value chains set a high-level context, but architectural decisions still need to be made to deal with the dynamism of user interaction and their subsequent expectations. User stories (and/or use cases) and themes are great tools for developing such decisions.

      Product Delivery

      1. Order Confirmation
      2. Order Dispatching
      3. Warehouse Management
      4. Fill Order
      5. Ship Order
      6. Deliver Order

      Use Case and User Story Theme: Confirm Order

      This image shows the relationship between confirming the customer's order online, and the Online Buyer, the Online Catalog, the Integrated Payment, and the Inventory Lookup.

      The use case Confirming Customer’s Online Order has four actors:

      1. An Online Buyer who should be provided with a catalog of products to purchase from.
      2. An Online Catalog that is invoked to display its contents on demand.
      3. An Integrated Payment system for accepting an online form of payment (credit card, Bitcoins, etc.) in a secure transaction.
      4. An Inventory Lookup module that confirms there is stock available to satisfy the Online Buyer’s order.

      Info-Tech Insight

      Each use case theme links back to a feature(s) in the product backlog.

      Related Research

      Deliver on Your Digital Portfolio Vision

      • Recognize that a vision is only as good as the data that backs it up. Lay out a comprehensive backlog with quality built in that can be effectively communicated and understood through roadmaps.
      • Your intent is only a dream if it cannot be implemented – define what goes into a release plan via the release canvas.
      • Define a communication approach that lets everyone know where you are heading.

      Document Your Business Architecture

      • Recognize the opportunity for architecture work, analyze the current and target states of your business strategy, and identify and engage the right stakeholders.
      • Model the business in the form of architectural blueprints.
      • Apply business architecture techniques such as strategy maps, value streams, and business capability maps to design usable and accurate blueprints of the business.
      • Drive business architecture forward to promote real value to the organization.
      • Assess your current projects to determine if you are investing in the right capabilities. Conduct business capability assessments to identify opportunities and to prioritize projects.

      1.2 Document dynamic value stream maps

      1. Create value stream maps that support your business objectives.
      • The value stream maps could belong to existing or new business objectives.
    • For each value stream map:
      • Determine use case(s), the actors, and their expected activity.

      *Refer to the next slide for an example of a dynamic value stream map.

      Download the Solution Architecture Template for documentation of dynamic value stream map

      Input

      • Business Goals
      • Some or All Existing Business Processes
      • Some or All Proposed New Business Processes

      Output

      • Dynamic Value Stream Maps for Multiple Use Roles and Use Cases

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect

      Example: Dynamic value stream map

      Loan Provision*

      *Value Stream Name: Usually has the same name as the capability it illustrates.

      Loan Application**; Disbursement of Fund**; Risk Management**; Service Accounts**

      **Value Stream Components: Specific functions that support the successful delivery of a value stream.

      Disbursement of Funds

      This image shows the relationship between depositing the load into the applicant's bank account, and the Applicant's bank, the Loan Applicant, and the Loan Supplier.

      Style #1:

      The use case Disbursement of Funds has three actors:

      1. A Loan Applicant who applied for a loan and got approved for one.
      2. A Loan Supplier who is the source for the funds.
      3. The Applicant’s Bank that has an account into which the funds are deposited.

      Style # 2:

      Loan Provision: Disbursement of Funds
      Use Case Actors Expectation
      Deposit Loan Into Applicant’s Bank Account
      1. Loan Applicant
      2. Loan Supplier
      3. Applicant’s Bank
      1. Should be able to see deposit in bank account
      2. Deposit funds into account
      3. Accept funds into account

      Mid-Phase 1 Checkpoint

      By now, the following items are ideally completed:

      • Mid-Phase 1 Checkpoint

      Start with an investigation of your architecture’s qualitative needs

      Quality attributes can be viewed as the -ilities (e.g. scalability, usability, reliability) that a software system needs to provide. A system not meeting any of its quality attribute requirements will likely not function as required. Examples of quality attributes are:

      1. Slow system response time
      2. Security breaches that result in loss of personal data
      3. A product feature upgrade that is not compatible with previous versions
      Examples of Qualitative Attributes
      Performance Compatibility Usability Reliability Security Maintainability
      • Response Time
      • Resource Utilization
      • System Capacity
      • Interoperability
      • Accessibility
      • User Interface
      • Intuitiveness
      • Availability
      • Fault Tolerance
      • Recoverability
      • Integrity
      • Non-Repudiation
      • Modularity
      • Reusability
      • Modifiability
      • Testability

      Focus on quality attributes that are architecturally significant.

      • Not every system requires every quality attribute.
      • Pay attention to those attributes without which the solution will not be able to satisfy a user’s abstract* expectation.
      • This set can be considered Architecturally Significant Requirements (ASR). ASR concern scenarios have the most impact on the architecture of the software system.
      • ASR are fundamental needs of the system and changing them in the future can be a costly and difficult exercise.

      *Abstract since attributes like performance and reliability are not directly measurable by a user.

      Stimulus Response Measurement Environmental Context

      For applicable use cases: (*Adapted from S Carnegie Mellon University, 2000)

      1. Determine the Stimulus (temporal, external, or internal) that puts stress on the system. For example, a VPN-accessed hospital management system is used for nurses to login at 8am every weekday.
      2. Describe how the system should Respond to the stimulus. For example, the hospital management system should complete a nurse login under 10ms on initiation of the HTTPS request.
      3. Set a Measurement criteria for determining the success of the response to the stimulus. For example, the system should be able to successfully respond to 98% of the HTTPS requests the first time.
      4. Note the environmental context under which the stimulus occurs, including any unusual conditions in effect.
      • The hospital management system needs to respond in under 10ms under typical load or peak load?
      • What is the time variance of peak loads, for example, an e-commerce system during a Black Friday sale?
      • How big is the peak load?

      Info-Tech Insight

      Three out of four is bad. Don’t architect for normal situations because the solution will be fragile and prone to catastrophic failure under unexpected events.
      Read article: Retail sites crash under weight of online Black Friday shoppers.

      Discover and evaluate the qualitative attributes needed for use cases or user stories

      Deposit Loan Into Applicant’s Bank Account

      Assume analysis is being done for a to-be developed system.

      User Loan Applicant
      Expectations On login to the web system, should be able to see accurate bank balance after loan funds are deposited.
      User signs into the online portal and opens their account balance page.
      Expected Response From System System creates a connection to the data source and renders it on the screen in under 10ms.
      Measurement Under Normal Loads:
      • Response in 10ms or less
      • Data should not be stale
      Under Peak Loads:
      • Response in 15ms or less
      • Data should not be stale
      Quality Attribute Required Required Attribute # 1: Performance
      • Design Decision: Reduce latency by placing authorization components closer to user’s location.
      Required Attribute # 2: Data Reliability
      • Design Decision: Use event-driven ETL pipelines.
      Required Attribute # 3: Scalability
      • Design Decision: Following Principle # 4 of the CSA (JIT Architecture), delay decision until necessary.

      Use cases developed in Phase 1.2 should be used here. (Adapted from the ATAM Utility Tree Method for Quality Attribute Engineering)

      Reduce technical debt while you are at it

      Deposit Loan Into Applicant’s Bank Account

      Assume analysis is being done for a to-be developed system.

      UserLoan Applicant
      ExpectationsOn login to the web system, should be able to see accurate bank balance after loan funds are deposited.
      User signs into the online portal and opens their account balance page.
      Expected Response From SystemSystem creates a connection to the data source and renders it on the screen in under 10ms.
      MeasurementUnder Normal Loads:
      • Response in 10ms or less
      • Data should not be stale
      Under Peak Loads:
      • Response in 15ms or less
      • Data should not be stale
      Quality Attribute RequiredRequired Attribute # 1: Performance
      • Design Decision: Reduce latency by placing authorization components closer to user’s location.

      Required Attribute # 2: Data Reliability

      • Expected is 15ms or less under peak loads, but average latency is 21ms.
      • Design Decision: Use event-driven ETL pipelines.

      Required Attribute # 3: Scalability

      • Data should not be stale and should sync instantaneously, but in some zip codes data synchronization is taking 8 hours.
      • Design Decision: Investigate integrations and flows across application, database, and infrastructure. (Note: A dedicated section for discussing scalability is presented in Phase 2.)

      1.3 Create a conceptual map between the value streams, use cases, and required architectural attributes

      1. For selected use cases completed in Phase 1.2:
      • Map the value stream to its associated use cases.
      • For each use case, list the required architectural quality attributes.

      Download the Solution Architecture Template for mapping value stream components to their required architectural attribute.

      Input

      • Use Cases
      • User Roles
      • Stimulus to System
      • Response From System
      • Response Measurement

      Output

      • List of Architectural Quality Attributes

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Example for Phase 1.3

      Loan Provision

      Loan Application → Disbursement of Funds → Risk Management → Service Accounts

      Value Stream Component Use Case Required Architectural Attribute
      Loan Application UC1: Submit Loan Application
      UC2: Review Loan Application
      UC3: Approve Loan Application
      UCn: ……..
      UC1: Resilience, Data Reliability
      UC2: Data Reliability
      UC3: Scalability, Security, Performance
      UCn: …..
      Disbursement of Funds UC1: Deposit Funds Into Applicant’s Bank Account
      UCn: ……..
      UC1: Performance, Scalability, Data Reliability
      Risk Management ….. …..
      Service Accounts ….. …..

      1.2 Document dynamic value stream maps

      1. Create value stream maps that support your business objectives.
      • The value stream maps could belong to existing or new business objectives.
    • For each value stream map:
      • Determine use case(s), the actors, and their expected activity.

      *Refer to the next slide for an example of a dynamic value stream map.

      Download the Solution Architecture Template for documentation of dynamic value stream map

      Input

      • Business Goals
      • Some or All Existing Business Processes
      • Some or All Proposed New Business Processes

      Output

      • Dynamic Value Stream Maps for Multiple Use Roles and Use Cases

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect

      Example: Dynamic value stream map

      Loan Provision*

      *Value Stream Name: Usually has the same name as the capability it illustrates.

      Loan Application**; Disbursement of Fund**; Risk Management**; Service Accounts**

      **Value Stream Components: Specific functions that support the successful delivery of a value stream.

      Disbursement of Funds

      This image shows the relationship between depositing the load into the applicant's bank account, and the Applicant's bank, the Loan Applicant, and the Loan Supplier.

      Style #1:

      The use case Disbursement of Funds has three actors:

      1. A Loan Applicant who applied for a loan and got approved for one.
      2. A Loan Supplier who is the source for the funds.
      3. The Applicant’s Bank that has an account into which the funds are deposited.

      Style # 2:

      Loan Provision: Disbursement of Funds
      Use Case Actors Expectation
      Deposit Loan Into Applicant’s Bank Account
      1. Loan Applicant
      2. Loan Supplier
      3. Applicant’s Bank
      1. Should be able to see deposit in bank account
      2. Deposit funds into account
      3. Accept funds into account

      Mid-Phase 1 Checkpoint

      By now, the following items are ideally completed:

      • Mid-Phase 1 Checkpoint

      Start with an investigation of your architecture’s qualitative needs

      Quality attributes can be viewed as the -ilities (e.g. scalability, usability, reliability) that a software system needs to provide. A system not meeting any of its quality attribute requirements will likely not function as required. Examples of quality attributes are:

      1. Slow system response time
      2. Security breaches that result in loss of personal data
      3. A product feature upgrade that is not compatible with previous versions
      Examples of Qualitative Attributes
      Performance Compatibility Usability Reliability Security Maintainability
      • Response Time
      • Resource Utilization
      • System Capacity
      • Interoperability
      • Accessibility
      • User Interface
      • Intuitiveness
      • Availability
      • Fault Tolerance
      • Recoverability
      • Integrity
      • Non-Repudiation
      • Modularity
      • Reusability
      • Modifiability
      • Testability

      Focus on quality attributes that are architecturally significant.

      • Not every system requires every quality attribute.
      • Pay attention to those attributes without which the solution will not be able to satisfy a user’s abstract* expectation.
      • This set can be considered Architecturally Significant Requirements (ASR). ASR concern scenarios have the most impact on the architecture of the software system.
      • ASR are fundamental needs of the system and changing them in the future can be a costly and difficult exercise.

      *Abstract since attributes like performance and reliability are not directly measurable by a user.

      Stimulus Response Measurement Environmental Context

      For applicable use cases: (*Adapted from S Carnegie Mellon University, 2000)

      1. Determine the Stimulus (temporal, external, or internal) that puts stress on the system. For example, a VPN-accessed hospital management system is used for nurses to login at 8am every weekday.
      2. Describe how the system should Respond to the stimulus. For example, the hospital management system should complete a nurse login under 10ms on initiation of the HTTPS request.
      3. Set a Measurement criteria for determining the success of the response to the stimulus. For example, the system should be able to successfully respond to 98% of the HTTPS requests the first time.
      4. Note the environmental context under which the stimulus occurs, including any unusual conditions in effect.
      • The hospital management system needs to respond in under 10ms under typical load or peak load?
      • What is the time variance of peak loads, for example, an e-commerce system during a Black Friday sale?
      • How big is the peak load?

      Info-Tech Insight

      Three out of four is bad. Don’t architect for normal situations because the solution will be fragile and prone to catastrophic failure under unexpected events.
      Read article: Retail sites crash under weight of online Black Friday shoppers.

      Discover and evaluate the qualitative attributes needed for use cases or user stories

      Deposit Loan Into Applicant’s Bank Account

      Assume analysis is being done for a to-be developed system.

      User Loan Applicant
      Expectations On login to the web system, should be able to see accurate bank balance after loan funds are deposited.
      User signs into the online portal and opens their account balance page.
      Expected Response From System System creates a connection to the data source and renders it on the screen in under 10ms.
      Measurement Under Normal Loads:
      • Response in 10ms or less
      • Data should not be stale
      Under Peak Loads:
      • Response in 15ms or less
      • Data should not be stale
      Quality Attribute Required Required Attribute # 1: Performance
      • Design Decision: Reduce latency by placing authorization components closer to user’s location.
      Required Attribute # 2: Data Reliability
      • Design Decision: Use event-driven ETL pipelines.
      Required Attribute # 3: Scalability
      • Design Decision: Following Principle # 4 of the CSA (JIT Architecture), delay decision until necessary.

      Use cases developed in Phase 1.2 should be used here. (Adapted from the ATAM Utility Tree Method for Quality Attribute Engineering)

      Reduce technical debt while you are at it

      Deposit Loan Into Applicant’s Bank Account

      Assume analysis is being done for a to-be developed system.

      UserLoan Applicant
      ExpectationsOn login to the web system, should be able to see accurate bank balance after loan funds are deposited.
      User signs into the online portal and opens their account balance page.
      Expected Response From SystemSystem creates a connection to the data source and renders it on the screen in under 10ms.
      MeasurementUnder Normal Loads:
      • Response in 10ms or less
      • Data should not be stale
      Under Peak Loads:
      • Response in 15ms or less
      • Data should not be stale
      Quality Attribute RequiredRequired Attribute # 1: Performance
      • Design Decision: Reduce latency by placing authorization components closer to user’s location.

      Required Attribute # 2: Data Reliability

      • Expected is 15ms or less under peak loads, but average latency is 21ms.
      • Design Decision: Use event-driven ETL pipelines.

      Required Attribute # 3: Scalability

      • Data should not be stale and should sync instantaneously, but in some zip codes data synchronization is taking 8 hours.
      • Design Decision: Investigate integrations and flows across application, database, and infrastructure. (Note: A dedicated section for discussing scalability is presented in Phase 2.)

      1.3 Create a conceptual map between the value streams, use cases, and required architectural attributes

      1. For selected use cases completed in Phase 1.2:
      • Map the value stream to its associated use cases.
      • For each use case, list the required architectural quality attributes.

      Download the Solution Architecture Template for mapping value stream components to their required architectural attribute.

      Input

      • Use Cases
      • User Roles
      • Stimulus to System
      • Response From System
      • Response Measurement

      Output

      • List of Architectural Quality Attributes

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Prioritize architectural quality attributes to ensure a right-engineered solution

      Trade-offs are inherent in solution architecture. Scaling systems may impact performance and weaken security, while fault-tolerance and redundancy may improve availability but at higher than desired costs. In the end, the best solution is not always perfect, but balanced and right-engineered (versus over- or under-engineered).

      Loan Provision

      Loan Application → Disbursement of Funds → Risk Management → Service Accounts

      1. Map architecture attributes against the value stream components.
      • Use individual use cases to determine which attributes are needed for a value stream component.
      This image contains a screenshot of the table showing the importance of scalability, resiliance, performance, security, and data reliability for loan application, disbursement of funds, risk management, and service accounts.

      In our example, the prioritized list of architectural attributes are:

      • Security (4 votes for Very Important)
      • Data Reliability (2 votes for Very Important)
      • Scalability (1 vote for Very Important and 1 vote for Fairly Important) and finally
      • Resilience (1 vote for Very Important, 0 votes for Fairly Important and 1 vote for Mildly Important)
      • Performance (0 votes for Very Important, 2 votes for Fairly Important)

      1.4 Create a prioritized list of architectural attributes (from 1.3)

      1. Using the tabular structure shown on the previous slide:
      • Map each value stream component against architectural quality attributes.
      • For each mapping, indicate its importance using the green, blue, and yellow color scheme.

      Download the Solution Architecture Template and document the list of architectural attributes by priority.

      Input

      • List of Architectural Attributes From 1.3

      Output

      • Prioritized List of Architectural Attributes

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      End of Phase 1

      At the end of this Phase, you should have completed the following activities:

      • Documented a set of dynamic value stream maps along with selected use cases.
      • Using the SRME framework, identified quality attributes for the system under investigation.
      • Prioritized quality attributes for system use cases.

      Phase 2: Multi-Purpose Data and Security Architecture

      Phase 1

      1.1 Articulate an Architectural Vision
      1.2 Develop Dynamic Value Stream Maps
      1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
      1.4 Create a Prioritized List of Architectural Attributes

      Phase 2

      2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
      2.2 Document Security Architecture Risks and Mitigations

      Phase 3

      3.1 Document Scalability Architecture
      3.2 Document Performance Enhancing Architecture
      3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

      This phase will walk you through the following activities:

      • Understand the scalability, performance, resilience, and security needs of the business.

      This phase involves the following participants:

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect
      • Database Architect
      • Enterprise Architect

      Enhance Your Solution Architecture Practice

      Fragmented data environments need something to sew them together

      • A full 93% of enterprises have a multi-cloud strategy, with 87% having a hybrid-cloud environment in place.
      • On average, companies have data stored in 2.2 public and 2.2 private clouds as well as in various on-premises data repositories.
      This image contains a breakdown of the cloud infrastructure, including single cloud versus multi-cloud.

      Source: Flexera

      In addition, companies are faced with:

      • Access and integration challenges (Who is sending the data? Who is getting it? Can we trust them?)
      • Data format challenges as data may differ for each consumer and sender of data
      • Infrastructure challenges as data repositories/processors are spread out over public and private clouds, are on premises, or in multi-cloud and hybrid ecosystems
      • Structured vs. unstructured data

      A robust and reliable integrated data architecture is essential for any organization that aspires to be relevant and impactful in its industry.

      Data’s context and influence on a solution’s architecture cannot be overestimated

      Data used to be the new oil. Now it’s the life force of any organization that has serious aspirations of providing profit-generating products and services to customers. Architectural decisions about managing data have a significant impact on the sustainability of a software system as well as on quality attributes such as security, scalability, performance, and availability.

      Storage and Processing go hand in hand and are the mainstay of any data architecture. Due to their central position of importance, an architecture decision for storage and processing must be well thought through or they become the bottleneck in an otherwise sound system.

      Ingestion refers to a system’s ability to accept data as an input from heterogenous sources, in different formats, and at different intervals.

      Dissemination is the set of architectural design decisions that make a system’s data accessible to external consumers. Major concerns involve security for the data in motion, authorization, data format, concurrent requests for data, etc.

      Orchestration takes care of ensuring data is current and reliable, especially for systems that are decentralized and distributed.

      Data architecture requires alignment with a hybrid data management plan

      Most companies have a combination of data. They have data they own using on-premises data sources and on the cloud. Hybrid data management also includes external data, such as social network feeds, financial data, and legal information amongst many others.

      Data integration architectures have typically been put in one of two major integration patterns:

      Application to Application Integration (or “speed matters”) Analytical Data Integrations (or “send it to me when its all done”)
      • This domain is concerned with ensuring communication between processes.
      • Examples include patterns such as Service-Oriented Architecture, REST, Event Hubs and Enterprise Service Buses.
      • This domain is focused on integrating data from transactional processes towards enterprise business intelligence. It supports activities that require well-managed data to generate evidence-based insights.
      • Examples of this pattern are ELT, enterprise data warehouses, and data marts.

      Sidebar

      Difference between real-time, batch, and streaming data movements

      Real-Time

      • Reacts to data in seconds or even quicker.
      • Real-time systems are hard to implement.

      Batch

      • Batch processing deals with a large volume of data all at once and data-related jobs are typically completed simultaneously in non-stop, sequential order.
      • Batch processing is an efficient and low-cost means of data processing.
      • Execution of batch processing jobs can be controlled manually, providing further control over how the system treats its data assets.
      • Batch processing is only useful if there are no requirements for data to be fresh and current. Real-time systems are suited to processing data that requires these attributes.

      Streaming

      • Stream processing allows almost instantaneous analysis of data as it streams from one device to another.
      • Since data is analyzed quickly, storage may not be a concern (since only computed data is stored while raw data can be dispersed).
      • Streaming requires the flow of data into the system to equal the flow of data computing, otherwise issues of data storage and performance can rise.

      Modern data ingestion and dissemination frameworks keep core data assets current and accessible

      Data ingestion and dissemination frameworks are critical for keeping enterprise data current and relevant.

      Data ingestion/dissemination frameworks capture/share data from/to multiple data sources.

      Factors to consider when designing a data ingestion/dissemination architecture

      What is the mode for data movement?

      • The mode for data movement is directly influenced by the size of data being moved and the downstream requirements for data currency.
      • Data can move in real-time, as a batch, or as a stream.

      What is the ingestion/dissemination architecture deployment strategy?

      • Outside of critical security concerns, hosting on the cloud vs. on premises leads to a lower total cost of ownership (TCO) and a higher return on investment (ROI).

      How many different and disparate data sources are sending/receiving data?

      • Stability comes if there is a good idea about the data sources/recipient and their requirements.

      What are the different formats flowing through?

      • Is the data in the form of data blocks? Is it structured, semi-unstructured, or unstructured?

      What are expected performance SLAs as data flow rate changes?

      • Data change rate is defined as the size of changes occurring every hour. It helps in selecting the appropriate tool for data movement.
      • Performance is a derivative of latency and throughput, and therefore, data on a cloud is going to have higher latency and lower throughput then if it is kept on premises.
      • What is the transfer data size? Are there any file compression and/or file splits applied on the data? What is the average and maximum size of a block object per ingestion/dissemination operation?

      What are the security requirements for the data being stored?

      • The ingestion/dissemination framework should be able to work through a secure tunnel to collect/share data if needed.

      Sensible storage and processing strategy can improve performance and scalability and be cost-effective

      The range of options for data storage is staggering...

      … but that’s a good thing because the range of data formats that organizations must deal with is also richer than in the past.

      Different strokes for different workloads.

      The data processing tool to use may depend upon the workloads the system has to manage.

      Expanding upon the Risk Management use case (as part of the Loan Provision Capability), one of the outputs for risk assessment is a report that conducts a statistical analysis of customer profiles and separates those that are possibly risky. The data for this report is spread out across different data systems and will need to be collected in a master data management storage location. The business and data architecture team have discussed three critical system needs, noted below:

      Data Management Requirements for Risk Management Reporting Data Design Decision
      Needs to query millions of relational records quickly
      • Strong indexing
      • Strong caching
      • Message queue
      Needs a storage space for later retrieval of relational data
      • Data storage that scales as needed
      Needs turnkey geo-replication mechanism with document retrieval in milliseconds
      • Add NoSQL with geo-replication and quick document access

      Keep every core data source on the same page through orchestration

      Data orchestration, at its simplest, is the combination of data integration, data processing, and data concurrency management.

      Data pipeline orchestration is a cross-cutting process that manages the dependencies between your data integration tasks and scheduled data jobs.

      A task or application may periodically fail, and therefore, as a part of our data architecture strategy, there must be provisions for scheduling, rescheduling, replaying, monitoring, retrying, and debugging the entire data pipeline in a holistic way.

      Some of the functionality provided by orchestration frameworks are:

      • Job scheduling
      • Job parametrization
      • SLAs tracking, alerting, and notification
      • Dependency management
      • Error management and retries
      • History and audit
      • Data storage for metadata
      • Log aggregation
      Data Orchestration Has Three Stages
      Organize Transform Publicize
      Organizations may have legacy data that needs to be combined with new data. It’s important for the orchestration tool to understand the data it deals with. Transform the data from different sources into one standard type. Make transformed data easily accessible to stakeholders.

      2.1 Discuss and document data architecture decisions

      1. Using the value maps and associated use cases from Phase 1, determine the data system quality attributes.
      2. Use the sample tabular layout on the next slide or develop one of your own.

      Download the Solution Architecture Template for documenting data architecture decisions.

      Input

      • Value Maps and Use Cases

      Output

      • Initial Set of Data Design Decisions

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Example: Data Architecture

      Data Management Requirements for Risk Management Reporting Data Design Decision
      Needs to query millions of relational records quickly
      • Strong indexing
      • Strong caching
      • Message queue
      Needs a storage space for later retrieval of relational data
      • Data storage that scales as needed
      Needs turnkey geo-replication mechanism with document retrieval in milliseconds
      • Add NoSQL with geo-replication and quick document access

      There is no free lunch when making the most sensible security architecture decision; tradeoffs are a necessity

      Ensuring that any real system is secure is a complex process involving tradeoffs against other important quality attributes (such as performance and usability). When architecting a system, we must understand:

      • Its security needs.
      • Its security threat landscape.
      • Known mitigations for those threats to ensure that we create a system with sound security fundamentals.

      The first thing to do when determining security architecture is to conduct a threat and risk assessment (TRA).

      This image contains a sample threat and risk assessment. The steps are Understand: Until we thoroughly understand what we are building, we cannot secure it. Structure what you are building, including: System boundary, System structure, Databases, Deployment platform; Analyze: Use techniques like STRIDE and attack trees to analyze what can go wrong and what security problems this will cause; Mitigate: The security technologies to use, to mitigate your concerns, are discussed here. Decisions about using single sign-on (SSO) or role-based access control (RBAC), encryption, digital signatures, or JWT tokens are made. An important part of this step is to consider tradeoffs when implementing security mechanisms; validate: Validation can be done by experimenting with proposed mitigations, peer discussion, or expert interviews.

      Related Research

      Optimize Security Mitigation Effectiveness Using STRIDE

      • Have a clear picture of:
        • Critical data and data flows
        • Organizational threat exposure
        • Security countermeasure deployment and coverage
      • Understand which threats are appropriately mitigated and which are not.
      • Generate a list of initiatives to close security gaps.
      • Create a quantified risk and security model to reassess program and track improvement.
      • Develop measurable information to present to stakeholders.

      The 3A’s of strong security: authentication, authorization, and auditing

      Authentication

      Authentication mechanisms help systems verify that a user is who they claim to be.

      Examples of authentication mechanisms are:

      • Two-Factor Authentication
      • Single Sign-On
      • Multi-Factor Authentication
      • JWT Over OAUTH

      Authorization

      Authorization helps systems limit access to allowed features, once a user has been authenticated.

      Examples of authentication mechanisms are:

      • RBAC
      • Certificate Based
      • Token Based

      Auditing

      Securely recording security events through auditing proves that our security mechanisms are working as intended.

      Auditing is a function where security teams must collaborate with software engineers early and often to ensure the right kind of audit logs are being captured and recorded.

      Info-Tech Insight

      Defects in your application software can compromise privacy and integrity even if cryptographic controls are in place. A security architecture made after thorough TRA does not override security risk introduced due to irresponsible software design.

      Examples of threat and risk assessments using STRIDE and attack trees

      STRIDE is a threat modeling framework and is composed of:

      • Spoofing or impersonation of someone other than oneself
      • Tampering with data and destroying its integrity
      • Repudiation by bypassing system identity controls
      • Information disclosure to unauthorized persons
      • Denial of service that prevents system or parts of it from being used
      • Elevation of privilege so that attackers get rights they should not have
      Example of using STRIDE for a TRA on a solution using a payment system This image contains a sample attack tree.
      Spoofing PayPal Bad actor can send fraudulent payment request for obtaining funds.
      Tampering PayPal Bad actor accesses data base and can resend fraudulent payment request for obtaining funds.
      Repudiation PayPal Customer claims, incorrectly, their account made a payment they did not authorize.
      Disclosure PayPal Private service database has details leaked and made public.
      Denial of Service PayPal Service is made to slow down through creating a load on the network, causing massive build up of requests
      Elevation of Privilege PayPal Bad actor attempts to enter someone else’s account by entering incorrect password a number of times.

      2.2 Document security architecture risks and mitigations

      1. Using STRIDE, attack tree, or any other framework of choice:
      • Conduct a TRA for use cases identified in Phase 1.2
    • For each threat identified through the TRA, think through the implications of using authentication, authorization, and auditing as a security mechanism.
    • Download the Solution Architecture Template for documenting data architecture decisions.

      Input

      • Dynamic Value Stream Maps

      Output

      • Security Architecture Risks and Mitigations

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Product Owner
      • Security Team
      • Application Architect
      • Integration Architect

      Examples of threat and risk assessments using STRIDE

      Example of using STRIDE for a TRA on a solution using a payment system
      Threat System Component Description Quality Attribute Impacted Resolution
      Spoofing PayPal Bad actor can send fraudulent payment request for obtaining funds. Confidentiality Authorization
      Tampering PayPal Bad actor accesses data base and can resend fraudulent payment request for obtaining funds. Integrity Authorization
      Repudiation PayPal Customer claims, incorrectly, their account made a payment they did not authorize. Integrity Authentication and Logging
      Disclosure PayPal Private service database has details leaked and made public. Confidentiality Authorization
      Denial of Service PayPal Service is made to slow down through creating a load on the network, causing massive build up of requests Availability N/A
      Elevation of Privilege PayPal Bad actor attempts to enter someone else’s account by entering incorrect password a number of times. Confidentiality, Integrity, and Availability Authorization

      Phase 3: Upgrade Your System’s Availability

      Phase 1

      1.1 Articulate an Architectural Vision
      1.2 Develop Dynamic Value Stream Maps
      1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
      1.4 Create a Prioritized List of Architectural Attributes

      Phase 2

      2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
      2.2 Document Security Architecture Risks and Mitigations

      Phase 3

      3.1 Document Scalability Architecture
      3.2 Document Performance Enhancing Architecture
      3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

      This phase will walk you through the following activities:

      • Examine architecture for scalable and performant system designs
      • Integrate all design decisions made so far into a solution design decision log

      This phase involves the following participants:

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect
      • Database Architect
      • Enterprise Architect

      Enhance Your Solution Architecture Practice

      In a cloud-inspired system architecture, scalability takes center stage as an architectural concern

      Scale and scope of workloads are more important now than they were, perhaps, a decade and half back. Architects realize that scalability is not an afterthought. Not dealing with it at the outset can have serious consequences should an application workload suddenly exceed expectations.

      Scalability is …

      … the ability of a system to handle varying workloads by either increasing or decreasing the computing resources of the system.

      An increased workload could include:

      • Higher transaction volumes
      • A greater number of users

      Architecting for scalability is …

      … not easy since organizations may not be able to accurately judge, outside of known circumstances, when and why workloads may unexpectedly increase.

      A scalable architecture should be planned at the:

      • Application Level
      • Infrastructure Level
      • Database Level

      The right amount and kind of scalability is …

      … balancing the demands of the system with the supply of attributes.

      If demand from system > supply from system:

      • Services and products are not useable and deny value to customers.

      If supply from system > demand from system:

      • Excess resources have been paid for that are not being used.

      When discussing the scalability needs of a system, investigate the following, at a minimum:

      • In case workloads increase due to higher transaction volumes, will the system be able to cope with the additional stress?
      • In situations where workloads increase, will the system be able to support the additional stress without any major modifications being made to the system?
      • Is the cost associated with handling the increased workloads reasonable for the benefit it provides to the business?
      • Assuming the system doesn’t scale, is there any mechanism for graceful degradation?

      Use evidence-based decision making to ensure a cost-effective yet appropriate scaling strategy

      The best input for an effective scaling strategy is previously gathered traffic data mapped to specific circumstances.

      In some cases, either due to lack of monitoring or the business not being sure of its needs, scalability requirements are hard to determine. In such cases, use stated tactical business objectives to design for scalability. For example, the business might state its desire to achieve a target revenue goal. To accommodate this, a certain number of transactions would need to be conducted, assuming a particular conversion rate.

      Scaling strategies can be based on Vertical or Horizontal expansion of resources.
      Pros Cons
      Vertical
      Scale up through use of more powerful but limited number of resources
      • May not require frequent upgrades.
      • Since data is managed through a limited number of resources, it is easier to share and keep current.
      • Costly upfront.
      • Application, database, and infrastructure may not be able to make optimal use of extra processing power.
      • As the new, more powerful resource is provisioned, systems may experience downtime.
      • Lacks redundancy due to limited points of failure.
      • Performance is constrained by the upper limits of the infrastructure involved.
      Horizontal
      Scale out through use of similarly powered but larger quantity of resources
      • Cost-effective upfront.
      • System downtime is minimal, when scaling is being performed.
      • More redundance and fault-tolerance is possible since there are many nodes involved, and therefore, can replace failed nodes.
      • Performance can scale out as more nodes are added.
      • Upgrades may occur more often than in vertical scaling.
      • Increases machine footprints and administrative costs over time.
      • Data may be partitioned on multiple nodes, leading to administrative and data currency challenges.

      Info-Tech Insight

      • Scalability is the one attribute that sparks a lot of trade-off discussions. Scalable solutions may have to compromise on performance, cost, and data reliability.
      • Horizontal scalability is mostly always preferable over vertical scalability.

      Sidebar

      The many flavors of horizontal scaling

      Traffic Shard-ing

      Through this mechanism, incoming traffic is partitioned around a characteristic of the workload flowing in. Examples of partitioning characteristics are user groups, geo-location, and transaction type.

      Beware of:

      • Lack of data currency across shards.

      Copy and Paste

      As the name suggests, clone the compute resources along with the underlying databases. The systems will use a load balancer as the first point of contact between itself and the workload flowing in.

      Beware of:

      • Though this is a highly scalable model, it does introduce risks related to data currency across all databases.
      • In case master database writes are frequent, it could become a bottleneck for the entire system.

      Productization Through Containers

      This involves breaking up the system into specific functions and services and bundling their business rules/databases into deployable containers.

      Beware of:

      • Too many containers introduce the need to orchestrate the distributed architecture that results from a service-oriented approach.

      Start a scalability overview with a look at the database(s)

      To know where to go, you must know where you are. Before introducing architectural changes to database designs, use the right metrics to get an insight into the root cause of the problem(s).

      In a nutshell, the purpose of scaling solutions is to have the technology stack do less work for the most requested services/features or be able to effectively distribute the additional workload across multiple resources.

      For databases, to ensure this happens, consider these techniques:

      • Reuse data through caching on the server and/or the client. This eliminates the need for looking up already accessed data. Examples of caching are:
        • In-memory caching of data
        • Caching database queries
      • Implement good data retrieval techniques like indexes.
      • Divide labor at the database level.
        • Through setting up primary-secondary distribution of data. In such a setup, the primary node is involved in writing data to itself and passes on requests to secondary nodes for fulfillment.
        • Through setting up database shards (either horizontally or vertically).
          • In a horizontal shard, a data table is broken into smaller pieces with the same data model but unique data in it. The sum total of the shared databases contains all the data in the primary data table.
          • In a vertical shard, a data table is broken into smaller pieces, but each piece may have a subset of the data columns. The data’s corresponding columns are put into the table where the column resides.

      Info-Tech Insight

      A non-scalable architecture has more than just technology-related ramifications. Hoping that load balancers or cloud services will manage scalability-related issues is bound to have economic impacts as well.

      Sidebar

      Caching Options

      CSA PRINCIPLE 5 applies to any decision that supports system scalability.
      “X-ilities Over Features”

      Database Caching
      Fetches and stores result of database queries in memory. Subsequent requests to the database for the same queries will investigate the cache before making a connection with the database.
      Tools like Memcached or Redis are used for database caching.

      Precompute Database Caching
      Unlike database caching, this style of caching precomputes results of queries that are popular and frequently used. For example, a database trigger could execute several predetermined queries and have them ready for consumption. The precomputed results may be stored in a database cache.

      Application Object Caching
      Stores computed results in a cache for later retrieval. For data sources, which are not changing frequently and are part of a computation output, application caching will remove the need to connect with a database.

      Proxy Caching
      Caches retrieved web pages on a proxy server and makes them available for the next time the page is requested.

      The intra- and inter-process communication of the systems middle tier can become a bottleneck

      To synchronize or not to synchronize?

      A synchronous request (doing one thing at a time) means that code execution will wait for the request to be responded to before continuing.

      • A synchronous request is a blocking event and until it is completed, all following requests will have to wait for getting their responses.
      • An increasing workload on a synchronous system may impact performance.
      • Synchronous interactions are less costly in terms of design, implementation, and maintenance.
      • Scaling options include:
      1. Vertical scale up
      2. Horizontal scale out of application servers behind a load balancer and a caching technique (to minimize data retrieval roundtrips)
      3. Horizonal scale out of database servers with data partitioning and/or data caching technique

      Use synchronous requests when…

      • Each request to a system sets the necessary precondition for a following request.
      • Data reliability is important, especially in real-time systems.
      • System flows are simple.
      • Tasks that are typically time consuming, such as I/O, data access, pre-loading of assets, are completed quickly.

      Asynchronous requests (doing many things at the same time) do not block the system they are targeting.

      • It is a “fire and forget” mechanism.
      • Execution on a server/processor is triggered by the request, however, additional technical components (callbacks) for checking the state of the execution must be designed and implemented.
      • Asynchronous interactions require additional time to be spent on implementation and testing.
      • With asynchronous interactions, there is no guarantee the request initiated any processing until the callbacks check the status of the executed thread.

      Use asynchronous requests when…

      • Tasks are independent in nature and don’t require inter-task communication.
      • Systems flows need to be efficient.
      • The system is using event-driven techniques for processing.
      • Many I/O tasks are involved.
      • The tasks are long running.

      Sidebar

      Other architectural tactics for inter-process communication

      STATELESS SERVICES VERSUS STATEFUL SERVICES
      • Does not require any additional data, apart from the bits sent through with the request.
      • Without implementing a caching solution, it is impossible to access the previous data trail for a transaction session.
      • In addition to the data sent through with the request, require previous data sent to complete processing.
      • Requires server memory to store the additional state data. With increasing workloads, this could start impacting the server’s performance.
      It is generally accepted that stateless services are better for system scalability, especially if vertical scaling is costly and there is expectation that workloads will increase.
      MICROSERVICES VERSUS SERVERLESS FUNCTIONS
      • Services are designed as small units of code with a single responsibility and are available on demand.
      • A microservices architecture is easily scaled horizontally by adding a load balancer and a caching mechanism.
      • Like microservices, these are small pieces of code designed to fulfill a single purpose.
      • Are provided only through cloud vendors, and therefore, there is no need to worry about provisioning of infrastructure as needs increase.
      • Stateless by design but the life cycle of a serverless function is vendor controlled.
      Serverless function is an evolving technology and tightly controlled by the vendor. As and when vendors make changes to their serverless products, your own systems may need to be modified to make the best use of these upgrades.

      A team that does not measure their system’s scalability is a team bound to get a 5xx HTTP response code

      A critical aspect of any system is its ability to monitor and report on its operational outcomes.

      • Using the principle of continuous testing, every time an architectural change is introduced, a thorough load and stress testing cycle should be executed.
      • Effective logging and use of insightful metrics helps system design teams make data-driven decisions.
      • Using principle of site reliability engineering and predictive analytics, teams can be prepared for any unplanned exaggerated stimulus on the system and proactively set up remedial steps.

      Any system, however well architected, will break one day. Strategically place kill-switches to counter any failures and thoroughly test their functioning before releasing to production.

      • Using Principles 2 and 9 of the CSA, (include kill-switches and architect for x-ilities over features), introduce tactics at the code and higher levels that can be used to put a system in its previous best state in case of failure.
      • Examples of such tactics are:
        • Feature flags for turning on/off code modules that impact x-ilities.
        • Implement design patterns like throttling, autoscaling, and circuit breaking.
        • Writing extensive log messages that bubble up as exceptions/error handling from the code base. *Logging can be a performance drag. Use with caution as even logging code is still code that needs CPU and data storage.

      Performance is a system’s ability to satisfy time-bound expectations

      Performance can also be defined as the ability for a system to achieve its timing requirements, using available resources, under expected full-peak load:

      (International Organization for Standardization, 2011)

      • Performance and scalability are two peas in a pod. They are related to each other but are distinct attributes. Where scalability refers to the ability of a system to initiate multiple simultaneous processes, performance is the system’s ability to complete the processes within a mandated average time period.
      • Degrading performance is one of the first red flags about a system’s ability to scale up to workload demands.
      • Mitigation tactics for performance are very similar to the tactics for scalability.

      System performance needs to be monitored and measured consistently.

      Measurement Category 1: System performance in terms of end-user experience during different load scenarios.

      • Response time/latency: Length of time it takes for an interaction with the system to complete.
      • Turnaround time: Time taken to complete a batch of tasks.
      • Throughput: Amount of workload a system is capable of handling in a unit time period.

      Measurement Category 2: System performance in terms of load managed by computational resources.

      • Resource utilization: The average usage of a resource (like CPU) over a period. Peaks and troughs indicate excess vs. normal load times.
      • Number of concurrent connections: Simultaneous user requests that a resource like a server can successfully deal with at once.
      • Queue time: The turnaround time for a specific interaction or category of interactions to complete.

      Architectural tactics for performance management are the same as those used for system scalability

      Application Layer

      • Using a balanced approach that combines CSA Principle 7 (Good architecture comes in small packages) and Principle 10 (Architect for products, not projects), a microservices architecture based on domain-driven design helps process performance. Microservices use lightweight HTTP protocols and have loose coupling, adding a degree of resilience to the system as well. *An overly-engineered microservices architecture can become an orchestration challenge.
      • The code design must follow standards that support performance. Example of standards is SOLID*.
      • Serverless architectures can run application code from anywhere – for example, from edge servers close to an end user – thereby reducing latency.

      Database Layer

      • Using the right database technologies for persistence. Relational databases have implicit performance bottlenecks (which get exaggerated as data size grows along with indexes), and document store database technologies (key-value or wide-column) can improve performance in high-read environments.
      • Data sources, especially those that are frequently accessed, should ideally be located close to the application servers. Hybrid infrastructures (cloud and on premises mixed) can lead to latency when a cloud-application is accessing on-premises data.
      • Using a data partitioning strategy, especially in a domain-driven design architecture, can improve the performance of a system.

      Performance modeling and continuous testing makes the SRE a happy engineer

      Performance modeling and testing helps architecture teams predict performance risks as the solution is being developed.
      (CSA Principle 12: Test the solution architecture like you test your solution’s features)

      Create a model for your system’s hypothetical performance testing by breaking an end-to-end process or use case into its components. *Use the SIPOC framework for decomposition.

      This image contains an example of modeled performance, showing the latency in the data flowing from different data sources to the processing of the data.

      In the hypothetical example of modeled performance above:

      • The longest period of latency is 15ms.
      • The processing of data takes 30ms, while the baseline was established at 25ms.
      • Average latency in sending back user responses is 21ms – 13ms slower than expected.

      The model helps architects:

      • Get evidence for their assumptions
      • Quantitatively isolate bottlenecks at a granular level

      Model the performance flow once but test it periodically

      Performance testing measures the performance of a software system under normal and abnormal loads.

      Performance testing process should be fully integrated with software development activities and as automated as possible. In a fast-moving Agile environment, teams should attempt to:

      • Shift-left performance testing activities.
      • Use performance testing to pinpoint performance bottlenecks.
      • Take corrective action, as quickly as possible.

      Performance testing techniques

      • Normal load testing: Verifies the system’s behavior under the expected normal load to ensure that its performance requirements are met. Load testing can be used to measure response time, responsiveness, turnaround time, and throughput.
      • Expected maximum load testing: Like the normal load testing process, ensures system meets its performance requirements under expected maximum load.
      • Stress testing: Evaluates system behavior when processing loads beyond the expected maximum.

      *In a real production scenario, a combination of these tests are executed on a regular basis to monitor the performance of the system over a given period.

      3.1-3.2 Discuss and document initial decisions made for architecture scalability and performance

      1. Use the outcomes from either or both Phases 1.3 and 1.4.
      • For each value stream component, list the architecture decisions taken to ensure scalability and performance at client-facing and/or business-rule layers.

      Download the Solution Architecture Template for documenting data architecture decisions.

      Input

      • Output From Phase 1.3 and/or From Phase 1.4

      Output

      • Initial Set of Design Decisions Made for System Scalability and Performance

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Example: Architecture decisions for scalability and performance

      Value Stream Component Design Decision for User Interface Layer Design Decisions for Middle Processing Layer
      Loan Application Scalability: N/A
      Resilience: Include circuit breaker design in both mobile app and responsive websites.
      Performance: Cache data client.
      Scalability: Scale vertically (up) since loan application processing is very compute intensive.
      Resilience: Set up fail-over replica.
      Performance: Keep servers in the same geo-area.
      Disbursement of Funds *Does not have a user interface Scalability: Scale horizontal when traffic reaches X requests/second.
      Resilience: Create microservices using domain-driven design; include circuit breakers.
      Performance: Set up application cache; synchronous communication since order of data input is important.
      …. …. ….

      3.3 Combine the different architecture design decisions into a unified solution architecture

      Download the Solution Architecture Template for documenting data architecture decisions.

      Input

      • Output From Phase 1.3 and/or From Phase 1.4
      • Output From Phase 2.1
      • Output From Phase 2.2
      • Output From 3.1 and 3.2

      Output

      • List of Design Decisions for the Solution

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Putting it all together is the bow that finally ties this gift

      This blueprint covered the domains tagged with the yellow star.

      This image contains a screenshot of the solution architecture framework found earlier in this blueprint, with stars next to Data Architecture, Security, Performance, and Stability.

      TRADEOFF ALERT

      The right design decision is never the same for all perspectives. Along with varying opinions, comes the “at odds with each other set” of needs (scalability vs. performance, or access vs. security).

      An evidence-based decision-making approach using a domain-driven design strategy is a good mix of techniques for creating the best (right?) solution architecture.

      This image contains a screenshot of a table that summarizes the themes discussed in this blueprint.

      Summary of accomplishment

      • Gained understanding and clarification of the stakeholder objectives placed on your application architecture.
      • Completed detailed use cases and persona-driven scenario analysis and their architectural needs through SRME.
      • Created a set of design decisions for data, security, scalability, and performance.
      • Merged the different architecture domains dealt with in this blueprint to create a holistic view.

      Bibliography

      Ambysoft Inc. “UML 2 Sequence Diagrams: An Agile Introduction.” Agile Modeling, n.d. Web.

      Bass, Len, Paul Clements, and Rick Kazman. Software Architecture in Practices: Third Edition. Pearson Education, Inc. 2003.

      Eeles, Peter. “The benefits of software architecting.” IBM: developerWorks, 15 May 2006. Web.

      Flexera 2020 State of the Cloud Report. Flexera, 2020. Web. 19 October 2021.

      Furdik, Karol, Gabriel Lukac, Tomas Sabol, and Peter Kostelnik. “The Network Architecture Designed for an Adaptable IoT-based Smart Office Solution.” International Journal of Computer Networks and Communications Security, November 2013. Web.

      Ganzinger, Matthias, and Petra Knaup. “Requirements for data integration platforms in biomedical research networks: a reference model.” PeerJ, 5 February 2015. (https://peerj.com/articles/755/).

      Garlan, David, and Mary Shaw. An Introduction to Software Architecture. CMU-CS-94-166, School of Computer Science Carnegie Mellon University, January 1994.

      Gupta, Arun. “Microservice Design Patterns.” Java Code Geeks, 14 April 2015. Web.

      How, Matt. The Modern Data Warehouse in Azure. O’Reilly, 2020.

      ISO/IEC 17788:2014: Information technology – Cloud computing, International Organization for Standardization, October 2014. Web.

      ISO/IEC 18384-1:2016: Information technology – Reference Architecture for Service Oriented Architecture (SOA RA), International Organization for Standardization, June 2016. Web.

      ISO/IEC 25010:2011(en) Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — System and software quality models. International Organization for Standardization, March 2011. Web.

      Kazman, R., M. Klein, and P. Clements. ATAM: Method for Architecture Evaluation. S Carnegie Mellon University, August 2000. Web.

      Microsoft Developer Network. “Chapter 16: Quality Attributes.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

      Microsoft Developer Network. “Chapter 2: Key Principles of Software Architecture.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

      Microsoft Developer Network. “Chapter 3: Architectural Patterns and Styles.” Microsoft Application Architecture Guide. 2nd Ed., 14 January 2010. Web.

      Microsoft Developer Network. “Chapter 5: Layered Application Guidelines.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

      Mirakhorli, Mehdi. “Common Architecture Weakness Enumeration (CAWE).” IEEE Software, 2016. Web.

      Moore, G. A. Crossing the Chasm, 3rd Edition: Marketing and Selling Disruptive Products to Mainstream Customers (Collins Business Essentials) (3rd ed.). Harper Business, 2014.

      OASIS. “Oasis SOA Reference Model (SOA RM) TC.” OASIS Open, n.d. Web.

      Soni, Mukesh. “Defect Prevention: Reducing Costs and Enhancing Quality.” iSixSigma, n.d. Web.

      The Open Group. TOGAF 8.1.1 Online, Part IV: Resource Base, Developing Architecture Views. TOGAF, 2006. Web.

      The Open Group. Welcome to the TOGAF® Standard, Version 9.2, a standard of The Open Group. TOGAF, 2018. Web.

      Watts, S. “The importance of solid design principles.” BMC Blogs, 15 June 2020. 19 October 2021.

      Young, Charles. “Hexagonal Architecture–The Great Reconciler?” Geeks with Blogs, 20 Dec 2014. Web.

      APPENDIX A

      Techniques to enhance application architecture.

      Consider the numerous solutions to address architecture issues or how they will impact your application architecture

      Many solutions exist for improving the layers of the application stack that may address architecture issues or impact your current architecture. Solutions range from capability changes to full stack replacement.

      Method Description Potential Benefits Risks Related Blueprints
      Business Capabilities:
      Enablement and enhancement
      • Introduce new business capabilities by leveraging unused application functionalities or consolidate redundant business capabilities.
      • Increase value delivery to stakeholders.
      • Lower IT costs through elimination of applications.
      • Increased use of an application could overload current infrastructure.
      • IT cannot authorize business capability changes.
      Use Info-Tech’s Document Your Business Architecture blueprint to gain better understanding of business and IT alignment.
      Removal
      • Remove existing business capabilities that don’t contribute value to the business.
      • Lower operational costs through elimination of unused and irrelevant capabilities.
      • Business capabilities may be seen as relevant or critical by different stakeholder groups.
      • IT cannot authorize business capability changes.
      Use Info-Tech’s Build an Application Rationalization Framework to rationalize your application portfolio.
      Business Process:
      Process integration and consolidation
      • Combine multiple business processes into a single process.
      • Improved utilization of applications in each step of the process.
      • Reduce business costs through efficient business processes.
      • Minimize number of applications required to execute a single process.
      • Significant business disruption if an application goes down and is the primary support for business processes.
      • Organizational pushback if process integration involves multiple business groups.
      Business Process (continued):
      Process automation
      • Automate manual business processing tasks.
      • Reduce manual processing errors.
      • Improve speed of delivery.
      • Significant costs to implement automation.
      • Automation payoffs are not immediate.
      Lean business processes
      • Eliminate redundant steps.
      • Streamline existing processes by focusing on value-driven steps.
      • Improve efficiency of business process through removal of wasteful steps.
      • Increase value delivered at the end of the process.
      • Stakeholder pushback from consistently changing processes.
      • Investment from business is required to fit documentation to the process.
      Outsource the process
      • Outsource a portion of or the entire business process to a third party.
      • Leverage unavailable resources and skills to execute the business process.
      • Loss of control over process.
      • Can be costly to bring the process back into the business if desired in the future.
      Business Process (continued):
      Standardization
      • Implement standards for business processes to improve uniformity and reusability.
      • Consistently apply the same process across multiple business units.
      • Transparency of what is expected from the process.
      • Improve predictability of process execution.
      • Process bottlenecks may occur if a single group is required to sign off on deliverables.
      • Lack of enforcement and maintenance of standards can lead to chaos if left unchecked.
      User Interface:
      Improve user experience (UX)
      • Eliminate end-user emotional, mechanical, and functional friction by improving the experience of using the application.
      • UX encompasses both the interface and the user’s behavior.
      • Increase satisfaction and adoption rate from end users.
      • Increase brand awareness and user retention.
      • UX optimizations are only focused on a few user personas.
      • Current development processes do not accommodate UX assessments
      Code:
      Update coding language
      Translate legacy code into modern coding language.
      • Coding errors in modern languages can have lesser impact on the business processes they support.
      • Modern languages tend to have larger pools of coders to hire.
      • Increase availability of tools to support modern languages.
      • Coding language changes can create incompatibilities with existing infrastructure.
      • Existing coding translation tools do not offer 100% guarantee of legacy function retention.
      Code (continued):
      Open source code
      • Download pre-built code freely available in open source communities.
      • Code is rapidly evolving in the community to meet current business needs.
      • Avoid vendor lock-in from proprietary software
      • Community rules may require divulgence of work done with open source code.
      • Support is primarily provided through community, which may not address specific concerns.
      Update the development toolchain
      • Acquire new or optimize development tools with increased testing, build, and deployment capabilities.
      • Increase developer productivity.
      • Increase speed of delivery and test coverage with automation.
      • Drastic IT overhauls required to implement new tools such as code conversion, data migration, and development process revisions.
      Update source code management
      • Optimize source code management to improve coding governance, versioning, and development collaboration.
      • Ability to easily roll back to previous build versions and promote code to other environments.
      • Enable multi-user development capabilities.
      • Improve conflict management.
      • Some source code management tools cannot support legacy code.
      • Source code management tools may be incompatible with existing development toolchain.
      Data:
      Outsource extraction
      • Outsource your data analysis and extraction to a third party.
      • Lower costs to extract and mine data.
      • Leverage unavailable resources and skills to translate mined data to a usable form.
      • Data security risks associated with off-location storage.
      • Data access and control risks associated with a third party.
      Update data structure
      • Update your data elements, types (e.g. transactional, big data), and formats (e.g. table columns).
      • Standardize on a common data definition throughout the entire organization.
      • Ease data cleansing, mining, analysis, extraction, and management activities.
      • New data structures may be incompatible with other applications.
      • Implementing data management improvements may be costly and difficult to acquire stakeholder buy-in.
      Update data mining and data warehousing tools
      • Optimize how data is extracted and stored.
      • Increase the speed and reliability of the data mined.
      • Perform complex analysis with modern data mining and data warehousing tools.
      • Data warehouses are regularly updated with the latest data.
      • Updating data mining and warehousing tools may create incompatibilities with existing infrastructure and data sets.
      Integration:
      Move from point-to-point to enterprise service bus (ESB)
      • Change your application integration approach from point-to-point to an ESB.
      • Increase the scalability of enterprise services by exposing applications to a centralized middleware.
      • Reduce the number of integration tests to complete with an ESB.
      • Single point of failure can cripple the entire system.
      • Security threats arising from centralized communication node.
      Leverage API integration
      • Leverage application programming interfaces (APIs) to integrate applications.
      • Quicker and more frequent transfers of lightweight data compared to extract, load, transfer (ETL) practices.
      • Increase integration opportunities with other modern applications and infrastructure (including mobile devices).
      • APIs are not as efficient as ETL when handling large data sets.
      • Changing APIs can break compatibility between applications if not versioned properly.

      It wasn't me

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk

      You heard the message before, and yet....  and yet it does not sink in.

      In july 2019 already, according to retruster:

      • The average financial cost of a data breach is $3.86m (IBM)
      • Phishing accounts for 90% of data breaches
      • 15% of people successfully phished will be targeted at least one more time within the year
      • BEC scams accounted for over $12 billion in losses (FBI)
      • Phishing attempts have grown 65% in the last year
      • Around 1.5m new phishing sites are created each month (Webroot)
      • 76% of businesses reported being a victim of a phishing attack in the last year
      • 30% of phishing messages get opened by targeted users (Verizon)

      This is ... this means we, as risk professionals may be delivering our messsage the wrong way. So, I really enjoyed my colleague Nick Felix (who got it from Alison Francis) sending me the URL of this video: Enjoy, but mostly: learn, because we want our children to enjoy the fruits of our work.

      Register to read more …

      Develop a COVID-19 Pandemic Response Plan

      • Buy Link or Shortcode: {j2store}420|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • IT departments are being asked to rapidly ramp up work-from-home capabilities and other business process workarounds.
      • Crisis managers are experiencing a pandemic more severe than what they’ve managed in the past.
      • Organizations are scrambling to determine how they can keep their businesses running through this pandemic.

      Our Advice

      Critical Insight

      • Obstacles to working from home go beyond internet speed and needing a laptop. Business input is critical to uncover unexpected obstacles.
      • IT needs to address a range of issues from security risk to increased service desk demand from users who don’t normally work from home.
      • Resist the temptation to bypass IT processes – your future-self will thank you for tracking all those assets about to go out the door.

      Impact and Result

      • Start with crisis management fundamentals – identify crisis management roles and exercise appropriate crisis communication.
      • Prioritize business processes and work-from-home requirements. Not everyone can be set up on day one.
      • Don’t over-complicate your work-from-home deployment plan. A simple spreadsheet (see the Work-from-Home Requirements Tool) to track requirements can be very effective.

      Develop a COVID-19 Pandemic Response Plan Research & Tools

      Start here

      Stay up to date on COVID-19 and the resources available to you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Develop a COVID-19 Pandemic Response Plan Storyboard

      1. Manage the pandemic crisis

      Identify key roles and immediate steps to manage this crisis.

      • Pandemic Response Plan Example

      2. Create IT’s plan to support the pandemic response plan

      Plan the deployment of a work-from-home initiative.

      • Work-From-Home Requirements Tool
      [infographic]

      Take Control of Cloud Costs on Microsoft Azure

      • Buy Link or Shortcode: {j2store}426|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $125,999 Average $ Saved
      • member rating average days saved: 50 Average Days Saved
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy
      • Traditional IT budgeting and procurement processes don't work for public cloud services.
      • The self-service nature of the cloud means that often the people provisioning cloud resources aren't accountable for the cost of those resources.
      • Without centralized control or oversight, organizations can quickly end up with massive Azure bills that exceed their IT salary cost.

      Our Advice

      Critical Insight

      • Most engineers care more about speed of feature delivery and reliability of the system than they do about cost.
      • Often there are no consequences for overarchitecting or overspending on Azure.
      • Many organizations lack sufficient visibility into their Azure spend, making it impossible to establish accountability and controls.

      Impact and Result

      • Define roles and responsibilities.
      • Establish visibility.
      • Develop processes, procedures, and policies.

      Take Control of Cloud Costs on Microsoft Azure Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should take control of cloud costs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a cost accountability framework

      Assess your current state, define your cost allocation model, and define roles and responsibilities.

      • Cloud Cost Management Worksheet
      • Cloud Cost Management Capability Assessment
      • Cloud Cost Management Policy
      • Cloud Cost Glossary of Terms

      2. Establish visibility

      Define dashboards and reports, and document account structure and tagging requirements.

      • Service Cost Cheat Sheet for Azure

      3. Define processes and procedures

      Establish governance for tagging and cost control, define process for right-sizing, and define process for purchasing commitment discounts.

      • Right-Sizing Workflow (Visio)
      • Right-Sizing Workflow (PDF)
      • Commitment Purchasing Workflow (Visio)
      • Commitment Purchasing Workflow (PDF)

      4. Build an implementation plan

      Document process interactions, establish program KPIs, and build implementation roadmap and communication plan.

      • Cloud Cost Management Task List
      [infographic]

      Workshop: Take Control of Cloud Costs on Microsoft Azure

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build a Cost Accountability Framework

      The Purpose

      Establish clear lines of accountability and document roles & responsibilities to effectively manage cloud costs.

      Key Benefits Achieved

      Understanding of key areas to focus on to improve cloud cost management capabilities.

      Activities

      1.1 Assess current state

      1.2 Determine cloud cost model

      1.3 Define roles & responsibilities

      Outputs

      Cloud cost management capability assessment

      Cloud cost model

      Roles & responsibilities

      2 Establish Visibility

      The Purpose

      Establish visibility into cloud costs and drivers of those costs.

      Key Benefits Achieved

      Better understanding of what is driving costs and how to keep them in check.

      Activities

      2.1 Develop architectural patterns

      2.2 Define dashboards and reports

      2.3 Define account structure

      2.4 Document tagging requirements

      Outputs

      Architectural patterns; service cost cheat sheet

      Dashboards and reports

      Account structure

      Tagging scheme

      3 Define Processes & Procedures

      The Purpose

      Develop processes, procedures, and policies to control cloud costs.

      Key Benefits Achieved

      Improved capability of reducing costs.

      Documented processes & procedures for continuous improvement.

      Activities

      3.1 Establish governance for tagging

      3.2 Establish governance for costs

      3.3 Define right-sizing process

      3.4 Define purchasing process

      3.5 Define notification and alerts

      Outputs

      Tagging policy

      Cost control policy

      Right-sizing process

      Commitment purchasing process

      Notifications and alerts

      4 Build an Implementation Plan

      The Purpose

      Document next steps to implement & improve cloud cost management program.

      Key Benefits Achieved

      Concrete roadmap to stand up and/or improve the cloud cost management program.

      Activities

      4.1 Document process interaction changes

      4.2 Define cloud cost program KPIs

      4.3 Build implementation roadmap

      4.4 Build communication plan

      Outputs

      Changes to process interactions

      Cloud cost program KPIs

      Implementation roadmap

      Communication plan

      Reduce Risk With Rock-Solid Service-Level Agreements

      • Buy Link or Shortcode: {j2store}365|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Organizations can struggle to understand what service-level agreements (SLAs) are required and how they can differ depending on the service type. In addition, these other challenges can also cloud an organization’s knowledge of SLAs:

      • No standardized SLAs documents, service levels, or metrics
      • Dealing with lost productivity and revenue due to persistent downtime
      • Not understanding SLAs components and what service levels are required for a particular service
      • How to manage the SLA and hold the vendor accountable

      Our Advice

      Critical Insight

      SLAs need to have clear, easy-to-measure objectives, to meet expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to its obligations.

      Impact and Result

      This project will provide several benefits and learnings for almost all IT workers:

      • Better understanding of an SLA framework and required SLA elements
      • Standardized service levels and metrics aligned to the organization’s requirements
      • Reduced time in reviewing, evaluating, and managing service provider SLAs

      Reduce Risk With Rock-Solid Service-Level Agreements Research & Tools

      Start here – Read our Executive Brief

      Understand how to resolve your challenges with SLAs and their components and ensuring adequate metrics. Learn how to create meaningful SLAs that meet your requirements and manage them effectively.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand SLA elements – Understand the elements of SLAs, service types, service levels, metrics/KPIs, monitoring, and reporting

      • SLA Checklist
      • SLA Evaluation Tool

      2. Create requirements – Create your own SLA criteria and templates that meet your organization’s requirements

      • SLA Template & Metrics Reference Guide

      3. Manage obligations – Learn the SLA Management Framework to track providers’ performance and adherence to their commitments.

      • SLO Tracker & Trending Tool

      Infographic

      Workshop: Reduce Risk With Rock-Solid Service-Level Agreements

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Elements of SLAs

      The Purpose

      Understand key components and elements of an SLA.

      Key Benefits Achieved

      Properly evaluate an SLA for required elements.

      Activities

      1.1 SLA overview, objectives, SLA types, service levels

      1.2 SLA elements and objectives

      1.3 SLA components: monitoring, reporting, and remedies

      1.4 SLA checklist review

      Outputs

      SLA Checklist 

      Evaluation Process

      SLA Checklist

      Evaluation Process

      SLA Checklist

      Evaluation Process

      SLA Checklist

      Evaluation Process

      2 Create SLA Criteria and Management Framework

      The Purpose

      Apply knowledge of SLA elements to create internal SLA requirements.

      Key Benefits Achieved

      Templated SLAs that meet requirements.

      Framework to manage SLOs.

      Activities

      2.1 Creating SLA criteria and requirements

      2.2 SLA templates and policy

      2.3 SLA evaluation activity

      2.4 SLA Management Framework

      2.5 SLA monitoring, tracking, and remedy reconciliation

      Outputs

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Further reading

      Reduce Risk With Rock-Solid Service-Level Agreements

      Hold Service Providers more accountable to their contractual obligations with meaningful SLA components & remedies

      EXECUTIVE BRIEF

      Analyst Perspective

      Reduce Risk With Rock-Solid Service-Level Agreements

      Every year organizations outsource more and more IT infrastructure to the cloud, and IT operations to managed service providers. This increase in outsourcing presents an increase in risk to the CIO to save on IT spend through outsourcing while maintaining required and expected service levels to internal customers and the organization. Ensuring that the service provider constantly meets their obligations so that the CIO can meet their obligation to the organization can be a constant challenge. This brings forth the importance of the Service Level Agreement.

      Research clearly indicates that there is a general lack of knowledge when comes to understanding the key elements of a Service Level Agreement (SLA). Even less understanding of the importance of the components of Service Levels and the Service Level Objectives (SLO) that service provider needs to meet so that the outsourced service consistently meets requirements of the organization. Most service providers are very good at providing the contracted service and they all are very good at presenting SLOs that are easy to meet with very few or no ramifications if they don’t meet their objectives. IT leaders need to be more resolute in only accepting SLOs that are meaningful to their requirements and have meaningful, proactive reporting and associated remedies to hold service providers accountable to their obligations.

      Ted Walker

      Principal Research Director, Vendor Practice

      Info-Tech Research Group

      Executive Brief

      Vendors provide service level commitments to customers in contracts to show a level of trust, performance, availability, security, and responsiveness in an effort create a sense of confidence that their service or platform will meet your organization’s requirements and expectations. Sifting through these promises can be challenging for many IT Leaders. Customers struggle to understand and evaluate what’s in the SLA – are they meaningful and protect your investment? Not understanding the details of SLAs applicable to various types of Service (SaaS, MSP, Service Desk, DR, ISP) can lead to financial and compliance risk for the organization as well as poor customer satisfaction.

      This project will provide IT leadership the knowledge & tools that will allow them to:

      • Understand what SLAs are and why they need them.
      • Develop standard SLAs that meet the organization’s requirements.
      • Negotiate meaningful remedies aligned to Service Levels metrics or KPIs.
      • Create SLA monitoring & reporting and remedies requirements to hold the provider accountable.

      This research:

      1. Is designed for:
      • The CIO or CFO who needs to better understand their provider’s SLAs.
      • The CIO or BU that could benefit from improved service levels.
      • Vendor management who needs to standardize SLAs for the organization IT leadership that needs consistent service levels to the business
      • The contract manager who needs a better understanding of contact SLAs
    • Will help you:
      • Understand what a Service Level Agreement is and what it’s for
      • Learn what the components are of an SLA and why you need them
      • Create a checklist of required SLA elements for your organization
      • Develop standard SLA template requirements for various service types
      • Learn the importance of SLA management to hold providers accountable
    • Will also assist:
      • Vendor management
      • Procurement and sourcing
      • Organizations that need to understand SLAs within contract language
      • With creating standardized monitoring & reporting requirements
      • Organizations get better position remedies & credits to hold vendors accountable to their commitments
    • Reduce Risk With Rock-Solid Service-Level Agreements (SLAs)

      Hold service providers more accountable to their contractual obligations with meaningful SLA components and remedies

      The Problem

      IT Leadership doesn't know how to evaluate an SLA.

      Misunderstanding of obligations given the type of service provided (SAAS, IAAS, DR/BCP, Service Desk)

      Expectations not being met, leading to poor service from the provider.

      No way to hold provider accountable.

      Why it matters

      SLAS are designed to ensure that outsourced IT services meet the requirements and expectations of the organization. Well-written SLAs with all the required elements, metrics, and remedies will allow IT departments to provide the service levels to their customer and avoid financial and contractual risk to the organization.

      The Solution

      1. Understand the key service elements within an SLA
      • Develop a solid understanding of the key elements within an SLA and why they're important.
    • Establish requirements to create SLA criteria
      • Prioritize contractual services and establish concise SLA checklists and performance metrics.
    • Manage SLA obligations to ensure commitments are met
      • Review the five steps for effective SLA management to track provider performance and deal with chronic issues.
    • Service types

      • Availability/Uptime
      • Response Times
      • Resolution Time
      • Accuracy
      • First-Call Resolution

      Agreement Types

      • SaaS/IaaS
      • Service Desk
      • MSP
      • Co-Location
      • DR/BCP
      • Security Ops

      Performance Metrics

      • Reporting
      • Remedies & Credits
      • Monitoring
      • Exclusion

      Example SaaS Provider

      • Response Times ✓
      • Availability/Uptime ✓
      • Resolution Time ✓
      • Update Times ✓
      • Coverage Time ✓
      • Monitoring ✓
      • Reporting ✓
      • Remedies/Credits ✓

      SLA Management Framework

      1. SLO Monitoring
      • SLOs must be monitored by the provider, otherwise they can't be measured.
    • Concise Reporting
      • This is the key element for the provider to validate their performance.
    • Attainment Tracking
      • Capturing SLO metric attainment provides performance trending for each provider.
    • Score carding
      • Tracking details provide input into overall vendor performance ratings.
    • Remedy Reconciliation
      • From SLO tracking, missed SLOs and associated credits needs to be actioned and consumed.
    • Executive Summary

      Your Challenge

      To understand which SLAs are required for your organization and how they can differ depending on the service type. In addition, these other challenges can also cloud your knowledge of SLAs

      • No standardized SLA documents, Service levels, or metrics
      • Dealing with lost productivity & revenue due to persistent downtime
      • Understanding SLA components and what service levels are requires for a particular service
      • How to manage the SLA and hold the vendor accountable

      Common Obstacles

      There are several unknowns that SLA can present to different departments within the organization:

      • Little knowledge of what service levels are required
      • Not knowing SLO standards for a service type
      • Lack of resources to manage vendor obligations
      • Negotiating required metrics/KPIs with the provider
      • Low understanding of the risk that poor SLAs can present to the organization

      Info-Tech's Approach

      Info-Tech has a three-step approach to effective SLAs

      • Understand the elements of an SLA
      • Create Requirements for your organization
      • Manage the SLA obligations

      There are some basic components that every SLA should have – most don’t have half of what is required

      Info-Tech Insight

      SLAs need to have clear, easy to measure objectives to meet your expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to their obligations.

      Your challenge

      This research is designed to help organizations gain a better understanding of what an SLA is, understand the importance of SLAs in IT contracts, and ensure organizations are provided with rock-solid SLAs that meet their requirements and not just what the vendor wants to provide.

      • Vendors can make SLAs weak and difficult to understand; sometimes the metrics are meaningless. Not fully understanding what makes up a good SLA can bring unknown risks to the organization.
      • Managing vendor SLA obligations effectively is important. Are adequate resources available? Does the vendor provide manual vs. automated processes and which do you need? Is the process proactive from the vendor or reactive from the customer?

      SLAs come in many variations and for many service types. Understanding what needs to be in them is one of the keys to reducing risk to your organization.

      “One of the biggest mistakes an IT leader can make is ignoring the ‘A’ in SLA,” adds Wendy M. Pfeiffer, CIO at Nutanix. “

      An agreement isn’t a one-sided declaration of IT capabilities, nor is it a one-sided demand of business requirements,” she says. “An agreement involves creating a shared understanding of desired service delivery and quality, calculating costs related to expectations, and then agreeing to outcomes in exchange for investment.” (15 SLA mistakes IT leaders still make | CIO)

      Common obstacles

      There are typically a lot of unknowns when it comes to SLAs and how to manage them.

      Most organizations don’t have a full understanding of what SLAs they require and how to ensure they are met by the vendor. Other obstacles that SLAs can present are:

      • Inadequate resources to create and manage SLAs
      • Poor awareness of standard or required SLA metrics/KPIs
      • Lack of knowledge about each provider’s commitment as well as your obligations
      • Low vendor willingness to provide or negotiate meaningful SLAs and credits
      • The know-how or resources to effectively monitor and manage the SLA’s performance

      SLAs need to address your requirements

      55% of businesses do not find all of their service desk metrics useful or valuable (Freshservice.com)

      27% of businesses spend four to seven hours a month collating metric reports (Freshservice.com)

      Executive Summary

      Info-Tech’s Approach

      • Understand the elements of an SLA
        • Availability
        • Monitoring
        • Response Times
        • SLO Calculation
        • Resolution Time
        • Reporting
        • Milestones
        • Exclusions
        • Accuracy
        • Remedies & Credits
      • Create standard SLA requirements and criteria
        • SLA Element Checklist
        • Corporate Requirements and Standards
        • SLA Templates and Policy
      • Effectively Manage the SLA Obligations
        • SLA Management Framework
          • SLO Monitoring
          • Concise Reporting
          • Attainment Tracking
          • Score Carding
          • Remedy Reconciliation

      Info-Tech’s three phase approach

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 1

      Understand SLA Elements

      Phase Content:

      • 1.1 What are SLAs, types of SLAs, and why are they needed?
      • 1.2 Elements of an SLA
      • 1.3 Obligation management monitoring, Reporting requirements
      • 1.4 Exclusions
      • 1.5 SLAs vs. SLOs vs. SLIs

      Outcome:

      This phase will present you with an understanding of the elements of an SLA: What they are, why you need them, and how to validate them.

      Phase 2

      Create Requirements

      Phase Content:

      • 2.1 Create a list of your SLA criteria
      • 2.2 Develop SLA policy & templates
      • 2.3 Create a negotiation strategy
      • 2.4 SLA Overachieving discussion

      Outcome:

      This phase will leverage knowledge gained in Phase 1 and guide you through the creation of SLA requirements, criteria, and templates to ensure that providers meet the service level obligations needed for various service types to meet your organization’s service expectations.

      Phase 3

      Manage Obligations

      Phase Content:

      • 3.1 SLA Monitoring, Tracking
      • 3.2 Reporting
      • 3.3 Vendor SLA Reviews & Optimizing
      • 3.4 Performance management

      Outcome:

      This phase will provide you with an SLA management framework and the best practices that will allow you to effectively manage service providers and their SLA obligations.

      Insight summary

      Overarching insight

      SLAs need to have clear, easy-to-measure objectives to meet your expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to their obligations.

      Phase 1 insight

      Not understanding the required elements of an SLA and not having meaningful remedies to hold service providers accountable to their obligations can present several risk factors to your organization.

      Phase 2 insight

      Creating standard SLA criteria for your organization’s service providers will ensure consistent service levels for your business units and customers.

      Phase 3 insight

      SLAs can have appropriate SLOs and remedies but without effective management processes they could become meaningless.

      Tactical insight

      Be sure to set SLAs that are easily measurable from regularly accessible data and that are straight forward to interpret.

      Tactical insight

      Beware of low, easy to attain service levels and metrics/KPIs. Service levels need to meet your expectations and needs not the vendor’s.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      SLA Tracker & Trending Tool

      Track the provider’s SLO attainment and see how their performance is trending over time

      SLA Evaluation Tool

      Evaluate SLA service levels, metrics, credit values, reporting, and other elements

      SLA Template & Metrics Reference Guide

      Reference guide for typical SLA metrics with a generic SLA Template

      Service-Level Agreement Checklist

      Complete SLA component checklist for core SLA and contractual elements.

      Key deliverable:

      Service-Level Agreement Evaluation Tool

      Evaluate each component of the SLA , including service levels, metrics, credit values, reporting, and processes to meet your requirements

      Blueprint objectives

      Understand the components of an SLA and effectively manage their obligations

      • To provide an understanding of different types of SLAs, their required elements, and what they mean to your organization. How to identify meaningful service levels based on service types. We will break down the elements of the SLA such as service types and define service levels such as response times, availability, accuracy, and associated metrics or KPIs to ensure they are concise and easy to measure.
      • To show how important it is that all metrics have remedies to hold the service provider accountable to their SLA obligations.

      Once you have this knowledge you will be able to create and negotiate SLA requirements to meet your organization’s needs and then manage them effectively throughout the term of the agreement.

      InfoTech Insight:

      Right-size your requirements and create your SLO criteria based on risk mitigation and create measurements that motivate the desired behavior from the SLA.

      Blueprint benefits

      IT Benefits

      • An understanding of standard SLA service levels and metrics
      • Reduced financial risk through clear and concise easy-to-measure metrics and KPIs
      • Improved SLA commitments from the service provider
      • Meaningful reporting and remedies to hold the provider accountable
      • Service levels and metrics that meet your requirements to support your customers

      Business Benefits

      • Better understanding of an SLA framework and required SLA elements
      • Improved vendor performance
      • Standardized service levels and metrics aligned to your organization’s requirements
      • Reduced time in reviewing and comprehending vendor SLAs
      • Consistent performance from your service providers

      Measure the value of this blueprint

      1. Dollars Saved
      • Improved performance from your service provider
      • Reduced financial risk through meaningful service levels & remedies
      • Dollars gained through:
        • Reconciled credits from obligation tracking and management
        • Savings due to automated processes
    • Time Saved
      • Reduced time in creating effective SLAs through requirement templates
      • Time spent tracking and managing SLA obligations
      • Reduced negotiation time
      • Time spent tracking and reconciling credits
    • Knowledge Gained
      • Understanding of SLA elements, service levels, service types, reporting, and remedies
      • Standard metrics and KPIs required for various service types and levels
      • How to effectively manage the service provider obligations
      • Tactics to negotiate appropriate service levels to meet your requirements
    • Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way wound help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between three to six calls over the course of two to three months.

      Phase 1 - Understand

      • Call #1: Scope requirements, objectives, and your specific SLA challenges

      Phase 2 - Create Requirements

      • Call #2: Review key SLA and how to identify them
      • Call #3: Deep dive into SLA elements and why you need them
      • Call #4: Review your service types and SLA criteria
      • Call #5: Create internal SLA requirements and templates

      Phase 3 - Management

      • Call #6: Review SLA Management Framework
      • Call #7: Review and create SLA Reporting and Tracking

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2
      Understanding SLAs SLA Templating & Management
      Activities

      1.1 SLA overview, objectives, SLA types, service levels

      1.2 SLA elements and objectives

      1.3 SLA components – monitoring, reporting, remedies

      1.4 SLA Checklist review

      2.1 Creating SLA criteria and requirements

      2.2 SLA policy & template

      2.3 SLA evaluation activity

      2.4 SLA management framework

      2.5 SLA monitoring, tracking, remedy reconciliation

      Deliverables
      1. SLA Checklist
      2. SLA policy & template creation
      3. SLA management gap analysis
      1. Evaluation of current SLAs
      2. SLA tracking and trending
      3. Create internal SLA management framework

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 1

      Phase 1

      Understand SLA Elements

      Phase Steps

      • 1.1 What are SLAs, the types of SLAs, and why are they needed?
      • 1.2 Elements of an SLA
      • 1.3 Obligation management monitoring, Reporting requirements
      • 1.4 Exclusions and exceptions
      • 1.5 SLAs vs. SLOs vs. SLIs

      Create Requirements

      Manage Obligations

      1.1 What are SLAs, the types of SLAs, and why are they needed?

      SLA Overview

      What is a Service Level Agreement?

      An SLA is an overarching contractual agreement between a service provider and a customer (can be external or internal) that describes the services that will be delivered by the provider. It describes the service levels and associated performance metrics and expectations, how the provider will show it has attained the SLAs, and defines any remedies or credits that would apply if the provider fails to meet its commitments. Some SLAs also include a change or revision process.

      SLAs come in a few forms. Some are unique, separate, standalone documents that define the service types and levels in more detail and is customized to your needs. Some are separate documents that apply to a service and are web posted or linked to an MSA or SSA. The most common is to have them embedded in, or as an appendix to an MSA or SSA. When negotiating an MSA it’s generally more effective to negotiate better service levels and metrics at the same time.

      Objectives of an SLA

      To be effective, SLAs need to have clearly described objectives that define the service type(s) that the service provider will perform, along with commitment to associated measurable metrics or KPIs that are sufficient to meet your expectations. The goal of these service levels and metrics is to ensure that the service provider is committed to providing the service that you require, and to allow you to maintain service levels to your customers whether internal or external.

      1.1 What are SLAs, the types of SLAs, and why are they needed?

      Key Elements of an SLA

      Principle service elements of an SLA

      There are several more common service-related elements of an SLA. These generally include:

      • The Agreement – the document that defines service levels and commitments.
      • The service types – the type of service being provided by the vendor. These can include SaaS, MSP, Service Desk, Telecom/network, PaaS, Co-Lo, BCP, etc.
      • The service levels – these are the measurable performance objectives of the SLA. They include availability (uptime), response times, restore times, priority level, accuracy level, resolution times, event prevention, completion time, etc.
      • Metrics/KPIs – These are the targets or commitments associated to the service level that the service provider is obligated to meet.
      • Other elements – Reporting requirements, monitoring, remedies/credit values and process.

      Contractual Construct Elements

      These are construct components of an SLA that outline their roles and responsibilities, T&Cs, escalation process, etc.

      In addition, there are several contractual-type elements including, but not limited to:

      • A statement regarding the purpose of the SLA.
      • A list of services being supplied (service types).
      • An in-depth description of how services will be provided and when.
      • Vendor and customer requirements.
      • Vendor and customer obligations.
      • Acknowledgment/acceptance of the SLA.
      • They also list each party’s responsibilities and how issues will be escalated and resolved.

      Common types of SLAs explained

      Service-level SLA

      • This service-level agreement construct is the Service-based SLA. This SLA covers an identified service for all customers in general (for example, if an IT service provider offers customer response times for a service to several customers). In a service-based agreement, the response times would be the same and apply to all customers using the service. Any customer using the service would be provided the same SLA – in this case the same defined response time.

      Customer-based SLA

      • A customer-based SLA is a unique agreement with one customer. The entire agreement is defined for one or all service levels provided to a particular customer (for example, you may use several services from one telecom vendor). The SLAs for these services would be covered in one contract between you and the vendor, creating a unique customer-based vendor agreement. Another scenario could be where a vendor offers general SLAs for its services but you negotiate a specific SLA for a particular service that is unique or exclusive to you. This would be a customer-based SLA as well.

      Multi-level SLA

      • This service-level agreement construct is the multi-level SLA. In a multi-level SLA, components are defined to the organizational levels of the customer with cascading coverage to sublevels of the organization. The SLA typically entails all services and is designed to the cover each sub-level or department within the organization. Sometimes the multi-level SLA is known as a master organization SLA as it cascades to several levels of the organization.

      InfoTech Insight: Beware of low, easy to attain Service levels and metrics/KPIs. Service levels need to meet your requirements, expectations, and needs not the vendor’s.

      1.2 Elements of SLA-objectives, service types, and service levels

      Objectives of Service Levels

      The objective of the service levels and service credits are to:

      • Ensure that the services are of a consistently high quality and meet the requirements of the customer
      • Provide a mechanism whereby the customer can attain meaningful recognition of the vendors failure to deliver the level of service for which it was contracted to deliver
      • Incentivize the vendor or service provider to comply with and to expeditiously provide a remedy for any failure to attain the service levels committed to in the SLA
      • To ensure that the service provider fulfills the defined objectives of the outsourced service

      Service types

      There are several service types that can be part of an SLA. Service types are the different nature of services associated with the SLA that the provider is performing and being measured against. These can include:

      Service Desk, SaaS, PaaS, IaaS, ISP/Telecom/Network MSP, DR & BCP, Co-location security ops, SOW.

      Each service type should have standard service level targets or obligations that can vary depending on your requirements and reliance on the service being provided.

      Service levels

      Service levels are measurable targets, metrics, or KPIs that the service provider has committed to for the particular service type. Service levels are the key element of SLAs – they are the performance expectations set between you and the provider. The service performance of the provider is measured against the service level commitments. The ability of the provider to consistently meet these metrics will allow your organization to fully benefit from the objectives of the service and associated SLAs. Most service levels are time related but not all are.

      Common service levels are:

      Response times, resolution times per percent, restore/recovery times, accuracy, availability/uptime, completion/milestones, updating/communication, latency.

      Each service level has standard or minimum metrics for the provider. The metrics, or KPIs, should be relatively easy to measure and report against on a regular basis. Service levels are generally negotiable to meet your requirements.

      1.2.1 Activity SLA Checklist Tool

      1-2 hours

      Input

      • SLA content, Service elements
      • Contract terms & exclusions
      • Service metrices/KPIs

      Output

      • A concise list of SLA components
      • A list of missing SLA elements
      • Evaluation of the SLA

      Materials

      • Comprehensive checklist
      • Service provider SLA
      • Internal templates or policies

      Participants

      • Vendor or contract manager
      • IT or business unit manager
      • Legal
      • Finance

      Using this checklist will help you review a provider’s SLA to ensure it contains adequate service levels and remedies as well as contract-type elements.

      Instructions:

      Use the checklist to identify the principal service level elements as well as the contractual-type elements within the SLA.

      Review the SLA and use the dropdowns in the checklist to verify if the element is in the SLA and whether it is within acceptable parameters as well the page or section for reference.

      The checklist contains a list of service types that can be used for reference of what SLA elements you should expect to see in that service type SLA.

      Download the SLA Checklist Tool

      1.3 Monitoring, reporting requirements, remedies/credit process

      Monitoring & Reporting

      As mentioned, well-defined service levels are key to the success of the SLA. Validating that the metrics/KPIs are being met on a consistent basis requires regular monitoring and reporting. These elements of the SLA are how you hold the provider accountable to the SLA commitments and obligations. To achieve the service level, the service must be monitored to validate that timelines are met and accuracy is achieved.

      • Data or details from monitoring must then be presented in a report and delivered to the customer in an agreed-upon format. These formats can be in a dashboard, portal, spreadsheet, or csv file, and they must have sufficient criteria to validate the service-level metric. Reports should be kept for future review and to create historical trending.
      • Monitoring and reporting should be the responsibility of the service provider. This is the only way that they can validate to the customer that a service level has been achieved.
      • Reporting criteria and delivery timelines should be defined in the SLA and can even have a service level associated with it, such as a scheduled report delivery on the fifth day of the following month.
      • Reports need to be checked and balanced. When defining report criteria, be sure to define data source(s) that can be easily validated by both parties.
      • Report criteria should include compliance requirements, target metric/KPIs, and whether they were attained.
      • The report should identify any attainment shortfall or missed KPIs.

      Too many SLAs do not have these elements as often the provider tries to put the onus on the customer to monitor their performance of the service levels. .

      1.3.1 Monitoring, reporting requirements, remedies/credit process

      Remedies and Credits

      Service-level reports validate the performance of the service provider to the SLA metrics or KPIs. If the metrics are met, then by rights, the service provider is doing its job and performing up to expectations of the SLA and your organization.

      • What if the metrics are not being met either periodically or consistently? Solving this is the goal of remedies. Remedies are typically monetary costs (in some form) to the provider that they must pay for not meeting a service-level commitment. Credits can vary significantly and should be aligned to the severity of the missed service level. Sometimes there no credits offered by the vendor. This is a red flag in an SLA.
      • Typically expressed as a monetary credit, the SLA will have service levels and associated credits if the service-level metric/KPI is not met during the reporting period. Credits can be expressed in a dollar format, often defined as a percentage of a monthly fee or prorated annual fee. Although less common, some SLAs offer non-financial credits. These could include: an extension to service term, additional modules, training credits, access to a higher support level, etc.
      • Regardless of how the credit is presented, this is typically the only way to hold your provider accountable to their commitments and to ensure they perform consistently to expectations. You must do a rough calculation to validate the potential monetary value and if the credit is meaningful enough to the provider.

      Research shows that credit values that equate to just a few dollars, when you are paying the provider tens of thousands of dollars a month for a service or product, the credit is insignificant and therefore doesn’t incent the provider to achieve or maintain a service level.

      1.3.2 Monitoring, reporting requirements, remedies/credit process

      Credit Process

      Along with meaningful credit values, there must be a defined credit calculation method and credit redemption process in the SLA.

      Credit calculation. The credit calculation should be simple and straight forward. Many times, we see providers define complicated methods of calculating the credit value. In some cases complicated service levels require higher effort to monitor and report on, but this shouldn’t mean that the credit for missing the service level needs to require the same effort to calculate. Do a sample credit calculation to validate if the potential credit value is meaningful enough or meets your requirements.

      Credit redemption process. The SLA should define the process of how a credit is provided to the customer. Ideally the process should be fairly automated by the service provider. If the report shows a missed service level, that should trigger a credit calculation and credit value posted to account followed by notification. In many SLAs that we review, the credit process is either poorly defined or not defined at all. When it is defined, the process typically requires the customer to follow an onerous process and submit a credit request that must then be validated by the provider and then, if approved, posted to your account to be applied at year end as long as you are in complete compliance with the agreement and up-to-date on your account etc. This is what we need to avoid in provider-written SLAs. You need a proactive process where the service provider takes responsibility for missing an SLA and automatically assigns an accurate credit to your account with an email notice.

      Secondary level remedies. These are remedies for partial performance. For example, the platform is accessible but some major modules are not working (i.e.: the payroll platform is up and running and accessible but the tax table is not working properly so you can’t complete your payroll run on-time). Consider the requirement of a service level, metric, and remedy for critical components of a service and not just the platform availability.

      Info-Tech Insight SLA’s without adequate remedies to hold the vendor accountable to their commitments make the SLAs essentially meaningless.

      1.4 Exclusions indemnification, force majeure, scheduled maintenance

      Contract-Related Exclusions

      Attaining service-level commitments by the provider within an SLA can depend on other factors that could greatly influence their performance to service levels. Most of these other factors are common and should be defined in the SLA as exclusions or exceptions. Exceptions/exclusions can typically apply to credit calculations as well. Typical exceptions to attaining service levels are:

      • Denial of Service (DoS) attacks
      • Communication/ISP outage
      • Outages of third-party hosting
      • Actions or inactions of the client or third parties
      • Scheduled maintenance but not emergency maintenance
      • Force majeure events which can cover several different scenarios

      Attention should be taken to review the exceptions to ensure they are in fact not within the reasonable control of the provider. Many times the provider will list several exclusions. Often these are not reasonable or can be avoided, and in most cases, they allow the service provider the opportunity to show unjustified service-level achievements. These should be negotiated out of the SLA.

      1.5 Activity SLA Evaluation Tool

      1-2 hours

      Input

      • SLA content
      • SLA elements
      • SLA objectives
      • SLO calculation methods

      Output

      • Rating of the SLA service levels and objectives
      • Overall rating of the SLA content
      • Targeted list of required improvements

      Materials

      • SLA comprehensive checklist
      • Service provider SLA

      Participants

      • Vendor or contract manager
      • IT manager or leadership
      • Application or business unit manager

      The SLA Evaluation Tool will allow you evaluate an SLA for content. Enter details into the tool and evaluate the service levels and SLA elements and components to ensure the agreement contains adequate SLOs to meet your organization’s service requirements.

      Instructions:

      Review and identify SLA elements within the service provider’s SLA.

      Enter service-level details into the tool and rate the SLOs.

      Enter service elements details, validate that all required elements are in the SLA, and rate them accordingly.

      Capture and evaluate service-level SLO calculations.

      Review the overall rating for the SLA and create a targeted list for improvements with the service provider.

      Download the SLA Evaluation Tool

      1.5 Clarification: SLAs vs. SLOs vs. SLIs

      SLA – Service-Level Agreement The promise or commitment

      • This is the formal agreement between you and your service provider that contains their service levels and obligations with measurable metrics/KPIs and associated remedies. SLAs can be a separate or unique document, but are most commonly embedded within an MSA, SOW, SaaS, etc. as an addendum or exhibit.

      SLO – Service-Level Objective The goals or targets

      • This service-level agreement construct is the customer-based SLA. A Customer-based SLA is a unique agreement with one customer. The entire agreement is defined for one or all service levels provided to a particular customer. For example, you may use several services from one telecom vendor. The SLAs for these services would be covered in one contract between you and the Telco vendor, creating a unique customer-based to vendor agreement. Another scenario: a vendor offers general SLAs for its services and you negotiate a specific SLA for a particular service that is unique or exclusive to you. This would be a customer-based SLA as well.

      Other common names are Metrics and Key Performance Indicators (KPIs )

      SLI – Service-Level Indicator How did we do? Did we achieve the objectives?

      • An SLI is the actual metric attained after the measurement period. SLI measures compliance with an SLO (service level objective). So, for example, if your SLA specifies that your systems will be available 99.95% of the time, your SLO is 99.95% uptime and your SLI is the actual measurement of your uptime. Maybe it’s 99.96%. maybe 99.99% or even 99.75% For the vendor to be compliant to the SLA, the SLI(s) must meet or exceed the SLOs within the SLA document.

      Other common names: attainment, results, actual

      Info-Tech Insight:

      Web-posted SLAs that are not embedded within a signed MSA, can present uncertainty and risk as they can change at any time and typically without direct notice to the customer

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 2

      Understand SLA Elements

      Phase 2

      Create Requirements

      Phase Steps

      • 2.1 Create a list of your SLA criteria
      • 2.2 Develop SLA policy & templates
      • 2.3 Create a negotiation strategy
      • 2.4 SLA overachieving discussion

      Manage Obligations

      2.1 Create a list of your SLA criteria

      Principle Service Elements

      With your understanding of the types of SLAs and the elements that comprise a well-written agreement

      • The next step is to start to create a set of SLA criteria for service types that your organization outsources or may require in the future.
      • This criteria should define the elements of the SLA with tolerance levels that will require the provider to meet your service expectations.
      • Service levels, metrics/KPIs, associated remedies and reporting criteria. This criteria could be captured into table-like templates that can be referenced or inserted into service provider SLAs.
      • Once you have defined minimum service-level criteria, we recommend that you do a deeper review of the various service provider types that your organization has in place. The goal of the review is to understand the objective of the service type and associated service levels and then compare them to your requirements for the service to meet your expectations. Service levels and KPIs should be no less than if your IT department was providing the service with its own resources and infrastructure.
      • Most IT departments have service levels that they are required to meet with their infrastructure to the business units or organization, whether it’s App delivery, issue or problem resolution, availability etc. When any of these services are outsourced to an external service provider, you need to make all efforts to ensure that the service levels are equal to or better than the previous or existing internal expectations.
      • Additionally, the goal is to identify service levels and metrics that don’t meet your requirements or expectations and/or service levels that are missing.

      2.2 Develop SLA policies and templates

      Contract-type Elements

      After creating templates for minimum-service metrics & KPIs, reporting criteria templates, process, and timing, the next step should be to work on contract-type elements and additional service-level components. These elements should include:

      • Reporting format, criteria, and timelines
      • Monitoring requirements
      • Minimum acceptable remedy or credits process; proactive by provider vs. reactive by customer
      • Roles & responsibilities
      • Acceptable exclusion details
      • Termination language for persistent failure to meet SLOs

      These templates or criteria minimums can be used as guidelines or policy when creating or negotiating SLAs with a service provider.

      Start your initial element templates for your strategic vendors and most common service types: SaaS, IaaS, Service Desk, SecOps, etc. The goal of SLA templates is to create simple minimum guidelines for service levels that will allow you to meet your internal SLAs and expectations. Having SLA templates will show the service provider that you understand your requirements and may put you in a better negotiating position when reviewing with the provider.

      When considering SLO metrics or KPIs consider the SMART guidance:

      Simple: A KPI should be easy to measure. It should not be complicated, and the purpose behind recording it must be documented and communicated.

      Measurable: A KPI that cannot be measured will not help in the decision-making process. The selected KPIs must be measurable, whether qualitatively or quantitatively. The procedure for measuring the KPIs must be consistent and well-defined.

      Actionable: KPIs should contribute to the decision-making process of your organization. A KPI that does not make any such contributions serves no purpose.

      Relevant: KPIs must be related to operations or functions that a security team seeks to assess.

      Time-based: KPIs should be flexible enough to demonstrate changes over time. In a practical sense, an ideal KPI can be grouped together by different time intervals.

      (Guide for Security Operations Metrics)

      2.2.1 Activity: Review SLA Template & Metrics Reference Guide

      1-2 hours

      Input

      • Service level metrics
      • List of who is accountable for PPM decisions

      Output

      • SLO templates for service types
      • SLA criteria that meets your organization’s requirements

      Materials

      • SLA Checklist
      • SLA criteria list with SLO & credit values
      • PPM Decision Review Workbook

      Participants

      • Vendor manager
      • IT leadership
      • Procurement or contract manager
      1. Review the SLA Template and Metrics Reference Guide for common metrics & KPIs for the various service types. Each Service Type tab has SLA elements and SLO metrics typically associated with the type of service.
      2. Some service levels have common or standard credits* that are typically associated with the service level or metric.
      3. Use the SLA Template to enter service levels, metrics, and credits that meet your organization’s criteria or requirements for a given service type.

      Download the SLA Template & Metrics Reference Guide

      *Credit values are not standard values, rather general ranges that our research shows to be the typical ranges that credit values should be for a given missed service level

      2.3 Create a negotiation strategy

      Once you have created service-level element criteria templates for your organization’s requirements, it’s time to document a negotiation position or strategy to use when negotiating with service providers. Not all providers are flexible with their SLA commitments, in fact most are reluctant to change or create “unique” SLOs for individual customers. Particularly cloud vendors providing IaaS, SaaS, or PaaS, SLAs. ISP/Telcom, Co-Lo and DR/BU providers also have standard SLOs that they don’t like to stray far from. On the other hand, security ops (SIEM), service desk, hardware, and SOW/PS providers who are generally contracted to provide variable services are somewhat more flexible with their SLAs and more willing to meet your requirements.

      • Service providers want to avoid being held accountable to SLOs, and their SLAs are typically written to reflect that.

      The goal of creating internal SLA templates and policies is to set a minimum baseline of service levels that your organization is willing to accept, and that will meet their requirements and expectations for the outsourced service. Using these templated SLOs will set the basis for negotiating the entire SLA with the provider. You can set the SLA purpose, objectives, roles, and responsibilities and then achieve these from the service provider with solid SLOs and associated reporting and remedies.

      Info-Tech Insight

      Web-posted SLAs that are not embedded within a signed MSA can present uncertainty and risk as they can change at any time and typically without direct notice to the customer

      2.3.1 Negotiating strategy guidance

      • Be prepared. Create a negotiating plan and put together a team that understands your organization’s requirements for SLA.
      • Stay informed. Request provider’s recent performance data and negotiate SLOs to the provider’s average performance.
      • Know what you need. Corporate SLA templates or policies should be positioned to service providers as baseline minimums.
      • Show some flexibility. Be willing to give up some ground on one SLO in exchange for acceptance of SLOs that may be more important to your organization.
      • Re-group. Have a fallback position or Plan B. What if the provider can’t or won’t meet your key SLOs? Do you walk?
      • Do your homework. Understand what the typical standard SLOs are for the type of service level.

      2.4 SLO overachieving incentive discussion

      Monitoring & Reporting

      • SLO overachieving metrics are seen in some SLAs where there is a high priority for a service provider to meet and or exceed the SLOs within the SLA. These are not common terms but can be used to improve the overall service levels of a provider. In these scenarios the provider is sometimes rewarded for overachieving on the SLOs, either consistently or on a monthly or quarterly basis. In some cases, it can make financial sense to incent the service provider to overachieve on their commitments. Incentives can drive behaviors and improved performance by the provider that can intern improve the benefits to your organization and therefore justify an incent of some type.
      • Example: You could have an SLO for invoice accuracy. If not achieved, it could cost the vendor if they don’t meet the accuracy metric, however if they were to consistently overachieve the metric it could save accounts payable hours of time in validation and therefore you could pass on some of these measurable savings to the provider.
      • Overachieving incentives can add complexity to the SLA so they need to be easily measurable and simple to manage.
      • Overachieving incentives can also be used in provider performance improvement plans, where a provider might have poor trending attainment and you need to have them improve their performance in a short period of time. Incentives typically will motivate provider improvement and generally will cost much less than replacing the provider.
      • There is another school of thought that you shouldn’t have to pay a provider for doing their job; however, others are of the opinion that incentives or bonuses improve the overall performance of individuals or teams and are therefore worth consideration if both parties benefit from the over performance.

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 3

      Understand SLA Elements

      Create Requirements

      Phase 3

      Manage Obligations

      Phase Steps

      • 3.1 SLA monitoring and tracking
      • 3.2 Reporting
      • 3.3 Vendor SLA reviews & optimizing
      • 3.4 Performance management

      3.1 SLA monitoring, tracking, and remedy reconciliation

      The next step to effective SLAs is the management component. It could be fruitless if you were to spend your time and efforts negotiating your required service levels and metrics and don’t have some level of managing the SLA. In that situation you would have no way of knowing if the service provider is attaining their SLOs.

      There are several key elements to effective SLA management:

      • SLO monitoring
      • Simple, concise reporting
      • SLO attainment tracking
      • Score carding & trending
      • Remedy reconciliation

      SLA Management framework

      SLA Monitoring → Concise Reporting → Attainment Tracking → Score Carding →Remedy Reconciliation

      “A shift we’re beginning to see is an increased use of data and process discovery tools to measure SLAs,” says Borowski of West Monroe. “While not pervasive yet, these tools represent an opportunity to identify the most meaningful metrics and objectively measure performance (e.g., cycle time, quality, compliance). When provided by the client, it also eliminates the dependency on provider tools as the source-of-truth for performance data.” – Stephanie Overby

      3.1 SLA management framework

      SLA Performance Management

      • SLA monitoring provides data for SLO reports or dashboards. Reports provide attainment data for tacking over time. Attainment data feeds scorecards and allows for trending analysis. Missed attainment data triggers remedies.
      • All service providers monitor their systems, platforms, tickets, agents, sensors etc. to be able to do their jobs. Therefore, monitoring is readily available from your service provider in some form.
      • One of the key purposes of monitoring is to generate data into internal reports or dashboards that capture the performance metrics of the various services. Therefore, service-level and metric reports are readily available for all of the service levels that a service provider is contracted or engaged to provide.
      • Monitoring and reporting are the key elements that validate how your service provider is meeting its SLA obligations and thus are very important elements of an SLA. SLO report data becomes attainment data once the metric or KPI has been captured.
      • As a component of effective SLA management, this attainment data needs to be tracked/recorded in an easy-to-read format or table over a period of time. Attainment data can then be used to generate scorecards and trending reports for your review both internally and with the provider as required.
      • If attainment data shows that the service provider is meeting their SLA obligations, then the SLA is meeting your requirements and expectations. If on the other hand, attainment data shows that obligations are not being met, then actions must be taken to hold the service provider accountable. The most common method is through remedies that are typically in the form of a credit through a defined process (see Sec. 1.3). Any credits due for missed SLOs should also be tracked and reported to stakeholders and accounting for validation, reconciliation, and collection.

      3.2 Reporting

      Monitoring & Reporting

      • Many SLAs are silent on monitoring and reporting elements and require that the customer, if aware or able, to monitor the providers service levels and attainment and create their own KPI and reports. Then if SLOs are not met there is an arduous process that the customer must go through to request their rightful credit. This manual and reactive method creates all kinds of risk and cost to the customer and they should make all attempts to ensure that the service provider proactively provides SLO/KPI attainment reports on a regular basis.
      • Automated monitoring and reporting is a common task for many IT departments. There is no reason that a service provider can’t send reports proactively in a format that can be easily interpreted by the customer. The ideal state would be to capture KPI report data into a customer’s internal service provider scorecard.
      • Automated or automatic credit posting is another key element that service providers tend to ignore, primarily in hopes that the customer won’t request or go through the trouble of the process. This needs to change. Some large cloud vendors already have automated processes that automatically post a credit to your account if they miss an SLO. This proactive credit process should be at the top of your negotiation checklist. Service providers are avoiding thousands of credit dollars every year based on the design of their credit process. As more customers push back and negotiate more efficient credit processes, vendors will soon start to change and may use it as a differentiator with their service.

      3.2.1 Performance tracking and trending

      What gets measured gets done

      SLO Attainment Tracking

      A primary goal of proactive and automated reporting and credit process is to capture the provider’s attainment data into a tracker or vendor scorecard. These tracking scorecards can easily create status reports and performance trending of service providers, to IT leadership as well as feed QBR agenda content.

      Remedy Reconciliation

      Regardless of how a credit is processed it should be tracked and reconciled with internal stakeholders and accounting to ensure credits are duly applied or received from the provider and in a timely manner. Tracking and reconciliation must also align with your payment terms, whether monthly or annually.

      “While the adage, ‘You can't manage what you don't measure,’ continues to be true, the downside for organizations using metrics is that the provider will change their behavior to maximize their scores on performance benchmarks.” – Rob Lemos

      3.2.1 Activity SLA Tracker and Trending Tool

      1-2 hours setup

      Input

      • SLO metrics/KPIs from the SLA
      • Credit values associated with SLO

      Output

      • Monthly SLO attainment data
      • Credit tracking
      • SLO trending graphs

      Materials

      • Service provider SLO reports
      • Service provider SLA
      • SLO Tracker & Trending Tool

      Participants

      • Contract or vendor managers
      • Application or service managers
      • Service provider

      An important activity in the SLA management framework is to track the provider’s SLO attainment on a monthly or quarterly basis. In addition, if an SLO is missed, an associated credit needs to be tracked and captured. This activity allows you to capture the SLOs from the SLA and track them continually and provide data for trending and review at vendor performance meetings and executive updates.

      Instructions: Enter SLOs from the SLA as applicable.

      Each month, from the provider’s reports or dashboards, enter the SLO metric attainment.

      When an SLO is met, the cell will turn green. If the SLO is missed, the cell will turn red and a corresponding cell in the Credit Tracker will turn green, meaning that a credit needs to be reconciled.

      Use the Trending tab to view trending graphs of key service levels and SLOs.

      Download the SLO Tracker and Trending Tool

      3.3 Vendor SLA reviews and optimizing

      Regular reviews should be done with providers

      Collecting attainment data with scorecards or tracking tools provides summary information on the performance of the service provider to their SLA obligations. This information should be used for regular reviews both internally and with the provider.

      Regular attainment reviews should be used for:

      • Performance trending upward or downward
      • Identifying opportunities to revise or improve SLOs
      • Optimizing SLO and processes
      • Creating a Performance Improvement Plan (PIP) for the service provider

      Some organizations choose to review SLA performance with providers at regular QBRs or at specific SLA review meetings

      This should be determined based on the criticality, risk, and strategic importance of the provider’s service. Providers that provide essential services like ERP, payroll, CRM, HRIS, IaaS etc. should be reviewed much more regularly to ensure that any decline in service is identified early and addressed properly in accordance with the service provider. Negative trending performance should also be documented for consideration at renewal time.

      3.4 Performance management

      Dealing with persistent poor performance and termination

      Service providers that consistently miss key service level metrics or KPIs present financial and security risk to the organization. Poor performance of a service provider reflects directly on the IT leadership and will affect many other business aspects of the organization including:

      • Ability to conduct day-to-day business activities
      • Meet internal obligations and expectations
      • Employee productivity and satisfaction
      • Maintain corporate policies or industry compliance
      • Meet security requirements

      Communication is key. Poor performance of a service provider needs to be dealt with in a timely manner in order to avoid more critical impact of the poor performance. Actions taken with the provider can also vary depending again on the criticality, risk, and strategic importance of the provider’s service.

      Performance reviews should provide the actions required with the goal of:

      • Making the performance problems into opportunities
      • Working with the provider to create a PIP with aggressive timelines and ramifications if not attained
      • Non-renewal or termination consideration, if feasible including provider replacement options, risk, costs, etc.
      • SLA renegotiation or revisions
      • Warning notifications to the service provider with concise issues and ramifications

      To avoid the issues and challenges of dealing with chronic poor performance, consider a Persistent or Chronic Failure clause into the SLA contract language. These clauses can define chronic failure, scenarios, ramifications there of, and defined options for the client including increased credit values, non-monetary remedies, and termination options without liability.

      Info-Tech Insight

      It’s difficult to prevent chronic poor performance but you can certainly track it and deal with it in a way that reduces risk and cost to your organization.

      SLA Hall of Shame

      Crazy service provider SLA content collection

      • Excessive list of unreasonable exclusions
      • Subcontractors’ behavior could be excluded
      • Downtime credit, equal to downtime percent x the MRC
      • Controllable FM events (internal labor issues, health events)
      • Difficult downtime or credit calculations that don’t make sense
      • Credits are not valid if agreement is terminated early or not renewed
      • Customer is not current on their account, SLA or credits do not count/apply
      • Total downtime = to prorated credit value (down 3 hrs = 3/720hrs = 0.4% credit)
      • SLOs don’t apply if customer fails to report the issue or request a trouble ticket
      • Downtime during off hours (overnight) do not count towards availability metrics
      • Different availability commitments based on different support-levels packages
      • Extending the agreement term by the length of downtime as a form of a remedy

      SLA Dos and Don’ts

      Dos

      • Do negotiate SLOs to vendor’s average performance
      • Do strive for automated reporting and credit processes
      • Do right-size and create your SLO criteria based on risk mitigation
      • Do review SLA attainment results with strategic service providers on a regular basis
      • Do ensure that all key elements and components of an SLA are present in the document or appendix

      Don'ts

      • Don’t accept the providers response that “we can’t change the SLOs for you because then we’d have to change them for everyone”
      • Don’t leave SLA preparation to the last minute. Give it priority as you negotiate with the provider
      • Don’t create complex SLAs with numerous service levels and SLOs that need to be reported and managed
      • Don’t aim for absolute perfection. Rather, prioritize which service levels are most important to you for the service

      Summary of Accomplishment

      Problem Solved

      Knowledge Gained

      • Understanding of the elements and components of an SLA
      • A list of SLO metrics aligned to service types that meet your organization’s criteria
      • SLA metric/KPI templates
      • SLA Management process for your provider’s service objectives
      • Reporting and tracking process for performance trending

      Deliverables Completed

      • SLA component and contract element checklist
      • Evaluation or service provider SLAs
      • SLA templates for strategic service types
      • SLA tracker for strategic service providers

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Improve IT-Business Alignment Through an Internal SLA

      • Understand business requirements, clarify current capabilities, and enable strategies to close service-level gaps.

      Data center Co-location SLA & Service Definition Template

      • In essence, the SLA defines the “product” that is being purchased, permitting the provider to rationalize resources to best meet the needs of varied clients, and permits the buyer to ensure that business requirements are being met.

      Ensure Cloud Security in IaaS, PaaS, and SaaS Environments

      • Keep your information security risks manageable when leveraging the benefits of cloud computing.

      Bibliography

      Henderson, George. “3 Most Common Types of Service Level Agreement (SLA).” Master of Project Academy. N.d. Web.

      “Guide to Security Operations Metrics.” Logsign. Oct 5, 2020. Web.

      Lemos, Rob. “4 lessons from SOC metrics: What your SpecOps team needs to know.” TechBeacon. N.d. Web.

      “Measuring and Making the Most of Service Desk Metrics.” Freshworks. N.d. Web.

      Overby, Stephanie. “15 SLA Mistakes IT Leaders Still Make.” CIO. Jan 21, 2021.

      Innovation

      • Buy Link or Shortcode: {j2store}21|cart{/j2store}
      • Related Products: {j2store}21|crosssells{/j2store}
      • Teaser Video: Visit Website
      • Teaser Video Title: Digital Ethics = Data Equity
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • sidebar graphic: Visit Link
      • Parent Category Name: Strategy and Governance
      • Parent Category Link: /strategy-and-governance
      Innovation is the at heart of every organization, especially in these fast moving times. It does not matter if you are in a supporting or "traditional" sector.  The company performing the service in a faster, better and more efficient way, wins.

      innovation

      Portfolio Management

      • Buy Link or Shortcode: {j2store}47|cart{/j2store}
      • Related Products: {j2store}47|crosssells{/j2store}
      • member rating overall impact: 9.6/10
      • member rating average dollars saved: $40,234
      • member rating average days saved: 30
      • Parent Category Name: Applications
      • Parent Category Link: /applications

      The challenge

      • Typically your business wants much more than your IT development organization can deliver with the available resources at the requested quality levels.
      • Over-damnd has a negative influence on delivery throughput. IT starts many projects (or features) but has trouble delivering most of them within the set parameters of scope, time, budget, and quality. Some requested deliverables may even be of questionable value to the business.
      • You may not have the right project portfolio management (PPM) strategy to bring order in IT's delivery activities and to maximize business value.

      Our advice

      Insight

      • Many in IT mix PPM and project management. Your project management playbook does not equate to the holistic view a real PPM practice gives you.
      • Some organizations also mistake PPM for a set of processes. Processes are needed, but a real strategy works towards tangible goals.
      • PPM works at the strategic level of the company; hence executive buy-in is critical. Without executive support, any effort to reconcile supply and demand will be tough to achieve.

      Impact and results 

      • PPM is a coherent business-aligned strategy that maximizes business value creation across the entire portfolio, rather than in each project.
      • Our methodology tackles the most pressing challenge upfront: get executive buy-in before you start defining your goals. With senior management behind the plan, implementation will become easier.
      • Create PPM processes that are a cultural fit for your company. Define your short and long-term goals for your strategy and support them with fully embedded portfolio management processes.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand why you should develop a PPM strategy and understand how our methodology can help you. We show you how we can support you.

      Obtain executive buy-in for your strategy

      Ensure your strategy is a cultural fit or cultural-add for your company.

      • Develop a Project Portfolio Management Strategy – Phase 1: Get Executive Buy-In for Your PPM Strategy (ppt)
      • PPM High-Level Supply-Demand Calculator (xls)
      • PPM Strategic Plan Template (ppt)
      • PPM Strategy-Process Goals Translation Matrix Template (xls)

      Align the PPM processes to your company's strategic goals

      Use the advice and tools in this stage to align the PPM processes.

      • Develop a Project Portfolio Management Strategy – Phase 2: Align PPM Processes to Your Strategic Goals (ppt)
      • PPM Strategy Development Tool (xls)

      Refine and complete your plan

      Use the inputs from the previous stages and add a cost-benefit analysis and tool recommendation.

      • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities (ppt)

      Streamline your maintenance delivery

      Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.

      • Develop a Project Portfolio Management Strategy – Phase 3: Complete Your PPM Strategic Plan (ppt)
      • Project Portfolio Analyst / PMO Analyst (doc)

       

       

      Improve Security Governance With a Security Steering Committee

      • Buy Link or Shortcode: {j2store}373|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Security is still seen as an IT problem rather than a business risk, resulting in security governance being relegated to the existing IT steering committee.
      • Security is also often positioned in the organization where they are not privy to the details of the organization’s overall strategy. Security leaders struggle to get the full enterprise picture.

      Our Advice

      Critical Insight

      • Work to separate the Information Security Steering Committee (ISSC) from the IT Steering Committee (ITSC). Security transcends the boundaries of IT and needs an independent, eclectic approach to make strategic decisions.
      • Be the lawyer, not the cop. Ground your communications in business terminology to facilitate a solution that makes sense to the entire organization.
      • Develop and stick to the agenda. Continued engagement from business stakeholders requires sticking to a strategic level-focused agenda. Dilution of purpose will lead to dilution in attendance.

      Impact and Result

      • Define a clear scope of purpose and responsibilities for the ISSC to gain buy-in and consensus for security governance receiving independent agenda time from the broader IT organization.
      • Model the information flows necessary to provide the steering committee with the intelligence to make strategic decisions for the enterprise.
      • Determine membership and responsibilities that shift with the evolving security landscape to ensure participation reflects interested parties and that money being spent on security mitigates risk across the enterprise.
      • Create clear presentation material and strategically oriented meeting agendas to drive continued participation from business stakeholders and executive management.

      Improve Security Governance With a Security Steering Committee Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to improve your security governance with a security steering committee, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define committee purpose and responsibilities

      Identify the purpose of your committee, determine the capabilities of the committee, and define roles and responsibilities.

      • Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities
      • Information Security Steering Committee Charter

      2. Determine information flows, membership & accountabilities

      Determine how information will flow and the process behind that.

      • Improve Security Governance With a Security Steering Committee – Phase 2: Determine Information Flows, Membership & Accountabilities

      3. Operate the Information Security Steering Committee

      Define your meeting agendas and the procedures to support those meetings. Hold your kick-off meeting. Identify metrics to measure the committee’s success.

      • Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee
      • Security Metrics Summary Document
      • Information Security Steering Committee Stakeholder Presentation
      [infographic]

      Further reading

      Improve Security Governance With a Security Steering Committee

      Build an inclusive committee to enable holistic strategic decision making.

      ANALYST PERSPECTIVE

      "Having your security organization’s steering committee subsumed under the IT steering committee is an anachronistic framework for today’s security challenges. Conflicts in perspective and interest prevent holistic solutions from being reached while the two permanently share a center stage.

      At the end of the day, security is about existential risks to the business, not just information technology risk. This focus requires its own set of business considerations, information requirements, and delegated authorities. Without an objective and independent security governance body, organizations are doomed to miss the enterprise-wide nature of their security problems."

      – Daniel Black, Research Manager, Security Practice, Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs
      • CISOs
      • IT/Security Leaders

      This Research Will Help You:

      • Develop an effective information security steering committee (ISSC) that ensures the right people are involved in critical decision making.
      • Ensure that business and IT strategic direction are incorporated into security decisions.

      This Research Will Also Assist:

      • Information Security Steering Committee (ISSC) members

      This Research Will Help Them:

      • Formalize roles and responsibilities.
      • Define effective security metrics.
      • Develop a communication plan to engage executive management in the organization’s security planning.

      Executive summary

      Situation

      • Successful information security governance requires a venue to address security concerns with participation from across the entire business.
      • Without access to requisite details of the organization – where we are going, what we are trying to do, how the business expects to use its technology – security can not govern its strategic direction.

      Complication

      • Security is still seen as an IT problem rather than a business risk, resulting in security governance being relegated to the existing IT steering committee.
      • Security is also often positioned in the organization where they are not privy to the details of the organization’s overall strategy. Security leaders struggle to get the full enterprise picture.

      Resolution

      • Define a clear scope of purpose and responsibilities for the Information Security Steering Committee to gain buy-in and consensus for security governance receiving independent agenda time from the broader IT organization.
      • Model the information flows necessary to provide the steering committee with the intelligence to make strategic decisions for the enterprise.
      • Determine membership and responsibilities that shift with the evolving security landscape to ensure participation reflects interested parties and that money being spent on security mitigates risk across the enterprise.
      • Create security metrics that are aligned with committee members’ operational goals to incentivize participation.
      • Create clear presentation material and strategically oriented meeting agendas to drive continued participation from business stakeholders and executive management.

      Info-Tech Insight

      1. Work to separate the ISSC from the IT Steering Committee (ITSC). Security transcends the boundaries of IT and needs an independent, eclectic approach to make strategic decisions.
      2. Be the lawyer, not the cop. Ground your communications in business terminology to facilitate a solution that make sense to the entire organization.
      3. Develop and stick to the agenda. Continued engagement from business stakeholders requires sticking to a strategic level-focused agenda. Dilution of purpose will lead to dilution in attendance.

      Empower your security team to act strategically with an ISSC

      Establishing an Information Security Steering Committee (ISSC)

      Even though security is a vital consideration of any IT governance program, information security has increasingly become an important component of the business, moving beyond the boundaries of just the IT department.

      This requires security to have its own form of steering, beyond the existing IT Steering Committee, that ensures continual alignment of the organization’s security strategy with both IT and business strategy.

      An ISSC should have three primary objectives:

      • Direct Strategic Planning The ISSC formalizes organizational commitments to strategic planning, bringing visibility to key issues and facilitating the integration of security controls that align with IT and business strategy.
      • Institute Clear Accountability The ISSC facilitates the involvement and commitment of executive management through clearly defined roles and accountabilities for security decisions, ensuring consistency in participation as the organization’s strategies evolve.
      • Optimize Security Resourcing The ISSC maximizes security by monitoring the implementation of the security strategic plan, making recommendations on prioritization of effort, and securing necessary resources through the planning and budgeting processes, as necessary.

      What does the typical ISSC do?

      Ensuring proper governance over your security program is a complex task that requires ongoing care and feeding from executive management to succeed.

      Your ISSC should aim to provide the following core governance functions for your security program:

      1. Define Clarity of Intent and Direction How does the organization’s security strategy support the attainment of the business and IT strategies? The ISSC should clearly define and communicate strategic linkage and provide direction for aligning security initiatives with desired outcomes.
      2. Establish Clear Lines of Authority Security programs contain many important elements that need to be coordinated. There needs to be clear and unambiguous authority, accountability, and responsibility defined for each element so lines of reporting/escalation are clear and conflicting objectives can be mediated.
      3. Provide Unbiased Oversight The ISSC should vet the organization’s systematic monitoring processes to make certain there is adherence to defined risk tolerance levels and ensure that monitoring is appropriately independent from the personnel responsible for implementing and managing the security program.
      4. Optimize Security Value Delivery Optimized value delivery occurs when strategic objectives for security are achieved and the organization’s acceptable risk posture is attained at the lowest possible cost. This requires constant attention to ensure controls are commensurate with any changes in risk level or appetite.

      Formalize the most important governance functions for your organization

      Creation of an ISSC is deemed the most important governance and oversight practice that a CISO can implement, based on polling of IT security leaders analyzing the evolving role of the CISO.

      Relatedly, other key governance practices reported – status updates, upstream communications, and executive-level sponsorship – are within the scope of what organizations traditionally formalize when establishing their ISSC.

      Vertical bar chart highlighting the most important governance functions according to respondents. The y axis is labelled 'Percentage of Respondents' with the values 0%-60%, and the x axis is labelled 'Governance and Oversight Practices'. Bars are organized from highest percentage to lowest with 'Creation of cross-functional committee to oversee security strategy' at 56%, 'Regularly scheduled reporting on the state of security to stakeholders' at 55%, 'Upstream communication channel from security leadership to CEO' at 46%, and 'Creation of program charter approved by executive-level sponsor' at 37%. Source: Ponemon Institute, 2017; N=184 organizations; 660 respondents.

      Despite the clear benefits of an ISSC, organizations are still falling short

      83% of organizations have not established formal steering committees to evaluate the business impact and risks associated with security decisions. (Source: 2017 State of Cybersecurity Metrics Report)

      70% of organizations have delegated cybersecurity oversight to other existing committees, providing security limited agenda time. (Source: PwC 2017 Annual Corporate Director Survey)

      "This is a group of risk managers an institution would bring together to deal with a response anyway. Having them in place to do preventive discussions and formulate policy to mitigate the liability sets and understand compliance obligations is just powerful." (Kirk Bailey, CISO, University of Washington)

      Prevent the missteps that make 9 out of 10 steering committees unsuccessful

      Why Do Steering Committees Fail?

      1. A lack of appetite for a steering committee from business partners. An effective ISSC requires participation from core members of the organization’s leadership team. The challenge is that most business partners don’t understand the benefits of an ISSC and the responsibilities aren’t tailored to participants’ needs or interests. It’s the CISO’s (or senior IT/security leader’s) responsibility to make this case to stakeholders and right-size the committee responsibilities and membership.
      2. ISSC committees are given inappropriate responsibilities. The steering committee is fundamentally about decision making; it’s not a working committee. Security leadership typically struggles with clarifying these responsibilities on two fronts: either the responsibilities are too vague and there is no clear way to execute on them within a meeting or responsibilities are too tactical and require knowledge that participants do not have. Responsibilities should determine who is on the ISSC, not the other way around.
      3. Lack of process around execution. An ISSC is only valuable if members are able to successfully execute on its mandate. Without well-defined processes it becomes nearly impossible for the ISSC to be actionable. As a result, participants lack the information they need to make critical decisions, agendas are unmet, and meetings are seen as a waste of time.

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Improve Security Governance With a Security Steering Committee – project overview

      1. Define Committee Purpose and Responsibilities

      2. Determine Information Flows, Membership & Accountabilities

      3. Operate the Information Security Steering Committee

      Supporting Tool icon

      Best-Practice Toolkit

      1.1 Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC

      1.2 Conduct a SWOT analysis of your information security governance capabilities

      1.3 Identify the responsibilities and duties of the ISSC

      1.4 Draft the committee purpose statement of your ISSC

      2.1 Define your SIPOC model for each of the ISSC responsibilities

      2.2 Identify committee participants and responsibility cadence

      2.3 Define ISSC participant RACI for each of the responsibilities

      3.1 Define the ISSC meeting agendas and procedures

      3.2 Define which metrics you will report to the ISSC

      3.3 Hold a kick-off meeting with your ISSC members to explain the process, responsibilities, and goals

      3.4 Tailor the Information Security Steering Committee Stakeholder Presentation template

      3.5 Present the information to the security leadership team

      3.6 Schedule your first meeting of the ISSC

      Guided Implementations

      • Identify the responsibilities and duties of the ISSC.
      • Draft the committee purpose of the ISSC.
      • Determine SIPOC modeling of information flows.
      • Determine accountabilities and responsibilities.
      • Set operational standards.
      • Determine effectiveness metrics.
      • Steering committee best practices.
      Associated Activity icon

      Onsite Workshop

      This blueprint can be combined with other content for onsite engagements, but is not a standalone workshop.
      Phase 1 Outcome:
      • Determine the purpose and responsibilities of your information security steering committee.
      Phase 2 Outcome:
      • Determine membership, accountabilities, and information flows to enable operational excellence.
      Phase 3 Outcome:
      • Define agendas and standard procedures to operate your committee.
      • Design an impactful stakeholder presentation.

      Improve Security Governance With a Security Steering Committee

      PHASE 1

      Define Committee Purpose and Responsibilities

      Phase 1: Define Committee Purpose and Responsibilities

      ACTIVITIES:

      • 1.1 Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC
      • 1.2 Conduct a SWOT analysis of your information security governance capabilities
      • 1.3 Identify the responsibilities and duties of the ISSC
      • 1.4 Draft the committee purpose statement for your ISSC

      OUTCOMES:

      • Conduct an analysis of your current information security governance capabilities and identify opportunities and weaknesses.
      • Define a clear scope of purpose and responsibilities for your ISSC.
      • Begin to customize your ISSC charter.

      Info-Tech Insight

      Balance vision with direction. Purpose and responsibilities should be defined so that they encompass your mission and objectives to the enterprise in clear terms, but provide enough detail that you can translate the charter into operational plans for the security team.

      Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC

      Supporting Tool icon 1.1

      A charter is the organizational mandate that outlines the purpose, scope, and authority of the ISSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.

      Start by reviewing Info-Tech’s template. Throughout the next two sections we will help you to tailor its contents.

      • Committee Purpose: The rationale, benefits of, and overall function of the committee.
      • Organization and Membership: Who is on the committee and how is participation measured against organizational need.
      • Responsibilities and Duties: What tasks/decisions the accountable committee is making.
      • RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.
      • Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with interested parties.
      Sample of the Info-Tech deliverable 'Information Security Steering Committee Charter Template'.

      Download the Information Security Steering Committee Charter to customize your organization’s charter

      Conduct a SWOT analysis of your information security governance capabilities

      Associated Activity icon 1.2

      INPUT: Survey outcomes, Governance overview handouts

      OUTPUT: SWOT analysis, Top identified challenges and opportunities

      1. Hold a meeting with your IT leadership team to conduct a SWOT analysis on your current information security governance capabilities.
      2. In small groups, or individually, have each group complete a SWOT analysis for one of the governance areas. For each consider:
        • Strengths: What is currently working well in this area?
        • Weaknesses: What could you improve? What are some of the challenges you’re experiencing?
        • Opportunities: What are some organizational trends that you can leverage? Consider whether your strengths or weaknesses could create opportunities.
        • Threats: What are some key obstacles across people, process, and technology?
      3. Have each team or individual rotate until each person has contributed to each SWOT. Add comments from the stakeholder survey to the SWOT.
      4. As a group, rank the inputs from each group and highlight the top five challenges and the top five opportunities you see for improvement.

      Identify the responsibilities and duties of the ISSC

      Associated Activity icon 1.3

      INPUT: SWOT analysis, Survey reports

      OUTPUT: Defined ISSC responsibilities

      1. With your security leadership team, review the typical responsibilities of the ISSC on the following slides (also included in the templated text of the charter linked below).
      2. Print off the following two slides, and in small teams or individually, identify which responsibilities the ISSC should have in your organization, brainstorm any additional responsibilities, and document reasoning.
      3. Have each team present to the larger group, track the similarities and differences between each of the groups, and come to consensus on the list of categories and responsibilities.
      4. Complete a sanity check: review your SWOT analysis. Do the responsibilities you’ve identified resolve the critical challenges or weaknesses?
      5. As a group, consider the responsibilities and whether you can reasonably implement those in one year or if there are any that will need to wait until year two of the committee.

      Add or modify responsibilities in Info-Tech’s Information Security Steering Committee Charter.

      Typical ISSC responsibilities and duties

      Use the following list of responsibilities to customize the list of responsibilities your ISSC may take on. These should link directly to the Responsibilities and Duties section of your ISSC charter.

      Strategic Oversight

      • Provide oversight and ensure alignment between information security strategy and company objectives.
      • Assess the adequacy of resources and funding to sustain and advance successful security programs and practices for identifying, assessing, and mitigating cybersecurity risks across all business functions.
      • Review controls to prevent, detect, and respond to cyber-attacks or information or data breaches involving company electronic information, intellectual property, data, or connected devices.
      • Review the company’s cyberinsurance policies to ensure appropriate coverage.
      • Provide recommendations, based on security best practices, for significant technology investments.

      Policy Governance

      • Review company policies pertaining to information security and cyberthreats, taking into account the potential for external threats, internal threats, and threats arising from transactions with trusted third parties and vendors.
      • Review privacy and information security policies and standards and the ramifications of updates to policies and standards.
      • Establish standards and procedures for escalating significant security incidents to the ISSC, board, other steering committees, government agencies, and law enforcement, as appropriate.

      Typical ISSC responsibilities and duties (continued)

      Use the following list of responsibilities to customize the list of responsibilities your ISSC may take on. These should link directly to the Responsibilities and Duties section of your ISSC charter.

      Risk Governance

      • Review and approve the company’s information risk governance structure and key risk management processes and capabilities.
      • Assess the company’s high-risk information assets and coordinate planning to address information privacy and security needs.
      • Provide input to executive management regarding the enterprise’s information risk appetite and tolerance.
      • Review the company’s cyber-response preparedness, incident response plans, and disaster recovery capabilities as applicable to the organization’s information security strategy.
      • Promote an open discussion regarding information risk and integrate information risk management into the enterprise’s objectives.

      Monitoring & Reporting

      • Receive periodic reports and coordinate with management on the metrics used to measure, monitor, and manage cyber and IT risks posed to the company and to review periodic reports on selected risk topics as the Committee deems appropriate.
      • Review reports provided by the IT organization regarding the status of and plans for the security of the company’s data stored on internal resources and with third-party providers.
      • Monitor and evaluate the quality and effectiveness of the company’s technology security, capabilities for disaster recovery, data protection, cyberthreat detection and cyber incident response, and management of technology-related compliance risks.

      Review the organization’s security strategy to solidify understanding of the ISSC’s purpose

      The ISSC should consistently evolve to reflect the strategic purpose of the security program. If you completed Info-Tech’s Security Strategy methodology, review the results to inform the scope of your committee. If you have not completed Info-Tech’s methodology, determining these details should be achieved through iterative stakeholder consultations.

      Strategy Components

      ISSC Considerations

      Security Pressure Analysis

      Review the ten security domains and your organization’s pressure levels to review the requisite maturity level of your security program. Consider how this may impact the focus of your ISSC.

      Security Drivers/Obligations

      Review how your security program supports the attainment of the organization’s business objectives. By what means should the ISSC support these objectives? This should inform the rationale, benefits, and overall function of the committee.

      Security Strategy Scope and Boundaries

      Consider the scope and boundaries of your security program to reflect on what the program is responsible for securing. Is this reflected adequately in the language of the committee’s purpose? Should components be added or redacted?

      Draft the committee purpose statement of your ISSC

      Associated Activity icon 1.4

      INPUT: SWOT Analysis, Security Strategy

      OUTPUT: ISSC Committee Purpose

      1. In a meeting with your IT leadership team – and considering the organization’s security strategy, defined responsibilities, and opportunities and threats identified – review the example goal statement in the Information Security Steering Committee Charter, and identify whether any of these statements apply to your organization. Select the statements that apply and collaboratively make any changes needed.
      2. Define unique goal statements by considering the following questions:
        • What three things would you realistically list for the ISSC to achieve?
        • If you were to accomplish three things in the next year, what would those be?
      3. With those goal statements in mind, consider the overall purpose of the committee. The purpose statement should be a reflection of what the committee does, why, and the goals.
      4. Have each individual review the example purpose statement and draft what they think a good purpose statement would be.
      5. Present each statement, and work together to determine a best-of-breed statement.

      Alter the Committee Purpose section in the Information Security Steering Committee Charter.

      ChatGPT Beyond the hype. What can it do for you?

      Summary of the deck.

      ChatGPT is a generative AI tool developed by OpenAI, a non-profit founded by Silicon Valley titans, including Elon Musk and Sam Altman. It is designed to interact with users in a way that mimics human dialogue. The tool became available via a research release on November 30, 2022, and was an immediate hit – within a week; it attracted more than a million users. Functionally, ChatGPT is designed to answer questions, but it is not the first one. The concept has existed for decades. While it is very powerful, it has also attracted criticism. 

      IT Operations, strategy

      Register to read more …

      IT Service Management Selection Guide

      • Buy Link or Shortcode: {j2store}488|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $29,187 Average $ Saved
      • member rating average days saved: 6 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Your ITSM solution that was once good enough is no longer adequate for a rapidly evolving services culture.
      • Processes and data are disconnected with multiple workarounds and don’t allow the operations team to mature processes.
      • The workarounds, disparate systems, and integrations you’ve implemented to solve IT operations issues are no longer adequate.

      Our Advice

      Critical Insight

      • Accessing funding for IT solutions can be challenging when the solution isn’t obviously aligned to the business need.
      • To maximize value and stakeholder satisfaction, determine use cases early, engage the right stakeholders, and define success.
      • Choosing a solution for a single purpose and then expanding it to cover other use cases can be a very effective use of technology dollars. However, spending the time up front to determine which use cases should be included and which will need a separate best-of-breed solution will make the best use of your investment.

      Impact and Result

      • Create a business case that defines use cases and requirements.
      • Shorten the list of viable vendors by matching vendors to use cases.
      • Determine which features are most important to reach your goals and select the best-matched vendor.

      IT Service Management Selection Guide Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how Info-Tech’s methodology will provide a quick solution to selecting ITSM vendors and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a business case

      Create a light business case to gain buy-in and define goals, milestones, and use cases.

      • IT Service Management Business Case Template

      2. Define requirements

      Create your list of requirements and shortlist vendors.

      • The ITSM Vendor Evaluation Workbook
      [infographic]

      Build a Data Classification MVP for M365

      • Buy Link or Shortcode: {j2store}67|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Applications
      • Parent Category Link: /end-user-computing-applications
      • Resources are the primary obstacle to getting a foot hold in O365 governance, whether it is funding or FTE resources.
      • Data is segmented and is difficult to analyze when you can’t see it or manage the relationships between sources.
      • Organizations expect results early and quickly and a common obstacle is that building a proper data classification framework can take more than two years and the business can't wait that long.

      Our Advice

      Critical Insight

      • Data classification is the lynchpin to ANY effective governance of O/M365 and your objective is to navigate through this easily and effectively and build a robust, secure, and viable governance model.
      • Start your journey by identifying what and where your data is and how much data you have. You need to understand what sensitive data you have and where it is stored before you can protect it or govern that data.
      • Ensure there is a high-level leader who is the champion of the governance objective.

      Impact and Result

      • Using least complex sensitivity labels in your classification are your building blocks to compliance and security in your data management schema; they are your foundational steps.

      Build a Data Classification MVP for M365 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a Data Classification MVP for M365 Deck – A guide for how to build a minimum-viable product for data classification that end users will actually use.

      Discover where your data resides, what governance helps you do, and what types of data you're classifying. Then build your data and security protection baselines for your retention policy, sensitivity labels, workload containers, and both forced and unforced policies.

      • Build a Data Classification MVP for M365 Storyboard
      [infographic]

      Further reading

      Build a Data Classification MVP for M365

      Kickstart your governance with data classification users will actually use!

      Executive Summary

      Info-Tech Insight

      • Creating an MVP gets you started in data governance
        Information protection and governance are not something you do once and then you are done. It is a constant process where you start with the basics (a minimum-viable product or MVP) and enhance your schema over time. The objective of the MVP is reducing obstacles to establishing an initial governance position, and then enabling rapid development of the solution to address a variety of real risks, including data loss prevention (DLP), data retention, legal holds, and data labeling.
      • Define your information and protection strategy
        The initial strategy is to start looking across your organization and identifying your customer data, regulatory data, and sensitive information. To have a successful data protection strategy you will include lifecycle management, risk management, data protection policies, and DLP. All key stakeholders need to be kept in the loop. Ensure you keep track of all available data and conduct a risk analysis early. Remember, data is your highest valued intangible asset.
      • Planning and resourcing are central to getting started on MVP
        A governance plan and governance decisions are your initial focus. Create a team of stakeholders that include IT and business leaders (including Legal, Finance, HR, and Risk), and ensure there is a top-level leader who is the champion of the governance objective, which is to ensure your data is safe, secure, and not prone to leakage or theft, and maintain confidentiality where it is warranted.

      Executive Summary

      Your Challenge
      • Today, the amount of data companies are gathering is growing at an explosive rate. New tools are enabling unforeseen channels and ways of collaborating.
      • Combined with increased regulatory oversight and reporting obligations, this makes the discovery and management of data a massive undertaking. IT can’t find and protect the data when the business has difficulty defining its data.
      • The challenge is to build a framework that can easily categorize and classify data yet allows for sufficient regulatory compliance and granularity to be useful. Also, to do it now because tomorrow is too late.
      Common Obstacles

      Data governance has several obstacles that impact a successful launch, especially if governing M365 is not a planned strategy. Below are some of the more common obstacles:

      • Resources are the primary obstacle to starting O365 governance, whether it is funding or people.
      • Data is segmented and is difficult to analyze when you can’t see it or manage the relationships between sources.
      • Organizations expect results early and quickly and a common obstacle is that building a "proper data classification framework” is a 2+ year project and the business can't wait that long.
      Info-Tech’s Approach
      • Start with the basics: build a minimum-viable product (MVP) to get started on the path to sustainable governance.
      • Identify what and where your data resides, how much data you have, and understand what sensitive data needs to be protected.
      • Create your team of stakeholders, including Legal, records managers, and privacy officers. Remember, they own the data and should manage it.
      • Categorization comes before classification, and discovery comes before categorization. Use easy-to-understand terms like high, medium, or low risk.

      Info-Tech Insight

      Data classification is the lynchpin to any effective governance of O/M365 and your objective is to navigate through this easily and effectively and build a robust, secure, and viable governance model. Start your journey by identifying what and where your data is and how much data do you have. You need to understand what sensitive data you have and where it is stored before you can protect or govern it. Ensure there is a high-level leader who is the champion of the governance objectives. Data classification fulfills the governance objectives of risk mitigation, governance and compliance, efficiency and optimization, and analytics.

      Questions you need to ask

      Four key questions to kick off your MVP.

      1

      Know Your Data

      Do you know where your critical and sensitive data resides and what is being done with it?

      Trying to understand where your information is can be a significant project.

      2

      Protect Your Data

      Do you have control of your data as it traverses across the organization and externally to partners?

      You want to protect information wherever it goes through encryption, etc.

      3

      Prevent Data Loss

      Are you able to detect unsafe activities that prevent sharing of sensitive information?

      Data loss prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data.

      4

      Govern Your Data

      Are you using multiple solutions (or any) to classify, label, and protect sensitive data?

      Many organizations use more than one solution to protect and govern their data, making it difficult to determine if there are any coverage gaps.

      Classification tiers

      Build your schema.

      Pyramid visualization for classification tiers. The top represents 'Simplicity', and the bottom 'Complexity' with the length of the sides at each level representing the '# of policies' and '# of labels'. At the top level is 'MVP (Minimum-Viable Product) - Confidential, Internal (Subcategory: Personal), Public'. At the middle level is 'Regulated - Highly Confidential, Confidential, Sensitive, General, Internal, Restricted, Personal, Sub-Private, Public'. And a the bottom level is 'Government (DOD) - Top Secret (TS), Secret, Confidential, Restricted, Official, Unclassified, Clearance'

      Info-Tech Insight

      Deciding on how granular you go into data classification will chiefly be governed by what industry you are in and your regulatory obligations – the more highly regulated your industry, the more classification levels you will be mandated to enforce. The more complexity you introduce into your organization, the more operational overhead both in cost and resources you will have to endure and build.

      Microsoft MIP Topology

      Microsoft Information Protection (MIP), which is Microsoft’s Data Classification Services, is the key to achieving your governance goals. Without an MVP, data classification will be overwhelming; simplifying is the first step in achieving governance.

      A diagram of multiple offerings all connected to 'MIP Data Classification Service'. Circled is 'Sensitivity Labels' with an arrow pointing back to 'MIP' at the center.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Info-Tech Insight

      Using least-complex sensitivity labels in your classification are your building blocks to compliance and security in your data management schema; they are your foundational steps.

      MVP RACI Chart

      Data governance is a "takes a whole village" kind of effort.

      Clarify who is expected to do what with a RACI chart.

      End User M365 Administrator Security/ Compliance Data Owner
      Define classification divisions R A
      Appy classification label to data – at point of creation A R
      Apply classification label to data – legacy items R A
      Map classification divisions to relevant policies R A
      Define governance objectives R A
      Backup R A
      Retention R A
      Establish minimum baseline A R

      What and where your data resides

      Data types that require classification.

      Logos for 'Microsoft', 'Office 365', and icons for each program included in that package.
      M365 Workload Containers
      Icon for MS Exchange. Icon for MS SharePoint.Icon for MS Teams. Icon for MS OneDrive. Icon for MS Project Online.
      Email
      • Attachments
      Site Collections, Sites Sites Project Databases
      Contacts Teams and Group Site Collections, Sites Libraries and Lists Sites
      Metadata Libraries and Lists Documents
      • Versions
      Libraries and Lists
      Teams Conversations Documents
      • Versions
      Metadata Documents
      • Versions
      Teams Chats Metadata Permissions
      • Internal Sharing
      • External Sharing
      Metadata
      Permissions
      • Internal Sharing
      • External Sharing
      Files Shared via Teams Chats Permissions
      • Internal Sharing
      • External Sharing

      Info-Tech Insight

      Knowing where your data resides will ensure you do not miss any applicable data that needs to be classified. These are examples of the workload containers; you may have others.

      Discover and classify on- premises files using AIP

      AIP helps you manage sensitive data prior to migrating to Office 365:
      • Use discover mode to identify and report on files containing sensitive data.
      • Use enforce mode to automatically classify, label, and protect files with sensitive data.
      Can be configured to scan:
      • SMB files
      • SharePoint Server 2016, 2013
      Stock image of a laptop uploading to the cloud with a padlock and key in front of it.
      • Map your network and find over-exposed file shares.
      • Protect files using MIP encryption.
      • Inspect the content in file repositories and discover sensitive information.
      • Classify and label file per MIP policy.
      Azure Information Protection scanner helps discover, classify, label, and protect sensitive information in on-premises file servers. You can run the scanner and get immediate insight into risks with on-premises data. Discover mode helps you identify and report on files containing sensitive data (Microsoft Inside Track and CIAOPS, 2022). Enforce mode automatically classifies, labels, and protects files with sensitive data.

      Info-Tech Insight

      Any asset deployed to the cloud must have approved data classification. Enforcing this policy is a must to control your data.

      Understanding governance

      Microsoft Information Governance

      Information Governance
      • Retention policies for workloads
      • Inactive and archive mailboxes

      Arrow pointing down-right

      Records Management
      • Retention labels for items
      • Disposition review

      Arrow pointing down-left

      Retention and Deletion

      ‹——— Connectors for Third-Party Data ———›

      Information governance manages your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you do not. Backup should not be used as a retention methodology since information governance is managed as a “living entity” and backup is a stored information block that is “suspended in time.” Records management uses intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization. It is for that discrete set of content that needs to be immutable.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Retention and backup policy decision

      Retention is not backup.

      Info-Tech Insight

      Retention is not backup. Retention means something different: “the content must be available for discovery and legal document production while being able to defend its provenance, chain of custody, and its deletion or destruction” (AvePoint Blog, 2021).

      Microsoft Responsibility (Microsoft Protection) Weeks to Months Customer Responsibility (DLP, Backup, Retention Policy) Months to Years
      Loss of service due to natural disaster or data center outage Loss of data due to departing employees or deactivated accounts
      Loss of service due to hardware or infrastructure failure Loss of data due to malicious insiders or hackers deleting content
      Short-term (30 days) user error with recycle bin/ version history (including OneDrive “File Restore”) Loss of data due to malware or ransomware
      Short-term (14 days) administrative error with soft- delete for groups, mailboxes, or service-led rollback Recovery from prolonged outages
      Long-term accidental deletion coverage with selective rollback

      Understand retention policy

      What are retention policies used for? Why you need them as part of your MVP?

      Do not confuse retention labels and policies with backup.

      Remember: “retention [policies are] auto-applied whereas retention label policies are only applied if the content is tagged with the associated retention label” (AvePoint Blog, 2021).

      E-discovery tool retention policies are not turned on automatically.

      Retention policies are not a backup tool – when you activate this feature you are unable to delete anyone.

      “Data retention policy tools enable a business to:

      • “Decide proactively whether to retain content, delete content, or retain and then delete the content when needed.
      • “Apply a policy to all content or just content meeting certain conditions, such as items with specific keywords or specific types of sensitive information.
      • “Apply a single policy to the entire organization or specific locations or users.
      • “Maintain discoverability of content for lawyers and auditors, while protecting it from change or access by other users. […] ‘Retention Policies’ are different than ‘Retention Label Policies’ – they do the same thing – but a retention policy is auto-applied, whereas retention label policies are only applied if the content is tagged with the associated retention label.

      “It is also important to remember that ‘Retention Label Policies’ do not move a copy of the content to the ‘Preservation Holds’ folder until the content under policy is changed next.” (Source: AvePoint Blog, 2021)

      Definitions

      Data classification is a focused term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level. In its most basic form, data classification is a means of protecting your data from unauthorized disclosure, alteration, or destruction based on how sensitive or impactful it is.

      Once data is classified, you can then create policies; sensitive data types, trainable classifiers, and sensitivity labels function as inputs to policies. Policies define behaviors, like if there will be a default label, if labeling is mandatory, what locations the label will be applied to, and under what conditions. A policy is created when you configure Microsoft 365 to publish or automatically apply sensitive information types, trainable classifiers, or labels.

      Sensitivity label policies show one or more labels to Office apps (like Outlook and Word), SharePoint sites, and Office 365 groups. Once published, users can apply the labels to protect their content.

      Data loss prevention (DLP) policies help identify and protect your organization's sensitive info (Microsoft Docs, April 2022). For example, you can set up policies to help make sure information in email and documents is not shared with the wrong people. DLP policies can use sensitive information types and retention labels to identify content containing information that might need protection.

      Retention policies and retention label policies help you keep what you want and get rid of what you do not. They also play a significant role in records management.

      Data examples for MVP classification

      • Examples of the type of data you consider to be Confidential, Internal, or Public.
      • This will help you determine what to classify and where it is.
      Internal Personal, Employment, and Job Performance Data
      • Social Security Number
      • Date of birth
      • Marital status
      • Job application data
      • Mailing address
      • Resume
      • Background checks
      • Interview notes
      • Employment contract
      • Pay rate
      • Bonuses
      • Benefits
      • Performance reviews
      • Disciplinary notes or warnings
      Confidential Information
      • Business and marketing plans
      • Company initiatives
      • Customer information and lists
      • Information relating to intellectual property
      • Invention or patent
      • Research data
      • Passwords and IT-related information
      • Information received from third parties
      • Company financial account information
      • Social Security Number
      • Payroll and personnel records
      • Health information
      • Self-restricted personal data
      • Credit card information
      Internal Data
      • Sales data
      • Website data
      • Customer information
      • Job application data
      • Financial data
      • Marketing data
      • Resource data
      Public Data
      • Press releases
      • Job descriptions
      • Marketing material intended for general public
      • Research publications

      New container sensitivity labels (MIP)

      New container sensitivity labels

      Public Private
      Privacy
      1. Membership to group is open; anyone can join
      2. “Everyone except external guest” ACL onsite; content available in search to all tenants
      1. Only owner can add members
      2. No access beyond the group membership until someone shares it or changes permissions
      Allowed Not Allowed
      External guest policy
      1. Membership to group is open; anyone can join
      2. “Everyone except external guest” ACL onsite; content available in search to all tenants
      1. Only owner can add members
      2. No access beyond the group membership until someone shares it or changes permissions

      What users will see when they create or label a Team/Group/Site

      Table of what users will see when they create or label a team/group/site highlighting 'External guest policy' and 'Privacy policy options' as referenced above.
      (Source: Microsoft, “Microsoft Purview compliance portal”)

      Info-Tech Insights

      Why you need sensitivity container labels:
      • Manage privacy of Teams Sites and M365 Groups
      • Manage external user access to SPO sites and teams
      • Manage external sharing from SPO sites
      • Manage access from unmanaged devices

      Data protection and security baselines

      Data Protection Baseline

      “Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline" (Microsoft Docs, June 2022). This baseline assessment has a set of controls for key regulations and standards for data protection and general data governance. This baseline draws elements primarily from NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) and ISO (International Organization for Standardization) as well as from FedRAMP (Federal Risk and Authorization Management Program) and GDPR (General Data Protection Regulation of the European Union).

      Security Baseline

      The final stage in M365 governance is security. You need to implement a governance policy that clearly defines storage locations for certain types of data and who has permission to access it. You need to record and track who accesses content and how they share it externally. “Part of your process should involve monitoring unusual external sharing to ensure staff only share documents that they are allowed to” (Rencore, 2021).

      Info-Tech Insights

      • Controls are already in place to set data protection policy. This assists in the MVP activities.
      • Finally, you need to set your security baseline to ensure proper permissions are in place.

      Prerequisite baseline

      Icon of crosshairs.
      Security

      MFA or SSO to access from anywhere, any device

      Banned password list

      BYOD sync with corporate network

      Icon of a group.
      Users

      Sign out inactive users automatically

      Enable guest users

      External sharing

      Block client forwarding rules

      Icon of a database.
      Resources

      Account lockout threshold

      OneDrive

      SharePoint

      Icon of gears.
      Controls

      Sensitivity labels, retention labels and policies, DLP

      Mobile application management policy

      Building baselines

      Sensitivity Profiles: Public, Internal, Confidential; Subcategory: Highly Confidential

      Microsoft 365 Collaboration Protection Profiles

      Sensitivity Public External Collaboration Internal Highly Confidential
      Description Data that is specifically prepared for public consumption Not approved for public consumption, but OK for external collaboration External collaboration highly discouraged and must be justified Data of the highest sensitivity: avoid oversharing, internal collaboration only
      Label details
      • No content marking
      • No encryption
      • Public site
      • External collaboration allowed
      • Unmanaged devices: allow full access
      • No content marking
      • No encryption
      • Private site
      • External collaboration allowed
      • Unmanaged devices: allow full access
      • Content marking
      • Encryption
      • Private site
      • External collaboration allowed but monitored
      • Unmanaged devices: limited web access
      • Content marking
      • Encryption
      • Private site
      • External collaboration disabled
      • Unmanaged devices: block access
      Teams or Site details Public Team or Site open discovery, guests are allowed Private Team or Site members are invited, guests are allowed Private Team or Site members are invited, guests are not allowed
      DLP None Warn Block

      Please Note: Global/Compliance Admins go to the 365 Groups platform, the compliance center (Purview), and Teams services (Source: Microsoft Documentation, “Microsoft Purview compliance documentation”)

      Info-Tech Insights

      • Building baseline profiles will be a part of your MVP. You will understand what type of information you are addressing and label it accordingly.
      • Sensitivity labels are a way to classify your organization's data in a way that specifies how sensitive the data is. This helps you decrease risks in sharing information that shouldn't be accessible to anyone outside your organization or department. Applying sensitivity labels allows you to protect all your data easily.

      MVP activities

      PRIMARY
      ACTIVITIES
      Define Your Governance
      The objective of the MVP is reducing barriers to establishing an initial governance position, and then enabling rapid progression of the solution to address a variety of tangible risks, including DLP, data retention, legal holds, and labeling.
      Decide on your classification labels early.

      CATEGORIZATION





      CLASSIFICATION

      MVP
      Data Discovery and Management
      AIP (Azure Information Protection) scanner helps discover, classify, label, and protect sensitive information in on-premises file servers. You can run the scanner and get immediate insight into risks with on-premises data.
      Baseline Setup
      Building baseline profiles will be a part of your MVP. You will understand what type of information you are addressing and label it accordingly. Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline.
      Default M365 settings
      Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline. This baseline assessment has a set of controls for key regulations and standards for data protection and general data governance.
      SUPPORT
      ACTIVITIES
      Retention Policy
      Retention policy is auto-applied. Decide whether to retain content, delete content, or retain and then delete the content.
      Sensitivity Labels
      Automatically enforce policies on groups through labels; classify groups.
      Workload Containers
      M365: SharePoint, Teams, OneDrive, and Exchange, where your data is stored for labels and policies.
      Unforced Policies
      Written policies that are not enforceable by controls in Compliance Manager such as acceptable use policy.
      Forced Policies
      Restrict sharing controls to outside organizations. Enforce prefix or suffix to group or team names.

      ACME Company MVP for M/O365

      PRIMARY
      ACTIVITIES
      Define Your Governance


      Focus on ability to use legal hold and GDPR compliance.

      CATEGORIZATION





      CLASSIFICATION

      MVP
      Data Discovery and Management


      Three classification levels (public, internal, confidential), which are applied by the user when data is created. Same three levels are used for AIP to scan legacy sources.

      Baseline Setup


      All data must at least be classified before it is uploaded to an M/O365 cloud service.

      Default M365 settings


      Turn on templates 1 8 the letter q and the number z

      SUPPORT
      ACTIVITIES
      Retention Policy


      Retention policy is auto-applied. Decide whether to retain content, delete content, or retain and then delete the content.

      Sensitivity Labels


      Automatically enforce policies on groups through labels; classify groups.

      Workload Containers


      M365: SharePoint, Teams, OneDrive, and Exchange, where your data is stored for labels and policies.

      Unforced Policies


      Written policies that are not enforceable by controls in Compliance Manager such as acceptable use policy.

      Forced Policies


      Restrict sharing controls to outside organizations. Enforce prefix or suffix to group or team names.

      Related Blueprints

      Govern Office 365

      Office 365 is as difficult to wrangle as it is valuable. Leverage best practices to produce governance outcomes aligned with your goals.

      Map your organizational goals to the administration features available in the Office 365 console. Your governance should reflect your requirements.

      Migrate to Office 365 Now

      Jumping into an Office 365 migration project without careful thought of the risks of a cloud migration will lead to project halt and interruption. Intentionally plan in order to expose risk and to develop project foresight for a smooth migration.

      Microsoft Teams Cookbook

      Remote work calls for leveraging your Office 365 license to use Microsoft Teams – but IT is unsure about best practices for governance and permissions. Moreover, IT has few resources to help train end users with Teams best practices

      IT Governance, Risk & Compliance

      Several blueprints are available on a broader topic of governance, from Make Your IT Governance Adaptable to Improve IT Governance to Drive Business Results and Build an IT Risk Management Program.

      Bibliography

      “Best practices for sharing files and folders with unauthenticated users.” Microsoft Build, 28 April 2022. Accessed 2 April 2022.

      “Build and manage assessments in Compliance Manager.” Microsoft Docs, 15 June 2022. Web.

      “Building a modern workplace with Microsoft 365.” Microsoft Inside Track, n.d. Web.

      Crane, Robert. “June 2020 Microsoft 365 Need to Know Webinar.” CIAOPS, SlideShare, 26 June 2020. Web.

      “Data Classification: Overview, Types, and Examples.” Simplilearn, 27 Dec. 2021. Accessed 11 April 2022.

      “Data loss prevention in Exchange Online.” Microsoft Docs, 19 April 2022. Web.

      Davies, Nahla. “5 Common Data Governance Challenges (and How to Overcome Them).” Dataversity. 25 October 2021. Accessed 5 April 2022.

      “Default labels and policies to protect your data.” Microsoft Build, April 2022. Accessed 3 April 2022.

      M., Peter. "Guide: The difference between Microsoft Backup and Retention." AvePoint Blog, 9 Oct. 2021. Accessed 4 April 2022.

      Meyer, Guillaume. “Sensitivity Labels: What They Are, Why You Need Them, and How to Apply Them.” nBold, 6 October 2021. Accessed 2 April 2022.

      “Microsoft 365 guidance for security & compliance.” Microsoft, 27 April 2022. Accessed 28 April 2022.

      “Microsoft Purview compliance portal.” Microsoft, 19 April 2022. Accessed 22 April 2022.

      “Microsoft Purview compliance documentation.” Microsoft, n.d. Accessed 22 April 2022.

      “Microsoft Trust Center: Products and services that run on trust.” Microsoft, 2022. Accessed 3 April 2022.

      “Protect your sensitive data with Microsoft Purview.” Microsoft Build, April 2022. Accessed 3 April 2022.

      Zimmergren, Tobias. “4 steps to successful cloud governance in Office 365.” Rencore, 9 Sept. 2021. Accessed 5 April 2022.

      Deliver Digital Products at Scale

      • Buy Link or Shortcode: {j2store}156|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $86,499 Average $ Saved
      • member rating average days saved: 53 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Products are the lifeblood of an organization. They provide the capabilities the business needs to deliver value to both internal and external customers and stakeholders.
      • Product organizations are expected to continually deliver evolving value to the overall organization as they grow.
      • You need to clearly convey the direction and strategy of a broad product portfolio to gain alignment, support, and funding from your organization.

      Our Advice

      Critical Insight

      • Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that improve end-user value and enterprise alignment.
      • Your organizational goals and strategy are achieved through capabilities that deliver value. Your product hierarchy is the mechanism to translate enterprise goals, priorities, and constraints down to the product level where changes can be made.
      • Recognize that each product owner represents one of three primary perspectives: business, technical, and operational. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.
      • The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.
      • Your product family roadmap and product roadmap tell different stories. The product family roadmap represents the overall connection of products to the enterprise strategy, while the product roadmap focuses on the fulfillment of the product’s vision.
      • Although products can be delivered with any software development lifecycle, methodology, delivery team structure, or organizational design, high-performing product teams optimize their structure to fit the needs of product and product family delivery.

      Impact and Result

      • Understand the importance of product families for scaling product delivery.
      • Define products in your context and organize products into operational families.
      • Use product family roadmaps to align product roadmaps to enterprise goals and priorities.
      • Evaluate the different approaches to improve your product family delivery pipelines and milestones.

      Deliver Digital Products at Scale Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should define enterprise product families to scale your product delivery capability, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Become a product-centric organization

      Define products in your organization’s context and explore product families as a way to organize products at scale.

      • Deliver Digital Products at Scale – Phase 1: Become a Product-Centric Organization
      • Deliver Digital Products at Scale Workbook
      • Digital Product Family Strategy Playbook

      2. Organize products into product families

      Identify an approach to group the inventory of products into one or more product families.

      • Deliver Digital Products at Scale – Phase 2: Organize Products Into Product Families

      3. Ensure alignment between products and families

      Confirm alignment between your products and product families via the product family roadmap and a shared definition of delivered value.

      • Deliver Digital Products at Scale – Phase 3: Ensure Alignment Between Products and Families

      4. Bridge the gap between product families and delivery

      Agree on a delivery approach that best aligns with your product families.

      • Deliver Digital Products at Scale – Phase 4: Bridge the Gap Between Product Families and Delivery
      • Deliver Digital Products at Scale Readiness Assessment

      5. Build your transformation roadmap and communication plan

      Define your communication plan and transformation roadmap for transitioning to delivering products at the scale of your organization.

      • Deliver Digital Products at Scale – Phase 5: Transformation Roadmap and Communication

      Infographic

      Workshop: Deliver Digital Products at Scale

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Become a Product-Centric Organization

      The Purpose

      Define products in your organization’s context and explore product families as a way to organize products at scale.

      Key Benefits Achieved

      An understanding of the case for product practices

      A concise definition of products and product families

      Activities

      1.1 Understand your organizational factors driving product-centric delivery.

      1.2 Establish your organization’s product inventory.

      1.3 Determine your approach to scale product families.

      Outputs

      Organizational drivers and goals for a product-centric delivery

      Definition of product

      Product scaling principles

      Scaling approach and direction

      Pilot list of products to scale

      2 Organize Products Into Product Families

      The Purpose

      Identify a suitable approach to group the inventory of products into one or more product families.

      Key Benefits Achieved

      A scaling approach for products that fits your organization

      Activities

      2.1 Define your product families.

      Outputs

      Product family mapping

      Enabling applications

      Dependent applications

      Product family canvas

      3 Ensure Alignment Between Products and Families

      The Purpose

      Confirm alignment between your products and product families via the product family roadmap and a shared definition of delivered value.

      Key Benefits Achieved

      Recognition of the product family roadmap and a shared definition of value as key concepts to maintain alignment between your products and product families

      Activities

      3.1 Leverage product family roadmaps.

      3.2 Use stakeholder management to improve roadmap communication.

      3.3 Configure your product family roadmaps.

      3.4 Confirm product family to product alignment.

      Outputs

      Current approach for communication of product family strategy

      List of product family stakeholders and a prioritization plan for communication

      Defined key pieces of a product family roadmap

      An approach to confirming alignment between products and product families through a shared definition of business value

      4 Bridge the Gap Between Product Families and Delivery

      The Purpose

      Agree on the delivery approach that best aligns with your product families.

      Key Benefits Achieved

      An understanding of the team configuration and operating model required to deliver value through your product families

      Activities

      4.1 Assess your organization’s delivery readiness.

      4.2 Understand your delivery options.

      4.3 Determine your operating model.

      4.4 Identify how to fund product delivery.

      4.5 Learn how to introduce your digital product family strategy.

      4.6 Communicate changes on updates to your strategy.

      4.7 Determine your next steps.

      Outputs

      Assessment results on your organization’s delivery maturity

      A preferred approach to structuring product delivery

      Your preferred operating model for delivering product families

      Understanding of your preferred approach for product family funding

      Product family transformation roadmap

      Your plan for communicating your roadmap

      List of actionable next steps to start on your journey

      5 Advisory: Next Steps and Wrap-Up (offsite)

      The Purpose

      Implement your communication plan and transformation roadmap for transitioning to delivering products at the scale of your organization.

      Key Benefits Achieved

      New product family organization and supporting product delivery approach

      Activities

      5.1 Execute communication plan and product family changes.

      5.2 Review the pilot family implementation and update the transformation roadmap.

      5.3 Begin advisory calls for related blueprints.

      Outputs

      Organizational communication of product families and product family roadmaps

      Product family implementation and updated transformation roadmap

      Support for product owners, backlog and roadmap management, and other topics

      Further reading

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Analyst Perspective

      Product families align enterprise goals to product changes and value realization.

      A picture of Info-Tech analyst Banu Raghuraman. A picture of Info-Tech analyst Ari Glaizel. A picture of Info-Tech analyst Hans Eckman

      Our world is changing faster than ever, and the need for business agility continues to grow. Organizations are shifting from long-term project delivery to smaller, iterative product delivery models to be able to embrace change and respond to challenges and opportunities faster.

      Unfortunately, many organizations focus on product delivery at the tactical level. Product teams may be individually successful, but how well are their changes aligned to division and enterprise goals and priorities?

      Grouping products into operationally aligned families is key to delivering the right value to the right stakeholders at the right time.

      Product families translate enterprise goals, constraints, and priorities down to the individual product level so product owners can make better decisions and more effectively manage their roadmaps and backlogs. By scaling products into families and using product family roadmaps to align product roadmaps, product owners can deliver the capabilities that allow organizations to reach their goals.

      In this blueprint, we’ll provide the tools and guidance to help you define what “product” means to your organization, use scaling patterns to build product families, align product and product family roadmaps, and identify impacts to your delivery and organizational design models.

      Banu Raghuraman, Ari Glaizel, and Hans Eckman

      Applications Practice

      Info-Tech Research Group

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      • Products are the lifeblood of an organization. They deliver the capabilities needed to deliver value to customers, internal users, and stakeholders.
      • The shift to becoming a product organization is intended to continually increase the value you provide to the broader organization as you grow and evolve.
      • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.

      Common Obstacles

      • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This conflicts with product delivery, which continuously delivers value over the lifetime of a product.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
      • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.

      Info-Tech’s Approach

      Info-Tech’s approach will guide you through:

      • Understanding the importance of product families in scaling product delivery.
      • Defining products in your context and organizing products into operational families.
      • Using product family roadmaps to align product roadmaps to enterprise goals and priorities.
      • Evaluating the different approaches to improve your product family delivery pipelines and milestones.

      Info-Tech Insight

      Changes can only be made at the individual product or service level. To achieve enterprise goals and priorities, organizations needed to organize and scale products into operational families. This structure allows product managers to translate goals and constraints to the product level and allows product owners to deliver changes that support enabling capabilities. In this blueprint, we’ll help you define your products, scale them using the best patterns, and align your roadmaps and delivery models to improve throughput and value delivery.

      Info-Tech’s approach

      Operationally align product delivery to enterprise goals

      A flowchart is shown on how to operationally align product delivery to enterprise goals.

      The Info-Tech difference:

      1. Start by piloting product families to determine which approaches work best for your organization.
      2. Create a common definition of what a product is and identify products in your inventory.
      3. Use scaling patterns to build operationally aligned product families.
      4. Develop a roadmap strategy to align families and products to enterprise goals and priorities.
      5. Use products and families to evaluate delivery and organizational design improvements.

      Deliver Digital Products at Scale via Enterprise Product Families

      An infographic on the Enterprise Product Families is shown.

      Product does not mean the same thing to everyone

      Do not expect a universal definition of products.

      Every organization and industry has a different definition of what a product is. Organizations structure their people, processes, and technologies according to their definition of the products they manage. Conflicting product definitions between teams increase confusion and misalignment of product roadmaps.

      “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.”

      - Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance

      “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.”

      - TechTarget

      “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.”

      - Mark Curphey

      Organizations need a common understanding of what a product is and how it pertains to the business. This understanding needs to be accepted across the organization.

      “There is not a lot of guidance in the industry on how to define [products]. This is dangerous because what will happen is that product backlogs will be formed in too many areas. All that does is create dependencies and coordination across teams … and backlogs.”

      – Chad Beier, "How Do You Define a Product?” Scrum.org

      What is a product?

      “A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.”

      Info-Tech Insight

      A proper definition of product recognizes three key facts:

      1. Products are long-term endeavors that don’t end after the project finishes.
      2. Products are not just “apps” but can be software or services that drive the delivery of value.
      3. There is more than one stakeholder group that derives value from the product or service.

      Products and services share the same foundation and best practices

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. Product is used for consistency but would apply to services as well.

      Product = Service

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Recognize the different product owner perspectives

      Business:

      • Customer facing, revenue generating

      Technical:

      • IT systems and tools

      Operations:

      • Keep the lights on processes

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Info-Tech Insight

      Recognize that product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.”

      – Robbin Schuurman, “Tips for Starting Product Owners”

      Identify the differences between a project-centric and a product-centric organization

      Project

      Product

      Fund projects

      Funding

      Fund products or teams

      Line of business sponsor

      Prioritization

      Product owner

      Makes specific changes to a product

      Product management

      Improve product maturity and support

      Assign people to work

      Work allocation

      Assign work to product teams

      Project manager manages

      Capacity management

      Team manages capacity

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for delivering product changes and improvements

      A flowchart is shown to demonstrate the difference between project lifecycle, hybrid lifecycle and product lifecycle.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply. The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release. Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      An image is shown to demonstrate the relationship between the product backlog and the product roadmap.

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      An example of a product roadmap is shown to demonstrate how it is the core to value realization.

      Adapted from: Pichler, "What Is Product Management?""

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      Use Agile DevOps principles to expedite product-centric delivery and management

      Delivering products does not necessarily require an Agile DevOps mindset. However, Agile methods facilitate the journey because product thinking is baked into them.

      A flowchart is shown to demonstrate the product deliery maturity and the Agile DevOps used.
      Based on: Ambysoft, 2018

      Organizations start with Waterfall to improve the predictable delivery of product features.

      Iterative development shifts the focus from delivery of features to delivery of user value.

      Agile further shifts delivery to consider ROI. Often, the highest-value backlog items aren’t the ones with the highest ROI.

      Lean and DevOps improve your delivery pipeline by providing full integration between product owners, development teams, and operations.

      CI/CD reduces time in process by allowing release on demand and simplifying release and support activities.

      Although teams will adopt parts of all these stages during their journey, it isn’t until you’ve adopted a fully integrated delivery chain that you’ve become product centric.

      Scale products into related families to improve value delivery and alignment

      Defining product families builds a network of related products into coordinated value delivery streams.

      A flowchart is shown to demonstrate the relations between product family and the delivery streams.

      “As with basic product management, scaling an organization is all about articulating the vision and communicating it effectively. Using a well-defined framework helps you align the growth of your organization with that of the company. In fact, how the product organization is structured is very helpful in driving the vision of what you as a product company are going to do.”

      – Rich Mironov, Mironov Consulting

      Product families translate enterprise goals into value-enabling capabilities

      A flowchart is shown to demonstrate the relationship between enterprise strategy and enabling capabilities.

      Info-Tech Insight

      Your organizational goals and strategy are achieved through capabilities that deliver value. Your product hierarchy is the mechanism to translate enterprise goals, priorities, and constraints down to the product level where changes can be made.

      Arrange product families by operational groups, not solely by your org chart

      A flowchart is shown to demonstrate how to arrange product families by operational groups.

      1. To align product changes with enterprise goals and priorities, you need to organize your products into operational groups based on the capabilities or business functions the product and family support.

      2. Product managers translate these goals, priorities, and constraints into their product families, so they are actionable at the next level, whether that level is another product family or products implementing enhancements to meet these goals.

      3. The product family manager ensures that the product changes enhance the capabilities that allow you to realize your product family, division, and enterprise goals.

      4. Enabling capabilities realize value and help reach your goals, which then drives your next set of enterprise goals and strategy.

      Approach alignment from both directions, validating by the opposite way

      Defining your product families is not a one-way street. Often, we start from either the top or the bottom depending on our scaling principles. We use multiple patterns to find the best arrangement and grouping of our products and families.

      It may be helpful to work partway, then approach your scaling from the opposite direction, meeting in the middle. This way you are taking advantage of the strengths in both approaches.

      Once you have your proposed structure, validate the grouping by applying the principles from the opposite direction to ensure each product and family is in the best starting group.

      As the needs of your organization change, you may need to realign your product families into your new business architecture and operational structure.

      A top-down alignment example is shown.

      When to use: You have a business architecture defined or clear market/functional grouping of value streams.

      A bottom-up alignment example is shown.

      When to use: You are starting from an Application Portfolio Management application inventory to build or validate application families.

      Leverage patterns for scaling products

      Organizing your products and families is easier when leveraging these grouping patterns. Each is explained in greater detail on the following slides

      Value Stream Alignment

      Enterprise Applications

      Shared Services

      Technical

      Organizational Alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products
      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > ModulesSupporting: Job board, healthcare administrator
      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools
      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network
      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure no longer needed because the management team owns product management role

      Leverage the product family roadmap for alignment

      It’s more than a set of colorful boxes. It’s the map to align everyone to where you are going.

      Your product family roadmap

        ✓ Lays out a strategy for your product family.

        ✓ Is a statement of intent for your family of products.

        ✓ Communicates direction for the entire product family and product teams.

        ✓ Directly connects to the organization’s goals.

      However, it is not:

        x Representative of a hard commitment.

        x A simple combination of your current product roadmaps.

      Before connecting your family roadmap to products, think about what each roadmap typically presents

      An example of a product family roadmap is shown and how it can be connected to the products.

      Info-Tech Insight

      Your product family roadmap and product roadmap tell different stories. The product family roadmap represents the overall connection of products to the enterprise strategy, while the product roadmap focuses on the fulfillment of the product’s vision.

      Product family roadmaps are more strategic by nature

      While individual product roadmaps can be different levels of tactical or strategic depending on a variety of market factors, your options are more limited when defining roadmaps for product families.

      Product

      TACTICAL

      A roadmap that is technical, committed, and detailed.

      Product Family

      STRATEGIC

      A roadmap that is strategic, goal based, high level, and flexible.

      Info-Tech Insight

      Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.

      Consider volatility when structuring product family roadmaps

      A roadmap is shown without any changes.

      There is no such thing as a roadmap that never changes.

      Your product family roadmap represents a broad statement of intent and high-level tactics to get closer to the organization’s goals.

      A roadmap is shown with changes.

      All good product family roadmaps embrace change!

      Your strategic intentions are subject to volatility, especially those planned further in the future. The more costs you incur in planning, the more you leave yourself exposed to inefficiency and waste if those plans change.

      Info-Tech Insight

      A good product family roadmap is intended to manage and communicate the inevitable changes as a result of market volatility and changes in strategy.

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      PRODUCT STRATEGY

      What are the artifacts?

      What are you saying?

      Defined at the family level?

      Defined at the product level?

      Vision

      I want to...

      Strategic focus

      Delivery focus

      Goals

      To get there we need to...

      Roadmap

      To achieve our goals, we’ll deliver...

      Backlog

      The work will be done in this order...

      Release Plan

      We will deliver in the following ways...

      Typical elements of a product family roadmap

      While there are others, these represent what will commonly appear across most family-based roadmaps.

      An example is shown to highlight the typical elements of a product family roadmap.

      GROUP/CATEGORY: Groups are collections of artifacts. In a product family context, these are usually product family goals, value streams, or products.

      ARTIFACT: An artifact is one of many kinds of tangible by-products produced during the delivery of products. For a product family, the artifacts represented are capabilities or value streams.

      MILESTONE: Points in the timeline when established sets of artifacts are complete. This is a critical tool in the alignment of products in a given family.

      TIME HORIZON: Separated periods within the projected timeline covered by the roadmap.

      Connecting your product family roadmaps to product roadmaps

      Your product and product family roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but it can be done at a more granular level if an understanding of capabilities isn’t available.

      An example is shown on how the product family roadmpas can be connected to the product roadmaps.

      Multiple roadmap views can communicate differently, yet tell the same truth

      Audience

      Business/ IT Leaders

      Users/Customers

      Delivery Teams

      Roadmap View

      Portfolio

      Product Family

      Technology

      Objectives

      To provide a snapshot of the portfolio and priority products

      To visualize and validate product strategy

      To coordinate broad technology and architecture decisions

      Artifacts

      Line items or sections of the roadmap are made up of individual products, and an artifact represents a disposition at its highest level.

      Artifacts are generally grouped by product teams and consist of strategic goals and the features that realize those goals.

      Artifacts are grouped by the teams who deliver that work and consist of technical capabilities that support the broader delivery of value for the product family.

      Your communication objectives are linked to your audience; ensure you know your audience and speak their language

      I want to...

      I need to talk to...

      Because they are focused on...

      ALIGN PRODUCT TEAMS

      Get my delivery teams on the same page.

      Architects

      Products Owners

      PRODUCTS

      A product that delivers value against a common set of goals and objectives.

      SHOWCASE CHANGES

      Inform users and customers of product strategy.

      Bus. Process Owners

      End Users

      FUNCTIONALITY

      A group of functionality that business customers see as a single unit.

      ARTICULATE RESOURCE REQUIREMENTS

      Inform the business of product development requirements.

      IT Management

      Business Stakeholders

      FUNDING

      An initiative that those with the money see as a single budget.

      Assess the impacts of product-centric delivery on your teams and org design

      Product delivery can exist within any org structure or delivery model. However, when making the shift toward product management, consider optimizing your org design and product team structure to match your capacity and throughput needs.

      A flowchart is shown to see how the impacts of product-centric delivery can impact team and org designs.

      Determine which delivery team structure best fits your product pipeline

      Four delivery team structures are shown. The four are: functional roles, shared service and resource pools, product or system, and skills and competencies.

      Weigh the pros and cons of IT operating models to find the best fit

      There are many different operating models. LoB/Product Aligned and Hybrid Functional align themselves most closely with how products and product families are typically delivered.

      1. LoB/Product Aligned – Decentralized Model: Line of Business, Geographically, Product, or Functionally Aligned
      2. A decentralized IT operating model that embeds specific functions within LoBs/product teams and provides cross-organizational support for their initiatives.

      3. Hybrid Functional: Functional/Product Aligned
      4. A best-of-both-worlds model that balances the benefits of centralized and decentralized approaches to achieve both customer responsiveness and economies of scale.

      5. Hybrid Service Model: Product-Aligned Operating Model
      6. A model that supports what is commonly referred to as a matrix organization, organizing by highly related service categories and introducing the role of the service owner.

      7. Centralized: Plan-Build-Run
      8. A highly typical IT operating model that focuses on centralized strategic control and oversight in delivering cost-optimized and effective solutions.

      9. Centralized: Demand-Develop-Service
      10. A centralized IT operating model that lends well to more mature operating environments. Aimed at leveraging economies of scale in an end-to-end services delivery model.

      Consider how investment spending will differ in a product environment

      Reward for delivering outcomes, not features

      Autonomy

      Flexibility

      Accountability

      Fund what delivers value

      Allocate iteratively

      Measure and adjust

      Fund long-lived delivery of value through products (not projects).

      Give autonomy to the team to decide exactly what to build.

      Allocate to a pool based on higher-level business case.

      Provide funds in smaller amounts to different product teams and initiatives based on need.

      Product teams define metrics that contribute to given outcomes.

      Track progress and allocate more (or less) funds as appropriate.

      Adapted from Bain, 2019

      Info-Tech Insight

      Changes to funding require changes to product and Agile practices to ensure product ownership and accountability.

      Why is having a common value measure important?

      CIO-CEO Alignment Diagnostic

      A stacked bar graph is shown to demonstrate CIO-CEO Alignment Diagnostic. A bar titled: Business Value Metrics is highlighted. 51% had some improvement necessary and 32% had significant improvement necessary.

      Over 700 Info-Tech members have implemented the Balanced Value Measurement Framework.

      “The cynic knows the price of everything and the value of nothing.”

      – Oscar Wilde

      “Price is what you pay. Value is what you get.”

      – Warren Buffett

      Understanding where you derive value is critical to building solid roadmaps.

      Measure delivery and success

      Metrics and measurements are powerful tools to drive behavior change and decision making in your organization. However, metrics are highly prone to creating unexpected outcomes, so use them with great care. Use metrics judiciously to uncover insights but avoid gaming or ambivalent behavior, productivity loss, and unintended consequences.

      Build good practices in your selection and use of metrics:

      • Choose the metrics that are as close to measuring the desired outcome as possible.
      • Select the fewest metrics possible and ensure they are of the highest value to your team, the safest from gaming behaviors and unintended consequences, and the easiest to gather and report.
      • Never use metrics for reward or punishment; use them to develop your team.
      • Automate as much metrics gathering and reporting as possible.
      • Focus on trends rather than precise metrics values.
      • Review and change your metrics periodically.

      Executive Brief Case Study

      INDUSTRY: Public Sector & Financial Services

      SOURCE: Info-Tech Interviews

      A tale of two product transformations

      Two of the organizations we interviewed shared the challenges they experienced defining product families and the impact these challenges had on their digital transformations.

      A major financial services organization (2,000+ people in IT) had employed a top-down line of business–focused approach and found itself caught in a vicious circle of moving applications between families to resolve cross-LoB dependencies.

      A similarly sized public sector organization suffered from a similar challenge as grouping from the bottom up based on technology areas led to teams fragmented across multiple business units employing different applications built on similar technology foundations.

      Results

      Both organizations struggled for over a year to structure their product families. This materially delayed key aspects of their product-centric transformation, resulting in additional effort and expenditure delivering solutions piecemeal as opposed to as a part of a holistic product family. It took embracing a hybrid top-down and bottom-up approach and beginning with pilot product families to make progress on their transformation.

      A picture of Cole Cioran is shown.

      Cole Cioran

      Practice Lead,

      Applications Practice

      Info-Tech Research Group

      There is no such thing as a perfect product-family structure. There will always be trade-offs when you need to manage shifting demand from stakeholder groups spanning customers, business units, process owners, and technology owners.

      Focusing on a single approach to structure your product families inevitably leads to decisions that are readily challenged or are brittle in the face of changing demand.

      The key to accelerating a product-centric transformation is to build a hybrid model that embraces top-down and bottom-up perspectives to structure and evolve product families over time. Add a robust pilot to evaluate the structure and you have the key to unlocking the potential of product delivery in your organization.

      Info-Tech’s methodology for Deliver Digital Products at Scale

      1. Become a Product-Centric Organization

      2. Organize Products Into Product Families

      3. Ensure Alignment Between Products and Families

      4. Bridge the Gap Between Product Families and Delivery

      5. Build Your Transformation Roadmap and Communication Plan

      Phase Steps

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm goal and value alignment of products and their product families

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      Phase Outcomes
      • Organizational drivers and goals for a product-centric delivery
      • Definition of product
      • Pilot list of products to scale
      • Product scaling principles
      • Scaling approach and direction
      • Product family mapping
      • Enabling applications
      • Dependent applications
      • Product family canvas
      • Approach for communication of product family strategy
      • Stakeholder management plan
      • Defined key pieces of a product family roadmap
      • An approach to confirming alignment between products and product families
      • Assessment of delivery maturity
      • Approach to structuring product delivery
      • Operating model for product delivery
      • Approach for product family funding
      • Product family transformation roadmap
      • Your plan for communicating your roadmap
      • List of actionable next steps to start on your journey

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Deliver Digital Products at Scale Workbook

      Use this supporting workbook to document interim results from a number of exercises that will contribute to your overall strategy.

      A screenshot of the Scale Workbook is shown.

      Deliver Digital Products at Scale Readiness Assessment

      Your strategy needs to encompass your approaches to delivery. Understand where you need to focus using this simple assessment.

      A screenshot of the Scale Readiness Assessment is shown.

      Key deliverable:

      Digital Product Family Strategy Playbook

      Record the results from the exercises to help you define, detail, and deliver digital products at scale.

      A screenshot of the Digital Product Family Strategy Playbook is shown.

      Blueprint benefits

      IT Benefits

      • Improved product delivery ROI.
      • Improved IT satisfaction and business support.
      • Greater alignment between product delivery and product family goals.
      • Improved alignment between product delivery and organizational models.
      • Better support for Agile/DevOps adoption.

      Business Benefits

      • Increased value realization across product families.
      • Faster delivery of enterprise capabilities.
      • Improved IT satisfaction and business support.
      • Greater alignment between product delivery and product family goals.
      • Uniform understanding of product and product family roadmaps and key milestones.

      Measure the value of this blueprint

      Align product family metrics to product delivery and value realization.

      Member Outcome Suggested Metric Estimated Impact

      Increase business application satisfaction

      Satisfaction with business applications (CIO Business Vision diagnostic)

      20% increase within one year after implementation

      Increase effectiveness of application portfolio management

      Effectiveness of application portfolio management (Management & Governance diagnostic)

      20% increase within one year after implementation

      Increase importance and effectiveness of application portfolio

      Importance and effectiveness to business ( Application Portfolio Assessment diagnostic)

      20% increase within one year after implementation

      Increase satisfaction of support of business operations

      Support to business (CIO Business Vision diagnostic.

      20% increase within one year after implementation

      Successfully deliver committed work (productivity)

      Number of successful deliveries; burndown

      20% increase within one year after implementation

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1: Become a Product-Centric Organization

      Phase 2: Organize Products Into Product Families

      Phase 3: Ensure Alignment Between Products and Families

      Phase 4: Bridge the Gap Between Product Families and Delivery

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Define products and product families in your context.

      Call #3: Understand the list of products in your context.

      Call #4: Define your scaling principles and goals.

      Call #5: Select a pilot and define your product families.

      Call #6: Understand the product family roadmap as a method to align products to families.

      Call #7: Define components of your product family roadmap and confirm alignment.

      Call #8: Assess your delivery readiness.

      Call #9: Discuss delivery, operating, and funding models relevant to delivering product families.

      Call #10: Wrap up.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1

      Become a Product-Centric Organization

      Day 2

      Organize Products Into Product Families

      Day 3

      Ensure Alignment Between Products and Families

      Day 4

      Bridge the Gap Between Product Families and Delivery

      Advisory

      Next Steps and Wrap-Up (offsite)

      Activities

      1.1 Understand your organizational factors driving product-centric delivery.

      1.2 Establish your organization’s product inventory.

      2.1 Determine your approach to scale product families.

      2.2 Define your product families.

      3.1 Leverage product family roadmaps.

      3.2 Use stakeholder management to improve roadmap communication.

      3.3 Configure your product family roadmaps.

      3.4 Confirm product family to product alignment.

      4.1 Assess your organization’s delivery readiness.

      4.2 Understand your delivery options.

      4.3 Determine your operating model.

      4.4 Identify how to fund product family delivery.

      5.1 Learn how to introduce your digital product family strategy.

      5.2 Communicate changes on updates to your strategy.

      5.3 Determine your next steps.

      1. Execute communication plan and product family changes.
      2. Review the pilot family implementation and update the transformation roadmap.
      3. Begin advisory calls for related blueprints.

      Key Deliverables

      1. Organizational drivers and goals for a product-centric delivery
      2. Definition of product
      3. Product scaling principles
      4. Scaling approach and direction
      5. Pilot list of products to scale
      1. Product family mapping
      2. Enabling applications
      3. Dependent applications
      4. Product family canvas
      1. Current approach for communication of product family strategy
      2. List of product family stakeholders and a prioritization plan for communication
      3. Defined key pieces of a product family roadmap
      4. An approach to confirming alignment between products and product families through a shared definition of business value
      1. Assessment results on your organization’s delivery maturity
      2. A preferred approach to structuring product delivery
      3. Your preferred operating model for delivering product families
      4. Understanding your preferred approach for product family funding
      5. Product family transformation roadmap
      6. Your plan for communicating your roadmap
      7. List of actionable next steps to start on your journey
      1. Organizational communication of product families and product family roadmaps
      2. Product family implementation and updated transformation roadmap
      3. Support for product owners, backlog and roadmap management, and other topics

      Phase 1

      Become a Product-Centric Organization

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      1.1.1 Understand your drivers for product-centric delivery

      1.1.2 Identify the differences between project and product delivery

      1.1.3 Define the goals for your product-centric organization

      1.2.1 Define “product” in your context

      1.2.2 Identify and establish a pilot list of products

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Step 1.1

      Understand the organizational factors driving product-centric delivery

      Activities

      1.1.1 Understand your drivers for product-centric delivery

      1.1.2 Identify the differences between project and product delivery

      1.1.3 Define the goals for your product-centric organization

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Outcomes of this step

      • Organizational drivers to move to product-centric delivery
      • List of differences between project and product delivery
      • Goals for product-centric delivery

      1.1.1 Understand your drivers for product-centric delivery

      30-60 minutes

      1. Identify your pain points in the current delivery model.
      2. What is the root cause of these pain points?
      3. How will a product-centric delivery model fix the root cause?
      4. Record the results in the Deliver Digital Products at Scale Workbook.
      Pain Points Root Causes Drivers
      • Lack of ownership
      • Siloed departments
      • Accountability

      Output

      • Organizational drivers to move to product-centric delivery.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      1.1.2 Identify the differences between project and product delivery

      30-60 minutes

      1. Consider project delivery and product delivery.
      2. Discuss what some differences are between the two.
      3. Note: This exercise is not about identifying the advantages and disadvantages of each style of delivery. This is to identify the variation between the two.

      4. Record the results in the Deliver Digital Products at Scale Workbook.
      Project Delivery Product Delivery
      Point in time What is changed
      Method of funding changes Needs an owner

      Output

      • List of differences between project and product delivery

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Identify the differences between a project-centric and a product-centric organization

      Project Product
      Fund projects Funding Fund products or teams
      Line of business sponsor Prioritization Product owner
      Makes specific changes to a product Product management Improves product maturity and support
      Assignment of people to work Work allocation Assignment of work to product teams
      Project manager manages Capacity management Team manages capacity

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      A flowchart is shown to demonstrate the difference between project lifecycle, hybrid lifecycle, and product lifecycle.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release.

      Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management.

      Use Agile DevOps principles to expedite product-centric delivery and management

      Delivering products does not necessarily require an Agile DevOps mindset. However, Agile methods facilitate the journey because product thinking is baked into them.

      A flowchart is shown to demonstrate the product delivery maturity and the Agile DevOps used.

      Based on: Ambysoft, 2018

      Organizations start with Waterfall to improve the predictable delivery of product features.

      Iterative development shifts the focus from delivery of features to delivery of user value.

      Agile further shifts delivery to consider ROI. Often, the highest-value backlog items aren’t the ones with the highest ROI.

      Lean and DevOps improve your delivery pipeline by providing full integration between product owners, development teams, and operations.

      CI/CD reduces time in process by allowing release on demand and simplifying release and support activities.

      Although teams will adopt parts of all these stages during their journey, it isn’t until you’ve adopted a fully integrated delivery chain that you’ve become product centric.

      1.1.3 Define the goals for your product-centric organization

      30 minutes

      1. Review your list of drivers from exercise 1.1.1 and the differences between project and product delivery from exercise 1.1.2.
      2. Define your goals for achieving a product-centric organization.
      3. Note: Your drivers may have already covered the goals. If so, review if you would like to change the drivers based on your renewed understanding of the differences between project and product delivery.

      Pain PointsRoot CausesDriversGoals
      • Lack of ownership
      • Siloed departments
      • Accountability
      • End-to-end ownership

      Output

      • Goals for product-centric delivery

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Step 1.2

      Establish your organization’s product inventory

      Activities

      1.2.1 Define “product” in your context

      1.2.2 Identify and establish a pilot list of products

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Outcomes of this step

      • Your organizational definition of products and services
      • A pilot list of active products

      Product does not mean the same thing to everyone

      Do not expect a universal definition of products.

      Every organization and industry has a different definition of what a product is. Organizations structure their people, processes, and technologies according to their definition of the products they manage. Conflicting product definitions between teams increase confusion and misalignment of product roadmaps.

      “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.”

      - Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance

      “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.”

      - TechTarget

      “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.”

      - Mark Curphey

      Organizations need a common understanding of what a product is and how it pertains to the business. This understanding needs to be accepted across the organization.

      “There is not a lot of guidance in the industry on how to define [products]. This is dangerous because what will happen is that product backlogs will be formed in too many areas. All that does is create dependencies and coordination across teams … and backlogs.”

      – Chad Beier, "How Do You Define a Product?” Scrum.org

      Products and services share the same foundation and best practices

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. Product is used for consistency but would apply to services as well.

      Product = Service

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Recognize the different product owner perspectives

      Business:

      • Customer facing, revenue generating

      Technical:

      • IT systems and tools

      Operations

      • Keep the lights on processes

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Info-Tech Insight

      Recognize that product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.”

      – Robbin Schuurman, “Tips for Starting Product Owners”

      Your product definition should include everything required to support it, not just what users see.

      A picture of an iceburg is shown, showing the ice both above and below the water to demonstrate that the product definition should include everything, not just what users see. On top of the picture are various words to go with the product definition. They inlude: funding, external relationships, adoption, product strategy, stakeholder managment. The product defitions that may not be seen include: Product governance, business functionality, user support, managing and governing data, maintenance and enhancement, R-and-D, requirements analysis and design, code, and knowledge management.

      Establish where product management would be beneficial in the organization

      What does not need product ownership?

      • Individual features
      • Transactions
      • Unstructured data
      • One-time solutions
      • Non-repeatable processes
      • Solutions that have no users or consumers
      • People or teams

      Characteristics of a discrete product

      • Has end users or consumers
      • Delivers quantifiable value
      • Evolves or changes over time
      • Has predictable delivery
      • Has definable boundaries
      • Has a cost to produce and operate

      Product capabilities deliver value!

      These are the various facets of a product. As a product owner, you are responsible for managing these facets through your capabilities and activities.

      A flowchart is shown that demonstrates the various facets of a product.

      It is easy to lose sight of what matters when we look at a product from a single point of view. Despite what The Agile Manifesto says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product leaders must consider the needs of all stakeholders when designing and building products.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      An image is shown to demonstrate the relationship between the product backlog and the product roadmap.

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      An example of a product roadmap is shown to demonstrate how it is the core to value realization.

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      What is a product?

      Not all organizations will define products in the same way. Take this as a general example:

      “A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.”

      Info-Tech Insight

      A proper definition of product recognizes three key facts:

      1. Products are long-term endeavors that don’t end after the project finishes.
      2. Products are not just “apps” but can be software or services that drive the delivery of value.
      3. There is more than one stakeholder group that derives value from the product or service.

      1.2.1 Define “product” in your context

      30-60 minutes

      1. Discuss what “product” means in your organization.
      2. Create a common, enterprise-wide definition for “product.”
      3. Record the results in the Deliver Digital Products at Scale Workbook.

      For example:

      • An application, platform, or application family.
      • Discrete items that deliver value to a user/customer.

      Output

      • Your enterprise/organizational definition of products and services

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      1.2.2 Identify and establish a pilot list of products

      1-2 hours

      1. Review any current documented application inventory. If you have these details in an existing document, share it with the team. Select the group of applications for your family scaling pilot.
      2. List your initial application inventory on the Product List tab of the Deliver Digital Products at Scale Workbook.
    • For each of the products listed, add the vision and goals of the product. Refer to Deliver on Your Digital Product Vision to learn more about identifying vision and goals or to complete the product vision canvas.
    • You’ll add business capabilities and vision in Phase 2, but you can add these now if they are available in your existing inventory.
    • Output

      • A pilot list of active products

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Phase 2

      Organize Products Into Product Families

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      2.1.1 Define your scaling principles and goals

      2.1.2 Define your pilot product family areas and direction

      2.2.1 Arrange your applications and services into product families

      2.2.2 Define enabling and supporting applications

      2.2.3 Build your product family canvas

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Step 2.1

      Determine your approach to scale product families

      Activities

      2.1.1 Define your scaling principles and goals

      2.1.2 Define your pilot product family areas and direction

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Outcomes of this step

      • List of product scaling principles
      • Scope of product scaling pilot and target areas
      • Scaling approach and direction

      Use consistent terminology for product and service families

      In this blueprint, we refer to any grouping of products or services as a “family.” Your organization may prefer other terms, such as product/service line, portfolio, group, etc. The underlying principles for grouping and managing product families are the same, so define the terminology that fits best with your culture. The same is true for “products” and “services,” which may also be referred to in different terms.

      An example flowchart is displayed to demonstrate the terminology for product and service families.

      A product family is a logical and operational grouping of related products or services. The grouping provides a scaled hierarchy to translate goals, priorities, strategy, and constraints down the grouping while aligning value realization upwards.

      Group product families by related purpose to improve business value

      Families should be scaled by how the products operationally relate to each other, with clear boundaries and common purpose.

      A product family contains...

      • Vision
      • Goals
      • Cumulative roadmap of the products within the family

      A product family can be grouped by...

      • Function
      • Value stream and capability
      • Customer segments or end-user group
      • Strategic purpose
      • Underlying architecture
      • Common technology or support structures
      • And many more
      A flowchart is shown to demonstrate the product family and product relations.

      Scale products into related families to improve value delivery and alignment

      Defining product families builds a network of related products into coordinated value delivery streams.

      A flowchart is shown to demonstrate the relations between product family and the delivery streams.

      “As with basic product management, scaling an organization is all about articulating the vision and communicating it effectively. Using a well-defined framework helps you align the growth of your organization with that of the company. In fact, how the product organization is structured is very helpful in driving the vision of what you as a product company are going to do.”

      – Rich Mironov, Mironov Consulting

      Product families translate enterprise goals into value-enabling capabilities

      A flowchart is shown to demonstrate the relationship between enterprise strategy and enabling capabilities.

      Info-Tech Insight

      Your organizational goals and strategy are achieved through capabilities that deliver value. Your product hierarchy is the mechanism to translate enterprise goals, priorities, and constraints down to the product level where changes can be made.

      Arrange product families by operational groups, not solely by your org chart

      A flowchart is shown to demonstrate how to arrange product families by operational groups.

      1. To align product changes with enterprise goals and priorities, you need to organize your products into operational groups based on the capabilities or business functions the product and family support.

      2. Product managers translate these goals, priorities, and constraints into their product families, so they are actionable at the next level, whether that level is another product family or products implementing enhancements to meet these goals.

      3. The product family manager ensures that the product changes enhance the capabilities that allow you to realize your product family, division, and enterprise goals.

      4. Enabling capabilities realize value and help reach your goals, which then drives your next set of enterprise goals and strategy.

      Product families need owners with a more strategic focus

      Product Owner

      (More tactical product delivery focus)

      • Backlog management and prioritization
      • Product vision and product roadmap
      • Epic/story definition, refinement in conjunction with business stakeholders
      • Sprint planning with Scrum Master and delivery team
      • Working with Scrum Master to minimize disruption to team velocity
      • Ensuring alignment between business and Scrum teams during sprints
      • Profit and loss (P&L) product analysis and monitoring

      Product Manager

      (More strategic product family focus)

      • Product strategy, positioning, and messaging
      • Product family vision and product roadmap
      • Competitive analysis and positioning
      • New product innovation/definition
      • Release timing and focus (release themes)
      • Ongoing optimization of product-related marketing and sales activities
      • P&L product analysis and monitoring

      Info-Tech Insight

      “Product owner” and “product manager” are terms that should be adapted to fit your culture and product hierarchy. These are not management relationships but rather a way to structure related products and services that touch the same end users. Use the terms that work best in your culture.

      Download Build a Better Product Owner for role support.

      2.1.1 Define your scaling principles and goals

      30-60 minutes

      1. Discuss the guiding principles for your product scaling model. Your guiding principles should consider key business priorities, organizational culture, and division/team objectives, such as improving:
      • Business agility and ability to respond to changes and needs.
      • Alignment of product roadmaps to enterprise goals and priorities.
      • Collaboration between stakeholders and product delivery teams.
      • Resource utilization and productivity.
      • The quality and value of products.
      • Coordination between related products and services.

      Output

      • List of product scaling principles

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Start scaling with a pilot

      You will likely use a combination of patterns that work best for each product area. Pilot your product scaling with a domain, team, or functional area before organizing your entire portfolio.

      Learn more about each pattern.

      Discuss the pros and cons of each.

      Select a pilot product area.

      Select a pattern.

      Approach alignment from both directions, validating by the opposite way

      Defining your product families is not a one-way street. Often, we start from either the top or the bottom depending on our scaling principles. We use multiple patterns to find the best arrangement and grouping of our products and families.

      It may be helpful to work partway, then approach your scaling from the opposite direction, meeting in the middle. This way you are taking advantage of the strengths in both approaches.

      Once you have your proposed structure, validate the grouping by applying the principles from the opposite direction to ensure each product and family is in the best starting group.

      As the needs of your organization change, you may need to realign your product families into your new business architecture and operational structure.

      A top-down alignment example is shown.

      When to use: You have a business architecture defined or clear market/functional grouping of value streams.

      A bottom-up alignment example is shown.

      When to use: You are starting from an Application Portfolio Management application inventory to build or validate application families.

      Top-down examples: Start with your enterprise structure or market grouping

      A top-down example flowchart is shown.

      Examples:

      Market Alignment
      • Consumer Banking
        • DDA: Checking, Savings, Money Market
        • Revolving Credit: Credit Cards, Line of Credit
        • Term Credit: Mortgage, Auto, Boat, Installment
      Enterprise Applications
      • Human Resources
        • Benefits: Health, Dental, Life, Retirement
        • Human Capital: Hiring, Performance, Training
        • Hiring: Posting, Interviews, Onboarding
      Shared Service
      • End-User Support
        • Desktop: New Systems, Software, Errors
        • Security: Access Requests, Password Reset, Attestations
      Business Architecture
      • Value Stream
        • Capability
          • Applications
          • Services

      Bottom-up examples: Start with your inventory

      Based on your current inventory, start organizing products and services into related groups using one of the five scaling models discussed in the next step.

      A bottom-up example flowchart is shown.

      Examples:

      Technical Grouping
      • Custom Apps: Java, .NET, Python
      • Cloud: Azure, AWS, Virtual Environments
      • Low Code: ServiceNow, Appian
      Functional/Capability Grouping
      • CRM: Salesforce, Microsoft CRM
      • Security Platforms: IAM, SSO, Scanning
      • Workflow: Remedy, ServiceNow
      Shared Services Grouping
      • Workflow: Appian, Pega, ServiceNow
      • Collaboration: SharePoint, Teams
      • Data: Dictionary, Lake, BI/Reporting

      2.1.2 Define your pilot product family areas and direction

      30-60 minutes

      1. Using your inventory of products for your pilot, consider the top-down and bottom-up approaches.
      2. Identify areas where you will begin arranging your product into families.
      3. Prioritize these pilot areas into waves:
        1. First pilot areas
        2. Second pilot areas
        3. Third pilot areas
      4. Discuss and decide whether a top-down or bottom-up approach is the best place to start for each pilot group.
      5. Prioritize your pilot families in the order in which you want to organize them. This is a guide to help you get started, and you may change the order during the scaling pattern exercise.

      Output

      • Scope of product scaling pilot and target areas

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Step 2.2

      Define your product families

      Activities

      2.2.1 Arrange your applications and services into product families

      2.2.2 Define enabling and supporting applications

      2.2.3 Build your product family canvas

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Outcomes of this step

      • Product family mapping
      • Product families
      • Enabling applications
      • Dependent applications
      • Product family canvas

      Use three perspectives to guide scaling pattern selection

      • One size does not fit all. There is no single or static product model that fits all product teams.
      • Structure relationships based on your organizational needs and capabilities.
      • Be flexible. Product ownership is designed to enable value delivery.
      • Avoid structures that promote proxy product ownership.
      • Make decisions based on products and services, not people. Then assign people to the roles.
      Alignment perspectives:

      Value Stream

      Align products based on the defined sources of value for a collection of products or services.

      For example: Wholesale channel for products that may also be sold directly to consumers, such as wireless network service.

      Users/Consumers

      Align products based on a common group of users or product consumers.

      For example: Consumer vs. small business vs. enterprise customers in banking, insurance, and healthcare.

      Common Domain

      Align products based on a common domain knowledge or skill set needed to deliver and support the products.

      For example: Applications in a shared service framework supporting other products.

      Leverage patterns for scaling products

      Organizing your products and families is easier when leveraging these grouping patterns. Each is explained in greater detail on the following slides

      Value Stream AlignmentEnterprise ApplicationsShared ServicesTechnicalOrganizational Alignment
      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products
      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > ModulesSupporting: Job board, healthcare administrator
      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools
      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network
      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure no longer needed because the management team owns product management role

      Select the best family pattern to improve alignment

      A flowchart is shown on how to select the best family pattern to improve alignment.

      Use scenarios to help select patterns

      Top-Down

      Bottom-Up

      We have a business architecture defined.

      (See Document Your Business Architecture and industry reference architectures for help.)

      Start with your business architecture

      Start with market segments

      We want to be more customer first or customer centric.

      Start with market segments

      Our organization has rigid lines of business and organizational boundaries.

      Start with LoB structure

      Most products are specific to a business unit or division. Start with LoB structure

      Products are aligned to people, not how we are operationally organized.

      Start with market or LoB structure

      We are focusing on enterprise or enabling applications.

      1. Start with enterprise app and service team

      2. Align supporting apps

      We already have applications and services grouped into teams but want to evaluate if they are grouped in the best families.

      Validate using multiple patterns

      Validate using multiple patterns

      Our applications and services are shared across the enterprise or support multiple products, value streams, or shared capabilities.

      Our applications or services are domain, knowledge, or technology specific.

      Start by grouping inventory

      We are starting from an application inventory. (See the APM Research Center for help.)

      Start by grouping inventory

      Pattern: Value Stream – Capability

      Grouping products into capabilities defined in your business architecture is recommended because it aligns people/processes (services) and products (tools) into their value stream and delivery grouping. This requires an accurate capability map to implement.

      Example:

      • Healthcare is delivered through a series of distinct value streams (top chevrons) and shared services supporting all streams.
      • Diagnosing Health Needs is executed through the Admissions, Testing, Imaging, and Triage capabilities.
      • Products and services are needed to deliver each capability.
      • Shared capabilities can also be grouped into families to better align capability delivery and maturity to ensure that the enterprise goals and needs are being met in each value stream the capabilities support.
      An example is shown to demonstrate how to group products into capabilities.

      Sample business architecture/ capability map for healthcare

      A sample business architecture/capability map for healthcare is shown.

      Your business architecture maps your value streams (value delivered to your customer or user personas) to the capabilities that deliver that value. A capability is the people, processes, and/or tools needed to deliver each value function.

      Defining capabilities are specific to a value stream. Shared capabilities support multiple value streams. Enabling capabilities are core “keep the lights on” capabilities and enterprise functions needed to run your organization.

      See Info-Tech’s industry coverage and reference architectures.

      Download Document Your Business Architecture

      Pattern: Value Stream – Market

      Market/Customer Segment Alignment focuses products into the channels, verticals, or market segments in the same way customers and users view the organization.

      An example is shown to demonstrate how products can be placed into channels, verticals, or market segments.

      Example:

      • Customers want one stop to solve all their issues, needs, and transactions.
      • Banking includes consumer, small business, and enterprise.
      • Consumer banking can be grouped by type of financial service: deposit accounts (checking, savings, money market), revolving credit (credit cards, lines of credit), term lending (mortgage, auto, installment).
      • Each group of services has a unique set of applications and services that support the consumer product, with some core systems supporting the entire relationship.

      Pattern: Value Stream – Line of Business (LoB)

      Line of Business Alignment uses the operational structure as the basis for organizing products and services into families that support each area.

      An example of the operational structure as the basis is shown.

      Example:

      • LoB alignment favors continuity of services, tools, and skills based on internal operations over unified customer services.
      • A hospital requires care and services from many different operational teams.
      • Emergency services may be internally organized by the type of care and emergency to allow specialized equipment and resources to diagnose and treat the patients, relying on support teams for imaging and diagnostics to support care.
      • This model may be efficient and logical from an internal viewpoint but can cause gaps in customer services without careful coordination between product teams.

      Pattern: Enterprise Applications

      A division or group delivers enabling capabilities, and the team’s operational alignment maps directly to the modules/components of an enterprise application and other applications that support the specific business function.

      An example flowchart is shown with enterprise applications.

      Example:

      • Human resources is one corporate function. Within HR, however, there are subfunctions that operate independently.
      • Each operational team is supported by one or more applications or modules within a primary HR system.
      • Even though the teams work independently, the information they manage is shared with or ties into processes used by other teams. Coordination of efforts helps provide a higher level of service and consistency.

      For additional information about HRMS, please download Get the Most Out of Your HRMS.

      Pattern: Shared Services

      Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

      An example is shown with the shared services.

      Example:

      • Recommended for governance, risk, and compliance; infrastructure; security; end-user support; and shared platforms (workflow, collaboration, imaging/record retention). Direct hierarchies do not necessarily exist within the shared service family.
      • Service groupings are common for service owners (also known as support managers, operations managers, etc.).
      • End-user ticketing comes through a common request system, is routed to the team responsible for triage, and then is routed to a team for resolution.
      • Collaboration tools and workflow tools are enablers of other applications, and product families might support multiple apps or platforms delivering that shared capability.

      Pattern: Technical

      Technical grouping is used in Shared Services or as a family grouping method within a Value Stream Alignment (Capability, Market, LoB) product family.

      An example of technical grouping is shown.

      Example:

      • Within Shared Services, Technical product grouping focuses on domains requiring specific experience and knowledge not common to typical product teams. This can also support insourcing so other product teams do not have to build their own capacity.
      • Within a Market or LoB team, these same technical groups support specific tools and services within that product family only while also specializing in the business domain.
      • Alignment into tool, platform, or skill areas improves delivery capabilities and resource scalability.

      Pattern: Organizational Alignment

      Eventually in your product hierarchy, the management structure functions as the product management team.

      • When planning your product families, be careful determining when to merge product families into the management team structure.
      • Since the goal of scaling products into families is to align product delivery roadmaps to enterprise goals and enable value realization, the primary focus of scaling must be operational.
      • Alignment to the organizational chart should only occur when the product families report into an HR manager who has ownership for the delivery and value realization for all product and services within that family.
      Am example of organizational alignment is shown.

      Download Build a Better Product Owner for role support.

      2.2.1 Arrange your applications and services into product families

      1-4 hours

      1. (Optional but recommended) Define your value streams and capabilities on the App Capability List tab in the Deliver Digital Products at Scale Workbook.
      2. On the Product Families tab, build your product family hierarchy using the following structure:
      • Value Stream > Capability > Family 3 > Family 2 > Family 1 > Product/Service.
      • If you are not using a Value Stream > Capability grouping, you can leave these blank for now.
      A screenshot of the App Capability List in the Deliver Disital Products at Scale Workbook is shown.
    • If you previously completed an application inventory using one of our application portfolio management (APM) resources, you can paste values here. Do not paste cells, as Excel may create a cell reference or replace the current conditional formatting.
    • Output

      • Product family mapping

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      2.2.2 Define enabling and supporting applications

      1-4 hours

      1. Review your grouping from the reverse direction or with different patterns to validate the grouping. Consider each grouping.
      • Does it operationally align the products and families to best cascade enterprise goals and priorities while validating enabling capabilities?
      • In the next phase, when defining your roadmap strategy, you may wish to revisit this phase and adjust as needed.
    • Select and enter enabling or dependent applications to the right of each product.
    • A screenshot from the Deliver Digitial Products at Scale Workbook is shown.

      Output

      • Product families
      • Enabling applications
      • Dependent applications

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Use a product canvas to define key elements of your product family

      A product canvas is an excellent tool for quickly providing important information about a product family.

      Product owners/managers

      Provide target state to align child product and product family roadmaps.

      Stakeholders

      Communicate high-level concepts and key metrics with leadership teams and stakeholders.

      Strategy teams

      Use the canvas as a tool for brainstorming, scoping, and ideation.

      Operations teams

      Share background overview to align operational team with end-user value.

      Impacted users

      Refine communication strategy and support based on user impacts and value realization.

      Download Deliver on Your Digital Product Vision.

      Product Family Canvas: Define your core information

      A screenshot of the product family canvas is shown.

      Problem Statement: The problem or need the product family is addressing

      Business Goals: List of business objectives or goals for the product

      Personas/Customers/Users: List of groups who consume the product/service

      Vision: Vision, unique value proposition, elevator pitch, or positioning statement

      Child Product Families or Products: List of product families or products within this family

      Stakeholders: List of key resources, stakeholders, and teams needed to support the product or service

      Download Deliver on Your Digital Product Vision.

      2.2.3 Build your product family canvas

      30-60 minutes

      1. Complete the following fields to build your product family canvas in your Digital Product Family Strategy Playbook:
        1. Product family name
        2. Product family owner
        3. Parent product family name
        4. Problem that the family is intending to solve (For additional help articulating your problem statement, refer to Deliver on Your Digital Product Vision.)
        5. Product family vision/goals (For additional help writing your vision, refer to Deliver on Your Digital Product Vision..)
        6. Child product or product family name(s)
        7. Primary customers/users (For additional help with your product personas, download and complete Deliver on Your Digital Product Vision..)
        8. Stakeholders (If you aren’t sure who your stakeholders are, fill this in after completing the stakeholder management exercises in phase 3.)

      Output

      • Product family canvas

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Digital Product Family Strategy Playbook.

      A screenshot of the Product Family Canvas is shown.

      Phase 3

      Ensure Alignment Between Products and Families

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      • 3.1.1 Evaluate your current approach to product family communication
      • 3.2.1 Visualize interrelationships among stakeholders to identify key influencers
      • 3.2.2 Group stakeholders into categories
      • 3.2.3 Prioritize your stakeholders
      • 3.3.1 Define the communication objectives and audience of your product family roadmaps
      • 3.3.2 Identify the level of detail that you want your product family roadmap artifacts to represent
      • 3.4.1 Validate business value alignment between products and their product families

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Step 3.1

      Leverage product family roadmaps

      Activities

      3.1.1 Evaluate your current approach to product family communication

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • Understanding of what a product family roadmap is
      • Comparison of Info-Tech’s position on product families to how you currently communicate about product families

      Aligning products’ goals with families

      Without alignment between product family goals and their underlying products, you aren’t seeing the full picture.

      An example of a product roadmap is shown to demonstrate how it is the core to value realization.

      Adapted from: Pichler," What Is Product Management?"

      • Aligning product strategy to enterprise goals needs to happen through the product family.
      • A product roadmap has traditionally been used to express the overall intent and visualization of the product strategy.
      • Connecting the strategy of your products with your enterprise goals can be done through the product family roadmap.

      Leveraging product family roadmaps

      It’s more than a set of colorful boxes.

        ✓ Lays out a strategy for your product family.

        ✓ Is a statement of intent for your family of products.

        ✓ Communicates direction for the entire product family and product teams.

        ✓ Directly connects to the organization’s goals.

      However, it is not:

        x Representative of a hard commitment.

        x A simple combination of your current product roadmaps.

        x A technical implementation plan.

      Product family roadmaps

      A roadmap is shown without any changes.

      There is no such thing as a roadmap that never changes.

      Your product family roadmap represents a broad statement of intent and high-level tactics to get closer to the organization’s goals.

      A roadmap is shown with changes.

      All good product family roadmaps embrace change!

      Your strategic intentions are subject to volatility, especially those planned further in the future. The more costs you incur in planning, the more you leave yourself exposed to inefficiency and waste if those plans change.

      Info-Tech Insight

      A good product family roadmap is intended to manage and communicate the inevitable changes as a result of market volatility and changes in strategy.

      Product family roadmaps are more strategic by nature

      While individual product roadmaps can be different levels of tactical or strategic depending on a variety of market factors, your options are more limited when defining roadmaps for product families.

      An image is displayed to show the relationships between product and product family, and how the roadmaps could be tactical or strategic.

      Info-Tech Insight

      Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.

      Reminder: Your enterprise vision provides alignment for your product family roadmaps

      Not knowing the difference between enterprise vision and goals will prevent you from both dreaming big and achieving your dream.

      Your enterprise vision represents your “north star” – where you want to go. It represents what you want to do.

      • Your enterprise goals represent what you need to achieve in order to reach your enterprise vision.
      • A key element of operationalizing your vision.
      • Your strategy, initiatives, and features will align with one or more goals.

      Download Deliver on Your Digital Product Vision for support.

      Multiple roadmap views can communicate differently, yet tell the same truth

      Audience

      Business/ IT Leaders

      Users/Customers

      Delivery Teams

      Roadmap View

      Portfolio

      Product Family

      Technology

      Objectives

      To provide a snapshot of the portfolio and priority products

      To visualize and validate product strategy

      To coordinate broad technology and architecture decisions

      Artifacts

      Line items or sections of the roadmap are made up of individual products, and an artifact represents a disposition at its highest level.

      Artifacts are generally grouped by product teams and consist of strategic goals and the features that realize those goals.

      Artifacts are grouped by the teams who deliver that work and consist of technical capabilities that support the broader delivery of value for the product family.

      Typical elements of a product family roadmap

      While there are others, these represent what will commonly appear across most family-based roadmaps.

      An example is shown to highlight the typical elements of a product family roadmap.

      GROUP/CATEGORY: Groups are collections of artifacts. In a product family context, these are usually product family goals, value streams, or products.

      ARTIFACT: An artifact is one of many kinds of tangible by-products produced during the delivery of products. For a product family, the artifacts represented are capabilities or value streams.

      MILESTONE: Points in the timeline when established sets of artifacts are complete. This is a critical tool in the alignment of products in a given family.

      TIME HORIZON: Separated periods within the projected timeline covered by the roadmap.

      3.1.1 Evaluate your current approach to product family communication

      1-2 hours

      1. Write down how you currently communicate your intentions for your products and family of products.
      2. Compare and contrast this to how this blueprint defines product families and product family roadmaps.
      3. Consider the similarities and the key gaps between your current approach and Info-Tech’s definition of product family roadmaps.

      Output

      • Your documented approach to product family communication

      Participants

      • Product owners
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      Step 3.2

      Use stakeholder management to improve roadmap communication

      Activities

      3.2.1 Visualize interrelationships among stakeholders to identify key influencers

      3.2.2 Group stakeholders into categories

      3.2.3 Prioritize your stakeholders

      Info-Tech Note

      If you have done the stakeholder exercises in Deliver on Your Digital Product Vision or Build a Better Product Owner u don’t need to repeat the exercises from scratch.

      You can bring the results forward and update them based on your prior work.

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • Relationships among stakeholders and influencers
      • Categorization of stakeholders and influencers
      • Stakeholder and influencer prioritization

      Reminder: Not everyone is a user!

      USERS

      Individuals who directly obtain value from usage of the product.

      STAKEHOLDERS

      Represent individuals who provide the context, alignment, and constraints that influence or control what you will be able to accomplish.

      FUNDERS

      Individuals both external and internal that fund the product initiative. Sometimes they are lumped in as stakeholders. However, motivations can be different.

      For more information, see Deliver on Your Digital Product Vision.

      A stakeholder strategy is a key part of product family attainment

      A roadmap is only “good” when it effectively communicates to stakeholders. Understanding your stakeholders is the first step in delivering great product family roadmaps.

      A picture is shown that has 4 characters with puzzle pieces, each repersenting a key to product family attainment. The four keys are: Stakeholder management, product lifecycle, project delivery, and operational support.

      Create a stakeholder network map for product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      An example stakeholder network map is displayed.

      Legend

      Black arrows: indicate the direction of professional influence

      Dashed green arrows: indicate bidirectional, informal influence relationships

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product family operates in. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.

      3.2.1 Visualize interrelationships among stakeholders to identify key influencers

      60 minutes

      1. List direct stakeholders for your product.
      2. Determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
      • Use black arrows to indicate the direction of professional influence.
      • Use dashed green arrows to indicate bidirectional, informal influence relationships.

      Output

      • Relationships among stakeholders and influencers

      Participants

      • Product owners
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps product leaders categorize their stakeholders by their level of influence and ownership in the product and/or teams.

      An example stakeholder prioritization map is shown.

      There are four areas in the map, and the stakeholders within each area should be treated differently.

      Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

      Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

      Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

      Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

      3.2.2 Group stakeholders into categories

      30-60 minutes

      1. Identify your stakeholders’ interest in and influence on your product as high, medium, or low by rating the attributes below.
      2. Map your results to the model below to determine each stakeholder’s category.
      Level of Influence
      • Power: Ability of a stakeholder to effect change.
      • Urgency: Degree of immediacy demanded.
      • Legitimacy: Perceived validity of stakeholder’s claim.
      • Volume: How loud their “voice” is or could become.
      • Contribution: What they have that is of value to you.
      Level of Interest

      How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

      The example stakeholder prioritization map is shown with the stakeholders grouped into the categories.

      Output

      • Categorization of stakeholders and influencers

      Participants

      • Product owners
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Level of Support

      Stakeholder Category

      Supporter

      Evangelist

      Neutral Blocker

      Player

      Critical

      High

      High

      Critical

      Mediator

      Medium

      Low

      Low

      Medium

      Noisemaker

      High

      Medium

      Medium

      High

      Spectator

      Low

      Irrelevant

      Irrelevant

      Low

      Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How likely is it that this stakeholder would recommend your product?

      These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.

      3.2.3 Prioritize your stakeholders

      30 minutes

      1. Identify the level of support of each stakeholder by answering the following question: How likely is it that this stakeholder would endorse your product?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.

      Stakeholder

      Category

      Level of Support

      Prioritization

      CMO

      Spectator

      Neutral

      Irrelevant

      CIO

      Player

      Supporter

      Critical

      Output

      • Stakeholder and influencer prioritization

      Participants

      • Product owners
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      Define strategies for engaging stakeholders by type

      An example is shown to demonstrate how to define strategies to engage staeholders by type.

      Type

      Quadrant

      Actions

      Players

      High influence, high interest – actively engage

      Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.

      Mediators

      High influence, low interest – keep satisfied

      They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.

      Noisemakers

      Low influence, high interest – keep informed

      Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.

      Spectators

      Low influence, low interest – monitor

      They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers, while ensuring the needs of Mediators and Players are met.

      Step 3.3

      Configure your product family roadmaps

      Activities

      3.3.1 Define the communication objectives and audience of your product family roadmaps

      3.3.2 Identify the level of detail that you want your product family roadmap artifacts to represent

      Info-Tech Note

      If you are unfamiliar with product roadmaps, Deliver on Your Digital Product Vision contains more detailed exercises we recommend you review before focusing on product family roadmaps.

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • An understanding of the key communication objectives and target stakeholder audience for your product family roadmaps
      • A position on the level of detail you want your product family roadmap to operate at

      Your communication objectives are linked to your audience; ensure you know your audience and speak their language

      I want to... I need to talk to... Because they are focused on...
      ALIGN PRODUCT TEAMS Get my delivery teams on the same page. Architects Products Owners PRODUCTS A product that delivers value against a common set of goals and objectives.
      SHOWCASE CHANGES Inform users and customers of product strategy. Bus. Process Owners End Users FUNCTIONALITY A group of functionality that business customers see as a single unit.
      ARTICULATE RESOURCE REQUIREMENTS Inform the business of product development requirements. IT Management Business Stakeholders FUNDING An initiative that those with the money see as a single budget.

      3.3.1 Define the communication objectives and audience of your product family roadmaps

      30-60 minutes

      1. Explicitly state the communication objectives and audience of your roadmap.
      • Think of finishing this sentence: This roadmap is designed for … in order to …
    • You may want to consider including more than a single audience or objective.
    • Example:
    • Roadmap

      Audience

      Statement

      Internal Strategic Roadmap

      Internal Stakeholders

      This roadmap is designed to detail the strategy for delivery. It tends to use language that represents internal initiatives and names.

      Customer Strategic Roadmap

      External Customers

      This roadmap is designed to showcase and validate future strategic plans and internal teams to coordinate the development of features and enablers.

      Output

      • Roadmap list with communication objectives and audience

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      The length of time horizons on your roadmap depend on the needs of the underlying products or families

      Info-Tech InsightAn example timeline is shown.

      Given the relationship between product and product family roadmaps, the product family roadmap needs to serve the time horizons of its respective products.

      This translates into product family roadmaps with timelines that, at a minimum, cover the full scope of the respective product roadmaps.

      Based on your communication objectives, consider different ways to visualize your product family roadmap

      Swimline/Stream-Based roadmap example.

      Swimlane/Stream-Based – Understanding when groups of items intend to be delivered.

      An example is shown that has an overall plan with rough intentions around delivery.

      Now, Next, Later – Communicate an overall plan with rough intentions around delivery without specific date ranges.

      An example of a sunrise roadmap is shown.

      Sunrise Roadmap – Articulate the journey toward a given target state across multiple streams.

      Before connecting your family roadmap to products, think about what each roadmap typically presents

      An example of a product family roadmap is shown and how it can be connected to the products.

      Info-Tech Insight

      Your product family roadmap and product roadmap tell different stories. The product family roadmap represents the overall connection of products to the enterprise strategy, while the product roadmap focuses on the fulfillment of the product’s vision.

      Example: Connecting your product family roadmaps to product roadmaps

      Your roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but you can do it at a more granular level if an understanding of capabilities isn’t available.

      Example is shown connecting product family roadmaps to product roadmaps.

      3.3.2 Identify the level of detail that you want your product family roadmap artifacts to represent

      30-60 minutes

      1. Consider the different available artifacts for a product family (goals, value stream, capabilities).
      2. List the roadmaps that you wish to represent.
      3. Based on how you currently articulate details on your product families, consider:
      • What do you want to use as the level of granularity for the artifact? Consider selecting something that has a direct connection to the product roadmap itself (for example, capabilities).
      • For some roadmaps you will want to categorize your artifacts – what would work best in those cases?

      Examples

      Level of Hierarchy

      Artifact Type

      Roadmap 1

      Goals

      Capability

      Roadmap 2

      Roadmap 3

      Output

      • Details on your roadmap granularity

      Participants

      • Product owners
      • Product managers
      • Portfolio managers

      Record the results in the Deliver Digital Products at Scale Workbook.

      Step 3.4

      Confirm goal and value alignment of products and their product families

      Activities

      3.4.1 Validate business value alignment between products and their product families

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • Validation of the alignment between your product families and products

      Confirming product to family value alignment

      It isn’t always obvious whether you have the right value delivery alignment between products and product families.

      An example is shown to demonstrate product-to-family-alignment.

      Product-to-family alignment can be validated in two different ways:

      1. Initial value alignment
      2. Confirm the perceived business value at a family level is aligned with what is being delivered at a product level.

      3. Value measurement during the lifetime of the product
      4. Validate family roadmap attainment through progression toward the specified product goals.

      For more detail on calculating business value, see Build a Value Measurement Framework.

      To evaluate a product family’s contribution, you need a common definition of value

      Why is having a common value measure important?

      CIO-CEO Alignment Diagnostic

      A stacked bar graph is shown to demonstrate CIO-CEO Alignment Diagnostic. A bar titled Business Value Metrics is highlighted. 51% had some improvement necessary and 32% had significant improvement necessary.

      Over 700 Info-Tech members have implemented the Balanced Value Measurement Framework.

      “The cynic knows the price of everything and the value of nothing.”

      – Oscar Wilde

      “Price is what you pay. Value is what you get.”

      – Warren Buffett

      Understanding where you derive value is critical to building solid roadmaps.

      All value in your product family is not created equal

      Business value is the value of the business outcome the application produces and how effective the product is at producing that outcome. Dissecting value by the benefit type and the value source allows you to see the many ways in which a product or service brings value to your organization. Capture the value of your products in short, concise statements, like an elevator pitch.

      A business value matrix is shown.

      Increase Revenue

      Product or service functions that are specifically related to the impact on your organization’s ability to generate revenue.

      Reduce Costs

      Reduction of overhead. The ways in which your product limits the operational costs of business functions.

      Enhance Services

      Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      Reach Customers

      Application functions that enable and improve the interaction with customers or produce market information and insights.

      Financial Benefits vs. Improved Capabilities

      • Financial Benefit refers to the degree to which the value source can be measured through monetary metrics and is often quite tangible.
      • Human Benefit refers to how a product or service can deliver value through a user’s experience.

      Inward vs. Outward Orientation

      • Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.
      • Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      3.4.1 Validate business value alignment between products and their product families

      30-60 minutes

      1. Draw the 2x2 Business Value Matrix on a flip chart or open the Business Value Matrix tab in the Deliver Digital Products at Scale Workbook to use in this exercise.
      2. Brainstorm and record the different types of business value that your product and product family produce on the sticky notes (one item per sticky note).
      3. As a team, evaluate how the product value delivered contributes to the product family value delivered. Note any gaps or differences between the two.

      Download and complete Build a Value Measurement Framework for full support in focusing product delivery on business value–driven outcomes.

      A business value matrix is shown.

      Output

      • Confirmation of value alignment between product families and their respective products

      Participants

      • Product owners
      • Product managers

      Record the results in the Deliver Digital Products at Scale Workbook.

      Example: Validate business value alignment between products and their product families

      An example of a business value matrix is shown.

      Measure product value with metrics tied to your business value sources and objectives

      Assign metrics to your business value sources

      Business Value Category

      Source Examples

      Metric Examples

      Profit Generation

      Revenue

      Customer Lifetime Value (LTV)

      Data Monetization

      Average Revenue per User (ARPU)

      Cost Reduction

      Reduce Labor Costs

      Contract Labor Cost

      Reduce Overhead

      Effective Cost per Install (eCPI)

      Service Enablement

      Limit Failure Risk

      Mean Time to Mitigate Fixes

      Collaboration

      Completion Time Relative to Deadline

      Customer and Market Reach

      Customer Satisfaction

      Net Promoter Score

      Customer Trends

      Number of Customer Profiles

      The importance of measuring business value through metrics

      The better an organization is at using business value metrics to evaluate IT’s performance, the more satisfied the organization is with IT’s performance as a business partner. In fact, those that say they’re effective at business value metrics have satisfaction scores that are 30% higher than those that believe significant improvements are necessary (Info-Tech’s IT diagnostics).

      Assigning metrics to your prioritized values source will allow you to more accurately measure a product’s value to the organization and identify optimization opportunities. See Info-Tech’s Related Research: Value, Delivery Metrics, Estimation blueprint for more information.

      Your product delivery pipeline connects your roadmap with business value realization

      The effectiveness of your product roadmap needs to be evaluated based on delivery capacity and throughput.

      A product roadmap is shown with additional details to demonstrate delivery capacity and throughput.

      When thinking about product delivery metrics, be careful what you ask for…

      As the saying goes “Be careful what you ask for, because you will probably get it.”

      Metrics are powerful because they drive behavior.

      • Metrics are also dangerous because they often lead to unintended negative outcomes.
      • Choose your metrics carefully to avoid getting what you asked for instead of what you intended.

      It’s a cautionary tale that also offers a low-risk path through the complexities of metrics use.

      For more information on the use (and abuse) of metrics, see Select and Use SDLC Metrics Effectively.

      Measure delivery and success

      Metrics and measurements are powerful tools to drive behavior change and decision making in your organization. However, metrics are highly prone to creating unexpected outcomes, so use them with great care. Use metrics judiciously to uncover insights but avoid gaming or ambivalent behavior, productivity loss, and unintended consequences.

      Build good practices in your selection and use of metrics:

      • Choose the metrics that are as close to measuring the desired outcome as possible.
      • Select the fewest metrics possible and ensure they are of the highest value to your team, the safest from gaming behaviors and unintended consequences, and the easiest to gather and report.
      • Never use metrics for reward or punishment; use them to develop your team.
      • Automate as much metrics gathering and reporting as possible.
      • Focus on trends rather than precise metrics values.
      • Review and change your metrics periodically.

      Phase 4

      Bridge the Gap Between Product Families and Delivery

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      4.1.1 Assess your organization’s readiness to deliver digital product families

      4.2.1 Consider pros and cons for each delivery model relative to how you wish to deliver

      4.3.1 Understand the relationships between product management, delivery teams, and stakeholders

      4.4.1 Discuss traditional vs. product-centric funding methods

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Assess the impacts of product-centric delivery on your teams and org design

      Product delivery can exist within any org structure or delivery model. However, when making the shift toward product management, consider optimizing your org design and product team structure to match your capacity and throughput needs.

      A flowchart is shown to see how the impacts of product-centric delivery can impact team and org designs.

      Info-Tech Note

      Realigning your delivery pipeline and org design takes significant effort and time. Although we won’t solve these questions here, it’s important to identify factors in your current or future models that improve value delivery.

      Step 4.1

      Assess your organization’s delivery readiness

      Activities

      4.1.1 Assess your organization’s readiness to deliver digital product families

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Outcomes of this step

      • An understanding of the group’s maturity level when it comes to product delivery

      Maturing product practices enables delivery of product families, not just products or projects

      A flowchart is shown to demonstrate the differences between project lifecycle, hybrid lifecycle, and product lifecycle.

      Just like product owners, product family owners are needed to develop long-term product value, strategy, and delivery. Projects can still be used as the source of funding and change management; however, the product family owner must manage product releases and operational support. The focus of this section will be on aligning product families to one or more releases.

      4.1.1 Assess your organization’s readiness to deliver digital product families

      30-60 minutes

      1. For each question in the Deliver Digital Products at Scale Readiness Assessment, ask yourself which of the five associated maturity statements most closely describes your organization.
      2. As a group, agree on your organization’s current readiness score for each of the six categories.

      A screenshot of the Deliver Digital Products at Scale Readiness Assessment is shown.

      Output

      • Product delivery readiness score

      Participants

      • Product managers
      • Product owners

      Download the Deliver Digital Products at Scale Readiness Assessment.

      Value realization is constrained by your product delivery pipeline

      Value is realized through changes made at the product level. Your pipeline dictates the rate, quality, and prioritization of your backlog delivery. This pipeline connects your roadmap goals to the value the goals are intended to provide.

      An example of a product roadmap is shown with the additional details of the product delivery pipeline being highlighted.

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      PRODUCT STRATEGY

      What are the artifacts?

      What are you saying?

      Defined at the family level?

      Defined at the product level?

      Vision

      I want to...

      Strategic focus

      Delivery focus

      Goals

      To get there we need to...

      Roadmap

      To achieve our goals, we’ll deliver...

      Backlog

      The work will be done in this order...

      Release Plan

      We will deliver in the following ways...

      Step 4.2

      Understand your delivery options

      Activities

      4.2.1 Consider pros and cons for each delivery model relative to how you wish to deliver

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Outcomes of this step

      • An understanding of the different team configuration options when it comes to delivery and their relevance to how you currently work

      Define the scope of your product delivery strategy

      The goal of your product delivery strategy is to establish streamlined, enforceable, and standardized product management and delivery capabilities that follow industry best practices. You will need to be strategic in how and where you implement your changes because this will set the stage for future adoption. Strategically select the most appropriate products, roles, and areas of your organization to implement your new or enhanced capabilities and establish a foundation for scaling.

      Successful product delivery requires people who are knowledgeable about the products they manage and have a broad perspective of the entire delivery process, from intake to delivery, and of the product portfolio. The right people also have influence with other teams and stakeholders who are directly or indirectly impacted by product decisions. Involve team members who have expertise in the development, maintenance, and management of your selected products and stakeholders who can facilitate and promote change.

      Learn about different patterns to structure and resource your product delivery teams

      The primary goal of any product delivery team is to improve the delivery of value for customers and the business based on your product definition and each product’s demand. Each organization will have different priorities and constraints, so your team structure may take on a combination of patterns or may take on one pattern and then transform into another.

      Delivery Team Structure Patterns

      How Are Resources and Work Allocated?

      Functional Roles

      Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC).

      Completed work is handed off from team to team sequentially as outlined in the organization’s SDLC.

      Shared Service and Resource Pools

      Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk).

      Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.

      Product or System

      Teams are dedicated to the development, support, and management of specific products or systems.

      Work is directly sent to the teams who are directly managing the product or directly supporting the requester.

      Skills and Competencies

      Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, finance).

      Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.

      See the flow of work through each delivery team structure pattern

      Four delivery team structures are shown. The four are: functional roles, shared service and resource pools, product or system, and skills and competencies.

      Staffing models for product teams

      Functional Roles Shared Service and Resource Pools Product or System Skills and Competencies
      A screenshot of the functional roles from the flow of work example is shown. A screenshot of the shared service and resource pools from the flow of work example is shown. A screenshot of the product or system from the flow of work example is shown. A screenshot of skills and competencies from the flow of work example is shown.
      Pros
        ✓ Specialized resources are easier to staff

        ✓ Product knowledge is maintained

        ✓ Flexible demand/capacity management

        ✓ Supports full utilization of resources

        ✓ Teams are invested in the full life of the product

        ✓ Standing teams enable continuous improvement

        ✓ Teams are invested in the technology

        ✓ Standing teams enable continuous improvement

      Cons
        x Demand on specialists can create bottlenecks

        x Creates barriers to collaboration

        x Unavailability of resources can lead to delays

        x Product knowledge can be lost as resources move

        x Changes in demand can lead to downtime

        x Cross-functional skills make staffing a challenge

        x Technology bias can lead to the wrong solution

        x Resource contention when team supports multiple solutions

      Considerations
        ! Product owners must break requests down into very small components to support Agile delivery as mini-Waterfalls
        ! Product owners must identify specialist requirements in the roadmap to ensure resources are available
        ! Product owners must ensure that there is a sufficient backlog of valuable work ready to keep the team utilized
        ! Product owners must remain independent of technology to ensure the right solution is built
      Use Case
      • When you lack people with cross-functional skills
      • When you have specialists such as those skilled in security and operations who will not have full-time work on the product
      • When you have people with cross-functional skills who can self-organize around the request
      • When you have a significant investment in a specific technology stack

      4.2.1 Consider pros and cons for each delivery model relative to how you wish to deliver

      1. Document your current staffing model for your product delivery teams.
      2. Evaluate the pros and cons of each model, as specified on the previous slide, relative to how you currently work.
      3. What would be the ideal target state for your team? If one model does not completely fit, is there a hybrid option worth considering? For example: Product-Based combined with Shared Service/Resource Pools for specific roles.

      Functional Roles

      Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC).

      Shared Service and Resource Pools

      Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk).

      Product or System

      Teams are dedicated to the development, support, and management of specific products or systems.

      Skills and Competencies

      Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, finance).

      Output

      • An understanding of pros and cons for each delivery model and the ideal target state for your team

      Participants

      • Product managers
      • Product owners

      Record the results in the Digital Product Family Strategy Playbook.

      Step 4.3

      Determine your operating model

      Activities

      4.3.1 Understand the relationships between product management, delivery teams, and stakeholders

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Outcomes of this step

      • An understanding of the potential operating models and what will work best for your organization

      Reminder: Patterns for scaling products

      The alignment of your product families should be considered in your operating model.

      Value Stream Alignment

      Enterprise Applications

      Shared Services

      Technical

      Organizational Alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products
      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > ModulesSupporting: Job board, healthcare administrator
      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools
      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network
      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure no longer needed because the management team owns product management role

      Ensure consistency in the application of your design principles with a coherent operating model

      What is an operating model?

      An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy. It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design

      The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.

      An example of an operating model is shown.

      For more information, see Redesign Your IT Organizational Structure.

      Weigh the pros and cons of IT operating models to find the best fit

      1. LoB/Product Aligned – Decentralized Model: Line of Business, Geographically, Product, or Functionally Aligned
      2. A decentralized IT operating model that embeds specific functions within LoBs/product teams and provides cross-organizational support for their initiatives.

      3. Hybrid Functional: Functional/Product Aligned
      4. A best-of-both-worlds model that balances the benefits of centralized and decentralized approaches to achieve both customer responsiveness and economies of scale.

      5. Hybrid Service Model: Product-Aligned Operating Model
      6. A model that supports what is commonly referred to as a matrix organization, organizing by highly related service categories and introducing the role of the service owner.

      7. Centralized: Plan-Build-Run
      8. A highly typical IT operating model that focuses on centralized strategic control and oversight in delivering cost-optimized and effective solutions.

      9. Centralized: Demand-Develop-Service
      10. A centralized IT operating model that lends well to more mature operating environments. Aimed at leveraging economies of scale in an end-to-end services delivery model.

      There are many different operating models. LoB/Product Aligned and Hybrid Functional align themselves most closely with how products and product families are typically delivered.

      Decentralized Model: Line of Business, Geographically, Product, or Functionally Aligned

      An example of a decentralized model is shown.

      BENEFITS

      DRAWBACKS

      • Organization around functions (FXN) allows for diversity in approach in how areas are run to best serve specific business units needs.
      • Each functional line exists largely independently, with full capacity and control to deliver service at the committed service level agreements.
      • Highly responsive to shifting needs and demands with direct connection to customers and all stages of the solution development lifecycle.
      • Accelerates decision making by delegating authority lower into the FXN.
      • Promotes a flatter organization with less hierarchy and more direct communication with the CIO.
      • Less synergy and integration across what different lines of business are doing can result in redundancies and unnecessary complexity.
      • Higher overall cost to the IT group due to role and technology duplication across different FXN.
      • Inexperience becomes an issue; requires more competent people to be distributed across the FXN.
      • Loss of sight of the big picture – difficult to enforce standards around people/process/technology with solution ownership within the FXN.

      For more information, see Redesign your IT Organizational Structure.

      Hybrid Model: Functional/Product Aligned

      An example of a hybrid model: functional/product aligned is shown.

      BENEFITS

      DRAWBACKS

      • Best of both worlds of centralization and decentralization; attempts to channel benefits from both centralized and decentralized models.
      • Embeds key IT functions that require business knowledge within functional areas, allowing for critical feedback.
      • Balances a holistic IT strategy and architecture with responsiveness to needs of the organization.
      • Achieves economies of scale where necessary through the delivery of shared services that can be requested by the function.
      • May result in excessive cost through role and system redundancies across different functions
      • Business units can have variable levels of IT competence; may result in different levels of effectiveness.
      • No guaranteed synergy and integration across functions; requires strong communication, collaboration, and steering.
      • Cannot meet every business unit’s needs – can cause tension from varying effectiveness of the IT functions placed within the functional areas.

      For more information, see Redesign your IT Organizational Structure.

      Hybrid Model: Product-Aligned Operating Model

      An example of a hybrid model: product-aligned operating model.

      BENEFITS

      DRAWBACKS

      • Focus is on the full lifecycle of a product – takes a strategic view of how technology enables the organization.
      • Promotes centralized backlog around a specific value creator, rather than traditional project focus, which is more transactional.
      • Dedicated teams around the product family ensure that you have all of the resources required to deliver on your product roadmap.
      • Reduces barriers between IT and business stakeholders, focuses on technology as a key strategic enabler.
      • Delivery is largely done through a DevOps methodology.
      • Significant business involvement is required for success within this model, with business stakeholders taking an active role in product governance and potentially product management as well.
      • Strong architecture standards and practices are required to make this successful because you need to ensure that product families are building in a consistent manner and limiting application sprawl.
      • Introduced the need for practice standards to drive consistency in quality of delivered services.
      • May result in increased cost through role redundancies across different squads.

      For more information, see Redesign your IT Organizational Structure.

      Centralized: Plan-Build-Run

      An example of a centralized: Plan-Build-Run is shown.

      BENEFITS

      DRAWBACKS

      • Effective at implementing long-term plans efficiently, separates maintenance and projects to allow each to have the appropriate focus.
      • More oversight over financials; better suited for fixed budgets.
      • Works across centralized technology domains to better align with the business's strategic objectives – allows for a top-down approach to decision making.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Well suited for a project-driven environment that employs Waterfall or a hybrid project management methodology that is less iterative.
      • Not optimized for unpredictable/shifting project demands, as decision making is centralized in the plan function.
      • Less agility to deliver new features or solutions to the customer in comparison to decentralized models.
      • Build (developers) and run (operations staff) are far removed from the business, resulting in lower understanding of business needs (as well as “passing the buck” – from development to operations).
      • Requires strong hand-off processes to be defined and strong knowledge transfer from build to run functions in order to be successful.

      For more information, see Redesign your IT Organizational Structure.

      Centralized: Demand-Develop-Service

      An example of a centralized: Demand-Develop-Service model is shown.

      BENEFITS

      DRAWBACKS

      • Aligns well with an end-to-end services model; constant attention to customer demand and service supply.
      • Centralizes service operations under one functional area to serve shared needs across lines of business.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Elevates sourcing and vendor management as its own strategic function; lends well to managed service and digital initiatives.
      • Development and operations housed together; lends well to DevOps-related initiatives.
      • Can be less responsive to business needs than decentralized models due to the need for portfolio steering to prioritize initiatives and solutions.
      • Requires a higher level of operational maturity to succeed; stable supply functions (service mgmt., operations mgmt., service desk, security, data) are critical to maintaining business satisfaction.
      • Requires highly effective governance around project portfolio, services, and integration capabilities.
      • Effective feedback loop highly dependent on accurate performance measures.

      For more information, see Redesign your IT Organizational Structure.

      Assess how your product scaling pattern impacts your resource delivery model

      Value Stream Alignment

      Enterprise Applications

      Shared Services

      Technical

      Plan-Build-Run:
      Centralized

      Pro: Supports established and stable families.

      Con: Command-and-control nature inhibits Agile DevOps and business agility.

      Pro: Supports established and stable families.

      Con: Command-and-control nature inhibits Agile DevOps and business agility.

      Pro: Can be used to align high-level families.

      Con: Lacks flexibility at the product level to address shifting priorities in product demand.

      Pro: Supports a factory model.

      Con: Lacks flexibility at the product level to address shifting priorities in product demand.

      Centralized Model 2:
      Demand-Develop-
      Service

      Pro: Supports established and stable families.

      Con: Command-and-control nature inhibits Agile DevOps and business agility.

      Pro: Supports established and stable families.

      Con: Command-and-control nature inhibits Agile DevOps and business agility.

      Pro: Recommended for aligning high-level service families based on user needs.

      Con: Reduces product empowerment, prioritizing demand. Slow.

      Pro: Supports factory models.

      Con: Reduces product empowerment, prioritizing demand. Slow.

      Decentralized Model:
      Line of Business, Product, Geographically, or

      Functionally Aligned

      Pro: Aligns product families to value streams, capabilities, and organizational structure.

      Con: Reduces shared solutions and may create duplicate apps and services.

      Pro: Enterprise apps treated as distinct LoB groups.

      Con: Reduces shared solutions and may create duplicate apps and services.

      Pro: Complements value stream alignment by consolidating shared apps and services.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Fits within other groupings where technical expertise is needed.

      Con: Creates redundancy between localized and shared technical teams.

      Hybrid Model:
      Functional/Product

      Aligned

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Creates redundancy between localized and shared technical teams.

      Hybrid Model:

      Product-Aligned Operating Model

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Creates redundancy between localized and shared technical teams.

      4.3.1 Understand the relationships between product management, delivery teams, and stakeholders

      30-60 minutes

      1. Discuss the intake sources of product work.
      2. Trace the flow of requests down to the functional roles of your delivery team (e.g., developer, QA, operations).
      3. Indicate where key deliverables are produced, particularly those that are built in collaboration.
      4. Discuss the five operating models relative to your current operating model choice. How aligned are you?
      5. Review Info-Tech’s recommendation on the best-aligned operating models for product family delivery. Do you agree or disagree?
      6. Evaluate recommendations against how you operate/work.

      Output

      • Understanding of the relationships between key groups
      • A preferred operating model

      Participants

      • Product owners
      • Product managers
      • Delivery managers

      Record the results in the Digital Product Family Strategy Playbook.

      4.3.1 Understand the relationships between product management, delivery teams, and stakeholders

      An example of activity 4.3.1 to understand the relationships between product management, delivery teams, and stakeholders is shown.

      Output

      • Understanding of the relationships between key groups
      • A preferred operating model

      Participants

      • Product owners
      • Product managers
      • Delivery managers

      Step 4.4

      Identify how to fund product family delivery

      Activities

      4.4.1 Discuss traditional vs. product-centric funding methods

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Outcomes of this step

      • An understanding of the differences between product-based and traditional funding methods

      Why is funding so problematic?

      We often still think about funding products like construction projects.

      Three models are shown on the various options to fund projects.

      These models require increasing accuracy throughout the project lifecycle to manage actuals vs. estimates.

      "Most IT funding depends on one-time expenditures or capital-funding mechanisms that are based on building-construction funding models predicated on a life expectancy of 20 years or more. Such models don’t provide the stability or flexibility needed for modern IT investments." – EDUCAUSE

      Reminder: Projects don’t go away. The center of the conversation changes.

      A flowchart is shown to demonstrate the difference between project lifecycle, hybrid lifecycle, and product lifecycle.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release.

      Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management.

      Planning and budgeting for products and families

      Reward for delivering outcomes, not features

      AutonomyFlexibilityAccountability
      Fund what delivers valueAllocate iterativelyMeasure and adjust

      Fund long-lived delivery of value through products (not projects).

      Give autonomy to the team to decide exactly what to build.

      Allocate to a pool based on higher-level business case.

      Provide funds in smaller amounts to different product teams and initiatives based on need.

      Product teams define metrics that contribute to given outcomes.

      Track progress and allocate more (or less) funds as appropriate.

      Info-Tech Insight

      Changes to funding require changes to product and Agile practices to ensure product ownership and accountability.

      The Lean Enterprise Funding Model is an example of a different approach

      An example of the lean enterprise funding model is shown.
      From: Implement Agile Practices That Work

      A flexible funding pool akin to venture capital models is maintained to support innovative ideas and fund proofs of concept for product and process improvements.

      Proofs of concept (POCs) are run by standing innovation teams or a reserve of resources not committed to existing products, projects, or services.

      Every product line has funding for all changes and ongoing operations and support.

      Teams are funded continuously so that they can learn and improve their practices as much as possible.

      Budgeting approaches must evolve as you mature your product operating environment

      TRADITIONAL PROJECTS WITH WATERFALL DELIVERY

      TRADITIONAL PROJECTS WITH AGILE DELIVERY

      PRODUCTS WITH AGILE PROJECT DELIVERY

      PRODUCTS WITH AGILE DELIVERY

      WHEN IS THE BUDGET TRACKED?

      Budget tracked by major phases

      Budget tracked by sprint and project

      Budget tracked by sprint and project

      Budget tracked by sprint and release

      HOW ARE CHANGES HANDLED?

      All change is by exception

      Scope change is routine, budget change is by exception

      Scope change is routine, budget change is by exception

      Budget change is expected on roadmap cadence

      WHEN ARE BENEFITS REALIZED?

      Benefits realization after project completion

      Benefits realization is ongoing throughout the life of the project

      Benefits realization is ongoing throughout the life of the product

      Benefits realization is ongoing throughout life of the product

      WHO “DRIVES”?

      Project Manager

      • Project team delivery role
      • Refines project scope, advocates for changes in the budget
      • Advocates for additional funding in the forecast

      Product Owner

      • Project team delivery role
      • Refines project scope, advocates for changes in the budget
      • Advocates for additional funding in the forecast

      Product Manager

      • Product portfolio team role
      • Forecasting new initiatives during delivery to continue to drive value throughout the life of the product

      Product Manager

    • Product family team role
    • Forecasting new initiatives during delivery to continue to drive value throughout the life of the product
    • Info-Tech Insight

      As you evolve your approach to product delivery, you will be decoupling the expected benefits, forecast, and budget. Managing them independently will improve your ability to adapt to change and drive the right outcomes!

      Your strategy must include the cost to build and operate

      Most investment happens after go-live, not in the initial build!

      An example strategy is displayed that incorporates the concepts of cost to build and operate.

      Adapted from: LookFar

      Info-Tech Insight

      While the exact balance point between development or implementation costs varies from application to application, over 80% of the cost is accrued after go-live.

      Traditional accounting leaves software development CapEx on the table

      Software development costs have traditionally been capitalized, while research and operations are operational expenditures.

      The challenge has always been the myth that operations are only bug fixes, upgrades, and other operational expenditures. Research shows that most post-release work on developed solutions is the development of new features and changes to support material changes in the business. While projects could bundle some of these changes into capital expenditure, much of the business-as-usual work that goes on leaves capital expenses on the table because the work is lumped together as maintenance-related OpEx.

      From “How to Stop Leaving Software CapEx on the Table With Agile and DevOps”

      4.4.1 Discuss traditional vs. product-centric funding methods

      30-60 minutes

      1. Discuss how products and product families are currently funded.
      2. Review how the Agile/product funding models differ from how you currently operate.
      3. What changes do you need to consider in order to support a product delivery model?
      4. For each change, identify the key stakeholders and list at least one action to take.
      5. Record the results in the Digital Product Family Strategy Playbook.

      Output

      • Understanding of funding principles and challenges

      Participants

      • Product owners
      • Product managers
      • Delivery managers

      Record the results in the Digital Product Family Strategy Playbook.

      Phase 5

      Build Your Transformation Roadmap and Communication Plan

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      5.1.1 Introduce your digital product family strategy

      5.2.1 Define your communication cadence for your strategy updates

      5.2.2 Define your messaging for each stakeholder

      5.3.1 How do we get started?

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Application leaders
      • Stakeholders

      Step 5.1

      Introduce your digital product family strategy

      Activities

      5.1.1 Introduce your digital product family strategy

      This step involves the following participants:

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Outcomes of this step

      • A completed executive summary presenting your digital product strategy

      Product decisions are traditionally made in silos with little to no cross-functional communication and strategic oversight

      Software delivery teams and stakeholders traditionally make plans, strategies, and releases within their silos and tailor their decisions based on their own priorities. Interactions are typically limited to hand-offs (such as feature requests) and routing of issues and defects back up the delivery pipeline. These silos likely came about through well-intentioned training, mandates, and processes, but they do not sufficiently support today’s need to rapidly release and change platforms.

      Siloed departments often have poor visibility into the activities of other silos, and they may not be aware of the ramifications their decisions have on teams and stakeholders outside of their silo.

      • Silos may make choices that are optimal largely for themselves without thinking of the holistic impact on a platform’s structure, strategy, use cases, and delivery.
      • The business may approve platform improvements without the consideration of the delivery team’s current capacity or the system’s complexity, resulting in unrealistic commitments.
      • Quality standards may be misinterpreted and inconsistently enforced across the entire delivery pipeline.

      In some cases, the only way to achieve greater visibility and communication for all roles across a platform’s lifecycle is implementing an overarching role or team.

      “The majority of our candid conversations with practitioners and project management offices indicate that the platform ownership role is poorly defined and poorly executed.”

      – Barry Cousins

      Practice Lead, Applications – Project & Portfolio Management

      Info-Tech Research Group

      Use stakeholder management and roadmap views to improve communication

      Proactive, clear communication with stakeholders, SMEs, and your product delivery team can significantly improve alignment and agreement with your roadmap, strategy, and vision.

      When building your communication strategy, revisit the work you completed in phase 3 developing your:

      • Roadmap types
      • Stakeholder strategy

      Type

      Quadrant

      Actions

      Players

      High influence, high interest – actively engage

      Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.

      Mediators

      High influence, low interest – keep satisfied

      They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.

      Noisemakers

      Low influence, high interest – keep informed

      Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.

      Spectators

      Low influence, low interest – monitor

      They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      5.1.1 Introduce your digital product family strategy

      30-60 minutes

      This exercise is intended to help you lay out the framing of your strategy and the justification for the effort. A lot of these items can be pulled directly from the product canvas you created in phase 2. This is intended to be a single slide to frame your upcoming discussions.

      1. Update your vision, goals, and values on your product canvas. Determine which stakeholders may be impacted and what their concerns are. If you have many stakeholders, limit to Players and Influencers.
      2. Identify what you need from the stakeholders as a result of this communication.
      3. Keeping in mind the information gathered in steps 1 and 2, describe your product family strategy by answering three questions:
      1. Why do we need product families?
      2. What is in our way?
      3. Our first step will be... ?

      Output

      • An executive summary that introduces your product strategy

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Digital Product Family Strategy Playbook.

      Example: Scaling delivery through product families

      Why do we need product families?

      • The growth of our product offerings and our company’s movement into new areas of growth mean we need to do a better job scaling our offerings to meet the needs of the organization.

      What is in our way?

      • Our existing applications and services are so dramatically different we are unsure how to bring them together.

      Our first step will be...

      • Taking a full inventory of our applications and services.

      Step 5.2

      Communicate changes on updates to your strategy

      Activities

      5.2.1 Define your communication cadence for your strategy updates

      5.2.2 Define your messaging for each stakeholder

      This step involves the following participants:

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Outcomes of this step

      • A communication plan for when strategy updates need to be given

      5.2.1 Define your communication cadence for your strategy updates

      30 minutes

      Remember the role of different artifacts when it comes to your strategy. The canvas contributes to the What, and the roadmap addresses the How. Any updates to the strategy are articulated and communicated through your roadmap.

      1. Review your currently defined roadmaps, their communication objectives, update frequency, and updates.
      2. Consider the impacted stakeholders and the strategies required to communicate with them.
      3. Fill in your communication cadence and communication method.

      EXAMPLE:

      Roadmap Name

      Audience/Stakeholders

      Communication Cadence

      External Customer Roadmap

      Customers and External Users

      Quarterly (Website)

      Product Delivery Roadmap

      Development Teams, Infrastructure, Architects

      Monthly (By Email)

      Technology Roadmap

      Development Teams, Infrastructure, Architects

      Biweekly (Website)

      Output

      • Clear communication cadence for your roadmaps

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Digital Product Family Strategy Playbook.

      The “what” behind the communication

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state and makes the change concrete and meaningful to staff.

      The change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Five elements of communicating change

      1. What is the change?
      2. Why are we doing it?
      3. How are we going to go about it?
      4. How long will it take us to do it?
      5. What is the role for each department and individual?

      Source: Cornelius & Associates

      How we engage with the message is just as important as the message itself

      Why are we here?

      Speak to what matters to them

      Sell the improvement

      Show real value

      Discuss potential fears

      Ask for their support

      Be gracious

      5.2.2 (Optional) Define your messaging for each stakeholder

      30 minutes

      It’s one thing to communicate the strategy, it’s another thing to send the right message to your stakeholders. Some of this will depend on the kind of news given, but the majority of this is dependent on the stakeholder and the cadence of communication.

      1. From exercise 5.2.1, take the information on the specific roadmaps, target audience, and communication cadence.
      2. Based on your understanding of the audience’s needs, what would the specific update try to get across?
      3. Pick a specific typical example of a change in strategy that you have gone through. (e.g. Product will be delayed by a quarter; key feature is being substituted for another.)

      EXAMPLE:

      Roadmap Name

      Audience/ Stakeholder

      Communication Cadence

      Messaging

      External Customer Roadmap

      Customers and External Users

      Quarterly (Website)

      Output

      • Messaging plan for each roadmap type

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Digital Product Family Strategy Playbook.

      Step 5.3

      Determine your next steps

      Activities

      5.3.1 How do we get started?

      This step involves the following participants:

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Outcomes of this step

      • Understanding the steps to get started in your transformation

      Make a plan in order to make a plan!

      Consider some of the techniques you can use to validate your strategy.

      Learning Milestones

      Sprint Zero (AKA Project-before-the-project)

      The completion of a set of artifacts dedicated to validating business opportunities and hypotheses.

      Possible areas of focus:

      Align teams on product strategy prior to build

      Market research and analysis

      Dedicated feedback sessions

      Provide information on feature requirements

      The completion of a set of key planning activities, typically the first sprint.

      Possible areas of focus:

      Focus on technical verification to enable product development alignment

      Sign off on architectural questions or concerns

      An image showing the flowchart of continuous delivery of value is shown.

      Go to your backlog and prioritize the elements that need to be answered sooner rather than later.

      Possible areas of focus:

      Regulatory requirements or questions to answer around accessibility, security, privacy.

      Stress testing any new processes against situations that may occur.

      The “Now, Next, Later” roadmap

      Use this when deadlines and delivery dates are not strict. This is best suited for brainstorming a product plan when dependency mapping is not required.

      Now: What are you going to do now?

      Next: What are you going to do very soon?

      Later: What are you going to do in the future?

      An example of a now, next, later roadmap is shown.

      Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017

      5.3.1 How do we get started?

      30-60 minutes

      1. Identify what the critical steps are for the organization to embrace product-centric delivery.
      2. Group each critical step by how soon you need to address it:
      • Now: Let’s do this ASAP.
      • Next: Sometime very soon, let’s do these things.
      • Later: Much further off in the distance, let’s consider these things.
    • Record the group results in the Deliver Digital Products at Scale Workbook.
    • Record changes for your product and product family in the Digital Product Family Strategy Playbook.
    • An example of a now, next, later roadmap is shown.

      Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017

      Output

      • Product family transformation critical steps and basic roadmap

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Digital Product Family Strategy Playbook.

      Record the results in the Deliver Digital Products at Scale Workbook.

      Summary of Accomplishment

      Problem Solved

      The journey to become a product-centric organization is not short or easy. Like with any improvement or innovation, teams need to continue to evolve and mature with changes in their operations, teams, tools, and user needs.You’ve taken a big step completing your product family alignment. This provides a backbone for aligning all aspects of your organization to your enterprise goals and strategy while empowering product teams to find solutions closer to the problem. Continue to refine your model and operations to improve value realization and your product delivery pipelines to embrace business agility. Organizations that are most responsive to change will continue to outperform command-and-control leadership.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Research Contributors and Experts

      Photo of Emily Archer.

      Emily Archer

      Lead Business Analyst,

      Enterprise Consulting, authentic digital agency

      Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.

      Photo of David Berg

      Founder & CTO

      Strainprint Technologies Inc.

      David Berg is a product commercialization expert that has spent the last 20 years of his career delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world with the goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.

      Kathy Borneman

      Digital Product Owner, SunTrust Bank

      Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.

      Photro of Charlie Campbell

      Charlie Campbell

      Product Owner, Merchant e-Solutions

      Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.

      Photo of Yarrow Diamond

      Yarrow Diamond

      Sr. Director, Business Architecture

      Financial Services

      Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.

      Photo of Cari J. Faanes-Blakey

      Cari J. Faanes-Blakey, CBAP, PMI-PBA

      Enterprise Business Systems Analyst,

      Vertex, Inc.

      Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.

      Photo of Kieran Gobey

      Kieran Gobey

      Senior Consultant Professional Services

      Blueprint Software Systems

      Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations. Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.

      Photo of Rupert Kainzbauer

      Rupert Kainzbauer

      VP Product, Digital Wallets

      Paysafe Group

      Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. Together with a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.

      Photo of Saeed Khan

      Saeed Khan

      Founder,

      Transformation Labs

      Saeed Khan has been working in high tech for 30 years in both Canada and the US and has held a number of leadership roles in Product Management over that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005. Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders; the only global community of senior level product executives.

      Photo of Hoi Kun Lo

      Hoi Kun Lo

      Product Owner

      Nielsen

      Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.

      Photo of Abhishek Mathur

      Abhishek Mathur

      Sr Director, Product Management

      Kasisto, Inc.

      Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.

      Photo of Jeff Meister

      Jeff Meister

      Technology Advisor and Product Leader

      Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations. Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements. Jeff holds a Bachelor’s of Applied Science (Electrical Engineering) and a Bachelor’s of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.

      Photo of Vincent Mirabelli

      Vincent Mirabelli

      Principal,

      Global Project Synergy Group

      With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.

      Photo of Oz Nazili

      Oz Nazili

      VP, Product & Growth

      TWG

      Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.

      Photo of Mark Pearson

      Mark Pearson

      Principal IT Architect, First Data Corporation

      Mark Pearson is an executive business leader grounded in the process, data, technology, and operations of software-driven business. He knows the enterprise software landscape and is skilled in product, technology, and operations design and delivery within information technology organizations, outsourcing firms, and software product companies.

      Photo of Brenda Peshak

      Brenda Peshak

      Product Owner,

      Widget Industries, LLC

      Brenda Peshak is skilled in business process, analytical skills, Microsoft Office Suite, communication, and customer relationship management (CRM). She is a strong product management professional with a Master’s focused in Business Leadership (MBL) from William Penn University.

      Photo of Mike Starkey

      Mike Starkey

      Director of Engineering

      W.W. Grainger

      Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.

      Photo of Anant Tailor

      Anant Tailor

      Cofounder & Head of Product

      Dream Payments Corp.

      Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes. Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries. Anant is a Professional Engineer with a Bachelor’s degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.

      Photo of Angela Weller

      Angela Weller

      Scrum Master, Businessolver

      Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.

      Related Info-Tech Research

      Product Delivery

      Deliver on Your Digital Product Vision

      • Build a product vision your organization can take from strategy through execution.

      Build a Better Product Owner

      • Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

      Build Your Agile Acceleration Roadmap

      • Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Implement Agile Practices That Work

      • Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      • Streamline business value delivery through the strategic adoption of DevOps practices.

      Extend Agile Practices Beyond IT

      • Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      • Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      • Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Enable Organization-Wide Collaboration by Scaling Agile

      • Execute a disciplined approach to rolling out Agile methods in the organization.

      Application Portfolio Management

      APM Research Center

      • See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management for Small Enterprises

      • There is no one-size-fits-all rationalization. Tailor your framework to meet your goals.

      Streamline Application Maintenance

      • Effective maintenance ensures the long-term value of your applications.

      Build an Application Rationalization Framework

      • Manage your application portfolio to minimize risk and maximize value.

      Modernize Your Applications

      • Justify modernizing your application portfolio from both business and technical perspectives.

      Review Your Application Strategy

      • Ensure your applications enable your business strategy.

      Discover Your Applications

      • Most application strategies fail. Arm yourself with the necessary information and team structure for a successful application portfolio strategy.

      Streamline Application Management

      • Move beyond maintenance to ensuring exceptional value from your apps.

      Optimize Applications Release Management

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Embrace Business-Managed Applications

      • Empower the business to implement their own applications with a trusted business-IT relationship.

      Value, Delivery Metrics, Estimation

      Build a Value Measurement Framework

      • Focus product delivery on business value–driven outcomes.

      Select and Use SDLC Metrics Effectively

      • Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      • Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      • Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      • Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      • Commit to achievable software releases by grounding realistic expectations.

      Reduce Time to Consensus With an Accelerated Business Case

      • Expand on the financial model to give your initiative momentum.

      Optimize Project Intake, Approval, and Prioritization

      • Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Org Design and Performance

      Redesign Your IT Organizational Structure

      • Focus product delivery on business value–driven outcomes.

      Build a Strategic Workforce Plan

      • Have the right people, in the right place, at the right time.

      Implement a New Organizational Structure

      • Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Improve Employee Engagement to Drive IT Performance

      • Don’t just measure engagement, act on it.

      Set Meaningful Employee Performance Measures

      • Set holistic measures to inspire employee performance.

      Master Organizational Change Management Practices

      • PMOs, if you don't know who is responsible for org change, it's you.

      Bibliography (Product Management)

      “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      A, Karen. “20 Mental Models for Product Managers.” Product Management Insider, Medium, 2 Aug. 2018. Web.

      Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.

      Agile Alliance. “Product Owner.” Agile Alliance. n.d. Web.

      Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.

      Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.

      Berez, Steve, et al. “How to Plan and budget for Agile at Scale.” Bain & Company, 08 Oct 2019. Web

      Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint. 2012. Web.

      Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, Agile Alliance 2015. Web.

      Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group. 2005. Web.

      Cohn, Mike. “What Is a Product?” Mountain Goat Software. 6 Sept. 2016. Web.

      Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997.

      Curphey, Mark. “Product Definition.” SlideShare, 25 Feb. 2007. Web.

      “Delegation Poker Product Image.” Management 3.0, n.d. Web.

      Distel, Dominic, et al. “Finding the sweet spot in product-portfolio management.’ McKinsey, 4 Dec. 2020. Web

      Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.

      Fernandes, Thaisa. “Spotify Squad Framework - Part I.” PM101, Medium, 6 Mar. 2017. Web.

      Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.

      Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile2016 Conference, Agile Alliance, 2016. Web.

      Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” The Ready, Medium, 9 Feb. 2018. Web.

      Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Scaled Agile Framework, Medium, 23 Jul. 2018. Web.

      Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.

      Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.

      McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.

      McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web.

      Mironov, Rich. “Scaling Up Product Manager/Owner Teams.” Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014 . Web.

      Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 Mar. 2017. Web.

      Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.

      Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.

      Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.

      Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.

      Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.

      Radigan, Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.

      Rouse, Margaret. “Definition: product.” TechTarget, Sept. 2005. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.

      Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.

      Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.

      Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin Voice of Product, 2 Oct. 2018. Web.

      Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.

      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2016. Web.

      “The Standish Group 2015 Chaos Report.” The Standish Group. 2015. Web.

      Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.

      Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.

      Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium, 19 Dec. 2017. Web.

      Verwijs, Christiaan. “Retrospective: Do The Team Radar.” The Liberators, Medium, 10 Feb. 2017. Web.

      Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management”. Academia.edu. 2010. Web.

      Bibliography (Roadmap)

      Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.

      Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.

      Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012 IEEE International Conference, 12 June 2012, Herzliya, Israel. Web.

      Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.

      Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.

      “How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.

      Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.

      Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018

      Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, Web. Sept. 2018.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, 2017. Web.

      Maurya, Ash. “What is a Minimum Viable Product (MVP).” Leanstack, 12 June 2017. Accessed Sept. 2018.

      Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.

      Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.

      “Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.

      Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 October 2015. Accessed Sept. 2018.

      Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018.

      Bibliography (Vision and Canvas)

      Adams, Paul. “The Future Product Canvas.” Inside Intercom, 10 Jan. 2014. Web.

      “Aligning IT Funding Models to the Pace of Technology Change.” EDUCAUSE, 14 Dec. 2015. Web.

      Altman, Igor. “Metrics: Gone Bad.” OpenView, 10 Nov. 2009. Web.

      Barry, Richard. “The Product Vision Canvas – a Strategic Tool in Developing a Successful Business.” Polymorph, 2019. Web.

      “Business Canvas – Business Models & Value Propositions.” Strategyzer, 2019. Web.

      “Business Model Canvas.” Wikipedia: The Free Encyclopedia, 4 Aug. 2019. Web.

      Charak, Dinker. “Idea to Product: The Working Model.” ThoughtWorks, 13 July 2017. Web.

      Charak, Dinker. “Product Management Canvas - Product in a Snapshot.” Dinker Charak, 29 May 2017. Web.

      Chudley, James. “Practical Steps in Determining Your Product Vision (Product Tank Bristol, Oct. 2018).” LinkedIn SlideShare. Uploaded by cxpartners, 2 Nov. 2018. Web.

      Cowan, Alex. “The 20 Minute Business Plan: Business Model Canvas Made Easy.” COWAN+, 2019. Web.

      Craig, Desiree. “So You've Decided To Become A Product Manager.” Start it up, Medium, 2 June 2019. Web.

      Create an Aha! Business Model Canvas Strategic Model.” Aha! Support, 2019. Web.

      Eick, Stephen. “Does Code Decay? Assessing the Evidence from Change Management Data.” IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.

      Eriksson, Martin. “The next Product Canvas.” Mind the Product, 22 Nov. 2013. Web.

      “Experience Canvas: a Lean Approach: Atlassian Team Playbook.” Atlassian, 2019. Web.

      Freeman, James. “How to Make a Product Canvas – Visualize Your Product Plan.” Edraw, 23 Dec. 2019. Web.

      Fuchs, Danny. “Measure What Matters: 5 Best Practices from Performance Management Leaders.” OpenGov, 8 Aug. 2018. Web.

      Gorisse, Willem. “A Practical Guide to the Product Canvas.” Mendix, 28 Mar. 2017. Web.

      Gothelf, Jeff. “The Lean UX Canvas.” Jeff Gothelf, 15 Dec. 2016. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product: Getting Started.” EBG Consulting, 15 Jan. 2019. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product's Core Requirements.” EBG Consulting, 4 Feb. 2019. Web.

      Gray, Mark Krishan. “Should I Use the Business Model Canvas or the Lean Canvas?” Emergn, 2019. Web.

      Hanby, Jeff. "Software Maintenance: Understanding and Estimating Costs." LookFar, 21 Oct. 2016. Web.

      “How do you define a product?” Scrum.org, 4 Apr 2017, Web

      Juncal, Shaun. “How to Build a Product Roadmap Based on a Business Model Canvas.” ProductPlan, 19 June 2019. Web.

      “Lean Canvas Intro - Uber Example.” YouTube, uploaded by Railsware Product Academy, 12 Oct. 2018. Web.

      “Lesson 6: Product Canvas.” ProdPad Help Center, 2019. Web.

      Lucero, Mario. “The Product Canvas.” Agilelucero.com, 22 June 2015. Web.

      Maurya, Ash. “Create a New Lean Canvas.” Canvanizer, 2019. Web.

      Maurya, Ash. “Don't Write a Business Plan. Create a Lean Canvas Instead.” LEANSTACK, 2019. Web.

      Maurya, Ash. “Why Lean Canvas vs Business Model Canvas?” Medium, 27 Feb. 2012. Web.

      Mirabelli, Vincent. “The Project Value Canvas.” Vincent Mirabelli, 2019. Web.

      Mishra, LN. “Business Analysis Canvas – The Ultimate Enterprise Architecture.” BA Times, 19 June 2019. Web.

      Muller. Jerry Z. “Why performance metrics isn’t always the best way to judge performance.” Fast Company, 3 April 2019. Web.

      Perri, Melissa. “What Is Good Product Strategy?” Melissa Perri, 14 July 2016. Web.

      Pichler, Roman. “A Product Canvas for Agile Product Management, Lean UX, Lean Startup.” Roman Pichler, 16 July 2012. Web.

      Pichler, Roman. “Introducing the Product Canvas.” JAXenter, 15 Jan. 2013. Web.

      Pichler, Roman. “Roman's Product Canvas: Introduction.” YouTube, uploaded by Roman Pichler, 3 Mar. 2017. Web.

      Pichler, Roman. “The Agile Vision Board: Vision and Product Strategy.” Roman Pichler, 10 May 2011. Web.

      Pichler, Roman. “The Product Canvas – Template.” Roman Pichler, 11 Oct. 2016. Web.

      Pichler, Roman. “The Product Canvas Tutorial V1.0.” LinkedIn SlideShare. Uploaded by Roman Pichler, 14 Feb. 2013. Web.

      Pichler, Roman. “The Product Vision Board: Introduction.” YouTube uploaded by Roman Pichler, 3 Mar. 2017. Web.

      “Product Canvas PowerPoint Template.” SlideModel, 2019. Web.

      Product Canvas.” SketchBubble, 2019, Web.

      “Product Canvas.” YouTube, uploaded by Wojciech Szramowski, 18 May 2016. Web.

      “Product Roadmap Software to Help You Plan, Visualize, and Share Your Product Roadmap.” Productboard, 2019. Web.

      Roggero, Giulio. “Product Canvas Step-by-Step.” LinkedIn SlideShare, uploaded by Giulio Roggero, 18 May 2013. Web.

      Royce, Dr. Winston W. “Managing the Development of Large Software Systems.” Scf.usc.edu, 1970. Web.

      Ryan, Dustin. “The Product Canvas.” Qdivision, Medium, 20 June 2017. Web.

      Snow, Darryl. “Product Vision Board.” Medium, 6 May 2017. Web.

      Stanislav, Shymansky. “Lean Canvas – a Tool Your Startup Needs Instead of a Business Plan.” Railsware, 12 Oct. 2018. Web.

      Stanislav, Shymansky. “Lean Canvas Examples of Multi-Billion Startups.” Railsware, 20 Feb. 2019. Web.

      “The Product Vision Canvas.” YouTube, Uploaded by Tom Miskin, 20 May 2019. Web.

      Tranter, Leon. “Agile Metrics: the Ultimate Guide.” Extreme Uncertainty, n.d. Web.

      “Using Business Model Canvas to Launch a Technology Startup or Improve Established Operating Model.” AltexSoft, 27 July 2018. Web.

      Veyrat, Pierre. “Lean Business Model Canvas: Examples + 3 Pillars + MVP + Agile.” HEFLO BPM, 10 Mar. 2017. Web.

      “What Are Software Metrics and How Can You Track Them?” Stackify, 16 Sept. 2017. Web

      “What Is a Product Vision?” Aha!, 2019. Web.

      pricing

      • TymansGroupVideosExcerpt: BasicFor freelancers$19/ month 10 presentations/monthSupport at $25/hour1 campaign/month Choose plan StandardFor medium sized teams$29/ month 50 presentations/month5 hours of free support10 campaigns/month Choose plan EnterpriseFor large companies$79/ month Unlimited presentationsUnlimited supportUnlimited campaigns Choose plan

      Pricing

      Our pricing options will be available soon for simple download,

      In the meantime, please book a free discovery call. No cost, no sales pitch.

      Continue reading

      Create a Right-Sized Enterprise Architecture Governance Framework

      • Buy Link or Shortcode: {j2store}582|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Strategy & Operating Model
      • Parent Category Link: /strategy-and-operating-model
      • EA governance is perceived as an unnecessary layer of bureaucracy because business benefits are poorly communicated.
      • The organization doesn’t have a formalized EA practice.
      • Where an EA practice exists, employees are unsure of EA’s roles and responsibilities.

      Our Advice

      Critical Insight

      • Enterprise architecture is not a technical function – it should be business-value driven and forward looking, positioning organizational assets in favor of long-term strategy rather than short-term tactics.

      Impact and Result

      • Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.
      • Right-sized. Re-use existing process checkpoints rather than creating new ones. Clearly define EA governance inclusion criteria for projects.
      • Defined and measured process. Define metrics to measure EA’s performance and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.
      • Strike the right balance. Adopt architecture principles that strikes the right balance between business and technology.

      Create a Right-Sized Enterprise Architecture Governance Framework Research & Tools

      Start here – read the Executive Brief

      Read our Executive Brief to find out how implementing a successful enterprise architecture governance framework can benefit your organization.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Current State of EA Governance

      Identify the organization’s standing in terms of the enterprise architecture practice, and know the gaps and what the EA practice needs to fulfill to create a good governance framework.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 1: Current State of EA Governance
      • EA Capability – Risk and Complexity Assessment Tool
      • EA Governance Assessment Tool

      2. EA Fundamentals

      Understand the EA fundamentals and then refresh them to better align the EA practice with the organization and create business benefit.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 2: EA Fundamentals
      • EA Vision and Mission Template
      • EA Goals and Measures Template
      • EA Principles Template

      3. Engagement Model

      Analyze the IT operating model and identify EA’s role at each stage; refine it to promote effective EA engagement upfront in the early stages of the IT operating model.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 3: Engagement Model
      • EA Engagement Model Template

      4. EA Governing Bodies

      Set up EA governing bodies to provide guidance and foster a collaborative environment by identifying the correct number of EA governing bodies, defining the game plan to initialize the governing bodies, and creating an architecture review process.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 4: EA Governing Bodies
      • Architecture Board Charter Template
      • Architecture Review Process Template

      5. EA Policy

      Create an EA policy to provide a set of guidelines designed to direct and constrain the architecture actions of the organization in the pursuit of its goals in order to improve architecture compliance and drive business value.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 5: EA Policy
      • EA Policy Template
      • EA Assessment Checklist Template
      • EA Compliance Waiver Process Template
      • EA Compliance Waiver Form Template

      6. Architectural Standards

      Define architecture standards to facilitate information exchange, improve collaboration, and provide stability. Develop a process to update the architectural standards to ensure relevancy and promote process transparency.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 6: Architectural Standards
      • Architecture Standards Update Process Template

      7. Communication Plan

      Craft a plan to engage the relevant stakeholders, ascertain the benefits of the initiative, and identify the various communication methods in order to maximize the chances of success.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 7: Communication Plan
      • EA Governance Communication Plan Template
      • EA Governance Framework Template
      [infographic]

      Workshop: Create a Right-Sized Enterprise Architecture Governance Framework

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Current State of EA governance (Pre-workshop)

      The Purpose

      Conduct stakeholder interviews to understand current state of EA practice and prioritize gaps for EA governance based on organizational complexity.

      Key Benefits Achieved

      Prioritized list of actions to arrive at the target state based on the complexity of the organization

      Activities

      1.1 Determine organizational complexity.

      1.2 Conduct an assessment of the EA governance components.

      1.3 Identify and prioritize gaps.

      1.4 Conduct senior management interviews.

      Outputs

      Organizational complexity score

      EA governance current state and prioritized list of EA governance component gaps

      Stakeholder perception of the EA practice

      2 EA Fundamentals and Engagement Model

      The Purpose

      Refine EA fundamentals to align the EA practice with the organization and identify EA touchpoints to provide guidance for projects.

      Key Benefits Achieved

      Alignment of EA goals and objectives with the goals and objectives of the organization

      Early involvement of EA in the IT operating model

      Activities

      2.1 Review the output of the organizational complexity and EA assessment tools.

      2.2 Craft the EA vision and mission.

      2.3 Develop the EA principles.

      2.4 Identify the EA goals.

      2.5 Identify EA engagement touchpoints within the IT operating model.

      Outputs

      EA vision and mission statement

      EA principles

      EA goals and measures

      Identified EA engagement touchpoints and EA level of involvement

      3 EA Governing Bodies

      The Purpose

      Set up EA governing bodies to provide guidance and foster a collaborative environment by identifying the correct number of EA governing bodies, defining the game plan to initialize the governing bodies and creating an architecture review process.

      Key Benefits Achieved

      Business benefits are maximized and solution design is within the options set forth by the architectural reference models while no additional layers of bureaucracy are introduced

      Activities

      3.1 Identify the number of governing bodies.

      3.2 Define the game plan to initialize the governing bodies.

      3.3 Define the architecture review process.

      Outputs

      Architecture board structure and coverage

      Identified architecture review template

      4 EA Policy

      The Purpose

      Create an EA policy to provide a set of guidelines designed to direct and constrain the architecture actions of the organization in the pursuit of its goals in order to improve architecture compliance and drive business value.

      Key Benefits Achieved

      Improved architecture compliance, which ties investments to business value and provides guidance to architecture practitioners

      Activities

      4.1 Define the scope.

      4.2 Identify the target audience.

      4.3 Determine the inclusion and exclusion criteria.

      4.4 Craft an assessment checklist.

      Outputs

      Defined scope

      Inclusion and exclusion criteria for project review

      Architecture assessment checklist

      5 Architectural Standards and Communication Plan

      The Purpose

      Define architecture standards to facilitate information exchange, improve collaboration, and provide stability.

      Craft a communication plan to implement the new EA governance framework in order to maximize the chances of success.

      Key Benefits Achieved

      Consistent development of architecture, increased information exchange between stakeholders

      Improved process transparency

      Improved stakeholder engagement

      Activities

      5.1 Identify and standardize EA work products.

      5.2 Classifying the architectural standards.

      5.3 Identifying the custodian of standards.

      5.4 Update the standards.

      5.5 List the changes identified in the EA governance initiative

      5.6 Create a communication plan.

      Outputs

      Identified set of EA work products to standardize

      Architecture information taxonomy

      Identified set of custodian of standards

      Standard update process

      List of EA governance initiatives

      Communication plan for EA governance initiatives

      Further reading

      Create a Right-Sized Enterprise Architecture Governance Framework

      Focus on process standardization, repeatability, and sustainability.

      ANALYST PERSPECTIVE

      "Enterprise architecture is not a technology concept, rather it is the foundation on which businesses orient themselves to create and capture value in the marketplace. Designing architecture is not a simple task and creating organizations for the future requires forward thinking and rigorous planning.

      Architecture processes that are supposed to help facilitate discussions and drive option analysis are often seen as an unnecessary overhead. The negative perception is due to enterprise architecture groups being overly prescriptive rather than providing a set of options that guide and constrain solutions at the same time.

      EA groups should do away with the direct and control mindset and change to a collaborate and mentor mindset. As part of the architecture governance, EA teams should provide an option set that constrains design choices, and also be open to changes to standards or best practices. "

      Gopi Bheemavarapu, Sr. Manager, CIO Advisory Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      This Research Will Help You:

      • Understand the importance of enterprise architecture (EA) governance and how to apply it to guide architectural decisions.
      • Enhance your understanding of the organization’s current EA governance and identify areas for improvement.
      • Optimize your EA engagement model to maximize value creation.
      • Learn how to set up the optimal number of governance bodies in order to avoid bureaucratizing the organization.

      This Research Will Also Assist:

      • Business Relationship Managers
      • Business Analysts
      • IT Managers
      • Project Managers
      • IT Analysts
      • Quality Assurance Leads
      • Software Developers

      This Research Will Help Them:

      • Give an overview of enterprise architecture governance
      • Clarity on the role of enterprise architecture team

      Executive summary

      Situation

      • Deployed solutions do not meet business objectives resulting in expensive and extensive rework.
      • Each department acts independently without any regular EA touchpoints.
      • Organizations practice project-level architecture as opposed to enterprise architecture.

      Complication

      • EA governance is perceived as an unnecessary layer of bureaucracy because business benefits are poorly communicated.
      • The organization doesn’t have a formalized EA practice.
      • Where an EA practice exists, employees are unsure of EA’s roles and responsibilities.

      Resolution

      • Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.
      • Right-sized. Re-use existing process checkpoints, rather than creating new ones. Clearly define EA governance inclusion criteria for projects.
      • Defined and measured process. Define metrics to measure EA’s performance and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.
      • Strike the right balance. Adopt architecture principles that strikes the right balance between business and technology imperatives.

      Info-Tech Insight

      Enterprise architecture is critical to ensuring that an organization has the solid IT foundation it needs to efficiently enable the achievement of its current and future strategic goals rather than focusing on short-term tactical gains.

      What is enterprise architecture governance?

      An architecture governance process is the set of activities an organization executes to ensure that decisions are made and accountability is enforced during the execution of its architecture strategy. (Hopkins, “The Essential EA Toolkit.”)

      EA governance includes the following:

      • Implement a system of controls over the creation and monitoring of all architectural components.
      • Ensure effective introduction, implementation, and evolution of architectures within the organization.
      • Implement a system to ensure compliance with internal and external standards and regulatory obligations.
      • Develop practices that ensure accountability to a clearly identified stakeholder community, both inside and outside the organization.

      (TOGAF)

      IT governance sets direction through prioritization and decision making, and monitors overall IT performance.

      The image shows a circle set within a larger circle. The inner circle is connected to the bottom of the larger circle. The inner circle is labelled EA Governance and the larger circle is labelled IT Governance.

      EA governance ensures that optimal architectural design choices are being made that focus on long-term value creation.

      Harness the benefits of an optimized EA governance

      Core benefits of EA governance are seen through:

      Value creation

      Effective EA governance ensures alignment between organizational investments and corporate strategic goals and objectives.

      Cost reduction

      Architecture standards provide guidance to identify opportunities for reuse and eliminate redundancies in an organization.

      Risk optimization

      Architecture review processes and assessment checklists ensure that solutions are within the acceptable risk levels of the organization.

      EA governance is difficult to structure appropriately, but having an effective structure will allow you to:

      • Achieve business strategy through faster time-to-market innovations and capabilities.
      • Reduced transaction costs with more consistent business processes and information across business units.
      • Lower IT costs due to better traceability, faster design, and lower risk.
      • Link IT investments to organizational strategies and objectives
      • Integrate and institutionalizes IT best practices.
      • Enable the organization to take full advantage of its information, infrastructure, and hardware and software assets.
      • Support regulatory as well as best practice requirements such as auditability, security, responsibility, and accountability.

      Organizations that have implemented EA governance realize greater benefits from their EA programs

      Modern day CIOs of high-performing organizations use EA as a strategic planning discipline to improve business-IT alignment, enable innovation, and link business and IT strategies to execution.

      Recent Info-Tech research found that organizations that establish EA governance realize greater benefits from their EA initiatives.

      The image shows a bar graph, with Impact from EA on the Y-axis, and different initiatives listed on the X-axis. Each initiative has two bars connected to it, with a blue bar representing answers of No and the grey bar representing answers of Yes.

      (Info-Tech Research Group, N=89)

      Measure EA governance implementation effectiveness

      Define key operational measures for internal use by IT and EA practitioners. Also, define business value measures that communicate and demonstrate the value of EA as an “enabler” of business outcomes to senior executives.

      EA performance measures (lead, operational) EA value measures (lag)
      Application of EA management process EA’s contribution to IT performance EA’s contribution to business value

      Enterprise Architecture Management

      • Number of months since the last review of target state EA blueprints.

      IT Investment Portfolio Management

      • Percentage of projects that were identified and proposed by EA.

      Solution Development

      • Number of projects that passed EA reviews.
      • Number of building blocks reused.

      Operations Management

      • Reduction in the number of applications with overlapping functionality.

      Business Value

      • Lower non-discretionary IT spend.
      • Decreased time to production.
      • Higher satisfaction of IT-enabled services.

      An insurance provider adopts a value-focused, right-sized EA governance program

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      The insurance sector has been undergoing major changes, and as a reaction, businesses within the sector have been embracing technology to provide innovative solutions.

      The head of EA in a major insurance provider (henceforth to be referred to as “INSPRO01”) was given the mandate to ensure that solutions are architected right the first time to maximize reuse and reduce technology debt. The EA group was at a critical point – to demonstrate business value or become irrelevant.

      Complication

      The project management office had been accountable for solution architecture and had placed emphasis on short-term project cost savings at the expense of long term durability.

      There was a lack of awareness of the Enterprise Architecture group within INSPRO01, and people misunderstood the roles and responsibilities of the EA team.

      Result

      Info-Tech helped define the responsibilities of the EA team and clarify the differences between the role of a Solution Architect vs. Enterprise Architect.

      The EA team was able to make the case for change in the project management practices to ensure architectures are reviewed and approved prior to implementation.

      As a result, INSPRO01 saw substantial increases in reuse opportunities and thereby derived more value from its technology investments.

      Success factors for EA governance

      The success of any EA governance initiative revolves around adopting best practices, setting up repeatable processes, and establishing appropriate controls.

      1. Develop best practices for managing architecture policies, procedures, roles, skills, and organizational structures.
      2. Establish organizational responsibilities and structures to support the architecture governance processes.
      3. Management of criteria for the control of the architecture governance processes, dispensations, compliance assessments, and SLAs.

      Info-Tech’s approach to EA governance

      Our best-practice approach is grounded in TOGAF and enhanced by the insights and guidance from our analysts, industry experts, and our clients.

      Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.

      Right-sized. Insert EA governance into existing process checkpoints rather than creating new ones. Clearly define EA governance inclusion criteria for projects.

      Measured. Define metrics to measure EA’s performance, and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.

      Balanced. Adopt architecture principles that strikes the right balance between business and technology.

      Info-Tech’s EA governance framework

      Info-Tech’s architectural governance framework provides a value-focused, right-sized approach with a strong emphasis on process standardization, repeatability, and sustainability.

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      Use Info-Tech’s templates to complete this project

      1. Current state of EA governance
        • EA Capability - Risk and Complexity Assessment Tool
        • EA Governance Assessment Tool
      2. EA fundamentals
        • EA Vision and Mission Template
        • EA Goals and Measures Template
        • EA Principles Template
      3. Engagement model
        • EA Engagement Model Template
      4. EA governing bodies
        • Architecture Board Charter Template
        • Architecture Review Process Template
      5. EA policy
        • EA Policy Template
        • Architecture Assessment Checklist Template
        • Compliance Waiver Process Template
        • Compliance Waiver Form Template
      6. Architectural standards
        • Architecture Standards Update Process Template
      7. Communication Plan
        • EA Governance Communication Plan Template
        • EA Governance Framework Template

      As you move through the project, capture your progress with a summary in the EA Governance Framework Template.

      Download the EA Governance Framework Template document for use throughout this project.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      EA governance framework – phase-by-phase outline (1/2)

      Current state of EA governance EA Fundamentals Engagement Model EA Governing Bodies
      Best-Practice Toolkit

      1.1 Determine organizational complexity

      1.2 Conduct an assessment of the EA governance components

      1.3 Identify and prioritize gaps

      2.1 Craft the EA vision and mission

      2.2 Develop the EA principles

      2.3 Identify the EA goals

      3.1 Build the case for EA engagement

      3.2 Identify engagement touchpoints within the IT operating model

      4.1 Identify the number of governing bodies

      4.2 Define the game plan to initialize the governing bodies

      4.3 Define the architecture review process

      Guided Implementations
      • Determine organizational complexity
      • Assess current state of EA governance
      • Develop the EA fundamentals
      • Review the EA fundamentals
      • Review the current IT operating model
      • Determine the target engagement model
      • Identify architecture boards and develop charters
      • Develop an architecture review process

      Phase 1 Results:

      • EA Capability - risk and complexity assessment
      • EA governance assessment

      Phase 2 Results:

      • EA vision and mission
      • EA goals and measures
      • EA principles

      Phase 3 Results:

      • EA engagement model

      Phase 4 Results:

      • Architecture board charter
      • Architecture review process

      EA governance framework – phase-by-phase outline (2/2)

      EA Policy Architectural Standards Communication Plan
      Best-Practice Toolkit

      5.1 Define the scope of EA policy

      5.2 Identify the target audience

      5.3 Determine the inclusion and exclusion criteria

      5.4 Craft an assessment checklist

      6.1 Identify and standardize EA work products

      6.2 Classify the architectural standards

      6.3 Identify the custodian of standards

      6.4 Update the standards

      7.1 List the changes identified in the EA governance initiative

      7.2 Identify stakeholders

      7.3 Create a communication plan

      Guided Implementations
      • EA policy, assessment checklists, and decision types
      • Compliance waivers
      • Understand architectural standards
      • EA repository and updating the standards
      • Create a communication plan
      • Review the communication plan

      Phase 5 Results:

      • EA policy
      • Architecture assessment checklist
      • Compliance waiver process
      • Compliance waiver form

      Phase 6 Results:

      • Architecture standards update process

      Phase 7 Results:

      • Communication plan
      • EA governance framework

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Pre-workshopWorkshop Day 1Workshop Day 2Workshop Day 3Workshop Day 4
      ActivitiesCurrent state of EA governance EA fundamentals and engagement model EA governing bodies EA policy Architectural standards and

      communication plan

      1.1 Determine organizational complexity

      1.2 Conduct an assessment of the EA governance components

      1.3 Identify and prioritize gaps

      1.4 Senior management interviews

      1. Review the output of the organizational complexity and EA assessment tools
      2. Craft the EA vision and mission
      3. Develop the EA principles.
      4. Identify the EA goals
      5. Identify EA engagement touchpoints within the IT operating model
      1. Identify the number of governing bodies
      2. Define the game plan to initialize the governing bodies
      3. Define the architecture review process
      1. Define the scope
      2. Identify the target audience
      3. Determine the inclusion and exclusion criteria
      4. Craft an assessment checklist
      1. Identify and standardize EA work products
      2. Classifying the architectural standards
      3. Identifying the custodian of standards
      4. Updating the standards
      5. List the changes identified in the EA governance initiative
      6. Identify stakeholders
      7. Create a communication plan
      Deliverables
      1. EA Capability - risk and complexity assessment tool
      2. EA governance assessment tool
      1. EA vision and mission template
      2. EA goals and measures template
      3. EA principles template
      4. EA engagement model template
      1. Architecture board charter template
      2. Architecture review process template
      1. EA policy template
      2. Architecture assessment checklist template
      3. Compliance waiver process template
      4. Compliance waiver form template
      1. Architecture standards update process template
      2. Communication plan template

      Phase 1

      Current State of EA Governance

      Create a Right-Sized Enterprise Architecture Governance Framework

      Current State of EA Governance

      1. Current State of EA Governance
      2. EA Fundamentals
      3. Engagement Model
      4. EA Governing Bodies
      5. EA Policy
      6. Architectural Standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Determine organizational complexity
      • Conduct an assessment of the EA governance components
      • Identify and prioritize gaps

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Prioritized list of gaps

      Info-Tech Insight

      Correlation is not causation – an apparent problem might be a symptom rather than a cause. Assess the organization’s current EA governance to discover the root cause and go beyond the symptoms.

      Phase 1 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Current State of EA Governance

      Proposed Time to Completion: 2 weeks

      Step 1.1: Determine organizational complexity

      Start with an analyst kick-off call:

      • Discuss how to use Info-Tech’s EA Capability – Risk and Complexity Assessment Tool.
      • Discuss how to complete the inputs on the EA Governance Assessment Tool.

      Then complete these activities…

      • Conduct an assessment of your organization to determine its complexity.
      • Assess the state of EA governance within your organization.

      With these tools & templates:

      • EA Capability – Risk and Complexity Assessment Tool
      • EA Governance Assessment Tool

      Step 1.2: Assess current state of EA governance

      Start with an analyst kick-off call:

      • Review the output of the EA governance assessment and gather feedback on your goals for the EA practice.

      Then complete these activities…

      • Discuss whether you are ready to proceed with the project.
      • Review the list of tasks and plan your next steps.

      With these tools & templates:

      • EA Governance Assessment Tool

      Right-size EA governance based on organizational complexity

      Determining organizational complexity is not rocket science. Use Info-Tech’s tool to quantify the complexity and use it, along with common sense, to determine the appropriate level of architecture governance.

      Info-Tech’s methodology uses six factors to determine the complexity of the organization:

      1. The size of the organization, which can often be denoted by the revenue, headcount, number of applications in use, and geographical diversity.
      2. The solution alignment factor helps indicate the degree to which various projects map to the organization’s strategy.
      3. The size and complexity of the IT infrastructure and networks.
      4. The portfolio of applications maintained by the IT organization.
      5. Key changes within the organization such as M&A, regulatory changes, or a change in business or technology leadership.
      6. Other negative influences that can adversely affect the organization.

      Determine your organization’s level of complexity

      1.1 2 hours

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Capability section highlighted.

      Step 1 - Facilitate

      Download the EA Capability – Risk and Complexity Assessment Tool to facilitate a session on determining your organization’s complexity.

      Download EA Organizational - Risk and Complexity Assessment Tool

      Step 2 - Summarize

      Summarize the results in the EA governance framework document.

      Update the EA Governance Framework Template

      Understand the components of effective EA governance

      EA governance is multi-faceted and it facilitates effective use of resources to meet organizational strategic objectives through well-defined structural elements.

      EA Governance

      • Fundamentals
      • Engagement Model
      • Policy
      • Governing Bodies
      • Architectural Standards

      Components of architecture governance

      1. EA vision, mission, goals, metrics, and principles that provide a direction for the EA practice.
      2. An engagement model showing where and in what fashion EA is engaged in the IT operating model.
      3. An architecture policy formulated and enforced by the architectural governing bodies to guide and constrain architectural choices in pursuit of strategic goals.
      4. Governing bodies to assess projects for compliance and provide feedback.
      5. Architectural standards that codify the EA work products to ensure consistent development of architecture.

      Next Step: Based on the organization’s complexity, conduct a current state assessment of EA governance using Info-Tech’s EA Governance Assessment Tool.

      Assess the components of EA governance in your organization

      1.2 2 hrs

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Governance section highlighted.

      Step 1 - Facilitate

      Download the “EA Governance Assessment Tool” to facilitate a session on identifying the best practices to be applied in your organization.

      Download Info-Tech’s EA Governance Assessment Tool

      Step 2 - Summarize

      Summarize the identified best practices in the EA governance framework document.

      Update the EA Governance Framework Template


      Conduct a current state assessment to identify limitations of the existing EA governance framework

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 was planning a major transformation initiative. The organization determined that EA is a strategic function.

      The CIO had pledged support to the EA group and had given them a mandate to deliver long-term strategic architecture.

      The business leaders did not trust the EA team and believed that lack of business skills in the group put the business transformation at risk.

      Complication

      The EA group had been traditionally seen as a technology organization that helps with software design.

      The EA team lacked understanding of the business and hence there had been no common language between business and technology.

      Result

      Info-Tech helped the EA team create a set of 10 architectural principles that are business-value driven rather than technical statements.

      The team socialized the principles with the business and technology stakeholders and got their approvals.

      By applying the business focused architectural principles, the EA team was able to connect with the business leaders and gain their support.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Determine organizational complexity.
      • Conduct an assessment of the EA governance components.
      • Identify and prioritize gaps.

      Outcomes

      • Organizational complexity assessment
      • EA governance capability assessment
      • A prioritized list of capability gaps

      Phase 2

      EA Fundamentals

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Fundamentals

      1. Current State of EA Governance
      2. EA Fundamentals
      3. Engagement Model
      4. EA Governing Bodies
      5. EA Policy
      6. Architectural Standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Craft the EA vision and mission
      • Develop the EA principles.
      • Identify the EA goals

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Refined set of EA fundamentals to support the building of EA governance

      Info-Tech Insight

      A house divided against itself cannot stand – ensure that the EA fundamentals are aligned with the organization’s goals and objectives.

      Phase 2 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: EA Fundamentals

      Proposed Time to Completion: 3 weeks

      Step 2.1: Develop the EA fundamentals

      Review findings with analyst:

      • Discuss the importance of the EA fundamentals – vision, mission, goals, measures, and principles.
      • Understand how to align the EA vision, mission, goals, and measures to your organization’s vision, mission, goals, measures, and principles.

      Then complete these activities…

      • Develop the EA vision statements.
      • Craft the EA mission statements.
      • Define EA goals and measures.
      • Adopt EA principles.

      With these tools & templates:

      • EA Vision and Mission Template
      • EA Principles Template
      • EA Goals and Measures Template

      Step 2.2: Review the EA fundamentals

      Review findings with analyst:

      • Review the EA fundamentals in conjunction with the results of the EA governance assessment tool and gather feedback.

      Then complete these activities…

      • Refine the EA vision, mission, goals, measures, and principles.
      • Review the list of tasks and plan your next steps.

      With these tools & templates:

      • EA Vision and Mission Template
      • EA Principles Template
      • EA Goals and Measures Template

      Fundamentals of an EA organization

      Vision, mission, goals and measures, and principles form the foundation of the EA function.

      Factors to consider when developing the vision and mission statements

      The vision and mission statements provide strategic direction to the EA team. These statements should be created based on the business and technology drivers in the organization.

      Business Drivers

      • Business drivers are factors that determine, or cause, an increase in value or major improvement of a business.
      • Examples of business drivers include:
        • Increased revenue
        • Customer retention
        • Salesforce effectiveness
        • Innovation

      Technology Drivers

      • Technology drivers are factors that are vital for the continued success and growth of a business using effective technologies.
      • Examples of technology drivers include:
        • Enterprise integration
        • Information security
        • Portability
        • Interoperability

      "The very essence of leadership is [that] you have a vision. It's got to be a vision you articulate clearly and forcefully on every occasion. You can't blow an uncertain trumpet." – Theodore Hesburgh

      Develop vision, mission, goals, measures, and principles to define the EA capability direction and purpose

      EA capability vision statement

      Articulates the desired future state of EA capability expressed in the present tense.

      • What will be the role of EA capability?
      • How will EA capability be perceived?

      Example: To be recognized by both the business and IT as a trusted partner that drives [Company Name]’s effectiveness, efficiency, and agility.

      EA capability mission statement

      Articulates the fundamental purpose of the EA capability.

      • Why does EA capability exist?
      • What does EA capability do to realize its vision?
      • Who are the key customers of the EA capability?

      Example: Define target enterprise architecture for [Company Name], identify solution opportunities, inform IT investment management, and direct solution development, acquisition, and operation compliance.

      EA capability goals and measures

      EA capability goals define specific desired outcomes of an EA management process execution. EA capability measures define how to validate the achievement of the EA capability goals.

      Example:

      Goal: Improve reuse of IT assets at [Company Name].

      Measures:

      • The number of building blocks available for reuse.
      • Percent of projects that utilized existing building blocks.
      • Estimated efficiency gain (= effort to create a building block * reuse count).

      EA principles

      EA principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting target-state enterprise architecture design, solution development, and procurement decisions.

      Example:

      • EA principle name: Reuse.
      • Statement: Maximize reuse of existing assets.
      • Rationale: Reuse prevents duplication of development and support efforts, increasing efficiency, and agility.
      • Implications: Define architecture and solution building blocks and ensure their consistent application.

      EA principles guide decision making

      Policies can be seen as “the letter of the law,” whereas EA principles summarize “the spirit of the law.”

      The image shows a graphic with EA Principles listed at the top, with an arrow pointing down to Decisions on the use of IT. At the bottom are domain-specific policies, with two arrows pointing upwards: the arrow on the left is labelled direct, and the arrow on the right is labelled control. The arrow points up to the label Decisions on the use of IT. On the left, there is an arrow pointing both up and down. At the top it is labelled The spirit of the law, and at the bottom, The letter of the law. On the right, there is another arrow pointing both up and down, labelled How should decisions be made at the top and labelled Who has the accountability and authority to make decisions? at the bottom.

      Define EA capability goals and related measures that resonate with EA capability stakeholders

      EA capability goals, i.e. specific desired outcomes of an EA management process execution. Use COBIT 5, APO03 process goals, and metrics as a starting point.

      The image shows a chart titled Manage Enterprise Architecture.

      Define relevant business value measures to collect indirect evidence of EA’s contribution to business benefits

      Define key operational measures for internal use by IT and EA practitioners. Also, define business value measures that communicate and demonstrate the value of EA as an enabler of business outcomes to senior executives.

      EA performance measures (lead, operational) EA value measures (lag)
      Application of EA management process EA’s contribution to IT performance EA’s contribution to business value

      Enterprise Architecture Management

      • Number of months since the last review of target state EA blueprints.

      IT Investment Portfolio Management

      • Percentage of projects that were identified and proposed by EA.

      Solution Development

      • Number of projects that passed EA reviews.
      • Number of building blocks reused.

      Operations Management

      • Reduction in the number of applications with overlapping functionality.

      Business Value

      • Lower non-discretionary IT spend.
      • Decreased time to production.
      • Higher satisfaction of IT-enabled services.

      Refine the organization’s EA fundamentals

      2.1 2 hrs

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents with four sections highlighted, beginning with EA Vision Statement and ending with EA Goals and Measures.

      Step 1 - Facilitate

      Download the three templates and hold a working session to facilitate a session on creating EA fundamentals.

      Download the EA Vision and Mission Template, the EA Principles Template, and the EA Goals and Measures Template

      Step 2 - Summarize

      Document the final vision, mission, principles, goals, and measures within the EA Governance Framework.

      Update the EA Governance Framework Template


      Ensure that the EA fundamentals are aligned to the organizational needs

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      The EA group at INSPRO01 was being pulled in multiple directions with requests ranging from architecture review to solution design to code reviews.

      Project level architecture was being practiced with no clarity on the end goal. This led to EA being viewed as just another IT function without any added benefits.

      Info-Tech recommended that the EA team ensure that the fundamentals (vision, mission, principles, goals, and measures) reflect what the team aspired to achieve before fixing any of the process concerns.

      Complication

      The EA team was mostly comprised of technical people and hence the best practices outlined were not driven by business value.

      The team had no documented vision and mission statements in place. In addition, the existing goals and measures were not tied to the business strategic objectives.

      The team had architectural principles documented, but there were too many and they were very technical in nature.

      Result

      With Info-Tech’s guidance, the team developed a vision and mission statement to succinctly communicate the purpose of the EA function.

      The team also reduced and simplified the EA principles to make sure they were value driven and communicated in business terms.

      Finally, the team proposed goals and measures to track the performance of the EA team.

      With the fundamentals in place, the team was able to show the value of EA and gain organization-wide acceptance.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Craft the EA vision and mission.
      • Develop the EA principles.
      • Identify the EA goals.

      Outcomes

      • Refined set of EA fundamentals to support the building of EA governance.

      Phase 3

      Engagement Model

      Create a Right-Sized Enterprise Architecture Governance Framework

      Engagement Model

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This step will walk you through the following activities:

      • Build the case for EA engagement
      • Engagement touchpoints within the IT operating model

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Summary of the assessment of the current EA engagement model
      • Target EA engagement model

      Info-Tech Insight

      Perform due diligence prior to decision making. Use the EA Engagement Model to promote conversations between stage gate meetings as opposed to having the conversation during the stage gate meetings.

      Phase 3 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: EA engagement model

      Proposed Time to Completion: 2 weeks

      Step 3.1 Review the current IT operating model

      Start with an analyst kick-off call:

      • Review Info-Tech’s IT operating model.
      • Understand how to document your organization’s IT operating model.
      • Document EA’s current role and responsibility at each stage of the IT operating model.

      Then complete these activities…

      • Document your organization’s IT operating model.

      With these tools & templates:

      • EA Engagement Model Template

      Step 3.2: Determine the target engagement model

      Review findings with analyst:

      • Review your organization’s current state IT operating model.
      • Review your EA’s role and responsibility at each stage of the IT operating model.
      • Document the role and responsibility of EA in the future state.

      Then complete these activities…

      • Document EA’s future role within each stage of your organization’s IT operating model.

      With these tools & templates:

      • EA Engagement Model Template.

      The three pillars of EA Engagement

      Effective EA engagement revolves around three basic principles – generating business benefits, creating adaptable models, and being able to replicate the process across the organization.

      Business Value Driven

      Focus on generating business value from organizational investments.

      Repeatable

      Process should be standardized, transparent, and repeatable so that it can be consistently applied across the organization.

      Flexible

      Accommodate the varying needs of projects of different sizes.

      Where these pillars meet: Advocates long-term strategic vs. short-term tactical solutions.

      EA interaction points within the IT operating model

      EA’s engagement in each stage within the plan, build, and run phases should be clearly defined and communicated.

      Plan Strategy Development Business Planning Conceptualization Portfolio Management
      Build Requirements Solution Design Application Development/ Procurement Quality Assurance
      Run Deploy Operate

      Document the organization’s current IT operating model

      3.1 2-3 hr

      Input

      • IT project lifecycle

      Output

      • Organization’s current IT operating model.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, IT department leads, business leaders.

      Instructions:

      Hold a working session with the participants to document the current IT operating model. Facilitate the activity using the following steps:

      1. Map out the IT operating model.

      1. Find a project that was just deployed within the organization and backtrack every step of the way to the strategy development that resulted in the conception of the project.
      2. Interview the personnel involved with each step of the process to get a sense of whether or not projects usually move to deployment going through these steps.
      3. Review Info-Tech’s best-practice IT operating model presented in the EA Engagement Model Template, and add or remove any steps to the existing organization’s IT operating model as necessary. Document the finalized steps of the IT operating model.

      2. Determine EA’s current role in the operating model.

      1. Interview EA personnel through each step of the process and ask them their role. This is to get a sense of the type of input that EA is having into each step of the process.
      2. Using the EA Engagement Model Template, document the current role of EA in each step of the organization’s IT operation as you complete the interviews.

      Download the EA Engagement Model Template to document the organization’s current IT operating model.

      Define RACI in every stage of the IT operating model (e.g. EA role in strategy development phase of the IT operating model is presented below)

      Strategy Development

      Also known as strategic planning, strategy development is fundamental to creating and running a business. It involves the creation of a longer-term game plan or vision that sets specific goals and objectives for a business.

      R Those in charge of performing the task. These are the people actively involved in the completion of the required work. Business VPs, EA, IT directors R
      A The one ultimately answerable for the correct and thorough completion of the deliverable or task, and the one who delegates the work to those responsible. CEO A
      C Those whose opinions are sought before a decision is made, and with whom there is two-way communication. PMO, Line managers, etc. C
      I Those who are kept up to date on progress, and with whom there is one-way communication. Development managers, etc. I

      Next Step: Similarly define the RACI for each stage of the IT operating model; refer to the activity slide for prompts.

      Best practices on the role of EA within the IT operating model

      Plan

      Strategy Development

      C

      Business Planning

      C

      Conceptualization

      A

      Portfolio Management

      C

      Build

      Requirements

      C

      Solution Design

      R

      Application Development/ Procurement

      R

      Quality Assurance

      I

      Run

      Deploy

      I

      Operate

      I

      Next Step: Define the role of EA in each stage of the IT operating model; refer to the activity slide for prompts.

      Define EA’s target role in each step of the IT operating model

      3.2 2 hrs

      Input

      • Organization’s IT operating model.

      Output

      • Organization’s EA engagement model.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business leaders, IT department leaders.

      The image shows the Table of Contents for the EA Engagement Model Template with the EA Engagement Summary section highlighted.

      Step 1 - Facilitate

      Download the EA Engagement Model Template and hold a working session to define EA’s target role in each step of the IT operating model.

      Download the EA Engagement Model Template

      Step 2 - Summarize

      Document the target state role of EA within the EA Governance Framework document.

      Update the EA Governance Framework Template


      Design an EA engagement model to formalize EA’s role within the IT operating model

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 had a high IT cost structure with looming technology debt due to a preference for short-term tactical gains over long-term solutions.

      The business satisfaction with IT was at an all-time low due to expensive solutions that did not meet business needs.

      INSPRO01’s technology landscape was in disarray with many overlapping systems and interoperability issues.

      Complication

      No single team within the organization had an end-to-end perspective all the way from strategy to project execution. A lot of information was being lost in handoffs between different teams.

      This led to inconsistent design/solution patterns being applied. Investment decisions had not been grounded in reality and this often led to cost overruns.

      Result

      Info-Tech helped INSPRO01 identify opportunities for EA team engagement at different stages of the IT operating model. EA’s role within each stage was clearly defined and documented.

      With Info-Tech’s help, the EA team successfully made the case for engagement upfront during strategy development rather than during project execution.

      The increased transparency enabled the EA team to ensure that investments were aligned to organizational strategic goals and objectives.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Build the case for EA engagement.
      • Identify engagement touchpoints within the IT operating model.

      Outcomes

      • Summary of the assessment of the current EA engagement model
      • Target EA engagement model

      Phase 4

      EA Governing Bodies

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Governing Bodies

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Identify the number of governing bodies
      • Define the game plan to initialize the governing bodies
      • Define the architecture review process

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Charter definition for each EA governance board

      Info-Tech Insight

      Use architecture governance like a scalpel rather than a hatchet. Implement governing bodies to provide guidance rather than act as a police force.

      Phase 4 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Create or identify EA governing bodies

      Proposed Time to Completion: 2 weeks

      Step 4.1: Identify architecture boards and develop charters

      Start with an analyst kick-off call:

      • Understand the factors influencing the number of governing bodies required for an organization.
      • Understand the components of a governing body charter.

      Then complete these activities…

      • Identify how many governing bodies are needed.
      • Define EA governing body composition, meeting frequency, and domain of coverage.
      • Define the inputs and outputs of each EA governing body.
      • Identify mandatory inclusion criteria.

      With these tools & templates:

      • Architecture Board Charter Template

      Step 4.2: Develop an architecture review process

      Follow-up with an analyst call:

      • Review the number of boards identified for your organization and gather feedback.
      • Review the charters developed for each governing body and gather feedback.
      • Understand the various factors that impact the architecture review process.
      • Review Info-Tech’s best-practice architecture review process.

      Then complete these activities…

      • Refine the charters for governing bodies.
      • Develop the architecture review process for your organization.

      With these tools & templates:

      • Architecture Review Process Template

      Factors that determine the number of architectural boards required

      The primary purpose of architecture boards is to ensure that business benefits are maximized and solution design is within the options set forth by the architectural reference models without introducing additional layers of bureaucracy.

      The optimal number of architecture boards required in an organization is a function of the following factors:

      • EA organization model
        • Distributed
        • Federated
        • Centralized
      • Architecture domains Maturity of architecture domains
      • Project throughput

      Commonly observed architecture boards:

      • Architecture Review Board
      • Technical Architecture Committee
      • Data Architecture Review Board
      • Infrastructure Architecture Review Board
      • Security Architecture Review Board

      Info-Tech Insight

      Before building out a new governance board, start small by repurposing existing forums by adding architecture as an agenda item. As the items for review increase consider introducing dedicated governing bodies.

      EA organization model drives the architecture governance structure

      EA teams can be organized in three ways – distributed, federated, and centralized. Each model has its own strengths and weaknesses. EA governance must be structured in a way such that the strengths are harvested and the weaknesses are mitigated.

      Distributed Federated Centralized
      EA org. structure
      • No overarching EA team exists and segment architects report to line of business (LOB) executives.
      • A centralized EA team exists with segment architects reporting to LOB executives and dotted-line to head of (centralized) EA.
      • A centralized EA capability exists with enterprise architects reporting to the head of EA.
      Implications
      • Produces a fragmented and disjointed collection of architectures.
      • Economies of scale are not realized.
      • High cross-silo integration effort.
      • LOB-specific approach to EA.
      • Requires dual reporting relationships.
      • Additional effort is required to coordinate centralized EA policies and blueprints with segment EA policies and blueprints.
      • Accountabilities may be unclear.
      • Can be less responsive to individual LOB needs, because the centralized EA capability must analyze needs of multiple LOBs and various trade-off options to avoid specialized, one-off solutions.
      • May impede innovation.
      Architectural boards
      • Cross LOB working groups to create architecture standards, patterns, and common services.
      • Local boards to support responsiveness to LOB-specific needs.
      • Cross LOB working groups to create architecture standards, patterns and common services.
      • Cross-enterprise boards to ensure adherence to enterprise standards and reduce integration costs.
      • Local boards to support responsiveness to LOB specific needs.
      • Enterprise working groups to create architecture standards, patterns, and all services.
      • Central board to ensure adherence to enterprise standards.

      Architecture domains influences the number of architecture boards required

      • An architecture review board (ARB) provides direction for domain-specific boards and acts as an escalation point. The ARB must have the right mix of both business and technology stakeholders.
      • Domain-specific boards provide a platform to have focused discussions on items specific to that domain.
      • Based on project throughput and the maturity of each domain, organizations would have to pick the optimal number of boards.
      • Architecture working groups provide a platform for cross-domain conversations to establish organization wide standards.
      Level 1 Architecture Review Board IT and Business Leaders
      Level 2 Business Architecture Board Data Architecture Board Application Architecture Board Infrastructure Architecture Board Security Architecture Board IT and Business Managers
      Level 3 Architecture Working Groups Architects

      Create a game plan for the architecture boards

      • Start with a single board for each level – an architecture review board (ARB), a technical architecture committee (TAC), and architecture working groups.
      • As the organization matures and the number of requests to the TAC increase, consider creating domain-specific boards – such as business architecture, data architecture, application architecture, etc. – to handle architecture decisions pertaining to that domain.

      Start with this:

      Level 1 Architecture Review Board
      Level 2 Technical Architecture Committee
      Level 3 Architecture Working Groups

      Change to this:

      Architecture Review Board IT and Business Leaders
      Business Architecture Board Data Architecture Board Application Architecture Board Infrastructure Architecture Board Security Architecture Board IT and Business Managers
      Architecture Working Groups Architects

      Architecture boards have different objectives and activities

      The boards at each level should be set up with the correct agenda – ensure that the boards’ composition and activities reflect their objective. Use the entry criteria to communicate the agenda for their meetings.

      Architecture Review Board Technical Architecture Committee
      Objective
      • Evaluates business strategy, needs, and priorities, sets direction and acts as a decision making authority of the EA capability.
      • Directs the development of target state architecture.
      • Monitors performance and compliance of the architectural standards.
      • Monitor project solution architecture compliance to standards, regulations, EA principles, and target state EA blueprints.
      • Review EA compliance waiver requests, make recommendations, and escalate to the architecture review board (ARB).
      Composition
      • Business Leadership
      • IT Leadership
      • Head of Enterprise Architecture
      • Business Managers
      • IT Managers
      • Architects
      Activities
      • Review compliance of conceptual solution to standards.
      • Discuss the enterprise implications of the proposed solution.
      • Select and approve vendors.
      • Review detailed solution design.
      • Discuss the risks of the proposed solution.
      • Discuss the cost of the proposed solution.
      • Review and recommend vendors.
      Entry Criteria
      • Changes to IT Enterprise Technology Policy.
      • Changes to the technology management plan.
      • Approve changes to enterprise technology inventory/portfolio.
      • Ongoing operational cost impacts.
      • Detailed estimates for the solution are ready for review.
      • There are significant changes to protocols or technologies responsible for solution.
      • When the project is deviating from baselined architectures.

      Identify the number of governing bodies

      4.1 2 hrs

      Input

      • EA Vision and Mission
      • EA Engagement Model

      Output

      • A list of EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      Instructions:

      Hold a working session with the participants to identify the number of governing bodies. Facilitate the activity using the following steps:

      1. Examine the EA organization models mentioned previously. Assess how your organization is structured, and identify whether your organization has a federated, distributed or centralized EA organization model.
      2. Reference the “Game plan for the architecture boards” slide. Assess the architecture domains, and define how many there are in the organization.
      3. Architecture domains:
        1. If no defined architecture domains exist, model the number of governing bodies in the organization based on the “Start with this” scenario in the “Game plan for the architecture boards” slide.
        2. If defined architecture domains do exist, model the number of governing bodies based on the “Change to this” scenario in the “Game plan for the architecture boards” slide.
      4. Name each governing body you have defined in the previous step. Download Info-Tech’s Architecture Board Charter Template for each domain you have named. Input the names into the title of each downloaded template.

      Download the Architecture Board Charter Template to document this activity.

      Defining the governing body charter

      The charter represents the agreement between the governing body and its stakeholders about the value proposition and obligations to the organization.

      1. Purpose: The reason for the existence of the governing body and its goals and objectives.
      2. Composition: The members who make up the committee and their roles and responsibilities in it.
      3. Frequency of meetings: The frequency at which the committee gathers to discuss items and make decisions.
      4. Entry/Exit Criteria: The criteria by which the committee selects items for review and items for which decisions can be taken.
      5. Inputs: Materials that are provided as inputs for review and decision making by the committee.
      6. Outputs: Materials that are provided by the committee after an item has been reviewed and the decision made.
      7. Activities: Actions undertaken by the committee to arrive at its decision.

      Define EA’s target role in each step of the IT operating model

      4.2 3 hrs

      Input

      • A list of all identified EA governing bodies.

      Output

      • Charters for each EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents for the EA Governance Framework document, with the Architecture Board Charters highlighted.

      Step 1 Facilitate

      Hold a working session with the stakeholders to define the charter for each of the identified architecture boards.

      Download Architecture Board Charter Template

      Step 2 Summarize

      • Summarize the objectives of each board and reference the charter document within the EA Governance Framework.
      • Upload the final charter document to the team’s common repository.

      Update the EA Governance Framework document


      Considerations when creating an architecture review process

      • Ensure that architecture review happens at major milestones within the organization’s IT Operating Model such as the plan, build, and run phases.
      • In order to provide continuous engagement, make the EA group accountable for solution architecture in the plan phase. In the build phase, the EA group will be consulted while the solution architect will be responsible for the project solution architecture.

      Plan

      • Strategy Development
      • Business Planning
      • A - Conceptualization
      • Portfolio Management

      Build

      • Requirements
      • R - Solution Design
      • Application Development/ Procurement
      • Quality Assurance

      Run

      • Deploy
      • Operate

      Best-practice project architecture review process

      The best-practice model presented facilitates the creation of sound solution architecture through continuous engagement with the EA team and well-defined governance checkpoints.

      The image shows a graphic of the best-practice model. At the left, four categories are listed: Committees; EA; Project Team; LOB. At the top, three categories are listed: Plan; Build; Run. Within the area between these categories is a flow chart demonstrating the best-practice model and specific checkpoints throughout.

      Develop the architecture review process

      4.3 2 hours

      Input

      • A list of all EA governing bodies.
      • Info-Tech’s best practice architecture review process.

      Output

      • The new architecture review process.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      Hold a working session with the participants to develop the architecture review process. Facilitate the activity using the following steps:

      1. Reference Info-Tech’s best-practice architecture review process embedded within the “Architecture Review Process Template” to gain an understanding of an ideal architecture review process.
      2. Identify the stages within the plan, build, and run phases where solution architecture reviews should occur, and identify the governing bodies involved in these reviews.
      3. As you go through these stages, record your findings in the Architecture Review Process Template.
      4. Connect the various activities leading to and from the architecture creation points to outline the review process.

      Download the Architecture Review Process Template for additional guidance regarding developing an architecture review process.

      Develop the architecture review process

      4.3 2 hrs

      Input

      • A list of all identified EA governing bodies.

      Output

      • Charters for each EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents, with the Architecture Review Process highlighted.

      Step 1 - Facilitate

      Download Architecture Review Process Template and facilitate a session to customize the best-practice model presented in the template.

      Download the Architecture Review Process Template

      Step 2 - Summarize

      Summarize the process changes and document the process flow in the EA Governance Framework document.

      Update the EA Governance Framework Template

      Right-size EA governing bodies to reduce the perception of red tape

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      At INSPRO01, architecture governance boards were a bottleneck. The boards fielded all project requests, ranging from simple screen label changes to complex initiatives spanning multiple applications.

      These boards were designed as forums for technology discussions without any business stakeholder involvement.

      Complication

      INSPRO01’s management never gave buy-in to the architecture governance boards since their value was uncertain.

      Additionally, architectural reviews were perceived as an item to be checked off rather than a forum for getting feedback.

      Architectural exceptions were not being followed through due to the lack of a dispensation process.

      Result

      Info-Tech has helped the team define adaptable inclusion/exclusion criteria (based on project complexity) for each of the architectural governing boards.

      The EA team was able to make the case for business participation in the architecture forums to better align business and technology investment.

      An architecture dispensation process was created and operationalized. As a result architecture reviews became more transparent with well-defined next steps.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Identify the number of governing bodies.
      • Define the game plan to initialize the governing bodies.
      • Define the architecture review process.

      Outcomes

      • Charter definition for each EA governance board

      Phase 5

      EA Policy

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Policy

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Define the EA policy scope
      • Identify the target audience
      • Determine the inclusion and exclusion criteria
      • Create an assessment checklist

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • The completed EA policy
      • Project assessment checklist
      • Defined assessment outcomes
      • Completed compliance waiver process

      Info-Tech Insight

      Use the EA policy to promote EA’s commitment to deliver value to business stakeholders through process transparency, stakeholder engagement, and compliance.

      Phase 5 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 5: EA Policy

      Proposed Time to Completion: 3 weeks

      Step 5.1–5.3: EA Policy, Assessment Checklists, and Decision Types

      Start with an analyst kick-off call:

      • Discuss the three pillars of EA policy and its purpose.
      • Review the components of an effective EA policy.
      • Understand how to develop architecture assessment checklists.
      • Understand the assessment decision types.

      Then complete these activities…

      • Define purpose, scope, and audience of the EA policy.
      • Create a project assessment checklist.
      • Define the organization’s assessment decision type.

      With these tools & templates:

      • EA Policy Template
      • EA Assessment Checklist Template

      Step 5.4: Compliance Waivers

      Review findings with analyst:

      • Review your draft EA policy and gather feedback.
      • Review your project assessment checklists and the assessment decision types.
      • Discuss the best-practice architecture compliance waiver process and how to tailor it to your organizational needs.

      Then complete these activities…

      • Refine the EA policy based on feedback gathered.
      • Create the compliance waiver process.

      With these tools & templates:

      • EA Compliance Waiver Process Template
      • EA Compliance Waiver Form Template

      Three pillars of architecture policy

      Architecture policy is a set of guidelines, formulated and enforced by the governing bodies of an organization, to guide and constrain architectural choices in pursuit of strategic goals.

      Architecture compliance – promotes compliance to organizational standards through well-defined assessment checklists across architectural domains.

      Business value – ensures that investments are tied to business value by enforcing traceability to business capabilities.

      Architectural guidance – provides guidance to architecture practitioners on the application of the business and technology standards.

      Components of EA policy

      An enterprise architecture policy is an actionable document that can be applied to projects of varying complexity across the organization.

      1. Purpose and Scope: This EA policy document clearly defines the scope and the objectives of architecture reviews within an organization.
      2. Target Audience: The intended audience of the policy such as employees and partners.
      3. Architecture Assessment Checklist: A wide range of typical questions that may be used in conducting Architecture Compliance reviews, relating to various aspects of the architecture.
      4. Assessment Outcomes: The outcome of the architecture review process that determines the conformance of a project solution to the enterprise architecture standards.
      5. Compliance Waiver: Used when a solution or segment architecture is perceived to be non-compliant with the enterprise architecture.

      Draft the purpose and scope of the EA policy

      5.1 2.5 hrs

      Input

      • A consensus on the purpose, scope, and audience for the EA policy.

      Output

      • Documented version of the purpose, scope, and audience for the EA policy.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Policy section highlighted.

      Step 1 - Facilitate

      Download the EA Policy Template and hold a working session to draft the EA policy.

      Download the EA Policy Template

      Step 2 - Summarize

      • Summarize purpose, scope, and intended audience of the policy in the EA Governance Framework document.
      • Update the EA policy document with the purpose, scope and intended audience.

      Update the EA Governance Framework Template

      Architecture assessment checklist

      Architecture assessment checklist is a list of future-looking criteria that a project will be assessed against. It provides a set of standards against which projects can be assessed in order to render a decision on whether or not the project can be greenlighted.

      Architecture checklists should be created for each EA domain since each domain provides guidance on specific aspects of the project.

      Sample Checklist Questions

      Business Architecture:

      • Is the project aligned to organizational strategic goals and objectives?
      • What are the business capabilities that the project supports? Is it creating new capabilities or supporting an existing one?

      Data Architecture:

      • What processes are in place to support data referential integrity and/or normalization?
      • What is the physical data model definition (derived from logical data models) used to design the database?

      Application Architecture:

      • Can this application be placed on an application server independent of all other applications? If not, explain the dependencies.
      • Can additional parallel application servers be easily added? If so, what is the load balancing mechanism?

      Infrastructure Architecture:

      • Does the solution provide high-availability and fault-tolerance that can recover from events within a datacenter?

      Security Architecture:

      • Have you ensured that the corporate security policies and guidelines to which you are designing are the latest versions?

      Create architectural assessment checklists

      5.2 2 hrs

      Input

      • Reference architecture models.

      Output

      • Architecture assessment checklist.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Assessment Checklist section highlighted.

      Step 1 - Facilitate

      Download the EA Assessment Checklist Template and hold a working session to create the architectural assessment checklists.

      Download the EA Assessment Checklist Template

      Step 2 - Summarize

      • Summarize the major points of the checklists in the EA Governance Framework document.
      • Update the EA policy document with the detailed architecture assessment checklists.

      Update the EA Governance Framework Template

      Architecture assessment decision types

      • As a part of the proposed solution review, the governing bodies produce a decision indicating the compliance of the solution architecture with the enterprise standards.
      • Go, No Go, or Conditional are a sample set of decision outcomes available to the governing bodies.
      • On a conditional approval, the project team must file for a compliance waiver.

      Approved

      • The solution demonstrates substantial compliance with standards.
      • Negligible risk to the organization or minimal risks with sound plans of how to mitigate them.
      • Architectural approval to proceed with delivery type of work.

      Conditional Approval

      • The significant aspects of the solution have been addressed in a satisfactory manner.
      • Yet, there are some aspects of the solution that are not compliant with standards.
      • The architectural approval is conditional upon presenting the missing evidence within a minimal period of time determined.
      • The risk level may be acceptable to the organization from an overall IT governance perspective.

      Not Approved

      • The solution is not compliant with the standards.
      • Scheduled for a follow-up review.
      • Not recommended to proceed until the solution is more compliant with the standards.

      Best-practice architecture compliance waiver process

      Waivers are not permanent. Waiver terms must be documented for each waiver specifying:

      • Time period after which the architecture in question will be compliant with the enterprise architecture.
      • The modifications necessary to the enterprise architecture to accommodate the solution.

      The image shows a flow chart, split into 4 sections: Enterprise Architect; Solution Architect; TAC; ARB. To the right of these section labels, there is a flow chart that documents the waiver process.

      Create compliance waiver process

      5.4 3-4 hrs

      Input

      • A consensus on the compliance waiver process.

      Output

      • Documented compliance waiver process and form.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents with the Compliance Waiver Form section highlighted.

      Step 1 - Facilitate

      Download the EA compliance waiver template and hold a working session to customize the best-practice process to your organization’s needs.

      Download the EA Compliance Waiver Process Template

      Step 2 - Summarize

      • Summarize the objectives and high-level process in the EA Governance Framework document.
      • Update the EA policy document with the compliance waiver process.
      • Upload the final policy document to the team’s common repository.

      Update the EA Governance Framework Template

      Creates an enterprise architecture policy to drive adoption

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      EA program adoption across INSPRO01 was at its lowest point due to a lack of transparency into the activities performed by the EA group.

      Often, projects ignored EA entirely as it was viewed as a nebulous and non-value-added activity that produced no measurable results.

      Complication

      There was very little documented information about the architecture assessment process and the standards against which project solution architectures were evaluated.

      Additionally, there were no well-defined outcomes for the assessment.

      Project groups were left speculating about the next steps and with little guidance on what to do after completing an assessment.

      Result

      Info-Tech helped the EA team create an EA policy containing architecture significance criteria, assessment checklists, and reference to the architecture review process.

      Additionally, the team also identified guidelines and detailed next steps for projects based on the outcome of the architecture assessment.

      These actions brought clarity to EA processes and fostered better engagement with the EA group.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Define the scope.
      • Identify the target audience.
      • Determine the inclusion and exclusion criteria.
      • Create an assessment checklist.

      Outcomes

      • The completed EA policy
      • Project assessment checklist
      • Defined assessment outcomes
      • Completed compliance waiver process

      Phase 6

      Architectural Standards

      Create a Right-Sized Enterprise Architecture Governance Framework

      Architectural Standards

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Identify and standardize EA work products
      • Classify the architectural standards
      • Identify the custodian of standards
      • Update the standards

      This step involves the following participants:

      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • A standardized set of EA work products
      • A way to categorize and store EA work products
      • A defined method of updating standards

      Info-Tech Insight

      The architecture standard is the currency that facilitates information exchange between stakeholders. The primary purpose is to minimize transaction costs by providing a balance between stability and relevancy.

      Phase 6 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 6: Architectural standards

      Proposed Time to Completion: 4 weeks

      Step 6.1: Understand Architectural Standards

      Start with an analyst kick-off call:

      • Discuss architectural standards.
      • Know how to identify and define EA work products.
      • Understand the standard content of work products.

      Then complete these activities…

      • Identify and standardize EA work products.

      Step 6.2–6.3: EA Repository and Updating the Standards

      Review with analyst:

      • Review the standardized EA work products.
      • Discuss the principles of EA repository.
      • Discuss the Info-Tech best-practice model for updating architecture standards and how to tailor them to your organizational context.

      Then complete these activities…

      • Build a folder structure for storing EA work products.
      • Use the Info-Tech best-practice architecture standards update process to develop your organization’s process for updating architecture standards.

      With these tools & templates:

      • Architecture Standards Update Process Template

      Recommended list of EA work products to standardize

      • EA work products listed below are typically produced as a part of the architecture lifecycle.
      • To ensure consistent development of architecture, the work products need to be standardized.
      • Consider standardizing both the naming conventions and the content of the work products.
      1. EA vision: A document containing the vision that provides the high-level aspiration of the capabilities and business value that EA will deliver.
      2. Statement of EA Work: The Statement of Architecture Work defines the scope and approach that will be used to complete an architecture project.
      3. Reference architectures: A reference architecture is a set of best-practice taxonomy that describes components and the conceptual structure of the model, as well as graphics, which provide a visual representation of the taxonomy to aid understanding. Reference architectures are created for each of the architecture domains.
      4. Solution proposal: The proposed project solution based on the EA guidelines and standards.
      5. Compliance assessment request: The document that contains the project solution architecture assessment details.
      6. Architecture change request: The request that initiates a change to architecture standards when existing standards can no longer meet the needs of the enterprise.
      7. Transition architecture: A transition architecture shows the enterprise at incremental states that reflect periods of transition that sit between the baseline and target architectures.
      8. Architectural roadmap: A roadmap that lists individual increments of change and lays them out on a timeline to show progression from the baseline architecture to the target architecture.
      9. EA compliance waiver request: A compliance waiver request that must be made when a solution or segment architecture is perceived to be non-compliant with the enterprise architecture.

      Standardize the content of each work product

      1. Purpose - The reason for the existence of the work product.
      2. Owner - The owner of this EA work product.
      3. Target Audience - The intended audience of the work product such as employees and partners.
      4. Naming Pattern - The pattern for the name of the work product as well as its file name.
      5. Table of Contents - The various sections of the work product.
      6. Review & Sign-Off Authority - The stakeholders who will review the work product and approve it.
      7. Repository Folder Location - The location where the work product will be stored.

      Identify and standardize work products

      6.1 3 hrs

      Input

      • List of various documents being produced by projects currently.

      Output

      • Standardized list of work products.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • A computer, and/or a whiteboard and marker.

      Instructions:

      Hold a working session with the participants to identify and standardize work products. Facilitate the activity using the steps below.

      1. Identifying EA work products:
        1. Start by reviewing the list of all architecture-related documents presently produced in the organization. Any such deliverable with the following characteristics can be standardized:
          1. If it can be broken out and made into a standalone document.
          2. If it can be made into a fill-in form completed by others.
          3. If it is repetitive and requires iterative changes.
        2. Create a list of work products that your organization would like to standardize based on the characteristics above.
      2. The content and format of standardized EA work products:
        1. For each work product your organization wishes to standardize, look at its purpose and brainstorm the content needed to fulfill that purpose.
        2. After identifying the elements that need to be included in the work product to fulfill its purpose, order them logically for presentation purposes.
        3. In each section of the work product that need to be completed, include instructions on how to complete the section.
        4. Review the seven elements presented in the previous slide and include them in the work products.

      EA repository - information taxonomy

      As the EA function begins to grow and accumulates EA work products, having a well-designed folder structure helps you find the necessary information efficiently.

      Architecture meta-model

      Describes the organizationally tailored architecture framework.

      Architecture capability

      Defines the parameters, structures, and processes that support the enterprise architecture group.

      Architecture landscape

      An architectural presentation of assets in use by the enterprise at particular points in time.

      Standards information base

      Captures the standards with which new architectures and deployed services must comply.

      Reference library

      Provides guidelines, templates, patterns, and other forms of reference material to accelerate the creation of new architectures for the enterprise.

      Governance log

      Provides a record of governance activity across the enterprise.

      Create repository folder structure

      6.2 5-6 hrs

      Input

      • List of standardized work products.

      Output

      • EA work products mapped to a repository folder.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, IT department leads.

      Instructions:

      Hold a working session with the participants to create a repository structure. Facilitate the activity using the steps below:

      1. Start with the taxonomy on the previous slide, and sort the existing work products into these six categories.
      2. Assess that the work products are sorted in a mutually exclusive and collectively exhaustive fashion. This means that a certain work product that appears in one category should not appear in another category. As well, make sure these six categories capture all the existing work products.
      3. Based on the categorization of the work products, build a folder structure that follows these categories, which will allow for the work products to be accessed quickly and easily.

      Create a process to update EA work products

      • Architectural standards are not set in stone and should be reviewed and updated periodically.
      • The Architecture Review Board is the custodian for standards.
      • Any change to the standards need to be assessed thoroughly and must be communicated to all the impacted stakeholders.

      Architectural standards update process

      Identify

      • Identify changes to the standards

      Assess

      • Review and assess the impacts of the change

      Document

      • Document the change and update the standard

      Approve

      • Distribute the updated standards to key stakeholders for approval

      Communicate

      • Communicate the approved changes to impacted stakeholders

      Create a process to continually update standards

      6.3 1.5 hrs

      Input

      • The list of work products and its owners.

      Output

      • A documented work product update process.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the screenshot of the Table of Contents with the Standards Update Process highlighted.

      Step 1 - Facilitate

      Download the standards update process template and hold a working session to customize the best practice process to your organization’s needs.

      Download the Architecture Standards Update Process Template

      Step 2 - Summarize

      Summarize the objectives and the process flow in the EA governance framework document.

      Update the EA Governance Framework Template

      Create architectural standards to minimize transaction costs

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 didn’t maintain any centralized standards and each project had its own solution/design work products based on the preference of the architect on the project. This led to multiple standards across the organization.

      Lack of consistency in architectural deliverables made the information hand-offs expensive.

      Complication

      INSPRO01 didn’t maintain the architectural documents in a central repository and the information was scattered across multiple project folders.

      This caused key stakeholders to make decisions based on incomplete information and resulted in constant revisions as new information became available.

      Result

      Info-Tech recommended that the EA team identify and standardize the various EA work products so that information was collected in a consistent manner across the organization.

      The team also recommended an information taxonomy to store the architectural deliverables and other collateral.

      This resulted in increased consistency and standardization leading to efficiency gains.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Identify and standardize EA work products.
      • Classify the architectural standards.
      • Identify the custodian of standards.
      • Update the standards.

      Outcomes

      • A standardized set of EA work products
      • A way to categorize and store EA work products
      • A defined method of updating standards

      Phase 7

      Communication Plan

      Create a Right-Sized Enterprise Architecture Governance Framework

      Communication Plan

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • List the changes identified in the EA governance initiative
      • Identify stakeholders
      • Create a communication plan

      This step involves the following participants:

      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Communication Plan
      • EA Governance Framework

      Info-Tech Insight

      By failing to prepare, you are preparing to fail – maximize the likelihood of success for EA governance by engaging the relevant stakeholders and communicating the changes.

      Phase 7 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 6: Operationalize the EA governance framework

      Proposed Time to Completion: 1 week

      Step 7.1: Create a Communication Plan

      Start with an analyst kick-off call:

      • Discuss how to communicate changes to stakeholders.
      • Discuss the purposes and benefits of the EA governance framework.

      Then complete these activities…

      • Identify the stakeholders affected by the EA governance transformations.
      • List the benefits of the proposed EA governance initiative.
      • Create a plan to communicate the changes to impacted stakeholders.

      With these tools & templates:

      • EA Governance Communication Plan Template
      • EA Governance Framework Template

      Step 7.2: Review the Communication Plan

      Start with an analyst kick-off call:

      • Review the communication plan and gather feedback on the proposed stakeholders.
      • Confer about the various methods of communicating change in an organization.
      • Discuss the uses of the EA Governance Framework.

      Then complete these activities…

      • Refine your communication plan and use it to engage with stakeholders to better serve customers.
      • Create the EA Governance Framework to accompany the communication plan in engaging stakeholders to better understand the value of EA.

      With these tools & templates:

      • EA Governance Communication Plan Template
      • EA Governance Framework Template

      Communicate changes to stakeholders

      The changes made to the EA governance components need to be reviewed, approved, and communicated to all of the impacted stakeholders.

      Deliverables to be reviewed:

      • Fundamentals
        • Vision and Mission
        • Goals and Measures
        • Principles
      • Architecture review process
      • Assessment checklists
      • Policy Governing body charters
      • Architectural standards

      Deliverable Review Process:

      Step 1: Hold a meeting with stakeholders to review, refine, and agree on the changes.

      Step 2: Obtain an official approval from the stakeholders.

      Step 3: Communicate the changes to the impacted stakeholders.

      Communicate the changes by creating an EA governance framework and communication plan

      7.1 3 hrs

      Input

      • EA governance deliverables.

      Output

      • EA Governance Framework
      • Communication Plan.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      Instructions:

      Hold a working session with the participants to create the EA governance framework as well as the communication plan. Facilitate the activity using the steps below:

      1. EA Governance Framework:
        1. The EA Governance Framework is a document that will help reference and cite all the materials created from this blueprint. Follow the instructions on the framework to complete.
      2. Communication Plan:
        1. Identify the stakeholders based on the EA governance deliverables.
        2. For each stakeholder identified, complete the “Communication Matrix” section in the EA Governance Communication Plan Template. Fill out the section based on the instructions in the template.
        3. As the stakeholders are identified based on the “Communication Matrix,” use the EA Governance Framework document to communicate the changes.

      Download the EA Governance Communication Plan Template and EA Governance Framework Template for additional instructions and to document your activities in this phase.

      Maximize the likelihood of success by communicating changes

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      The EA group followed Info-Tech’s methodology to assess the current state and has identified areas for improvement.

      Best practices were adopted to fill the gaps identified.

      The team planned to communicate the changes to the technology leadership team and get approvals.

      As the EA team tried to roll out changes, they encountered resistance from various IT teams.

      Complication

      The team was not sure of how to communicate the changes to the business stakeholders.

      Result

      Info-Tech has helped the team conduct a thorough stakeholder analysis to identify all the stakeholders who would be impacted by the changes to the architecture governance framework.

      A comprehensive communication plan was developed that leveraged traditional email blasts, town hall meetings, and non-traditional methods such as team blogs.

      The team executed the communication plan and was able to manage the change effectively.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • List the changes identified in the EA governance initiative.
      • Identify stakeholders.
      • Create a communication plan.
      • Compile the materials created in the blueprint to better communicate the value of EA governance.

      Outcomes

      • Communication plan
      • EA governance framework

      Bibliography

      Government of British Columbia. “Architecture and Standards Review Board.” Government of British Columbia. 2015. Web. Jan 2016. < http://www.cio.gov.bc.ca/cio/standards/asrb.page >

      Hopkins, Brian. “The Essential EA Toolkit Part 3 – An Architecture Governance Process.” Cio.com. Oct 2010. Web. April 2016. < http://www.cio.com/article/2372450/enterprise-architecture/the-essential-ea-toolkit-part-3---an-architecture-governance-process.html >

      Kantor, Bill. “How to Design a Successful RACI Project Plan.” CIO.com. May 2012. Web. Jan 2016. < http://www.cio.com/article/2395825/project-management/how-to-design-a-successful-raci-project-plan.html >

      Sapient. “MIT Enterprise Architecture Guide.” Sapient. Sep 2004. Web. Jan 2016. < http://web.mit.edu/itag/eag/FullEnterpriseArchitectureGuide0.1.pdf >

      TOGAF. “Chapter 41: Architecture Repository.” The Open Group. 2011. Web. Jan 2016. < http://pubs.opengroup.org/architecture/togaf9-doc/arch/chap41.html >

      TOGAF. “Chapter 48: Architecture Compliance.” The Open Group. 2011. Web. Jan 2016. < http://pubs.opengroup.org/architecture/togaf9-doc/arch/chap48.html >

      TOGAF. “Version 9.1.” The Open Group. 2011. Web. Jan 2016. http://pubs.opengroup.org/architecture/togaf9-doc/arch/

      United States Secret Service. “Enterprise Architecture Review Board.” United States Secret Service. Web. Jan 2016. < http://www.archives.gov/records-mgmt/toolkit/pdf/ID191.pdf >

      Virginia Information Technologies Agency. “Enterprise Architecture Policy.” Commonwealth of Virginia. Jul 2006. Web. Jan 2016. < https://www.vita.virginia.gov/uploadedfiles/vita_main_public/library/eapolicy200-00.pdf >

      Research contributors and experts

      Alan Mitchell, Senior Manager, Global Cities Centre of Excellence, KPMG

      Alan Mitchell has held numerous consulting positions before his role in Global Cities Centre of Excellence for KPMG. As a Consultant, he has had over 10 years of experience working with enterprise architecture related engagements. Further, he worked extensively with the public sector and prides himself on his knowledge of governance and how governance can generate value for an organization.

      Ian Gilmour, Associate Partner, EA advisory services, KPMG

      Ian Gilmour is the global lead for KPMG’s enterprise architecture method and Chief Architect for the KPMG Enterprise Reference Architecture for Health and Human Services. He has over 20 years of business design experience using enterprise architecture techniques. The key service areas that Ian focuses on are business architecture, IT-enabled business transformation, application portfolio rationalization, and the development of an enterprise architecture capability within client organizations.

      Djamel Djemaoun Hamidson, Senior Enterprise Architect, CBC/Radio-Canada

      Djamel Djemaoun is the Senior Enterprise Architect for CBC/Radio-Canada. He has over 15 years of Enterprise Architecture experience. Djamel’s areas of special include service-oriented architecture, enterprise architecture integration, business process management, business analytics, data modeling and analysis, and security and risk management.

      Sterling Bjorndahl, Director of Operations, eHealth Saskatchewan

      Sterling Bjorndahl is now the Action CIO for the Sun Country Regional Health Authority, and also assisting eHealth Saskatchewan grow its customer relationship management program. Sterling’s areas of expertise include IT strategy, enterprise architecture, ITIL, and business process management. He serves as the Chair on the Board of Directors for Gardiner Park Child Care.

      Huw Morgan, IT Research Executive, Enterprise Architect

      Huw Morgan has 10+ years experience as a Vice President or Chief Technology Officer in Canadian internet companies. As well, he possesses 20+ years experience in general IT management. Huw’s areas of expertise include enterprise architecture, integration, e-commerce, and business intelligence.

      Serge Parisien, Manager, Enterprise Architecture at Canada Mortgage Housing Corporation

      Serge Parisien is a seasoned IT leader with over 25 years of experience in the field of information technology governance and systems development in both the private and public sectors. His areas of expertise include enterprise architecture, strategy, and project management.

      Alex Coleman, Chief Information Officer at Saskatchewan Workers’ Compensation Board

      Alex Coleman is a strategic, innovative, and results-driven business leader with a proven track record of 20+ years’ experience planning, developing, and implementing global business and technology solutions across multiple industries in the private, public, and not-for-profit sectors. Alex’s expertise includes program management, integration, and project management.

      L.C. (Skip) Lumley , Student of Enterprise and Business Architecture

      Skip Lumley was formerly a Senior Principle at KPMG Canada. He is now post-career and spends his time helping move enterprise business architecture practices forward. His areas of expertise include enterprise architecture program implementation and public sector enterprise architecture business development.

      Additional contributors

      • Tim Gangwish, Enterprise Architect at Elavon
      • Darryl Garmon, Senior Vice President at Elavon
      • Steve Ranaghan, EMEIA business engagement at Fujitsu

      Requirements Gathering

      • Buy Link or Shortcode: {j2store}49|cart{/j2store}
      • Related Products: {j2store}49|crosssells{/j2store}
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $33,901
      • member rating average days saved: 23
      • Parent Category Name: Project Portfolio Management and Projects
      • Parent Category Link: /ppm-and-projects

      The challenge

      • The number reason projects fail because from the outset, what people wanted was not clear.
      • Without proper due diligence, IT will deliver projects that fail to meet business expectations and fail to provide business value.
      • If you failed to accurately capture the needs and desires, your projects are set up for costly rework. That will hurt your business's financial performance and result in damage to your relationship with your business partners.
      • Even with requirements gathering processes in place, your business analysts may not have the required competencies to execute them.

      Our advice

      Insight

      • You need to gather requirements with your organizations' end-state in mind. That requires IT and business alignment.
      • You would be good to create a set of standard operating procedures around requirements gathering. But many companies fail to do so.
      • Bring standardization and conformity to your requirements gathering processes via a centralized center of excellence. That brings cohesion and uniformity to your practice.
      • It is critical that your business analysts have the necessary competencies to execute your processes and that they ask the right questions.

      Impact and results 

      • Better requirements analysis will result in shorter cycle timed and reduced project rework and overhead.
      • You will enjoy better relationships with your business partners, greater stakeholder satisfaction, and gradually a better standing of IT.
      • Most importantly, the applications and systems you deliver will contain all must-haves and some nice-to-haves. Your minimal viable deliverable will start to create business value immediately.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand why you should invest in optimizing requirements gathering in your company. We show you how we can support you.

      Build the target state

      Fully understand the target needs of the requirements gathering process.

      • Build a Strong Approach to Business Requirements Gathering – Phase 1: Build the Target State for the Requirements Gathering Process (ppt)
      • Requirements Gathering SOP and BA Playbook (doc)
      • Requirements Gathering Maturity Assessment (xls)
      • Project Level Selection Tool (xls)
      • Business Requirements Analyst (doc)
      • Requirements Gathering Communication Tracking Template (xls)

      Develop best practices to gather business requirements

      • Build a Strong Approach to Business Requirements Gathering – Phase 2: Define the Elicitation Process (ppt)
      • Business Requirements Document Template (xls)
      • Scrum Documentation Template (doc)

      Analyze and validate requirements

      Standardize your frameworks for analysis and validation of the business requirements

      • Build a Strong Approach to Business Requirements Gathering – Phase 3: Analyze and Validate Requirements (ppt)
      • Requirements Gathering Documentation Tool (xls)
      • Requirements Gathering Testing Checklist (doc)

      Build your requirements gathering governance action plan

      Formalize governance.

      • Build a Strong Approach to Business Requirements Gathering – Phase 4: Create a Requirements Governance Action Plan (ppt)
      • Requirements Traceability Matrix (xls)

       

       

      Develop an IT Asset Management Strategy

      • Buy Link or Shortcode: {j2store}295|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $52,211 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management

      You have a mandate to create an accurate and actionable database of the IT assets in your environment, but:

      • The data you have is often incomplete or wrong.
      • Processes are broken or non-existent.
      • Your tools aren’t up to the task of tracking ever more hardware, software, and relevant metadata.
      • The role of stakeholders outside the core ITAM team isn’t well defined or understood.

      Our Advice

      Critical Insight

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there’s no value in data for data’s sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service providers.

      Impact and Result

      • Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.
      • Clarify the structure for the ITAM program, including scope, responsibility and accountability, centralization vs. decentralization, outsourcing vs. insourcing, and more.
      • Create a practical roadmap to guide improvement.
      • Summarize your strategy and approach using Info-Tech’s templates for review with stakeholders.

      Develop an IT Asset Management Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop an IT Asset Management Strategy – A methodology to create a business-aligned, coherent, and durable approach to ITAM.

      This two-phase, step-by-step methodology will guide you through the activities to build a business-aligned, coherent, and durable approach to ITAM. Review the executive brief at the start of the slide deck for an overview of the methodology and the value it can provide to your organization.

      • Develop an IT Asset Management Strategy – Phases 1-2

      2. ITAM Strategy Template – A presentation-ready repository for the work done as you define your ITAM approach.

      Use this template to document your IT asset management strategy and approach.

      • ITAM Strategy Template

      3. IT Asset Estimations Tracker – A rough-and-ready inventory exercise to help you evaluate the work ahead of you.

      Use this tool to estimate key data points related to your IT asset estate, as well as your confidence in your estimates.

      • IT Asset Estimations Tracker

      Infographic

      Workshop: Develop an IT Asset Management Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify ITAM Priorities & Goals, Maturity, Metrics and KPIs

      The Purpose

      Align key stakeholders to the potential strategic value of the IT asset management practice.

      Ensure the ITAM practice is focused on business-aligned goals.

      Key Benefits Achieved

      Define a business-aligned direction and expected outcomes for your ITAM program.

      Activities

      1.1 Brainstorm ITAM opportunities and challenges.

      1.2 Conduct an executive alignment working session.

      1.3 Set ITAM priorities, goals and tactics.

      1.4 Identify target and current state ITAM maturity.

      Outputs

      ITAM opportunities and challenges

      Align executive priorities with ITAM opportunities.

      ITAM metrics and KPIs

      ITAM maturity

      2 Identify Your Approach to Support ITAM Priorities and Goals

      The Purpose

      Translate goals into specific and coherent actions to enable your ITAM practice to deliver business value.

      Key Benefits Achieved

      A business-aligned approach to ITAM, encompassing scope, structure, tools, audits, budgets, documentation and more.

      A high-level roadmap to achieve your vision for the ITAM practice.

      Activities

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Outputs

      Your ITAM approach

      ITAM roadmap and communication plan

      Further reading

      Develop an IT Asset Management Strategy

      Define your business-aligned approach to ITAM.

      Table of Contents

      4 Analyst Perspective

      5 Executive Summary

      17 Phase 1: Establish Business-Aligned ITAM Goals and Priorities

      59 Phase 2: Support ITAM Goals and Priorities

      116 Bibliography

      Develop an IT Asset Management Strategy

      Define your business-aligned approach to ITAM.

      EXECUTIVE BRIEF

      Analyst Perspective

      Track hardware and software. Seems easy, right?

      It’s often taken for granted that IT can easily and accurately provide definitive answers to questions like “how many laptops do we have at Site 1?” or “do we have the right number of SQL licenses?” or “how much do we need to budget for device replacements next year?” After all, don’t we know what we have?

      IT can’t easily provide these answers because to do so you must track hardware and software throughout its lifecycle – which is not easy. And unfortunately, you often need to respond to these questions on very short notice because of an audit or to support a budgeting exercise.

      IT Asset Management (ITAM) is the solution. It’s not a new solution – the discipline has been around for decades. But the key to success is to deploy the practice in a way that is sustainable, right-sized, and maximizes value.

      Use our practical methodology to develop and document your approach to ITAM that is aligned with the goals of your organization.

      Photo of Andrew Sharp, Research Director, Infrastructure & Operations Practice, Info-Tech Research Group.

      Andrew Sharp
      Research Director
      Infrastructure & Operations Practice
      Info-Tech Research Group

      Realize the value of asset management

      Cost optimization, application rationalization and reduction of technical debt are all considered valuable to right-size spending and improve service outcomes. Without access to accurate data, these activities require significant investments of time and effort, starting with creation of point-in-time inventories, which lengthens the timeline to reaching project value and may still not be accurate.

      Cost optimization and reduction of technical debt should be part of your culture and technical roadmap rather than one-off projects. Why? Access to accurate information enables the organization to quickly make decisions and pivot plans as needed. Through asset management, ongoing harvest and redeployment of assets improves utilization-to-spend ratios. We would never see any organization saying, “We’ve closed our year end books, let’s fire the accountants,” but often see this valuable service relegated to the back burner. Similar to the philosophy that “the best time to plant a tree is 20 years ago and the next best time is now,” the sooner you can start to collect, validate, and analyze data, the sooner you will find value in it.

      Photo of Sandi Conrad, Principal Research Director, Infrastructure & Operations Practice, Info-Tech Research Group.

      Sandi Conrad
      Principal Research Director
      Infrastructure & Operations Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      You have a mandate to create an accurate and actionable database of the IT assets in your environment, but:

      • The data you have is often incomplete or wrong.
      • Processes are broken or non-existent.
      • Your tools aren’t up to the task of tracking ever more hardware, software, and relevant metadata.
      • The role of stakeholders outside the core ITAM team isn’t well defined or understood.
      Common Obstacles

      It is challenging to make needed changes because:

      • There’s cultural resistance to asset tracking, it’s seen as busywork that doesn’t clearly create value.
      • Decentralized IT teams aren’t generating the data required to track hardware and licenses.
      • ITAM can’t direct needed tool improvements because the admins don’t report to ITAM.
      • It’s hard to find time to improve processes given the day-to-day demands on your time.
      Info-Tech’s Approach
      • Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.
      • Clarify the structure for the ITAM program, including scope, responsibility and accountability, centralization vs. decentralization, outsourcing vs. insourcing, and more.
      • Create a practical roadmap to guide improvement.
      • Summarize your strategy and approach using Info-Tech’s templates for review with stakeholders.

      Info-Tech Insight

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there’s no value in data for data’s sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service providers.

      Unlock business value with IT asset management

      • IT asset management (ITAM) is the practice of maintaining accurate, accessible, and actionable data on the assets within the organization’s IT estate. Each IT asset will have a record that tracks it across its lifecycle from purchase to disposal.
      • ITAM’s value is realized through other processes and practice areas that can leverage ITAM data to manage risk, improve IT services, and control costs.
      • Develop an approach to ITAM that maximizes the value delivered to the business and IT. ITAM succeeds when its partners succeed at delivering business value, and it fails when it doesn’t show value to those partners.

      This blueprint will help you develop your approach for the management of IT hardware and software, including cloud services. Leverage other Info-Tech methodologies to dive directly into developing hardware asset management procedures, software asset management procedures, or to implement configuration management best practices.

      Info-Tech Members report significant savings from implementing our hardware and software asset management frameworks. In order to maximize value from the process-focused methodologies below, develop your ITAM strategy first.

      Implement Hardware Asset Management (Based on Info-Tech Measured Value Surveys results from clients working through these blueprints, as of February 2022.)

      9.6/10

      $23k

      32

      Overall Impact Average $ Saved Average Days Saved
      Implement Software Asset Management (Based on Info-Tech Measured Value Surveys results from clients working through these blueprints, as of February 2022.)

      9.0/10

      $12k

      5

      Overall Impact Average $ Saved Average Days Saved

      ITAM provides both early and ongoing value

      ITAM isn’t one-and-done. Properly supported, your ITAM practice will deliver up-front value that will help demonstrate the value ongoing ITAM can offer through the maintenance of an accurate, accessible, and actionable ITAM database.

      Example: Software Savings from ITAM



      This chart shows the money saved between the first quote and the final price for software and maintenance by a five-person ITAM team. Over a year and a half, they saved their organization a total of $7.5 million from a first quote total of $21 million over that period.

      This is a perfect example of the direct value that ITAM can provide on an ongoing basis to the organization, when properly supported and integrated with IT and the business.

      Examples of up-front value delivered in the first year of the ITAM practice:

      • Save money by reviewing and renegotiating critical, high-spend, and undermanaged software and service contracts.
      • Redeploy or dispose of clearly unused hardware and software.
      • Develop and enforce standards for basic hardware and software.
      • Improve ITAM data quality and build trust in the results.

      Examples of long-term value from ongoing governance, management, and operational ITAM activities:

      • Optimize spend: Reallocate unused hardware and software, end unneeded service agreements, and manage renewals and audits.
      • Reduce risk: Provide comprehensive asset data for security controls development and incident management; manage equipment disposal.
      • Improve IT service: Support incident, problem, request, and change management with ITAM data. Develop new solutions with an understanding of what you have already.

      Common obstacles

      The rulebook is available, but hard to follow
      • ITAM takes a village, but stakeholders aren’t aware of their role. ITAM processes rely on technicians to update asset records, vendors to supply asset data, administrators to manage tools, leadership to provide direction and support, and more.
      • Constant change in the IT and business environment undermines the accuracy of ITAM records (e.g. licensing and contract changes, technology changes that break discovery tools, personnel and organizational changes).
      • Improvement efforts are overwhelmed by day-to-day activities. One study found that 83% of SAM teams’ time is consumed by audit-related activities. (Flexera State of ITAM Report 2022) A lack of improvement becomes a vicious cycle when stakeholders who don’t see the value of ITAM decline to dedicate resources for improvement.
      • Stakeholders expect ITAM tools to be a cure-all, but even at their best, they can’t provide needed answers without some level of configuration, manual input, and supervision.
      • There’s often a struggle to connect ITAM to value. For example, respondents to Info-Tech’s Management & Governance Diagnostic consistently rank ITAM as less important than other processes that ITAM directly supports (e.g. budget management and budget optimization). (Info-Tech MGD Diagnostic (n=972 unique organizations))
      ITAM is a mature discipline with well-established standards, certifications, and tools, but we still struggle with it.
      • Only 28% of SAM teams track IaaS and PaaS spend, and only 35% of SAM teams track SaaS usage.
      • Increasing SAM maturity is a challenge for 76% of organizations.
      • 10% of organizations surveyed have spent more than $5 million in the last three years in audit penalties and true-ups.
      • Half of all of organizations lack a viable SAM tool.
      • Seventy percent of SAM teams have a shortfall of qualified resources.
      • (Flexera State of ITAM Report 2022)

      Info-Tech's IT Asset Management Framework (ITAM)

      Adopt, manage, and mature activities to enable business value thorugh actionable, accessible, and accurate ITAM data

      Logo for Info-Tech Research Group. Enable Business Value Logo for #iTRG.
      Business-Aligned Spend
      Optimization and Transparency
      Facilitate IT Services
      and Products
      Actionable, Accessible,
      and Accurate Data
      Context-Aware Risk Management
      and Security Controls

      Plan & Govern

      Business Goals, Risks, and Structure
      • ITAM Goals & Priorities
      • Roles, Accountability, Responsibilities
      • Scope
      Ongoing Management Commitment
      • Resourcing & Funding
      • Policies & Enforcement
      • Continuous Improvement
      Culture
      • ITAM Education, Awareness & Training
      • Organizational Change Management
      Section title 'Operate' with a cycle surrounding key components of Operate: 'Data Collection & Validation', 'Tool Administration', 'License Management', and 'Lease Management'. The cycle consists of 'Request', 'Procure', 'Receive', 'Deploy', 'Manage', 'Retire & Dispose', and back to 'Request'.

      Build & Manage

      Tools & Data
      • ITAM Tool Selection & Deployment
      • Configuration Management Synchronization
      • IT Service Management Integration
      Process
      • Process Management
      • Data & Process Audits
      • Document Management
      People, Policies, and Providers
      • Stakeholder Management
      • Technology Standardization
      • Vendor & Contract Management

      Info-Tech Insight

      ITAM is a foundational IT service that provides actionable, accessible, and accurate data on IT assets. But there's no value in data for data's sake. Use this methodology to enable collaboration between ITAM, the business, and IT to develop an approach to ITAM that maximizes the value the ITAM team can deliver as service providers.

      Key deliverable

      IT asset management requires ongoing practice – you can’t just implement it and walk away.

      Our methodology will help you build a business-aligned strategy and approach for your ITAM practice with the following outputs:

      • Business-aligned ITAM priorities, opportunities, and goals.
      • Current and target state ITAM maturity.
      • Metrics and KPIs.
      • Roles, responsibilities, and accountability.
      • Insourcing, outsourcing, and (de)centralization.
      • Tools and technology.
      • A documentation framework.
      • Initiatives, a roadmap, and a communication plan.
      Each step of this blueprint is designed to help you create your IT asset management strategy:
      Sample of Info-Tech's key deliverable 'IT Asset Management' blueprint.

      Info-Tech’s methodology to develop an IT asset management strategy

      1. Establish business-aligned ITAM goals and priorities 2. Identify your approach to support ITAM priorities and goals
      Phase Steps
      • 1.1 Define ITAM and brainstorm opportunities and challenges.
      • Executive Alignment Working Session:
      • 1.2 Review organizational priorities, strategy, and key initiatives.
      • 1.3 Align executive priorities with ITAM opportunities and priorities.
      • 1.4 Identify business-aligned ITAM goals and target maturity.
      • 1.5 Write mission and vision statements.
      • 1.6 Define ITAM metrics and KPIs.
      • 2.1 Define ITAM scope.
      • 2.2 Acquire ITAM services (outsourcing and contracting).
      • 2.3 Centralize or decentralize ITAM capabilities.
      • 2.4 Create a RACI for the ITAM practice.
      • 2.5 Align ITAM with other service management practices.
      • 2.6 Evaluate ITAM tools and integrations.
      • 2.7 Create a plan for internal and external audits.
      • 2.8 Improve your budget processes.
      • 2.9 Establish a documentation framework.
      • 2.10 Create a roadmap and communication plan.
      Phase Outcomes Defined, business-aligned goals and priorities for ITAM. Establish an approach to achieving ITAM goals and priorities including scope, structure, tools, service management integrations, documentation, and more.
      Project Outcomes Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities.

      Insight Summary

      There’s no value in data for data’s sake

      ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an approach to ITAM that maximizes the value they can deliver as service providers.

      Service provider to a service provider

      ITAM is often viewed (when it’s viewed at all) as a low-value administrative task that doesn’t directly drive business value. This can make it challenging to build a case for funding and resources.

      Your ITAM strategy is a critical component to help you define how ITAM can best deliver value to your organization, and to stop creating data for the sake of data or just to fight the next fire.

      Collaboration over order-taking

      To align ITAM practices to deliver organizational value, you need a very clear understanding of the organization’s goals – both in the moment and as they change over time.

      Ensure your ITAM team has clear line of sight to business strategy, objectives, and decision-makers, so you can continue to deliver value as priorities change

      Embrace dotted lines

      ITAM teams rely heavily on staff, systems, and data beyond their direct area of control. Identify how you will influence key stakeholders, including technicians, administrators, and business partners.

      Help them understand how ITAM success relies on their support, and highlight how their contributions have created organizational value to encourage ongoing support.

      Project benefits

      Benefits for IT
      • Set a foundation and direction for an ITAM practice that will allow IT to manage risk, optimize spend, and enhance services in line with business requirements.
      • Establish accountability and responsibility for essential ITAM activities. Decide where to centralize or decentralize accountability and authority. Identify where outsourcing could add value.
      • Create a roadmap with concrete, practical next steps to develop an effective, right-sized ITAM practice.
      Stock image of a trophy. Benefits for the business
      • Plan and control technology spend with confidence based on trustworthy ITAM data.
      • Enhance IT’s ability to rapidly and effectively support new priorities and launch new projects. Effective ITAM can support more streamlined procurement, deployment, and management of assets.
      • Implement security controls that reflect your total technology footprint. Reduce the risk that a forgotten device or unmanaged software turns your organization into the next Colonial Pipeline.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI around 12 calls over the course of 6 months.

      What does a typical GI on this topic look like?

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Review business priorities.

      Call #3: Identify ITAM goals & target maturity.

      Call #4: Identify metrics and KPIs. Call #5: Define ITAM scope.

      Call #6: Acquire ITAM services.

      Call #7: ITAM structure and RACI.

      Call #8: ITAM and service management.

      Tools and integrations.

      Call #10: Internal and external audits.

      Call #11: Budgets & documentation

      Call #12: Roadmap, comms plan. Wrap-up.

      Phase 1 Phase 2

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889
      Day 1 Day 2 Day 3 Day 4 Day 5
      Identify ITAM priorities & goals, maturity, metrics and KPIs
      Identify your approach to support ITAM priorities and goals
      Next Steps and wrap-Up (offsite)
      Activities

      1.1 Define ITAM.

      1.2 Brainstorm ITAM opportunities and challenges.

      Conduct an executive alignment working session:

      1.3 Review organizational priorities, strategy, and key initiatives.

      1.4 Align executive priorities with ITAM opportunities.

      1.5 Set ITAM priorities.

      2.1 Translate opportunities into ITAM goals and tactics.

      2.2 Identify target and current state ITAM maturity.

      2.3 Create mission and vision statements.

      2.4 Identify key ITAM metrics and KPIs.

      3.1 Define ITAM scope.

      3.2 Acquire ITAM services (outsourcing and contracting)

      3.3 Centralize or decentralize ITAM capabilities.

      3.4 Create a RACI for the ITAM practice.

      3.5 Align ITAM with other service management practices.

      3.6 Evaluate ITAM tools and integrations.

      4.1 Create a plan for internal and external audits.

      4.2 Improve your budget processes.

      4.3 Establish a documentation framework and identify documentation gaps.

      4.4 Create a roadmap and communication plan.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables
      1. ITAM opportunities and challenges.
      2. Align executive priorities with ITAM opportunities.
      3. Set ITAM priorities.
      1. ITAM goals and tactics.
      2. Current and target ITAM maturity.
      3. Mission and vision statements.
      4. ITAM metrics and KPIs.
      1. Decisions that will shape your ITAM approach, including:
        1. What’s in scope (hardware, software, and cloud services).
        2. Where to centralize, decentralize, or outsource ITAM activities.
        3. Accountability, responsibility, and structure for ITAM activities.
        4. Service management alignment, tooling gaps, audit plans, budget processes, and required documentation.
      2. A roadmap and communication plan.
      1. Your completed ITAM strategy template.
      Develop an IT Asset Management Strategy

      Phase 1:

      Establish business-aligned ITAM goals and priorities

      Phase 1

      1.1 Define ITAM and brainstorm opportunities and challenges.

      Executive Alignment Working Session:

      1.2 Review organizational priorities, strategy, and key initiatives.

      1.3 Align executive priorities with ITAM opportunities & priorities.

      1.4 Identify business-aligned ITAM goals and target maturity.

      1.5 Write mission and vision statements.

      1.6 Define ITAM metrics and KPIs.

      Phase 2

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Phase Outcomes:

      Defined, business-aligned goals, priorities, and KPIs for ITAM. A concise vision and mission statement. The direction you need to establish a practical, right-sized, effective approach to ITAM for your organization.

      Before you get started

      Set yourself up for success with these three steps:
      • This methodology and the related slides are intended to be executed via intensive, collaborative working sessions using the rest of this slide deck.
      • Ensure the working sessions are a success by working through these steps before you start work on your IT asset management strategy.

      1. Identify participants

      Review recommended roles and identify who should participate in the development of your ITAM strategy.

      2. Estimate assets managed today

      Work through an initial assessment to establish ease of access to ITAM data and your level of trust in the data available to you.

      3. Create a working folder

      Create a repository to house your notes and any work in progress, including your copy of the ITAM Strategy Template.

      0.1 Identify participants

      30 minutes

      Output: List of key roles for the strategy exercises outlined in this methodology

      Participants: Project sponsor, Lead facilitator, ITAM manager and SMEs

      This methodology relies on having the right stakeholders in the room to identify ITAM goals, challenges, roles, structure, and more. On each activity slide in this deck, you’ll see an outline of the recommended participants. Use the table below to translate the recommended roles into specific people in your organization. Note that some people may fill multiple roles.

      Role Expectations People
      Project Sponsor Accountable for the overall success of the methodology. Ideally, participates in all exercises in this methodology. May be the asset manager or whoever they report to. Jake Long
      Lead Facilitator Leads, schedules, and manages all working sessions. Guides discussions and ensures activity outputs are completed. Owns and understands the methodology. Has a working knowledge of ITAM. Robert Loblaw
      Asset Manager(s) SME for the ITAM practice. Provides strategic direction to mature ITAM practices in line with organizational goals. Supports the facilitator. Eve Maldonado
      ITAM Team Hands-on ITAM professionals and SMEs. Includes the asset manager. Provide input on tactical ITAM opportunities and challenges. Bruce Wayne, Clark Kent
      IT Leaders & Managers Leaders of key stakeholder groups from across the IT department – the CIO and direct reports. Provide input on what IT needs from ITAM, and the role their teams should play in ITAM activities. May include delegates, particularly those familiar with day-to-day processes relevant to a particular discussion or exercise. Marcelina Hardy, Edmund Broughton
      ITAM Business Partners Non-IT business stakeholders for ITAM. This could include procurement, vendor management, accounting, and others. Zhang Jin, Effie Lamont
      Business Executives Organizational leaders and executives (CFO, COO, CEO, and others) or their delegates. Will participate in a mini-workshop to identify organizational goals and initiatives that can present opportunities for the ITAM practice. Jermaine Mandar, Miranda Kosuth

      0.2 Estimate asset numbers

      1 hour

      Output: Estimates of quantity and spend related to IT assets, Confidence/margin of error on estimates

      Participants: IT asset manager, ITAM team

      What do you know about your current IT environment, and how confident are you in that knowledge?

      This exercise will help you evaluate the size of the challenge ahead in terms of the raw number of assets in your environment, the spend on those assets, and the level of trust your organization has in the ITAM data.

      It is also a baseline snapshot your ability to relay key ITAM metrics quickly and confidently, so you can measure progress (in terms of greater confidence) over time.

      1. Download the estimation tracker below. Add any additional line items that are particularly important to the organization.
      2. Time-box this exercise to an hour. Use your own knowledge and existing data repositories to identify count/spend for each line item, then add a margin of error to your guess. Larger margins of error on larger counts will typically indicate larger risks.
      3. Track any assumptions, data sources used, or SMEs consulted in the comments.

      Download the IT Asset Estimation Tracker

      “Any time there is doubt about the data and it doesn’t get explained or fixed, then a new spreadsheet is born. Data validation and maintenance is critical to avoid the hidden costs of having bad data”

      Allison Kinnaird,
      Operations Practice Lead,
      Info-Tech Research Group

      0.3 Create a working folder

      15 minutes

      Output: A repository for templates and work in progress

      Participants: Lead facilitator

      Create a central repository for collaboration – it seems like an obvious step, but it’s one that gets forgotten about
      1. Download a copy of the ITAM Strategy Template.
        1. This will be the repository for all the work you do in the activities listed in this blueprint; take a moment to read it through and familiarize yourself with the contents.
      2. House the template in a shared repository that can house other related work in progress. Share this folder with participants so they can check in on your progress.
      3. You’ll see this callout box: Add your results to your copy of the ITAM Strategy Template as you work through activities in this blueprint. Copy the output to the appropriate slide in the ITAM Strategy Template.
      Stock image of a computer screen with a tiny person putting likes on things.

      Collect action items as you go

      Don’t wait until the end to write down your good ideas.
      • The last exercise in this methodology is to gather everything you’ve learned and build a roadmap to improve the ITAM practice.
      • The output of the exercises will inform the roadmap, as they will highlight areas with opportunities for improvement.
      • Write them down as you work through the exercises, or you risk forgetting valuable ideas.
      • Keep an “idea space” – a whiteboard with sticky notes or a shared document – to which any of your participants can post an idea for improvement and that you can review and consolidate later.
      • Encourage participants to add their ideas at any time during the exercises.
      Pad of sticky notes, the top of which reads 'Good ideas go here!'

      Step 1.1: Brainstorm ITAM opportunities and challenges

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Rally the working group around a collection of ideas that, when taken together, create a vision for the future ITAM practice.
      • Identify your organization’s current ITAM challenges.

      “ITAM is a cultural shift more than a technology shift.” (Rory Canavan, SAM Charter)

      What is an IT Asset?

      Any piece of technology can be considered an asset, but it doesn’t mean you need to track everything. Image of three people building a computer from the inside.
      Icon of a power button.

      According to the ISO 19770 standard on ITAM, an IT Asset is “[an] item, thing, or entity that can be used to acquire, process, store and distribute digital information and has potential or actual value to an organization.”
      These are all things that IT is expected to support and manage, or that have the potential to directly impact services that IT supports and manages.

      Icon of a half-full battery.

      IT assets are distinct from capital assets. Some IT assets will also be capital assets, but not all will be. And not all capital assets are IT assets, either.

      Icon of a microphone.

      IT assets are typically tracked by IT, not by finance or accounting.
      IT needs more from their IT asset tracking system than the typical finance department can deliver.
      This can include end-user devices, software, IT infrastructure, cloud-based resources, third-party managed IT services, Internet-of-Things devices, embedded electronics, SCADA equipment, “smart” devices, and more.

      Icon of a fingerprint.

      It’s important to track IT assets in a way that enables IT to deliver value to the business – and an important part of this is understanding what not to track. This list should be aligned to the needs of your organization.

      What is IT asset management?

      • IT asset management is the practice of maintaining accurate, accessible, and actionable data on IT hardware, software, and cloud assets from procurement to disposal.
      • Trustworthy data maintained by an IT asset management practice will help your business meet its goals by managing risk, controlling costs, and enabling IT services and products.
      • ITAM tends to focus on the asset itself – its technical, financial, contractual, lifecycle, and ownership attributes – rather than its interactions or connections to other IT assets, which tends to be part of configuration management.

      What IT Asset Management is NOT:

      Configuration Management: Configuration management databases (CMDBs) often draw from the same data pool as ITAM (many configuration items are assets, and vice versa), but they focus on the interaction, interconnection, and interoperation of configuration items within the IT estate.

      In practice, many configuration items will be IT assets (or parts of assets) and vice versa. Configuration and asset teams should work closely together as they develop different but complementary views of the IT environment. Use Info-Tech’s methodology to harness configuration management superpowers.

      Organizational Data Management: Leverage a different Info-Tech methodology to develop a digital and data asset management program within Info-Tech’s DAM framework.

      “Asset management’s job is not to save the organization money, it’s not to push back on software audits.

      It’s to keep the asset database as up-to-date and as trustworthy as possible. That’s it.” (Jeremy Boerger, Consultant & Author)

      “You can’t make any real decisions on CMDB data that’s only 60% accurate.

      You start extrapolating that out, you’re going to get into big problems.” (Mike Austin, Founder & CEO, MetrixData 360)

      What is an ITAM strategy?

      Our strategy document will outline a coherent, sustainable, business-aligned approach to ITAM.

      No single approach to ITAM fits all organizations. Nor will the same approach fit the same organization at different times. A world-leading research university, a state government, and a global manufacturer all have very different goals and priorities that will be best supported by different approaches to ITAM.

      This methodology will walk you through these critical decisions that will define your approach to ITAM:

      • Business-aligned priorities, opportunities, and goals: What pressing opportunities and challenges do we face as an organization? What opportunities does this create that ITAM can seize?
      • Current and future state maturity, challenges: What is the state of the practice today? Where do we need to improve to meet our goals? What challenges stand in the way of improvement?
      • Responsibility, accountability, sourcing and (de)centralization: Who does what? Who is accountable? Where is there value to outsourcing? What authority will be centralized or decentralized?
      • Tools, policies, and procedures: What technology do we need? What’s our documentation framework?
      • Initiatives, KPIs, communication plan, and roadmap: What do we need to do, in what order, to build the ITAM practice to where we need it to be? How long do we expect this to take? How will we measure success?

      “A good strategy has coherence, coordinating actions, policies, and resources so as to accomplish an important end. Most organizations, most of the time, don’t have this.

      Instead, they have multiple goals and initiatives that symbolize progress, but no coherent approach to accomplish that progress other than ‘spend more and try harder.’” (Good Strategy, Bad Strategy, Richard Rumelt)

      Enable business value with IT asset management

      If you’ve never experienced a mature ITAM program before, it is almost certainly more rewarding than you’d expect once it’s functioning as intended.

      Each of the below activities can benefit from accessible, actionable, and accurate ITAM data.

      • Which of the activities, practices, and initiatives below have value to your organization?
      • Which could benefit most from ITAM data?
      Manage Risk: Effective ITAM practices provide data and processes that help mitigate the likelihood and impact of potentially damaging IT risks.

      ITAM supports the following practices that help manage organizational risk:

      • Security Controls Development
      • Security Incident Response
      • Security Audit Reports
      • Regulatory Compliance Reports
      • IT Risk Management
      • Technical Debt Management
      • M&A Due Diligence
      Optimize Spend: Asset data is essential to maintaining oversight of IT spend, ensuring that scarce resources are allocated where they can have the most impact.

      ITAM supports these activities that help optimize spend:

      • Vendor Management & Negotiations
      • IT Budget Management & Variance Analysis
      • Asset Utilization Analysis
      • FinOps & Cloud Spend Optimization
      • Showback & Chargeback
      • Software Audit Defense
      • Application Rationalization
      • Contract Consolidation
      • License and Device Reallocation
      Improve IT Services: Asset data can help inform solutions development and can be used by service teams to enhance and improve IT service practices.

      Use ITAM to facilitate these IT services and initiatives:

      • Solution and Enterprise Architecture
      • Service Level Management
      • Technology Procurement
      • Technology Refresh Projects
      • Incident & Problem Management
      • Request Management
      • Change Management
      • Green IT

      1.1 Brainstorm ideas to create a vision for the ITAM practice

      30 minutes

      Input: Stakeholders with a vision of what ITAM could provide, if resourced and funded adequately

      Output: A collection of ideas that, when taken together, create a vision for the future ITAM practice

      Materials: ITAM strategy template, Whiteboard or virtual whiteboard

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      It can be easy to lose sight of long-term goals when you’re stuck in firefighting mode. Let’s get the working group into a forward-looking mindset with this exercise.

      Think about what ITAM could deliver with unlimited time, money, and technology.

      1. Provide three sticky notes to each participant.
      2. Add the headings to a whiteboard, or use a blank slide as a digital whiteboard
      3. On each sticky note, ask participants to outline a single idea as follows:
        1. We could: [idea]
        2. Which would help: [stakeholder]
        3. Because: [outcome]
      4. Ask participants to present their sticky notes and post them to the whiteboard. Ask later participants to group similar ideas together.

      As you hear your peers describe what they hope and expect to achieve with ITAM, a shared vision of what ITAM could be will start to emerge.

      1.1 Identify structural ITAM challenges

      30 minutes

      Input: The list of common challenges on the next slide, Your estimated visibility into IT assets from the previous exercise, The experience and knowledge of your participants

      Output: Identify current ITAM challenges

      Materials: Your working copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      What’s standing in the way today of delivering the ITAM practices you want to achieve?

      Review the list of common challenges on the next slide as a group.

      1. Delete any challenges that don’t apply to your organization.
      2. Modify any challenges as required to reflect your organization.
      3. Add further challenges that aren’t on the list, as required.
      4. Highlight challenges that are particularly painful.

      Add your results to your copy of the ITAM Strategy Template

      “The problem – the reason why asset management initiatives keep falling on their face – is that people attack asset management as a problem to solve, instead of a practice and epistemological construct.” (Jeremy Boerger, Consultant & Author)

      1.1 Identify structural ITAM challenges

      Review and update the list of common challenges below to reflect your own organization.

      • Leadership and executives don’t understand the value of asset management and don’t fund or resource it.
      • Tools aren’t fit for purpose, don’t scale, or are broken.
      • There’s a cultural tendency to focus on tools over processes.
      • ITAM data is fragmented across multiple repositories.
      • ITAM data is widely viewed as untrustworthy.
      • Stakeholders respond to vendor audits before consulting ITAM, which leads to confusion and risks penalties.
      • No time for improvement; we’re always fighting fires.
      • We don’t audit our own ITAM data for accuracy.
      • End-user equipment is shared, re-assigned, or disposed without notifying or involving IT.
      • No dedicated resources.
      • Lack of clarity on roles and responsibilities.
      • Technicians don’t track assets consistently; ITAM is seen as administrative busywork.
      • Many ITAM tasks are manual and prone to error.
      • Inconsistent organizational policies and procedures.
      • We try to manage too many hardware types/software titles.
      • IT is not involved in the procurement process.
      • Request and procurement is seen as slow and excessively bureaucratic.
      • Hardware/software standards don’t exist or aren’t enforced.
      • Extensive rogue purchases/shadow IT are challenging to manage via ITAM tools and processes.
      What Else?

      Copy results to your copy of the ITAM Strategy Template

      Step 1.2: Review organizational priorities, strategy, initiatives

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • Business executives or their delegates

      Outcomes

      • Review organizational priorities and strategy.
      • Identify key initiatives.

      Enter the executives

      Deliver on leadership priorities

      • Your business’ major transformative projects and executive priorities might seem far removed from hardware and software tracking. Why would we start with business strategy and executive priorities as we’re setting goals for the ITAM program?
      • While business executives have (likely) no interest in how software and hardware is tracked, they are accountable for the outcomes ITAM can enable. They are the most likely to understand why and how ITAM can deliver value to the organization.
      • ITAM succeeds by enabling its stakeholders to achieve business outcomes. The next three activities are designed to help you identify how you can enable your stakeholders, and what outcomes are most important from their point of view. Specifically:
        • What are the business’ planned transformational initiatives?
        • What are your highest priority goals?
        • What should the priorities of the ITAM practice be?
      • The answers to these questions will shape your approach to ITAM. Direct input from your leadership and executives – or their delegates – will help ensure you’re setting a solid foundation for your ITAM practice.

      “What outcomes does the organization want from IT asset management? Often, senior managers have a clear vision for the organization and where IT needs to go, and the struggle is to communicate that down.” (Kylie Fowler, ITAM Intelligence)

      Stock image of many hands with different puzzle pieces.

      Executive Alignment Session Overview

      ITAM Strategy Working Sessions

      • Discover & Brainstorm
      • Executive Alignment Working Session
        • 1.2 Review organizational strategy, priorities, and key initiatives
        • 1.3 Align executive priorities with ITAM opportunities, set ITAM priorities
      • ITAM Practice Maturity, Vision & Mission, Metrics & KPIs
      • Scope, Outsourcing, (De)Centralization, RACI
      • Service Management Integration
      • ITAM Tools
      • Audits, Budgets, Documents
      • Roadmap & Comms Plan

      A note to the lead facilitator and project sponsor:
      Consider working through these exercises by yourself ahead of time. As you do so, you’ll develop your own ideas about where these discussions may go, which will help you guide the discussion and provide examples to participants.

      1.2 Review organizational strategy and priorities

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leadership, Business executives or delegates

      Welcome your group to the working session and outline the next few exercises using the previous slide.

      Ask the most senior leader present to provide a summary of the following:

      1. What is the vision for the organization?
      2. What are our priorities and what must we absolutely get right?
      3. What do we expect the organization to look like in three years?

      The facilitator or a dedicated note-taker should record key points on a whiteboard or flipchart paper.

      1.2 Identify transformational initiatives

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leadership, Business executives or delegates

      Ask the most senior leader present to provide a summary of the following: What transformative business and IT initiatives are planned? When will they begin and end?

      Using one box per initiative, draw the initiatives in a timeline like the one below.

      Sample timeline for ITAM initiatives.

      Add your results to your copy of the ITAM Strategy Template

      Step 1.3: Set business-aligned ITAM priorities

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • Business executives

      Outcomes

      • Connect executive priorities to ITAM opportunities.
      • Set business-aligned priorities for the ITAM practice.

      1.3 Align executive priorities with ITAM opportunities

      45 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leaders and managers, Business executives or delegates

      In this exercise, we’ll use the table on the next slide to identify the top priorities of key business and IT stakeholders and connect them to opportunities for the ITAM practice.

      1. Ask your leadership or executive delegates – what are their goals? What are they trying to accomplish? List roles and related goals in the table.
      2. Brainstorm opportunities for IT asset management to support listed goals:
        1. Can ITAM provide an enhanced level of service, access, or insight?
        2. Can ITAM address an existing issue or mitigate an existing risk?

      Add your results to your copy of the ITAM Strategy Template

      1.3 Align executive priorities with ITAM opportunities (example)

      ITAM is for the… Who wants to… Which presents these ITAM opportunities
      CEO Deliver transformative business initiatives Acquire the right tech at the right time to support transformational initiatives.
      Establish a data-driven culture of stewardship Improve data to increase IT spend transparency.
      COO Improve organizational efficiency Increase asset use.
      Consolidate major software contracts to drive discounts.
      CFO Accurately forecast spending Track and anticipate IT asset spending.
      Control spending Improve data to increase IT spend transparency.
      Consolidate major software contracts to drive discounts.
      CIO Demonstrate IT value Use data to tell a story about value delivered by IT assets.
      Govern IT use Improve data to increase IT spend transparency.
      CISO Manage IT security and compliance risks Identify abandoned or out-of-spec IT assets.
      Provide IT asset data to support controls development.
      Respond to security incidents Support security incident teams with IT asset data.
      Apps Leader Build, integrate, and support applications Identify opportunities to retire applications with redundant functionality.
      Connect applications to relevant licensing and support agreements.
      IT Infra Leader Build and support IT infrastructure. Provide input on opportunities to standardize hardware and software.
      Provide IT asset data to technicians supporting end users.

      1.3 Categorize ITAM opportunities

      10-15 minutes

      Input: The outputs from the previous exercise

      Output: Executive priorities, sorted into the three categories at the right

      Materials: The table in this slide, The outputs from the previous exercise

      Participants: Lead facilitator

      Give your participants a quick break. Quickly sort the identified ITAM opportunities into the three main categories below as best you can.

      We’ll use this table as context for the next exercise.

      Example: Optimize Spend Enhance IT Services Manage Risk
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Consolidate major software contracts to drive discounts.
      • Increase asset utilization.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.

      Add your results to your copy of the ITAM Strategy Template

      1.3 Set ITAM priorities

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: Whiteboard, The template on the next slide, Your copy of the ITAM Strategy Template

      Participants: Asset manager, IT leaders and managers, Business executives or delegates

      The objective of this exercise is to prioritize the outcomes your organization wants to achieve from its ITAM practice, given the context from the previous exercises.

      Review the image below. The three points of the triangle are the three core goals of ITAM: Enhance IT Service, Manage Risk, and Optimize Spend. This exercise was first developed by Kylie Fowler of ITAM Intelligence. It is an essential exercise to understand ITAM priorities and the tradeoffs associated with those priorities. These priorities aren’t set in stone and should be revisited periodically as technology and business priorities change.

      Draw the diagram on the next slide on a whiteboard. Have the most senior leader in the room place the dot on the triangle – the closer it is to any one of the goals, the more important that goal is to the organization. Note: The center of the triangle is off limits! It’s very rarely possible to deliver on all three at once.
      Track notes on what’s being prioritized – and why – in the template on the next slide.
      Triangle with the points labelled 'Enhance IT Service', 'Manage Risk', and 'Optimize Spend'.

      Add your results to your copy of the ITAM Strategy Template

      1.3 Set ITAM Priorities

      The priorities of the ITAM practice are to:
      • Optimize Spend
      • Manage Risk
      Why?
      • We believe there is significant opportunity right now to rationalize spend by consolidating key software contracts.
      • Major acquisitions are anticipated in the near future. Effective ITAM processes are expected to mitigate acquisition risk by supporting due diligence and streamlined integration of acquired organizations.
      • Ransomware and supply chain security threats have increased demands for a comprehensive accounting of IT assets to support security controls development and security incident response.
      (Update this section with notes from your discussion.)
      Triangle with the points labelled 'Enhance IT Service', 'Manage Risk', and 'Optimize Spend'. There is a dot close to the 'Optimize Spend' corner, a legend labelling the dot as 'Our Target', and a note reading 'Move this dot to reflect your priorities'.

      Step 1.4: Identify ITAM goals, target maturity

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Connect executive priorities to ITAM opportunities.
      • Set business-aligned priorities for the ITAM practice.

      “ITAM is really no different from the other ITIL practices: to succeed, you’ll need some ratio of time, treasure, and talent… and you can make up for less of one with more of the other two.” (Jeremy Boerger, Consultant and Author)

      1.4 Identify near- and medium-term goals

      15-30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Narrow down the list of opportunities to identify specific goals for the ITAM practice.

      1. Use one color to highlight opportunities you will seize in the next year.
      2. Use a second color to highlight opportunities you plan to address in the next three years.
      3. Leave blank anything you don’t intend to address in this timeframe.

      The highlighted opportunities are your near- and medium-term objectives.

      Optimize Spend Enhance IT Services Manage Risk
      Priority Critical Normal High
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Increase asset utilization.
      • Consolidate major software contracts to drive discounts.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.

      1.4 Connect ITAM goals to tactics

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Let’s dig down a little deeper. Connect the list of opportunities from earlier to specific ITAM tactics that allow the team to seize those opportunities.

      Add another row to the earlier table for ITAM tactics. Brainstorm tactics with your participants (e.g. sticky notes on a whiteboard) and align them with the priorities they’ll support.

      Optimize SpendEnhance IT ServicesManage Risk
      PriorityCriticalNormalHigh
      ITAM Opportunities
      • Improve data to increase IT spend transparency.
      • Increase asset utilization.
      • Consolidate major software contracts to drive discounts.
      • Identify opportunities to retire applications with redundant functionality
      • Acquire the right tech at the right time to support transformational initiatives.
      • Provide IT asset data to technicians supporting end users.
      • Identify abandoned or out-of-spec IT assets.
      • Provide IT asset data to support controls development.
      • Support security incident teams with IT asset data.
      ITAM Tactics to Seize Opportunities
      • Review and improve hardware budgeting exercises.
      • Reallocate unused licenses, hardware.
      • Ensure ELP reports are up to date.
      • Validate software usage.
      • Data to support software renewal negotiations.
      • Use info from ITAM for more efficient adds, moves, changes.
      • Integrate asset records with the ticket intake system, so that when someone calls the service desk, the list of their assigned equipment is immediately available.
      • Find and retire abandoned devices or services with access to the organization’s network.
      • Report on lost/stolen devices.
      • Develop reliable disposal processes.
      • Report on unpatched devices/software.

      Add your results to your copy of the ITAM Strategy Template

      1.4 Identify current and target state

      20 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      We’ll use this exercise to identify the current and one-year target state of ITAM using Info-Tech’s ITAM maturity framework.

      1. Review the maturity framework on the next slide as a group.
      2. In one color, highlight statements that reflect your organization today. Summarize your current state. Are you in firefighter mode? Between “firefighter” and “trusted operator”?
      3. In a second color, highlight statements that reflect where you want to be one year from today, taking into consideration the goals and tactics identified in the last exercise.
      4. During a break, copy the highlighted statements to the table on the slide after next, then add this final slide to your working copy of the ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      Establish current and target ITAM maturity

      IT maturity ladder with five color-coded levels. Innovator – Optimized Asset Management
      • All items from Business & Technology Partner, plus:
      • Business and IT stakeholders collaborate regularly with the ITAM team to identify new opportunities to leverage or deploy ITAM practices and data to mitigate risks, optimize spend, and improve service. The ITAM program scales with the business.
      Business & Technology Partner – Proactive Asset Management
      • All items from Trusted Operator, plus:
      • The ITAM data is integral to decisions related to budget, project planning, IT architecture, contract renewal, and vendor management. Software and cloud assets are reviewed as frequently as required to manage costs. ITAM data consumers have self-serve access to ITAM data.
      • Continuous improvement practices strengthen ITAM efficiency and effectiveness.
      • ITAM processes, standards, and related policies are regularly reviewed and updated. ITAM teams work closely with SMEs for key tools/systems integrated with ITAM (e.g. AD, ITSM, monitoring tools) to maximize the value and reliability of integrations.
      Trusted Operator – Controls Assets
      • ITAM data for deployed hardware and software is regularly audited for accuracy.
      • Sufficient staff and skills to support asset tracking, including a dedicated IT asset management role. Teams responsible for ITAM data collection cooperate effectively. Policies and procedures are documented and enforced. Key licenses and contracts are available to the ITAM team. Discovery, tracking, and analysis tools support most important use cases.
      Firefighter – Reactive Asset Tracking
      • Data is often untrustworthy, may be fragmented across multiple repositories, and typically requires significant effort to translate or validate before use.
      • Insufficient staff, fragmented or incomplete policies or documentation. Data tracking processes are extremely highly manual. Effective cooperation for ITAM data collection is challenging.
      • ITAM tools are in place, but additional configuration or tooling is needed.
      Unreliable - Struggles to Support
      • No data, or data is typically unusable.
      • No allocated staff, no cooperation between parties responsible for ITAM data collection.
      • No related policies or documentation.
      • Tools are non-existent or not fit-for-purpose.

      Current and target ITAM maturity

      Today:
      Firefighter
      • Data is often untrustworthy, is fragmented across multiple repositories, and typically requires significant effort to translate or validate before use.
      • Insufficient staff, fragmented or incomplete policies or documentation.
      • Tools are non-existent.
      In One Year:
      Trusted Operator
      • ITAM data for deployed hardware and software is regularly audited for accuracy.
      • Sufficient staff and skills to support asset tracking, including a dedicated IT asset management role.
      • Teams responsible for ITAM data collection cooperate effectively.
      • Discovery, tracking, and analysis tools support most important use cases.
      IT maturity ladder with five color-coded levels.

      Innovator – Optimized Asset Management

      Business & Technology Partner – Proactive Asset Management

      Trusted Operator – Controls Assets

      Firefighter – Reactive Asset Tracking

      Unreliable - Struggles to Support

      Step 1.5: Write mission and vision statements

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Write a mission statement that encapsulates the purpose and intentions of the ITAM practice today.
      • Write a vision statement that describes what the ITAM practice aspires to become and achieve.

      Write vision and mission statements

      Create two statements to summarize the role of the ITAM practice today – and where you want it to be in the future.

      Create two short, compelling statements that encapsulate:
      • The vision for what we want the ITAM practice to be in the future; and
      • The mission – the purpose and intentions – of the ITAM practice today.

      Why bother creating mission and vision statements? After all, isn’t it just rehashing or re-writing all the work we’ve just done? Isn’t that (at best) a waste of time?

      There are a few very important reasons to create mission and vision statements:

      • Create a compass that can guide work today and your roadmap for the future.
      • Focus on the few things you must do, rather than the many things you could do.
      • Concisely communicate a compelling vision for the ITAM practice to a larger audience who (let’s face it) probably won’t read the entire ITAM Strategy deck.

      “Brevity is the soul of wit.” (Hamlet, Act 2, Scene 2)

      “Writing is easy. All you have to do is cross out the wrong words.” (Mark Twain)

      1.5 Write an ITAM vision statement

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: A whiteboard, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT Leaders and managers

      Your vision statement describes the ITAM practice as it will be in the far future. It is a target to aspire to, beyond your ability to achieve in the near or medium term.

      Examples of ITAM vision statements:

      Develop the single accurate view of IT assets, available to anyone who needs it.

      Indispensable data brokers that support strategic decisions on the IT environment.

      Provide sticky notes to participants. Write out the three questions below on a whiteboard side by side. Have participants write their answers to the questions and post them below the appropriate question. Give everyone 10 minutes to write and post their ideas.

      1. What’s the desired future state of the ITAM practice?
      2. What needs to be done to achieved this desired state?
      3. How do we want ITAM to be perceived in this desired state?

      Review the answers and combine them into one focused vision statement. Use the 20x20 rule: take no more than 20 minutes and use no more than 20 words. If you’re not finished after 20 minutes, the ITAM manager should make any final edits offline.

      Document your vision statement in your ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      1.5 Write an ITAM mission statement

      30 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Your ITAM mission statement is an expression of what your IT asset management function brings to your organization today. It should be presented in straightforward language that is compelling, easy to understand, and sharply focused.

      Examples of ITAM mission statements:

      Maintain accurate, actionable, accessible on data on all IT assets.

      Support IT and the business with centralized and integrated asset data.

      Provide sticky notes to participants. Write out the questions below on a whiteboard side by side. Have participants write their answers to the questions and post them below the appropriate question. Give everyone 10 minutes to write and post their ideas.

      1. What is our role as the asset management team?
      2. How do we support the IT and business strategies?
      3. What does our asset management function offer that no one else can?

      Review the answers and combine them into one focused vision statement. Use the 20x20 rule: take no more than 20 minutes and use no more than 20 words. If you’re not finished after 20 minutes, the ITAM manager should make any final edits offline.

      Document your vision statement in your ITAM Strategy Template.

      Add your results to your copy of the ITAM Strategy Template

      Step 1.6: Define ITAM metrics and KPIs

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Identify metrics, data, or reports that may be of interest to different consumers of ITAM data.
      • Identify the key performance indicators (KPIs) for the ITAM practice, based on the goals and priorities established earlier.

      Navigate a universe of ITAM metrics

      When you have the data, how will you use it?

      • There’s a dizzying array of potential metrics you can develop and track across your ITAM environment.
      • Different stakeholders will need different data feeds, metrics, reports, and dashboards.
      • Different measures will be useful at different times. You will often need to filter or slice the data in different ways (by department, timeframe, equipment type, etc.)
      • We’ll use the next few exercises to identify the types of metrics that may be useful to different stakeholders and the KPIs to measure progress towards ITAM goals and priorities.

      ITAM Metrics

      • Quantity
        e.g. # of devices or licenses
      • Cost
        e.g. average laptop cost
      • Compliance
        e.g. effective license position reports
      • Progress
        e.g. ITAM roadmap items completed
      • Quality
        e.g. ITAM data accuracy rate
      • Time
        e.g. time to procure/ deploy

      Drill down by:

      • Vendor
      • Date
      • Dept.
      • Product
      • Location
      • Cost Center

      Develop different metrics for different teams

      A few examples:

      • CIOs — CIOs need asset data to govern technology use, align to business needs, and demonstrate IT value. What do we need to budget for hardware and software in the next year? Where can we find money to support urgent new initiatives? How many devices and software titles do we manage compared to last year? How has IT helped the business achieve key goals?
      • Asset Managers — Asset managers require data to help them oversee ITAM processes, technology, and staff, and to manage the fleet of IT assets they’re expected to track. What’s the accuracy rate of ITAM data? What’s the state of integrations between ITAM and other systems and processes? How many renewals are coming up in the next 90 days? How many laptops are in stock?
      • IT Leaders — IT managers need data that can support their teams and help them manage the technology within their mandate. What technology needs to be reviewed or retired? What do we actually manage?
      • Technicians — Service desk technicians need real-time access to data on IT assets to support service requests and incident management – for example, easy access to the list of equipment assigned to a particular user or installed in a particular location.
      • Business Managers and Executives — Business managers and executives need concise, readable dashboards to support business decisions about business use of IT assets. What’s our overall asset spend? What’s our forecasted spend? Where could we reallocate spend?

      1.6 Identify useful ITAM metrics and reports

      60 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Use this exercise to identify as many potentially useful ITAM metrics and reports as possible, and narrow them down to a few high-priority metrics. Leverage the list of example metrics on the next slide for your own exercise. If you have more than six participants, consider splitting into two or more groups, and divide the table between groups to minimize overlap.

      1. List potential consumers of ITAM data in the column on the left.
      2. What type of information do we think this role needs? What questions about IT assets do we get on a regular basis from this role or team?
      3. Review and consolidate the list as a group. Discuss and highlight any metrics the group thinks are a particularly high priority for tracking.
      Role Compliance Quality Quantity Cost Time Progress
      IT Asset Manager Owned devices not discovered in last 60 days Discrepancies between discovery data and ITAM DB records # of corporate-owned devices Spend on hardware (recent and future/ planned) Average time, maximum time to deploy end-user devices Number of ITAM roadmap items in progress
      Service Desk

      Add your results to your copy of the ITAM Strategy Template

      Examples of ITAM metrics

      Compliance Quality Quantity Cost Time/Duration/Age Progress
      Owned devices not discovered in last 60 days Discrepancies between discovery data and ITAM DB records # of corporate-owned devices Spend on hardware (recent and future/planned) Average time, maximum time to deploy end-user devices Number of ITAM roadmap items in progress or completed
      Disposed devices without certificate of destruction Breakage rates (in and out of warranty) by vendor # of devices running software title X, # of licenses for software title X Spend on software (recent and future/planned) Average time, maximum time to deploy end user software Number of integrations between ITAM DB and other sources
      Discrepancies between licenses and install count, by software title RMAs by vendor, model, equipment type Number of requests by equipment model or software title Spend on cloud (recent and future/planned) Average & total time spent on software audit responses Number of records in ITAM database
      Compliance reports (e.g. tied to regulatory compliance or grant funding) Tickets by equipment type or software title Licenses issued from license pool in the last 30 days Value of licenses issued from license pool in the last 30 days (cost avoidance) Devices by age Software titles with an up-to-date ELP report
      Reports on lost and stolen devices, including last assigned, date reported stolen, actions taken User device satisfaction scores, CSAT scores Number of devices retired or donated in last year Number of IT-managed capital assets Number of hardware/software request tickets beyond time-to-fulfil targets Number of devices audited (by ITAM team via self-audit)
      Number of OS versions, unpatched systems Number of devices due for refresh in the next year Spend saved by harvesting unused software Number of software titles, software vendors managed by ITAM team
      Audit accuracy rate Equipment in stock Cost savings from negotiations
      # of users assigned more than one device Number of non-standard devices or requests Dollars charged during audit or true-up

      Differentiate between metrics and KPIs

      Key performance indicators (KPIs) are metrics with targets aligned to goals.

      Targets could include one or more of:

      • Target state (e.g. completed)
      • Target magnitude (e.g. number, percent, rate, dollar amount)
      • Target direction (e.g. trending up or down)

      You may track many metrics, but you should have only a few KPIs (typically 2-3 per objective).

      A breached KPI should be a trigger to investigate and remediate the root cause of the problem, to ensure progress towards goals and priorities can continue.

      Which KPIs you track will change over the life of the practice, as ITAM goals and priorities shift. For example, KPIs may initially track progress towards maturing ITAM practices. Once you’ve reached target maturity, KPIs may shift to track whether the key service targets are being met.

      1.6 Identify ITAM KPIs

      20 minutes

      Input: Organizational strategy documents

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Good KPIs are a more objective measure of whether you’re succeeding in meeting the identified priorities for the ITAM practice.

      Identify metrics that can measure progress or success against the priorities and goals set earlier. Aim for around three metrics per goal. Identify targets for the metric you think are SMART (specific, measurable, achievable, relevant, and timebound). Track your work using the example table below.

      Goal Metric Target
      Consolidate major software contracts to drive discounts Amount spent on top 10 software contracts Decrease by 10% by next year
      Customer satisfaction scores with enterprise software Satisfaction is equal to or better than last year
      Value of licenses issued from license pool 30% greater than last year
      Identify abandoned or out-of-spec IT assets # of security incidents involving undiscovered assets Zero
      % devices with “Deployed” status in ITAM DB but not discovered for 30+ days ‹1% of all records in ITAM DB
      Provide IT asset data to technicians for service calls Customer satisfaction scores Satisfaction is equal to or better than last year
      % of end-user devices meeting minimum standards 97%

      Add your results to your copy of the ITAM Strategy Template

      Develop an IT Asset Management Strategy

      Phase 2:

      Identify your approach to support ITAM priorities and goals

      Phase 1

      1.1 Define ITAM and brainstorm opportunities and challenges.

      Executive Alignment Working Session:

      1.2 Review organizational priorities, strategy, and key initiatives.

      1.3 Align executive priorities with ITAM opportunities & priorities.

      1.4 Identify business-aligned ITAM goals and target maturity.

      1.5 Write mission and vision statements.

      1.6 Define ITAM metrics and KPIs.

      Phase 2

      2.1 Define ITAM scope.

      2.2 Acquire ITAM services (outsourcing and contracting).

      2.3 Centralize or decentralize ITAM capabilities.

      2.4 Create a RACI for the ITAM practice.

      2.5 Align ITAM with other service management practices.

      2.6 Evaluate ITAM tools and integrations.

      2.7 Create a plan for internal and external audits.

      2.8 Improve your budget processes.

      2.9 Establish a documentation framework.

      2.10 Create a roadmap and communication plan.

      Phase Outcomes:

      Establish an approach to achieving ITAM goals and priorities, including scope, structure, tools, service management integrations, documentation, and more.

      Create a roadmap that enables you to realize your approach.

      Step 2.1: Define ITAM Scope

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Establish what types of equipment and software you’ll track through the ITAM practice.
      • Establish which areas of the business will be in scope of the ITAM practice.

      Determine ITAM Scope

      Focus on what’s most important and then document it so everyone understands where they can provide the most value.

      Not all categories of assets require the same level of tracking, and some equipment and software should be excluded from the ITAM practice entirely.

      In some organizations, portions of the environment won’t be tracked by the asset management team at all. For example, some organizations will choose to delegate tracking multi-function printers (MFPs) or proprietary IoT devices to the department or vendor that manages them.

      Due to resourcing or technical limitations, you may decide that certain equipment or software is out of scope for the moment.

      What do other organizations typically track in detail?
      • Installs and entitlements for major software contracts that represent significant spend and/or are highly critical to business goals.
      • Equipment managed directly by IT that needs to be refreshed on a regular cycle:
        • End-user devices such as laptops, desktops, and tablets.
        • Server, network, and telecoms devices.
      • High value equipment that is not regularly refreshed may also be tracked, but in less detail – for example, you may not refresh large screen TVs, but you may need to track date of purchase, deployed location, vendor, and model for insurance or warranty purposes.

      2.1 Establish scope for ITAM

      45 minutes

      Input: Organizational strategy documents

      Output: ITAM scope, in terms of types of assets tracked and not tracked

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Establish the hardware and software that are within the scope of the ITAM program by updating the tables below to reflect your own environment. The “out of scope” category will include asset types that may be of value to track in the future but for which the capability or need don’t exist today.

      Hardware Software Out of Scope
      • End-user devices housing data or with a dollar value of more than $300, which will be replaced through lifecycle refresh.
      • Infrastructure devices, including network, telecom, video conferencing, servers and more
      • End-user software purchased under contract
      • Best efforts on single license purchases
      • Infrastructure software, including solutions used by IT to manage the infrastructure
      • Enterprise applications
      • Cloud (SaaS, IaaS, PaaS)
      • Departmental applications
      • Open-source applications
      • In-house developed applications
      • Freeware & shareware
      • IoT devices

      The following locations will be included in the ITAM program: All North and South America offices and retail locations.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.2: Acquire ITAM Services

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Define the type of work that may be more effectively or efficiently delivered by an outsourcer or contractor.

      “We would like our clients to come to us with an idea of where they want to get to. Why are you doing this? Is it for savings? Because you want to manage your security attack surface? Are there digital initiatives you want to move forward? What is the end goal?” (Mike Austin, MetrixData 360)

      Effectively acquire ITAM services

      Allow your team to focus on strategic, value-add activities by acquiring services that free them from commodity tasks.
      • When determining which asset capabilities and activities are best kept in-house and which ones are better handled by a supplier, it is imperative to keep the value to the business in mind.
      • Activities/capabilities that are challenging to standardize and are critical to enabling business goals are better kept in-house.
      • Activities/capabilities that are (or should be) standardized and automated are ideal candidates for outsourcing.
      • Outsourcing can be effective and successful with a narrow scope of engagement and an alignment to business outcomes.
      • Organizations that heavily weigh cost reduction as a significant driver for outsourcing are far less likely to realize the value they expected to receive.
      Business Enablement
      • Supports business-aligned ITAM opportunities & priorities
      • Highly specialized
      • Offers competitive advantages
      Map with axes 'Business Enablement' and 'Vendor's Performance Advantage' for determining whether or not to outsource.
      Vendor’s Performance Advantage
      • Talent or access to skills
      • Economies of scale
      • Access to technology
      • Does not require deep knowledge of your business

      Decide what to outsource

      It’s rarely all or nothing.

      Ask yourself:
      • How important is this activity or capability to ITAM, IT, and business priorities and goals?
      • Is it a non-commodity IT service that can improve customer satisfaction?
      • Is it a critical service to the business and the specialized knowledge must remain in-house?
      • Does the function require access to talent or skills not currently available in-house, and is cost-prohibitive to obtain?
      • Are there economies of scale that can help us meet growing demand?
      • Does the vendor provide access to best-of-breed tools and solutions that can handle the integration, management, maintenance and support of the complete system?

      You may ultimately choose to engage a single vendor or a combination of multiple vendors who can best meet your ITAM needs.

      Establishing effective vendor management processes, where you can maximize the amount of service you receive while relying on the vendor’s expertise and ability to scale, can help you make your asset management practice a net cost-saver.

      ITAM activities and capabilities
      • Contract review
      • Software audit management
      • Asset tagging
      • Asset disposal and recycling
      • Initial ITAM record creation
      • End-user device imaging
      • End-user device deployment
      • End-user software provisioning
      • End-user image management
      • ITAM database administration
      • ELP report creation
      • ITAM process management
      • ITAM report generation
      ITAM-adjacent activities and capabilities
      • Tier 1 support/service desk
      • Deskside/field support
      • Tier 3 support
      • IT Procurement
      • Device management/managed IT services
      • Budget development
      • Applications development, maintenance
      • Infrastructure hosting (e.g. cloud or colocation)
      • Infrastructure management and support
      • Discovery/monitoring tools management and support

      2.2 Identify outsourcing opportunities

      1-2 hours

      Input: Understanding of current ITAM processes and challenges

      Output: Understanding of potential outsourcing opportunities

      Materials: The table in this slide, and insight in previous slides, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      At a high level, discuss which functions of ITAM are good candidates for outsourcing.

      Start with the previous slide for examples of outsourcing activities or capabilities directly related to or adjacent to the ITAM practice. Categorize these activities as follows:

      Outsource Potentially Outsource Insource
      • Asset disposal/recycling
      • ELP report creation
      • ITAM process management

      Go through the list of activities to potentially or definitely outsource and confirm:

      1. Will outsourcing solve a resourcing need for an existing process, or can you deliver this adequately in-house?
      2. Will outsourcing improve the effectiveness and efficiency of current processes? Will it deliver more effective service channels or improved levels of reliability and performance consistency?
      3. Will outsourcing provide or enable enhanced service capabilities that your IT customers could use, and which you cannot deliver in-house due to lack of scale or capacity?

      Answering “no” to more than one of these questions suggests a need to further review options to ensure the goals are aligned with the potential value of the service offerings available.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.3: Centralize or decentralize ITAM capabilities

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Outline where the team(s) responsible for ITAM sit across the organization, who they report to, and who they need to work with across IT and the business.

      Align ITAM with IT’s structure

      ITAM’s structure will typically align with the larger business and IT structure. The wrong structure will undermine your ability to meet ITAM goals and lead to frustration, missed work, inefficiency, and loss of value.

      Which of the four archetypes below reflects the structure you need?

      1. Centralized — ITAM is entirely centralized in a single function, which reports into a central IT department.
      2. Decentralized — Local IT groups are responsible and accountable for ITAM. They may coordinate informally but do not report to any central team.
      3. Hybrid-Shared Services — Local IT can opt in to shared services but must follow centrally set ITAM practices to do so, usually with support from a shared ITAM function.
      4. Hybrid-Federated — Local IT departments are free to develop their own approach to ITAM outside of core, centrally set requirements.

      Centralized ITAM

      Total coordination, control, and oversight

      • ITAM accountability, policies, tools, standards, and expertise – in this model, they’re all concentrated in a single, specialized IT asset management practice. Accountability, authority, and oversight are concentrated in the central function as well.
      • A central ITAM team will benefit from knowledge sharing and task specialization opportunities. They are a visible single point of contact for ITAM-related questions
      • The central ITAM team will coordinate ITAM activities across the organization to optimize spend, manage risk, and enhance service. Any local IT teams are supported by and directly answerable to the central ITAM team for ITAM activities.
      • There is a single, centrally managed ITAM database. Wherever possible, this database should be integrated with other tools to support cross-solution automation (e.g. integrate AD to automatically reflect user identity changes in the ITAM database).
      • This model drives cross-organization coordination and oversight, but it may not be responsive to specific and nuanced local requirements.
      Example: Centralized
      Example of a Centralized ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working or reporting relationship

      Decentralized ITAM

      Maximize choice

      • ITAM accountability and oversight are entirely devolved to local or regional IT and/or ITAM organizations, which are free to set their own priorities, goals, policies, and standards. This model maximizes the authority of local groups to build practices that meet local requirements.
      • It may be challenging to resource and mature local practices. ITAM maturity will vary from one local organization to the next.
      • It is more likely that ITAM managers are a part-time role, and sometimes even a non-IT role. Local ITAM teams or coordinators may coordinate and share knowledge informally, but specialization can be challenging to build or leverage effectively across the organization.
      • There is likely no central ITAM tool. Local tools may be acquired, implemented, and integrated by local IT departments to suit their own needs, which can make it very difficult to report on assets organization-wide – for example, to establish compliance on an enterprise software contract.
      Example: Decentralized


      Example of a Decentralized ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working or reporting relationship

      Blue dotted line. Informal working relationships, knowledge sharing

      Hybrid: Federation

      Centralization with a light touch

      • A middle ground between centralized and decentralized ITAM, this model balances centralized decision making, specialization, and governance with local autonomy.
      • A central team will define organization-wide ITAM goals, develop capabilities, policies, and standards, and monitor compliance by local and central teams. All local teams must comply with centrally defined requirements, but they can also develop further capabilities to meet local goals.
      • For example, there will typically be a central ITAM database that must be used for at least a subset of assets, but other teams may build their own databases for day-to-day operations and export data to the central database as required.
      • There are often overlapping responsibilities in this model. A strong collaborative relationship between central and local ITAM teams is especially important here, particularly after major changes to requirements, processes, tools, or staffing when issues and breakdowns are more likely.
      Example: Federation


      Example of a Federation ITAM.

      Solid line. Direct reporting relationship

      Purple solid line. Oversight/governance

      Dotted line. Dotted line working or reporting relationship

      Hybrid: Shared Services

      Optional centralization

      • A special case of federated ITAM that balances central control and local autonomy, but with more power given to local IT to opt out of centralized shared services that come with centralized ITAM requirements.
      • ITAM requirements set by the shared services team will support management, allocation, and may have showback or chargeback implications. Following the ITAM requirements is a condition of service. If a local organization chooses to stop using shared services, they are (naturally) no longer required to adhere to the shared services ITAM requirements.
      • As with the federated model, local teams may develop further capabilities to meet local goals.
      Example: Shared Services


      Example of a Shared Services ITAM.

      Solid line. Direct reporting relationship

      Dotted line. Dotted line working relationship

      Blue dotted line. Informal working relationships, knowledge sharing

      Structure data collection & analysis

      Consider the implications of structure on data.

      Why centralize?
      • There is a need to build reports that aggregate data on assets organization-wide, rather than just assets within a local environment.
      • Decentralized ITAM tracking isn’t producing accurate or usable data, even for local purposes.
      • Tracking tools have overlapping functionality. There’s an opportunity to rationalize spend, management and support for ITAM tools.
      • Contract centralization can optimize spend and manage risks, but only with the data required to manage those contracts.
      Why decentralize?
      • Tracking and reporting on local assets is sufficient to meet ITAM goals; there is limited or no need to track assets organization-wide.
      • Local teams have the skills to track and maintain asset data; subsidiaries have appropriate budgets and tools to support ITAM tracking.
      • Decentralized ITSM/ITAM tools are in place, populated, and accurate.
      • The effort to consolidate tools and processes may outweigh the benefits to data centralization.
      • Lots of variability in types of assets and the environment is stable.
      Requirements for success:
      • A centralized IT asset management solution is implemented and managed.
      • Local teams must understand the why and how of centralized data tracking and be held accountable for assigned responsibilities.
      • The asset tool should offer both centralized and localized views of the data.
      Requirements for success:
      • Guidelines and expectations for reporting to centralized asset management team will be well defined and supported.
      • Local asset managers will have opportunity to collaborate with others in the role for knowledge transfer and asset trading, where appropriate.

      Structure budget and contract management

      Contract consolidation creates economies of scale for vendor management and license pooling that strengthen your negotiating position with vendors and optimize spend.

      Why centralize?
      • Budgeting, governance, and accountability are already centralized. Centralized ITAM practices can support the existing governance practices.
      • Centralizing contract management and negotiation can optimize spend and/or deliver access to better service.
      • Centralize management for contracts that cover most of the organization, are highly complex, involve large spend and/or higher risk, and will benefit from specialization of asset staff.
      Why decentralize?
      • Budgeting, governance, and accountability rest with local organizations.
      • There may be increased need for high levels of customer responsiveness and support.
      • Decentralize contract management for contracts used only by local groups (e.g. a few divisions, a few specialized functions), and that are smaller, low risk, and come with standard terms and conditions.
      Requirements for success:
      • A centralized IT asset management solution is implemented and managed.
      • Contract terms must be harmonized across the organization.
      • Centralized fulfillment is as streamlined as possible. For example, software contracts should include the right to install at any time and pay through a true-up process.
      Requirements for success:
      • Any expectations for harmonization with the centralized asset management team will be well defined and supported.
      • Local asset managers can collaborate with other local ITAM leads to support knowledge transfer, asset swapping, etc.

      Structure technology management

      Are there opportunities to centralize or decentralize support functions?

      Why centralize?
      • Standard technologies are deployed organization-wide.
      • There are opportunities to improve service and optimize costs by consolidating knowledge, service contracts, and support functions.
      • Centralizing data on product supply allows for easier harvest and redeployment of assets by a central support team.
      • A stable, central support function can better support localized needs during seasonal staffing changes, mergers and acquisitions.
      Why decentralize?
      • Technology is unique to a local subset of users or customers.
      • Minimal opportunity for savings or better support by consolidating knowledge, service contracts, or support functions.
      • Refresh standards are set at a local level; new tech adoption may be impeded by a reliance on older technologies, local budget shortfalls, or other constraints.
      • Hardware may need to be managed locally if shipping costs and times can’t reasonably be met by a distant central support team.
      Requirements for success:
      • Ensure required processes, technologies, skills, and knowledge are in place to enable centralized support.
      • Keep a central calendar of contract renewals, including reminders to start work on the renewal no less than 90 days prior. Prioritize contracts with high dollar value or high risk.
      • The central asset management solution should be configured to provide data that can enable the central support team.
      Requirements for success:
      • Ensure required processes, technologies, skills, and knowledge are in place to enable decentralized support.
      • Decentralized support teams must understand and adhere to ITAM activities that are part of support work (e.g. data entry, data audits).
      • The central asset management solution should be configured to provide data that can enable the central support team, or decentralized asset solutions must be funded, and teams trained on their use.

      2.3 Review ITAM Structure

      1-2 hours

      Input: Understanding of current organizational structure, Understanding of challenges and opportunities related to the current structure

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Outline the current model for your organization and identify opportunities to centralize or decentralize ITAM-related activities.

      1. What model best describes how ITAM should be structured in your organization? Modify the slide outlining structure as a group to outline your own organization, as required.
      2. In the table below, outline opportunities to centralize or decentralize data tracking, budget and contract management, and technology management activities.
      Centralize Decentralize
      Data collection & analysis
      • Make better use of central ITAM database.
      • Support local IT departments building runbooks for data tracking during lifecycle activities (create templates, examples)
      Budget and contract management
      • Centralize Microsoft contracts.
      • Create a runbook to onboard new companies to MSFT contracts.
      • Create tools and data views to support local department budget exercises.
      Technology management
      • Ensure all end-user devices are visible to centrally managed InTune, ConfigMgr.
      • Enable direct shipping from vendor to local sites.
      • Establish disposal/pickup at local sites.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.4: Create a RACI

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Review the role of the IT asset manager.
      • Identify who’s responsible, accountable, consulted, and informed for key ITAM activities.

      Empower your asset manager

      The asset manager is the critical ITAM role. Ensure they’re positioned to succeed.

      There’s too much change in the technology and business environment to expect ITAM to be “a problem to solve.” It is a practice that requires care and feeding through regular iteration to achieve success. At the helm of this practice is your asset manager, whose approach and past experience will have a significant impact on how you approach ITAM.

      The asset manager role requires a variety of skills, knowledge, and abilities including:

      • Operations, process, and practice management.
      • An ability to communicate, influence, negotiate, and facilitate.
      • Organizational knowledge and relationship management.
      • Contract and license agreement analysis, attention to detail.
      • Natural curiosity and a willingness to learn.
      • A strong understanding of technologies in use by the organization, and how they fit into the asset management program.
      Where the asset manager sits in the organization will also have an impact on their focus and priorities. When the asset manager reports into a service team, their focus will often reflect their team’s focus: end-user devices and software, customer satisfaction, request fulfillment. Asset teams that report into a leadership or governance function will be more likely to focus on organization-wide assets, governance, budget management, and compliance.

      “Where your asset manager sits, and what past experience they have, is going to influence how they do asset management.” (Jeremy Boerger, Consultant & Author)

      “It can be annoying at times, but a good IT asset manager will poke their nose into activities that do not obviously concern them, such as programme and project approval boards and technical design committees. Their aim is to identify and mitigate ITAM risks BEFORE the technology is deployed as well as to ensure that projects and solutions ‘bake in’ the necessary processes and tools that ensure IT assets can be managed effectively throughout their lifecycle.” (Kylie Fowler, ITAM by Design, 2017)

      IT asset managers must have a range of skills and knowledge

      • ITAM Operations, Process, and Practice Management
        The asset manager is typically responsible for managing and improving the ITAM practice and related processes and tools. The asset manager may administer the ITAM tool, develop reports and dashboards, evaluate and implement new technologies or services to improve ITAM maturity, and more.
      • Organizational Knowledge
        An effective IT asset manager has a good understanding of your organization and its strategy, products, stakeholders, and culture.
      • Technology & Product Awareness
        An IT asset manager must learn about new and changing technologies and products adopted by the organization (e.g. IoT, cloud) and develop recommendations on how to track and manage them via the ITAM practice.
      A book surrounded by icons corresponding to the bullet points.
      • People Management
        Asset managers often manage a team directly and have dotted-line reports across IT and the business.
      • Communication
        Important in any role, but particularly critical where learning, listening, negotiation, and persuasion are so critical.
      • Finance & Budgeting
        A foundational knowledge of financial planning and budgeting practices is often helpful, where the asset manager is asked to contribute to these activities.
      • Contract Review & Analysis
        Analyze new and existing contracts to evaluate changes, identify compliance requirements, and optimize spend.

      Assign ITAM responsibilities and accountabilities

      Align authority and accountability.
      • A RACI exercise will help you discuss and document accountability and responsibility for critical ITAM activities.
      • When responsibility and accountability are not currently well documented, it’s often useful to invite a representative of the roles identified to participate in this alignment exercise. The discussion can uncover contrasting views on responsibility and governance, which can help you build a stronger management and governance model.
      • The RACI chart can help you identify who should be involved when making changes to a given activity. Clarify the variety of responsibilities assigned to each key role.
      • In the future, you may need to define roles in more detail as you change your hardware and software asset management procedures.

      R

      Responsible: The person who actually gets the job done.

      Different roles may be responsible for different aspects of the activity relevant to their role.

      A

      Accountable: The one role accountable for the activity (in terms completion, quality, cost, etc.)

      Must have sufficient authority to be held accountable; responsible roles are often accountable to this role.

      C

      Consulted: Must have the opportunity to provide meaningful input at certain points in the activity.

      Typically, subject matter experts or stakeholders. The more people you must consult, the more overhead and time you’ll add to a process.

      I

      Informed: Receives information regarding the task, but has no requirement to provide feedback.

      Information might relate to process execution, changes, or quality.

      2.4 Conduct a RACI Exercise

      1-2 hours

      Input: An understanding of key roles and activities in ITAM practices, An understanding of your organization, High-level structure of your ITAM program

      Output: A RACI diagram for IT asset management

      Materials: The table in the next slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      Let’s face it – RACI exercises can be dry. We’ve found that the approach below is more collaborative, engaging, and effective compared to filling out the table as a large group.

      1. Create a shared working copy of the RACI charts on the following slides (e.g. write it out on a whiteboard or provide a link to this document and work directly in it).
      2. Review the list of template roles and activities as a group. Add, change, or remove roles and activities from the table as needed.
      3. Divide into small groups. Assign each group a set of roles, and have them define whether that role is accountable, responsible, consulted, or informed for each activity in the chart. Refer to the previous slide for context on RACI. Give everyone 15 minutes to update their section of the chart.
      4. Come back together as a large group to review the chart. First, check for accountability – there should generally be just one role accountable for each activity. Then, have each small group walk through their section, and encourage participants to ask questions. Is there at least one role responsible for each task, and what are they responsible for? Does everyone listed as consulted or informed really need to be? Make any necessary adjustments.

      Add your results to your copy of the ITAM Strategy Template

      Define ITAM governance activities

      RACI Chart for ITAM governance activities. In the first column is a list of governance activities, and the row headers are positions within a company. Fields are marked with an R, A, C, or I.

      Document asset management responsibilities and accountabilities

      RACI Chart for ITAM asset management responsibilities and accountabilities. In the first column is a list of responsibilities and accountabilities, and the row headers are positions within a company. Fields are marked with an R, A, C, or I.

      Step 2.5: Align ITAM with other Service Management Practices

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Establish shared and separate responsibilities for asset and configuration management.
      • Identify how ITAM can support other practices, and how other practices can support ITAM.

      Asset vs. Configuration

      Asset and configuration management look at the same world through different lenses.
      • IT asset management tends to focus on each IT asset in its own right: assignment or ownership, its lifecycle, and related financial obligations and entitlements.
      • Configuration management is focused on configuration items (CIs) that must be managed to deliver a service and the relationships and integrations to other CIs.
      • ITAM and configuration management teams and practices should work closely together. Though asset and configuration management focus on different outcomes, they tend use overlapping tools and data sets. Each practice, when working effectively, can strengthen the other.
      • Many objects will exist in both the CMDB and AMDB, and the data on those shared objects will need to be kept in sync.
      Asset and Configuration Management: An Example

      Configuration Management Database (CMDB)

      A database of uniquely identified configuration items (CIs). Each CI record may include information on:
      Service Attributes

      Supported Service(s)
      Service Description, Criticality, SLAs
      Service Owners
      Data Criticality/Sensitivity

      CI Relationships

      Physical Connections
      Logical Connections
      Dependencies

      Arrow connector.

      Discovery, Normalization, Dependency Mapping, Business Rules*

      Manual Data Entry

      Arrow connector.
      This shared information could be attached to asset records, CI records, or both, and it should be synchronized between the two databases where it’s tracked in both.
      Hardware Information

      Serial, Model and Specs
      Network Address
      Physical Location

      Software Installations

      Hypervisor & OS
      Middleware & Software
      Software Configurations

      Arrow connector.

      Asset Management Database (AMDB)

      A database of uniquely identified IT assets. Each asset record may include information on:
      Procurement/Purchasing

      Purchase Request/Purchase Order
      Invoice and Cost
      Cost Center
      Vendor
      Contracts and MSAs
      Support/Maintenance/Warranties

      Asset Attributes

      Model, Title, Product Info, License Key
      Assigned User
      Lifecycle Status
      Last ITAM Audit Date
      Certificate of Disposal

      Arrows connecting multiple fields.

      IT Security Systems

      Vulnerability Management
      Threat Management
      SIEM
      Endpoint Protection

      IT Service Management (ITSM) System

      Change Tickets
      Request Tickets
      Incident Tickets
      Problem Tickets
      Project Tickets
      Knowledgebase

      Financial System/ERP

      General Ledger
      Accounts Payable
      Accounts Receivable
      Enterprise Assets
      Enterprise Contract Database

      (*Discovery, dependency mapping, and data normalization are often features or modules of configuration management, asset management, or IT service management tools.)

      2.5 Integrate ITAM and configuration practices

      45 minutes

      Input: Knowledge of the organization’s configuration management processes

      Output: Define how ITAM and configuration management will support one another

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Configuration manager

      Work through the table below to identify how you will collaborate and synchronize data across ITAM and configuration management practices and tools.

      What are the goals (if any currently exist) for the configuration management practice? Connect configuration items to services to support service management.
      How will configuration and asset management teams collaborate? Weekly status updates. As-needed working sessions.
      Shared visibility on each others’ Kanban tracker.
      Create tickets to raise and track issues that require collaboration or attention from the other team.
      How can config leverage ITAM? Connect CIs to financial, contractual, and ownership data.
      How can ITAM leverage config? Connect assets to services, changes, incidents.
      What key fields will be primarily tracked/managed by ITAM? Serial number, unique ID, user, location, PO number, …
      What key fields will be primarily tracked/managed by configuration management? Supported service(s), dependencies, service description, service criticality, network address…

      Add your results to your copy of the ITAM Strategy Template

      ITAM supports service management

      Decoupling asset management from other service management practices can result in lost value. Establish how asset management can support other service management practices – and how those practices can support ITAM.

      Incident Management

      What broke?
      Was it under warranty?
      Is there a service contract?
      Was it licensed?
      Who was it assigned to?
      Is it end-of-life?

      ITAM
      Practice

      Request Management

      What can this user request or purchase?
      What are standard hardware and software offerings?
      What does the requester already have?
      Are there items in inventory to fulfil the request?
      Did we save money by reissuing equipment?
      Is this a standard request?
      What assets are being requested regularly?

      What IT assets are related to the known issue?
      What models and vendors are related to the issue?
      Are the assets covered by a service contract?
      Are other tickets related to this asset?
      What end-of-life assets have been tied to incidents recently?

      Problem Management

      What assets are related to the change?
      Is the software properly licensed?
      Has old equipment been properly retired and disposed?
      Have software licenses been returned to the pool?
      Is the vendor support on the change part of a service contract?

      Change Enablement

      2.5. Connect with other IT service practices

      45 minutes

      Input: Knowledge of existing organizational IT service management processes

      Output: Define how ITAM will help other service management processes, and how other service management processes will help ITAM

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Service leads

      Complete the table below to establish what ITAM can provide to other service management practices, and what other practices can provide to ITAM.

      Practice ITAM will help Will help ITAM
      Incident Management Provide context on assets involved in an incident (e.g. ownership, service contracts). Track when assets are involved in incidents (via incident tickets).
      Request Management Oversee request & procurement processes. Help develop asset standards. Enter new assets in ITAM database.
      Problem Management Collect information on assets related to known issues. Report back on models/titles that are generating known issues.
      Change Enablement Provide context on assets for change review. Ensure EOL assets are retired and licenses are returned during changes.
      Capacity Management Identify ownership, location for assets at capacity. Identify upcoming refreshes or purchases.
      Availability Management Connect uptime and reliability to assets. Identify assets that are causing availability issues.
      Monitoring and Event Management Provide context to events with asset data. Notify asset of unrecognized software and hardware.
      Financial Management Establish current and predict future spending. Identify upcoming purchases, renewals.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.6: Evaluate ITAM tools and integrations

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • Create a list of the ITAM tools currently in use, how they’re used, and their current limitations.
      • Identify new tools that could provide value to the ITAM practice, and what needs to be done to acquire and implement them.

      “Everything is connected. Nothing is also connected.” (Dirk Gently’s Holistic Detective Agency)

      Establish current strengths and gaps in your ITAM toolset

      ITAM data quality relies on tools and integrations that are managed by individuals or teams who don’t report directly to the ITAM function.

      Without direct line of sight into tools management, the ITAM team must influence rather than direct improvement initiatives that are in some cases critical to the performance of the ITAM function. To more effectively influence improvement efforts, you must explicitly identify what you need, why you need it, from which tools, and from which stakeholders.

      Data Sources
      Procurement Tools
      Discovery Tools
      Active Directory
      Purchase Documents
      Spreadsheets
      Input To Asset System(s) of Record
      ITAM Database
      ITSM Tool
      CMDB
      Output To Asset Data Consumption
      ITFM Tools
      Security Tools
      TEM Tools
      Accounting Tools
      Spreadsheets
      “Active Directory plays a huge role in audit defense and self-assessment, but no-one really goes out there and looks at Active Directory.

      I was talking to one organization that has 1,600,000 AD records for 100,000 employees.” (Mike Austin, Founder, MetrixData 360)

      2.6 Evaluate ITAM existing technologies

      30 minutes

      Input: Knowledge of existing ITAM tools

      Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Identify the use, limitations, and next steps for existing ITAM tools, including those not directly managed by the ITAM team.

      1. What tools do we have today?
      2. What are they used for? What are their limitations?
      3. Who manages them?
      4. What actions could we take to maximize the value of the tools?
      Existing Tool Use Constraints Owner Proposed Action?
      ITAM Module
      • Track HW/SW
      • Connect assets to incident, request
      • Currently used for end-user devices only
      • Not all divisions have access
      • SAM capabilities are limited
      ITAM Team/Service Management
      • Add license for additional read/write access
      • Start tracking infra in this tool
      Active Directory
      • Store user IDs, organizational data
      Major data quality issues IT Operations
      • Work with AD team to identify issues creating data issues

      Add your results to your copy of the ITAM Strategy Template

      2.6 Identify potential new tools

      30 minutes

      Input: Knowledge of tooling gaps, An understanding of available tools that could remediate gaps

      Output: New tools that can improve ITAM capabilities, including expected value and proposed next steps

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers

      Identify tools that are required to support the identified goals of the ITAM practice.

      1. What types of tools do we need that we don’t have?
      2. What could these tools help us do?
      3. What needs to be done next to investigate or acquire the appropriate tool?
      New Tool Expected Value Proposed Next Steps
      SAM tool
      • Automatically calculate licensing entitlements from contract data.
      • Automatically calculate licensing requirements from discovery data.
      • Support gap analyses.
      • Further develop software requirements.
      • Identify vendors in the space and create a shortlist.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.7: Create a plan for internal and external audits

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Establish your approach to internal data audits.
      • Create a high-level response plan for external audits.

      Validate ITAM data via internal audits

      Data audits provide assurance that the records in the ITAM database are as accurate as possible. Consider these three approaches:

      Compare Tool Records

      Audit your data by comparing records in the ITAM system to other discovery sources.

      • Ideally, use three separate data sources (e.g. ITAM database, discovery tool, security tool). Use a common field, such as the host name, to compare across fields. (To learn more about discovery tool analysis, see Jeremy Boerger’s book, Rethinking IT Asset Management.)
      • Run reports to compare records and identify discrepancies. This could include assets missing from one system or metadata differences such as different users or installed software.
      • Over time, discrepancies between tools should be well understood and accepted; otherwise, they should be addressed and remediated.
      IT-led Audit

      Conduct a hands-on investigation led by ITAM staff and IT technicians.

      • In-person audits require significant effort and resources. Each audit should be scoped and planned ahead of time to focus on known problem areas.
      • Provide the audit team with exact instructions on what needs to be verified and recorded. Depending on the experience and attention to detail of the audit team, you may need to conduct spot checks to ensure you’re catching any issues in the audit process itself.
      • Automation should be used wherever possible (e.g. through barcodes, scanners, and tables for quick access to ITAM records).
      User-led audit

      Have users validate the IT assets assigned to them.

      • Even more than IT-led audits: don’t use this approach too frequently; keep the scope as narrow as possible and the process as simple as possible.
      • Ensure users have all the information and tools they’ll need readily available to complete this task, or the result will be ineffective and will only frustrate your users.
      • Consider a process integrated with your ITSM tool: once a year, when a user logs in to the portal, they will be asked to enter the asset code for their laptop (and provided with instructions on where to find that code). Investigate discrepancies between assignments and ITAM records.

      2.7 Set an approach to internal data audits

      30 minutes

      Input: An understanding of current data audit capabilities and needs

      Output: An outline of how you’ll approach data audits, including frequency, scope, required resources

      Materials: Your copy of the ITAM Strategy Template

      Participants: ITAM team

      Review the three internal data audit approaches outlined on the previous slide, and identify which of the three approaches you’ll use. For each approach, complete the fields in the table below.

      Audit Approach How often? What scope? Who’s involved? Comments
      Compare tool records Monthly Compare ITAM DB, Intune/ConfigMgr, and Vulnerability Scanner Data; focus on end-user devices to start Asset manager will lead at first.
      Work with tool admins to pull data and generate reports.
      IT-led audit Annual End-user devices at a subset of locations Asset manager will work with ITSM admins to generate reports. In-person audit to be conducted by local techs.
      User-led audit Annual Assigned personal devices (start with a pilot group) Asset coordinator to develop procedure with ITSM admin. Run pilot with power users first.

      Add your results to your copy of the ITAM Strategy Template

      Prepare for and respond to external audits and true-ups

      Are you ready when software vendors come knocking?

      • Vendor audits are expensive.
      • If you’re out of compliance, you will at minimum be required to pay the missing license fees. At their discretion, vendors may choose to add punitive fees and require you to cover the hourly cost of their audit teams. If you choose not to pay, the vendor could secure an injunction to cut off your service, which in many cases will be far more costly than the fines. And this is aside from the intangible costs of the disruption to your business and damaged relationships between IT, ITAM, your business, and other partners.
      • Having a plan to respond to an audit is critical to reducing audit risk. Preparation will help you coordinate your audit response, ensure the audit happens on the most favorable possible terms, and even prevent some audits from happening in the first place.
      • The best defense, as they say, is a good offense. Good ITAM and SAM processes will allow you to track acquisition, allocation, and disposal of software licenses; understand your licensing position; and ensure you remain compliant whenever possible. The vendor has no reason to audit you when there’s nothing to find.
      • Know when and where your audit risk is greatest, so you can focus your resources where they can deliver the most value.
      “If software audits are a big part of your asset operations, you have problems. You can reduce the time spent on audits and eliminate some audits by having a proactive ITAM practice.” (Sandi Conrad, Principal Research Director)

      Info-Tech Insight

      Audit defense starts long before you get audited. For an in-depth review of your audit approach, see Info-Tech’s Prepare and Defend Against a Software Audit.

      Identify areas of higher audit risk

      Watch for these warning signs
      • Your organization is visibly fighting fires. Signs of disorder may signal to vendors that there are opportunities to exploit via an audit. Past audit failures make future audits more likely.
      • You are looking for ways to decrease spend. Vendors may counter attempts to true-down licensing by launching an audit to try to find unlicensed software that provides them leverage to negotiate maintained or even increased spending.
      • Your license/contract terms with the vendor are particularly complex or highly customized. Very complex terms may make it harder to validate your own compliance, which may present opportunities to the vendor in an audit.
      • The vendor has earned a reputation for being particularly aggressive with audits. Some vendors include audits as a standard component of their business model to drive revenue. This may include acquiring smaller vendors or software titles that may not have been audit-driven in the past, and running audits on their new customer base.

      “The reality is, software vendors prey on confusion and complication. Where there’s confusion, there’s opportunity.” (Mike Austin, Founder, MetrixData 360)

      Develop an audit response plan

      You will be on the clock once the vendor sends you an audit request. Have a plan ready to go.
      • Don’t panic: Resist knee-jerk reactions. Follow the plan.
      • Form an audit response team and centralize your response: This team should be led by a member of the ITAM group, and it should include IT leadership, software SMEs, representatives from affected business areas, vendor management, contract management, and legal. You may also need to bring on a contractor with deep expertise with the vendor in question to supplement your internal capabilities. Establish clearly who will be the point of contact with the vendor during the audit.
      • Clarify the scope of the audit: Clearly establish what the audit will cover – what products, subsidiaries, contracts, time periods, geographic regions, etc. Manage the auditors to prevent scope creep.
      • Establish who covers audit costs: Vendors may demand the auditee cover the hourly cost of their audit team if you’re significantly out of compliance. Consider asking the vendor to pay for your team’s time if you’re found to be compliant.
      • Know your contract: Vendors’ contracts change over time, and it’s no guarantee that even your vendor’s licensing experts will be aware of the rights you have in your contract. You must know your entitlements to negotiate effectively.
      1. Bring the audit request received to the attention of ITAM and IT leadership. Assemble the response team.
      2. Acknowledge receipt of audit notice.
      3. Negotiate timing and scope of the audit.
      4. Direct staff not to remove or acquire licenses for software under audit without directly involving the ITAM team first.
      5. Gather installation data and documentation to establish current entitlements, including original contract, current contract, addendums, receipts, invoices.
      6. Compare entitlements to installed software.
      7. Investigate any anomalies (e.g. unexpected or non-compliant software).
      8. Review results with the audit response team.

      2.7 Clarify your vendor audit response plan

      1 hour

      Input: Organizational knowledge on your current audit response procedures

      Output: Audit response team membership, High-level audit checklist, A list of things to start, stop, and continue doing as part of the audit response

      Materials: Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      1. Who’s on the audit response team, and what’s their role? Who will lead the team? Who will be the point of contact with the auditor?
      2. What are the high-level steps in our audit response workflow? Use the example checklist below as a starting point.
      3. What do we need to start, stop, and continue doing in response to audit requests?

      Example Audit Checklist

      • Bring the audit request received to the attention of ITAM and IT leadership. Assemble the response team.
      • Acknowledge receipt of audit notice.
      • Negotiate timing and scope of the audit.
      • Direct staff not to remove or acquire licenses for software under audit without directly involving the ITAM team first.
      • Gather installation data and documentation to establish current entitlements, including original contract, current contract, addendums, receipts, invoices.
      • Compare entitlements to installed software.
      • Investigate any anomalies (e.g. unexpected or non-compliant software).
      • Review results with the audit response team.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.8: Improve budget processes

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers
      • ITAM business partners

      Outcomes

      • Identify what you need to start, stop, and continue to do to support budgeting processes.

      Improve budgeting and forecasting

      Insert ITAM into budgeting processes to deliver significant value.

      Some examples of what ITAM can bring to the budgeting table:
      • Trustworthy data on deployed assets and spending obligations tied to those assets.
      • Projections of hardware due for replacement in terms of quantity and spend.
      • Knowledge of IT hardware and software contract terms and pricing.
      • Lists of unused or underused hardware and software that could be redeployed to avoid spend.
      • Comparisons of spend year-over-year.

      Being part of the budgeting process positions ITAM for success in other ways:

      • Helps demonstrate the strategic value of the ITAM practice.
      • Provides insight into business and IT strategic projects and priorities for the year.
      • Strengthens relationships with key stakeholders, and positions the ITAM team as trusted partners.

      “Knowing what you have [IT assets] is foundational to budgeting, managing, and optimizing IT spend.” (Dave Kish, Info-Tech, Practice Lead, IT Financial Management)

      Stock image of a calculator.

      2.8 Build better budgets

      20 minutes

      Input: Context on IT budgeting processes

      Output: A list of things to start, stop, and continue doing as part of budgeting exercises

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, ITAM business partners

      What should we start, stop, and continue doing to support organizational budgeting exercises?

      Start Stop Continue
      • Creating buckets of spend and allocating assets to those buckets.
      • Zero-based review on IaaS instances quarterly.
      • Develop dashboards plugged into asset data for department heads to view allocated assets and spend.
      • Create value reports to demonstrate hard savings as well as cost avoidance.
      • Waiting for business leaders to come to us for help (start reaching out with reports proactively, three months before budget cycle).
      • % increases on IT budgets without further review.
      • Monthly variance budget analysis.
      • What-if analysis for asset spend based on expected headcount increases.

      Add your results to your copy of the ITAM Strategy Template

      Step 2.9: Establish a documentation framework

      Participants

      • Project sponsor and lead facilitator
      • ITAM team

      Outcomes

      • Identify key documentation and gaps in your documentation.
      • Establish where documentation should be stored, who should own it, who should have access, and what should trigger a review.

      Create ITAM documentation

      ITAM documentation will typically support governance or operations.

      Long-term planning and governance
      • ITAM policy and/or related policies (procurement policy, security awareness policy, acceptable use policy, etc.)
      • ITAM strategy document
      • ITAM roadmap or burndown list
      • Job descriptions
      • Functional requirements documents for ITAM tools

      Operational documentation

      • ITAM SOPs (hardware, software) and workflows
      • Detailed work instructions/knowledgebase articles
      • ITAM data/records
      • Contracts, purchase orders, invoices, MSAs, SOWs, etc.
      • Effective Licensing Position (ELP) reports
      • Training and communication materials
      • Tool and integration documentation
      • Asset management governance, operations, and tools typically generate a lot of documentation.
      • Don’t create documentation for the sake of documentation. Prioritize building and maintaining documentation that addresses major risks or presents opportunities to improve the consistency and reliability of key processes.
      • Maximize the value of ITAM documentation by ensuring it is as current, accessible, and usable as it needs to be.
      • Clearly identify where documentation is stored and who should have access to it.
      • Identify who is accountable for the creation and maintenance of key documentation, and establish triggers for reviews, updates, and changes.

      Consider ITAM policies

      Create policies that can and will be monitored and enforced.
      • Certain requirements of the ITAM practice may need to be backed up by corporate policies: formal statements of organizational expectations that must be recognized by staff, and which will lead to sanctions/penalties if breached.
      • Some organizations will choose to create one or more ITAM-specific policies. Others will include ITAM-related statements in other existing policies, such as acceptable use policies, security training and awareness policies, procurement policies, configuration policies, e-waste policies, and more.
      • Ensure that you are prepared to monitor compliance with policies and evenly enforce breaches of policy. Failing to consistently enforce your policies exposes you and your organization to claims of negligence or discriminatory conduct.
      • For a template for ITAM-specific policies, see Info-Tech’s policy templates for Hardware Asset Management and Software Asset Management.

      2.9 Establish documentation gaps

      15-30 minutes

      Input: An understanding of existing documentation gaps and risks

      Output: Documentation gaps, Identified owners, repositories, access rights, and review/update protocols

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, Optional: IT managers, ITAM business partners

      Discuss and record the following:

      • What planning/governance, operational, and tooling documentation do we still need to create? Who is accountable for the creation and maintenance of these documents?
      • Where will the documentation be stored? Who can access these documents?
      • What will trigger reviews or changes to the documents?
      Need to Create Owner Stored in Accessible by Trigger for review
      Hardware asset management SOP ITAM manager ITAM SharePoint site › Operating procedures folder
      • All IT staff
      • Annual review
      • As-needed for major tooling changes that require a documentation update

      Add your results to your copy of the ITAM Strategy Template

      Step 2.10: Create a roadmap and communication plan

      Participants

      • Project sponsor and lead facilitator
      • ITAM team
      • IT leaders and managers

      Outcomes

      • A timeline of key ITAM initiatives.
      • Improvement ideas aligned to key initiatives.
      • A communication plan tailored to key stakeholders.
      • Your ITAM Strategy document.

      “Understand that this is a journey. This is not a 90-day project. And in some organizations, these journeys could be three or five years long.” (Mike Austin, MetrixData 360)

      2.10 Identify key ITAM initiatives

      30-45 minutes

      Input: Organizational strategy documents

      Output: A roadmap that outlines next steps

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Project sponsor

      1. Identify key initiatives that are critical to improving practice maturity and meeting business goals.
      2. There should only be a handful of really key initiatives. This is the work that will have the greatest impact on your ability to deliver value. Too many initiatives muddy the narrative and can distract from what really matters.
      3. Plot the target start and end dates for each initiative in the business and IT transformation timeline you created in Phase 1.
      4. Review the chart and consider – what new capabilities should the ITAM practice have once the identified initiatives are complete? What transformational initiatives will you be better positioned to support?

      Add your results to your copy of the ITAM Strategy Template

      Transformation Timeline

      Example transformation timeline with row headers 'Business Inititiaves', 'IT Initiatives', and 'ITAM Initiatives'. Each initiative is laid out along the timeline appropriately.

      2.10 Align improvement ideas to initiatives

      45 minutes

      Input: Key initiatives, Ideas for ITAM improvement collected over the course of previous exercises

      Output: Concrete action items to support each initiative

      Materials: The table in the next slide, Your copy of the ITAM Strategy Template

      Participants: ITAM team, IT leaders and managers, Project sponsor

      As you’ve been working through the previous exercises, you have been tracking ideas for improvement – now we’ll align them to your roadmap.

      1. Review the list of ideas for improvement you’ve produced over the working sessions. Consolidate the list – are there any ideas that overlap or complement each other? Record any new ideas. Frame each idea as an action item – something you can actually do.
      2. Connect the action items to initiatives. It may be that not every action item becomes part of a key initiative. (Don’t lose ideas that aren’t part of key initiatives – track them in a separate burndown list or backlog.)
      3. Identify a target completion date and owner for each action item that’s part of an initiative.

      Add your results to your copy of the ITAM Strategy Template

      Example ITAM initiatives

      Initiative 1: Develop hardware/software standards
      Task Target Completion Owner
      Laptop standards Q1-2023 ITAM manager
      Identify/eliminate contracts for unused software using scan tool Q2-2023 ITAM manager
      Review O365 license levels and standard service Q3-2023 ITAM manager

      Initiative 2: Improve ITAM data quality
      Task Target Completion Owner
      Implement scan agent on all field laptops Q3-2023 Desktop engineer
      Conduct in person audit on identified data discrepancies Q1-2024 ITAM team
      Develop and run user-led audit Q1-2024 Asset manager

      Initiative 3: Acquire & implement a new ITAM tool
      Task Target Completion Owner
      Select an ITAM tool Q3-2023 ITAM manager
      Implement ITAM tool, incl. existing data migration Q1-2024 ITAM manager
      Training on new tool Q1-2024 ITAM manager
      Build KPIs, executive dashboards in new tool Q2-2024 Data analyst
      Develop user-led audit functionality in new tool Q3-2024 ITAM coordinator

      2.10 Create a communication plan

      45 minutes

      Input: Proposed ITAM initiatives, Stakeholder priorities and goals, and an understanding of how ITAM can help them meet those goals

      Output: A high-level communication plan to communicate the benefits and impact of proposed changes to the ITAM program

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: IT asset manager, Project sponsor

      Develop clear, consistent, and targeted messages to key ITAM stakeholders.

      1. Modify the list of stakeholders in the first column.
      2. What benefits should those stakeholders realize from ITAM? What impact may the proposed improvements have on them? Refer back to exercises from Phase 1, where you identified key stakeholders, their priorities, and how ITAM could help them.
      3. Identify communication channels (in-person, email, all-hands meeting, etc.) and timing – when you’ll distribute the message. You may choose to use more than one channel, and you may need to convey the message more than once.
      Group ITAM Benefits Impact Channel(s) Timing
      CFO
      • More accurate IT spend predictions
      • Better equipment utilization and value for money
      • Sponsor integration project between ITAM DB and financial system
      • Support procurement procedures review
      Face-to-face – based on their availability Within the next month
      CIO
      • Better oversight into IT spend
      • Data to help demonstrate IT value
      • Resources required to support tool and ITAM process improvements
      Standing bi-monthly 1:1 meetings Review strategy at next meeting
      IT Managers
      Field Techs

      Add your results to your copy of the ITAM Strategy Template

      2.10 Put the final touches on your ITAM Strategy

      30 minutes

      Input: Proposed ITAM initiatives, Stakeholder priorities and goals, and an understanding of how ITAM can help them meet those goals

      Output: A high-level communication plan to communicate the benefits and impact of proposed changes to the ITAM program

      Materials: The table in this slide, Your copy of the ITAM Strategy Template

      Participants: IT asset manager, Project sponsor

      You’re almost done! Do a final check of your work before you send a copy to your participants.

      1. Summarize in three points the key findings from the activities you’ve worked through. What have you learned? What are your priorities? What key message do you need to get across? Add these to the appropriate slide near the start of the ITAM Strategy Template.
      2. What are your immediate next steps? Summarize no more than five and add them to the appropriate slide near the start of the ITAM Strategy Template.
        1. Are you asking for something? Approval for ITAM initiatives? Funding? Resources? Clearly identify the ask as part of your next steps.
      3. Are the KPIs identified in Phase 1 still valid? Will they help you monitor for success in the initiatives you’ve identified in Phase 2? Make any adjustments you think are required to the KPIs to reflect the additional completed work.

      Add your results to your copy of the ITAM Strategy Template

      Research Contributors and Experts

      Kylie Fowler
      Principal Consultant
      ITAM Intelligence

      Kylie is an experienced ITAM/FinOps consultant with a track record of creating superior IT asset management frameworks that enable large companies to optimize IT costs while maintaining governance and control.

      She has operated as an independent consultant since 2009, enabling organizations including Sainsbury's and DirectLine Insurance to leverage the benefits of IT asset management and FinOps to achieve critical business objectives. Recent key projects include defining an end-to-end SAM strategy, target operating model, policies and processes which when implemented provided a 300% ROI.

      She is passionate about supporting businesses of all sizes to drive continuous improvement, reduce risk, and achieve return on investment through the development of creative asset management and FinOps solutions.

      Rory Canavan
      Owner and Principal Consultant
      SAM Charter

      Rory is the founder, owner, and principal consultant of SAM Charter, an internationally recognized consultancy in enterprise-wide Software & IT Asset Management. As an industry leader, SAM Charter is uniquely poised to ensure your IT & SAM systems are aligned to your business requirements.

      With a technical background in business and systems analysis, Rory has a wide range of first-hand experience advising numerous companies and organizations on the best practices and principles pertaining to software asset management. This experience has been gained in both military and civil organizations, including the Royal Navy, Compaq, HP, the Federation Against Software Theft (FAST), and several software vendors.

      Research Contributors and Experts

      Jeremy Boerger
      Founder, Boerger Consulting
      Author of Rethinking IT Asset Management

      Jeremy started his career in ITAM fighting the Y2K bug at the turn of the 21st century. Since then, he has helped companies in manufacturing, healthcare, banking, and service industries build and rehabilitate hardware and software asset management practices.

      These experiences prompted him to create the Pragmatic ITAM method, which directly addresses and permanently resolves the fundamental flaws in current ITAM and SAM implementations.

      In 2016, he founded Boerger Consulting, LLC to help business leaders and decision makers fully realize the promises a properly functioning ITAM can deliver. In his off time, you will find him in Cincinnati, Ohio, with his wife and family.

      Mike Austin
      Founder and CEO
      MetrixData 360

      Mike Austin leads the delivery team at MetrixData 360. Mike brings more than 15 years of Microsoft licensing experience to his clients’ projects. He assists companies, from Fortune 500 to organizations with as few as 500 employees, with negotiations of Microsoft Enterprise Agreements (EA), Premier Support Contracts, and Select Agreements. In addition to helping negotiate contracts, he helps clients build and implement software asset management processes.

      Previously, Mike was employed by Microsoft for more than 8 years as a member of the global sales team. With Microsoft, Mike successfully negotiated more than a billion dollars in new and renewal EAs. Mike has also negotiated legal terms and conditions for all software agreements, developed Microsoft’s best practices for global account management, and was awarded Microsoft’s Gold Star Award in 2003 and Circle of Excellence in 2008 for his contributions.

      Bibliography

      “Asset Management.” SFIA v8. Accessed 17 March 2022.

      Boerger, Jeremy. Rethinking IT Asset Management. Business Expert Press, 2021.

      Canavan, Rory. “C-Suite Cheat Sheet.” SAM Charter, 2021. Accessed 17 March 2022.

      Fisher, Matt. “Metrics to Measure SAM Success.” Snow Software, 26 May 2015. Accessed 17 March 2022.

      Flexera (2021). “State of ITAM Report.” Flexera, 2021. Accessed 17 March 2022.

      Fowler, Kylie. “ITAM by design.” BCS, The Chartered Institute for IT, 2017. Accessed 17 March 2022.

      Fowler, Kylie. “Ch-ch-ch-changes… Is It Time for an ITAM Transformation?” ITAM Intelligence, 2021. Web. Accessed 17 March 2022.

      Fowler, Kylie. “Do you really need an ITAM policy?” ITAM Accelerate, 15 Oct. 2021. Accessed 17 March 2022.

      Hayes, Chris. “How to establish a successful, long-term ITAM program.” Anglepoint, Sept. 2021. Accessed 17 March 2022.

      ISO/IEC 19770-1-2017. IT Asset Management Systems – Requirements. Third edition. ISO, Dec 2017.

      Joret, Stephane. “IT Asset Management: ITIL® 4 Practice Guide”. Axelos, 2020.

      Jouravlev, Roman. “IT Service Financial Management: ITIL® 4 Practice Guide”. Axelos, 2020.

      Pagnozzi, Maurice, Edwin Davis, Sam Raco. “ITAM Vs. ITSM: Why They Should Be Separate.” KPMG, 2020. Accessed 17 March 2022.

      Rumelt, Richard. Good Strategy, Bad Strategy. Profile Books, 2013.

      Stone, Michael et al. “NIST SP 1800-5 IT Asset Management.” Sept, 2018. Accessed 17 March 2022.

      Optimize Your Software Selection Process: Why 5 and 30 Are the Magic Numbers

      • Buy Link or Shortcode: {j2store}607|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation
      • Software selection takes forever. The process of choosing even the smallest apps can drag on for years: sometimes in perpetuity. Software selection teams are sprawling, leading to scheduling slowdowns and scope creep. Moreover, cumbersome or ad hoc selection processes lead to business-driven software selection.

      Our Advice

      Critical Insight

      • Maximize project effectiveness with a five-person team. Project satisfaction and effectiveness is stagnant or decreases once the team grows beyond five people.
      • Tight project timelines are critical. Keep stakeholders engaged with a defined application selection timeline that moves the project forward briskly – 30 days is optimal.
      • Empower both IT and end users with a standardized selection process to consistently achieve high satisfaction coming out of software selection projects.

      Impact and Result

      • Shatter stakeholder expectations with truly rapid application selections.
      • Put the “short” back in shortlist by consolidating the vendor shortlist up-front and reducing downstream effort.
      • Identify high-impact software functionality by evaluating fewer use cases.
      • Lock in hard savings and do not pay list price by using data-driven tactics.

      Optimize Your Software Selection Process: Why 5 and 30 Are the Magic Numbers Research & Tools

      Discover the Magic Numbers

      Increase project satisfaction with a five-person core software selection team that will close out projects within 30 days.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Optimize Your Software Selection Process: Why 5 and 30 Are the Magic Numbers Storyboard

      1. Align and eliminate elapsed time

      Ensure a formal selection process is in place and make a concerted effort to align stakeholder calendars.

      2. Reduce low-impact activities

      Reduce time spent watching vendor dog and pony shows, while reducing the size of your RFPs or skipping them entirely.

      3. Focus on high-impact activities

      Narrow the field to four contenders prior to in-depth comparison and engage in accelerated enterprise architecture oversight.

      4. Use these rapid and essential selection tools

      Focus on key use cases rather than lists of features.

      • The Software Selection Workbook
      • The Vendor Evaluation Workbook
      • The Guide to Software Selection: A Business Stakeholder Manual

      5. Engage Two Viable Vendors in Negotiation

      Save more by bringing two vendors to the final stage of the project and surfacing a consolidated list of demands prior to entering negotiation.

      [infographic]

      Further reading

      Optimize Your Software Selection Process: Why 5 and 30 Are the Magic Numbers

      Select your applications better, faster, and cheaper.

      How to Read This Software Selection Insight Primer

      1. 43,000 Data Points
      2. This report is based on data gathered from a survey of 43,000 real-world IT practitioners.

      3. Aggregating Feedback
      4. The data is compiled from SoftwareReviews (a sister company of Info-Tech Research Group), which collects and aggregates feedback on a wide variety of enterprise technologies.

      5. Insights Backed by Data
      6. The insights, charts, and graphs in this presentation are all derived from data submitted by real end users.

      The First Magic Number Is Five

      The optimal software selection team comprises five people

      • Derived from 43,000 data points. Analysis of thousands of software selection projects makes it clear a tight core selection team accelerates the selection process.
      • Five people make up the core team. A small but cross-functional team keeps the project moving without getting bogged down on calendar alignment and endless back-and-forth.
      • It is a balancing act. Having too few stakeholders on the core selection team will lead to missing valuable information, while having too many will lead to delays and politically driven inefficiencies.

      There Are Major Benefits to Narrowing the Selection Team Size to Five

      Limit the risk of ineffective “decision making by committee”

      Expedite resolution of key issues and accelerate crucial decisions

      Achieve alignment on critical requirements

      Streamline calendar management

      Info-Tech Insight

      Too many cooks spoil the broth: create a highly focused selection team that can devote the majority of its time to the project while it’s in flight to demonstrate faster time to value.

      Arm Yourself With Data to Choose the Right Plays for Selection

      Software selection takes forever. The process of choosing even the smallest apps can drag on for years: sometimes in perpetuity.

      Organizations keep too many players on the field, leading to scheduling slowdowns and scope creep.

      Keeping the size of the core selection team down, while liaising with more stakeholders and subject matter experts (SMEs), leads to improved results.

      Maximize project effectiveness with a five-person team. Project satisfaction and effectiveness are stagnant or decrease once the team grows beyond five people.

      Cumbersome or ad hoc selection processes lead to business-driven software selection.

      Increase stakeholder satisfaction by using a consistent selection framework that captures their needs while not being a burden.

      Empower both IT and end users with a standardized selection process to consistently achieve high satisfaction coming out of software selection projects.

      The image contains a graph that is titled: A compact selection team can save you weeks. The graph demonstrates time saved with a five person team in comparison to larger teams.

      Project Satisfaction and Effectiveness Are Stagnant Once the Team Grows Beyond Five People

      The image contains a graph to demonstrate project satisfaction and effectiveness being stagnant with a team larger than five.
      • There is only a marginal difference in selection effectiveness when more people are involved, so why include so many? It only bogs down the process!
      • Full-time resourcing: At least one member of the five team members must be allocated to the selection initiative as a full-time resource.

      Info-Tech Insight

      It sounds natural to include as many players as possible in the core selection group; however, expanding the group beyond five people does not lead to an increase in satisfaction. Consider including a general stakeholder feedback working session instead.

      Shorten Project Duration by Capping the Selection Team at Five People

      However, it is important to make all stakeholders feel heard

      The image contains a graph to demonstrate that an increase in time and effort connects with an increase in total number of people involved.

      Exclusion is not the name of the game.

      • Remember, we are talking about the core selection team.
      • Help stakeholders understand their role in the project.
      • Educate stakeholders about your approach to selection.
      • Ensure stakeholders understand why the official selection team is being capped at five people.
      • Soliciting requirements and feedback from a broader array of stakeholders is still critical.

      Large Organizations Benefit From Compact Selection Teams Just as Much as Small Firms

      Think big even if your organization is small

      Small organizations

      Teams smaller than five people are common due to limited resources.

      Medium organizations

      Selection project satisfaction peaks with teams of fewer than two people. Consider growing the team to about five people to make stakeholders feel more included with minimal drops in satisfaction.

      Large organizations

      Satisfaction peaks when teams are kept to three to five people. With many SMEs available, it is critical to choose the right players for your team.

      The image contains a multi bar graph to demonstrate the benefits of compact selection teams depending on the size of the company, small, medium, or large.

      Keep the Core Selection Team to Five People Regardless of the Software Category

      Smaller selection teams yield increased satisfaction across software categories

      Info-Tech Insight

      Core team size remains the same regardless of the application being selected. However, team composition will vary depending on the end users being targeted.

      Think beyond application complexity

      • Our instinct is to vary the size of the core selection team based on perceived application complexity.
      • The data has demonstrated that a small team yields increased satisfaction for applications across a wide array of application complexity profiles.
      • The real differentiator for complex applications will be the number of stakeholders that the core selection team liaise with, particularly for defining strong requirements.

      The image contains a graph to demonstrate satisfaction across software categories increases with smaller selection teams.

      The Second Magic Number Is 30

      Finish the project while stakeholders are still fully engaged in order to maximize satisfaction

      • 30- to 60-day project timelines are critical. Keep stakeholders engaged with a defined application selection timeline that moves the project forward briskly.
      • Strike while the iron is hot. Deliver applications in a timely manner after the initial request. Don’t let IT become the bottleneck for process optimization.
      • Minimize scope creep: As projects drag on in perpetuity, the scope of the project balloons to something that cannot possibly achieve key business objectives in a timely fashion.

      Aggressively Timeboxing the Project Yields Benefits Across Multiple Software Categories

      After four weeks, stakeholder satisfaction is variable

      The image contains a graph to demonstrate that aggressively timeboxing the project yields benefits across multiple software categories.
      Only categories with at least 1,000 responses were included in the analysis.

      Achieve peak satisfaction by allotting 30 days for an application selection project.

      • Spending two weeks or less typically leads to higher levels of satisfaction for each category because it leaves more time for negotiation, implementation, and making sure everything works properly (especially if there is a time constraint).
      • Watch out for the “satisfaction danger zone” once project enters the 6- to 12-week mark. Completing a selection in four weeks yields greater satisfaction.

      Spend Your Time Wisely to Complete the Selection in 30 Days

      Save time in the first three phases of the selection project

      Awareness

      Education & Discovery

      Evaluation

      Reduce Time

      Reduce Time

      Reduce Time

      Save time duplicating existing market research. Save time and maintain alignment with focus groups.

      Save time across tedious demos and understanding the marketplace.

      Save time gathering detailed historical requirements. Instead, focus on key issues.

      Info-Tech Insight – Awareness

      Timebox the process of impact analysis. More time should be spent performing the action than building a business case.

      Info-Tech Insight – Education

      Save time duplicating existing market research. Save time and maintain alignment with focus groups.

      Info-Tech Insight – Evaluation

      Decision committee time is valuable. Get up to speed using third-party data and written collateral. Use committee time to conduct investigative interviews instead. Salesperson charisma and marketing collateral quality should not be primary selection criteria. Sadly, this is the case far too often.

      Limit Project Duration to 30 Days Regardless of the Application Being Selected

      Timeboxing application selection yields increased satisfaction across software categories

      The image contains a graph to demonstrate selection effort in weeks by satisfaction. The graph includes informal and formal methods on the graph across the software categories.

      Info-Tech Insight

      Office collaboration tools are a great case study for increasing satisfaction with decreased time to selection. Given the sharp impetus of COVID-19, many organizations quickly selected tools like Zoom and Teams, enabling remote work with very high end-user satisfaction.

      There are alternative approaches for enterprise-sized applications:

      • New applications that demand rigorous business process improvement efforts may require allotting time for prework before engaging in the 30-day selection project.
      • To ensure that IT is using the right framework, understand the cost and complexity profile of the application you’re looking to select.

      The Data Also Shows That There Are Five Additional Keys to Improving Your Selection Process

      1. ALIGN & ELIMINATE ELAPSED TIME
      • Ensure a formal selection process is in place.
      • Balance the core selection team’s composition.
      • Make a concerted effort to align stakeholder calendars.
      2. REDUCE TIME SPENT ON LOW-IMPACT ACTIVITIES
      • Reduce time spent on internet research. Leverage hard data and experts.
      • Reduce RFP size or skip RFPs entirely.
      • Reduce time spent watching vendor dog and pony shows.
      3. FOCUS ON HIGH- IMPACT ACTIVITIES
      • Narrow the field to four contenders prior to in-depth comparison.
      • Identify portfolio overlap with accelerated enterprise architecture oversight.
      • Focus on investigative interviews and proof of concept projects.
      4. USE RAPID & ESSENTIAL ASSESSMENT TOOLS
      • Focus on key use cases, not lists of features.
      • You only need three essential tools: Info-Tech’s Vendor Evaluation Workbook, Software Selection Workbook, and Business Stakeholder Manual.
      5. ENGAGE TWO VIABLE VENDORS IN NEGOTIATION
      • Save more during negotiation by selecting two viable alternatives.
      • Surface a consolidated list of demands prior to entering negotiation.
      • Communicate your success with the organization.

      1. Align & Eliminate Elapsed Time

      ✓ Ensure a formal selection process is in place.

      ✓ Reduce time by timeboxing the project to 30 days.

      ✓ Align the calendars of the five-person core selection team.

      Improving Your IT Department’s Software Selection Capability Yields Big Results

      Time spent building a better process for software selection is a great investment

      • Enterprise application selection is an activity that every IT department must embark on, often many times per year.
      • The frequency and repeatability of software selection means it is an indispensable process to target for optimization.
      • A formal process is not always synonymous with a well-oiled process.
      • Even if you have a formal selection process already in place, it’s imperative to take a concerted approach to continuous improvement.

      It is critical to improve the selection process before formalizing

      Leverage Info-Tech’s Rapid Application Selection Framework to gain insights on how you can fine-tune and accelerate existing codified approaches to application selection.

      Before Condensing the Selection Team, First Formalize the Software Selection Process

      Software selection processes are challenging

      Vendor selection is politically charged, requiring Procurement to navigate around stakeholder biases and existing relationships.

      Stakeholders

      The process is time consuming and often started too late. In the absence of clarity around requirements, it is easy to default to looking at price instead of best functional and architectural fit.

      Timing

      Defining formal process and methodology

      Formal selection methodologies are repeatable processes that anybody can consistently follow to quickly select new technology.

      Repeatable

      The goal of formalizing the approach is to enable IT to deliver business value consistently while also empowering stakeholders to find tools that meet their needs. Remember! A formal selection process is synonymous with a bureaucratic, overblown approach.

      Driving Value

      Most Organizations Are Already Using a Formal Software Selection Methodology

      Don’t get left behind!

      • A common misconception for software selection is that only large organizations have formal processes.
      • The reality is that organizations of all sizes are making use of formal processes for software selection.
      • Moreover, using a standardized method to evaluate new technology is most likely common practice among your competitors regardless of their size.
      • It is important to remember that the level of rigor for the processes will vary based not only on project size but also on organization size.
      Only categories with at least 1,000 responses were included in the analysis.

      The image contains a double bar graph that compares the sizes of companies using formal or informal evaluation and selection methodology.

      Use a Formal Evaluation and Selection Methodology to Achieve Higher Satisfaction

      A formal selection process does not equal a bloated selection process

      • No matter what process is being used, you should consider implementing a formal methodology to reduce the amount of time required to select the software. This trend continues across different levels of software (commodity, complex, and enterprise).
      • It is worth noting that using a process can actually add more time to the selection process, so it is important to know how to use it properly.
      • Don’t use just one process: you should use a combination, but don’t use more than three when selecting your software.
      The image contains a double bar graph to demonstrate the difference between formal and informal evaluation to achieve a higher satisfaction.

      Hit a Home Run With Your Business Stakeholders

      Use a data-driven approach to select the right application vendor for their needs – fast

      The image contains a screenshot of the data-drive approach. The approach includes: awareness, education & discovery, evaluation, selection, negotiation & configuration.

      Investing time improving your software selection methodology has big returns.

      Info-Tech Insight

      Not all software selection projects are created equal – some are very small; some span the entire enterprise. To ensure that IT is using the right framework, understand the cost and complexity profile of the application you’re looking to select. The Rapid Application Selection Framework approach is best for commodity and mid-tier enterprise applications; selecting complex applications is better handled by the methodology described in Implement a Proactive and Consistent Vendor Selection Process.

      Lock Down the Key Players Before Setting Up the Relevant Timeline

      You are the quarterback of your selection team

      Don’t get bogged down “waiting for the stars to align” in terms of people’s availability: if you wait for the perfect alignment, the project may never get done.

      If a key stakeholder is unavailable for weeks or months due to PTO or other commitments, don’t jeopardize project timelines to wait for them to be free. Find a relevant designate that can act in their stead!

      You don’t need the entire team on the field at once. Keep certain stakeholders on the bench to swap in and out as needed.

      Info-Tech Insight

      Assemble the key stakeholders for project kick-off to synchronize the application selection process and limit elapsed time. Getting all parties on the same page increases output satisfaction and eliminates rework. Save time and get input from key stakeholders at the project kick-off.

      Assemble a Cross-Functional Team for Best Results

      A blend of both worlds gets the best of both worlds from domain expertise (technical and business)

      The image contains a graph labelled: Likeliness to recommend. It is described in the text below.

      How to manage the cross-functional selection team:

      • There should be a combination of IT and businesspeople involved in the selection process, and ideally the ratio would be balanced.
      • No matter what you are looking for, you should never include more than five people in the selection process.
      • You can keep key stakeholders and other important individuals informed with what is going on, but they don’t necessarily have to be involved in the selection process.

      Leverage a Five-Person Team With Players From Both IT and the Business

      For maximum effectiveness, assign at least one resource to the project on a full-time basis

      IT Leader

      Technical IT

      Business Analyst/ Project Manager

      Business Lead

      Process Expert

      This team member is an IT director or CIO who will provide sponsorship and oversight from the IT perspective.

      This team member will focus on application security, integration, and enterprise architecture.

      This team member elicits business needs and translates them into technology requirements.

      This team member will provide sponsorship from the business needs perspective.

      This team member will contribute their domain-specific knowledge around the processes that the new application supports.

      Info-Tech Insight

      It is critical for the selection team to determine who has decision rights. Organizational culture will play the largest role in dictating which team member holds the final say for selection decisions.

      Ensure That Your Project Has the Right Mix of the Core Team and Ancillary Stakeholders

      Who is involved in selecting the new application?

      • Core selection team:
        • The core team ideally comprises just five members.
        • There will be representatives from IT and the specific business function that is most impacted by the application.
        • The team is typically anchored by a business analyst or project management professional.
        • This is the team that is ultimately accountable for ensuring that the project stays on track and that the right vendor is selected.
      • Ancillary stakeholders:
        • These stakeholders are brought into the selection project on an as-needed basis. They offer commentary on requirements and technical know-how.
        • They will be impacted by the project outcome but they do not bear ultimate accountability for selecting the application.
      The image contains an outer circle that lists Ancillary Stakeholders, and an inner selection team that lists core selection teams.

      Tweak the Team Composition Based on the Application Category in Question

      All applications are different. Some categories may require a slightly different balance of business and IT users.

      When to adjust the selection team’s business to IT ratio:

      • Increase the number of business stakeholders for customer-centric applications like customer relationship management and customer service management.
      • Keep projects staffed with more technical resources when selecting internal-facing tools like network monitoring platforms, next-generation firewalls, and endpoint protection systems.
      The image contains a graph to demonstrate how to tweak the team composition based on the application category.

      When to adjust the selection team’s business to IT ratio:

      • Increase the number of business stakeholders for customer-centric applications like customer relationship management and customer service management.
      • Keep projects staffed with more technical resources when selecting internal-facing tools like network monitoring platforms, next-generation firewalls, and endpoint protection systems.

      Balance the Selection Team With Decision Makers and Front-Line Resources

      Find the right balance!

      • Make sure to include key decision makers to increase the velocity of approvals.
      • However, it is critical to include the right number of front-line resources to ensure that end-user needs are adequately reflected in the requirements and decision criteria used for selection.

      The image contains a graph on the team composition with number of decision makers involved.

      Info-Tech Insight

      When selecting their software, organizations have an average of two to four business and IT decision makers/influencers on the core selection team.

      Optimize Meeting Cadence to Complete Selection in 30 Days

      Project Cadence:

      • Execute approximately one phase per week.
      • Conduct weekly checkpoints to move through your formal selection framework.
      • Allot two to four hours per touchpoint.

      The image contains a calendar with the five phases spread put over five weeks.

      Info-Tech Insight

      Use weekly touchpoints with the core selection team to eliminate broken telephone. Hold focus groups and workshops to take a more collaborative, timely, and consensus-driven approach to zero in on critical requirements.

      2. Reduce Time Spent on Low-Impact Activities

      ✓ Reduce time spent on internet research. Leverage hard data and experts.

      ✓ Reduce RFP size or skip RFPs entirely.

      ✓ Reduce time spent watching vendor dog and pony shows.

      Reduce Time Spent on Internet Research by Leveraging Hard Data and Experts

      REDUCE BIAS

      Taking a data-driven approach to vendor selection ensures that decisions are made in a manner that reduces human bias and exposure to misaligned incentives.

      SCORING MODELS

      Create a vendor scoring model that uses several different scored criteria (alignment to needs, alignment to architecture, cost, relationship, etc.) and weight them.

      AGGREGATE EXPERIENCES

      When you leverage services such as SoftwareReviews, you’re relying on amalgamated data from hundreds of others that have already been down this path: benefit from their experience!

      PEER-DRIVEN INSIGHTS

      Formally incorporate a review of Category Reports from SoftwareReviews into your vendor selection process to take advantage of peer-driven expert insights.

      Contact Us

      Info-Tech is just a phone call away. Our expert analysts can guide you to successful project completion at no additional cost to you.

      Bloated RFPs Are Weighing You Down

      Avoid “RFP overload” – parse back deliverables for smaller projects

      1. Many IT and procurement professionals are accustomed to deliverable-heavy application selection projects.
      2. Massive amounts of effort is spent creating onerous RFIs, RFPs, vendor demo scripts, reference guides, and Pugh matrices – with only incremental (if any) benefits.
      3. For smaller projects, focus on creating a minimum viable RFP that sketches out a brief need statement and highlights three or four critical process areas to avoid RFP fatigue.

      Draft a lightweight RFI (or minimum viable RFP) to give vendors a snapshot of your needs while managing effort

      An RFI or MV-RFP is a truncated RFP document that highlights core use cases to vendors while minimizing the amount of time the team has to spend building it.

      You may miss out on the right vendor if:

      • The RFP is too long or cumbersome for the vendor to respond.
      • Vendors believe their time is better spent relationship selling.
      • The RFP is unclear and leads them to believe they won’t be successful.
      • The vendor was forced to guess what you were looking for.

      How to write a successful RFI/MV-RFP:

      • Expend your energy relative to the complexity of the required solution or product you’re seeking.
      • A good MV-RFP is structured as follows: a brief description of your organization, business context, and key requirements. It should not exceed a half-dozen pages in length.
      • Be transparent.
      • This could potentially be a long-term relationship, so don’t try to trick suppliers.
      • Be clear in your expectations and focus on the key aspects of what you’re trying to achieve.

      Use the appropriate Info-Tech template for your needs (RFI, RFQ, or RFP). The Request for Information Template is best suited to the RASF approach.

      If Necessary, Make Sure That You Are Going About RFPs the Right Way

      RFPs only add satisfaction when done correctly

      The image contains a graph to demonstrate RFP and satisfaction.

      Info-Tech Insight

      Prescriptive yet flexible: Avoid RFP overload when selecting customer experience–centric applications, but a formal approach to selection is still beneficial.

      When will an RFP increase satisfaction?

      • Satisfaction is increased when the RFP is used in concert with a formal selection methodology. An RFP on its own does not drive significant value.
      • RFPs that focus on an application’s differentiating features lead to higher satisfaction with the selection process.
      • Using the RFP to evaluate mandatory or standard and/or mandatory features yields neutral results.

      Reduce Time Spent Watching Vendor Dog and Pony Shows

      Salesperson charisma and marketing collateral quality should not be primary selection criteria. Sadly, this is the case far too often.

      Use data to take control back from the vendor

      • Taking a data-driven approach to vendor selection ensures that decisions are made in a manner that reduces human bias and exposure to misaligned incentives.
      • When you leverage services such as SoftwareReviews, you’re relying on amalgamated data from hundreds of others that have already been down this path: benefit from their collective experience!

      Kill the “golf course effect” and eliminate stakeholder bias

      • A leading cause of selection failure is human bias. While rarely malicious, the reality is that decision makers and procurement staff can become unduly biased over time by vendor incentives. Conference passes, box seats, a strong interpersonal relationship – these are all things that may be valuable to a decision maker but have no bearing on the efficacy of an enterprise application.
      • A strong selection process mitigates human bias by using a weighted scoring model and basing decisions on hard data: cost, user satisfaction scores, and trusted third-party data from services such as SoftwareReviews.

      Conduct a Day of Rapid-Fire Investigative Interviews

      Zoom in on high-value use cases and answers to targeted questions

      Make sure the solution will work for your business

      Give each vendor 60 to 90 minutes to give a rapid-fire presentation. We suggest the following structure:

      • 20 minutes: company introduction and vision
      • 20 minutes: one high-value scenario walkthrough
      • 20-40 minutes: targeted Q&A from the business stakeholders and procurement team

      To ensure a consistent evaluation, vendors should be asked analogous questions, and a tabulation of answers should be conducted.

      How to challenge the vendors in the investigative interview

      • Change the visualization/presentation.
      • Change the underlying data.
      • Add additional data sets to the artifacts.
      • Collaboration capabilities.
      • Perform an investigation in terms of finding BI objects and identifying previous changes and examine the audit trail.

      Rapid-Fire Vendor Investigative Interview

      Invite vendors to come onsite (or join you via videoconference) to demonstrate the product and to answer questions. Use a highly targeted demo script to help identify how a vendor’s solution will fit your organization’s particular business capability needs.

      Spend Your Time Wisely and Accelerate the Process

      Join the B2B software selection r/evolution

      Awareness

      Education & Discovery

      Evaluation

      Selection

      Negotiation & Configuration

      Reduce Time

      Reduce Time

      Reduce Time

      Reduce Time

      Reduce Time

      Save time
      duplicating existing market research. Save time and maintain alignment with focus groups.

      Save time across tedious demos and understanding the marketplace.

      Save time gathering detailed historical requirements. Instead, focus on key issues.

      Use your time to validate how the solution will handle mission-critical requirements.

      Spend time negotiating with two viable alternatives to reduce price by up to 50%.

      Use a tier-based model to accelerate commodity and complex selection projects.

      Eliminate elapsed process time with focus groups and workshops.

      3. Focus on High-Impact Activities

      ✓ Narrow the field to four contenders prior to in-depth comparison.

      ✓ Identify portfolio overlap with accelerated enterprise architecture oversight.

      ✓ Focus on investigative interviews and proof of concept projects.

      Narrow the Field to a Maximum of Four Contenders

      Focus time spent on the players that we know can deliver strong value

      1. ACCELERATE SELECTION

      Save time by exclusively engaging vendors that support the organization’s differentiating requirements.

      2. DECISION CLARITY

      Prevent stakeholders from getting lost in the weeds with endless lists of vendors.

      3.CONDENSED DEMOS

      Limiting the project to four contenders allows you to stack demos/investigative interviews into the same day.

      4. LICENSING LEVERAGE

      Keep track of key differences between vendor offerings with a tight shortlist.

      Rapid & Effective Selection Decisions

      Consolidating the Vendor Shortlist Up-Front Reduces Downstream Effort

      Put the “short” back in shortlist!

      • Radically reduce effort by narrowing the field of potential vendors earlier in the selection process. Too many organizations don’t funnel their vendor shortlist until nearing the end of the selection process. The result is wasted time and effort evaluating options that are patently not a good fit.
      • Leverage external data (such as SoftwareReviews) and expert opinion to consolidate your shortlist into a smaller number of viable vendors before the investigative interview stage and eliminate time spent evaluating dozens of RFP responses.
      • Having fewer RFP responses to evaluate means you will have more time to do greater due diligence.

      Rapid Enterprise Architecture Evaluations Are High-Impact Activities

      When accelerating selection decisions, finding the right EA is a balancing act

      • Neglecting enterprise architecture as a shortcut to save time often leads to downstream integration problems and decreases application satisfaction.
      • On the other hand, overly drawn out enterprise architecture evaluations can lead to excessively focusing on technology integration versus having a clear and concise understanding of critical business needs.

      Info-Tech Insight

      Targeting an enterprise architecture evaluation as part of your software selection process that does not delay the selection while also providing sufficient insight into platform fit is critical.

      Key activities for rapid enterprise architecture evaluation include:

      1. Security analysis
      2. Portfolio overlap review + integration assessment
      3. Application standards check

      The data confirms that it is worthwhile to spend time on enterprise architecture

      • Considering software architecture fit up-front to determine if new software aligns with the existing application architecture directly links to greater satisfaction.
      • Stakeholders are most satisfied with their software value when there is a good architectural platform fit.
      • Stakeholders that ranked Architectural Platform Fit lower during the selection process were ultimately more unsatisfied with their software choice.

      The image contains a screenshot of data to demonstrate that it is worthwhile to spend time on enterprise architecture.

      Identify Portfolio Overlap With an Accelerated Enterprise Architecture Assessment

      Develop a clear view of any overlap within your target portfolio subset and clear rationalization/consolidation options

      • Application sprawl is a critical pain point in many organizations. It leads to wasted time, money, and effort as IT (and the business) maintain myriad applications that all serve the same functional purpose.
      • Opportunities are missed to consolidate and streamline associated business process management, training, and end-user adoption activities.
      • Identify which applications in your existing architecture serve a duplicate purpose: these applications are the ones you will want to target for consolidation.
      • As you select a new application, identify where it can be used to serve the goal for application rationalization (i.e. can we replace/retire existing applications in our portfolio by standardizing the new one?).

      Keep the scope manageable!

      • Highlight the major functional processes that are closely related to the application you’re selecting and identify which applications support each.
      • The template below represents a top-level view of a set of customer experience management (CXM) applications. Identify linkages between sets of applications and if they’re uni- or bi-directional.
      The image contains a screenshot of images that demonstrate portfolio overlap with an accelerated enterprise architecture assessment.

      Rapidly Evaluate the Security & Risk Profile for a Right-Sized Enterprise Architecture Evaluation

      There are four considerations for determining the security and risk profile for the new application

      1. Financial Risk
      • Consider the financial impact the new application has on the organization.
        • How significant is the investment in technology?
      • If this application fails to meet its business goals and deliver strong return on investment, will there be a significant amount of financial resources to mitigate the problem?
    • Data Sensitivity Risk
      • Understand the type of data that will be handled/stored by the application.
        • For example, a CRM will house customer personally identifiable information (PII) and an ECM will store confidential business documentation.
      • Determine the consequences of a potential breach (i.e. legal and financial).
    • Application Vulnerability Risk
      • Consider whether the application category has a historically strong security track record.
        • For example, enterprise cloud storage solutions may have a different level of vulnerability than an HRIS platform.
    • Infrastructure Risk
      • Determine whether the new application requires changes to infrastructure or additional security investments to safeguard expanded infrastructure.
      • Consider the ways in which the changes to infrastructure increase the vectors for security breaches.

      Spend More Time Validating Key Issues With Deep Technical Assessments

      The image contains a screenshot of an image of an iceberg. The top part of the iceberg is above water and labelled 40%. The rest of the iceberg is below water and is labelled 60%.

      Conversations With the Vendor

      • Initial conversations with the vendor build alignment on overall application capabilities, scope of work, and pricing.

      Pilot Projects and Trial Environments

      • Conduct a proof of concept project to ensure that the application satisfies your non-functional requirements.
      • Technical assessments not only demonstrate whether an application is compatible with your existing systems but also give your technical resources the confidence that the implementation process will be as smooth as possible.
      • Marketing collateral glosses over actual capabilities and differentiation. Use unbiased third-party data and detailed system training material.

      4. Use Rapid & Essential Assessment Tools

      ✓ Focus on key use cases, not lists of features.

      ✓ You only need three essential tools:

      1. Info-Tech’s Vendor Evaluation Workbook
      2. The Software Selection Workbook
      3. A Business Stakeholder Manual

      Focus on Key Use Cases, Not an Endless Laundry List of Table Stakes Features

      Focus on Critical Requirements

      Failure to differentiate must-have and nice-to-have use cases leads to applications full of non-critical features.

      Go Beyond the Table Stakes

      Accelerate the process by skipping common requirements that we know that every vendor will support.

      Streamline the Quantity of Use Cases

      Working with a tighter list of core use cases increases time spent evaluating the most impactful functionality.

      Over-Customization Kills Projects

      Eliminating dubious “sacred cow” requirements reduces costly and painful platform customization.

      Only Make Use of Essential Selection Artifacts

      Vendor selection projects often demand extensive and unnecessary documentation

      The Software Selection Workbook

      Work through the straightforward templates that tie to each phase of the Rapid Application Selection Framework, from assessing the business impact to requirements gathering.

      The image contains a screenshot of The Software Selection Workbook.

      The Vendor Evaluation Workbook

      Consolidate the vendor evaluation process into a single document. Easily compare vendors as you narrow the field to finalists.

      The image contains a screenshot of The Vendor Evaluation Workbook.

      The Guide to Software Selection: A Business Stakeholder Manual

      Quickly explain the Rapid Application Selection Framework to your team while also highlighting its benefits to stakeholders.

      The image contains a screenshot of The Guide to Software Selection: A Business Stakeholder Manual.

      Software Selection Engagement

      Five advisory calls over a five-week period to accelerate your selection process

      • Expert analyst guidance over five weeks on average to select and negotiate software.
      • Save money, align stakeholders, speed up the process, and make better decisions.
      • Use a repeatable, formal methodology to improve your application selection process.
      • Better, faster results, guaranteed, included in membership.
      The image contains a screenshot of the calendar over 30 days that outlines the five calls.

      Click here to book your selection engagement

      Software Selection Workshop

      With 40 hours of advisory assistance delivered online, select better software, faster.

      • 40 hours of expert analyst guidance.
      • Project and stakeholder management assistance.
      • Save money, align stakeholders, speed up the process, and make better decisions.
      • Better, faster results, guaranteed; $20K standard engagement fee.
      The image contains a screenshot of the calendar over 30 days that outlines the five calls.

      CLICK HERE TO BOOK YOUR WORKSHOP ENGAGEMENT

      5. Select Two Viable Options & Engage Both in Negotiation

      ✓ Save more during negotiation by selecting two viable alternatives.

      ✓ Surface a consolidated list of demands prior to entering negotiation.

      ✓ Communicate your success with the organization.

      Save More During Negotiation by Selecting Two Viable Alternatives

      VENDOR 1

      Build in a realistic plan B that allows you to apply leverage to the incumbent or primary vendor of choice.

      VENDOR 2

      If the top contender is aware that they do not have competition, they will be less inclined to make concessions.

      Maintain momentum with two options

      • Should you realize that the primary contender is no longer a viable option (i.e. security concerns), keeping a second vendor in play enables you to quickly pivot without slowing down the selection project.

      Secure best pricing by playing vendors off each other

      • Vendors are more likely to give concessions on the base price once they become aware that a direct competitor has entered the evaluation.

      Truly commit to a thorough analysis of alternatives

      • By evaluating competitive alternatives, you’ll get a more comprehensive view on market standards for a solution and be able to employ a range of negotiation tactics.

      Focus on 5-10 Specific Contract Change Requests

      Accelerate negotiation by picking your battles

      ANALYZE

      DOCUMENT

      CONSOLIDATE

      PRESENT

      • Parse the contract, order form, and terms & conditions for concerning language.
      • Leverage expertise from internal subject matter experts in addition to relevant legal council.
      • Document all concerns and challenges with the language in the vendor contract in a single spreadsheet.
      • Make vendors more receptive to your cause by going one step beyond writing what the change should be. Provide the reasoning behind the change and even the relevant context.
      • Identify the change requests that are most important for the success of the selection project.
      • Compile a list of the most critical change requests.
      • Consider including nice-to-have requests that you can leverage as strategic concessions.
      • Present the consolidated list of critical change requests to the vendor rather than sharing the entire range of potential changes to the contract.
      • Make sure to include context and background for each request.
      • Eliminate potential delays by proactively establishing a timeline for the vendor’s response.

      Share Stories of Cost Savings With the Organization

      Secure IT’s seat at the table

      Hard cost savings speak louder than words. Executive leadership will see IT as the go-to team for driving business value quickly, yet responsibly.

      Build hype around the new software

      Generate enthusiasm by highlighting the improved user experience provided by the new software that was has just been selected.

      Drive end-user adoption

      Position the cost savings as an opportunity to invest in onboarding. An application is only as valuable as your employees’ ability to effectively use it.

      Keep the process rolling

      Use the momentum from the project and its successful negotiation to roll out the accelerated selection approach to more departments across the organization.

      Overall: The Magic Number Saves You Time and Money

      Software selection takes forever. The process of choosing even the smallest apps can drag on for years: sometimes in perpetuity.

      Organizations keep too many players on the field, leading to scheduling slowdowns and scope creep.

      Keeping the size of the core selection team down, while liaising with more stakeholders and subject matter experts (SMEs), leads to improved results.

      Maximize project effectiveness with a five-person team. Project satisfaction and effectiveness are stagnant or decrease once the team grows beyond five people.

      Cumbersome or ad hoc selection processes lead to business-driven software selection.

      Increase stakeholder satisfaction by using a consistent selection framework that captures their needs while not being a burden.

      Empower both IT and end users with a standardized selection process to consistently achieve high satisfaction coming out of software selection projects.

      The image contains a graph that is titled: A compact selection team can save you weeks. The graph demonstrates time saved with a five person team in comparison to larger teams.

      Key Takeaways for Improving Your Selection Process

      1. ALIGN & ELIMINATE ELAPSED TIME

      • Ensure a formal selection process is in place and reduce time by timeboxing the project to 30 days.
      • Align the calendars of the five-person core selection team to maximize efficiency.

      2. REDUCE TIME SPENT ON LOW-IMPACT ACTIVITIES

      • Go beyond the table stakes and accelerate the process by skipping common requirements that we know that every vendor will support.
      • Only make use of essential selection artifacts.

      3. FOCUS ON HIGH- IMPACT ACTIVITIES

      • Skip the vendor dog and pony shows with investigative interviews.
      • Minimize time spent on novel-sized RFPs; instead highlight three or four critical process areas.

      4. USE RAPID & ESSENTIAL ASSESSMENT TOOLS

      • Consolidating the vendor shortlist up-front reduces downstream effort.
      • Application sprawl is a critical pain point in many organizations that leads to wasted time and money.

      5. ENGAGE TWO VIABLE VENDORS IN NEGOTIATION

      • Build in a realistic plan B that allows you to apply leverage to the incumbent or primary vendor of choice.
      • Pick your battles and focus on 5-10 specific contract change requests.

      Appendix

      This study is based on a survey of 43,000 real-world IT practitioners.

      • SoftwareReviews (a sister company of Info-Tech Research Group) collects and aggregates feedback on a wide variety of enterprise technologies.
      • The practitioners are actual end users of hundreds of different enterprise application categories.
      • The following slides highlight the supplementary data points from the comprehensive survey.

      Methodology

      A comprehensive study based on the responses of thousands of real-world practitioners.

      Qualitative & Secondary

      Using comprehensive statistical techniques, we surveyed what our members identified as key drivers of success in selecting enterprise software. Our goal was to determine how organizations can accelerate selection processes and improve outcomes by identifying where people should spend their time for the best results.

      Large-n Survey

      To determine the “Magic Numbers,” we used a large-n survey: 40,000 respondents answered questions about their applications, selection processes, organizational firmographics, and personal characteristics. We used this data to determine what drives satisfaction not only with the application but with the selection process itself.

      Quantitative Drill-Down

      We used the survey to narrow the list of game-changing practices. We then conducted additional quantitative research to understand why our respondents may have selected the responses they did.

      Accelerate Your Automation Processes

      • Buy Link or Shortcode: {j2store}485|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk

      Your organization needs to:

      • Define an automation suite for the business.
      • Specify the business goals for your automation suite.
      • Roadmap your automation modules to continually grow your automation platform.
      • Identify how an automation suite can help the organization improve.

      Our Advice

      Critical Insight

      Start small and do it right:

      • Assess if a particular solution works for your organization and continually invest in it if it does before moving onto the next solution.
      • Overwhelming your organization with a plethora of automation solutions can lead to a lack of management for each solution and decrease your overall return on investment.

      Impact and Result

      • Define your automation suite in terms of your business goals.
      • Take stock of what you have now: RPA, AIOps, chatbots.
      • Think about how to integrate and optimize what you have now, as well as roadmap your continual improvement.

      Accelerate Your Automation Processes Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to find out why your organization should accelerate your automation processes, review Info-Tech’s methodology, and understand the ways Info-Tech can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Discover automation suite possibilities

      Take hold of your current state and assess where you would like to improve. See if adding a new automation module or investing in your current modules is the right decision.

      • Automation Suite Maturity Assessment Tool

      2. Chart your automation suite roadmap

      Build a high-level roadmap of where you want to bring your organization's automation suite in the future.

      • Automation Suite Roadmap Tool
      [infographic]

      Measure and Manage Customer Satisfaction Metrics That Matter the Most

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Lack of understanding of what is truly driving customer satisfaction or dissatisfaction.
      • Lack of insight into who our satisfied and dissatisfied customers are.
      • Lack of a system for early detection of declines in satisfaction.
      • Lack of clarity on what to improve and how resources should be allocated.

      Our Advice

      Critical Insight

      • All software companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about and will keep them coming back to you to have their needs met.
      • Obstacles:
        • Use of metrics that don’t provide the insight needed to make impactful changes that will boost satisfaction and ultimately, retention and profit.
        • Lack of a clear definition of what satisfaction means to customers, metric definitions and/or standard methods of measurement, and a consistent monitoring cadence.

      Impact and Result

      • Understanding of who your satisfied and dissatisfied customers are.
      • Understanding of the true drivers of satisfaction and dissatisfaction among your customer segments.
      • Establishment of a repeatable process and cadence for effective satisfaction measurement and monitoring.
      • Development of an executable customer satisfaction improvement plan that identifies customer journey pain points and areas of dissatisfaction, and outlines how to improve them.
      • Knowledge of where money, time, and other resources are needed most to improve satisfaction levels and ultimately increase retention.

      Measure and Manage Customer Satisfaction Metrics That Matter the Most Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Measure and Manage the Customer Satisfaction Metrics that Matter the Most Deck – An overview of how to understand what drives customer satisfaction and how to measure and manage it for improved business outcomes.

      Understand the true drivers of customer satisfaction and build a process for managing and improving customer satisfaction.

      [infographic]

      Further reading

      Measure and Manage the Customer Satisfaction Metrics that Matter the Most

      Understand what truly keeps your customer satisfied. Start to measure what matters to improve customer experience and increase satisfaction and advocacy. 

      EXECUTIVE BRIEF

      Analyst perspective

      Understanding and measuring the true drivers of satisfaction enable the delivery of real customer value

      The image contains a picture of Emily Wright.

      “Healthy customer relationships are the paramount to long-term growth. When customers are satisfied, they remain loyal, spend more, and promote your company to others in their network. The key to high satisfaction is understanding and measuring the true drivers of satisfaction to enable the delivery of real customer value.

      Most companies believe they know who their satisfied customers are and what keeps them satisfied, and 76% of B2B buyers expect that providers understand their unique needs (Salesforce Research, 2020). However, on average B2B companies have customer experience scores of less than 50% (McKinsey, 2016). This disconnect between customer expectations and provider experience indicates that businesses are not effectively measuring and monitoring satisfaction and therefore are not making meaningful enhancements to their service, offerings, and overall experience.

      By focusing on the underlying drivers of customer satisfaction, organizations develop a truly accurate picture of what is driving deep satisfaction and loyalty, ensuring that their company will achieve sustainable growth and stay competitive in a highly competitive market.”

      Emily Wright

      Senior Research Analyst, Advisory

      SoftwareReviews

      Executive summary

      Your Challenge

      Common Obstacles

      SoftwareReviews’ Approach

      Getting a truly accurate picture of satisfaction levels among customers, and where to focus efforts to improve satisfaction, is challenging. Providers often find themselves reacting to customer challenges and being blindsided when customers leave. More effective customer satisfaction measurement is possible when providers self-assess for the following challenges:

      • Lack of understanding of what is truly driving customer satisfaction or dissatisfaction.
      • Lack of insight into who our satisfied and dissatisfied customers are.
      • Lack of a system for early detection of declines in satisfaction.
      • Lack of clarity of what needs to be improved and how resources should be allocated.
      • Lack of reliable internal data for effective customer satisfaction monitoring.

      What separates customer success leaders from developing a full view of their customers are several nagging obstacles:

      • Use of metrics that don’t provide the insight needed to make impactful changes that will boost satisfaction and ultimately, retention and profit.
      • Friction from customers participating in customer satisfaction studies.
      • Lack of data, or integrated databases from which to track, pull, and analyze customer satisfaction data.
      • Lack a clear definition of what satisfaction means to customers, metric definitions, and/or standard methods of measurement and a consistent monitoring cadence.
      • Lack of time, resources, or technology to uncover and effectively measure and monitor satisfaction drivers.

      Through the SoftwareReviews’ approach, customer success leaders will:

      • Understand who your satisfied and dissatisfied customers are.
      • Understand the true drivers of satisfaction and dissatisfaction among your customer segments.
      • Establish a repeatable process and cadence for effective satisfaction measurement and monitoring.
      • Develop an executable customer satisfaction improvement plan that identifies customer journey pain points and areas of dissatisfaction, and outlines how to improve them.
      • Know where money, time, and resources are needed most to improve satisfaction levels and ultimately retention.

      Overarching SoftwareReviews Advisory Insight:

      All companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about. This will keep them coming back to you to have their needs met.

      Healthy Customer Relationships are vital for long-term success and growth

      Measuring customer satisfaction is critical to understanding the overall health of your customer relationships and driving growth.

      Through effective customer satisfaction measurement, organizations can:

      Improve Customer Experience

      Increase Retention and CLV

      Increase Profitability

      Reduce Costs

      • Provide insight into where and how to improve.
      • Enhance experience, increase loyalty.
      • By providing strong CX, organizations can increase revenue by 10-15% (McKinsey, 2014).
      • Far easier to retain existing customers than to acquire new ones.
      • Ensuring high satisfaction among customers increases Customer Lifetime Value (CLV) through longer tenure and higher spending.
      • NPS Promoter score has a customer lifetime value that's 600%-1,400% higher than a Detractor (Bain & Company, 2015).
      • Highly satisfied customers spend more through expansions and add-ons, as well as through their long tenure with your company.
      • They also spread positive word of mouth, which brings in new customers.
      • “Studies demonstrate a strong correlation between customer satisfaction and increased profits — with companies with high customer satisfaction reporting 5.7 times more revenue than competitors.” (Matthew Loper, CEO and Co-Founder of WELLTH, 2022)
      • Measuring, monitoring, and maintaining high satisfaction levels reduces costs across the board.
      • “Providing a high-quality customer experience can save up to 33% of customer service costs” (Deloitte, 2018).
      • Satisfied customers are more likely to spread positive word of mouth which reduces acquisition / marketing costs for your company.

      “Measuring customer satisfaction is vital for growth in any organization; it provides insights into what works and offers opportunities for optimization. Customer satisfaction is essential for improving loyalty rate, reducing costs and retaining your customers.”

      -Ken Brisco, NICE, 2019

      Poor customer satisfaction measurement is costly

      Virtually all companies measure customer satisfaction, but few truly do it well. All too often, customer satisfaction measurement consists of a set of vanity metrics that do not result in actionable insight for product/service improvement. Improper measurement can result in numerous consequences:

      Direct and Indirect Costs

      Being unaware of true drivers of satisfaction that are never remedied costs your business directly through customer churn, service costs, etc.

      Tarnished Brand

      Tarnished brand through not resolving issues drives dissatisfaction; dissatisfied customers share their negative experiences, which can damage brand image and reputation.

      Waste Limited Resources

      Putting limited resources towards vanity programs and/or fixes that have little to no bearing on core satisfaction drivers wastes time and money.

      “When customer dissatisfaction goes unnoticed, it can slowly kill a company. Because of the intangible nature of customer dissatisfaction, managers regularly underestimate the magnitude of customer dissatisfaction and its impact on the bottom line.”

      - Lakshmiu Tatikonda, “The Hidden Costs of Customer Dissatisfaction”, 2013

      SoftwareReviews Advisory Insight:

      Most companies struggle to understand what’s truly driving customers to stay or leave. By understanding the true satisfaction drivers, tech providers can measure and monitor satisfaction more effectively, avoiding the numerous harmful consequences that result from average customer satisfaction measurement.

      Does your customer satisfaction measurement process need improvement?

      Getting an accurate picture of customer satisfaction is no easy task. Struggling with any of the following means you are ready for a detailed review of your customer satisfaction measurement efforts:

      • Not knowing who your most satisfied customers are.
      • Lacking early detection for declining satisfaction – either reactive, or unaware of dissatisfaction as it’s occurring.
      • Lacking a process for monitoring changes in satisfaction and lack ability to be proactive; you feel blindsided when customers leave.
      • Inability to fix the problem and wasting money on the wrong areas, like vanity metrics that don’t bring value to customers.
      • Spending money and other resources towards fixes based on a gut feeling, without quantifying the real root cause drivers and investing in their improvement.
      • Having metrics and data but lacking context; don’t know what contributed to the metrics/results, why people are dissatisfied or what contributes to satisfaction.
      • Lacking clear definition of what satisfaction means to customers / customer segments.
      • Difficulty tying satisfaction back to financial results.

      Customers are more satisfied with software vendors who understand the difference between surface level and short-term satisfaction, and deep or long-term satisfaction

      Surface-level satisfaction

      Surface-level satisfaction has immediate effects, but they are usually short-term or limited to certain groups of users. There are several factors that contribute to satisfaction including:

      • Novelty of new software
      • Ease of implementation
      • Financial savings
      • Breadth of features

      Software Leaders Drive Deep Satisfaction

      Deep satisfaction has long-term and meaningful impacts on the way that organizations work. Deep satisfaction has staying power and increases or maintains satisfaction over time, by reducing complexity and delivering exceptional quality for end-users and IT alike. This report found that the following capabilities provided the deepest levels of satisfaction:

      • Usability and intuitiveness
      • Quality of features
      • Ease of customization
      • Vendor-specific capabilities

      The above solve issues that are part of everyday problems, and each drives satisfaction in deep and meaningful ways. While surface-level satisfaction is important, deep and impactful capabilities can sustain satisfaction for a longer time.

      Deep Customer Satisfaction Among Software Buyers Correlates Highly to “Emotional Attributes”

      Vendor Capabilities and Product Features remain significant but are not the primary drivers

      The image contains a graph to demonstrate a correlation to Satisfaction, all Software Categories.
      Source: SoftwareReviews buyer reviews (based on 82,560 unique reviews).

      Driving deep satisfaction among software customers vs. surface-level measures is key

      Vendor capabilities and product features correlate significantly to buyer satisfaction

      Yet, it’s the emotional attributes – what we call the “Emotional Footprint”, that correlate more strongly

      Business-Value Created and Emotional Attributes are what drives software customer satisfaction the most

      The image contains a screenshot of a graph to demonstrate Software Buyer Satisfaction Drivers and Emotional Attributes are what drives software customer satisfaction.

      Software companies looking to improve customer satisfaction will focus on business value created and the Emotional Footprint attributes outlined here.

      The essential ingredient is understanding how each is defined by your customers.

      Leaders focus on driving improvements as described by customers.

      SoftwareReviews Insight:

      These true drivers of satisfaction should be considered in your customer satisfaction measurement and monitoring efforts. The experience customers have with your product and brand is what will differentiate your brand from competitors, and ultimately, power business growth. Talk to a SoftwareReviews Advisor to learn how users rate your product on these satisfaction drivers in the SoftwareReviews Emotional Footprint Report.

      Benefits of Effective Customer Satisfaction Measurement

      Our research provides Customer Success leaders with the following key benefits:

      • Ability to know who is satisfied, dissatisfied, and why.
      • Confidence in how to understand or uncover the factors behind customer satisfaction; understand and identify factors driving satisfaction, dissatisfaction.
      • Ability to develop a clear plan for improving customer satisfaction.
      • Knowledge of how to establish a repeatable process for customer satisfaction measurement and monitoring that allows for proactivity when declines in satisfaction are detected.
      • Understanding of what metrics to use, how to measure them, and where to find the right information/data.
      • Knowledge of where money, time, and other resources are needed most to drive tangible customer value.

      “81% of organizations cite CX as a competitive differentiator. The top factor driving digital transformation is improving CX […] with companies reporting benefits associated with improving CX including:

      • Increased customer loyalty (92%)
      • An uplift in revenue (84%)
      • Cost savings (79%).”

      – Dan Cote, “Advocacy Blooms and Business Booms When Customers and Employees Engage”, Influitive, 2021

      The image contains a screenshot of a thought model that focuses on Measure & Manage the Customer Satisfaction Metrics That Matter the Most.

      Who benefits from improving the measurement and monitoring of customer satisfaction?

      This Research Is Designed for:

      • Customer Success leaders and marketers who are:
        • Responsible for understanding how to benchmark, measure, and understand customer satisfaction to improve satisfaction, NPS, and ROI.
        • Looking to take a more proactive and structured approach to customer satisfaction measurement and monitoring.
        • Looking for a more effective and accurate way to measure and understand how to improve customer satisfaction around products and services.

      This Research Will Help You:

      • Understand the factors driving satisfaction and dissatisfaction.
      • Know which customers are satisfied/dissatisfied.
      • Know where time, money, and resources are needed the most in order to improve or maintain satisfaction levels.
      • Develop a formal plan to improve customer satisfaction.
      • Establish a repeatable process for customer satisfaction measurement and monitoring that allows for proactivity when declines in satisfaction are detected.

      This Research Will Also Assist:

      • Customer Success Leaders, Marketing and Sales Directors and Managers, Product Marketing Managers, and Advocacy Managers/Coordinators who are responsible for:
        • Product improvements and enhancements
        • Customer service and onboarding
        • Customer advocacy programs
        • Referral/VoC programs

      This Research Will Help Them:

      • Coordinate and align on customer experience efforts and actions.
      • Gather and make use of customer feedback to improve products, solutions, and services provided.
      • Provide an amazing customer experience throughout the entirety of the customer journey.

      SoftwareReviews’ methodology for measuring the customer satisfaction metrics that matter the most

      1. Identify true customer satisfaction drivers

      2. Develop metrics dashboard

      3. Develop customer satisfaction measurement and management plan

      Phase Steps

      1. Identify data sources, documenting any gaps in data
      2. Analyze all relevant data on customer experiences and outcomes
      3. Document top satisfaction drivers
      1. Identify business goals, problems to be solved / define business challenges and marketing/customer success goals
      2. Use SR diagnostic to assess current state of satisfaction measurement, assessing metric alignment to satisfaction drivers
      3. Define your metrics dashboard
      4. Develop common metric definitions, language for discussing, and standards for measuring customer satisfaction
      1. Determine committee structure to measure performance metrics over time
      2. Map out gaps in satisfaction along customer journey/common points in journey where customers are least dissatisfied
      3. Build plan that identifies weak areas and shows how to fix using SR’s emotional footprint, other measures
      4. Create plan and roadmap for CSat improvement
      5. Create communication deck

      Phase Outcomes

      1. Documented satisfaction drivers
      2. Documented data sources and gaps in data
      1. Current state customer satisfaction measurement analysis
      2. Common metric definitions and measurement standards
      3. Metrics dashboard
      1. Customer satisfaction measurement plan
      2. Customer satisfaction improvement plan
      3. Customer journey maps
      4. Customer satisfaction improvement communication deck
      5. Customer Satisfaction Committee created

      Insight summary

      Understanding and measuring the true drivers of satisfaction enable the delivery of real customer value

      All software companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about and which will keep them coming back to you to have their needs met.

      Positive experiences drive satisfaction more so than features and cost

      According to our analysis of software buyer reviews data*, the biggest drivers of satisfaction and likeliness to recommend are the positive experiences customers have with vendors and their products. Customers want to feel that:

      1. Their productivity and performance is enhanced, and the vendor is helping them innovate and grow as a company.
      2. Their vendor inspires them and helps them to continually improve.
      3. They can rely on the vendor and the product they purchased.
      4. They are respected by the vendor.
      5. They can trust that the vendor will be on their side and save them time.
      *8 million data points across all software categories

      Measure Key Relationship KPIs to gauge satisfaction

      Key metrics to track include the Business Value Created score, Net Emotional Footprint, and the Love/Hate score (the strength of emotional connection).

      Orient the organization around customer experience excellence

      1. Arrange staff incentives around customer value instead of metrics that are unrelated to satisfaction.
      2. Embed customer experience as a core company value and integrate it into all functions.
      3. Make working with your organization easy and seamless for customers.

      Have a designated committee for customer satisfaction measurement

      Best in class organizations create customer satisfaction committees that meet regularly to measure and monitor customer satisfaction, resolve issues quickly, and work towards improved customer experience and profit outcomes.

      Use metrics that align to top satisfaction drivers

      This will give you a more accurate and fulsome view of customer satisfaction than standard satisfaction metrics alone will.

      Guided Implementation

      What is our GI on measuring and managing the customer satisfaction metrics that matter most?

      Identify True Customer Satisfaction Drivers

      Develop Metrics Dashboard Develop Customer Satisfaction Measurement and Management Plan

      Call #1: Discuss current pain points and barriers to successful customer satisfaction measurement, monitoring and maintenance. Plan next call – 1 week.

      Call #2: Discuss all available data, noting any gaps. Develop plan to fill gaps, discuss feasibility and timelines. Plan next call – 1 week.

      Call #3: Walk through SoftwareReviews reports to understand EF and satisfaction drivers. Plan next call – 3 days.

      Call #4: Segment customers and document key satisfaction drivers. Plan next call – 2 week.

      Call #5: Document business goals and align them to metrics. Plan next call – 1 week.

      Call #6: Complete the SoftwareReviews satisfaction measurement diagnostic. Plan next call – 3 days.

      Call #7: Score list of metrics that align to satisfaction drivers. Plan next call – 2 days.

      Call #8: Develop metrics dashboard and definitions. Plan next call – 2 weeks.

      Call #9: Finalize metrics dashboard and definitions. Plan next call – 1 week.

      Call #10: Discuss committee and determine governance. Plan next call – 2 weeks.

      Call #11: Map out gaps in satisfaction along customer journey as they relate to top satisfaction drivers. Plan next call –2 weeks.

      Call #12: Develop plan and roadmap for satisfaction improvement. Plan next call – 1 week.

      Call #13: Finalize plan and roadmap. Plan next call – 1 week.

      Call # 14: Review and coach on communication deck.

      A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.

      For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.

      Your engagement managers will work with you to schedule analyst calls.

      Software Reviews offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
      Included within Advisory Membership Optional add-ons

      Bibliography

      “Are you experienced?” Bain & Company, Apr. 2015. Accessed 6 June. 2022.

      Brisco, Ken. “Measuring Customer Satisfaction and Why It’s So Important.” NICE, Feb. 2019. Accessed 6 June. 2022.

      CMO.com Team. “The Customer Experience Management Mandate.” Adobe Experience Cloud Blog, July 2019. Accessed 14 June. 2022.

      Cote, Dan. “Advocacy Blooms and Business Booms When Customers and Employees Engage.” Influitive, Dec. 2021. Accessed 15 June. 2022.

      Fanderl, Harald and Perrey, Jesko. “Best of both worlds: Customer experience for more revenues and lower costs.” McKinsey & Company, Apr. 2014. Accessed 15 June. 2022.

      Gallemard, Jeremy. “Why – And How – Should Customer Satisfaction Be Measured?” Smart Tribune, Feb. 2020. Accessed 6 June. 2022.

      Kumar, Swagata. “Customer Success Statistics in 2021.” Customer Success Box, 2021. Accessed 17 June. 2022.

      Lakshmiu Tatikonda, “The Hidden Costs of Customer Dissatisfaction”, Management Accounting Quarterly, vol. 14, no. 3, 2013, pp 38. Accessed 17 June. 2022.

      Loper, Matthew. “Why ‘Customer Satisfaction’ Misses the Mark – And What to Measure Instead.” Newsweek, Jan. 2022. Accessed 16 June. 2022.

      Maechler, Nicolas, et al. “Improving the business-to-business customer experience.” McKinsey & Company, Mar. 2016. Accessed 16 June.

      “New Research from Dimension Data Reveals Uncomfortable CX Truths.” CISION PR Newswire, Apr. 2017. Accessed 7 June. 2022.

      Sheth, Rohan. 75 Must-Know Customer Experience Statistics to move Your Business Forward in 2022.” SmartKarrot, Feb. 2022. Accessed 17 June. 2022.

      Smith, Mercer. “111 Customer Service Statistics and Facts You Shouldn’t Ignore.” HelpScout, May 2022. Accessed 17 June. 2022.

      “State of the Connected Customer.” Salesforce, 2020. Accessed 14 June. 2022

      “The true value of customer experiences.” Deloitte, 2018. Accessed 15 June. 2022.

      Develop a Security Awareness and Training Program That Empowers End Users

      • Buy Link or Shortcode: {j2store}370|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $12,075 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • The fast evolution of the cybersecurity landscape requires security training and awareness programs that are frequently updated and improved.
      • Security and awareness training programs often fail to engage end users. Lack of engagement can lead to low levels of knowledge retention.
      • Irrelevant or outdated training content does not properly prepare your end users to effectively defend the organization against security threats.

      Our Advice

      Critical Insight

      • One-time, annual training is no longer sufficient for creating an effective security awareness and training program.
      • By presenting security as a personal and individualized issue, you can make this new personal focus a driver for your organizational security awareness and training program.

      Impact and Result

      • Create a training program that delivers smaller amounts of information on a more frequent basis to minimize effort, reduce end-user training fatigue, and improve content relevance.
      • Evaluate and improve your security awareness and training program continuously to keep its content up-to-date. Leverage end-user feedback to ensure content remains relevant to those who receive it.

      Develop a Security Awareness and Training Program That Empowers End Users Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a security awareness and training program that empowers end users, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop your training program

      Create or mature a security awareness and training program that is tailored to your organization.

      • Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program
      • Security Awareness and Training Program Development Tool
      • End-User Security Job Description Template
      • Training Materials – Physical Computer Security
      • Training Materials – Cyber Attacks
      • Training Materials – Incident Response
      • Training Materials – Mobile Security
      • Training Materials – Passwords
      • Training Materials – Phishing
      • Training Materials – Social Engineering
      • Training Materials – Web Usage
      • Security Awareness and Training Vendor Evaluation Tool
      • Security Awareness and Training Metrics Tool
      • End-User Security Knowledge Test Template
      • Security Training Campaign Development Tool

      2. Design an effective training delivery plan

      Explore methods of training delivery and select the most effective solutions.

      • Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan
      • Information Security Awareness and Training Policy
      • Security Awareness and Training Gamification Guide
      • Mock Spear Phishing Email Examples
      • Security Training Email Templates
      • Security Awareness and Training Module Builder and Training Schedule
      • Security Training Campaign Development Tool
      • Security Training Program Manual
      • Security Awareness and Training Feedback Template
      • Security Awareness Month Week 1: Staying in Touch
      • Security Awareness Month Week 2: Sharing Special Moments
      • Security Awareness Month Week 3: Working and Networking
      • Security Awareness Month Week 4: Families and Businesses
      [infographic]

      Workshop: Develop a Security Awareness and Training Program That Empowers End Users

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Outline the Plan for Long-term Program Improvement

      The Purpose

      Identify the maturity level of the existing security awareness and training program and set development goals.

      Establish program milestones and outline key initiatives for program development.

      Identify metrics to measure program effectiveness.

      Key Benefits Achieved

      Identified the gaps between the current maturity level of the security awareness and training program and future target states.

      Activities

      1.1 Create a program development plan.

      1.2 Investigate and select metrics to measure program effectiveness.

      1.3 Execute some low-hanging fruit initiatives for collecting metrics: e.g. create a knowledge test, feedback survey, or gamification guide.

      Outputs

      Customized development plan for program.

      Tool for tracking metrics.

      Customized knowledge quiz ready for distribution.

      Customized feedback survey for training.

      Gamification program outline.

      2 Identify and Assess Audience Groups and Security Training Topics

      The Purpose

      Determine the unique audience groups within your organization and evaluate their risks and vulnerabilities.

      Prioritize training topics and audience groups to effectively streamline program development.

      Key Benefits Achieved

      Created a comprehensive list of unique audience groups and the corresponding security training that each group should receive.

      Determined priority ratings for both audience groups and the security topics to be delivered.

      Activities

      2.1 Identify the unique audience groups within your organization and the threats they face.

      2.2 Determine the priority levels of the current security topics.

      2.3 Review audience groups and determine which topics need to be delivered to each group.

      Outputs

      Risk profile for each identified audience group.

      Priority scores for all training topics.

      List of relevant security topics for each identified audience group.

      3 Plan the Training Delivery

      The Purpose

      Identify all feasible delivery channels for security training within your organization.

      Build a vendor evaluation tool and shortlist or harvest materials for in-house content creation.

      Key Benefits Achieved

      List of all potential delivery mechanisms for security awareness and training.

      Built a vendor evaluation tool and discussed a vendor shortlist.

      Harvested a collection of free online materials for in-house training development.

      Activities

      3.1 Discuss potential delivery mechanisms for training, including the purchase and use of a vendor.

      3.2 If selecting a vendor, review vendor selection criteria and discuss potential vendor options.

      3.3 If creating content in-house, review and select available resources on the web.

      Outputs

      List of available delivery mechanisms for training.

      Vendor assessment tool and shortlist.

      Customized security training presentations.

      4 Create a Training Schedule for Content Deployment

      The Purpose

      Create a plan for deploying a pilot program to gather valuable feedback.

      Create an ongoing training schedule.

      Define the end users’ responsibilities towards security within the organization.

      Key Benefits Achieved

      Created a plan to deploy a pilot program.

      Created a schedule for training deployment.

      Defined role of end users in helping protect the organization against security threats.

      Activities

      4.1 Build training modules.

      4.2 Create an ongoing training schedule.

      4.3 Define and document your end users’ responsibilities towards their security.

      Outputs

      Documented modular structure to training content.

      Training schedule.

      Security job description template.

      End-user training policy.

      Embrace the Inevitability of Multicloud

      • Buy Link or Shortcode: {j2store}115|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      It used to be easy: pick your cloud, build out your IT footprint, and get back to business. But the explosion of cloud adoption has also led to an explosion of options for cloud providers, platforms, and deployment options. And that’s just when talking about infrastructure as a service!

      Our Advice

      Critical Insight

      • Multicloud isn’t good or bad; it’s inevitable.
      • Embracing multicloud in your organization is an opportunity to gain control while enabling choice. Although it increases complexity for both IT operations and governance, with the right tools and principles in place you can reduce the IT burden and increase business agility at the same time.

      Impact and Result

      • Understand what multicloud is, what it isn’t, and why you need to accept it in your organization.
      • Keep your cloud strategy but adapt your approach and tools.
      • Leverage best practices and principles that will help you keep control of the volatility and complexity that comes with multicloud.

      Embrace the Inevitability of Multicloud Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Embrace the Inevitability of Multicloud Storyboard – A deck that helps you implement best practices for your multicloud strategy.

      Use this research to understand the risks and benefits that come with a multicloud posture.

      • Embrace the Inevitability of Multicloud Storyboard

      Infographic

      Further reading

      Embrace the Inevitability of Multicloud

      The heterogeneous ecosystem is worth it; you just need a cohesive strategy.

      Executive summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      It used to be easy: pick your cloud, build out your IT footprint, and get back to business. But the explosion of cloud adoption has also led to an explosion of options for cloud providers, platforms, and deployment. And that’s just when talking about infrastructure as a service!

      For many businesses, one of the key benefits of the cloud ecosystem is enabling choice for different users, groups, and projects in the organization. But this means embracing multiple cloud platforms. Is it worth it?

      The reality is that multicloud is inevitable for most organizations, and if it’s not yet a reality for your IT team, it soon will be. This brings new challenges:

      1. How do I decide what platforms and offerings to use where? Is my old cloud strategy obsolete?
      2. How do I identify what I want out of multicloud, and what tools and best practices need to be in place to keep control?

      By defining your end goals, framing solutions based on the type of visibility and features your multicloud footprint needs to deliver, you can enable choice and improve performance, flexibility, and availability.

      1. Understand what multicloud is, what it isn’t, and why you need to accept it in your organization.
      2. Keep your cloud strategy but adapt your approach and tools.
      3. Leverage best practices and principles that will help you keep control of the volatility and complexity that comes with multicloud.

      Info-Tech Insight

      Embracing multicloud in your organization is an opportunity to gain control while enabling choice. Although it increases complexity for both IT operations and governance, with the right tools and principles in place you can reduce the IT burden and increase business agility at the same time.

      Project overview

      Multicloud isn’t good or bad; it’s inevitable

      The reality is multicloud is usually not a choice. For most organizations, the requirement to integrate with partners, subsidiaries, and parent organizations, as well as the need to access key applications in the software-as-a-service ecosystem, means that going multicloud is a matter of when, not if.

      The real question most businesses should ask is not whether to go multicloud, but rather how to land in multicloud with intent and use it to their best advantage.

      Your workloads will guide the way

      One piece of good news is that multicloud doesn’t change the basic principles of a good cloud strategy. In fact, a well-laid-out multicloud approach can make it even easier to put the right workloads in the right place – and then even move them around as needed.

      This flexibility isn’t entirely free, though. It’s important to know how and when to apply this type of portability and balance its benefits against the cost and complexity that come with it.

      Don’t fall in reactively; land on your feet

      Despite the risks that come with the increased scale and complexity of multicloud, it is possible to maintain control, realize the benefits, and even use multicloud as a springboard for leveraging cloud benefits in your business. By adopting best practices and forethought in key areas of multicloud risk, you can hit the ground running.

      Aligning the terms

      Modern organizations have multiple IT footprints. How do we classify different stances?

      01 Hybrid Cloud
      Private cloud and public cloud infrastructure managed as one entity

      02 Multicloud
      Includes multiple distinct public cloud services, or “footprints”

      03 Hybrid IT
      Putting the right workloads in the right places with an overall management framework

      Info-Tech Insight

      • Hybrid cloud is about applying the same service model across multiple deployment models (most commonly public and private clouds).
      • Multicloud is about using multiple cloud offerings irrespective of differences in service model or deployment model.

      Multicloud

      • An approach that includes multiple distinct public cloud services (e.g. AWS EC2 but also Salesforce and M365)
      • Usually defined around a steady state for each workload and footprint
      • Everything in its right place (with portability for events and disasters)
      • NOT everything everywhere all at once
      The image contains the Info-Tech thought model for multicloud.

      Multicloud is inevitable

      The SaaS ecosystem has led organizations to encourage business units to exercise the IT choices that are best for them.

      The multicloud maturity journey

      1. Move a workload to the cloud
      2. Move more workloads to the same cloud
      3. Move the right workloads to the right clouds
      4. Hybrid cloud & multicloud
      5. Integrate cloud and traditional/ on-premises footprints

      Hybrid IT: Aggregate Management, Monitoring, Optimization, Continuous Improvement

      Multicloud is about enabling choice while maintaining oversight

      The broader your footprint, the harder it becomes to manage risks across each environment.

      The image contains a screenshot of a diagram of maintaining oversight with multicloud.

      Managing multicloud risks

      The risks in multicloud are the same as in traditional cloud but amplified by the differences across footprints and providers in your ecosystem.

      • Variations across platforms include:
        • Rules
        • Security
        • Mapping corresponding products and services
      • Training and certifications by platform/provider
      • Managing cost across footprints
      • Complexity of integration
      • Managing compliance across platforms
      • Loss of standardization due to multicloud fragmentation

      Info-Tech Insight

      Don’t be afraid to ask for help! Each cloud platform you adopt in your multicloud posture requires training, knowledge, and execution. If you’re already leveraging an ecosystem of cloud providers, leverage the ecosystem of cloud enablers as needed to help you on your way.

      Despite the risks, multicloud is a springboard

      Increasing flexibility & accelerating integration

      Because multicloud increases the number of platforms and environments available to us, we can
      use it as a way to increase our agility (from both a DevOps and a resource deployment perspective) as well as to provide an answer to the problem of vendor lock-in.

      Multicloud also can be a catalyst for integrating and stitching together resources and services that were previously isolated from each other. Because of the modular design and API architecture prevalent in cloud services, they can be easily consumed and integrated from your various footprints.

      Modernizing data strategy

      While it may seem counterintuitive, a proactive multicloud approach will allow you to regain visibility and control of your entire data ecosystem. Defining your data architecture and policies with an eye to the inevitability of multicloud means you can go beyond just regaining control of data stranded in SaaS and other platforms; you can start to really understand the flows of data and how they affect your business processes for better or worse.

      Move to cloud-native IT & design

      Embracing multicloud is also a great opportunity to embrace the refactoring and digital transformation you’ve been blocked on. Instead of treading water with respect to keeping control of fragmented applications, services, and workloads, a proactive approach to multicloud allows you to embrace open standards built to deliver cloud-native power and portability and to build automations that increase reliability, performance, and cost effectiveness while reducing your total in-house work burden.

      Info-Tech Insight

      Don’t bite off more than you can chew! Especially with IaaS and PaaS services, it’s important to ensure you have the skills and bandwidth to manage and deploy services effectively. It’s better to start with one IaaS platform, master it, and then expand.

      Let your workloads guide the way

      Multicloud is a road to best-of-breed everything


      A screenshot of multiclouds.

      Stick with a workload-level approach

      The principles of cloud strategy don’t change with multicloud! The image contains a screenshot of a workload-level approach.
      If anything, a multicloud approach increases your ability to put the right workloads in the right places, wherever that may be.
      It can also (with some work and tooling) provide even broader options for portability and resilience.

      Multicloud = multiple right places

      Put everything in its right place.

      Just like with any cloud strategy, start with a workload-level approach and figure out the right migration path and landing point for your workload in cloud.

      Understand the other right places!

      Multicloud means for many workloads, especially IaaS- and PaaS-focused ones, you will have multiple footprints you can use for secondary locations as desired for portability, resilience, and high availability (with the right tooling and design).

      Info-Tech Insight

      Portability is always a matter of balancing increased flexibility, availability, and resilience against increased complexity, maintenance effort, and cost. Make sure to understand the requirement for your workloads and apply portability efforts where they make the most sense

      Your management will need to evolve

      Don’t manage multicloud with off-the-rack tools.

      The default dashboards and management tools from most cloud vendors are a great starting point when managing a single cloud. Unfortunately, most of these tools do not extend well to other platforms, which can lead to multiple dashboards for multiple footprints.

      These ultimately lead to an inability to view your multicloud portfolio in aggregate and fragmentation of metrics and management practices across your various platforms. In such a situation maintaining compliance and control of IT can become difficult, if not impossible!

      Unified standards and tools that work across your entire cloud portfolio will help keep you on track, and the best way to realize these is by applying repeatable, open standards across your various environments and usually adopting new software and tools from the ecosystem of multicloud management software platforms available in the market.

      Info-Tech Insight

      Even in multicloud, don’t forget that the raw data available from the vendor’s default dashboards is a critical source of information for optimizing performance, efficiency, and costs.

      Multicloud management tool selection

      The ecosystem is heterogeneous.

      The explosion of cloud platforms and stacks means no single multicloud management tool can provide support for every stack in the private and public cloud ecosystem. This challenge becomes even greater when moving from IaaS/PaaS to addressing the near-infinite number of offerings available in the SaaS market.

      When it comes to selecting the right multicloud management tool, it’s important to keep a few things in mind:

      1. Mapping your requirements to the feature sets for your multicloud management platform is critical.
      2. Depending on your goals and metrics, and the underlying platforms and data you need to collect from them, you may need more than one tool.
      3. Especially when it comes to integrating SaaS into your multicloud tool(s), development or partners may be required.

      Key Features

      • Portability
      • Cost management
      • Automation across vendors
      • Standardization of configuration
      • Security alignment across vendors
      • Unified provisioning and self-service

      Info-Tech Insight

      SaaS always presents a unique challenge for gathering necessary cloud management data. It’s important to understand what data is and isn’t available and how it can be accessed and made available to your multicloud management tools.

      Understand your vendors

      Define what you are looking for as a first step.

      • To best understand your options, you need to understand the focus, features, and support services for each vendor. Depending on your requirements, you may need to adopt more than one tool.
      • Remember that SaaS presents unique challenges in terms of accessing and ingesting data into your management tools. This will generally require development to leverage the provider’s API.
      • Within the following slides, you will find a defined activity with a working template that will create a vendor profile for each vendor.

      As a working example, you can review these vendors on the following slides:

      • VMware CloudHealth
      • ServiceNow ITOM
      • CloudCheckr

      Info-Tech Insight

      Creating vendor profiles will help quickly identify the management tools that meet your multicloud needs.

      Vendor Profile #1

      VMware CloudHealth

      Vendor Summary

      CloudHealth is a VMware management suite that provides visibility into VMware-based as well as public cloud platforms. CloudHealth focuses on providing visibility to costs and governance as well as applying automation and standardization of configuration and performance across cloud platforms.

      URL: cloudhealth.vmware.com

      Supported Platforms

      Supports AWS, Azure, GCP, OCI, VMware

      Feature Sets

      • Portability
      • Cost management
      • Automation across platforms
      • Standardization of configuration
      • Security alignment across platforms
      • Unified provisioning and self-service

      Vendor Profile #2

      ServiceNow ITOM

      Vendor Summary

      ServiceNow IT Operations Management (ITOM) is a module for the ServiceNow platform that allows deep visibility and automated intervention/remediation for resources across multiple public and private cloud platforms. In addition to providing a platform for managing workload portability and costs across multiple cloud platforms, ServiceNow ITOM offers features focused on delivering “proactive digital operations with AIOps.”

      URL: servicenow.com/products/it-operations-management.html

      Supported Platforms

      Supports CloudFormation, ARM, GDM, and Terraform templates. Also provisions virtualized VMware environments.

      Feature Sets

      • Portability
      • Cost management
      • Automation across platforms
      • Standardization of configuration
      • Security alignment across platforms
      • Unified provisioning and self-service

      Vendor Profile #3

      CloudCheckr

      Vendor Summary

      CloudCheckr is a SaaS platform that provides end-to-end cloud management to control cost, ensure security, optimize resources, and enable services. Primarily focused on enabling management of public cloud services, CloudCheckr’s broad platform support and APIs can be used to deliver unified visibility across many multicloud postures.

      URL: cloudcheckr.com

      Supported Platforms

      Supports AWS, Azure, GCP, SAP Hana

      Feature Sets

      • Portability
      • Cost management
      • Automation across platforms
      • Standardization of configuration
      • Security alignment across platforms
      • Unified provisioning and self-service

      Activity

      Understand your vendor options

      This activity involves the following participants:

      • IT strategic direction decision makers
      • Cloud governance team
      • Cloud deployment team
      • Vendor and portfolio management

      Outcomes of this step:

      • Vendor profile template (ppt)

      Info-Tech Insight

      This checkpoint process creates transparency around agreement costs with the business and gives the business an opportunity to reevaluate its requirements for a potentially leaner agreement.

      Create your vendor profiles

      Define what you are looking for and score vendors accordingly.

      1. Create a vendor profile for every vendor of interest.
      2. Leverage our starting list and template to track and record the advantages of each vendor.

      Vendor Profile Template

      The image contains a screenshot of a Vendor Profile Template.

      Land on your feet

      Best practices to hit the ground running in multicloud

      Focus your multicloud posture on SaaS (to start)

      SaaS

      While every service model and deployment model has its place in multicloud, depending on the requirements of the workload and the business, most organizations end up in multicloud because of the wide ecosystem of options available at the SaaS level.

      Enabling the ability to adopt SaaS offerings into your multicloud footprint should be an area of focus for most IT organizations, as it’s the easiest way to deliver business impact (without taking on additional infrastructure work).

      IaaS and PaaS

      Although IaaS and PaaS also have their place in multicloud, the benefits are usually focused more on increased portability and availability rather than on enabling business-led IT.

      Additionally, multicloud at these levels can often be complex and/or costly to implement and maintain. Make sure you understand the cost-benefit for implementing multicloud at this level!

      Where the data sits matters

      With multiple SaaS workloads as well as IaaS and PaaS footprints, one of the biggest challenges to effective multicloud is understanding where any given data is, what needs access to it, and how to stitch it all together.

      In short, you need a strategy to understand how to collect and consolidate data from your multiple footprints.

      Relying solely on the built-in tools and dashboards provided by each provider inevitably leads to data fragmentation – disparate data sets that make it difficult to gain clear, unified visibility into your cloud’s data.

      To address the challenge of fragmented data, many organizations will require a multicloud-capable management platform that can provide access and visibility to data from all sources in a unified way.

      Weigh portability against nativeness

      When it comes to multicloud, cloud-native design is both your enemy and your friend. On one hand, it provides the ability to fully leverage the power and flexibility of your chosen platform to run your workload in the most on-demand, performance-efficient, utility-optimized way possible.

      But it’s important to remember that building cloud-native for one platform directly conflicts with that workload’s portability to other platforms! You need to understand the balance between portability and native effectiveness that works best for each of your workloads.

      Info-Tech Insight

      You can (sort of) have the best of both worlds! While the decision to focus on the cloud-native products, services, and functions from a given cloud platform must be weighed carefully, it’s still a good idea to leverage open standards and architectures for your workloads, as those won’t hamper your portability in the same way.

      Broaden your cost management approach

      Even on singular platforms, cloud cost management is no easy task. In multicloud, this is amplified by the increased scale and scope of providers, products, rates, and units of measure.

      There is no easy solution to this – ultimately the same accountabilities and tasks that apply to good cost management on one cloud also apply to multicloud, just at greater scale and impact.

      The image contains a screenshot of cost management approach.

      Info-Tech Insight

      Evolving your tooling applies to cost management too. While the vendor-provided tools and dashboards for cost control on any given cloud provider’s platform are a good start and a critical source for data, to get a proper holistic view you will usually require multicloud cost management software (and possibly some development work).

      Think about the sky between the clouds

      A key theme in cloud service pricing is “it’s free to come in, but it costs to leave.” This is a critical consideration when designing the inflows and outflows of data, interactions, transactions, and resources among workloads sitting on different platforms and different regions or footprints.

      When defining your multicloud posture, think about what needs to flow between your various clouds and make sure to understand how these flows will affect costs, performance, and throughput of your workloads and the business processes they support.

      • Integration and Interfaces
      • Business Process and Application Flows
      • Inter-cloud Transit Costs

      Mature your management technology

      Automation Is Your Friend

      Managing multicloud is a lot of work. It makes sense to eliminate the most burdensome and error-prone tasks. Automating these tasks also increases the ease and speed of workload portability in most cases.

      Automation and scheduling are also key enablers of standardization – which is critical to managing costs and other risks in multicloud. Create policies that manage and optimize costs, resource utilization, and asset configuration. Use these to reduce the management burden and risk profile.

      Evolve Your Tooling

      Effective multicloud management requires a clear picture of your entire cloud ecosystem across all footprints. This generally isn’t possible using the default tools for any given cloud vendor. Fortunately, there is a wide ecosystem of multicloud tools to help provide you with a unified view.

      The best cloud management tools will not only allow you to get a unified view of your IT operations regardless of where the resources lie but also help you to evaluate your multiple cloud environments in a unified way, providing a level playing field to compare and identify opportunities for improvement.

      Info-Tech Insight

      Embrace openness! Leveraging open standards and technologies doesn’t just ease portability in multicloud; it also helps rationalize telemetry and metrics across platforms, making it easier to achieve a unified management view.

      Multicloud security

      Multicloud security challenges remain focused around managing user and role complexity

      • Fragmentation of identity and access management
      • Controlling access across platforms
      • Increased complexity of roles
      • API security
      • Managing different user types and subscriptions across different service models
      • Managing security best practices across multiple platforms
      • Potential increased attack surface

      Info-Tech Insight

      Don’t reinvent the wheel! Where possible, leverage your existing identity and access management platforms and role-based access control (RBAC) discipline and extend them out to your cloud footprints.

      Don’t fall in reactively!

      1. Multicloud isn’t bad or good.
      2. Put everything the right place; understand the other right places.
      3. Know where your data goes.
      4. Automation is your friend.
      5. Strategy fundamentals don’t change.
      6. Focus on SaaS (to start).
      7. Embrace openness.
      8. Modernize your tools.

      Related Info-Tech Research

      Define Your Cloud Vision
      This blueprint covers a workload-level approach to determining cloud migration paths

      10 Secrets for Successful Disaster Recovery in the Cloud
      This research set covers general cloud best practices for implement DR and resilience in the cloud.

      Bibliography

      “7 Best Practices for Multi-Cloud Management.” vmware.com, 29 April 2022. Web.
      Brown, Chalmers. “Six Best Practices For Multi-Cloud Management.” Forbes, 22 Jan. 2019. Web.
      Curless, Tim. “The Risks of Multi-Cloud Outweigh the Benefits.” AHEAD, n.d. Web.
      Tucker, Ryan. “Multicloud Security: Challenges and Solutions.” Megaport, 29 Sept 2022. Web.
      Velimirovic, Andreja. “How to Implement a Multi Cloud Strategy.” pheonixNAP, 23 June 2021. Web.
      “What is a Multi-Cloud Strategy?” vmware.com, n.d. Web.

      Design a VIP Experience for Your Service Desk

      • Buy Link or Shortcode: {j2store}480|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • VIPs and executives expect to get immediate service for every IT issue, no matter how minor, and the service desk is constantly in reactive mode trying to quickly resolve these issues.
      • VIPs don’t understand or have input into service desk processes, procedures, and SLAs, especially when it comes to prioritization of their issues over other tickets.
      • The C-suite calls the CIO directly with every issue they have, tying them up and forcing them to redirect resources with little notice.
      • VIP tickets sit in the queue too long without a response or resolution, and VIPs are dissatisfied with the service they receive.

      Our Advice

      Critical Insight

      • Service desk and IT leaders are unclear on VIPs' service delivery expectations or the best support model to meet their needs while continuing to meet SLAs for the rest of the organization.
      • Deploying resources to service VIPs ahead of other users or more critical problems can result in inappropriate prioritization of issues and poor service delivery to the rest of the organization.
      • The reality for most organizations is that VIPs need special treatment; but providing VIP service shouldn’t come at the expense of good service delivery for the rest of the organization.

      Impact and Result

      • Stop being reactive to VIP requests and start planning for them so you can formally define the service and set expectations.
      • Talk to all relevant stakeholders to clarify their expectations before choosing a VIP service delivery model. Once you have designed your model, define and document the VIP service processes and procedures and communicate them to your stakeholders so everyone is clear on what is in and out of scope.
      • Once you’ve launched the service, track and report on key service desk metrics associated with VIP requests so you can properly allocate resources, budget accurately, evaluate the effectiveness of the service and demonstrate it to executives.

      Design a VIP Experience for Your Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Design a VIP Experience for Your Service Desk Storyboard – A guide to defining your VIP service desk support model

      Follow the seven steps outlined in this blueprint to design a VIP support model that best suits your organization, then communicate and evaluate the service to ensure it delivers results.

      • Design a VIP Experience for Your Service Desk Storyboard

      2. Service Desk VIP Procedures Template – A customizable template to document your service desk procedures for handling VIP tickets.

      This template is designed to assist with documenting your service desk procedures for handling VIP or executive tickets. It can be adapted and customized to reflect your specific support model and procedures.

      • Service Desk VIP Procedures Template

      3. VIP Support Process Workflow Example – A Visio template to document your process for resolving VIP tickets.

      This Visio template provides an example of a VIP support process, with every step involved in resolving or fulfilling VIP service desk tickets. Use this as an example to follow and a template to document your own process.

      • VIP Support Process Workflow Example

      4. VIP Support Service Communication Template – A customizable PowerPoint template to communicate and market the service to VIP users.

      This template can be customized to use as an executive presentation to communicate and market the service to VIP users and ensure everyone is on the same page.

      • VIP Support Service Communication Template
      [infographic]

      Further reading

      Design a VIP Experience for Your Service Desk

      Keep the C-suite satisfied without sacrificing service to the rest of the organization.

      Analyst Perspective

      Stop being reactive to VIP demands and formalize their service offering.

      Natalie Sansone, PHD

      Natalie Sansone, PHD

      Research Director,
      Infrastructure & Operations
      Info-Tech Research Group

      In a perfect world, executives wouldn’t need any special treatment because the service desk could rapidly resolve every ticket, regardless of the submitter, keeping satisfaction levels high across the board.

      But we know that’s not the case for most organizations. Executives and VIPs demand higher levels of service because the reality in most companies is that their time is worth more. And any IT leader who’s had a VIP complain about their service knows that their voice also carries more weight than that of a regular dissatisfied user.

      That said, most service desks feel strapped for resources and don’t know how to improve service for VIPs without sacrificing service to the rest of the organization.

      The key is to stop being reactive to VIP demands and formalize your VIP service procedures so that you can properly set expectations for the service, monitor and measure it, and continually evaluate it to make changes if necessary.

      A VIP offering doesn’t have to mean a white glove concierge service, either – it could simply mean prioritizing VIP tickets differently. How do you decide which level of service to offer? Start by assessing your specific needs based on demand, gather requirements from relevant stakeholders, choose the right approach to fit your business needs and capabilities, clearly define and document all aspects of the service then communicate it so that everyone is on the same page as to what is in and out of scope, and continually monitor and evaluate the service to make changes and improvements as needed.

      Executive Summary

      Your Challenge

      • VIPs and executives expect to get immediate service for every IT issue, no matter how minor, and the service desk is constantly in reactive mode trying to quickly resolve these issues.
      • VIPs don’t understand or have input into service desk processes, procedures, and SLAs, especially when it comes to prioritization of their issues over other tickets.
      • The C-suite calls the CIO directly with every issue they have, tying them up and forcing them to redirect resources with little notice.
      • VIP tickets sit in the queue too long without a response or resolution, and VIPs are dissatisfied with the service they receive.

      Common Obstacles

      • Service desk and IT leaders are unclear on the expectations that VIPs have for service delivery, or they disagree about the best support model to meet their needs while continuing to meet SLAs for the rest of the organization.
      • Service desk teams with limited resources are unsure how best to allocate those resources to handle VIP tickets in a timely manner.
      • There aren’t enough resources available at the service desk to provide the level of service that VIPs expect for their issues.
      • Deploying resources to service VIPs ahead of other users can result in inappropriate prioritization of issues and poor service delivery to the rest of the organization

      Info-Tech's Approach

      • Stop being reactive to VIP requests and start planning for them so you can formally define the service and set expectations.
      • Talk to all relevant stakeholders to clarify their expectations before choosing a VIP service delivery model.
      • Define and document the VIP service processes and procedures, including exactly what is in and out of scope.
      • Track and report on metrics associated with VIP requests so you can properly allocate resources and budget for the service.
      • Continually evaluate the service to expand, reduce, or redefine it, as necessary.

      Info-Tech Insight

      The reality for most organizations is that VIPs need special treatment. But providing VIP service shouldn’t come at the expense of good service delivery for the rest of the organization. To be successful with your approach, formalize the VIP offering to bring consistency and clear expectations for both users and the IT staff delivering the service.

      Do any of these scenarios sound familiar?

      All these familiar scenarios can occur when the service desk treats VIP issues reactively and doesn’t have a defined, documented, and agreed-upon VIP process in place.
      • A VIP calls because their personal printer isn’t working, but you also have a network issue affecting payroll being able to issue paychecks. The VIP wants their issue fixed immediately despite there being a workaround and a higher priority incident needing resources.
      • The COO calls the CIO after hours about issues they’re having with their email. The CIO immediately deploys a field tech back to the office to help the COO. Once the tech arrives, the COO says the issue could have waited until the morning.
      • The company president wants IT to spend a day at their house setting up their new personal laptop to be able to connect into the office before their vacation tomorrow. It would take away one FTE from an already understaffed service desk.
      • The CEO brings their child’s new iPhone in and asks the service desk if they have time to set it up as a favor today. The service desk manager instructs the T2 apps specialist to drop his other tickets to work on this immediately.
      • Two tickets come in at the same time – one is from an SVP who can’t log in to Teams and has an online meeting in half an hour, and the other is for a department of 10 who can’t access the network. The service desk doesn’t know who to help first.

      Different organizations can take very different approaches to VIP requests

      CASE STUDIES

      Providing VIP support helped this company grow

      Allocating a dedicated VIP technician slowed down service delivery for this company

      Situation

      A SaaS company looking to build and scale its services and customers decided to set up a VIP support program, which involved giving their most valuable customers white glove treatment to ensure they had a great experience, became long-term customers, and thus had a positive influence on others to build up the company’s customer base. VIPs were receiving executive-level support with a dedicated person for VIP tickets. The VIPs were happy with the service, but the VIP technician’s regular work was frequently impeded by having to spend most of her time doing white glove activities. The service desk found that in some cases, more critical work was slipping as a result of prioritizing all executive tickets.

      Resolution

      First, they defined who would receive VIP support, then they clearly defined the service, including what VIP support includes, who gets the service, and what their SLAs for service are. They found that the program was an effective way to focus their limited resources on the customers with the highest value potential to increase sales.
      While this model differs from an IT service desk VIP support program, the principles of dedicating resources to provide elevated support to your most important and influential customers for the benefit and growth of the company as a whole remain the same.
      The service desk decided to remove the VIP function. They demonstrated that the cost per contact was too high for dedicated executive support, and reallocating that dedicated technician to the service desk would improve the resolution time of all business incidents and requests. VIPs could still receive prioritized support through the escalation process, but they would contact the regular service desk with their issues. VIPs approved the change, and as a result of removing the dedicated support function, the service desk reduced average incident resolution times by 28% and request fulfillment times by 33%.

      A well-designed and communicated VIP support service can deliver many benefits

      The key to deciding whether a VIP service is right for your organization is to first analyze your needs, match them against your resources, then clearly define and document exactly what is in scope for the service.

      A successfully designed VIP service will lead to:

      • Executives and VIPs can easily contact the service desk and receive exceptional support and customer service from a knowledgeable technician, increasing their trust in the service desk.
      • All service desk tickets are prioritized appropriately and effectively in order to maximize overall ticket resolution and fulfillment times.
      • All users have a clear understanding of how to get in touch with the service desk and expected SLAs for specific ticket types.
      • Critical, business-impacting issues still receive priority service ahead of minor tickets submitted by a VIP.
      • All service desk technicians are clear on processes and procedures for prioritizing and handling VIP tickets.
      • Executives are satisfied with the service they receive and the value that IT provides
      • Reduced VIP downtime, contributing to overall organization productivity and growth.

      A poorly designed or reactive VIP service will lead to:

      • VIPs expect immediate service for non-critical issues, including after-hours.
      • VIPs circumvent the correct process and contact the CIO or service desk manager directly for all their issues.
      • Service desk resources stretched thin, or poor allocation of resources leads to degraded service for the majority of users.
      • More critical business issues are pushed back in order to fix non-critical executive issues.
      • Service desk is not clear how to prioritize tickets and always addresses VIP tickets first regardless of priority.
      • The service desk automatically acts on VIP tickets even when the VIP doesn’t require it or realize they’re getting a different level of service.
      • Non-VIP users are aware of the different service levels and try to request the same priority for their tickets. Support costs are over budget.

      Follow Info-Tech’s approach to design a successful VIP support model

      Follow the seven steps in this blueprint to design a VIP support model that works for your organization:
      1. Understand the support models available, from white glove service to the same service for everyone.
      2. Gather business requirements from all relevant stakeholders.
      3. Based on your business needs, choose the right approach.
      4. Define and document all details of the VIP service offering.
      5. Communicate and market the offering to VIPs so they’re aware of what’s in scope.
      6. Monitor volume and track metrics to evaluate what’s working.
      7. Continually improve or modify the service as needed over time.

      Blueprint deliverables

      The templates listed below are designed to assist you with various stages of this project. This storyboard will direct you when and how to complete them.

      Service Desk VIP Procedures Template

      Use this template to assist with documenting your service desk procedures for handling VIP or executive tickets.

      VIP Support Process Workflow Example

      Use this Visio template to document your process for resolving or fulfilling VIP tickets, from when the ticket is submitted to when it’s closed.

      VIP Support Service Communication Template

      Use this template to customize your executive presentation to communicate and market the service to VIP users.

      Insight Summary

      Key Insight

      The reality for most organizations is that VIPs need special treatment. But providing VIP service shouldn’t be at the expense of good service delivery for the rest of the organization. To be successful with your approach, formalize the VIP offering to bring consistency and clear expectations for both users and the IT staff delivering the service.

      Additional insights:

      Insight 1

      VIP service doesn’t have to mean concierge service. There are different levels and models of VIP support that range in cost and level of service provided. Carefully evaluate your needs and capacity to choose the approach that works best for your organization.

      Insight 2

      This service is for your most valued users, so design it right from the start to ensure their satisfaction. Involve stakeholders from the beginning, incorporate their feedback and requirements, keep them well-informed about the service, and continually collect and act on feedback to deliver the intended value.

      Insight 3

      Intentional, continual monitoring and measurement of the program must be part of your strategy. If your metrics or feedback show that something isn’t working, fix it. If you find that the perceived value isn’t worth the high cost of the program, make changes. Even if everything seems to be working fine, identify ways to improve it or make it more efficient.

      Step 1: Understand the different support models

      Step overview:

      • Understand the support models available, from white glove service to the same service for everyone

      First, define what “VIP support” means in your organization

      VIP support from the service desk usually refers to an elevated level of service (i.e. faster, after-hours, off-site, and/or with more experienced resources) that is provided to those at the executive level of the organization.

      A VIP typically includes executives across the business (e.g. CIO, CEO, CxO, VPs) and sometimes the executive assistants who work directly with them. However, it can also include non-executive-level but critical business roles in some organizations.

      The level of VIP service provided can differ from receiving prioritization in the queue to having a dedicated, full-time technician providing “white glove” service.

      Info-Tech Insight

      You don’t have to use the term “VIP”, as long as you clearly define the terms you are using. Some organizations use the term “VIR” to refer to very important roles rather than people, and some define “critical users” to reflect who should receive prioritized service, for example.

      There are essentially two options for VIP support, but multiple determining factors

      While the details are more specific, your options for VIP support really come down to two: they either receive some kind of enhanced service (either from a dedicated support team or through prioritization from the regular support team) or they don’t. Which option you choose will depend on a wide range of factors, some of which are represented in the diagram below. Factors such as IT budget, size of organization help determine which VIP support model you choose: Enhanced, or the same as everyone else. With enhanced service, you can opt to a dedicated support team or same support team but with prioritized service.

      Option 1: Same service for everyone

      What does it look like?

      VIP tickets are prioritized in the same way as every other ticket – with an assessment by impact and urgency. This allows every ticket to be prioritized appropriately according to how big the impact of the issue is and how quickly it needs to be resolved – regardless of who the submitter is. This means that VIPs with very urgent issues will still receive immediate support, as would a non-VIP user with a critical issue.

      Who is it best suited for?

      • Small organizations and IT teams.
      • Executives don’t want special treatment.
      • Not enough service desk resources or budget to provide prioritized or dedicated VIP service.
      • Service desk is already efficient and meeting SLAs for all requests and incidents.

      Pros

      • Highest level of consistency in service because the same process is followed for all user groups.
      • Ensures that service doesn’t suffer for non-VIP users for teams with a limited number of service desk staff.
      • No additional cost.
      • Potential to argue for more resources if executive service expectations aren’t met.

      Cons

      • Does not work if executives expect or require elevated service regardless of issue type.
      • Potential for increase in management escalations or complaints from dissatisfied executives. Some may end up jumping the queue as a result, which results in unstandardized VIP treatment only for some users.

      Info-Tech Insight

      Don’t design a VIP service solely out of fear that VIPs will be unhappy with the standard level of support the service desk provides. In some cases, it is better to focus your efforts on improving your standard support for everyone rather than only for a small percentage of users, especially if providing that elevated VIP support would further deteriorate service levels for the rest of the organization.

      Option 2: Prioritized service for VIPs

      What does it look like?

      • VIPs still go through the service desk but receive higher priority than non-VIP tickets.
      • Requests from VIP submitters are still evaluated using the standard prioritization matrix but are bumped up in urgency or priority. More critical issues can still take precedence.
      • Existing service desk resources are still used to resolve the request, but requests are just placed closer to the “front of the line.”
      • VIP users are identified in the ticketing system and may have a separate number to call or are routed differently/skip the queue within the ACD/IVR.

      Who is it best suited for?

      • Organizations that want or need to give VIPs expedited or enhanced service, but that don’t have the resources to dedicate to a completely separate VIP service desk team.

      Pros

      • Meets the need of executives for faster service.
      • Balances the need for prioritized service to VIPs while not sacrificing resources to handle most user requests.
      • All tickets still go through a single point of contact to be triaged and monitored by the service desk.
      • Easy to measure and compare performance of VIP service vs. standard service because processes are the same.

      Cons

      • Slight cost associated with implementing changes to phone system if necessary.
      • Makes other users aware that VIPs receive “special treatment” – some may try to jump the queue themselves.
      • May not meet the expectations of some executives who prefer dedicated, face-to-face resources to resolve their issues.

      Info-Tech Insight

      If you’re already informally bumping VIP tickets up the queue, this may be the most appropriate model for you. Bring formalization to your process by clearly defining exactly where VIP tickets fit in your prioritization matrix to ensure they are handled consistently and that VIPs are aware of the process.

      Option 3: Dedicated VIP service

      What does it look like?

      • VIPs contact a dedicated service desk and receive immediate/expedited support, often face to face.
      • Often a separate phone number or point of contact.
      • Similar to concierge service or “white glove” service models.
      • At least one dedicated FTE with good customer service skills and technical knowledge who builds trust with executives.

      Who is it best suited for?

      • Larger enterprises with many VIP users to support, but where VIPs are geographically clustered (as geography sprawls, the cost of the service will spiral).
      • IT organizations with enough resources on the service desk to support a dedicated VIP function.
      • Organizations where executives require immediate, in-person support.

      Pros

      • Most of the time, this model results in the fastest service delivery to executives.
      • Most personal method of delivering support with help often provided in person and from familiar, trusted technicians.
      • Usually leads to the highest level of satisfaction with the service desk from executives.

      Cons

      • Most expensive model; usually requires at least one dedicated, experienced FTE to support and sometimes after-hours support.
      • Essentially two separate service desks; can result in a disconnect between staff.
      • Career path and cross-training opportunities for the dedicated staff may be limited; role can be exhausting.
      • Reporting on the service can be more complicated and tickets are often logged after the fact.
      • If not done well, quality of service can suffer for the rest of the organization.

      Info-Tech Insight

      This type of model is essential in many large enterprises where the success of the company can depend on VIPs having access to dedicated support to minimize downtime as much as possible. However, it also requires the highest level of planning and dedication to get right. Without carefully documented processes and procedures and highly trained staff to support the model, it will fail to deliver the expected benefits.

      Step 2: Capture business needs

      Step overview:

      • Analyze your data and gather requirements to determine whether there is a need for a VIP service.

      Assess current state and metrics

      You can’t define your target state without a clear understanding of your current state. Analyze your ticket data and reports to identify the type and volume of VIP requests the service desk receives and how well you’re able to meet these requests with your current resources and structure.

      Analyze ticket data

      • What volume of tickets are you supporting? How many of those tickets come from VIP users?
      • What is your current resolution time for incidents and requests? How well are you currently meeting SLAs?
      • How quickly are executive/VIP tickets being resolved? How long do they have to wait for a response?
      • How many after-hours requests do you receive?

      Assess resourcing

      • How many users do you support; what percentage of them would be identified as VIP users?
      • How many service desk technicians do you have at each tier?
      • How well are you currently meeting demand? Would you be able to meet demand if you dedicated one or more Tier 2 technicians to VIP support?
      • If you would need to hire additional resources, is there budget to do so?

      Use the data to inform your assessment

      • Do you have a current problem with service delivery to VIPs and/or all users that needs to be addressed by changing the VIP support model?
      • Do you have the demand to support the need for a VIP service?
      • Do you have the resources to support providing VIP service?

      Leverage Info-Tech’s tools to inform your assessment

      Analyze your ticket data and reports to understand how well you’re currently meeting SLAs, your average response and resolution times, and the volume and type of requests you get from VIPs in order to understand the need for changing your current model. If you don’t have the ticket data to inform your assessment, leverage Info-Tech’s Service Desk Ticket Analysis Tool.

      Service Desk Ticket Analysis Tool

      Use this tool to identify trends and patterns in your ticket data. The ticket summary dashboard contains multiple reports analyzing how tickets come in, who requests them, who resolves them, and how long it takes to resolve them.

      If you need help understanding how well your current staff is able to handle your current ticket volume, leverage Info-Tech’s Service Desk Staffing Calculator to analyze demand and ticket volume trends. While not specifically designed to analyze VIP tickets, you could run the assessment separately for VIP volume if you have that data available.

      Service Desk Staffing Calculator

      Use this tool to help you estimate the optimal resource allocation to support your demand over time.

      Engage stakeholders to understand their requirements

      Follow your organization’s requirements gathering process to identify and prioritize stakeholders, conduct stakeholder interviews, and identify, track, and prioritize their requirements and expectations for service delivery.

      Gather requirements from VIP stakeholders

      1. Identify which stakeholders need to be consulted.
      2. Prioritize stakeholders in terms of influence and interest in order to identify who to engage in the requirements gathering process.
      3. Build a plan for gathering the requirements of key stakeholders in terms of VIP service delivery.
      4. Conduct requirements gathering and record the results of each stakeholder interaction.
      5. Analyze and summarize the results to determine the top expectations and requirements for VIP service desk support.

      If your organization does not have a defined requirements gathering process or template, leverage Info-Tech tools and templates:

      The Improve Requirements Gathering blueprint can be adapted from software requirements gathering to service desk.

      The PMO Requirements Gathering Tool can be adapted from interviewing stakeholders on their PMO requirements to service desk requirements.

      Info-Tech Insight

      Don’t guess at what your VIPs need or want – ask them and involve them in the service design. Many IT leaders sacrifice overall service quality to prioritize VIPs, thinking they expect immediate service. However, they later find out that the VIPs just assumed the service they were receiving was the standard service and many of their issues can wait.

      Identify additional challenges and opportunities by collecting perceptions of business users and stakeholders

      Formally measuring perceptions from your end users and key business stakeholders will help to inform your needs and determine how well the service desk is currently meeting demands from both VIP users and the entire user base.

      CIO Business Vision

      Info-Tech's CIO Business Vision program is a low-effort, high-impact program that will give you detailed report cards on the organization’s satisfaction with IT’s core services. Use these insights to understand your key business stakeholders, find out what is important to them, and improve your interactions.

      End User Satisfaction

      Info-Tech’s End User Satisfaction Program helps you measure end-user satisfaction and importance ratings of core IT services, IT communications, and business enablement to help you decide which IT service capabilities need to be addressed to meet the demands of the business.

      Learn more about Info-Tech’s CIO Business Vision or End User Satisfaction Program .

      Step 3: Choose the right approach

      Step overview:

      • Based on your assessment from Step 2, decide on the best way to move forward with your VIP service model.

      Use your assessment results to choose the most appropriate support model

      The table below is a rough guide for how the results of your assessments may line up to the most appropriate model for your organization:

      Example assessment results for: Dedicated service, prioritized service, and same servce based off of the assessment source: Ticket analysis, staffing analysis, or stakeholder.

      Info-Tech Insight

      If you’re in the position of deciding how to improve service to VIPs, it’s unlikely that you will end up choosing the “same service” model. If your data analysis tells you that you are currently meeting every metric target for all users, this may actually indicate that you’re overstaffed at the service desk.

      If you choose a specialized VIP support model, ensure there is a strong, defined need before moving forward

      Do not proceed if:

      • Your decision is purely reactive in response to a perceived need or challenges you’re currently experiencing
      • The demand is coming from a single dissatisfied executive without requirements from other VIPs being collected.
      • Your assessment data does not support the demand for a dedicated VIP function.
      • You don’t have the resources or support required to be successful in the approach.

      Proceed with a VIP model if:

      • You’re prepared to scale and support the model over the long term.
      • Business stakeholders have clearly expressed a need for improved VIP service.
      • Data shows that there is a high volume of urgent requests from VIPs.
      • You have the budget and resources required to support an enhanced VIP service delivery model.

      Step 4: Design the service offering

      Step overview:

      • Define and document all processes, procedures, and responsibilities relevant to the VIP support offering.

      Clearly define the service and eligible users

      Once you’ve decided on the most appropriate model, clearly describe the service and document who is eligible to receive it.

      1. Define exactly what the service is before going into the procedural details. High-level examples to start from are provided below:

      Prioritized Service Model

      When a designated VIP user contacts the service desk with a question, incident, or service request, their ticket will be prioritized over non-VIP tickets following the prioritization matrix. This process has been designed in accordance with business needs and requirements, as defined VIP users have more urgent demands on their time and the impact of downtime is greater as it has the potential to impact the business. However, all tickets, VIP tickets included, must still be prioritized by impact and urgency. Incidents that are more critical will still be resolved before VIP tickets in accordance with the prioritization process.

      Dedicated Service Model

      VIP support is a team of dedicated field technicians available to provide an elevated level of service including deskside support for executives and designated VIP users. VIP users have the ability to contact the VIP support service through a dedicated phone number and will receive expedited ticket handling and resolution by dedicated Tier 2 specialists with experience dealing with executives and their unique needs and requirements. This process has been designed in accordance with business needs and requirements.

      2 Identify VIP-eligible users

      • Define who qualifies as a VIP to receive VIP support or be eligible to contact the dedicated VIP service desk/concierge desk.
      • If other users or EAs can submit tickets on behalf of VIPs, identify those individuals as well.
      • Review the list and cut back if necessary. Less is usually more here, especially when starting out. If everyone is a VIP, then no one is truly a VIP.
      • Identify who maintains ownership over the list of eligible VIP users and how any changes to the list or requests for changes will be handled.
      • Ensure that all VIP-eligible users are clearly identified in the ITSM system.

      Map out the VIP process in a workflow

      Use a visual workflow to document the process for resolving or fulfilling VIP tickets, from when the ticket is submitted to when it gets closed.

      Your workflow should address the following:

      • How should the ticket be prioritized?
      • When are escalations necessary?
      • What happens if a user requests VIP service but is not defined as eligible?
      • Should the user verify that the issue is resolved before the ticket is closed?
      • What automatic notifications or communications need to go out and when?
      • What manual communications or notifications need to be sent out (e.g. when a ticket is escalated or reassigned)?
      VIP Support Process Example.

      Use the VIP Support Process Workflow Example as a template to map out your own process.

      Define and document all VIP processes and procedures

      Clearly describe the service and all related processes and procedures so that both the service delivery team and users are on the same page.

      Define all aspects of the service so that every VIP request will follow the same standardized process and VIPs will have clear expectations for the service they receive. This may include:

      • How VIPs should contact the service desk
      • How VIP tickets will be prioritized
      • SLAs and service expectations for VIP tickets
      • Ticket resolution or fulfillment steps and process
      • Escalation points and contacts
      • After-hours requests process

      If VIP user requests receive enhanced priority, for example, define exactly how those requests should be prioritized using your prioritization matrix. An example is found below and in the Service Desk VIP Procedures Template.

      Prioritization matrix for classification of incidents and requests.

      Use Info-Tech’s Service Desk VIP Procedures Template as a guide

      This template is designed to assist with documenting your service desk procedures for handling VIP or executive tickets. The template is not meant to cover all possible VIP support models but is an example of one support model only. It should be adapted and customized to reflect your specific support model and procedures.

      It includes the following sections:

      1. VIP support description/overview
      2. VIP support entitlement (who is eligible)
      3. Procedures
        • Ticket submission and triage
        • Ticket prioritization
        • SLAs and escalation
        • VIP ticket resolution process
        • After-hours requests
      4. Monitoring and reporting

      Download the Service Desk VIP Procedures Template

      Allocate resources or assign responsibilities specific to VIP support

      Regardless of the support model you choose, you’ll need to be clear on service desk agents’ responsibilities when dealing with VIP users.
      • Clarify the expectations of any service desk agent who will be handling VIP tickets; they should demonstrate excellent customer service skills and expertise, respect for the VIP and the sensitivity of their data, and prompt service.
      • Use a RACI chart to clarify responsibility and accountability for VIP-specific support tasks.
      • If you will be moving to a dedicated VIP support team, clearly define the responsibilities of any new roles or tasks. Sample responsibilities can be found on the right.
      • If you will be changing the role of an existing service desk agent to become focused solely on providing VIP support, clarify how the responsibilities of other service desk agents may change too, if at all.
      • Be clear on expectations of agents for after-hours support, especially if there will be a change to the current service provision.

      Sample responsibilities for a dedicated VIP support technician/specialist may include:

      • Resolve support tickets for all eligible VIP users following established processes and procedures.
      • Provide both onsite and remote support to executives.
      • Quickly and effectively diagnose and resolve technical issues with minimal disruption to the executive team.
      • Establish trust with executives/VIPs by maintaining confidentiality and privacy while providing technical support.
      • Set up, monitor, and support high-priority meetings, conferences, and events.
      • Demonstrate excellent communication and customer service skills when providing support to executives.
      • Coordinate more complex support issues with higher level support staff and track tickets through to resolution when needed.
      • Learn new technology and software ahead of implementation to train and support executive teams for use.
      • Conduct individual or group training as needed to educate on applications or how to best use technology to enhance productivity.
      • Proactively manage, maintain, update, and upgrade end-user devices as needed.

      Configure your ITSM tool to support your processes

      Configure your tool to support your processes, not the other way around.
      • Identify and configure VIP users in the system to ensure that they are easily identifiable in the system (e.g. there may be a symbol beside their name).
      • Configure automations or build ticket templates that would automatically set the urgency or priority of VIP tickets.
      • Configure any business rules or workflows that apply to the VIP support process.
      • Define any automated notifications that need to be sent when a VIP ticket is submitted, assigned, escalated, or resolved (e.g. notify service desk manager or a specific DL).
      • Define metrics and customize dashboards and reports to monitor VIP tickets and measure the success of the VIP service.
      • Configure any SLAs that apply only to VIPs to ensure displayed SLAs are accurate.

      Step 5: Launch the service

      Step overview:

      • Communicate and market the service to all relevant stakeholders so everyone is on the same page as to how it works and what’s in scope.

      Communicate the new or revised service to relevant stakeholders ahead of the launch

      If you did your due diligence, the VIP service launch won’t be a surprise to executives. However, it’s critical to

      continue the engagement and communicate the details of the service well to ensure there are no misperceptions about the

      service when it launches.

      Goals of communicating and marketing the service:

      1. Create awareness and understanding of the purpose of the VIP service and what it means for eligible users.
      2. Solidify commitment and buy-in for the service from all stakeholders.
      3. Ensure that all users know how to access the service and any changes to the way they should interact with the service desk.
      4. Set expectations for new/revised service levels.
      5. Reduce and address any concerns about the change in process.

      Info-Tech Insight

      This step isn’t only for the launch of new services. Even if you’re enhancing or right-sizing an existing VIP service, take the opportunity to market the improvements, remind users of the correct processes, and collect feedback.

      Leverage Info-Tech’s communication template to structure your presentation

      This template can be customized to use as an executive presentation to communicate and market the service to VIP users. It includes:

      • Key takeaways
      • Current-state assessment
      • Requirements gathering and feedback results
      • Objectives for the service
      • Anticipated benefits
      • Service entitlement
      • How the service works
      • Escalations and feedback contacts
      • Timeline of next steps

      Info-Tech Insight

      If you’re launching a dedicated concierge service for VIPs, highlight the exclusivity of the service in your marketing to draw users in. For example, if eligible VIPs get a separate number to call, expedited SLAs, or access to more tenured service desk experts, promote this added value of the service.

      Download the VIP Support Service Communication Template

      Step 6: Monitor and measure

      Step overview:

      • Measure and monitor the success of the program by tracking and reporting on targeted metrics.

      Evaluate and demonstrate the success of the program with key metrics

      Targeted metrics to evaluate the success of the VIP program will be critical to understanding and demonstrating whether the service is delivering the intended value. Track key metrics to:

      • Track if and how well you’re meeting your defined SLAs for VIP support.
      • Measure demand for VIP support (i.e. ticket volume and types of tickets) and evaluate against resource supply to determine whether a staffing adjustment is needed to meet demand.
      • Measure the cost of providing the VIP service in order to report back to executives.
      • Leverage real data to quantitatively demonstrate that you’re providing enhanced service to VIPs if there is an escalation or negative feedback from one individual.
      • Monitor service delivery to non-VIP users to ensure that service to the rest of the organization isn’t impacted by the VIP service
      • Evaluate the types of ticket that are submitted to the VIP service to inform training plans, self-service options, device upgrades, or alternatives to reduce future volume.

      Info-Tech Insight

      If your data definitively shows the VIP offering delivers enhanced service levels, publish these results to business leadership. A successful VIP service is a great accomplishment to market and build credibility for the service desk.

      Tie metrics to critical success factors

      Apart from your regular service desk metrics, identify the top metrics to tie to the key performance indicators of the program’s success factors.

      Sample Critical Success Factors

      • Increased executive satisfaction with the service desk
      • Improved response and resolution times to VIP tickets
      • Demand for the service is matched by supply

      Sample Metrics

      • End-user satisfaction scores on VIP tickets
      • Executive satisfaction with the service desk as measured on a broader annual survey
      • Response and resolution times for VIP tickets
      • Percentage of SLAs met for VIP tickets
      • VIP ticket volume
      • Average speed of answer for VIP calls

      Download Define Service Desk Metrics that Matter and the Service Desk Metrics Workbook for help defining CSFs, KPIs, and key metrics

      Step 7: Continually improve

      Step overview:

      • Continually evaluate the program to identify opportunities for improvement or modifications to the service support model.

      Continually evaluate the service to identify improvements

      Executives are happy, resolution times are on target – now what? Even if everything seems to be working well, never stop monitoring, measuring, and evaluating the service. Not only can metrics change, but there can also always be ways to improve service.

      • Continual improvement should be a mindset – there are always opportunities for improvement, and someone should be responsible for identifying and tracking these opportunities so that they actually get done.
      • Just as you asked for feedback and involvement from VIPs (and their assistants who may submit tickets on their behalf) in designing the service, you should continually collect that feedback and use it to inform improvements to the service.
      • End-user satisfaction surveys, especially broader, more targeted surveys, are also a great source of improvement ideas.
      • Even if end users don’t perceive any need for improvement, IT should still assess how they can make their own processes more efficient or offer alternatives to make delivery easier.

      Download Info-Tech’s Build a Continual Improvement Program blueprint to help you build a process around continual improvement, and use the Continual Improvement Register tool to help you identify and prioritize improvement initiatives.

      Info-Tech Insight

      Don’t limit your continual improvement efforts to the VIP service. Once you’ve successfully elevated the VIP service, look to how you can apply elements of that service to elevate support to the rest of the organization. For example, through providing a roaming service desk, a concierge desk, a Genius-Bar-style walk-in service, etc.

      Expand, reduce, or modify as needed

      Don’t stop with a one-time program evaluation. Continually use your metrics to evaluate whether the service offering needs to change to better suit the needs of your executives and organization. It may be fine as is, or you may find you need to do one of the following:

      Expand

      • If the service offering has been successful and/or your data shows underuse of VIP-dedicated resources, you may be able to expand the offering to identify additional roles as VIP-eligible.
      • Be cautious not to expand the service too widely; not only should it feel exclusive to VIPs, but you need to be able to support it.
      • Also consider whether elements that have been successful in the VIP program (e.g. a concierge desk, after-hours support) should be expanded to be offered to non-VIPs.

      Reduce

      • If VIPs are not using the service as much as anticipated or data shows supply outweighs demand, you may consider scaling back the service to save costs and resources.
      • However, be careful in how you approach this – it shouldn’t negatively impact service to existing users.
      • Rather, evaluate costly services like after-hours support and whether it’s necessary based on demand, adjust SLAs if needed, or reallocate service desk resources or responsibilities. For example, if demand doesn’t justify a dedicated service desk technician, either add non-VIP tasks to their responsibilities or consider moving to a prioritized model.

      Modify

      • The support model doesn’t need to be set in stone. If elements aren’t working, change them! If the entire support model isn’t working, reevaluate if it’s the best model for your organization.
      • Don’t make decisions in a vacuum, though. Just as executives were involved in decision-making at the outset, continually gather their feedback and use it to inform the service design.

      Related Info-Tech Research

      Standardize the Service Desk

      This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management to create a sustainable service desk.

      Optimize the Service Desk With a Shift-Left Strategy

      This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.

      Build a Continual Improvement Plan

      This project will help you build a continual improvement plan for the service desk to review key processes and services and manage the progress of improvement initiatives.

      Deliver a Customer Service Training Program to Your IT Department

      This project will help you deliver a targeted customer service training program to your IT team to enhance their customer service skills when dealing with end users, improve overall service delivery, and increase customer satisfaction.

      Works Cited

      Munger, Nate. “Why You Should Provide VIP Customer Support.” Intercom, 13 Jan. 2016. Accessed Jan. 2023.

      Ogilvie, Ryan. “We Did Away With VIP Support and Got More Efficient.” HDI, 17 Sep. 2020. Accessed Jan. 2023.

      Modernize the Network

      • Buy Link or Shortcode: {j2store}501|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $16,499 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Network Management
      • Parent Category Link: /network-management
      • Business units, functions, and processes are inextricably intertwined with less and less tolerance for downtime.
      • Business demands change rapidly but the refresh horizon for infrastructure remains 5-7 years.
      • The number of endpoint devices the network is expected to support is growing geometrically but historic capacity planning grew linearly.
      • The business is unable to clearly define requirements, paralyzing planning.

      Our Advice

      Critical Insight

      • Build for your needs. Don’t fall into the trap of assuming what works for your neighbor, your peer, or your competitor will work for you.
      • Deliver on what your business knows it needs as well as what it doesn’t yet know it needs. Business leaders have business vision, but this vision won’t directly demand the required network capabilities to enable the business. This is where you come in.
      • Modern technologies are hampered by vintage processes. New technologies demand new ways of accomplishing old tasks.

      Impact and Result

      • Use a systematic approach to document all stakeholder needs and rely on the network technical staff to translate those needs into design constraints, use cases, features, and management practices.
      • Spend only on those emerging technologies that deliver features offering direct benefits to specific business goals and IT needs.
      • Solidify the business case for your network modernization project by demonstrating and quantifying the hard dollar value it provides to the business.

      Modernize the Network Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should modernize the enterprise network, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess the network

      Identify and prioritize stakeholder and IT/networking concerns.

      • Modernize the Network – Phase 1: Assess the Network
      • Network Modernization Workbook

      2. Envision the network of the future

      Learn about emerging technologies and identify essential features of a modernized network solution.

      • Modernize the Network – Phase 2: Envision Your Future Network
      • Network Modernization Technology Assessment Tool

      3. Communicate and execute the plan

      Compose a presentation for stakeholders and prepare the RFP for vendors.

      • Modernize the Network – Phase 3: Communicate and Execute the Plan
      • Network Modernization Roadmap
      • Network Modernization Executive Presentation Template
      • Network Modernization RFP Template
      [infographic]

      Workshop: Modernize the Network

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Network

      The Purpose

      Understand current stakeholder and IT needs pertaining to the network.

      Key Benefits Achieved

      Prioritized lists of stakeholder and IT needs.

      Activities

      1.1 Assess and prioritize stakeholder concerns.

      1.2 Assess and prioritize design considerations.

      1.3 Assess and prioritize use cases.

      1.4 Assess and prioritize network infrastructure concerns.

      1.5 Assess and prioritize care and control concerns.

      Outputs

      Current State Register

      2 Analyze Emerging Technologies and Identify Features

      The Purpose

      Analyze emerging technologies to determine whether or not to include them in the network modernization.

      Identify and shortlist networking features that will be part of the network modernization.

      Key Benefits Achieved

      An understanding of what emerging technologies are suitable for including in your network modernization.

      A prioritized list of features, aligned with business needs, that your modernized network must or should have.

      Activities

      2.1 Analyze emerging technologies.

      2.2 Identify features to support drivers, practices, and pain points.

      Outputs

      Emerging technology assessment

      Prioritize lists of modernized network features

      3 Plan for Future Capacity

      The Purpose

      Estimate future port, bandwidth, and latency requirements for all sites on the network.

      Key Benefits Achieved

      Planning for capacity ensures the network is capable of delivering until the next refresh cycle and beyond.

      Activities

      3.1 Estimate port, bandwidth, and latency requirements.

      3.2 Group sites according to capacity requirements.

      3.3 Create standardized capacity plans for each group.

      Outputs

      A summary of capacity requirements for each site in the network

      4 Communicate and Execute the Plan

      The Purpose

      Create a presentation to pitch the project to executives.

      Compose key elements of RFP.

      Key Benefits Achieved

      Communication to executives, summarizing the elements of the modernization project that business decision makers will want to know, in order to gain approval.

      Communication to vendors detailing the network solution requirements so that proposed solutions are aligned to business and IT needs.

      Activities

      4.1 Build the executive presentation.

      4.2 Compose the scope of work.

      4.3 Compose technical requirements.

      Outputs

      Executive Presentation

      Request for Proposal/Quotation

      Build Your Data Practice and Platform

      • Buy Link or Shortcode: {j2store}347|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management

      The complex nature of data investment leads to de-scoping and delivery of data services that do not meet business needs or give value to the business. Subject matter experts are hired to resolve the problem, but their success is impacted by absent architecture, technology, and organizational alignment.

      Our Advice

      Critical Insight

      Walking through a book of architecture building plans with a personal guide is cheaper and faster than employing an architect to build and design your home.

      Impact and Result

      Info-Tech's approach provides a proven methodology that includes the following:

      • Business-aligned data initiatives and capabilities that address data challenges and realize business strategic objectives.
      • Comprehensive data practice designed based on the required business and data capabilities.
      • Data platform design based on Info-Tech data architecture reference patterns and prioritized data initiatives and capabilities.

      Build Your Data Practice and Platform Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build Your Data Practice and Platform Storyboard – A step-by-step document that leverages road-tested patterns and frameworks to properly build your data practice and pattern in continuous alignment with the business landscape.

      Info-Tech's approach provides a proven methodology that includes following:   

    • Business-aligned data initiatives and capabilities that address data challenges and realize business strategic objectives.
    • Comprehensive data practices designed based on the required business and data capabilities.
      • Build Your Data Practice and Platform Storyboard

      2. Data Practice and Platform Models – Leveraging best-of-breed frameworks to help you build a clear, concise, and compelling data practice and platform.

      Data practice & platform pre-build pattern templates based on Info-Tech data reference patterns and data platform design best practices.

      • Data Practice and Platform Models

      Infographic

      Workshop: Build Your Data Practice and Platform

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish Business Context and Value

      The Purpose

      Establish business context and value.

      Key Benefits Achieved

      Business context and strategic driver.

      Activities

      1.1 Understand/confirm the organization's strategic goals

      1.2 Classify the strategic goals and map to business drivers

      1.3 Identify the business capabilities that the strategy focuses on

      1.4 Identify the business processes realizing the strategy

      Outputs

      Business context and strategic drivers

      Prioritized business capabilities and processes

      Data culture survey results analysis

      2 Identify Your Top Initiatives

      The Purpose

      Identify your top initiatives.

      Key Benefits Achieved

      High-value business-aligned data initiative.

      Activities

      2.1 Highlight data-related outcomes/goals to realize to fulfill the business goal

      2.2 Map business data initiatives to the business strategic goals

      2.3 Prioritize data initiatives

      Outputs

      High-value, business-aligned data initiatives

      3 Analyze Data Challenges

      The Purpose

      Analyze data challenges.

      Key Benefits Achieved

      Clear understanding of the data challenges.

      Activities

      3.1 Map data challenges to Info-Tech data challenges

      3.2 Review Info-Tech data capabilities based on prioritized initiatives

      3.3 Discuss data platform and practice next steps

      Outputs

      List of data challenges preventing data maturation with the organization

      4 Map Data Capability

      The Purpose

      Map data capability.

      Key Benefits Achieved

      Prioritized data capability.

      Activities

      4.1 Map data challenges to Info-Tech data challenges

      4.2 Review Info-Tech data capabilities based on prioritized initiatives

      4.3 Discuss data platform and practice next steps

      Outputs

      Required data capabilities

      Data platform and practice – plan

      Initialized data management RACI 

      Further reading

      Build Your Data Practice and Platform

      Construct a scalable data foundation

      Analyst Perspective

      Build a data practice and platform that delivers value to your organization.

      The build or optimization of your data practice and data platform must be predicated on a thorough understanding of the organization’s goals, objectives, and priorities and the business capabilities and process they are meant to support and enable.

      Formalizing your practice or constructing your platform just for the sake of doing so often results in an initiative that is lengthy, costly, fizzles out, does not deliver business value, and ends up being considered a failure.

      Leverage Info-Tech’s approach and incorporate our pre-built models and patterns to effectively navigate that crucial and often difficult phase upfront of comprehensively defining business data needs so you can ultimately realize faster time-to-delivery of your overall data practice and platform.

      Photo of Rajesh Parab, Director, Research & Advisory, Data & Analytics Practice, Info-Tech Research Group.

      Rajesh Parab
      Director, Research & Advisory, Data & Analytics Practice
      Info-Tech Research Group

      Photo of Crystal Singh, Director, Research & Advisory, Data & Analytics Practice, Info-Tech Research Group.

      Crystal Singh
      Director, Research & Advisory, Data & Analytics Practice
      Info-Tech Research Group

      Attempting to Solve Data Problems?

      Situation
      • Lack of data centric leadership results in downstream issues such as integration, quality, and accessibility.
      • The complex nature of the data and lack of understanding leads to de-scoping delivery of data services that does not meet business needs or add value.
      • Poorly designed practice and siloed platforms result in an initiative that is lengthy, costly, fizzles out, does not deliver business value, and ends up being considered a failure.
      Complication
      • Data problem: When the data problem is diagnosed, the organization adopts a tactical approach.
      • Confirmation bias: Subject matter experts (SME) are hired to resolve the poorly defined problem, but the success of the SME is impacted by lack of architecture, technology, and organizational alignment.
      • Still no value: The selected tactical approach does not provide a solid foundation or solve your data problem.
      • Strategy for sake of strategy: Implementing a strategic approach for the sake of being strategic but this becomes overwhelming.
      • Fall back to tactical and operational: The data services are now potentially exposed and vulnerable, which strains business continuity and increases data debt.
      • Increased complexity and risk: Data silos, poor understanding, and high complexity results in an unmanageable data environment.
      Resolution
      • Requirements: Define and align your data requirement to business.
      • Capabilities: Discover data, identify data capabilities, and map your requirements.
      • Practices: Design and select fit-for-purpose data practices.
      • Platform: Optimize your data platform investments though sound architecture.

      Info-Tech Insight

      The true value of data comes from defining intentional relationships between the business and the data through a well thought out data platform and practice.

      Situation – Perpetual Data Problem

      Diagram of a head with gears around it and speech bubbles with notes titled 'Data Problem'. The surrounding gears, clockwise from bottom left, say 'Accessibility', 'Trust', 'Data Breach', 'Ambiguity', 'Ownership', 'Duplication', 'System Failure', and 'Manual Manipulation'. The speech bubbles notes, clockwise from bottom left, say 'Value-Add: How do I translate business needs to data capabilities?', 'Practice Organization: How do I organize resources and roles assignment challenges?', 'Platform: How do I organize data flows with no conceptual view of the environment?', and 'Break Down Silos: How do I break down silos?'
      I can’t access the data.
      I don’t trust the data in the report.
      It takes too long to get to the data for decision making
      • Lack of data-centric leadership results in downstream issues: integration, quality, accessibility
      • The organization’s data is too complex to manage without a cohesive plan.
      • The complex nature of the data and a lack of understanding leads to de-scoping delivery of data services that does not meet business needs or add value.
      • Poorly designed practice and siloed platforms result in an initiative that is lengthy, costly, fizzles out, does not deliver business value, and ends up being considered a failure.

      Complication – Data Initiative Fizzles Out

      • Data problem: When the data problem is diagnosed the organization adopts a tactical approach.
      • Confirmation bias: Subject matter experts (SME) are hired to resolve the poorly defined problem, but the success of the SME is impacted by lack of architecture, technology, and organizational alignment.
      • Still no value: the selected tactical approach does not provide a solid foundation or solve your data problem.
      • Strategy for sake of strategy: Implementing a strategic approach for sake of being strategic but this becomes overwhelming.
      • Fall back to tactical and operational: The data services are now potentially exposed and vulnerable, which strains business continuity and increases data debt.
      • Increased complexity and risk: Data silos, poor understanding, and high complexity result in an unmanageable data environment.
      Flowchart beginning with 'Data Symptom Exhibited' and 'Data Problem Diagnosed', then splitting into two paths 'Solve Data Problem as a point solution' or 'Attempt Strategic approach without culture, capacity, and business leadership'. Each approach ends with 'Data too complex, and initiative fizzles out...' and cycles back to the beginning.
      Use the road-tested patterns and frameworks in our blueprint to break the perpetual data solution cycle. Focus on the value that a data and analytics platform will bring rather than focusing on the data problems alone.

      Build Your Data Practice and Platform

      Bring Your Data Strategy to Life

      Logo for Info-Tech.
      Logo for #iTRG.
      CONVENTIONAL WISDOM

      Attempting to Solve Your Data Problems

      DATA SYMPTOM EXHIBITED

      Mismatch report, data quality issue, or similar symptom of a data problem.

      DATA PROBLEM DIAGNOSED

      Data expert identifies it as a data problem.

      COMPLEX STRATEGIC APPROACH ATTEMPTED

      Recognized need to attempt it strategically, but don't have capacity or culture to execute.

      Cycle diagram titled 'Data Problems' with numbers connected to surrounding steps, and a break after Step 3 where one can 'BREAK THE CYCLE'. In the middle are a list of data problems: 'Accessibility’, ‘Data Breach', 'Manual Manipulation', 'System Failure', 'Ambiguity', 'Duplication', 'Ownership', and 'Trust'.
      SOLUTION FAILS

      The tactical solution fails to solve the root cause of the data problem, and the data symptoms persist.

      TACTICAL SOLUTION FALLBACK

      A quick and dirty solution is attempted in order to fix the data problem.

      THE COMPLEX APPROACH FIZZLES OUT

      Attempted strategic approach takes too long, fizzles out.

      BREAK THE CYCLE

      Solving Your Data Problems

      1. DEFINE YOUR DATA REQUIREMENTS Incorporate a Business to Data Approach by utilizing Info-Tech's business capability templates for identifying data needs. BUSINESS-ALIGNED DATA REQUIREMENTS
      2. CONDUCT YOUR DATA DISCOVERY Understand the data behind your business problem. Identify the required data capabilities and domains as required by your business processes. RECOMMENDED DATA CAPABILITIES
      3. DESIGN YOUR DATA PRACTICES Build your custom data practices based on the predefined reusable models. CUSTOMIZED DATA PRACTICE
      4. ARCHITECT YOUR DATA PLATFORM Build your custom data platform based on the redefined reusable architecture patterns. CUSTOMIZED DATA PLATFORM
      CONTINUOUS PHASE: ROADMAP, SPONSORSHIP FEEDBACK AND DELIVERY

      Develop a roadmap to establish the practice and implement the architecture as designed. Ensure continuous alignment of the practice and architecture with the business landscape.

      Phase-by-Phase Approach to Build Your Data Practice and Platform

      Flowchart detailing the path to take through the four phases of this blueprint beginning with the 'Inputs' and 'People' involved and incorporating 'Deliverables' along the way. Phase-by-Phase Approach
      • Phase 1: Step 1 – Define Your Data Requirement
      • Phase 1: Step 2 – Conduct Your Data Discovery
      • Phase 2 – Design Your Data Practice
      • Phase 3 – Architect Your Data Platform

      Measure value when building your data practice and platform

      Sample Data Management Metrics

      Lists of data management metrics in different categories.

      • Refine the metrics for the overall Data Management practice and every initiative therein.
      • Refine the metrics at each platform and practice component to show business value against implementation effort.

      Understand and Build Data Culture

      See your Info-Tech Account Representative for more details on our Data Culture Diagnostic

      Only 14.29% of Transportation and Logistics respondents agree BI and Analytics Process and Technology are sufficient What is a diagnostic?

      Our diagnostics are the simplest way to collect the data you need, turn it into actionable insights, and communicate with stakeholders across the organization.

      52.54% of respondents from the healthcare industry are unaware of their organization’s data security policy
      Ask the Right Questions

      Use our low-effort surveys to get the data you need from stakeholders across the organization.

      Use Our Diagnostic Engine

      Our diagnostic engine does all the heavy lifting and analysis, turning your data into usable information.

      Communicate & Take Action

      Wow your executives with the incredible insights you've uncovered. Then, get to action: make IT better.

      On average only 40% agree that they have the reporting when needed


      (Source: Info-Tech’s Data Culture Diagnostic, 53 Organizations, 3138 Responses)

      35% of respondents feel that a governance body is in place looking at strategic data

      Build a Data-Driven Strategy Using Info-Tech Diagnostic Programs

      Make informed IT decisions by starting your diagnostic program today. Your account manager is waiting to help you.
      Sample of Info-Tech's 'Data Culture Scorecard'.

      Use Our Predefined Data and Analytics Patterns to Build Your DnA Landscape

      Walking through a book of architecture building plans with a personal guide is cheaper and faster than employing an architect to build and design your home

      Two books titled 'The Everything Homebuilding Book' and 'Architecture 101'. An open book with a finger pointing to a diagram.

      The first step is to align business strategy with data strategy and then start building your data practice and data platform

      Flowchart starting with business strategy focuses, then to data strategy focuses, and eventually to 'Data Metrics'.

      Insights

      The true value of data comes from defining intentional relationships between the business and the data through a well-thought-out data platform and practice.

      • Phase 1
        • Some organizations are low maturity so using the traditional Capability Maturity Model Integration (CMMI) would not make sense. A great alternative is to leverage existing models and methodologies to get going off the bat.
        • The Data Strategy is an input into the platform and practice. This is considered the Why; Data Practice and Platform is the How.
      • Phase 2
        • Info-Tech’s approach is business-goal driven and it leverages patterns, which enable the implementation of critical and foundational components and subsequently facilitates the evolution and development of the practice over time.
        • Systems should not be designed in isolation. Cross-functional collaboration throughout the design is critical to ensure all types of issues are revealed early. Otherwise, crucial tests are omitted, deployments fail, and end-users are dissatisfied.
      • Phase 3
        • Build your conceptual data architecture based on well-thought-out formulated patterns that align with your organization’s needs and environment.
        • Functional needs often take precedence over quality architecture. Quality must be baked into design, execution, and decision-making practices to ensure the right trade-offs are made.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Info-Tech’s Methodology for Building Your Data Practice and Platform

      Phase 1 –
      Define Your Data Requirements and Conduct Your Data Discovery
      Phase 2 –
      Design Your Data Practices
      Phase 3 –
      Architect Your Data Platform
      Phase Steps
      1. Identify your top initiatives
      2. Map your data initiatives to data capabilities
      1. Understand the practices value statement
      2. Review the Info-Tech practice pattern
      3. Initiate your practice design and setup
      1. Identify your data component
      2. Refine your data platform architecture
      3. Design your data platform
      4. Identify your new components and capabilities
      5. Initiative platform build and rollout
      Phase Outcomes Business-aligned data initiatives and capabilities that address data challenges and realize business strategic objectives Comprehensive data practice design based on the required business and data capabilities Data platform design based on Info-Tech data architecture reference pattern and prioritized data initiatives and capabilities

      Data Platform and Practice Implementation Plan

      Example timeline for data platform and practice implementation plan with 'Fiscal Years' across the top, and below they're broken down into quarters. Along the left side 'Phase 1: Step 1...', 'Phase 1: Step 2...', 'Phase 2...' and 'Phase 3'. Tasks are mapped onto the timeline in each phase with a short explanation.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889
      Info-Tech’s Workshop support for Build Your Data Practice and Platform. 'Build Your Data Practice and Platform' slide from earlier.
      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Workshop 1

      Data Needs and Discovery

      Workshop 2

      Data Practice Design

      Workshop 3

      Data Platform Design

      Workshop 1:
      Data Needs and Discovery

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889
      Day 1 Day 2 Day 3 Day 4
      Establish Business Context and Value
      Identify Your Top Initiatives
      Analyze Data Challenges
      Map Data Capability
      Activities

      1.1 Understand/confirm your organization’s strategic goals

      1.2 Classify the strategic goals and map to business drivers

      1.3 Identify the business capabilities that the strategy focus is on

      1.4 Identify the business processes realizing the strategy

      2.1 Highlight data-related outcomes /goals to realize to fulfill the business goal

      2.2 Map business data initiatives to the business strategic goals

      2.3 Prioritize Data initiatives

      3.1 Understand data management capabilities and framework

      3.2 Classify business data requirements using Info-Tech’s classification approach

      3.3 Highlight data challenges in your current environment

      4.1 Map data challenges to Info-Tech data challenges

      4.2 Review Info-Tech data capabilities based on prioritized initiative

      4.3 Discuss Data Platform and Practice Next Steps

      Deliverables
      • Business context and strategic drivers
      • Prioritized business capabilities and processes
      • Data Culture Survey results analysis
      • High-value business-aligned data initiative
      • List of data challenges preventing data maturation with the organization
      • Required data capabilities
      • Data platform and practice – plan
      • Initialized data management RACI
      Participants Business stakeholder, Business leader Business Subject Matter Expert, Data IT sponsor (CIO), Head of Data, Data Architect Business stakeholder, Business leader Business Subject Matter Expert, Data IT sponsor (CIO), Head of Data, Data Architect Data experts, Business Subject Matter Expert, Head of Data, Data Architect Data experts, Business Subject Matter Expert, Head of Data, Data Architect

      Workshop 2:
      Data Practice Design

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889
      Day 1 Day 2 Day 3 Day 4
      Plan Your Data Practices
      Design Your Data Practices 1
      Design Your Data Practices 2
      Design Your Data Practices 3
      Activities

      Prerequisite: Business context, business data requirement, and data capabilities

      1.1 Understand data practice framework

      1.2 Define your practice implementation approach

      1.3 Review and update data management RACI

      2.1 Understand Info-Tech data practice patterns for each prioritized practice

      2.2 Define your practice setup for each prioritized practice

      2.3 Highlight critical processes for each practice

      3.1 Understand Info-Tech data practice patterns for each prioritized practice

      3.2 Define your practice setup for each prioritized practice

      3.3 Highlight critical processes for each practice

      4.1 Understand Info-Tech data practice patterns for each prioritized practice

      4.2 Define your practice setup for each prioritized practice

      4.3 Highlight critical processes for each practice

      4.4 Discuss data platform and practice next steps

      Deliverables
      • Data practice implementation approach
      • Data management RACI
      • Data practice setup pattern for your organization
      • Data practice process pattern for your organization
      • Data practice setup pattern for your organization
      • Data practice process pattern for your organization
      • Data practice setup pattern for your organization
      • Data practice process pattern for your organization
      • Data platform and practice – plan
      Participants Data experts, Business Subject Matter Expert, Head of Data, Data Architect Data experts, Business Subject Matter Expert, Head of Data, Data Architect Data experts, Business Subject Matter Expert, Head of Data, Data Architect Data experts, Business Subject Matter Expert, Head of Data, Data Architect

      Workshop 3:
      Data Platform Design

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889
      Day 1Day 2Day 3Day 4
      Data Platform Overview
      Update Data Platform Reference Architecture
      Design Your Data Platform
      Design Your Data Practices 4
      Activities

      Prerequisite: Business context, business data requirement, and data capabilities

      1.1 Understand data platform framework and data capabilities

      1.2 Understand key data architecture principles and best practices

      1.3 Shortlist data platform patterns

      2.1 Map and identify data capabilities to data platform components

      2.2 Build data platform architecture using Info-Tech data platform reference architecture

      2.3 Highlight critical processes for each practice

      3.1 Design your target data platform using Info-Tech’s data platform template

      3.2 Identify new capabilities and components in your platform design

      4.1 Identify new capabilities and component in your platform design

      4.2 Discuss data platform initiatives

      Deliverables
      • Shortlisted data platform patterns
      • Data platform reference architecture for your organization
      • Data platform design for your organization
      • Data platform plan
      ParticipantsData experts, Business Subject Matter Expert, Head of Data, Data ArchitectData experts, Business Subject Matter Expert, Head of Data, Data ArchitectData experts, Business Subject Matter Expert, Head of Data, Data ArchitectData experts, Business Subject Matter Expert, Head of Data, Data Architect

      Build Your Data Practice and Platform

      Phase 1

      Phase 1: Step 1 – Define Your Data Requirements
      Phase 1: Step 2 – Conduct Your Data Discovery

      Phase 1

      1.1 Define Your Data Requirements
      1.2 Conduct Your Data Discovery

      Phase 2 Phase 3

      Phase 1: Step 1 – Define Your Data Requirements will walk you through the following activities:

      • Confirm the organizational strategic goals, business drivers, business capabilities, and processes driving the Data Practice and Platform effort.
      • Identify the data related outcomes, goals, and ideal environment needed to fulfill the business goals.

      This phase involves the following participants:

      A blend of business leaders and business SMEs together with the Data Strategy team.

      Phase 1: Step 2 – Conduct Your Data Discovery will walk you through the following activities:

      • Identify and highlight the data challenges faced in achieving the desired outcome.
      • Map the data challenges to the data capabilities required to realize the desired data outcome.

      This phase involves the following participants:

      Key personnel from IT/Data team: (Data Architect, Data Engineers, Head of Head of Reporting and Analytics)

      Integrate Portfolios to Create Exceptional Customer Value

      • Buy Link or Shortcode: {j2store}176|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Through growth, both organic and acquisition, you have a significant footprint of projects and applications.
      • Projects and applications have little in common with one another, all with their own history and pedigree.
      • You need to look across your portfolio of applications and projects to see if they will collectively help the organization achieve its goals.

      Our Advice

      Critical Insight

      • Stakeholders don’t care about the minutia and activities involved in project and application portfolio management.
      • Timely delivery of effective and important applications that deliver value throughout their life are the most important factors driving business satisfaction with IT.

      Impact and Result

      • Define an organizing principle that will structure your projects and applications in a way that matters to your stakeholders.
      • Bridge application and project portfolio data using the organizing principle that matters to communicate with stakeholders across the organization.
      • Create a dashboard that brings together the benefits of both project and application portfolio management to improve visibility and decision making.

      Integrate Portfolios to Create Exceptional Customer Value Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should integrate your application and project portfolios, review Info-Tech’s methodology, and understand the three ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define the principle that organizes your portfolios, objectives, and stakeholders

      To bring your portfolios together, you need to start with learning about your objectives, principles, and stakeholders.

      • Integrate Portfolios to Create Exceptional Customer Value – Phase 1: Define the Principle That Organizes Your Portfolios, Objectives, and Stakeholders
      • Integrated Portfolio Dashboard Tool
      • Integrated Portfolio Dashboard Tool – Example

      2. Take stock of what brings you closer to your goals

      Get a deeper understanding of what makes up your organizing principle before learning about your applications and projects that are aligned with your principles.

      • Integrate Portfolios to Create Exceptional Customer Value – Phase 2: Take Stock of What Brings You Closer to Your Goals

      3. Bring it all together

      Bound by your organizing principles, bring your projects and applications together under a single dashboard. Once defined, determine the rollout and communication plan that suits your organization.

      • Integrate Portfolios to Create Exceptional Customer Value – Phase 3: Bring It All Together
      • Integrated Portfolio Communication and Roadmap Plan
      • Integrated Portfolio Communication and Roadmap Plan Example
      [infographic]

      Workshop: Integrate Portfolios to Create Exceptional Customer Value

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Looking at Your Principles

      The Purpose

      Determine your organizational objectives and organizing principle.

      Key Benefits Achieved

      A clear understanding of where you need to go as an organization.

      A clear way to enable all parts of your portfolio to come together.

      Activities

      1.1 Determine your organization’s objectives.

      1.2 Determine your key stakeholders.

      1.3 Define your organizing principle.

      1.4 Decompose your organizing principle into its core components.

      Outputs

      Determined organizing principle for your applications and projects

      2 Understanding Your Applications

      The Purpose

      Get a clear view of the applications that contribute to your organization’s objectives.

      Key Benefits Achieved

      A key element of IT value delivery is its applications. Gaining awareness allows you to evaluate if the right value is being provided.

      Activities

      2.1 Determine your complete list of applications.

      2.2 Determine the health of your applications.

      2.3 Link your applications to the organization’s core components.

      Outputs

      List of applications

      Application list with health statistics filled in

      List of applications with health metrics bound to the organization’s core components

      3 Understanding Your Projects

      The Purpose

      Get a clear view of your project portfolio and how it relates to your applications and their organizing principle.

      Key Benefits Achieved

      An understanding of your project portfolio.

      Activities

      3.1 List all in-flight projects and vital health statistics.

      3.2 Map out the key programs and projects in your portfolio to the application’s core components.

      Outputs

      List of projects

      List of projects mapped to applications they impact

      4 Rolling Out the New Dashboard

      The Purpose

      Bring together your application and project portfolios in a new, easy-to-use dashboard with a full rollout plan.

      Key Benefits Achieved

      Dashboard available for use

      Roadmap and communication plan to make dashboard implementable and tangible

      Activities

      4.1 Test the dashboard.

      4.2 Define your refresh cadence.

      4.3 Plan your implementation.

      4.4 Develop your communication plan.

      Outputs

      Validated dashboards

      Build a Vendor Security Assessment Service

      • Buy Link or Shortcode: {j2store}318|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $17,501 Average $ Saved
      • member rating average days saved: 17 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Vendor security risk management is a growing concern for many organizations. Whether suppliers or business partners, we often trust them with our most sensitive data and processes.
      • More and more regulations require vendor security risk management, and regulator expectations in this area are growing.
      • However, traditional approaches to vendor security assessments are seen by business partners and vendors as too onerous and are unsustainable for information security departments.

      Our Advice

      Critical Insight

      • An efficient and effective assessment process can only be achieved when all stakeholders are participating.
      • Security assessments are time-consuming for both you and your vendors. Maximize the returns on your effort with a risk-based approach.
      • Effective vendor security risk management is an end-to-end process that includes assessment, risk mitigation, and periodic re-assessments.

      Impact and Result

      • Develop an end-to-end security risk management process that includes assessments, risk treatment through contracts and monitoring, and periodic re-assessments.
      • Base your vendor assessments on the actual risks to your organization to ensure that your vendors are committed to the process and you have the internal resources to fully evaluate assessment results.
      • Understand your stakeholder needs and goals to foster support for vendor security risk management efforts.

      Build a Vendor Security Assessment Service Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a vendor security assessment service, review Info-Tech’s methodology, and understand the three ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define governance and process

      Determine your business requirements and build your process to meet them.

      • Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process
      • Vendor Security Policy Template
      • Vendor Security Process Template
      • Vendor Security Process Diagram (Visio)
      • Vendor Security Process Diagram (PDF)

      2. Develop assessment methodology

      Develop the specific procedures and tools required to assess vendor risk.

      • Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology
      • Service Risk Assessment Questionnaire
      • Vendor Security Questionnaire
      • Vendor Security Assessment Inventory

      3. Deploy and monitor process

      Implement the process and develop metrics to measure effectiveness.

      • Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process
      • Vendor Security Requirements Template
      [infographic]

      Workshop: Build a Vendor Security Assessment Service

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Governance and Process

      The Purpose

      Understand business and compliance requirements.

      Identify roles and responsibilities.

      Define the process.

      Key Benefits Achieved

      Understanding of key goals for process outcomes.

      Documented service that leverages existing processes.

      Activities

      1.1 Review current processes and pain points.

      1.2 Identify key stakeholders.

      1.3 Define policy.

      1.4 Develop process.

      Outputs

      RACI Matrix

      Vendor Security Policy

      Defined process

      2 Define Methodology

      The Purpose

      Determine methodology for assessing procurement risk.

      Develop procedures for performing vendor security assessments.

      Key Benefits Achieved

      Standardized, repeatable methodologies for supply chain security risk assessment.

      Activities

      2.1 Identify organizational security risk tolerance.

      2.2 Develop risk treatment action plans.

      2.3 Define schedule for re-assessments.

      2.4 Develop methodology for assessing service risk.

      Outputs

      Security risk tolerance statement

      Risk treatment matrix

      Service Risk Questionnaire

      3 Continue Methodology

      The Purpose

      Develop procedures for performing vendor security assessments.

      Establish vendor inventory.

      Key Benefits Achieved

      Standardized, repeatable methodologies for supply chain security risk assessment.

      Activities

      3.1 Develop vendor security questionnaire.

      3.2 Define procedures for vendor security assessments.

      3.3 Customize the vendor security inventory.

      Outputs

      Vendor security questionnaire

      Vendor security inventory

      4 Deploy Process

      The Purpose

      Define risk treatment actions.

      Deploy the process.

      Monitor the process.

      Key Benefits Achieved

      Understanding of how to treat different risks according to the risk tolerance.

      Defined implementation strategy.

      Activities

      4.1 Define risk treatment action plans.

      4.2 Develop implementation strategy.

      4.3 Identify process metrics.

      Outputs

      Vendor security requirements

      Understanding of required implementation plans

      Metrics inventory

      Assess Infrastructure Readiness for Digital Transformation

      • Buy Link or Shortcode: {j2store}300|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      There are many challenges for I&O when it comes to digital transformation, including:

      • Legacy infrastructure technical debt
      • Skills and talent in the IT team
      • A culture that resists change
      • Fear of job loss

      These and many more will hinder your progress, which demonstrates the need to invest in modernizing your infrastructure, investing in training and hiring talent, and cultivating a culture that supports digital transformation.

      Our Advice

      Critical Insight

      By using the framework of culture, competencies, collaboration and capabilities, organizations can create dimensions in their I&O structure in order to shift from traditional infrastructure management to becoming a strategic enabler, driving agility, innovation, and operational excellence though the effective integration of people, process, and technology.

      Impact and Result

      By driving a customer-centric approach, delivering a successful transformation can be tailored to the business goals and drive adoption and engagement. Refining your roadmap through data and analytics will drive this change. Use third-party expertise to guide your transformation and help build that vision of the future.

      Assess Infrastructure Readiness for Digital Transformation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess Infrastructure Readiness for Digital Transformation – Unlock the full potential of your infrastructure with a digital transformation strategy and clear the barriers for success.

    • Be customer centric as opposed to being technology driven.
    • Understanding business needs and pain points is key to delivering solutions.
    • Approach infrastructure digital transformation in iterations and look at this as a journey.
      • Assess Infrastructure Readiness for Digital Transformation Storyboard
      • I&O Digital Transformation Maturity Assessment Tool

      Infographic

      Further reading

      Assess Infrastructure Readiness for Digital Transformation

      Unlock the full potential of your infrastructure with a digital transformation strategy and clear the barriers to success.

      Analyst Perspective

      It’s not just about the technology!

      Many businesses fail in their endeavors to complete a digital transformation, but the reasons are complex, and there are many ways to fail, whether it is people, process, or technology. In fact, according to many surveys, 70% of digital transformations fail, and it’s mainly down to strategy – or the lack thereof.

      A lot of organizations think of digital transformation as just an investment in technology, with no vision of what they are trying to achieve or transform. So, out of the gate, many organizations fail to undergo a meaningful transformation, change their business model, or bring about a culture of digital transformation needed to be seriously competitive in their given market.

      When it comes to I&O leaders who have been given a mandate to drive digital transformation projects, they still must align to the vision and mission of the organization; they must still train and hire staff that will be experts in their field; they must still drive process improvements and align the right technology to meet the needs of a digital transformation.

      John Donovan

      John Donovan

      Principal Research Director, I&O
      Info-Tech Research Group

      Insight summary

      Overarching insight

      Digital transformation requires I&O teams to shift from traditional infrastructure management to becoming a strategic enabler, driving agility, innovation, and operational excellence through effective integration of people, process, and technology.

      Insight 1

      Collaboration is a key component of I&O – Promote strong collaboration between I&O and other business functions. When doing a digital transformation, it is clear that this is a cross-functional effort. Business leaders and IT teams need to align their objectives, prioritize initiatives, and ensure that you are seamlessly integrating technologies with the new business functions.

      Insight 2

      Embrace agility and adaptability as core principles – As the digital landscape continues to evolve, it is paramount that I&O leaders are agile and adaptable to changing business needs, adopting new technology and implementing new innovative solutions. The culture of continuous improvement and openness to experimentation and learning will assist the I&O leaders in their journey.

      Insight 3

      Future-proof your infrastructure and operations – By anticipating emerging technologies and trends, you can proactively plan and organize your team for future needs. By investing in scalable, flexible infrastructure such as cloud services, automation, AI technologies, and continuously upskilling the IT staff, you can stay relevant and forward-looking in the digital space.

      Tactical insight

      An IT infrastructure maturity assessment is a foundational step in the journey of digital transformation. The demand will be on performance, resilience, and scalability. IT infrastructure must be able to support innovation and rapid deployment of services.

      Tactical insight

      Having a clear strategy, with leadership commitment along with hiring and training the right people, monitoring and measuring your progress, and ensuring it is a business-led journey will increase your chances of success.

      Executive Summary

      Your Challenge

      There are a lot of challenges for I&O when it comes to digital transformation, including:

      • Legacy infrastructure technical debt.
      • Skills and talent in the IT team.
      • A culture that resists change.
      • Fear of job loss.

      These and many more will hinder your progress, which demonstrates the need to invest in modernizing your infrastructure, investing in training and hiring talent, and cultivating a culture that supports digital transformation.

      Common Obstacles

      Many obstacles to digital transformation begin with non-I&O activities, including:

      • Lack of a clear vision and strategy.
      • Siloed organizational structure.
      • Lack of governance and data management.
      • Limited budget and resources.

      By addressing these obstacles, I&O will have a better chance of a successful transformation and delivering the full potential of digital technologies.

      Info-Tech's Approach

      Building a culture of innovation by developing clear goals and creating a vision will be key.

      • Be customer centric as opposed to being technology driven.
      • Understand the business needs and pain points in order to effectively deliver solutions.
      • Approach infrastructure digital transformation in iterations and look at it as a journey.

      By completing the Info-Tech digital readiness questionnaire, you will see where you are in terms of maturity and areas you need to concentrate on.

      Info-Tech Insight

      By driving a customer-centric approach, delivering a successful transformation can be tailored to the business goals and drive adoption and engagement. Refining your roadmap through data and analytics will drive this change. Use third-party expertise to guide your transformation and help build that vision of the future.

      The cost of digital transformation

      The challenges that stand in the way of your success, and what is needed to reverse the risk

      What CIOs are saying about their challenges

      26% of those CIOs surveyed cite resistance to change, with entrenched viewpoints demonstrating a real need for a cultural shift to enhance the digital transformation journey.

      Source: Prophet, 2019.

      70% of digital transformation projects fall short of their objectives – even when their leadership is aligned, often with serious consequences.

      Source: BCG, 2020.

      Having a clear strategy and commitment from leadership, hiring and training the right people, monitoring and measuring your progress, and ensuring it is a business-led journey will increase your chances of success.

      Info-Tech Insight

      Cultural change, business alignment, skills training, and setting a clear strategy with KPIs to demonstrate success are all key to being successful in your digital journey.

      Small and medium-sized enterprises

      What business owners and CEOs are saying about their digital transformation

      57% of small business owners feel they must improve their IT infrastructure to optimize their operations.

      Source: SMB Story, 2023.

      64% of CEOs believe driving digital transformation at a rapid pace is critical to attracting and retaining talent and customers.

      Source: KPMG, 2022.

      Info-Tech Insight

      An IT infrastructure maturity assessment is a foundational step in the journey of digital transformation. The demand will be on performance, resilience, and scalability. IT infrastructure must be able to support innovation and rapid deployments.